<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/stand-up-for-digital-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/gni-industry-dialogue-learning-session-human-rights-impact-assessments-and-due-diligence-in-the-ict-sector"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dna-dissent"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gsma-research-outputs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-joins-worldwide-campaign-to-discover-depth-of-gchq-illegal-spying"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/events/stand-up-for-digital-rights">
    <title>Stand up for Digital Rights</title>
    <link>https://cis-india.org/internet-governance/events/stand-up-for-digital-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) invites you to a discussion on a set of recommendations for Ethical Tech, a report on human rights and private online intermediaries which describes key areas where such actors have responsibilities. The event will be held at CIS office in Bangalore on June 15, 2016 from 5 p.m. to 7 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The discussion intends to launch a report on human rights and private online intermediaries, which describes key areas where such actors have responsibilities and provides a detailed set of recommendations for Ethical Tech. This work is the culmination of a year long research project led by the Centre for Law and Democracy (CLD), in collaboration with the Arabic Network for Human Rights Information (ANHRI), the Centre for Internet and Society (CIS), Open Net Korea, the Center for Studies on Freedom of Expression and Access to Information at the University of Palermo (CELE) and researchers with the University of Ottawa and the Munk School of Global Affairs at the University of Toronto. The key themes for discussion would include:&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;General Human Rights Responsibilities and Private Online Intermediaries&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Expanding Access&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Net Neutrality&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Content Moderation&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Privacy&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Transparency and Informed Consent&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Responding to State Interferences&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;We look forward to meeting you and making this forum for knowledge exchange a success.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/stand-up-for-digital-rights'&gt;https://cis-india.org/internet-governance/events/stand-up-for-digital-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2016-06-13T15:30:12Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/gni-industry-dialogue-learning-session-human-rights-impact-assessments-and-due-diligence-in-the-ict-sector">
    <title>GNI-Industry Dialogue Learning Session: Human Rights Impact Assessments and Due Diligence in the ICT sector</title>
    <link>https://cis-india.org/internet-governance/news/gni-industry-dialogue-learning-session-human-rights-impact-assessments-and-due-diligence-in-the-ict-sector</link>
    <description>
        &lt;b&gt;Elonnai Hickok attended the meeting organized by Global Network Initiative on March 11, 2016 in Washington D.C.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The GNI welcomed its new observers from the Telecommunications Industry Dialogue by holding a learning session in conjunction with the GNI Board Meeting on March 10.  This learning session aimed to increase understanding between the GNI and the ID by examining some of the common challenges that face ICT companies in the area of human rights due diligence and highlighting good practices.  A second objective was to help the GNI develop a learning program and materials that will be useful for its members and draw on their expertise.  Finally, this learning session informed the review of the GNI Implementation Guidelines that will take place during 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The session took place according to the Chatham House Rule.  Each short presentation was followed by a space for questions and answers.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Human Rights Impact Assessments in the ICT sector – Michael Samway&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;The Human Rights Due Diligence Process at Nokia – Laura Okkonen&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Yahoo’s approach to Human Rights Impact Assessments– Nicole Karlebach and Katie Shay&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Orange’s challenges and approach to doing business in Africa – Yves Nissim&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Microsoft’s human rights impacts and the warrant case – Steve Crown and Bernard Shen&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;TeliaSonera’s approach to withdrawing from Eurasia – Patrik Hiselius&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Considerations for company due diligence on the ground – Kathleen Reen and Babette Ngene, Internews&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For discussion:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What are some of the common challenges facing current GNI member companies and ID member companies?&lt;/li&gt;
&lt;li&gt;What do we consider to be good practices that are applicable to all?&lt;/li&gt;
&lt;li&gt;What lessons can be applied to the review of the GNI Implementation Guidelines that will take place during 2016?&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/gni-industry-dialogue-learning-session-human-rights-impact-assessments-and-due-diligence-in-the-ict-sector'&gt;https://cis-india.org/internet-governance/news/gni-industry-dialogue-learning-session-human-rights-impact-assessments-and-due-diligence-in-the-ict-sector&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-06T15:42:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance">
    <title>Policy Brief: Oversight Mechanisms for Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/oversight-mechanisms-for-surveillance" class="internal-link"&gt;&lt;b&gt;Download the PDF &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Across jurisdictions, the need for effective and relevant oversight mechanisms (coupled with legislative safeguards) for state surveillance has been highlighted by civil society, academia, citizens and other key stakeholders.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;A key part of oversight of state surveillance is accountability of intelligence agencies. This has been recognized at the international level. Indeed, the Organization for Economic Co-operation and Development, The United Nations, the Organization for Security and Cooperation in Europe, the Parliamentary Assembly of the Council of Europe, and the Inter-Parliamentary Union have all recognized that intelligence agencies need to be subject to democratic accountability.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;Since 2013, the need for oversight has received particular attention in light of the information disclosed through the 'Snowden Revelations'. &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Some countries such as the US, Canada, and the UK have regulatory  mechanisms for the oversight of state surveillance and the intelligence  community, while many other countries – India included - have piecemeal  oversight mechanisms in place. The existence of regulatory mechanisms  for state surveillance does not necessarily equate to effective  oversight – and piecemeal mechanisms – depending on how they are  implemented, could be more effective than comprehensive mechanisms. This  policy brief seeks to explore the purpose of oversight mechanisms for  state surveillance, different forms of mechanisms, and what makes a  mechanism effective and comprehensive. The brief also reviews different  oversight mechanisms from the US, UK, and Canada and provides  recommendations for ways in which India can strengthen its present  oversight mechanisms for state surveillance and the intelligence  community.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is the purpose and what are the different components of an oversight mechanism for State Surveillance?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The International Principles on the Application of Human Rights to Communication Surveillance, developed through a global consultation with civil society groups, industry, and international experts recommends that public oversight mechanisms for state surveillance should be established to ensure transparency and accountability of Communications Surveillance. To achieve this, mechanisms should have the authority to:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Access all potentially relevant information about State actions, including, where appropriate, access to secret or classified information;&lt;/li&gt;
&lt;li&gt;Assess whether the State is making legitimate use of its lawful capabilities;&lt;/li&gt;
&lt;li&gt;Evaluate whether the State has been comprehensively and accurately publishing information about the use and scope of Communications Surveillance techniques and powers in accordance with its Transparency obligations publish periodic reports and other information relevant to Communications Surveillance;&lt;/li&gt;
&lt;li&gt;Make public determinations as to the lawfulness of those actions, including the extent to which they comply with these Principles&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;What can inform oversight mechanisms for state surveillance?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The development of effective oversight mechanisms for state surveillance can be informed by a number of factors including:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Rapidly changing technology – how can mechanisms adapt, account for, and evaluate perpetually changing intelligence capabilities?&lt;/li&gt;
&lt;li&gt;Expanding surveillance powers – how can mechanisms evaluate and rationalize the use of expanding agency powers?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Tensions around secrecy, national interest, and individual rights – how can mechanisms respect, recognize, and uphold multiple competing interests and needs including an agency's need for secrecy, the government's need to protect national security, and the citizens need to have their constitutional and fundamental rights upheld?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The structure, purpose, and goals of specific intelligence agencies and circumstances– how can mechanisms be sensitive and attuned to the structure, purpose, and functions of differing intelligence agencies and circumstances? &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;These factors lead to further questions around:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;The purpose of an oversight mechanism: Is an oversight mechanism meant to ensure effectiveness of an agency? Perform general reviews of agency performance? Supervise the actions of an agency? Hold an agency accountable for misconduct?&lt;/li&gt;
&lt;li&gt;The structure of an oversight mechanism: Is it internal? External? A combination of both? How many oversight mechanisms that agencies should be held accountable to?&lt;/li&gt;
&lt;li&gt;The functions of an oversight mechanism: Is an oversight mechanism meant to inspect? Evaluate? Investigate? Report?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The powers of an oversight mechanism: The extent of access that an oversight mechanism needs and should have to the internal workings of security agencies and law enforcement to carry out due diligence? The extent of legal backing that an oversight mechanism should have to hold agencies legally accountable.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;What oversight mechanisms for State Surveillance exist in India?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In India the oversight 'ecosystem' for state surveillance is comprised of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Review committee&lt;/b&gt;: Under the Indian Telegraph Act 1885 and the Rules issued thereunder (Rule 419A), a Central Review Committee that consists of the Cabinet Secretary, Secretary of Legal Affairs to the Government of India, Secretary of Department of Telecommunications to the Government of India is responsible for meeting on a bi-monthly basis and reviewing the legality of interception directions. The review committee has the power to revoke the directions and order the destruction of intercepted material.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; This review committee is also responsible for evaluating interception, monitoring, and decryption orders issued under section 69 of the Information Technology Act 2000.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; and orders for the monitoring and collection of traffic data under section 69B of the Information Technology Act 2000.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Authorizing Authorities&lt;/b&gt;: The Secretary in the Ministry of Home Affairs of the Central Government is responsible for authorizing requests for the interception, monitoring, and decryption of communications issued by central agencies.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; The Secretary in charge of the Home Department is responsible for authorizing requests for the interception, monitoring, and decryption of communications from state level agencies and law enforcement.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; The Secretary to the Government of India in the Department of Information Technology under the Ministry of Communications and Information Technology is responsible for authorizing requests for the monitoring and collection of traffic data.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; Any officer not below the rank of Joint Secretary to the Government of India, who has been authorised by the Union Home Secretary or the State Home Secretary in this behalf, may authorize the interception of communications in case of an emergency.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; A Commissioner of Police, District Superintendent of Police or Magistrate may issue requests for stored data to any postal or telegraph authority.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Administrative authorities&lt;/b&gt;: India does not have an oversight mechanism for intelligence agencies, but agencies do report to different authorities. For example: The Intelligence Bureau reports to the Home Minister, the Research and Anaylsis Wing is under the Cabinet Secretariat and reports to the Prime Minister, the Joint Intelligence Committee (JIC), National Technical Research Organisation (NTRO) and Aviation Research Centre (ARC) report to the National Security Adviser; and the National Security Council Secretariat under the NSA which serves the National Security Council.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;It is important to note that though India has a Right to Information Act, but most of the security agencies are exempt from the purview of the Act&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; as is disclosure of any information that falls under the purview of the Official Secrets Act 1923.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; [Note: There is no point in listing out all the exceptions given in section 8 and other sections as well. I think the point is sufficiently made when we say that security agencies are exempt from the purview of the Act.] The Official Secrets Act does not provide a definition of an 'official secret' and instead protects information: pertaining to national Security, defence of the country, affecting friendly relations with foreign states, etc.&lt;a href="#fn16" name="fr16"&gt;[16] &lt;/a&gt;Information in India is designated as classified in accordance to the Manual of Departmental Security Instruction which is circulated by the Ministry of Home Affairs. According to the Public Records Rules 1997, “classified records" means the files relating to the public records classified as top-secret, confidential and restricted in accordance with the procedure laid down in the Manual of Departmental Security Instruction circulated by the Ministry of Home affairs from time to time;”&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;Bi-annually officers evaluate and de-classify classified information and share the same with the national archives.&lt;a href="#fn18" name="fr18"&gt;[18] &lt;/a&gt;In response to questions raised in the Lok Sabha on the 5th of May 2015 regarding if the Official Secrets Act, 1923 will be reviewed, the number of classified files stored with the Government under the Act, and if the Government has any plans to declassify some of the files – the Ministry of Home Affairs clarified that a committee consisting of Secretaries of the Ministry of Home Affairs, the Department of Personnel and Training, and the Department of Legal Affairs has been established to examine the provisions of the Official Secrets Act, 1923 particularly in light of the Right to Information Act, 2005. The Ministry of Home Affairs also clarified that the classification and declassification of files is done by each Government Department as per the Manual of Departmental Security Instructions, 1994 and thus there is no 'central database of the total number of classified files'.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How can India's oversight mechanism for state surveillance be clarified?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Though these mechanisms establish a basic framework for an oversight mechanism for state surveillance in India, there are aspects of this framework that could be clarified and there are ways in which the framework could be strengthened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aspects of the present review committee that could be clarified:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Powers of the review committee: Beyond having the authority to declare that orders for interception, monitoring, decryption, and collection of traffic data are not within the scope of the law and order for destruction of any collected information – what powers does the review committee have? Does the committee have the power to compel agencies to produce additional or supporting evidence? Does the committee have the power to compel information from the authorizing authority?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Obligations of the review committee: The review committee is required to 'record its findings' as to whether the interception orders issued are in accordance with the law. Is there a standard set of questions/information that must be addressed by the committee when reviewing an order? Does the committee only review the content of the order or do they also review the implementation of the order? Beyond recording its findings, are there any additional reporting obligations that the review committee must fulfill?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accountability of the review committee: Does the review committee answer to a higher authority? Do they have to submit their findings to other branches of the government – such as Parliament? Is there a mechanism to ensure that the review committee does indeed meet every two months and review all orders issued under the relevant sections of the Indian Telegraph Act 1885 and the Information Technology Act 2008?&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;Proposed oversight mechanisms in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Oversight mechanisms can help with avoiding breaches of national security by ensuring efficiency and effectiveness in the functioning of security agencies. The need for the oversight of state surveillance is not new in India. In 1999 the Union Government constituted a Committee with the mandate of reviewing the events leading up to Pakistani aggression in Kargil and to recommend measures towards ensuring national security. Though the Kargil Committee was addressing surveillance from the perspective of  gathering information on external forces, there are parellels in the lessons learned for state surveillance. Among other findings, in their Report the Committee found a number of limitations in the system for collection, reporting, collation, and assessment of intelligence. The Committee also found that there was a lack of oversight for the intelligence community in India – resulting in no mechanisms for tasking the agencies, monitoring their performance and overall functioning, and evaluating the quality of the work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Committee also noted that such a mechanism is a standard feature in jurisdictions across the world. The Committee emphasized this need from an economic perspective – that without oversight – the Government and the nation has no way of evaluating whether or not they are receiving value for their money. The Committee recommended a review of the intelligence system with the objective of solving such deficiencies.&lt;a href="#fn20" name="fr20"&gt;[20] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2000 a Group of Ministers was established to review the security and intelligence apparatus of the country. In their report issued to the Prime Minister, the Group of Ministers recommended the establishment of an Intelligence Coordination Group for the purpose of providing oversight of intelligence agencies at the Central level. Specifically the Intelligence Coordination Group would be responsible for:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Allocation of resources to the intelligence agencies&lt;/li&gt;
&lt;li&gt;Consideration of annual reviews on the quality of inputs&lt;/li&gt;
&lt;li&gt;Approve the annual tasking for intelligence collection&lt;/li&gt;
&lt;li&gt;Oversee the functions of intelligence agencies&lt;/li&gt;
&lt;li&gt;Examine national estimates and forecasts&lt;a href="#fn21" name="fr21"&gt;[21] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Past critiques of the Indian surveillance regime have included the fact that intelligence agencies do not come under the purview of any overseeing mechanism including Parliament, the Right to Information Act 2005, or the General Comptroller of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, Manish Tewari, who at the time was a Member of Parliament from Ludhiana, introduced the Private Member's Bill - “The Intelligence Services (Powers and Regulation) Bill” proposed stand alone statutory regulation of intelligence agencies. In doing so it sought to establish an oversight mechanism for intelligence agencies within and outside of India. The Bill was never introduced into Parliament.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt; Broadly, the Bill sought to establish: a National Intelligence and Security Oversight Committee which would oversee the functionings of intelligence agencies and would submit an annual report to the Prime Minister, a National Intelligence Tribunal for the purpose of investigating complaints against intelligence agencies, an Intelligence Ombudsman for overseeing and ensuring the efficient functioning of agencies, and a legislative framework regulating intelligence agencies.&lt;a href="#fn23" name="fr23"&gt;[23] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Proposed policy in India has also explored the possibility of coupling surveillance regulation and oversight with private regulation and oversight. In 2011 the Right to Privacy Bill was drafted by the Department of Personnel and Training. The Bill proposed to establish a “Central Communication Interception Review Committee” for the purposes of reviewing orders for interception issued under the Telegraph Act. The Bill also sought to establish an authorization process for surveillance undertaken by following a person, through CCTV's, or other electronic means.&lt;a href="#fn24" name="fr24"&gt;[24] &lt;/a&gt;In contrast, the 2012 Report of the Group of Experts on Privacy, which provided recommendations for a privacy framework for India, recommended that the Privacy Commissioner should exercise broad oversight functions with respect to interception/access, audio &amp;amp; video recordings, the use of personal identifiers, and the use of bodily or genetic material.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A 2012 report by the Institute for Defence Studies and Analyses titled “A Case for Intelligence Reforms in India” highlights at least four 'gaps' in intelligence that have resulted in breaches of national security including: zero intelligence, inadequate intelligence, inaccurate intelligence, and excessive intelligence – particularly in light of additional technical inputs and open source inputs.&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; In some cases, an oversight mechanism could help in remediating some of these gaps. Returning to the 2012 IDSA Report, the Report recommends the following steps towards an oversight mechanism for Indian intelligence:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Establishing an Intelligence Coordination Group (ICG) that will exercise oversight functions for the intelligence community at the Central level. This could include overseeing functions of the agencies, quality of work, and finances. &lt;/li&gt;
&lt;li&gt;Enacting legislation defining the mandates, functions, and duties of intelligence agencies.&lt;/li&gt;
&lt;li&gt;Holding intelligence agencies accountable to the Comptroller &amp;amp; Auditor General to ensure financial accountability. &lt;/li&gt;
&lt;li&gt;Establishing a Minister for National Security &amp;amp; Intelligence for exercising administrative authority over intelligence agencies. &lt;/li&gt;
&lt;li&gt;Establishing a Parliamentary Accountability Committee for oversight of intelligence agencies through parliament. &lt;/li&gt;
&lt;li&gt;Defining the extent to which intelligence agencies can be held accountable to reply to requests pertaining to violations of privacy and other human rights issued under the Right to Information Act.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Highlighting the importance of accountable surveillance frameworks, in 2015 the external affairs ministry director general of India Santosh Jha stated at the UN General Assembly that the global community needs to "to create frameworks so that Internet surveillance practices motivated by security concerns are conducted within a truly transparent and accountable framework.”&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;In what ways can India's mechanisms for state surveillance be strengthened?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Building upon the recommendations from the Kargil Committee, the Report from the Group of Ministers, the Report of the Group of Experts on Privacy, the Draft Privacy Bill 2011, and the IDSA report, ways in which the framework for oversight of state surveillance in India could be strengthened include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Oversight to enhance public understanding, debate, accountability, and democratic governance: State surveillance is unique in that it is enabled with the objective of protecting a nations security. Yet, to do so it requires citizens of a nation to trust the actions taken by intelligence agencies and to allow for possible access into their personal lives and possible activities that might infringe on their constitutional rights (such as freedom of expression) for a larger outcome of security. Because of this, oversight mechanisms for state surveillance must balance securing national security while submitting itself to some form of accountability to the public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Independence of oversight mechanisms: Given the Indian context, it is particularly important that an oversight mechanism for surveillance powers and the intelligence community is capable of addressing and being independent from political interference. Indeed, the majority of cases regarding illegal interceptions that have reached the public sphere pertain to the surveillance of political figures and political turf wars.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;Furthermore, though the current Review Committee established in the Indian Telegraph Act does not have a member from the Ministry of Home Affairs (the Ministry responsible for authorizing interception requests), it is unclear how independent this committee is from the authorizing Ministry. To ensure non-biased oversight, it is important that oversight mechanisms are independent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Legislative regulation of intelligence agencies: Currently, intelligence agencies are provided surveillance powers through the Information Technology Act and the Telegraph Act, but beyond the National Intelligence Agency Act which establishes the National Intelligence Agency, there is no legal mechanism creating, regulating and overseeing intelligence agencies using these powers. In the 'surveillance ecosystem' this creates a policy vacuum, where an agency is enabled through law with a surveillance power and provided a procedure to follow, but is not held legally accountable for the effective, ethical, and legal use of the power. To ensure legal accountability of the use of surveillance techniques, it is important that intelligence are created through legislation that includes oversight provisions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Comprehensive oversight of all intrusive measures: Currently the Review Committee established under the Telegraph Act is responsible for the evaluation of orders for the interception, monitoring, decryption, and collection of traffic data. The Review Committee is not responsible for reviewing the implementation or effectiveness of such orders and is not responsible for reviewing orders for access to stored information or other forms of electronic surveillance. This situation is a result of 1. Present oversight mechanisms not having comprehensive mandates 2. Different laws in India enabling different levels of access and not providing a harmonized oversight mechanism and 3.Indian law not formally addressing and regulating emerging surveillance technologies and techniques. To ensure effectiveness, it is important for oversight mechanisms to be comprehensive in mandate and scope.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establishment of a tribunal or redress mechanism: India currently does not have a specified means for individuals to seek redress for unlawful surveillance or surveillance that they feel has violated their rights. Thus, individuals must take any complaint to the courts. The downsides of such a system include the fact that the judiciary might not be able to make determinations regarding the violation, the court system in India is overwhelmed and thus due process is slow, and given the sensitive nature of the topic – courts might not have the ability to immediately access relevant documentation. To ensure redress, it is important that a tribunal or a redress mechanism with appropriate powers is established to address complaints or violations pertaining to surveillance.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Annual reporting by security agencies, law enforcement, and service providers: Information regarding orders for surveillance and the implementation of the same is not disclosed by the government or by service providers in India.&lt;a href="#fn29" name="fr29"&gt;[29] &lt;/a&gt; Indeed, service providers by law are required to maintain the confidentiality of orders for the interception, monitoring, or decryption of communications and monitoring or collection of traffic data. At the minimum, an oversight mechanism should receive annual reports from security agencies, law enforcement, and service providers with respect to the surveillance undertaken. Edited versions of these Reports could be shared with Parliament and the public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Consistent and mandatory reviews of relevant legislation: Though committees have been established to review various legislation and policy pertaining to state surveillance, the time frame for these reviews is not clearly defined by law. These reviews should take place on a consistent and publicly stated time frame. Furthermore, legislation enabling surveillance in India do not require review and assessment for relevance, adequacy, necessity, and proportionality after a certain period of time. Mandating that legislation regulating surveillance is subject to review on a consistent is important in ensuring that the provisions are relevant, proportionate, adequate, and necessary. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency of classification and declassification process and centralization of de-classified records: Currently, the Ministry of Home Affairs establishes the process that government departments must follow for classifying and de-classifying information. This process is not publicly available and de-classified information is stored only with the respective department. For transparency purposes, it is important that the process for classification of records be made public and the practice of classification of information  take place in exceptional cases. Furthermore, de-classified records should be stored centrally and made easily accessible to the public. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Executive and administrative orders regarding establishing of agencies and surveillance projects should be in the public domain: Intelligence agencies and surveillance projects in India are typically enabled through executive orders. For example, NATGRID was established via an executive order, but this order is not publicly available. As a form of transparency and accountability to the public, it is important that if executive orders establish an agency or  a surveillance project, these are made available to the public to the extent possible.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Oversight of surveillance should incorporate privacy and cyber/national security: Increasingly issues of surveillance, privacy, and cyber security are interlinked. Any move to establish an oversight mechanism for surveillance and the intelligence committee must incorporate and take into consideration privacy and cyber security. This could mean that an oversight mechanism for surveillance in India works closely with CERT-IN and a potential privacy commissioner or that the oversight mechanism contains internal expertise in these areas to ensure that they are adequately considered. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Oversight by design: Just like the concept of privacy by design promotes the ideal that principles of privacy are built into devices, processes, services, organizations, and regulation from the outset – oversight mechanisms for state surveillance should also be built in from the outset of surveillance projects and enabling legislation. In the past, this has not been the practice in India– the National Intelligence Grid was an intelligence system that sought to link twenty one databases together – making such information easily and readily accessible to security agencies – but the oversight of such a system was never defined.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt; Similarly, the Centralized Monitoring System was conceptualized to automate and internalize the process of intercepting communications by allowing security agencies to intercept communications directly and bypass the service provider.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; Despite amending the Telecom Licenses to provide for the technical components of this project, oversight of the project or of security agencies directly accessing information has yet to be defined.&lt;a href="#fn32" name="fr32"&gt;[32] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Examples of oversight mechanisms for State Surveillance: US, UK, Canada and United States&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;United States&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the United States the oversight 'ecosystem' for state surveillance is made up of:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Foreign Intelligence Surveillance Court&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The U.S Foreign Intelligence Surveillance Court (FISA) is the predominant oversight mechanism for state surveillance and oversees and authorizes the actions of the Federal Bureau of Investigation and the National Security Agency.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; The court was established by the enactment of the Foreign Intelligence Surveillance Act 1978 and is governed by Rules of Procedure, the current Rules being formulated in 2010.&lt;a href="#fn34" name="fr34"&gt;[34] &lt;/a&gt;The Court is empowered to ensure compliance with the orders that it issues and the government is obligated to inform the Court if orders are breached.&lt;a href="#fn35" name="fr35"&gt;[35] &lt;/a&gt;FISA allows for individuals who receive an order from the Court to challenge the same,&lt;a href="#fn36" name="fr36"&gt;[36] &lt;/a&gt;and public filings are available on the Court's website.&lt;a href="#fn37" name="fr37"&gt;[37] &lt;/a&gt;Additionally, organizations, including the American Civil Liberties Union&lt;a href="#fn38" name="fr38"&gt;[38] &lt;/a&gt;and the Electronic Frontier Foundation, have filed motions with the Court for release of records. &lt;a href="#fn39" name="fr39"&gt;[39] &lt;/a&gt;Similarly, Google has approached the Court for the ability to publish aggregate information regarding FISA orders that the company recieves.&lt;a href="#fn40" name="fr40"&gt;[40] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Government Accountability Office &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The U.S Government Accountability Office (GAO) is an independent office that works for Congress and conducts audits, investigates, provides recommendations, and issues legal decisions and opinions with regard to federal government spending of taxpayer's money by the government and associated agencies including the Defence Department, the FBI, and Homeland Security.&lt;a href="#fn41" name="fr41"&gt;[41] &lt;/a&gt;The head of the GAO is the Comptroller General of the United States and is appointed by the President. The GAO will initiate an investigation if requested by congressional committees or subcommittees or if required under public law or committee reports. The GOA has reviewed topics relating to Homeland Security, Information Security, Justice and Law Enforcement, National Defense, and Telecommunications.&lt;a href="#fn42" name="fr42"&gt;[42] &lt;/a&gt;For example, in June 2015 the GOA completed an investigation and report on 'Foreign Terrorist Organization Process and U.S Agency Enforcement Actions” &lt;a href="#fn43" name="fr43"&gt;[43] &lt;/a&gt;and an investigation on “Cyber Security: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies”.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The U.S. Senate Select Committee on Intelligence is a standing committee of the U.S Senate with the mandate to review intelligence activities and programs and ensure that these are inline with the Constitution and other relevant laws. The Committee is also responsible for submitting to Senate appropriate proposals for legislation, and for reporting to Senate on intelligence activities and programs.&lt;a href="#fn45" name="fr45"&gt;[45] &lt;/a&gt;The House Permanent Select Committee holds similar jurisdiction. The House Permanent Select Committee is committed to secrecy and cannot disclose classified information excepted authorized to do so. Such an obligation does not exist for the Senate Select Committee on Intelligence and the committee can disclose classified information publicly on its own.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and Civil Liberties Oversight Board&lt;/b&gt; (PCLOB)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy and Civil Liberties Oversight Board was established by the Implementing Recommendations of the 9/11 Commission Act of 2007 and is located within the executive branch.&lt;a href="#fn47" name="fr47"&gt;[47] &lt;/a&gt;The objective of the PCLOB is to ensure that the Federal Government's actions to combat terrorism are balanced against privacy and civil liberties. Towards this, the Board has the mandate to review and analyse ant-terrorism measures the executive takes and ensure that such actions are balanced with privacy and civil liberties, and to ensure that privacy and civil liberties are liberties are adequately considered in the development and implementation of anti-terrorism laws, regulations and policies.&lt;a href="#fn48" name="fr48"&gt;[48] &lt;/a&gt;The Board is responsible for developing principles to guide why, whether, when, and how the United States conducts surveillance for authorized purposes. Additionally, officers of eight federal agencies must submit reports to the PCLOB regarding the reviews that they have undertaken, the number and content of the complaints, and a summary of how each complaint was handled. In order to fulfill its mandate, the Board is authorized to access all relevant records, reports, audits, reviews, documents, papers, recommendations, and classified information. The Board may also interview and take statements from necessary personnel. The Board may request the Attorney General to subpoena on the Board's behalf individuals outside of the executive branch.&lt;a href="#fn49" name="fr49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To the extent possible, the Reports of the Board are made public. Examples of recommendations that the Board has made in the 2015 Report include: End the NSA”s bulk telephone records program, add additional privacy safeguards to the bulk telephone records program, enable the FISC to hear independent views on novel and significant matters, expand opportunities for appellate review of FISC decisions, take advantage of existing opportunities for outside legal and technical input in FISC matters, publicly release new and past FISC and DISCR decisions that involve novel legal, technical, or compliance questions, publicly report on the operation of the FISC Special Advocate Program, Permit Companies to Disclose Information about their receipt of FISA production orders and disclose more detailed statistics on surveillance, inform the PCLOB of FISA activities and provide relevant congressional reports and FISC decisions, begin to develop principles for transparency, disclose the scope of surveillance authorities affecting US Citizens.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Wiretap Report &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Wiretap Report is an annual compilation of information provided by federal and state officials regarding applications for interception orders of wire, oral, or electronic communications, data address offenses under investigation, types and locations of interception devices, and costs and duration of authorized intercepts.&lt;a href="#fn51" name="fr51"&gt;[51] &lt;/a&gt;When submitting information for the report a judge will include the name and jurisdiction of the prosecuting official who applied for the order, the criminal offense under investigation, the type of intercept device used, the physical location of the device, and the duration of the intercept. Prosecutors provide information related to the cost of the intercept, the number of days the intercept device was in operation, the number of persons whose communications were intercepted, the number of intercepts, and the number of incriminating intercepts recorded. Results of the interception orders such as arrest, trials, convictions, and the number of motions to suppress evidence are also noted in the prosecutor reports. The Report is submitted to Congress and is legally required under Title III of the Omnibus Crime Control and Safe Streets Act of 1968. The report is issued by the Administrative Office of the United States Courts.&lt;a href="#fn52" name="fr52"&gt;[52] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;United Kingdom&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Intelligence and Security Committee (ISC) of Parliament &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intelligence Security Committee was established by the Intelligence Services Act 1994. Members are appointed by the Prime Minster and the Committee reports directly to the same. Additionally, the Committee submits annual reports to Parliament. Towards this, the Committee can take evidence from cabinet ministers, senior officials, and from the public.&lt;a href="#fn53" name="fr53"&gt;[53] &lt;/a&gt;The most recent report of the Committee is the 2015 “Report on Privacy and Security”.&lt;a href="#fn54" name="fr54"&gt;[54] &lt;/a&gt;Members of the Committee are subject to the Official Secrets Act 1989 and have access to classified material when carrying out investigations.&lt;a href="#fn55" name="fr55"&gt;[55]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Joint Intelligence Committee (JIC)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This Joint Intelligence Committee is located in the Cabinet office and is broadly responsible for overseeing national intelligence organizations and providing advice to the Cabinet on issues related to security, defense, and foreign affairs. The JIC is overseen by the Intelligence and Security Committee.&lt;a href="#fn56" name="fr56"&gt;[56]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Interception of Communications Commissioner &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Interception of Communications Commissioner is appointed by the Prime Minster under the Regulation of Investigatory Powers Act 2000 for the purpose of reviewing surveillance conducted by intelligence agencies, police forces, and other public authorities.  Specifically, the Commissioner inspects the interception of communications, the acquisition and disclosure of communications data, the interception of communications in prisons, and the unintentional electronic interception.&lt;a href="#fn57" name="fr57"&gt;[57] &lt;/a&gt;The Commissioner submits an annual report to the Prime Minister. The Reports of the Commissioner are publicly available.&lt;a href="#fn58" name="fr58"&gt;[58]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Intelligence Services Commissioner &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intelligence Services Commissioner is an independent body appointed by the Prime Minister that is legally empowered through the Regulation of Investigatory Powers Act (RIPA) 2000. The Commissioner provides independent oversight on the use of surveillance by UK intelligence services.&lt;a href="#fn59" name="fr59"&gt;[59] &lt;/a&gt;Specifically, the Commissioner is responsible for reviewing authorized interception orders and the actions and performance of the intelligence services.&lt;a href="#fn60" name="fr60"&gt;[60]&lt;/a&gt; The Commissioner is also responsible for providing assistance to the Investigatory Powers Tribunal, submitting annual reports to the Prime Minister on the discharge of its functions, and advising the Home Office on the need of extending the Terrorism Prevention and Investigation Measures regime.&lt;a href="#fn61" name="fr61"&gt;[61] &lt;/a&gt;Towards these the Commissioner conducts in-depth audits on the orders for interception to ensure that the surveillance is within the scope of the law, that the surveillance was necessary for a legally established reason, that the surveillance was proportionate, that the information accessed was justified by the privacy invaded, and that the surveillance authorized by the appropriate official. The Commissioner also conducts 'site visits' to ensure that orders are being implemented as per the law.&lt;a href="#fn62" name="fr62"&gt;[62] &lt;/a&gt;As a note, the Intelligence Services Commissioner does not undertake any subject that is related to the Interception of Communications Commissioner. The Commissioner has access to any information that he feels is necessary to carry out his investigations. The Reports of the Intelligence Service Commissioner are publicly available.&lt;a href="#fn63" name="fr63"&gt;[63] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Investigatory Powers Tribunal &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Investigatory Powers Tribunal is a court which investigates complaints of unlawful surveillance by public authorities or intelligence/law enforcement agencies.&lt;a href="#fn64" name="fr64"&gt;[64]&lt;/a&gt; The Tribunal was established under the Regulation of Investigatory Powers Act 2000 and has a range of oversight functions to ensure that public authorities act and agencies are in compliance with the Human Rights Act 1998.&lt;a href="#fn65" name="fr65"&gt;[65]&lt;/a&gt; The Tribunal specifically is an avenue of redress for anyone who believes that they have been a victim of unlawful surveillance under RIPA or wider human rights infringements under the Human Rights Act 1998.  The Tribunal can provide seven possible outcomes for any application including 'found in favor of complainant, no determination in favour of complainant, frivolous or vexatious, out of time, out of jurisdiction, withdrawn, or no valid complaint.&lt;a href="#fn66" name="fr66"&gt;[66] &lt;/a&gt;The Tribunal has the authority to receive and consider evidence in any form, even if inadmissible in an ordinary court.&lt;a href="#fn67" name="fr67"&gt;[67]&lt;/a&gt; Where possible, cases are available on the Tribunal's website.  Decisions by the Tribunal cannot be appealed, but can be challenged in the European Court of Human Rights.&lt;a href="#fn68" name="fr68"&gt;[68] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Canada&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In Canada the oversight 'ecosystem' for state surveillance includes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security Intelligence Review Committee &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Security Intelligence Review Committee is an independent body that is accountable to the Parliament of Canada and reports on the Canadian Security Intelligence Service.&lt;a href="#fn69" name="fr69"&gt;[69]&lt;/a&gt; Members of the Security Intelligence Review Committee are appointed by the Prime Minister of Canada. The committee conducts reviews on a pro-active basis and investigates complaints. Committee members have access to classified information to conduct reviews. The Committee submits an annual report to Parliament and an edited version is publicly available. The 2014 Report was titled “Lifting the Shroud of Secrecy”&lt;a href="#fn70" name="fr70"&gt;[70] &lt;/a&gt;and includes reviews of the CSIS's activities, reports on complaints and subsequent investigations, and provides recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Office of the Communications Security Establishment Commissioner &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Communications Security Commissioner conducts independent reviews of Communications Security Establishment (CSE) activities to evaluate if they are within the scope of Canadian law.&lt;a href="#fn71" name="fr71"&gt;[71] &lt;/a&gt;The Commissioner submits a report to Parliament on an annual basis and has a number of powers including the power to subpoena documents and personnel.&lt;a href="#fn72" name="fr72"&gt;[72]&lt;/a&gt; If the Commissioner believes that the CSE has not complied with the law – it must report this to the Attorney General of Canada and to the Minister of National Defence. The Commissioner may also receive information from persons bound to secrecy if they deem it to be in the public interest to disclose such information.&lt;a href="#fn73" name="fr73"&gt;[73] &lt;/a&gt;The Commissioner is also responsible for verifying that the CSE does not surveil Canadians and for promoting measures to protect the privacy of Canadians.&lt;a href="#fn74" name="fr74"&gt;[74] &lt;/a&gt;When conducting a review, the Commissioner has the ability to examine records, receive briefings, interview relevant personnel, assess the veracity of information, listen to intercepted voice recordings, observe CSE operators and analysts to verify their work, examine CSI electronic tools, systems and databases to ensure compliance with the law.&lt;a href="#fn75" name="fr75"&gt;[75] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Office of the Privacy Commissioner&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Office of the Privacy Commissioner of Canada (OPC) oversees the implementation of and compliance with the Privacy Act and the Personal information and Electronic Documents Act.&lt;a href="#fn76" name="fr76"&gt;[76] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The OPC is an independent body that has the authority to investigate complaints regarding the handling of personal information by government and private companies, but can only comment on the activities of security and intelligence agencies. For example, in 2014 the OPC issued the report “Checks and Controls: Reinforcing Privacy Protection and Oversight for the Canadian Intelligence Community in an Era of Cyber Surveillance”&lt;a href="#fn77" name="fr77"&gt;[77]&lt;/a&gt; The OPC can also provide testimony to Parliament and other government bodies.&lt;a href="#fn78" name="fr78"&gt;[78] &lt;/a&gt;For example, the OPC has made appearances before the Senate Standing Committee of National Security and Defense on Bill C-51.&lt;a href="#fn79" name="fr79"&gt;[79]&lt;/a&gt; The OPC cannot conduct joint audits or investigations with other bodies.&lt;a href="#fn80" name="fr80"&gt;[80]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Annual Interception Reports&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Criminal Code of Canada, regional governments must issue annual interception reports. The reports must include number of individuals affected by interceptions, average duration of the interception, type of crimes investigated, numbers of cases brought to court, and number of individuals notified that interception had taken place.&lt;a href="#fn81" name="fr81"&gt;[81] &lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The presence of multiple and robust oversight mechanisms for state surveillance does not necessarily correlate to effective oversight. The oversight mechanisms in the UK, Canada, and the U.S have been criticised. For example, Canada . For example, the Canadian regime has been characterized as becoming weaker it has removed one of its key over sight mechanisms – the Inspector General of the Canadian Security Intelligence Service which was responsible for certifying that the Service was in compliance with law.&lt;a href="#fn82" name="fr82"&gt;[82] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other weaknesses in the Canadian regime that have been highlighted include the fact that different oversight bodies do not have the authority to share information with each other, and transparency reports do not include many new forms of surveillance.&lt;a href="#fn83" name="fr83"&gt;[83]&lt;/a&gt; Oversight mechanisms in the U.S on the other hand have been criticized as being opaque&lt;a href="#fn84" name="fr84"&gt;[84] &lt;/a&gt;or as lacking the needed political support to be effective.&lt;a href="#fn85" name="fr85"&gt;[85]&lt;/a&gt; The UK oversight mechanism has been criticized for not having judicial authorization of surveillance requests, have opaque laws, and for not having a strong right of redress for affected individuals.&lt;a href="#fn86" name="fr86"&gt;[86] &lt;/a&gt;These critiques demonstrate that there are a number of factors that must come together for an oversight mechanism to be effective. Public transparency and accountability to decision making bodies such as Parliament or Congress can ensure effectiveness of oversight mechanisms, and are steps towards providing the public with means to debate in an informed manner issues related to state surveillance and allows different bodies within the government the ability to hold the state accountable for its actions.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;.[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. For example, “Public Oversight” is one of the thirteen Necessary and  Proportionate principles on state communications surveillance developed  by civil society and academia globally, that should be incorporated by  states into communication surveillance regimes. The principles can be  accessed here: https://en.necessaryandproportionate.org/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Hans Born and Ian Leigh, “Making Intelligence Accountable. Legal Standards and Best Practice for Oversight of Intelligence Agencies.” Pg. 13. 2005. Available at: http://www.prsindia.org/theprsblog/wp-content/uploads/2010/07/making-intelligence.pdf. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. For example, this point was made in the context of the UK. For more  information see: Nick Clegg, 'Edward Snowden's revelations made it  clear: security oversight must be fit for the internet age,”. The  Guardian. March 3rd 2014. Available at: &lt;a href="http://www.theguardian.com/commentisfree/2014/mar/03/nick-clegg-snowden-security-oversight-internet-age"&gt;http://www.theguardian.com/commentisfree/2014/mar/03/nick-clegg-snowden-security-oversight-internet-age&lt;/a&gt;. Accessed: July 27, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. International Principles on the Application of Human Rights to  Communications Surveillance. Available at:  https://en.necessaryandproportionate.org/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Sub Rules (16) and (17) of Rule 419A, Indian Telegraph Rules, 1951.  Available at:http://www.dot.gov.in/sites/default/files/march2007.pdf  Note: This review committee is responsible for overseeing interception  orders issued under the Indian Telegraph Act and the Information  Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Information Technology Procedure and Safeguards for Interception,  Monitoring, and Decryption of Information Rules 2009. Definition q.  Available at: &lt;a href="http://dispur.nic.in/itact/it-procedure-interception-monitoring-decryption-rules-2009.pdf"&gt;http://dispur.nic.in/itact/it-procedure-interception-monitoring-decryption-rules-2009.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Information Technology (Procedure and safeguard for Monitoring and  Collecting Traffic Data or Information Rules, 2009). Definition (n).  Available at: &lt;a href="http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. This authority is responsible for authorizing interception requests  issued under the Indian Telegraph Act and the Information Technology  Act. Section 2, Indian Telegraph Act 1885 and Section 4, Information  Technology Procedure and Safeguards for Interception, Monitoring, and  Decryption of Information) Rules, 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. This authority is responsible for authorizing interception requests  issued under the Indian Telegraph Act and the Information Technology  Act. Section 2, Indian Telegraph Act 1885 and Section 4, Information  Technology Procedure and Safeguards for Interception, Monitoring, and  Decryption of Information) Rules, 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;].  Definition (d) and section 3 of the Information Technology (Procedure  and safeguard for Monitoring and Collecting Traffic Data or Information  Rules, 2009). Available at: &lt;a href="http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Rule 1, of the 419A Rules, Indian Telegraph Act 1885. Available  at:http://www.dot.gov.in/sites/default/files/march2007.pdf This  authority is responsible for authorizing interception requests issued  under the Indian Telegraph Act and the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Section 92, CrPc. Available at: http://www.icf.indianrailways.gov.in/uploads/files/CrPC.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Press Information Bureau GOI. Reconstitution of Cabinet Committees. June 19th 2014. Available at: &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=105747"&gt;http://pib.nic.in/newsite/PrintRelease.aspx?relid=105747&lt;/a&gt;. Accessed August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Press Information Bureau, Government of India. Home minister proposes  radical restructuring of security architecture. Available at: &lt;a href="http://www.pib.nic.in/newsite/erelease.aspx?relid=56395"&gt;http://www.pib.nic.in/newsite/erelease.aspx?relid=56395&lt;/a&gt;. Accessed August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Section 24 read with Schedule II of the Right to Information Act 2005. Available at: http://rti.gov.in/rti-act.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Section 8 of the Right to Information Act 2005. Available at: http://rti.gov.in/rti-act.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Abhimanyu Ghosh. “Open Government and the Right to Information”. Legal Services India. Available at: &lt;a href="http://www.legalservicesindia.com/articles/og.htm"&gt;http://www.legalservicesindia.com/articles/og.htm&lt;/a&gt;. Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Public Record Rules 1997. Section 2. Definition c. Available at: &lt;a href="http://nationalarchives.nic.in/writereaddata/html_en_files/html/public_records97.html"&gt;http://nationalarchives.nic.in/writereaddata/html_en_files/html/public_records97.html&lt;/a&gt;. Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Times of India. Classified information is reviewed after 25-30 years. April 13th 2015. Available at: &lt;a href="http://timesofindia.indiatimes.com/india/Classified-information-is-reviewed-after-25-30-years/articleshow/46901878.cms"&gt;http://timesofindia.indiatimes.com/india/Classified-information-is-reviewed-after-25-30-years/articleshow/46901878.cms&lt;/a&gt;. Accessed: August 8, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Government of India. Ministry of Home Affairs. Lok Sabha Starred Question No 557. Available at: &lt;a href="http://mha1.nic.in/par2013/par2015-pdfs/ls-050515/557.pdf"&gt;http://mha1.nic.in/par2013/par2015-pdfs/ls-050515/557.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. The Kargil Committee report Executive Summanry. Available at: http://fas.org/news/india/2000/25indi1.htm. Accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. PIB Releases. Group of Ministers Report on Reforming the National Security System”. Available at: &lt;a href="http://pib.nic.in/archieve/lreleng/lyr2001/rmay2001/23052001/r2305200110.html"&gt;http://pib.nic.in/archieve/lreleng/lyr2001/rmay2001/23052001/r2305200110.html&lt;/a&gt;. Last accessed: August 6, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. The Observer Research Foundation. “Manish Tewari introduces Bill on  Intelligence Agencies Reform. August 5th 2011. Available at: &lt;a href="http://www.observerindia.com/cms/sites/orfonline/modules/report/ReportDetail.html?cmaid=25156&amp;amp;mmacmaid=20327"&gt;http://www.observerindia.com/cms/sites/orfonline/modules/report/ReportDetail.html?cmaid=25156&amp;amp;mmacmaid=20327&lt;/a&gt;. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. The Intelligence Services (Powers and Regulation) Bill, 2011. Available at: &lt;a href="http://www.observerindia.com/cms/export/orfonline/documents/Int_Bill.pdf"&gt;http://www.observerindia.com/cms/export/orfonline/documents/Int_Bill.pdf&lt;/a&gt;. Accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. The Privacy Bill 2011. Available at: https://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;].  The Report of Group of Experts on Privacy. Available at: http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. Institute for Defence Studies and Analyses. “A Case for Intelligence Reforms in India”. Available at: &lt;a href="http://www.idsa.in/book/AcaseforIntelligenceReformsinIndia.html"&gt;http://www.idsa.in/book/AcaseforIntelligenceReformsinIndia.html&lt;/a&gt;. Accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. India Calls for Transparency in internet Surveillance. NDTV. July 3rd 2015. Available at: &lt;a href="http://gadgets.ndtv.com/internet/news/india-calls-for-transparency-in-internet-surveillance-710945"&gt;http://gadgets.ndtv.com/internet/news/india-calls-for-transparency-in-internet-surveillance-710945&lt;/a&gt;. Accessed: July 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Lovisha Aggarwal. “Analysis of News Items and Cases on Surveillance and  Digital Evidence in India”. Available at:  http://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Rule 25 (4) of the Information Technology (Procedures and Safeguards for  the Interception, Monitoring, and Decryption of Information Rules)  2011. Available at:  http://dispur.nic.in/itact/it-procedure-interception-monitoring-decryption-rules-2009.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Ministry of Home Affairs, GOI. National Intelligence Grid. Available at: &lt;a href="http://www.davp.nic.in/WriteReadData/ADS/eng_19138_1_1314b.pdf"&gt;http://www.davp.nic.in/WriteReadData/ADS/eng_19138_1_1314b.pdf&lt;/a&gt;. Last accessed: August 6, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. Press Information Bureau, Government of India. Centralised System to Monitor Communications Rajya Sabha. Available at: &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=54679"&gt;http://pib.nic.in/newsite/erelease.aspx?relid=54679&lt;/a&gt;. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. Department of Telecommunications. Amendemnt to the UAS License agreement  regarding Central Monitoring System. June 2013. Available at:  http://cis-india.org/internet-governance/blog/uas-license-agreement-amendment&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court. July 29th 2013. Available at: &lt;a href="http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf"&gt;http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf&lt;/a&gt;. Last accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court. Rules of Procedure 2010. Available at: http://www.fisc.uscourts.gov/sites/default/files/FISC%20Rules%20of%20Procedure.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. United States Foreign Intelligence Court. Honorable Patrick J. Leahy. 2013. Available at: http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court. July 29th 2013. Available at: &lt;a href="http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf"&gt;http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf&lt;/a&gt;. Last accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Public Filings – U.S Foreign Intelligence Surveillance Court. Available at: http://www.fisc.uscourts.gov/public-filings&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. ACLU. FISC Public Access Motion – ACLU Motion for Release of Court Records Interpreting Section 215 of the Patriot Act. Available at: https://www.aclu.org/legal-document/fisc-public-access-motion-aclu-motion-release-court-records-interpreting-section-215&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court Washington DC. In Re motion for consent to disclosure of court records or, in the alternative a determination of the effect of the Court's rules on statutory access rights. Available at: https://www.eff.org/files/filenode/misc-13-01-opinion-order.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Google  Official Blog. Shedding some light on Foreign Intelligence Surveillance Act (FISA) requests. February 3rd 2014. Available at: http://googleblog.blogspot.in/2014/02/shedding-some-light-on-foreign.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. U.S Government Accountability Office. Available at: http://www.gao.gov/key_issues/overview#t=1. Last accessed: August 8, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Report to Congressional Requesters. Combating Terrorism: Foreign Terrorist Organization Designation Proces and U.S Agency Enforcement Actions. Available at: http://www.gao.gov/assets/680/671028.pdf. Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. United States Government Accountability Office. Cybersecurity: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies. Available: http://www.gao.gov/assets/680/670935.pdf. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Committee Legislation. Available at: http://ballotpedia.org/United_States_Senate_Committee_on_Intelligence_(Select)#Committee_legislation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Congressional Research Service. Congressional Oversight of Intelligence: Current Structure and Alternatives. May 14th 2012. Available at: https://fas.org/sgp/crs/intel/RL32525.pdf. Last Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn47"&gt;47&lt;/a&gt;]. The Privacy and Civil Liberties Oversight Board: About the Board. Available at: https://www.pclob.gov/aboutus.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. The Privacy and Civil Liberties Oversight Board: About the Board. Available at: https://www.pclob.gov/aboutus.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Congressional Research Service. Congressional Oversight of Intelligence: Current Structure and Alternatives. May 14th 2012. Available at: https://fas.org/sgp/crs/intel/RL32525.pdf. Last Accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. United States Courts. Wiretap Reports. Available at: http://www.uscourts.gov/statistics-reports/analysisreports/wiretap-reports&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr51" name="fn51"&gt;51&lt;/a&gt;]. United States Courts. Wiretap Reports. Available at: http://www.uscourts.gov/statisticsreports/&lt;br /&gt;analysis-reports/wiretap-reports/faqs-wiretap-reports#faq-What-information-does-the-AO-receive-from-prosecutors?. Last Accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr52" name="fn52"&gt;52&lt;/a&gt;]. Intelligence and Security Committee of Parliament. Transcripts and Public Evidence. Available at: http://isc.independent.gov.uk/public-evidence. Last accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr53" name="fn53"&gt;53&lt;/a&gt;]. Intelligence and Security Committee of Parliament. Special Reports. Available at http://isc.independent.gov.uk/committee-reports/special-reports. Last accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr54" name="fn54"&gt;54&lt;/a&gt;]. Hugh Segal. The U.K. has legislative oversight of surveillance. Why not Canada. The Globe and Mail. June 12th 2013. Available at: http://www.theglobeandmail.com/globe-debate/uk-haslegislative-oversight-of-surveillance-why-not-canada/article12489071/. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr55" name="fn55"&gt;55&lt;/a&gt;]. The Joint Intelligence Committee home page. For more information see: https://www.gov.uk/government/organisations/national-security/groups/joint-intelligence-committee&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr56" name="fn56"&gt;56&lt;/a&gt;]. Interception of Communications Commissioner's Office. RIPA. Available at: http://www.iocco-uk.info/sections.asp?sectionID=2&amp;amp;type=top. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr57" name="fn57"&gt;57&lt;/a&gt;]. Interception of Communications Commissioner's Office. Reports. Available at: http://www.iocco-uk.info/sections.asp?sectionID=1&amp;amp;type=top. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr58" name="fn58"&gt;58&lt;/a&gt;]. The Intelligence Services Commissioner's Office Homepage. For more information see: http://intelligencecommissioner.com/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr59" name="fn59"&gt;59&lt;/a&gt;]. The Intelligence Services Commissioner's Office – The Commissioner's Statutory Functions. Available at: http://intelligencecommissioner.com/content.asp?id=4&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr60" name="fn60"&gt;60&lt;/a&gt;]. The Intelligence Services Commissioner's Office – The Commissioner's Statutory Functions. Available at: http://intelligencecommissioner.com/content.asp?id=4&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr61" name="fn61"&gt;61&lt;/a&gt;]. The Intelligence Services Commissioner's Office. What we do. Available at: http://intelligencecommissioner.com/content.asp?id=5. Last Accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr62" name="fn62"&gt;62&lt;/a&gt;]. The Intelligence Services Commissioner's Office. Intelligence Services Commissioner's Annual Reports. Available at: http://intelligencecommissioner.com/content.asp?id=19. Last&lt;br /&gt;accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr63" name="fn63"&gt;63&lt;/a&gt;]. The Investigatory Powers Tribunal Homepage. Available at: http://www.ipt-uk.com/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr64" name="fn64"&gt;64&lt;/a&gt;]. The Investigatory Powers Tribunal – Functions – Key role. Available at: http://www.ipt-uk.com/section.aspx?pageid=1&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr65" name="fn65"&gt;65&lt;/a&gt;]. Investigatory Powers Tribunal. Functions – Decisions available to the Tribunal. Available at: http://www.ipt-uk.com/section.aspx?pageid=4. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr66" name="fn66"&gt;66&lt;/a&gt;]. Investigator Powers Tribunal. Operation - Available at: http://www.ipt-uk.com/section.aspx?pageid=7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr67" name="fn67"&gt;67&lt;/a&gt;]. Investigatory Powers Tribunal. Operation- Differences to the ordinary court system. Available at: http://www.ipt-uk.com/section.aspx?pageid=7. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr68" name="fn68"&gt;68&lt;/a&gt;]. Security Intelligence Review Committee – Homepage. Available at: http://www.sirc-csars.gc.ca/index-eng.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr69" name="fn69"&gt;69&lt;/a&gt;]. SIRC Annual Report 2013-2014: Lifting the Shroud of Secrecy. Available at: http://www.sirccsars. gc.ca/anrran/2013-2014/index-eng.html. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr70" name="fn70"&gt;70&lt;/a&gt;]. The Office of the Communications Security Establishment – Homepage. Available at: http://www.ocsecbccst.gc.ca/index_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr71" name="fn71"&gt;71&lt;/a&gt;]. The Office of the Communications Security Establishment – Homepage. Available at: http://www.ocsecbccst.gc.ca/index_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr72" name="fn72"&gt;72&lt;/a&gt;]. The Office of the Communications Security Establishment – Mandate. Available at: http://www.ocsecbccst.gc.ca/mandate/index_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr73" name="fn73"&gt;73&lt;/a&gt;]. The Office of the Communications Security Establishment – Functions. Available at: http://www.ocsecbccst.gc.ca/functions/review_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr74" name="fn74"&gt;74&lt;/a&gt;]. The Office of the Communications Security Establishment – Functions. Available at: http://www.ocsecbccst.gc.ca/functions/review_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr75" name="fn75"&gt;75&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Homepage. Available at: https://www.priv.gc.ca/index_e.ASP&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr76" name="fn76"&gt;76&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Reports and Publications. Special Report to Parliament “Checks and Controls: Reinforcing Privacy Protection and Oversight for the Canadian Intelligence Community in an Era of Cyber-Surveillance. January 28th 2014. Available at: https://www.priv.gc.ca/information/srrs/201314/sr_cic_e.asp&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr77" name="fn77"&gt;77&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Available at: https://www.priv.gc.ca/index_e.asp. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr78" name="fn78"&gt;78&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Appearance before the Senate Standing Commitee National Security and Defence on Bill C-51, the Anti-Terrorism Act, 2015. Available at: https://www.priv.gc.ca/parl/2015/parl_20150423_e.asp. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr79" name="fn79"&gt;79&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Special Report to Parliament. January 8th 2014. Available at: https://www.priv.gc.ca/information/sr-rs/201314/sr_cic_e.asp. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr80" name="fn80"&gt;80&lt;/a&gt;]. Telecom Transparency Project. The Governance of Telecommunications Surveillance: How Opaque and Unaccountable Practices and Policies Threaten Canadians. Available at: http://www.telecomtransparency.org/wp-content/uploads/2015/05/Governance-of-Telecommunications-Surveillance-Final.pdf. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr81" name="fn81"&gt;81&lt;/a&gt;]. Patrick Baud. The Elimination of the Inspector General of the Canadian Security Intelligence Serive. May 2013. Ryerson University. Available at; http://www.academia.edu/4731993/The_Elimination_of_the_Inspector_General_of_the_Canadian_Security_Intelligence_Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr82" name="fn82"&gt;82&lt;/a&gt;]. Telecom Transparency Project. The Governance of Telecommunications Surveillance: How Opaque and Unaccountable Practices and Policies Threaten Canadians. Available at: http://www.telecomtransparency.org/wp-content/uploads/2015/05/Governance-of-Telecommunications-Surveillance-Final.pdf. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr83" name="fn83"&gt;83&lt;/a&gt;]. Glenn Greenwald. Fisa court oversight: a look inside a secret and empty process. The Guardian. June 19th 2013. Available at: http://www.theguardian.com/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy, Nadia Kayyali. Privacy and Civil Liberties Oversight Board to NSA: Why is Bulk Collection of Telelphone Records Still Happening? February 2105. Available at :https://www.eff.org/deeplinks/2015/02/privacy-and-civil-liberties-oversight-board-nsa-whybulk-collection-telephone. Last accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr84" name="fn84"&gt;84&lt;/a&gt;]. Scott Shance. The Troubled Life of the Privacy and Civil Liberties Oversight Board. August 9th 2012. The Caucus. Available at: http://thecaucus.blogs.nytimes.com/2012/08/09/thetroubled-life-of-the-privacy-and-civil-liberties-oversight-board/?_r=0. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr85" name="fn85"&gt;85&lt;/a&gt;]. The Open Rights Group. Don't Spy on Us. Reforming Surveillance in the UK. September 2014. Available at: https://www.openrightsgroup.org/assets/files/pdfs/reports/DSOU_Reforming_surveillance_old.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr86" name="fn86"&gt;86&lt;/a&gt;].&lt;/p&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance'&gt;https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-11-24T06:09:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things">
    <title>A Review of the Policy Debate around Big Data and Internet of Things</title>
    <link>https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things</link>
    <description>
        &lt;b&gt;This blog post seeks to review and understand how regulators and experts across jurisdictions are reacting to Big Data and Internet of Things (IoT) from a policy perspective.&lt;/b&gt;
        &lt;h3&gt;Defining and Connecting Big Data and Internet of Things&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Internet of Things is a term that refers to networked objects and systems that can connect to the internet and can transmit and receive data. Characteristics of IoT include the gathering of information through sensors, the automation of functions, and analysis of collected data.[1] For IoT devices, because of the &lt;i&gt;velocity&lt;/i&gt; at which data is generated, the &lt;i&gt;volume&lt;/i&gt; of data that is generated, and the &lt;i&gt;variety&lt;/i&gt; of data generated by different sources [2] - IoT devices can be understood as generating Big Data and/or relying on Big Data analytics. In this way IoT devices and Big Data are intrinsically interconnected.&lt;/p&gt;
&lt;h3&gt;General Implications of Big Data and Internet of Things&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Big Data paradigms are being adopted across countries, governments, and business sectors because of the potential insights and change that it can bring. From improving an organizations business model, facilitating urban development, allowing for targeted and individualized services, and enabling the prediction of certain events or actions - the application of Big Data has been recognized as having the potential to bring about dramatic and large scale changes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, experts have identified risks to the individual that can be associated with the generation, analysis, and use of Big Data. In May 2014, the White House of the United States completed a ninety day study of how big data will change everyday life. The Report highlights the potential of Big Data as well as identifying a number of concerns associated with Big Data. For example: the selling of personal data, identification or re-identification of individuals, profiling of individuals, creation and exacerbation of information asymmetries, unfair, discriminating, biased, and incorrect decisions based on Big Data analytics, and lack of or misinformed user consent.[3] Errors in Big Data analytics that experts have identified include statistical fallacies, human bias, translation errors, and data errors.[4] Experts have also discussed fundamental changes that Big Data can bring about. For example, Danah Boyd and Kate Crawford in the article &lt;i&gt;"Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon"&lt;/i&gt; propose that Big Data can change the definition of knowledge and shape the reality it measures.[5] Similarly, a BSC/Oxford Internet Institute conference report titled " &lt;i&gt;The Societal Impact of the Internet of Things&lt;/i&gt;" points out that often users of Big Data assume that information and conclusions based on digital data is reliable and in turn replace other forms of information with digital data.[6]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns that have been voiced by the Article 29 Working Party and others specifically about IoT devices have included insufficient security features built into devices such as encryption, the reliance of the devices on wireless communications, data loss from infection by malware or hacking, unauthorized access and use of personal data, function creep resulting from multiple IoT devices being used together, and unlawful surveillance.[7]&lt;/p&gt;
&lt;h3&gt;Regulation of Big Data and Internet of Things&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The regulation of Big Data and IoT is currently being debated in contexts such as the US and the EU. Academics, civil society, and regulators are exploring questions around the adequacy of present regulation and overseeing frameworks to address changes brought about Big Data, and if not - what forms of or changes in regulation are needed? For example, Kate Crawford and Jason Shultz in the article &lt;i&gt;"Big Data and Due Process: Towards a Framework to Redress Predictive Privacy Harms"&lt;/i&gt;stress the importance of bringing in 'data due process rights' i.e ensuring fairness in the analytics of Big Data and how personal information is used.[8] While Solon Barocas and Andrew Selbst in the article &lt;i&gt;"Big Data's Disparate Impact"&lt;/i&gt; explore if present anti-discrimination legislation and jurisprudence in the US is adequate to protect against discrimination arising from Big Data practices - specifically data mining.[9]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Impact of Big Data and IoT on Data Protection Principles&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the context of data protection, various government bodies, including the Article 29 Data Protection Working Party set up under the Directive 95/46/EC of the European Parliament, the Council of Europe, the European Commission, and the Federal Trade Commission, as well as experts and academics in the field, have called out at least ten different data protection principles and concepts that Big Data impacts:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Collection Limitation:&lt;/strong&gt; As a result of the generation of Big Data as enabled by networked devices, increased capabilities to analyze Big Data, and the prevalent use of networked systems - the principle of collection limitation is changing.[10]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Consent: &lt;/strong&gt;As a result of the use of data from a wide variety of sources and the re-use of data which is inherent in Big Data practices - notions of informed consent (initial and secondary) are changing.[11]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Minimization:&lt;/strong&gt; As a result of Big Data practices inherently utilizing all data possible - the principle of data minimization is changing/obsolete.[12]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Notice:&lt;/strong&gt; As a result of Big Data practices relying on vast amounts of data from numerous sources and the re-use of that data - the principle of notice is changing.[13]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Purpose Limitation:&lt;/strong&gt; As a result of Big Data practices re-using data for multiple purposes - the principle of purpose limitation is changing/obsolete.[14]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Necessity: &lt;/strong&gt;As a result of Big Data practices re-using data, the new use or re-analysis of data may not be pertinent to the purpose that was initially specified- thus the principle of necessity is changing.[15]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Access and Correction:&lt;/strong&gt; As a result of Big Data being generated (and sometimes published) at scale and in real time - the principle of user access and correction is changing.[16]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Opt In and Opt Out Choices: &lt;/strong&gt;Particularly in the context of smart cities and IoT which collect data on a real time basis, often without the knowledge of the individual, and for the provision of a service - it may not be easy or possible for individuals to opt in or out of the collection of their data.[17]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;PI:&lt;/strong&gt; As a result of Big Data analytics using and analyzing a wide variety of data, new or unexpected forms of personal data may be generated - thus challenging and evolving beyond traditional or specified definitions of personal information.[18]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Controller:&lt;/strong&gt; In the context of IoT, given the multitude of actors that can collect, use and process data generated by networked devices, the traditional understanding of what and who is a data controller is changing.[19]&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Possible Technical and Policy Solutions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a Report titled "&lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World&lt;/i&gt;" by the Federal Trade Commission in the United States it was noted that though IoT changes the application and understanding of certain privacy principles, it does not necessarily make them obsolete.[20] Indeed many possible solutions that have been suggested to address the challenges posed by IoT and Big Data are technical interventions at the device level rather than fundamental policy changes. For example it has been proposed that IoT devices can be programmed to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Automatically delete data after a specified period of time [21] (addressing concerns of data retention)&lt;/li&gt;
&lt;li&gt;Ensure that personal data is not fed into centralized databases on an automatic basis [22] (addressing concerns of transfer and sharing without consent, function creep, and data breach)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Offer consumers combined choices for consent rather than requiring a one time blanket consent at the time of initiating a service or taking fresh consent for every change that takes place while a consumer is using a service. [23] (addressing concerns of informed and meaningful consent)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Categorize and tag data with accepted uses and programme automated processes to flag when data is misused. [24] (addressing concerns of misuse of data)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Apply 'sticky policies' - policies that are attached to data and define appropriate uses of the data as it 'changes hands' [25] (addressing concerns of user control of data)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Allow for features to only be turned on with consent from the user [26] (addressing concerns of informed consent and collection without the consent or knowledge of the user)&lt;/li&gt;
&lt;li&gt;Automatically convert raw personal data to aggregated data [27] (addressing concerns of misuse of personal data and function creep)&lt;/li&gt;
&lt;li&gt;Offer users the option to delete or turn off sensors [28] (addressing concerns of user choice, control, and consent)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Such solutions place the designers and manufacturers of IoT devices in a critical role. Yet some, such as Kate Crawford and Jason Shultz are not entirely optimistic about the possibility of effective technological solutions - noting in the context of automated decision making that it is difficult to build in privacy protections as it is unclear when an algorithm will predict personal information about an individual.[29]&lt;/p&gt;
&lt;p&gt;Experts have also suggested that more emphasis should be placed on the principles and practices of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Transparency,&lt;/li&gt;
&lt;li&gt; Access and correction,&lt;/li&gt;
&lt;li&gt;Use/misuse&lt;/li&gt;
&lt;li&gt;Breach notification&lt;/li&gt;
&lt;li&gt;Remedy&lt;/li&gt;
&lt;li&gt;Ability to withdraw consent&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Others have recommended that certain privacy principles need to be adapted to the Big Data/IoT context. For example, the Article 29 Working Party has clarified that in the context of IoT, consent mechanisms need to include the types of data collected, the frequency of data collection, as well as conditions for data collection.[30] While the Federal Trade Commission has warned that adopting a pure "use" based model has its limitations as it requires a clear (and potentially changing) definition of what use is acceptable and what use is not acceptable, and it does not address concerns around the collection of sensitive personal information.[31] In addition to the above, the European Commission has stressed that the right of deletion, the right to be forgotten, and data portability also need to be foundations of IoT systems and devices.[32]&lt;/p&gt;
&lt;h3&gt;Possible Regulatory Frameworks&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To the question - are current regulatory frameworks adequate and is additional legislation needed, the FTC has recommended that though a specific IoT legislation may not be necessary, a horizontal privacy legislation would be useful as sectoral legislation does not always account for the use, sharing, and reuse of data across sectors. The FTC also highlighted the usefulness of privacy impact assessments and self regulatory steps to ensure privacy.[33] The European Commission on the other hand has concluded that to ensure enforcement of any standard or protocol - hard legal instruments are necessary.[34] As mentioned earlier, Kate Crawford and Jason Shultz have argued that privacy regulation needs to move away from principles on collection, specific use, disclosure, notice etc. and focus on elements of due process around the use of Big Data - as they say "procedural data due process". Such due process should be based on values instead of defined procedures and should include at the minimum notice, hearing before an independent arbitrator, and the right to review. Crawford and Shultz more broadly note that there are conceptual differences between privacy law and big data that pose as serious challenges i.e privacy law is based on causality while big data is a tool of correlation. This difference raises questions about how effective regulation that identifies certain types of information and then seeks to control the use, collection, and disclosure of such information will be in the context of Big Data – something that is varied and dynamic. According to Crawford and Shultz many regulatory frameworks will struggle with this difference – including the FTC's Fair Information Privacy Principles and the EU regulation including the EU's right to be forgotten.[35] The European Data Protection Supervisor on the other hand looks at Big Data as spanning the policy areas of data protection, competition, and consumer protection – particularly in the context of 'free' services. The Supervisor argues that these three areas need to come together to develop ways in which the challenges of Big Data can be addressed. For example, remedy could take the form of data portability – ensuring users the ability to move their data to other service providers empowering individuals and promoting competitive market structures or adopting a 'compare and forget' approach to data retention of customer data. The Supervisor also stresses the need to promote and treat privacy as a competitive advantage, thus placing importance on consumer choice, consent, and transparency.[36] The European Data Protection reform has been under discussion and it is predicted to be enacted by the end of 2015. The reform will apply across European States and all companies operating in Europe. The reform proposes heavier penalties for data breaches, seeks to provide users with more control of their data.[37] Additionally, Europe is considering bringing digital platforms under the Network and Information Security Directive – thus treating companies like Google and Facebook as well as cloud providers and service providers as a critical sector. Such a move would require companies to adopt stronger security practices and report breaches to authorities.[38]&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A review of the different opinions and reactions from experts and policy makers demonstrates the ways in which Big Data and IoT are changing traditional forms of protection that governments and societies have developed to protect personal data as it increases in value and importance. While some policy makers believe that big data needs strong legislative regulation and others believe that softer forms of regulation such as self or co-regulation are more appropriate, what is clear is that Big Data is either creating a regulatory dilemma– with policy makers searching for ways to control the unpredictable nature of big data through policy and technology through the merging of policy areas, the honing of existing policy mechanisms, or the broadening of existing policy mechanisms - while others are ignoring the change that Big Data brings with it and are forging ahead with its use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Answering the 'how do we regulate Big Data” question requires &lt;strong&gt;re-conceptualization of data ownership and realities&lt;/strong&gt;. Governments need to first recognize the criticality of their data and the data of their citizens/residents, as well as the contribution to a country's economy and security that this data plays. With the technologies available now, and in the pipeline, data can be used or misused in ways that will have vast repercussions for individuals, society, and a nation. All data, but especially data directly or indirectly related to citizens and residents of a country, needs to be looked upon as owned by the citizens and the nation. In this way, data should be seen as a part of &lt;strong&gt;critical&lt;/strong&gt; &lt;strong&gt;national infrastructure of a nation, &lt;/strong&gt;and accorded the security, protections, and legal backing thereof to &lt;strong&gt;prevent the misuse of the resource by the private or public sectors, local or foreign governments&lt;/strong&gt;. This could allow for local data warehousing and bring physical and access security of data warehouses on par with other critical national infrastructure. Recognizing data as a critical resource answers in part the concern that experts have raised – that Big Data practices make it impossible for data to be categorized as personal and thus afforded specified forms of protection due to the unpredictable nature of big data. Instead – all data is now recognized as critical.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to being able to generate personal data from anonymized or non-identifiable data, big data also challenges traditional divisions of public vs. private data. Indeed Big Data analytics can take many public data points and derive a private conclusion. The use of Big Data analytics on public data also raises questions of consent. For example, though a license plate is public information – should a company be allowed to harvest license plate numbers, combine this with location, and sell this information to different interested actors? This is currently happening in the United States.[39] Lastly, Big Data raises questions of ownership. A solution to the uncertainty of public vs. private data and associated consent and ownership could be the creation a &lt;strong&gt;National Data Archive&lt;/strong&gt; with such data. The archive could function with representation from the government, public and private companies, and civil society on the board. In such a framework, for example, companies like Airtel would provide mobile services, but the CDRs and customer data collected by the company would belong to the National Data Archive and be available to Airtel and all other companies within a certain scope for use. This 'open data' approach could enable innovation through the use of data but within the ambit of national security and concerns of citizens – a framework that could instill trust in consumers and citizens. Only when backed with strong security requirements, enforcement mechanisms and a proactive, responsive and responsible framework can governments begin to think about ways in which Big Data can be harnessed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[1] BCS - The Chartered Institute for IT. (2013). The Societal Impact of the Internet of Things. Retrieved May 17, 2015, from http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;[2] Sicular, S. (2013, March 27). Gartner’s Big Data Definition Consists of Three Parts, Not to Be Confused with Three “V”s. Retrieved May 20, 2015, from http://www.forbes.com/sites/gartnergroup/2013/03/27/gartners-big-data-definition-consists-of-three-parts-not-to-be-confused-with-three-vs/&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[3] Executive Office of the President. “Big Data: Seizing Opportunities, Preserving Values”. May 2014. Available at: &lt;a href="https://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_5.1.14_final_print.pdf"&gt;https://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_5.1.14_final_print.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[4] Moses, B., Lyria, &amp;amp; Chan, J. (2014). Using Big Data for Legal and Law Enforcement Decisions: Testing the New Tools (SSRN Scholarly Paper No. ID 2513564). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2513564&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[5] Danah Boyd, Kate Crawford. &lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;CRITICAL QUESTIONS FOR BIG DATA&lt;/a&gt;. In&lt;a href="http://www.tandfonline.com/toc/rics20/15/5"&gt;formation, Communication &amp;amp; Society &lt;/a&gt; Vol. 15, Iss. 5, 2012. Available at: &lt;a href="http://www.tandfonline.com/doi/full/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/full/10.1080/1369118X.2012.678878&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[6]  The Chartered Institute for IT, Oxford Internet Institute, University of Oxford. “The Societal Impact of the Internet of Things” February 2013. Available at: &lt;a href="http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf"&gt;http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[7] ARTICLE 29 Data Protection Working Party. (2014). &lt;i&gt;Opinion 8/2014 on the on Recent Developments on the Internet of Things.&lt;/i&gt; European Commission. Retrieved May 20, 2015, from http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[8] Crawford, K., &amp;amp; Schultz, J. (2013). Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms (SSRN Scholarly Paper No. ID 2325784). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2325784&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[9] Barocas, S., &amp;amp; Selbst, A. D. (2015). Big Data’s Disparate Impact (SSRN Scholarly Paper No. ID 2477899). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2477899&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[10] Barocas, S., &amp;amp; Selbst, A. D. (2015). Big Data’s Disparate Impact (SSRN Scholarly Paper No. ID 2477899). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2477899&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[11] Article 29 Data Protection Working Party. “Opinion 8/2014 on the on Recent Developments on the Internet of Things”. September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;h&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;ttp://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[12] Tene, O., &amp;amp; Polonetsky, J. (2013). Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of Technology and Intellectual Property, 11(5), 239.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[13]  Omer Tene and Jules Polonetsky, &lt;i&gt;Big Data for All: Privacy and User Control in the Age of Analytics&lt;/i&gt;, 11 Nw. J. Tech. &amp;amp; Intell. Prop. 239 (2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[14] Article 29 Data Protection Working Party. “Opinion 8/2014 on the on Recent Developments on the Internet of Things”. September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;h&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;ttp://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[15] Information Commissioner's Office. (2014). Big Data and Data Protection. Infomation Commissioner's Office. Retrieved May 20, 2015, from https://ico.org.uk/media/for-organisations/documents/1541/big-data-and-data-protection.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[16] Article 29 Data Protection Working Party. “Opinion 8/2014 on the on Recent Developments on the Internet of Things”. September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;h&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;ttp://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[17] The Chartered Institute for IT and Oxford Internet Institute, University of Oxford. “The Societal Impact of the Internet of Things”. February 14&lt;sup&gt;th&lt;/sup&gt; 2013. Available at: &lt;a href="http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf"&gt;http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[18] Kate Crawford and Jason Shultz, “Big Data and Due Process: Towards a Framework to Redress Predictive Privacy Harms”. Boston College Law Review, Volume 55, Issue 1, Article 4. January 1st 2014. Available at: &lt;a href="http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr"&gt;http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr&lt;/a&gt;. Accessed: July 2nd 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[19] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16th 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2nd 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[20] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[21] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[22] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[23] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[24] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[25] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[26] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[27] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[28] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[29]  Kate Crawford and Jason Shultz, “Big Data and Due Process: Towards a Framework to Redress Predictive Privacy Harms”. Boston College Law Review, Volume 55, Issue 1, Article 4. January 1st 2014. Available at: &lt;a href="http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr"&gt;http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr&lt;/a&gt;. Accessed: July 2nd 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[30]  Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[31] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commission. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[32] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[33] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commission. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[34] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[35] Kate Crawford and Jason Shultz, “Big Data and Due Process: Towards a Framework to Redress Predictive Privacy Harms”. Boston College Law Review, Volume 55, Issue 1, Article 4. January 1&lt;sup&gt;st&lt;/sup&gt; 2014. Available at: &lt;a href="http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr"&gt;http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[36] European Data Protection Supervisor. Preliminary Opinion of the European Data Protection Supervisor, Privacy and competitiveness in the age of big data: the interplay between data protection, competition law and consumer protection in the Digital Economy. March 2014. Available at: https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Consultation/Opinions/2014/14-03-26_competitition_law_big_data_EN.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[37] SC Magazine. Harmonised EU data protection and fines by the end of the year. June 25&lt;sup&gt;th&lt;/sup&gt; 2015. Available at: &lt;a href="http://www.scmagazineuk.com/harmonised-eu-data-protection-and-fines-by-the-end-of-the-year/article/422740/"&gt;http://www.scmagazineuk.com/harmonised-eu-data-protection-and-fines-by-the-end-of-the-year/article/422740/&lt;/a&gt;. Accessed: August 8&lt;sup&gt;th&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[38] Tom Jowitt, “Digital Platforms to be Included in EU Cybersecurity Law”. TechWeek Europe. August 7&lt;sup&gt;th&lt;/sup&gt; 2015. Available at: http://www.techweekeurope.co.uk/e-regulation/digital-platforms-eu-cybersecuity-law-174415&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[39] Adam Tanner. Data Brokers are now Selling Your Car's Location for $10 Online. July 10&lt;sup&gt;th&lt;/sup&gt; 2013. Available at: http://www.forbes.com/sites/adamtanner/2013/07/10/data-broker-offers-new-service-showing-where-they-have-spotted-your-car/&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things'&gt;https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2015-08-17T08:36:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011">
    <title>Big Data and the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011</link>
    <description>
        &lt;b&gt;Experts and regulators across jurisdictions are examining the impact of Big Data practices on traditional data protection standards and principles. This will be a useful and pertinent exercise for India to undertake as the government and the private and public sectors begin to incorporate and rely on the use of Big Data in decision making processes and organizational operations.This blog provides an initial evaluation of how Big Data could impact India's current data protection standards.&lt;/b&gt;
        &lt;p&gt;Experts and regulators across the globe are examining the impact of Big Data practices on traditional data protection standards and principles. This will be a useful and pertinent exercise for India to undertake as the government and the private and public sectors begin to incorporate and rely on the use of Big Data in decision making processes and organizational operations.&lt;/p&gt;
&lt;p&gt;Below is an initial evaluation of how Big Data could impact India's current data protection standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India currently does not have comprehensive privacy legislation - but the Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules 2011 formed under section 43A of the Information Technology Act 2000&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; define a data protection framework for the processing of digital data by Body Corporate. Big Data practices will impact a number of the provisions found in the Rules:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Scope of Rules: &lt;/b&gt;Currently the Rules apply to Body Corporate and digital data. As per the IT Act, Body Corporate is defined as &lt;i&gt;"Any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities."&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The present scope of the Rules excludes from its purview a number of actors that do or could have access to Big Data or use Big Data practices. The Rules would not apply to government bodies or individuals collecting and using Big Data. Yet, with technologies such as IoT and the rise of Smart Cities across India – a range of government, public, and private organizations and actors could have access to Big Data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Definition of personal and sensitive personal data: &lt;/b&gt;Rule 2(i) defines personal information as &lt;i&gt;"information that relates to a natural person which either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person."&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Rule 3 defines sensitive personal information as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Password,&lt;/li&gt;
&lt;li&gt;Financial information,&lt;/li&gt;
&lt;li&gt;Physical/physiological/mental health condition,&lt;/li&gt;
&lt;li&gt;Sexual orientation,&lt;/li&gt;
&lt;li&gt;Medical records and history,&lt;/li&gt;
&lt;li&gt;Biometric information&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The present definition of personal data hinges on the factor of identification (data that is capable of identifying a person). Yet this definition does not encompass information that is associated to an already identified individual - such as habits, location, or activity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The definition of personal data also addresses only the identification of 'such person' and does not address data that is related to a particular person but that also reveals identifying information about another person - either directly - or when combined with other data points.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By listing specific categories of sensitive personal information, the Rules do not account for additional types of sensitive personal information that might be generated or correlated through the use of Big Data analytics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, the definitions of sensitive personal information or personal information do not address how personal or sensitive personal information - when anonymized or aggregated – should be treated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Consent&lt;/b&gt;: Rule 5(1) requires that Body Corporate must, prior to collection, obtain consent in writing through letter or fax or email from the provider of sensitive personal data regarding the use of that data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a context where services are delivered with little or no human interaction, data is collected through sensors, data is collected on a real time and regular basis, and data is used and re-used for multiple and differing purposes - it is not practical, and often not possible, for consent to be obtained through writing, letter, fax, or email for each instance of data collection and for each use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notice of Collection: &lt;/b&gt;Rule 5(3) requires Body Corporate to provide the individual with a notice during collection of information that details the fact that information is being collected, the purpose for which the information is being collected, the intended recipients of the information, the name and address of the agency that is collecting the information and the agency that will retain the information. Furthermore body corporate should not retain information for longer than is required to meet lawful purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this provision acts as an important element of transparency, in the context of Big Data, communicating the purpose for which data is collected, the intended recipients of the information, the name and address of the agency that is collecting the information and the agency that will retain the information could prove to be difficult to communicate as they are likely to encompass numerous agencies and change depending upon the analysis being done.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access and correction&lt;/b&gt;: Rule 5(6) provides individuals with the ability to access sensitive personal information held by the body corporate and correct any inaccurate information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision would be difficult to implement effectively in the context of Big Data as vast amounts of data are being generated and collected on an ongoing and real time basis and often without the knowledge of the individual.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Purpose Limitation:&lt;/b&gt; Rule 5(5) requires that body corporate should use information only of the purpose which it has been collected.&lt;/p&gt;
&lt;p&gt;In the context of Big Data this provision would overlook the re-use of data that is inherent in such practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security:&lt;/b&gt; Rule 8 states that any Body Corporate or person on its behalf will be understood to have complied with reasonable security practices and procedures if they have implemented such practices and have in place codes that address managerial, technical, operational and physical security control measures. These codes could follow the IS/ISO/IEC 27001 standard or another government approved and audited standard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision importantly requires that data controllers collecting and processing data have in place strong security practices. In the context of Big Data – the security of devices that might be generating or collecting data and algorithms processing and analysing data is critical. Once generated, it might be challenging to ensure the data is being transferred to or being analysed by organisations that comply with such security practices as listed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Breach&lt;/b&gt; : Rule 8 requires that if a data breach occurs, Body Corporate would have to be able to demonstrate that they have implemented their documented information security codes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this provision holds a company accountable for the implementation of security practices, it does not address how a company should be held accountable for a large scale data breach as in the context of Big Data the scope and impact of a data breach is on a much larger scale.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Opt in and out and ability to withdraw consent&lt;/b&gt; : Rule 5(7) requires Body Corporate or any person on its behalf, prior to the collection of information - including sensitive personal information - must give the individual the option of not providing information and must give the individual the option of withdrawing consent. Such withdrawal must be sent in writing to the body corporate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The feasibility of such a provision in the context of Big Data is unclear, especially in light of the fact that Big Data practices draw upon large amounts of data, generated often in real time, and from a variety of sources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure of Information&lt;/b&gt;: Rule 6 maintains that disclosure of sensitive personal data can only take place with permission from the provider of such information or as agreed to through a lawful contract.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision addresses disclosure and does not take into account the “sharing” of information that is enabled through networked devices, as well as the increasing practice of companies to share anonymized or aggregated data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy Policy&lt;/b&gt; : Rule 4 requires that body corporate have in place a privacy policy on their website that provides clear and accessible statements of its practices and policies, type of personal or sensitive personal information that is being collected, purpose of the collection, usage of the information, disclosure of the information, and the reasonable security practices and procedures that have been put in place to secure the information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the context of Big Data where data from a variety of sources is being collected, used, and re-used it is important for policies to 'follow data' and appear in a contextualized manner. The current requirement of having Body Corporate post a single overarching privacy policy on its website could prove to be inadequate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Remedy&lt;/b&gt; : Section 43A of the Act holds that if a body corporate is negligent in implementing and maintain reasonable security practices and procedures which results in wrongful loss or wrongful gain to any person, the body corporate can be held liable to pay compensation to the affected person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision will provide limited remedy for an affected individual in the context of Big Data. Though important to help prevent data breaches resulting from negligent data practices, implementation of reasonable security practices and procedures cannot be the only hinging point for determining liability of a Body Corporate for violations and many of the harms possible through Big Data are not in the form of wrongful loss or wrongful gain to another person. Indeed many harms possible through Big Data are non-economic in nature – including physical invasion of privacy, and discriminatory practices that can arise from decisions based on Big Data analytics. Nor does the provision address the potential for future damage that can result from a 'Big Data data breach'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The safeguards noted in the above section are not the only legal provisions that speak to privacy in India. There are over fifty sectoral legislation that have provisions addressing privacy - for example provisions addressing confidentiality of health and banking information. The government of India is also in the process of drafting a privacy legislation. In 2012 the Report of the Group of Experts on Privacy provided recommendations for a privacy framework in India. The Report envisioned a framework of co-regulation - with sector level self regulatory organization developing privacy codes (that are not lower than the defined national privacy principles) and that are enforced by a privacy commissioner.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Perhaps this method would be optimal for the regulation of Big Data- allowing for the needed flexibility and specificity in standards and device development. Though the Report notes that individuals can seek remedy from the court and the Privacy Commissioner can issue fines for a violation, the development of privacy legislation in India has yet to clearly integrate the importance of due process and remedy. With the onset of Big Data - this will become more important than ever.&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The use and generation of Big Data in India is growing. Plans such as free wifi zones in cities&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;, city wide CCTV networks with facial recognition capabilities&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;, and the implementation of an identity/authentication platform for public and private services&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;, are indicators towards a move of data generation that is networked and centralized, and where the line between public and private is blurred through the vast amount of data that is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such developments and innovations what is privacy and what role does privacy play? Is it the archaic inhibitor - limiting the sharing and use of data for new and innovative purposes? Will it be defined purely by legislative norms or through device/platform design as well? Is it a notion that makes consumers think twice about using a product or service or is it a practice that enables consumer and citizen uptake and trust and allows for the growth and adoption of these services?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How privacy will be regulated and how it will be perceived is still evolving across jurisdictions, technologies, and cultures - but it is clear that privacy is not being and cannot be overlooked. Governments across the world are reforming and considering current and future privacy regulation targeted towards life in a quantified society. As the Indian government begins to roll out initiatives that create a "Digital India" indeed a "quantified India", taking privacy into consideration could facilitate the uptake, expansion, and success of these practices and services. As the Indian government pursues the opportunities possible through Big Data it will be useful to review existing privacy protections and deliberate on if, and in what form, future protections for privacy and other rights will be needed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt;Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules 2011). Available at: http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt;Group of Experts on Privacy. (2012). &lt;i&gt;Report of the Group of Experts on Privacy.&lt;/i&gt; New Delhi: Planning Commission, Government of India. Retrieved May 20, 2015, from http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; NDTV. “Free Public Wi-Fi Facility in Delhi to Have Daily Data Limit. NDTV, May 25&lt;sup&gt;th&lt;/sup&gt; 2015, Available at: &lt;a href="http://gadgets.ndtv.com/internet/news/free-public-wi-fi-facility-in-delhi-to-have-daily-data-limit-695857"&gt;http://gadgets.ndtv.com/internet/news/free-public-wi-fi-facility-in-delhi-to-have-daily-data-limit-695857&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt;FindBiometrics Global Identity Management. “Surat Police Get NEC Facial Recognition CCTV System”. July 21&lt;sup&gt;st&lt;/sup&gt; 2015. Available at: http://findbiometrics.com/surat-police-nec-facial-recognition-27214/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt;UIDAI Official Website. Available at: https://uidai.gov.in/&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011'&gt;https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-11T07:01:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015">
    <title>Comparison of the Human DNA Profiling Bill 2012 with: CIS recommendations, Sub-Committee Recommendations, Expert Committee Recommendations, and the Human DNA Profiling Bill 2015</title>
    <link>https://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015</link>
    <description>
        &lt;b&gt;This blog a comparison of 1. The Human DNA Profiling Bill  2012  vs. the Human DNA Profiling Bill 2015, 2. CIS's main recommendations vs. the 2015 Bill 3. The Sub-Committee Recommendations vs. the 2015 Bill 4. The Expert Committee Recommendations vs. the 2015 Bill.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In 2013 the Expert Committee to discuss the draft Human DNA Profiling Bill was constituted by the Department of Biotechnology. The Expert Committee had constituted a Sub-Committee to modify the draft Bill in the light of invited comments/inputs from the members of the Committee&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These changes were then deliberated upon by the Expert Committee. The Record Notes and Meeting Minutes of the Expert Committee and Sub-Committee can be found here. The Centre for Internet and Society was a member of the Expert Committee and sat on the Sub-Committee. In addition to input in meetings, CIS submitted a number of recommendations to the Committee. The Committee has drafted a 2015 version of the Bill and the same is to be introduced to Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Below is a comparison of 1. The 2012 Bill vs. the 2015 Bill, 2. CIS's main recommendations vs. the 2015 Bill 3. The Sub-Committee Recommendations vs.  the 2015 Bill 4.  The Expert Committee Recommendations vs. the 2015 Bill.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt; Recognition that DNA evidence is not infallible.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation: &lt;/strong&gt;N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt; No change from 2012 Bill&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;Chapter I : Preliminary&lt;/strong&gt;&lt;/h2&gt;
&lt;p class="Textbody" style="text-align: justify; "&gt;Inclusion of an 'Objects Clause' that makes clear that (i) the principles of notice, confidentiality, collection limitation, personal autonomy, purpose limitation and data minimization must be adhered to at all times; (ii) DNA profiles merely estimate the identity of persons, they do not conclusively establish unique identity; (iii) all individuals have a right to privacy that must be continuously weighed against efforts to collect and retain DNA; (iv) centralized databases are inherently dangerous because of the volume of information that is at risk; (v) forensic DNA profiling is intended to have probative value; therefore, if there is any doubt regarding a DNA profile, it should not be received in evidence by a court; (vi) once adduced, the evidence created by a DNA profile is only corroborative and must be treated on par with other biometric evidence such as fingerprint measurements.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Sub Committee Recommendation:&lt;/strong&gt; The Bill will not regulate DNA research. The current draft will only regulate use of DNA for civil and criminal purposes.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Expert Committee Recommendation: &lt;/strong&gt;The Bill will not regulate DNA research. The current draft will only regulate use of DNA for civil and criminal purposes.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill: &lt;/strong&gt;No Change from the 2012 Bill&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="Standard"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter II : Definitions&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Removal of 2(1)(a) “analytical procedure”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(b) “audit”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(d) “calibration”&lt;/li&gt;
&lt;li&gt;Re-drafting of 2(1)(h) “DNA Data Bank”&lt;/li&gt;
&lt;li&gt;Re-naming of 2(1)(i) “DNA Data Bank Manager” to “National DNA Data Bank Manager”&lt;/li&gt;
&lt;li&gt;Re-drafting of 2(1)(j) “DNA laboratory”&lt;/li&gt;
&lt;li&gt;Re-drafting of 2(1)(l) “DNA Profile”&lt;/li&gt;
&lt;li&gt;Re-drafting of 2(1)(o) “forensic material”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(q) “intimate body sample”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(v) “non-intimate body sample”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(r) “intimate forensic procedure”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(w) “non-intimate forensic procedure”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(s) “known samples”&lt;/li&gt;
&lt;li&gt;Re-drafting of 2(1)(y) “offender”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(zb) “proficiency testing”&lt;/li&gt;
&lt;li&gt;Re-drafting of 2(1)(zi) “suspect”&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation&lt;/strong&gt;: N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation&lt;/strong&gt;: N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt; No change from the 2012 Bill.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter III : DNA Profiling Board&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;The board should be made up of no more than five members. The Board must contain at least one ex-Judge or senior lawyer since the Board will perform the legal function of licensing and must obey the tenets of administrative law. To further multi-stakeholder interests, the Board should have an equal representation from civil society – both institutional (e.g NHRC and the State Human Rights Commissions) and non-institutional (well-regarded and experienced civil society persons). The Board should also have privacy advocates. CIS also recommended that the functions of the board be limited to: licensing, developing standards and norms, safeguarding privacy and other rights, ensuring public transparency, promoting information and debate and a few other limited functions necessary for a regulatory authority. CIS also recommended a &lt;a href="http://cis-india.org/internet-governance/blog/dna-bill-functions.pdf"&gt;'duty to consult'&lt;/a&gt; with affected or impacted individuals, interested individuals, and the public at large.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Reduce the DNA Profiling Board (Section 4) from 16 members to 11 members and include civil society representation on the Board.&lt;/li&gt;
&lt;li&gt;Include &lt;span&gt;either&lt;/span&gt; clause 4(f) or (g) i.e. Chief Forensic Scientist, Directorate of Forensic Science, Ministry of Home Affairs, Government of India - &lt;i&gt;ex-officio Member&lt;/i&gt; or Director of a Central Forensic Science Laboratory to be nominated by Ministry of Home Affairs, Government of India- &lt;i&gt;ex-officio Member&lt;/i&gt;;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Change&lt;/span&gt; clause 4(i) i.e., &lt;strong&gt;&lt;span&gt;to replace&lt;/span&gt;&lt;/strong&gt; Chairman, National Bioethics Committee of Department of Biotechnology, Government of India- &lt;i&gt;ex-officio Member&lt;/i&gt; &lt;strong&gt;with&lt;/strong&gt; Chairman, National Human Rights Commissions or his nominee.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Delete&lt;/span&gt; Members mentioned in clause 4(l) i.e. Two molecular biologists to be nominated by the Secretary, Department of Biotechnology, Ministry of Science and Technology, Government of India- &lt;i&gt;Members&lt;/i&gt;;&lt;/li&gt;
&lt;li&gt;DPB Members with potential conflict of interest in matters under consideration should recuse themselves in deliberations in respect of such matters (Section 7), and they should be liable to be removed from the Board in case they are found to have not disclosed the nature of such interest.&lt;/li&gt;
&lt;li&gt;With regards to the establishment of the DNA Profiling Board (clause 3) the committee clarified that the DNA Board needs to be a body corporate&lt;/li&gt;
&lt;li&gt;The functions of the Board should be redrafted with fewer functions, and these should be listed in descending order of priority to sharpen this function – namely regulate process, regulate the labs, regulate databanks.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Accepted sub-committee recommendation to reduce the Board from 16 to 11 members and the detailed changes.&lt;/li&gt;
&lt;li&gt;Accepted sub-committee recommendation to include civil society on the Board.&lt;/li&gt;
&lt;li&gt;Accepted sub-committee recommendation to reduce the functions of the Board.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Addition in 2015 Bill of Section 4 (b) – &lt;i&gt;“Chairman, National Human Rights Commission or his nominee – ex-officio Member” (2015 Bill) &lt;/i&gt;&lt;strong&gt;&lt;span&gt;Note: This change represents incorporation of CIS's recommendation, sub-committee recommendation, and expert committee recommendation.&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Changing of Section 4 (h)  from: &lt;i&gt;“Director of a State Forensic Science Laboratory to be nominated by Ministry of Home Affairs, Government of India- ex-officio Member”&lt;/i&gt; (2012 Bill)  &lt;strong&gt;to&lt;/strong&gt; “&lt;i&gt;Director cum – Chief Forensic Scientist, Directorate of Forensic  Science Services, Ministry of Home Affairs, Government of India -ex-officio Member”(2015 Bill) &lt;/i&gt;&lt;strong&gt;&lt;span&gt;Note: This change represents partial incorporation of the sub-committee recommendation and expert committee recommendation.&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Changing of Section 4 (j) from: &lt;i&gt;“Director, National Accreditation Board for Testing and Calibration of Laboratories, New Delhi- ex-officio Member”; (2012 Bill)&lt;/i&gt; &lt;strong&gt;to&lt;/strong&gt; &lt;i&gt;“&lt;/i&gt;&lt;i&gt;Director of a State Forensic Science Lab to be nominated by MHA ex-officio member” (2015 Bill)&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Addition of section 11(4) and 11(5) “(4) &lt;i&gt;The Board shall, in carrying out its functions and activities, consult with all persons and groups of persons whose rights and related interests may be affected or impacted by any DNA collection, storage, or profiling activity. (5) The Board shall, while considering any matter under its purview, co-opt or include any person, group of persons, or organisation, in its meetings and activities if it is satisfied that that person, group of persons, or organisation, has a substantial interest in the matter and that it is necessary in the public interest to allow such participation.” &lt;/i&gt;&lt;strong&gt;&lt;span&gt;Note: This change represents partial incorporation of CIS's recommendation and Expert Committee recommendation.&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter IV : Approval of DNA Laboratories&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Add in section 16 1(d), the words “including audit reports”&lt;/li&gt;
&lt;li&gt;Include in section 16(1)(c) that if labs do not file their audit report on an annual basis, the lab will lose approval. If the lab loses their approval - all the materials will be shifted to another lab and the data subject will be informed.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation: &lt;/strong&gt;N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt; No change from the 2012 Bill.&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="Standard"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter V : Standards, Quality Control and Quality Assurance&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Section 19(2) DNA laboratory to be headed by person possessing a doctorate in a subject germane to molecular biology.&lt;/li&gt;
&lt;li&gt;Clauses 20 and 30 should be merged into Clause 20 to read as:&lt;/li&gt;
&lt;/ol&gt;
&lt;p class="Textbody"&gt;&lt;i&gt;“(1). The staff of every DNA laboratory shall possess such qualifications and experience commensurate with the job requirements as may be specified by the regulations.&lt;/i&gt;&lt;/p&gt;
&lt;p class="Textbody"&gt;&lt;i&gt;(2). Every DNA laboratory shall employ such qualified technical personnel as may be specified by the regulations and technical personnel shall undergo regular training in DNA related subjects in such institutions and at such intervals as may be specified by the regulations.&lt;/i&gt;&lt;/p&gt;
&lt;p class="Textbody"&gt;&lt;i&gt;(3). Head of every DNA laboratory shall ensure that laboratory personnel keep abreast of developments within the field of DNA and maintain such records on the relevant qualifications, training, skills and experience of the technical personnel employed in the laboratory as may be specified by the regulations.&lt;/i&gt;&lt;/p&gt;
&lt;p class="Textbody"&gt;&lt;i&gt;Accordingly, change the Title: “Qualification, Recruitment and Training of DNA lab personnel.”&lt;/i&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Require DNA labs to have in place an evidence control system (Clause 22) &lt;strong&gt;&lt;span&gt;Note: &lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span&gt;This existed in the DNA 2012 Bill&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Amend Clause 23(1) to read as ““Every DNA laboratory shall possess and &lt;span&gt;shall follow&lt;/span&gt; a validation process as may be specified by the regulations.”&lt;/li&gt;
&lt;li&gt;Paraphrase Clause 27 as, “Every DNA laboratory shall have audits conducted annually in accordance with the standards as may be specified by the regulations.” It was agreed that the audits of the DNA Laboratory (clause 27) do not need to be external. &lt;strong&gt;&lt;span&gt;Note: &lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span&gt;This existed in the DNA 2012 Bill.&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Bring sections 28-31 on infrastructure and training brought into Chapter V and thus new title of the chapter reads as “Standards, Quality Control and Quality Assurance Obligations of DNA Laboratory and Infrastructure and Training”.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Changing of Section 20 (2) from  &lt;i&gt;“&lt;/i&gt;&lt;i&gt;(2) Head of every DNA laboratory shall ensure that laboratory personnel keep abreast of developments within the field of DNA and maintain such records on the relevant qualifications, training, skills and experience of the technical personnel employed in the laboratory as may be specified by the regulations made by the Board.&lt;/i&gt; (2012) &lt;strong&gt;to&lt;/strong&gt; &lt;i&gt;Every DNA laboratory shall employ such qualified technical personnel as may be specified by the regulations and technical personnel shall undergo regular training in DNA related subjects in such institutions and at such intervals as may be specified by the regulations; (2015)”  and &lt;/i&gt;Addition in 2015 Bill of Section 20 (3)&lt;i&gt; - “Head of every DNA laboratory shall ensure that laboratory personnel keep abreast of developments within the field of DNA profiling and maintain such records on the relevant qualifications, training, skills and experience of the technical personnel employed in the laboratory as may be specified by the regulations” (2015) &lt;/i&gt;&lt;strong&gt;Note: This is as per the Sub-Committee's recommendation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Amending of  Clause 23(1) to read as ““Every DNA laboratory shall possess and &lt;span&gt;shall follow&lt;/span&gt; a validation process as may be specified by the regulations.” &lt;strong&gt;Note: This is as per the Sub-Committee's recommendation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Changing of section 30 from:&lt;i&gt;“Every DNA laboratory shall employ such qualified technical personnel as may be specified by the regulations made by the Board and technical personnel shall undergo regular training in DNA related subjects in such institutions and at such intervals as may be specified by the regulations made by the Board.” (2012) &lt;/i&gt;to&lt;i&gt; “Every DNA laboratory shall have installed appropriate security system and system for safety of personnel as may be specified by the regulations.”&lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;Sections 28-31 on infrastructure and training brought into Chapter V and thus new title of the chapter reads as “Standards, Quality Control and Quality Assurance Obligations of DNA Laboratory and Infrastructure and Training”.  &lt;strong&gt;Note: This is as per the Sub-Committee's recommendation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter VI : DNA Data Bank&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Removal of section 32(6) which requires the names of individuals to be connected to their profiles and recommended that DNA profiles once developed, should be anonymized and retained separate from the names of their owners.&lt;/li&gt;
&lt;li&gt;Section 34(2) to be limited to containing only an offenders' index and a crime scene index&lt;/li&gt;
&lt;li&gt;Removal of section 36 which allows for international dicslosures of DNA profiles of Indians.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Amend Clause 32(1) to reads as: “The Central Government shall, by notification, establish a National DNA Data Bank”.&lt;/li&gt;
&lt;li&gt;Anonymize the volunteer's database.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt; No change from 2012 Bill.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter VII : Confidentiality of and access to DNA profiles, samples, and records&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Re-drafting section 39 and 40 to specify that DNA can only be used for forensic purposes and specify the manner in which DNA profiles may be received in evidence.&lt;/li&gt;
&lt;li&gt;Removal of section 40&lt;/li&gt;
&lt;li&gt;Removal of section 43&lt;/li&gt;
&lt;li&gt;Re-dreaft section 45 as it sets out a post-conviction right related to criminal procedure and evidence. This would fundamentally alter the nature of India’s criminal justice system, which currently does not contain specific provisions for post-conviction testing rights. However, courts may re-try cases in certain narrow cases when fresh evidence is brought forth that has a nexus to the evidence upon which the person was convicted and if it can be proved that the fresh evidence was not earlier adduced due to bias. Any other fresh evidence that may be uncovered cannot prompt a new trial. Clause 45 is implicated by Article 20(2) of the Constitution of India and by 6 section 300 of the CrPC. The principle of autrefois acquit that informs section 300 of the CrPC specifically deals with exceptions to the rule against double jeopardy that permit re-trials. [See, for instance, Sangeeta Mahendrabhai Patel (2012) 7 SCC 721.]&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Amend Clause 40 (f) to read as  “-------to the concerned parties to the said civil dispute or civil matter, &lt;span&gt;with the concurrence of the court&lt;/span&gt; and to the concerned judicial officer or authority”.Incorporated, but is now located at section 39&lt;/li&gt;
&lt;li&gt;Include in Chapter VIII  additional Sections:   Clause 42A: “A person whose DNA profile has been created shall be given a copy of the DNA profile upon request”. &lt;span&gt;Clause 42B:&lt;/span&gt; A person whose DNA profile has been created and stored shall be given information as to who has accessed his DNA profile or DNA information.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee: &lt;/strong&gt;N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Addition of  the phrase in section 39 “&lt;span&gt;with the concurrence of the court&lt;/span&gt;”, thus the new clause reads as:  “-------to the concerned parties to the said civil dispute or civil matter, with the concurrence of the court” and to the concerned judicial officer or authority”. &lt;strong&gt;Note: This as per the recommendations of the Sub-Committee.&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter VIII : Finance, Accounts, and Audit&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation: &lt;/strong&gt;N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation: &lt;/strong&gt;N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt; No change from the 2012 Bill&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter IX : Offences and Penalties&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;The law prohibits the delegation of “essential legislative functions” [In re Delhi Laws, 1951]. The creation of criminal offences must be conducted by a statute that is enacted by Parliament, and when offences are created via delegated legislation, such as Rules, the quantum of punishment must be pre-set by the parent statute.&lt;/li&gt;
&lt;li&gt;Since the listing of offences for DNA profiling will directly affect the fundamental right of personal liberty, it is an undeniable fact that the identification of these offences should be subject to a democratic process of the legislature rather than be determined by the whims of the executive.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Ensure a minimal jail term for any offence under the Act from DNA Data Banks without authorization is a period of one month (chapter 10 (53)) &lt;strong&gt;Note: This already existed in the 2012 Bill.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Add to Section 56 the phrase “… or otherwise willfully neglects any other duty cast upon him under the provisions of this Act, shall be punishable …”.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt; No change from 2012 Bill&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation: &lt;/strong&gt;N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill: &lt;/strong&gt;No change from 2012 Bill&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter X : Miscellaneous&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;span&gt;Schedule&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The creation of a &lt;a href="http://cis-india.org/internet-governance/blog/dna-list-of-offences.pdf"&gt;list of offenses &lt;/a&gt;under which upon arrest under which DNA samples may lawfully be collected from the arrested person without his consent including:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Any offence under the Indian Penal Code, 1860 if it is listed as a cognizable offence in Part I of the First Schedule of the Code of Criminal Procedure, 1973; [Alternatively, all cognizable offences under the Indian Penal Code may be listed here]&lt;/li&gt;
&lt;li&gt;Every offence punishable under the Immoral Traffic (Prevention) Act, 1956;&lt;/li&gt;
&lt;li&gt;Any cognizable offence under the Indian Penal Code, 1860 that is committed by a registered medical practitioner and is not saved under section 3 of the Medical Termination of Pregnancy Act, 1971; [Note that the ITP Act does not itself create or list any offences, it only saves doctors from prosecution from IPC offences if certain conditions are met]&lt;/li&gt;
&lt;li&gt;Every offence punishable under the Pre-conception and Pre-natal Diagnostic Techniques (Prohibition of Sex Selection) Act, 1994;&lt;/li&gt;
&lt;li&gt;The offence listed under sub-section (1) of section 31 of the Protection of Women from Domestic Violence Act, 2005;&lt;/li&gt;
&lt;li&gt;Every offence punishable under the Protection of Civil Rights Act, 1955;&lt;/li&gt;
&lt;li&gt;Every offence punishable under the Scheduled Castes and the Scheduled Tribes (Prevention of Atrocities) Act, 1989.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation:&lt;/strong&gt; Incorporation of CIS's recommendation to the schedule regarding instances of when DNA samples can be collected without consent.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Addition in 2015 of “&lt;i&gt;Part II: List of specified offences - Any offence under the Indian Penal Code, 1860 if it is listed as a cognizable offence in Part I of the First Schedule of the Code of Criminal Procedure, 1973” (2015). &lt;/i&gt;&lt;strong&gt;Note: This represents partial incorporation of CIS's recommendation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Expansion of sources of samples for DNA profiling from &lt;i&gt;-&lt;/i&gt;&lt;i&gt; “(1) Scene of occurrence or crime (2) Tissue and skeleton remains (3) Clothing and other objects (4) Already preserved body fluids and other samples” (2012) &lt;/i&gt;&lt;strong&gt;to&lt;i&gt; &lt;/i&gt;&lt;/strong&gt;&lt;i&gt;“1. Scene of occurrence, or scene of crime 2. Tissue and skeleton remains 3. Clothing and other objects 4. Already preserved body fluids and other samples 5. Medical Examination 6. Autopsy examination 7. Exhumation” (2015)” and&lt;/i&gt; Deletion of&lt;i&gt; “Manner of collection of samples for DNA: (1) Medical Examination (2) Autopsy examination (3) Exhumation “ (2012) &lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015'&gt;https://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-10T03:20:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number">
    <title>Aadhaar Number vs the Social Security Number</title>
    <link>https://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number</link>
    <description>
        &lt;b&gt;This blog calls out the differences between the Aadhaar Number and the Social Security Number &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In response to news items that reported the Government of India running pilot projects to enroll children at the time of birth for Aadhaar numbers - an 	idea that government officials in the news items claimed was along the lines of the social security number - this note seeks to point out the ways in which 	the Aadhaar number and the social security number are different.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Governance&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;SSN is governed by Federal legislation: &lt;/b&gt; The issuance, collection, and use of the SSN is governed by a number of Federal and State legislation with the most pertinent being the Social Security Act 	1935&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; - which provides legal backing for the number, and the Privacy Act 1974 which regulates the 	collection, access, and sharing of the SSN by Federal Executive agencies.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Aadhaar was constituted under the Planning Commission: &lt;/b&gt; The UIDAI was constituted as an attached office under the Planning Commission in 2009.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; A Unique 	Identification Authority Bill has been drafted, but has not been enacted.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; Though portions of the 	Information Technology Act 2008 apply to the UID scheme, section 43A and associated Rules (India's data protection standards) do not clearly apply to the 	UIDAI as the provision has jurisdiction only over body corporate.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;Purpose&lt;b&gt; &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;SSN was created as a number record keeping scheme for government services: &lt;/b&gt; The Social Security Act provides for the creation of a record keeping scheme - the SSN. Originally, the SSN was used as a means to track an individuals 	earnings in the Social Security system.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; In 1943 via an executive order, the number was adopted across 	Federal agencies. Eventually the number has evolved from being a record keeping scheme into a means of identity. In 1977 it was clarified by the Carter 	administration that the number could act as a means to validate the status of an individual (for example if he or she could legally work in the country) 	but that it was not to serve as a national identity document.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; Today the SSN serves as a number for 	tracking individuals in the social security system and as one (among other) form of identification for different services and businesses. Alone, the SSN card does not serve proof of identity, citizenship, and it cannot be used to transact with and does not have the ability to store information.	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Aadhaar was created as a biometric based authenticator and a single unique proof of identity:&lt;/b&gt; The Aadhaar number was established as a single proof of identity and address for any resident in India that can be used to authenticate the identity of an 	individual in transactions with organizations that have adopted the number. The scheme as been promoted as a tool for reducing fraud in the public 	distribution system and enabling the government to better deliver public benefits.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Applicability&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;SSN is for citizens and non-citizens authorized to work: &lt;/b&gt; The social security number is primarily for citizens of the United States of America. In certain cases, non citizens who have been authorized by the 	Department of Homeland Security to work in the US may obtain a Social Security number.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Aadhaar is for residents: &lt;/b&gt; The aadhaar number is available to any resident of India.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Storage, Access, and Disclosure&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;SSN and applications are stored in the Numident:&lt;/b&gt; The numident is a centralized database containing the individuals original SNN and application and any re-application for the same. All information stored 	in the Numident is protected under the Privacy Act. Individuals may request records of their own personal information stored in the Numident. With the 	exception of the Department of Homeland Security and U.S Citizenship and Immigration Services, third parties may only request access to Numident records 	with the consent of the concerned individual.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; Federal agencies and private entities that collect the 	SSN for a specific service store the number at the organizational level. The Privacy Act and various state level legislation regulates the disclosure, 	access, and sharing of the SSN number collected by agencies and organizations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Aadhaar and data generated at multiple sources is stored in the CIDR and processed in the data warehouse: &lt;/b&gt; According to the report "Analytics, Empowering Operations", 	&lt;i&gt; "At UIDAI, data generated at multiple sources would typically come to the CIDR (Central ID Repository), UIDAIs Data centre, through an online 		mechanism. There could be certain exceptional sources, like Contact centre or Resident consumer surveys, that will not feed into the Data center 		directly. Data is then processed in the Data Warehouse using Business Intelligence tools and converted into forms that can be accessed and shared 		easily." &lt;/i&gt; Examples of data that is stored in the CIDR include enrollments, letter delivery, authentication, processing, resident survey, training, and data from 	contact centres.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; It is unclear if organizations that authenticate individuals via the Adhaar number 	store the number at the organizational level. Biometrics are listed as a form of sensitive personal information in the Information Technology (Reasonable 	security practices and procedures and sensitive personal data or information) 2011, thus if any body corporate collects biometrics with the Aadhaar number - the storage, access, and disclosure of this information would be protected as per the Rules, but the Aadhaar number is not explicitly protected.	&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Use by public and private entities&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Public and private entities can request SSN: &lt;/b&gt; Public and private entities can request the SSN to track individuals in a system or as a form of identifying an individual. Any private business is allowed 	to request and use the SSN as long as the use does not violate federal or state law. Legally, an individual is only required to provide their SSN to a 	business if they are engaging in a transaction that requires notification to the Internal Revenue Service or the individual is initiating a transaction 	that is subject to federal Customer Identification Program rules.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; Thus, an individual can refuse to 	provide their SSN, but a private business can also refuse to provide a service.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any public authority requesting the SSN must provide a disclosure notice to the individual explaining if the provision of SSN is required or optional. 	According to the Privacy Act of 1974, no individual can be denied a government service or benefit for not providing the SSN unless Federal law specifically 	requires the number for a particular service.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; Thus, there are a number of Federal legislation in the 	U.S that specifically require the SSN. For example, the Social Security Independence and Program Improvements Act 1994 allows for the use of the SSN for jury selection and allows for cross matching of SSNs and Employer Identification Numbers for investigation into violation of Federal Laws.	&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Public and private entities can request Aadhaar:&lt;span&gt; &lt;/span&gt;&lt;/b&gt; The Aadhaar number can be adopted by any public or private entity as a single means of identifying an individual. The UIDAI has stated that the Aadhaar 	number is not mandatory,&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; and the Supreme Court of India has clarified that services cannot be denied on 	the grounds that an individual does not have an Aadhaar number.&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;Verification&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The SSN can be verified only in certain circumstances: &lt;/b&gt; The SSA will only respond to requests for SSN verification in certain circumstances:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Before issuing a replacement SSN, posting a wage item to the Master Earnings File, or establishing a claims record - the SSA will verify that the 	name and the number match as per their records.&lt;/li&gt;
&lt;li&gt;When legally permitted, the SSA verification system will verify SSNs for government agencies.&lt;/li&gt;
&lt;li&gt;When legally permitted the SSA verification system will verify a workers SSN for pre-registered and approved private employers.&lt;/li&gt;
&lt;li&gt;If an individual has provided his/her consent, the SSA will verify a SSN request from a third party.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;For verification the SSN number must be submitted with an accompanying name to be matched to and additional information such as date of birth, fathers 	name, mothers name etc. When verifying submitted SSN's, the system will respond with either confirmation that the information matches or that it does not 	match. It is important to note that because SSN is verified only in certain circumstances, it is not guaranteed that the person providing an SSN number is 	the person whom the number was assigned.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Aadhaar number can be verified in any transaction: &lt;/b&gt; If an organization, department, or platform has adopted the Aadhaar number as a form of authentication, they can send requests for verification to the 	UIDAI. The UIDAI will respond with a yes or no answer. When using their Aadhaar number as a form of authentication individuals can submit their number and 	demographic information or their number and biometrics for verification.&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Lost or stolen&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;SSN can be replaced: &lt;/b&gt; If an individual loses his/her SSN card lost or their number is fraudulently used, they can apply for a replacement SSN card or a new SNN number.	&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Aadhaar number can be replaced: &lt;/b&gt; If an individual has lost their Aadhaar number, there is a process that they can follow to have their number re-sent to them. If the number cannot be located by the UIDAI , the individual has the option of re-enrolling for a new Aadhaar number.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt; &lt;b&gt; &lt;/b&gt;The UIDAI has built the scheme with the understanding the biometrics are a unique identifier that cannot be lost or stolen, and thus have 	not created a system to address the possibility of stolen or fraudulent use of biometrics.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Implementation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legislation and formal roll out: &lt;/b&gt; The SSN program was brought into existence via the Social Security Act and officially rolled out while eventually being adopted across Federal Departments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bill and pilot studies:&lt;/b&gt; The UID scheme has been envisioned as being brought into existence via the Unique Identification Authority Bill 2010 which has not been passed. Thus far, 	the project has been implemented in pilot phases across States and platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Enrollment&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Social Security Administration: &lt;/b&gt; The Social Security Agency is the soul body in the US that receives and processes applications for SSN and issues SSN numbers.	&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI, registrars, and enrolling agencies: &lt;/b&gt; The UIDAI is the soul body that issues Aadhaar numbers. Registrars (contracted bodies under the UIDAI_ - and enrolling agencies (contracted bodies under 	Registrars) are responsible for receiving and processing enrollments into the UID scheme.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Required supporting documents&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;SSN requires proof of age, identity, and citizenship: &lt;/b&gt; To obtain a SSN you must be able to provide proof of your age, your identity, and US citizenship. The application form requires the following information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Name to be shown on the card&lt;/li&gt;
&lt;li&gt;Full name at birth, if different&lt;/li&gt;
&lt;li&gt;Other names used&lt;/li&gt;
&lt;li&gt;Mailing address&lt;/li&gt;
&lt;li&gt;Citizenship or alien status&lt;/li&gt;
&lt;li&gt;Sex&lt;/li&gt;
&lt;li&gt;Race/ethnic description (SSA does not receive this information under EAB)&lt;/li&gt;
&lt;li&gt;Date of birth&lt;/li&gt;
&lt;li&gt;Place of birth&lt;/li&gt;
&lt;li&gt;Mother's name at birth&lt;/li&gt;
&lt;li&gt;Mother's SSN (SSA collects this information for the Internal Revenue Service (IRS) on an original application for a child under age 18. SSA does 	not retain these data.)&lt;/li&gt;
&lt;li&gt;Fathers' name&lt;/li&gt;
&lt;li&gt;Father's SSN (SSA collects this information for IRS on an original application for a child under age 18. SSA does not retain these data).&lt;/li&gt;
&lt;li&gt;Whether applicant ever filed for an SSN before&lt;/li&gt;
&lt;li&gt;Prior SSNs assigned&lt;/li&gt;
&lt;li&gt;Name on most recent Social Security card&lt;/li&gt;
&lt;li&gt;Different date of birth if used on an earlier SSN application.&lt;/li&gt;
&lt;li&gt;Date application completed&lt;/li&gt;
&lt;li&gt;Phone number&lt;/li&gt;
&lt;li&gt;Signature&lt;/li&gt;
&lt;li&gt;Applicant's relationship to the number holder.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Aadhaar requires proof of age, address, birth, and residence and biometric information:&lt;/b&gt; The application form requires the following information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Name&lt;/li&gt;
&lt;li&gt;Date of birth&lt;/li&gt;
&lt;li&gt;Gender&lt;/li&gt;
&lt;li&gt;Address&lt;/li&gt;
&lt;li&gt;Parent/guardian details&lt;/li&gt;
&lt;li&gt;Email&lt;/li&gt;
&lt;li&gt;Mobile number&lt;/li&gt;
&lt;li&gt;Indication of consenting or not consenting to the sharing of information provided to the UIDAI with Public services including welfare services&lt;/li&gt;
&lt;li&gt;Indication of if the individual wants the UIDAI to facilitate the opening of a bank account linked to the Aadhaar number and permits the sharing of 	information for this purpose&lt;/li&gt;
&lt;li&gt;If the individual has no objection to linking their present bank account to the Aadhaar number and the relevant bank details&lt;/li&gt;
&lt;li&gt;Signature&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Sahil Makkar, "PM's idea to track kids from birth hits practical hurdles", Business Standard. April 11&lt;sup&gt;th&lt;/sup&gt; 2015. Available at: 			http://www.business-standard.com/article/current-affairs/pm-s-idea-to-track-kids-from-birth-hits-practical-hurdles-115041100828_1.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; The Social Security Act of 1935. Available at: http://www.ssa.gov/history/35act.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; The United States Department of Justice, "Overview of the Privacy Act of 1974". Available at: 			http://www.justice.gov/opcl/social-security-number-usage&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Government of India Planning Commission "Notification". Available at: https://uidai.gov.in/images/notification_28_jan_2009.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; The National Identification Authority of India Bill 2010. Available at: 			http://www.prsindia.org/uploads/media/UID/The%20National%20Identification%20Authority%20of%20India%20Bill,%202010.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; History of SSA 1993 - 2000. Chapter 6: Program Integrity. Available at: http://www.ssa.gov/history/ssa/ssa2000chapter6.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Social Security Number Chronology. Available at: http://www.ssa.gov/history/ssn/ssnchron.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; History of SSA 1993 - 2000, Chapter 6: Program Integrity. Available at: http://www.ssa.gov/history/ssa/ssa2000chapter6.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; UID FAQ: Aadhaar Features, Eligibility. Available at: https://resident.uidai.net.in/faqs&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Social Security Numbers for Noncitizens. Available at: http://www.ssa.gov/pubs/EN-05-10096.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Aapka Aadhaar. Available at: https://uidai.gov.in/aapka-aadhaar.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Program Operations Manual System. Available at: https://secure.ssa.gov/poms.nsf/lnx/0203325025&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; UIDAI Analytics -Empowering Operations - the UIDAI Experience. Available at: https://uidai.gov.in/images/commdoc/other_doc/uid_doc_30012012.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Information Technology (Reasonable security practices and procedures and sensitive personal data or information rules 2011) available at: 			http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; IdentityHawk, "Who can lawfully request my social security number?" Available at: 			http://www.identityhawk.com/Who-Can-Lawfully-Request-My-Social-Security-Number&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; SSA FAQ " Can I refuse to give my social security number to a private business?" Available at: 			https://faq.ssa.gov/link/portal/34011/34019/Article/3791/Can-I-refuse-to-give-my-Social-Security-number-to-a-private-business&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; The United States Department of Justice, "Overview of the Privacy Act of 1974". Available at: 			http://www.justice.gov/opcl/social-security-number-usage&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Social Security Number Chronology. Available at: http://www.ssa.gov/history/ssn/ssnchron.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Aapka Aadhaar. Available at: https://uidai.gov.in/what-is-aadhaar.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Business Standard, "Aadhaar not mandatory to claim any state benefit, says Supreme Court" March 17&lt;sup&gt;th&lt;/sup&gt;, 2015. Available at: 			http://www.business-standard.com/article/current-affairs/aadhaar-not-mandatory-to-claim-any-state-benefit-says-supreme-court-115031600698_1.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Social Security History 1993 - 2000, Chapter 6: Program Integrity. Available at: http://www.ssa.gov/history/ssa/ssa2000chapter6.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Aapka Aadhaar. Available at: https://uidai.gov.in/auth.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; SSA. New or Replacement Social Security Number Card. Available at: http://www.ssa.gov/ssnumber/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; UIDAI, Lost EID/UID Process. Available at: https://uidai.gov.in/images/mou/eiduid_process_ver5_2_27052013.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Social Security. Availabl at: http://www.ssa.gov/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; Social Security Administration, Application for a Social Security. Available at: http://www.ssa.gov/forms/ss-5.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Aadhaar enrollment/correction form. Available at: http://hstes.in/pdf/2013_pdf/Genral%20Notification/Aadhaar-Enrolment-Form_English.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number'&gt;https://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-07-24T01:24:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dna-dissent">
    <title>A Dissent Note to the Expert Committee for DNA Profiling </title>
    <link>https://cis-india.org/internet-governance/blog/dna-dissent</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has participated in the Expert Committee for DNA Profiling constituted by the Department of Biotechnology in 2012 for the purpose of deliberating on and finalizing the draft Human DNA Profiling Bill and appreciates this opportunity. CIS respectively dissents from the January 2015 draft of the Bill.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Click for &lt;a href="https://cis-india.org/internet-governance/blog/dna-bill-functions.pdf" class="external-link"&gt;DNA Bill Functions&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/dna-list-of-offences.pdf" class="external-link"&gt;DNA List of Offences&lt;/a&gt;, and &lt;a href="https://cis-india.org/internet-governance/blog/cis-note-on-dna-bill.pdf" class="external-link"&gt;CIS Note on DNA Bill&lt;/a&gt;. A modified version was published by &lt;a class="external-link" href="http://bangalore.citizenmatters.in/articles/dna-bill-problems-issues-inputs-from-bangalore"&gt;Citizen Matters Bangalore&lt;/a&gt; on July 28.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Based on the final draft of the Human DNA Profiling Bill that was circulated on the 13th of January 2015 by the committee, the Centre for Internet and Society is issuing this note of dissent on the following grounds:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and Society has made a number of submissions to the committee regarding different aspects of the Bill including recommendations for the functions of the board, offences for which DNA can be collected, and a general note on the Bill. Though the Centre for Internet and Society recognizes that the present form of the Bill contains stronger language regarding human rights and privacy, we do not find these to be adequate and believe that the core concerns or recommendations submitted to the committee by CIS have not been incorporated into the Bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and Society has foundational objections to the collection of DNA profiles for non-forensic purposes. In the current form the DNA Bill provides for collection of DNA for the following non forensic purposes:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Section 31(4) provides for the maintenance of indices in the DNA Bank and includes a missing person’s index, an unknown deceased person’s index, a volunteers’ index, and such other DNA indices as may be specified by regulation. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Section 38 defines the permitted uses of DNA profiles and DNA samples including: identifying victims of accidents or disasters or missing persons or for purposes related to civil disputes and other civil matters and other offences or cases listed in Part I of the Schedule or for other purposes as may be specified by regulation.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Section 39 defines the permitted instances of when DNA profiles or DNA samples may be made available and include: for the creation and maintenance of a population statistics Data Bank that is to be used, as prescribed, for the purposes of identification research, protocol development or quality control provided that it does not contain any personally identifiable information and does not violate ethical norms.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Part I of the schedule lists laws, disputes, and offences for which DNA profiles and DNA samples can be used. These include, among others, the Motor Vehicles Act, 1988, parental disputes, issues relating to pedigree, issues relating to assisted reproductive technologies, issues relating to transplantation of human organs, issues relating to immigration and emigration, issues relating to establishment of individual identity, any other civil matter as may be specified by the regulations, medical negligence, unidentified human remains, identification of abandoned or disputed children. &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;While rejecting non-forensic use entirely, we have specific substantive and procedural objections to the provisions relating to forensic profiling in the present version of the Bill. These include:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Over delegation of powers to the board&lt;/strong&gt;: The DNA Board currently has vast powers as delegated by Section 12&amp;nbsp; including:&lt;br /&gt;&lt;em&gt;“authorizing procedures for communication of DNA profiles for civil proceedings and for crime investigation by law enforcement and other agencies, establishing procedure for cooperation in criminal investigation between various investigation agencies within the country and with international agencies, specifying by regulations the list of applicable instances of human DNA profiling and the sources and manner of collection of samples in addition to the lists contained in the Schedule, undertaking any other activity which in the opinion of the Board advances the purposes of this Act.” &lt;/em&gt;&lt;br /&gt;&lt;br /&gt;Section 65 gives the Board the power to make regulations for a number purposes including: &lt;em&gt;“other purposes in addition to identification of victims of accidents, disasters or missing persons or for purposes related to civil disputes and other civil matters and other offences or cases lists in Part I of the Schedule for which records or samples may be used under section 38, other laws, if any, to be included under item (viii) of para B of Part I of the Schedule, other civil matters, if any, to be included under item (vii) of para C of Part I of the Schedule, and authorization of other persons, if any, for collection of non intimate body samples and for performance of non-intimate forensic procedures, under Part III of the Schedule.&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;Ideally these powers would lie with the legislative or judicial branch. Furthermore, the Bill establishes no mechanism for accountability or oversight over the functioning of the Board and section 68 specifically states that &lt;em&gt;“no civil court shall have jurisdiction to entertain any suit or proceeding in respect to any matter which the Board is empowered by or under this Act to determine.” &lt;/em&gt;&lt;br /&gt;&lt;br /&gt;The above represents only a few instances of the overly broad powers that have been given to the Board. Indeed, the Bill gives the Board the power to make regulations for 37 different aspects relating to the collection, storage, use, sharing, analysis, and deletion of DNA samples and DNA profiles. As a result, the Bill establishes a Board that controls the entire ecosystem of DNA collection, analysis, and use in India without strong external oversight or accountability. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Key terms undefined&lt;/strong&gt;: Section 31 (5) states that the “indices maintained in every DNA Data Bank will include information of data based on DNA analysis prepared by a DNA laboratory duly approved by the Board under section 1 of the Act, and of records relating thereto, in accordance with the standards as may be specified by the regulations.”&lt;br /&gt;&lt;br /&gt;The term’ DNA analysis’ is not defined in the Act, yet it is a critical term as any information based on such an analysis and associated records can be included in the DNA Database. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Low standards for sharing of information&lt;/strong&gt;: Section 34 empowers the DNA Data Bank Manager to compare a received DNA profile with the profiles stored in the databank and for the purposes of any investigation or criminal prosecution, communicate the information regarding the received DNA profile to any court, tribunal, law enforcement agencies, or DNA laboratory which the DNA Data Bank Manager considers is concerned with it.&lt;br /&gt;&lt;br /&gt;The decision to share compared profiles and with whom should be made by an independent third party authority, rather than the DNA Bank Manager. Furthermore, this provision isvague and although the intention seems to be that the DNA profiles should be matched and the results communicated only in certain cases, the generic wording could take into its ambit every instance of receipt of a DNA profile. For eg. the regulations envisaged under section 31(4)(g) may prescribe for a DNA Data Bank for medical purposes, but section 34 as it is currently worded may include DNA profiles of patients to be compared and their information released to various agencies by the Data Bank Manager as an unintentional consequence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Missing privacy safeguards&lt;/strong&gt;: Though the Bill refers to security and privacy procedures that labs are to follow, these have been left to be developed and implemented by the DNA Board. Thus, except for bare minimum standards and penalties addressing the access, sharing, and use of data – the Bill contains no privacy safeguards. &lt;br /&gt;&lt;br /&gt;In our interactions with the committee we have asked that the Bill be brought in line with the nine national privacy principles established by the Report of the Group of Experts on Privacy submitted to the Planning Commission in 2012. This has not been done.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dna-dissent'&gt;https://cis-india.org/internet-governance/blog/dna-dissent&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-07-21T11:01:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gsma-research-outputs">
    <title>GSMA Research Outputs</title>
    <link>https://cis-india.org/internet-governance/blog/gsma-research-outputs</link>
    <description>
        &lt;b&gt;This is a collection of research under our GSMA project that we have undertaken in collaboration with Privacy International. The research has sought to understand different legal and regulatory aspects of security and surveillance in India and consists of blog entries and reports. Any feedback or comment is welcome. &lt;/b&gt;
        &lt;h3&gt;Indian Law and the Necessary Proportionate Principles&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The presentation shows that there are no comprehensive provisions for the principles of legitimate aim, competent judicial authority, proportionality, transparency, etc. whereas these are partially present for the principles of legality, necessity, adequacy, public oversight, safeguards for international cooperation, etc. The presentation also looks at the Indian intelligence agencies and shows us that there are nine agencies authorized to intercept communications along with at least eleven additional agencies. It further dwelves into the establishment and structure of Indian intelligence agencies and whom they report to, the sharing of information internationally as well as nationally. It shows us that India has MLAT agreements with 36 countries and request to CBI can be initiated informally or formally through court order. It then lists out the various regulatory and important bodies responsible for national security. Some cases of unlawful interception / leaks have been discussed along with examples of arrests based on digital evidence. The various government schemes, the telecommunication companies in India, telecom licenses requirements, government developed security and surveillance solutions, private security companies, security expos, export, import and selling of security and surveillance equipment, and the way forward are also discussed.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Security, Surveillance and Data Sharing Schemes and Bodies in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Following the 2008 Mumbai terrorist attacks, India had implemented a wide range of data sharing and surveillance schemes. Though developed under different governments the purpose of these schemes has been to increase public safety and security by tackling crime and terrorism. As such, two data sharing schemes have been proposed - the National Intelligence Grid (NATGRID) and the Crime and Criminal Tracking Network &amp;amp; Systems (CCTNS), as well as several surveillance systems, such as the Lawful Intercept and Monitoring (LIM) system, the Network Traffic Analysis system (NETRA), state Internet Monitoring Systems and the Central Monitoring System (CMS). This chapter details the various schemes and provides policy recommendations for their improvement, with regards to the protection of the right to privacy and other human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Export and Import of Security Technologies in India: QA&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The write-up examines in question-answer format the standards regulating the export of technologies that can be used for surveillance purposes, the department and legislation that governs exports and imports of security technologies in India, the procedure for obtaining an export licence for the export of SCOMET items, what is ITC (HS) and why is it important, and examples of ITC codes for technologies that can facilitate security or surveillance. The research finds answers to all these queries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Regulation of CCTV’s in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In light of the increasing use and installation of CCTV’s in cities across India, and the role that CCTVs play in the Home Ministry's plans for implementing "Mega Policing Cities", this blog seeks to review various attempts to regulate the use of CCTV's in India, review international best practices, and provide preliminary recommendations for the regulation of CCTV's in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/regulation-of-cctvs-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Mutual Legal Assistance Treaties (MLATs) and Cross Border Sharing of Information in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is unclear the exact process that intelligence agencies in India share information with other agencies internationally. India is a member of Interpol and the Central Bureau of Investigation, which is a Federal/Central investigating agency functioning under the Central Government, Department of Personnel &amp;amp; Training is designated as the National Central Bureau of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/mlats-and-cross-border-sharing-of-information-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Composition of Service Providers in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Telecom, at present, is one of the fastest-growing industries in India. As of January 2014, according to the Telecom Regulatory Authority of India (TRAI) there are 922 million wireless and over the wire subscribers in India, and 56.90 million broadband subscribers including wired, wireless and wimax subscribers. India’s overall wireless teledensity was quoted as having 893.31million subscribers, with a 0.79% (7.02 million) monthly addition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/composition-of-service-providers-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Surveillance and Security Industry in India - An Analysis of Indian Security Expos&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ‘Spy Files’, a series of documents released by whistleblower website WikiLeaks over the last few years, exposed the tremendous growth of the private surveillance industry across the world – a multi-billion dollar industry thriving on increasing governmental and private capabilities for mass surveillance of individuals. These documents showed how mass surveillance is increasingly made possible through new technologies developed by private players, often exploiting the framework of nascent but burgeoning information and communication technologies like the internet and communication satellites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surveillance-and-security-industry-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;An Analysis of News Items and Cases on Surveillance and Digital Evidence in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a technologically advanced era, with preponderance of electronic communications in both professional and social interactions and the ability to store such information in digital form, digital evidence has gained significance in civil as well as criminal litigation in India. In order to match the pace with the progressive technology, the Indian Courts have embarked on placing more and more reliance on the digital evidence and a portion of such digital evidence is obtained through electronic surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Policy Recommendations for Surveillance Law in India and an Analysis of  Legal Provisions on Surveillance in India and the Necessary &amp;amp;  Proportionate Principles&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Government of India has created a legal framework which supports the carrying out of surveillance by authorities through its various laws and license agreements for service providers. The Centre for Internet and Society (CIS) acknowledges that lawful, warranted, targeted surveillance can potentially be a useful tool in aiding law enforcement agencies in tackling crime and terrorism. However, current Indian laws and license agreements appear to overextend the Government's surveillance capabilities in certain cases, while inadequately safeguarding individuals' right to privacy and data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Surveillance Industry in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India has the world's second largest population, an expanding middle class and undoubtedly a huge market which attracts international investors. Some of the world's largest corporations have offices in India, such as Google Incorporated and BlackBerry Limited. In the Information Age, the market revolves around data and companies which produce technologies capable of mining such data are on the rise. Simultaneously, companies selling surveillance technologies appear to be on the peak too, especially since the global War on Terror requires law enforcement agencies around the world to be equipped with the latest surveillance gear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surveillance-industry-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;State of Cyber Security and Surveillance in India: A Review of the Legal Landscape&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;The issue of cyber security and surveillance, especially unauthorised surveillance, though traditionally unprioritised, has recently gained much traction due to the increasing number of news reports regarding various instances of unauthorised surveillance and cyber crimes. In the case of unauthorised surveillance, more than the frequency of the instances, it is their sheer magnitude that has shocked civil society and especially civil rights groups. In the background of this ever increasing concern regarding surveillance as well as increasing concerns regarding cyber security due to the increased pervasiveness of technology in our society, this paper tries to discuss the legal and regulatory landscape regarding surveillance as well as cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gsma-research-outputs'&gt;https://cis-india.org/internet-governance/blog/gsma-research-outputs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>GSMA Research</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-06T14:18:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy">
    <title>Security, Governments and Data: Technology and Policy </title>
    <link>https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy</link>
    <description>
        &lt;b&gt;On January 8, 2015, the Centre for Internet and Society, in collaboration with the Observer research foundation, hosted the day long conference "Security, Governments, and Data: Technology and Policy"  The conference discussed a range of topics including internet governance, surveillance, privacy, and cyber security. &lt;/b&gt;
        &lt;p&gt;The full report written and compiled by Lovisha Aggarwal and Nehaa Chaudhari and edited by Elonnai Hickok &lt;a href="https://cis-india.org/internet-governance/blog/security-governments-data-technology-policy.pdf" class="internal-link"&gt;can be accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The conference was focused on the technologies, policies, and practices around cyber security and surveillance. The conference reached out to a number of key stakeholders including civil society, industry, law enforcement, government, and academia and explored the present scenario in India to reflect on ways forward. The conference was a part of CIS’s work around privacy and surveillance, supported by Privacy International.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Welcome Address&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The welcome address opened with a reference to a document circulated by CIS in 2014 which contained hypothetical scenarios of potential threats to Indian cyber security. This document highlighted the complexity of cyber security and the challenges that governments face in defending their digital borders. When talking about cyber security it is important that certain principles are upheld and security is not pursued only for the sake of security. This approach allows for security to be designed and to support other rights such as the right of access, the right to freedom of expression, and the right to privacy. Indeed, the generation, use, and protection of communications data by the private sector and the government are a predominant theme across the globe today. This cannot be truer for India, as India hosts the third largest population on the internet in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the welcome, a brief introduction to the Centre for Internet and Society was given. It was noted that CIS is a 6.5 half year old organization that is comprised of lawyers, mathematicians, sociologists, and computer scientists and works across multiple focus areas including accessibility, internet governance, telecom, openness, and access to knowledge. CIS began researching privacy and surveillance in 2010, and has recently begun to expand their research into cyber security. The purpose of this is to understand the relationship between privacy, surveillance, and security and is the beginning of a learning process for CIS. In 2013 CIS undertook a process to attempt to evolve a legal regime to intelligently and adequately deal with privacy in India. Industry specific requirements are key in the Indian context and this process was meant to try and evolve a consensus on what a privacy law in India should look like by bringing together key stakeholders for roundtables. CIS is now in the final stages of preparing individual legal proposals that will be sent to the Government – to hopefully have an informed Privacy Law in India. This event represents CIS’s first attempt to have a simultaneous dialogue on surveillance, cyber security, and privacy. As part of this event and research CIS is trying to understand the technology and market involved in surveillance and cyber security as these are important factors in the development of policy and law.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy'&gt;https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-04T05:59:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf">
    <title>Export and Import of Security Technologies in India: Q&amp;A</title>
    <link>https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf'&gt;https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T02:41:05Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf">
    <title>Indian Law and the Necessary Proportionate Principles</title>
    <link>https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf'&gt;https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T02:15:32Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-joins-worldwide-campaign-to-discover-depth-of-gchq-illegal-spying">
    <title>The Centre for Internet and Society joins Worldwide Campaign to Discover Depth of GCHQ's Illegal Spying</title>
    <link>https://cis-india.org/internet-governance/blog/cis-joins-worldwide-campaign-to-discover-depth-of-gchq-illegal-spying</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has joined an international campaign to allow anyone in the world to request whether Britain’s intelligence agency GCHQ has illegally spied on them.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The platform and campaign has been developed in response to a recent court ruling that GCHQ unlawfully obtained millions of private communications from the NSA up until December 2014. This decision allows not only British citizens, but anyone in the world, to ask GCHQ if the individual’s records were unlawfully shared by the NSA.&lt;/p&gt;
&lt;p&gt;Individuals who wish to take part in this process can sign up here: https://www.privacyinternational.org/illegalspying&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy International intends to collate the inquiries from around the world and submit them to the UK Investigatory Powers Tribunal. Those who have been found to have been illegally spied on can then seek the deletion of their records, including emails, phone records, and internet communications. Given the mass surveillance capabilities of the NSA and GCHQ, and that the agencies “share by default” the information they collect, an unlimited number of people could have been affected by the unlawful spying.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Investigatory Powers Tribunal, the UK court solely responsible for overseeing intelligence agencies, ruled on 6 February that intelligence sharing between the United States and the United Kingdom was unlawful prior to December 2014, because the rules governing the UK’s access to the NSA’s PRISM and UPSTREAM programmes were secret. It was only due to revelations made during the course of this case, which relied almost entirely on documents disclosed by Edward Snowden, that the intelligence sharing relationship became subject to public scrutiny.&lt;/p&gt;
&lt;p&gt;The decision was the first time in the Tribunal’s history that it had ruled against the actions of the intelligence and security services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the Centre for Internet and Society – this is a great example of transparency and the ability for individuals to access information held by the government. It is also an important step towards government accountability with respect to state surveillance.&lt;/p&gt;
&lt;p&gt;Eric King, Deputy Director of Privacy International, said:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We have known for some time that the NSA and GCHQ have been engaged in mass surveillance, but never before could anyone explicitly find out if their phone calls, emails, or location histories were unlawfully shared between the US and UK. The public have a right to know if they were illegally spied on, and GCHQ must come clean on whose records they hold that they should never have had in the first place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are few chances that people have to directly challenge the seemingly unrestrained surveillance state, but individuals now have a historic opportunity finally hold GCHQ accountable for their unlawful actions.”&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Brief on “Did GCHQ Spy on You Illegally?”&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Privacy International on Monday February 16th 2015 launched a campaign and platform allowing people to ask the UK’s surveillance court, the Investigatory Powers Tribunal, if GCHQ spied on people illegally. This comes on the heels of our recent legal victory in the IPT, who found that all intelligence sharing from the NSA to GCHQ prior to December 2014 was unlawful.&lt;br /&gt;&lt;br /&gt;As on February 17th night, we had over 10,000 signatures, and at the end of today we expect to have more updated figures. &lt;br /&gt;&lt;br /&gt;While this has been successful thus far, we need your help!&lt;br /&gt;&lt;br /&gt;We need the support of other organisations to truly make this work, and we want your organisation to join as a partner. Being a partner in this can look a few different ways: you can send out emails to your organisation's members, tweet out the links to the platform, or send out a press release to your media contacts telling them you joined the effort.&lt;br /&gt;&lt;br /&gt;We hope you can join, and below we try to address some questions we've been getting about the campaign. There's also an additional FAQ more specifically addressing the campaign itself.&lt;/p&gt;
&lt;h3&gt;What is PI doing?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Simply put: Giving people the chance to remedy illegal government activity and hold intelligence agencies accountable. When someone submits their information through this platform, they are allowing us to go to the IPT on their behalf to find out if they were illegally spied on by GCHQ. &lt;br /&gt;&lt;br /&gt;People could have gone directly to the IPT to ask, but that process is difficult to engage in. We wanted to create a simple, low-barrier way to give people the chance to find out if they were victims of illegal spying.&lt;/p&gt;
&lt;h3&gt;Why are you doing this?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This action is not just about satisfying curiosity. Sure, lots of us are interested in knowing whether our emails have been caught in the NSA and GCHQ’s dragnet surveillance operations, and hopefully through this platform we’ll be able to find out. But, this campaign is about much more than that. &lt;br /&gt;&lt;br /&gt;It is about making GCHQ understand the very personal and individual implications of mass surveillance. And it is about ending the feeling of powerlessness that many of us have felt since discovering, thanks to Edward Snowden, the reality of the almost total surveillance that we’re under. &lt;br /&gt;&lt;br /&gt;We have never done a public campaign like this, but we felt that this ruling was too important to pass up. People have a right to know if they were illegally spied on, and if so, request that their records are deleted. We want to help them assert those rights, and we think you can help too.&lt;/p&gt;
&lt;h3&gt;Why should my organisation join?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We don't get many victories in this space, but we have a rare opportunity to give people the chance to do something! Not just sign a petition, but directly hold intelligence agencies accountable and challenge proven illegal government activity. &lt;br /&gt;&lt;br /&gt;Numbers are important too, not just important to brag about. The greater number of people who sign up actually increases our likelihood of success. That's because when we submit people's details to the IPT, one of the possible outcomes could be that the court tests a sample to see if/where illegality occurred. &lt;br /&gt;&lt;br /&gt;The more people who sign up, the greater chance there is we can prove that people were illegally spied on. If that's the case, we could request that GCHQ delete ALL the records they obtained from NSA prior to December to 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To do that, we need as many people to join. We are not merely interested in building a list, this is not a stunt, and we have no interest in poaching your members. It's simple – more people means greater chance of success.&lt;br /&gt;&lt;br /&gt;Also, this is going to be a long fight on our front. We are going to be dealing with this campaign for the next few months if not few years. As each turn comes along the way, we are going to need your help to keep pressure up and keep people involved. Nothing good comes easy!&lt;/p&gt;
&lt;h3&gt;Is it only for British citizens?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;No. This literally affects everyone who has ever used a phone or computer prior to December 2014, which is pretty much every single person.&lt;br /&gt;&lt;br /&gt;So, anyone around the world is eligible to join this petition! No matter where you are, you’re entitled under British law to bring a claim in the courts to find out whether you were illegally spied on. Given the degree of intelligence collection by the NSA and its close relationship with the British intelligence services, it’s entirely possible that your communications have been scooped up and unlawful handed over to the UK. &lt;br /&gt;&lt;br /&gt;So, what can you do?&lt;/p&gt;
&lt;h2&gt;Four actions you can do:&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Declare your organisation’s support for the campaign!&lt;/b&gt; Email &lt;a href="mailto:mike@privacyinternational.org"&gt;mike@privacyinternational.org&lt;/a&gt; and we'll add your name to the partner section on the petition page.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Tweet the link for the petition to your followers&lt;/b&gt;: &lt;a href="http://www.privacyinternational.org/illegalspying"&gt;www.privacyinternational.org/illegalspying&lt;/a&gt; using the hashtag #DidGCHQSpyOnYou&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Email your supporters and members and encourage them to join the campaign&lt;/b&gt; - if you need further information you can point them to the FAQ on our website or included in this pack: https://www.privacyinternational.org/?q=node/495&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Tweet at or contact notable people in your city or country&lt;/b&gt; - we’ve been tweeting Members of Parliament, influential journalists, movie stars, whomever!&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;FAQ on action&lt;/h2&gt;
&lt;p&gt;URL: &lt;a class="external-link" href="https://privacyinternational.org/?q=node/495"&gt;https://privacyinternational.org/?q=node/495&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Who is able to join?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;EVERYONE! The implications of our recent legal victory against GCHQ in the Investigatory Powers Tribunal means that all intelligence sharing from the NSA to GCHQ was unlawful. Because people located all over the world are affected by illegal intelligence sharing, not only British citizens, but anyone in the world, can ask if their records collected by the NSA were unlawfully shared with GCHQ.&lt;/p&gt;
&lt;h3&gt;Why are we doing this?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Intelligence agencies' culture of secrecy have allowed them, for too long, to avoid public accountability. Whether it’s secret hearings in closed court rooms or committees equipped only with rubber stamps, intelligence agencies like GCHQ have never been forced to answer to the public for their actions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We think you have a right to know whether you have been caught up in GCHQ and NSA's illegal intelligence sharing. If so, you have a right to demand that data be deleted. Privacy International wants to help you assert those rights.&lt;/p&gt;
&lt;h3&gt;Wait what? Why do I have to give GCHQ my data?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We know it sounds absurd but it's the only way! The Tribunal can't act by itself, so it needs people to come forward to file complaints. We've kept information needed to a minimum, but the IPT requires more than your name to attempt to find your communications in GCHQ’s massive databases. If they do locate your data, you can ask them to delete it. Hopefully, if enough people sign up, we can show just how widespread Five Eyes mass surveillance and intelligence sharing is, and get the reform we all need!&lt;/p&gt;
&lt;h3&gt;Will this tell me if GCHQ are currently spying on me?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;No. This campaign will only tell you if NSA shared your communications with GCHQ before December 2014. It won't tell you if GCHQ shared communications with NSA. It also won't tell you if GCHQ intercepted your communications by themselves. Should Privacy International be successful in our appeal to the European Court of Human Rights maybe this will change, but for now, this is limited to just whether NSA shared your communications with GCHQ before December 2014.&lt;/p&gt;
&lt;h3&gt;What will happen once I have entered my details?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;After you hit submit, you'll receive an email asking you to confirm your participation. Make sure you click that link, otherwise your submission won't go through. While these few details are all we need from you now, we may need more information from you in the future. By entering your details, you authorise Privacy International and their legal team to pass your information to GCHQ and the Investigatory Powers Tribunal in order to seek a declaration that your rights under Article 8 and Article 10 of the UK Human Rights Act have been violated and to request your records be deleted.&lt;/p&gt;
&lt;h3&gt;How will I know my communications were illegal shared with GCHQ?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;If the IPT find that your communications were illegally shared with GCHQ, they have to tell you. The Investigatory Powers Tribunal has a statutory obligation to investigate any complaint made against GCHQ. When they receive a complaint, if they think they have all the information required to make a determination, then they will do so, and inform you of the outcome. If not, the IPT can demand more information, a meeting or inspection of files held by GCHQ.&lt;/p&gt;
&lt;h3&gt;Do I get anything if I have been spied on?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Yes. If the IPT is able to establish that you have been illegally spied on, they have to tell you. You will receive a declaration that your privacy rights have been violated and you can request that any information unlawfully obtained be deleted.&lt;/p&gt;
&lt;h3&gt;WiIl GCHQ hold onto my details when they are handed over to them?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;No. GCHQ are only allowed to keep your details for the purposes of establishing whether or not they spied on you illegally and for the duration of the investigation by the IPT.&lt;/p&gt;
&lt;h3&gt;How soon will I receive an answer to whether I was caught up in NSA and GCHQ's illegal spying?&lt;/h3&gt;
&lt;p&gt;It might be a while. This is the first time that such a large group action has been mounted against GCHQ so count on it being many months, and likely years before this action is completed. Nothing worth doing is easy!&lt;/p&gt;
&lt;h3&gt;Is this for all of NSA and GCHQ's programmes?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This legal campaign deals with information collected by the NSA and shared with GCHQ before December 2014, specifically PRISM and UPSTREAM. It doesn't deal with GCHQ initiated interception, but if we're successful with our appeal with the European Court of Human Rights, maybe that could change!&lt;/p&gt;
&lt;h3&gt;Is my email address and phone number enough for GCHQ to find all records?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;No. Unfortunately, we imagine many of GCHQ's databases are unindexed or indexed by a "selector" which could be an IP address, a cookie, a hardware address or almost anything else. For people who want the most comprehensive records searched, much more personal information would have to be provided. Currently we are asking for only your email address and phone number to enable the greatest number of people access to this campaign. If you want to provide more detailed information and a range of selectors to GCHQ, consider submitting your own individual complaint here. We hope to have a detailed guide on how to do so in the next few days.&lt;/p&gt;
&lt;h3&gt;What are Privacy International going to do with this data?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;By entering your details you are authorising Privacy International to pass your information to GCHQ and the Investigatory Powers Tribunal in order to seek a declaration that your privacy rights have been violated. We will provide you with updates on the case and won't use the information for any other purpose. We will only share it with our lawyers, GCHQ and the Investigatory Powers Tribunal.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-joins-worldwide-campaign-to-discover-depth-of-gchq-illegal-spying'&gt;https://cis-india.org/internet-governance/blog/cis-joins-worldwide-campaign-to-discover-depth-of-gchq-illegal-spying&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-03-01T06:13:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights">
    <title>Security and Surveillance – Optimizing Security while Safeguarding Human Rights</title>
    <link>https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) on December 19, 2014 held a talk on “Security and Surveillance – Optimizing Security while Safeguarding Human Rights.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The talk focused on a project that is being undertaken by CIS in collaboration with Privacy International, UK. Initiated in 2014, the project seeks to study the regulatory side of surveillance and related technologies in the Indian context. The main objective of the project is to initiate dialogue on surveillance and security in India, government regulation, and the processes that go into the same. The talk saw enthusiastic participation from civil society members, policy advisors on technology, and engineering students.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the event it was highlighted that requirements of judicial authorization, transparency and proportionality are currently lacking in the legal regime for surveillance in India and at the same time India has a strong system of ‘security’ that service providers must adhere to – which works towards enhancing cyber security in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Discussions played out with regard to how most of the nine intelligence agencies that are authorized to intercept information in India are outside the ambit of parliamentary oversight, the RTI and the CAG, making them virtually unaccountable to the Indian public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another conversation focused on the sharing of information between various intelligence agencies within the country, and the fact that this area is virtually unregulated. The discussion then steered to cyber-security in general, emerging technologies used by the Government of India for surveillance, cooperative agreements for surveillance technologies that India has with other countries, the export and import of such technologies from India, and most importantly, the role of service providers in the surveillance debate, and the regulations they are subject to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A common theme seemed to be emerging from the discussion was that the agencies responsible for regulating information interception and surveillance in the country are shockingly unaccountable to the Indian public. As an active civil society member noted today - &lt;i&gt;“There is no oversight/monitoring of the agencies themselves, so there’s no way anyone would even know of how many instances of surveillance or unauthorized interception have actually occurred.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The talk successfully concluded with inputs from members of the audience, and a broad consensus on the fact that the Government of India would have to adhere to stronger regulatory standards, harmonized surveillance standards, stronger export and import certification standards, etc., in order to make surveillance in India more transparent and accountable. As was stated at the talk, &lt;i&gt;“We don’t have a problem with the concept of surveillance per se, - it has more to do with its problematic implementation”.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights'&gt;https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-13T02:41:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules">
    <title>A Study of the Privacy Policies of Indian Service Providers and the 43A Rules</title>
    <link>https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p&gt;Written by Prachi  Arya and Kartik Chawla&lt;br /&gt;Edited by: Vipul Kharbanda, Elonnai Hickok, Anandini Rathore, and Mukta Batra&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/study-of-privacy-policies-indian-service-providers.pdf" class="internal-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Contents&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957920"&gt;Executive Summary&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957921"&gt;Introduction&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957922"&gt;Objective, Methodology, and Scope of the Study&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957923"&gt;Objective of Research&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957924"&gt;Methodology&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957925"&gt;Scope&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957926"&gt;Criteria for selection of companies being studied&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957927"&gt;Overview of Company Privacy Policy and Survey Results&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957928"&gt;Vodafone&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957929"&gt;Tata Teleservices Limited&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957930"&gt;Airtel&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957931"&gt;Aircel&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957932"&gt;Atria Convergence Technologies&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957933"&gt;Observations&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957934"&gt;International Best Practices&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957935"&gt;Australia&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957936"&gt;European Union&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957937"&gt;Recommendations&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957938"&gt;Annexure 1&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957939"&gt;Annexure 2&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.gjdgxs"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957920"&gt;Executive Summary&lt;/a&gt; &lt;a name="h.30j0zll"&gt;&lt;/a&gt; &lt;a name="h.1fob9te"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;India has one of the largest telecom subscriber base in the world, currently estimated at 898 Million users.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; With over 164.8 Million people accessing the internet	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; in the subcontinent as well, technology has concurrently improved to facilitate 	such access on mobile devices. In fact, the high penetration rate of the internet in the market can be largely attributed to mobile phones, via which over 	80% of the Indian population access the medium.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this is a positive change, concerns now loom over the expansive access that service providers have to the information of their subscribers. For the 	subscriber, a company's commitment to protect user information is most clearly defined via a privacy policy. Data protection in India is broadly governed 	by Rules notified under Section 43A of the Information Technology Act 2000.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Amongst 	other things, the Rules define requirements and safeguards that every Body Corporate is legally required to incorporate into a privacy policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The objective of this research is to understand what standards of protection service providers in India are committing to via organizational privacy 	policies. Furthermore, the research seeks to understand if the standards committed to via organizational privacy policies align with the safeguards 	mandated in the 43A Rules. Towards this, the research reviews the publicly available privacy policies from seven different service providers - Airtel, 	Aircel, Vodafone, MTNL, BSNL, ACT, and Tata Teleservices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The research finds that only Airtel, Vodafone, and Tata Teleservices fully incorporate the safeguards defined in the 43A Rules. Aircel, and ACT incorporate 	a number of such safeguards though not all. On the other hand BSNL minimally incorporates the safeguards, while MTNL does not provide a privacy policy that 	is publicly available.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957921"&gt;&lt;/a&gt; &lt;a name="h.3znysh7"&gt;&lt;/a&gt; Introduction&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The Indian Telecom Services Performance Indicators report by the Telecom Regulatory Authority of India (TRAI)	&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; pegs the total number of internet subscribers in India at 164.81 million and the 	total number of telecom subscribers at 898.02 million, as of March 2013. As mobile phones are adopted more widely, by both rural and urban populations, there is an amalgamation of telecommunications and internet users. Thus, in India, seven out of eight internet users gain access through mobiles phones.	&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this rapid evolution of technology allows greater ease of access to digital communication, it also has led to an increase in the amount of personal 	information that is shared on the internet. Subsequently, a number of privacy concerns have been raised with respect to how service providers handle and 	protect and customer data as companies rely on this data not only to provide products and services, but also as a profitable commodity in and of itself. 	Individuals are thus forced to confront the possible violation of their personal information, which is collected as a &lt;i&gt;quid pro quo &lt;/i&gt;by service 	providers for access to their services and products. In this context, protection of personal information, or data protection, is a core principle of the 	right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, the right to privacy has been developed in a piecemeal manner through judicial intervention, and is recognized, to a limited extent, as falling under the larger ambit of the fundamental rights enshrined under Part III of the Constitution of India, specifically those under Article 21.	&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In contrast, historically in India there has been limited legislative interest 	expressed by the Government and the citizens towards establishing a statutory and comprehensive privacy regime. Following this trend, the Information 	Technology Act, 2000 (IT Act), as amended in 2008, provided for a limited data protection regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, this changed in 2010 when, concerned about India's robust growth in the fields of IT industry and outsourcing business, an 'adequacy assessment' was commissioned by the European Union (EU), at the behest of India, which found that India did not have adequate personal data protection regime.	&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The main Indian legislation on the personal data security is the Information 	Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (Rules), enacted under Section 43A of the 	IT Act, which&lt;b&gt; &lt;/b&gt;extends the civil remedy by way of compensation in case wrongful loss or gain under Section 43A to cases where such loss or 	gain results from inadequate security practices and procedures while dealing with sensitive personal data or information. In 2012, the Justice AP Shah 	group of Experts was set up to review and comment on Privacy,&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; for the purpose of 	making recommendations which the government may consider while formulating the proposed framework for the Privacy Act.&lt;a name="h.2et92p0"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957922"&gt;Objective, Methodology, and Scope of the Study&lt;/a&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957923"&gt;&lt;/a&gt; &lt;a name="h.tyjcwt"&gt;&lt;/a&gt; Objective of Research&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This research aims to analyse the Privacy Policies of the selected Telecommunications (TSP) and Internet Service Providers (ISP) (collectively referred to 	as 'service providers' for the purposes of this research) in the context of the Information Technology (Reasonable Security Practices and Procedures and 	Sensitive Personal Data or Information) Rules ('Rules') in order to gain perspective on the extent to which the privacy policies of different types of 	service providers in India, align with the Rules. Lastly, this research seeks to provide broad recommendations about changes that could be incorporated to 	harmonize the respective policies and to bring them in line with the aforementioned Rules.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957924"&gt;&lt;/a&gt; &lt;a name="h.3dy6vkm"&gt;&lt;/a&gt; Methodology&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policies&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; of seven identified service providers are sought to be 	compared vis-a-vis - the requirements under the Information Technology (Reasonable security practices and procedures and sensitive personal data or 	information) Rules, 2011, (Rules) as notified by way of section 87(2) (ob) read with section 43A of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Specifically, the Privacy Policies of each of the selected companies are compared against a template that is based on of the essential principles of the 	Rules respectively, and consists of a series of yes or no questions which are answered on the basis of the respective Privacy Policy. These responses are 	meant to fulfil the first aim of this research, i.e., provide a perspective into the extent to which these companies follow the Rules and the Principles, 	and thus the extent to which they respect the privacy of their customers. See Annex 1 for the survey template and the interpretation of the 43A Rules for 	the development of the survey.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957925"&gt;&lt;/a&gt; &lt;a name="h.1t3h5sf"&gt;&lt;/a&gt; Scope&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_Toc406957926"&gt;Criteria for selection of companies being studied&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For the purpose of the study the companies selected are limited to service providers - including Telecommunication Service Providers and Internet Service 	Providers. Four broad categories of companies have been selected, namely (i) State Owned Companies, (ii) Multinational Companies, (iii) Joint Venture 	companies where one party is an Indian company and the other party is a foreign based company and (iv) Domestic companies which have a localized user base. 	The companies have been selected on this basis of categorization to better understand if the quality of their respective privacy policies is determined by 	their market reach and user base.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy policies of the following service providers have been analyzed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. State Owned Companies&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;BSNL&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Bharat Sanchar Nigam Limited, better 	known as BSNL, is a state-owned telecommunications company that was incorporated by the Indian government in the year 2000, taking over the functions of 	Central Government departments of Telecommunications Services (DTS) and Telecom Operations (DTO). It provides, &lt;i&gt;inter alia&lt;/i&gt;, landline, mobile, and broadband services, and is India's oldest and largest communication services provider.	&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It had a monopoly in India except for Mumbai and New Delhi till 1992.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;MTNL&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Mahanagar Telephone Nigam Limited is a 	state-owned telecommunications company which provides its services in Mumbai and New-Delhi in India, and Mauritius in Africa. It was set up by the Indian 	Government in the year 1986, and just like BSNL, it had a monopoly in the sector till 1992, when it was opened up to other competitors by the Indian government. It provides, &lt;i&gt;inter alia&lt;/i&gt;, Telephone, Mobile, 3G, and Broadband services.	&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Multinational Companies&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Bharti Airtel Ltd:&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt; Bharti Airtel, more 	commonly referred to as Airtel, is the largest provider of mobile telephony and the second largest provider of fixed telephony in India. Its origins lie in 	the Bharti Group founded by Sunil Bharti Mittal in 1983, and the Bharti Telecom Group which was incorporated in 1986. It is a multinational company, providing services in South Asia, Africa, and the Channel Islands. Among other services, it offers fixed line, cellular, and broadband services.	&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The company also owns a submarine cable landing station in Chennai, connecting 	Chennai and Singapore.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Vodafone&lt;/b&gt;&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;b&gt;:&lt;/b&gt; Vodafone is a British 	multinational telecom company. Its origins lie in the establishment of Racal Telecom in 1982 which then became Racal Vodafone in 1984, which was a joint venture between Racal, Vodafone and Hambros Technology Trust. Racal Telecom was demerged from Racal Electronics in 1991, and became the Vodafone group.	&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Vodafone group started its operations in India with its predecessor Hutchison Telecom, which was a joint venture of Hutchison Whampoa and the Max Group, acquiring the cellular license for Mumbai in 1994&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and it bought out Essar's share in the same in the year 2007.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As of today, it has the second largest subscriber base in India. After Airtel,	&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Vodafone is the largest provider of telecommunications and mobile internet 	services in India.&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Joint Ventures&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Tata Teleservices&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt; - Incorporated in 1996, 	Tata Teleservices Limited is an Indian telecommunications and broadband company, the origins of which lie in the Tata Group. A twenty-six percent equity stake was acquired by the Japanese company NTT Docomo in Tata Docomo, a subsidiary of Tata Teleservices, in 2008.	&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Tata Teleservices provides services under three brand names, Tata DoCoMo, Virgin 	Mobile, and T24 Mobile. As a whole, these brands under the head of Tata Teleservices provide cellular and mobile internet services, with the exception of the Tata Sky teleservices brand, which is a joint venture between and Tata Group and Sky.	&lt;sup&gt; &lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Aircel&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Aircel is an Indian mobile 	headquarter, which was started in Tamil Nadu in the year 1999, and has now expanded to Tamil Nadu, Assam, North-east India and Chennai. It was acquired by Maxis Communication Berhard in the year 2006, and is currently a joint venture with Sindya Securities &amp;amp; Investments Pvt. Ltd.	&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Aircel provides telecommunications and mobile internet services in the 	aforementioned regions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. India based Companies/Domestic Companies -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Atria Convergence Technologies (ACT)&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Atria 	Convergence Technologies Pvt. Ltd is an Indian cable television and broadband services company. Funded by the India Value Fund Advisor (IVFA), it is 	centered in Bangalore, but also provides services in Karnataka, Andhra Pradesh, and Madhya Pradesh.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957927"&gt;Overview of Company Privacy Policy and Survey Results&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This section lays out the ways in which each company's privacy policy aligns with the Rules found under section 43A of the Information Technology Act. The 	section is organized based on company and provides both a table with the survey questions and yes/no/partial ratings and summaries of each policy. The 	rationale and supporting documentation for each determination can be found in Annexure 2.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;VODAFONE&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;b&gt;[31]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Criteria&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes/No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of publicly available documents of the body corporate that 					collect personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Type&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt; Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Grievance Officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Purpose of Collection and usage of information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Disclosure of Information &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Reasonable Security practices and procedures&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="h.4d34og8"&gt;&lt;/a&gt; &lt;br clear="all" /&gt; &lt;a name="_Toc406957928"&gt;&lt;/a&gt; &lt;a name="h.2s8eyo1"&gt;&lt;/a&gt; Vodafone&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Vodafone's privacy policy partially incorporates the safeguards found in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone's privacy policy is accessible online, however, it does not include a copy of its policy with a customer application form. The policy merely lists 	the type of information collected with no categorization as to SPD/I. The information collected includes contact information, location based information, 	browsing activity and persistent cookies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no provision for consent or choice within the policy. Disclosure of personal information to third parties extends to Vodafone's group companies, 	companies that provide services to Vodafone, credit reference agencies and directories.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy mentions an email address for grievance redressal. In addition, the policy does not lay down any mechanism for correcting personal information 	that is held with Vodafone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone has a non-exhaustive list of purposes of information usage, though these primarily relate to subscriber services, personnel training, and legal or 	regulatory requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With regard to security practices, Vodafone follows the ISO 27001 Certification as per its 2012 Sustainability Report, however this goes unmentioned under 	its privacy policy&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Tata Teleservices Limited&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;b&gt;[32]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Criteria&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Yes/No&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Clear and Accessible statements of its practices and policies&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Collection of personal or sensitive personal data/information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Type&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Option&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Grievance Officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Purpose of Collection and usage of information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?					&lt;ins cite="mailto:Vipul" datetime="2014-07-01T14:26"&gt; &lt;/ins&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Disclosure of Information &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Reasonable Security practices and procedures&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957929"&gt;&lt;/a&gt; &lt;a name="h.17dp8vu"&gt;&lt;/a&gt; Tata Teleservices Limited&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Tata Teleservices Limited's Privacy Policy fully incorporates the safeguards found in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Tata Teleservices Limited privacy policy is accessible on their website, though when applying for a subscription, the terms and conditions do not 	include the privacy policy. The privacy policy is easy to understand although there are several elements of the 2011 Rules that are unaddressed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy does not make any distinction regarding sensitive personal data or information. As per the policy, TTL collects contact and billing information, 	information about the equipment the subscriber is using, and information and website usage from its customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The purposes of information collection are broadly for managing customer services and providing customized advertising. Information is also collected for 	security issues, illegal acts and acts that are violative of TTL's policy. TTL's directory services use a customer's name, address and phone number, 	however a customer may ask for his/her information to not be published on payment of a fee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the policy, the disclosure of information to third parties is limited to purposes such as identity verification, bill payments, prevention of 	identity theft and the performance of TTL's services. Third parties are meant to follow the guidelines of TTL's privacy policy in the protection of its 	user information. The consent of subscribers is only required when third parties may use personal information for marketing purposes. Consent is precluded 	under the previous conditions. Disclosure of information to governmental agencies and credit bureaus is for complying with legally authorised requests such 	as subpoenas, court orders and the enforcement of certain rights or claims. The policy provides for a grievance officer and in addition, TTL, has a 	separate Appellate Authority to deal with consumer complaints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TTL does not follow any particular security standard for the protection of subscriber information, however, it establishes other measures such as limited 	access to employees, and encryption and other security controls. Although TTL Maharashtra follows the ISO 27001 ISMS Certification, TTL does not seem to 	follow a security standard for data protection for other regions of its operations.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Airtel&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;b&gt;[33]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Criteria&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Yes/No&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the name and contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Purpose of Collection and usage of information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?					&lt;ins cite="mailto:Vipul" datetime="2014-07-01T14:44"&gt; &lt;/ins&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Disclosure of Information &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Reasonable Security practices and procedures&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.3rdcrjn"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957930"&gt;Airtel&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Airtel's Privacy Policy fully incorporates the safeguards found in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Airtel's privacy policy incorporates a number of the requirements stipulated in the Rules. Airtel's privacy policy is easily accessible on its website and 	is clear and easy to understand. The policy defines sensitive personal information, and states that information collected will be used for specified 	regulatory and business purposes, though it adds that it may be used for other purposes as well. The policy does allow for the withdrawal of consent for 	providing information, in which case, certain services may be withheld. In addition, Airtel has provided for a grievance officer and abides by the 	IS/ISO/IEC 27001 security standards. While Airtel allows for the disclosure of information including sensitive personal information to third parties, its 	policy states that such third parties will follow reasonable security practices in this regard. Concerning disclosure to the government, Airtel shares user 	information only when it is legally authorised by a government agency. Airtel's policy also provides for an opt-out provision. Such choice remains after 	subscription of Airtel's services as well. However, withdrawal of consent gives Airtel the right to withdraw its services as well. In terms of disclosure, 	sharing of user information with third parties is regulated by its Airtel's guidelines on the secrecy of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Airtel lists the purposes for information collection, it states that such collection may not be limited to these purposes alone. In addition, the 	policy states that user's personal information will be deleted, although it does not state when this will happen. Thus, the policy could be more 	transparent and specific on matters of regarding the purpose of collection of information as well as deletion of information.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Aircel&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;b&gt;[34]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Criteria&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes/No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;no&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of Collection and usage of information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure of Information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Reasonable Security practices and procedures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;ins cite="mailto:Vipul" datetime="2014-07-01T14:58"&gt; &lt;/ins&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.26in1rg"&gt;&lt;/a&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957931"&gt;Aircel&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Aircel's Privacy Policy partially complies with the safeguards in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aircel's privacy policy is accessible online through its website, though it is not included under the terms and conditions of its customer application. The 	privacy policy lists the kinds of information that is collected from subscribers, including relevant contact details, call records, browsing history, 	cookies, web beacons, server log files and location details. The policy does not demarcate information into SPD/I or personal information. Aircel provides 	subscribers with the right to withdraw consent from the provision of information before and after subscribing, while reserving the right to withdraw its 	services in this regard. The policy provides the name and contact details of a grievance officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the privacy policy, the stated purposes for use of subscriber information is limited to customer services, credit requirements, market analyses, legal 	and regulatory requirements, and directory services by Aircel or an authorised third party.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the policy, the provision on disclosure to governmental agencies is vague and does not mention the circumstances under which personal information would 	be disclosed to law enforcement. The policy provides for correction of information of a subscriber in case of error and deletion after the purpose of the 	information is served but does not specify when. Although Aircel follows the ISO 27001 standard, it does not mention this under its policy. It does 	however, provide for accountability in cases of breach or privacy.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Atria Convergence Technologies&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;b&gt;[35]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Criteria&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Yes/No&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;information not available&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of Collection and usage of information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure of Information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Reasonable Security practices and procedures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957932"&gt;&lt;/a&gt; &lt;a name="h.lnxbz9"&gt;&lt;/a&gt; Atria Convergence Technologies&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Though Atria Convergence Technologies provides a privacy policy on its website, it does not broadly incorporate the safeguards in the Rules under 43A. 	ACT's privacy policy is easily accessible online and is easy to understand as well. The information collected from subscribers is limited to contact 	details along with information on whether a subscriber has transacted with any of ACT's business partners. Though the privacy policies refers to disclosing 	information for the purpose of assisting with investigating, preventing, or take action on illegal behaviour - there is no specific provision concerning 	disclosure to government and regulatory agencies. The policy does not provide information on any security practices and procedures followed. Provisions for 	withdrawal of consent or correction of personal information are absent from the policy as well.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;BSNL: 43A Rules Survey&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Criteria&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes/No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly states that it is collecting SPD/I?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of Collection and usage of information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure of Information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Reasonable Security practices and procedures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.35nkun2"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;BSNL&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;BSNL's Privacy Policy broadly does not incorporate the safeguards in the Rules under 43A .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;BSNL's privacy is accessible online, though not on the website, and is easy to understand. The policy does not however, categorize SPD/I but defines 	personal information vaguely as information that helps BSNL identify its customers. As per its policy, subscriber information is used for subscriber 	services such as identification, assistance etc., credit-worthiness and marketing communications. The policy does not contain any provision on consent and 	with respect to marketing communications and a customer implicitly agrees to third party usage of personal information. Third parties under the policy are 	those that provide services on behalf of BSNL, which extend mailing and billing services and market research services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per its policy, BSNL may disclose personal information on the basis of legal requirements to credit organisations, BSNL's consultants, government 	agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With respect to access and correction, BSNL reserves the right to modify its privacy policy without notice to its customers. What is presumably a grievance 	officer email address has been provided for queries and corrections on personal information, however no further contact details are given.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.1ksv4uv"&gt;&lt;/a&gt; &lt;b&gt;MTNL&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;MTNL does not provide a publicly available Privacy Policy. &lt;/b&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957933"&gt;&lt;/a&gt; &lt;a name="h.44sinio"&gt;&lt;/a&gt; Observations&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;This section highlights key trends observed across the privacy policies studied in this research by contrasting the applicable Rule against the applicable 	provision in the policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Access and Location of Privacy Policy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; According to Rule 4 of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, a Body 	Corporate must provide a privacy policy on their website. Under Rule 5, all bodies corporate have to convey the purpose(s) for which SPD/I are collected 	prior to the collection and they can, under certain circumstances, move forward with the collection regardless of consent. While this does not entirely 	violate the Notice Principle of the National Privacy Principles, it does not meet the rather higher standards of the Principle, which recommends that 	notice must be provided prior to any form of collection of personal information. In addition, the Rules do not contain provisions regulating bodies 	corporate, regarding changes to their privacy policies.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : In the survey, it was found that the location and accessibility of a service provider's privacy policy varied. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a. &lt;/b&gt; &lt;b&gt;Privacy Policy on main website:&lt;/b&gt; Airtel, Aircel, and Vodafone provide a privacy policy that is accessible through the main website of each respective company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b. &lt;/b&gt; &lt;b&gt;Privacy Policy not on website&lt;/b&gt; : MTNL does not provide a Privacy Policy on the main website of each of its respective branches across India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c. &lt;/b&gt; &lt;b&gt;Privacy Policy not accessible through main website&lt;/b&gt; : TTL and BSNL have a Privacy Policy, but it is not accessible through the main website. For example, The Privacy Policy found on TTL's website is only accessible through the "terms and services" link on the homepage. Similarly, the BSNL privacy policy can only be found through its portal website.	&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;d. &lt;/b&gt; &lt;b&gt;Privacy Policy not included in Customer Application form&lt;/b&gt; : Almost all of the Service Providers do not include/refer to their Privacy Policy in the Customer Application Form, and some do not display their privacy 	policy or a link to it on its website's homepage. For example, Airtel is the only Service Provider that refers to their privacy policy in the Customer 	Application Form for an Airtel service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;e. &lt;/b&gt; &lt;b&gt;Collection of personal information before Privacy Policy: &lt;/b&gt; In some cases it appears that service providers collect private information before the privacy policy is made accessible to the user. For example, before 	the homepage of ACT's website is shown, a smaller window appears with a form asking for personal information such as name, mobile and email Id. Although 	the submission of this information is not mandatory, there is no link provided to the privacy policy at this level of collection of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Sharing of information with Government&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; Rule 6, specifically the proviso to Rule 6, and the Disclosure of Information Principle respectively govern the disclosure of information to third parties. 	Yet, while the proviso to Rule 6 directly concerns the power of the government to access information with or without consent for investigative purposes, 	the Disclosure of Information Principle only says that disclosure for law enforcement purposes should be in accordance with the laws currently in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : Though all service providers did include statements addressing the potential of sharing information with law enforcement or governmental agencies, how 	this was communicated varied. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a.) &lt;/b&gt; &lt;b&gt;Listing circumstances for disclosure to law enforcement&lt;/b&gt; : The Privacy Policy of ACT states 	&lt;i&gt; "We believe it is necessary to share information in order to investigate, prevent, or take action regarding illegal activities, suspected fraud, situations involving potential threats to the physical safety of any person".		&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; The Privacy Policy of Airtel on the other hand states 	&lt;i&gt; "Government Agencies: We may also share your personal information with Government agencies or other authorized law enforcement agencies (LEAs) mandated 		under law to obtain such information for the purpose of verification of identity or for prevention, detection, investigation including but not limited to cyber incidents, prosecution, and punishment of offences."		&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Lastly, TTL states&lt;i&gt; &lt;/i&gt;" 	&lt;i&gt; To investigate, prevent or take action regarding illegal activities, suspected fraud, situations involving potential threats to the physical safety of 		any person" or "To notify or respond to a responsible governmental entity if we reasonably believe that an emergency involving immediate danger of death or serious physical injury to any person requires or justifies disclosure without delay".		&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b.) &lt;/b&gt; &lt;b&gt;Listing authorities to whom information will be disclosed to&lt;/b&gt; : The privacy policy of&lt;i&gt; &lt;/i&gt;Aircel states 	&lt;i&gt; "There may be times when we need to disclose your personal information to third parties. If we do this, we will only disclose your information to: 		…8. Persons to whom we may be required to pass your information by reason of legal, governmental or regulatory authority including law 		enforcement agencies and emergency services".&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Similarly&lt;i&gt;, &lt;/i&gt;Vodafone&lt;i&gt; &lt;/i&gt;states 	&lt;i&gt; "There may be times when we need to disclose your personal information to third parties. If we do this, we will only disclose your information to 		persons to whom we may be required to pass your information by reason of legal, governmental or regulatory authority including law enforcement agencies and emergency services and any person or organisation as authorised by laws and regulations applicable in India."		&lt;a href="#_ftn42" name="_ftnref42"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; While BSNL states 	&lt;i&gt; "Apart from the above, BSNL may divulge your personal information to: Government bodies, Regulatory Authorities, and other organizations in accordance 		with the law or as authorised by law…".&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Readability of Privacy Policies&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle&lt;/b&gt; : In subsection (i) of Rule 4 body corporate must provide a privacy policy that is "&lt;i&gt;clear and accessible&lt;/i&gt;". Similarly, the Notice Principle requires that the data controller give a "	&lt;i&gt;simple-to-understand notice of its information practices to all individuals, in clear and concise language&lt;/i&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : It was found that, particularly with respect to clauses on the collection and disclosure of information, most Privacy Policies use:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Vague terminology: &lt;/b&gt;For example, in the Privacy Policy of ACT, it states as a purpose of collection &lt;i&gt;"conduct research" &lt;/i&gt;while 	for the collection and disclosure of information it states 	&lt;i&gt; ,"The Company may combine information about you that we have, with information we obtain from business partners or other companies. The Company shall have the right to pass on the same to its business associates, franchisees without referring the same to you."		&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Similarly, with regards to the collection of information, Vodafone's Privacy Policy states that it may collect 	&lt;i&gt; "any other information collected in relation to your use of our products and services".		&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Undefined terminology:&lt;/b&gt; On disclosure of information TTL's privacy policy states disclosure is 	&lt;i&gt; "Subject to applicable legal restrictions, such as those that exist for Customer Proprietary Network Information (CPNI)"		&lt;a href="#_ftn46" name="_ftnref46"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Confusingly, although TTL defines CPNI it does not mention what legal restriction it is referring to, and CPNI is in fact an American term and similar 	legal restrictions could not be found in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Information about security practices&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; The parameter for 'reasonable security practices and procedures' has been detailed comprehensively under Rule 8 of the Rules. The same is also covered in 	detail under the Openness Principle read with Security Principle. While the Security Principle recommends that the data controller protect the information 	they collect through reasonable security safeguards, the Openness Principle recommends that information regarding these should be made available to all 	individuals in clear and plain language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : With the exception of Airtel, no service provider has comprehensively followed the legal requirements for the purpose of their privacy policy. Thus, 	while most service providers do mention security practices, many do not provide specific or comprehensive details about their security practices and 	procedures for data protection, and instead assure users that 'reasonable security' procedures are in place. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Comprehensive information about security practices in privacy policy&lt;/b&gt;: Airtel and Aircel have provided comprehensive information about 	their security practices in the companies Privacy Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Information about security practice, but not in privacy policy&lt;/b&gt;: Vodafone has specified its security standards only in its latest 	'Sustainability Report' available on its website. In the case of TTL, the specific security standard it follows is available only for its Maharashtra 	branch (TTLM) through its annual report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Broad reference to security practices&lt;/b&gt;: Many service providers broadly reference security practices, but do not provide specifics. For example, TTL states only &lt;i&gt;"we have implemented appropriate security controls to protect Personal Information when stored or transmitted by TTL&lt;/i&gt;."	&lt;a href="#_ftn47" name="_ftnref47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. &lt;b&gt;No information about security practices: &lt;/b&gt;Some service providers do not mention any details about their security practices and 	procedures, or whether they even follow any security practices and procedures or not. An example of this would be ACT, which does not mention any security 	practices or procedures in its Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Grievance mechanisms&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; Rule 5 of the Rules mandates that applicable bodies corporate must designate a 'Grievance Officer' for redressing grievances of users regarding processing 	of their personal information, and the same is also recommended by the Ninth Principle, i.e., Accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : It was found that adherence with this requirement varied depending on service provider. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;No Grievance Officer:&lt;/b&gt; ACT and MTNL do not provide details of a grievance officer on their websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Grievance Officer, but no process details&lt;/b&gt;: Airtel, TTL, and Vodafone provide details of the Grievance Officer, but no further 	information about the grievance process is provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Grievance Officer and details of process: &lt;/b&gt;Aircel&lt;b&gt; &lt;/b&gt;provides details of the grievance officer and grievance process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;As a note:&lt;/b&gt; All service providers with the exception of ACT have a general grievance redressal mechanism in place as documented on TRAI's website.	&lt;a href="#_ftn48" name="_ftnref48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is unclear whether these mechanisms are functional, and furthermore it is 	also unclear if these mechanisms can be used for complaints under the IT Act or the Rules, or complaints on the basis of the Principles. It should be 	further noted that the multiplicity of grievance redressal officers is a cause for concern, as it may lead to confusion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Consent Mechanism &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle&lt;/b&gt; : Rules 5 and 6 of the Rules&lt;a href="#_ftn49" name="_ftnref49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; on Collection and Disclosure of information, 	respectively, require applicable bodies corporate to obtain consent/permission before collecting and disclosing personal information. The Choice and Consent Principle of the National Privacy Principles, as enumerated in the A.P. Shah Report, deals exclusively with choice and consent.	&lt;a href="#_ftn50" name="_ftnref50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Withdrawal of consent is an important facet of the choice and consent principle as evidenced by the Rules&lt;a href="#_ftn51" name="_ftnref51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the National Privacy Principles	&lt;a href="#_ftn52" name="_ftnref52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation:&lt;/b&gt; Methods of obtaining consent and for what consent was obtained for varied across service providers. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a. &lt;/b&gt; &lt;b&gt;Obtaining consent:&lt;/b&gt; Some service providers give data subjects with the choice of submitting their personal information (with some exceptions such as for legal requirements) 	and obtaining their consent for its collection and processing. For example, the policies of Airtel, Aircel, and TTL are the only ones which provide 	information on the mechanisms used to obtain consent. ACT provides for targeted advertisements based on the personal information of the user. The viewing 	or interaction of the user of such targeted advertisements is however, considered an affirmation to this third party source, that the user is the targeted 	criteria. Thus, there appears to be lack of consent in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b. &lt;/b&gt; &lt;b&gt;No Consent or choice offered:&lt;/b&gt; Some service providers do not mention consent. For example, Vodafone, and BSNL do not make any mention of choice or consent in their respective privacy 	policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c. &lt;/b&gt; &lt;b&gt;Consent for limited circumstances: &lt;/b&gt; Some service providers only provide consent in limited circumstances. For example, ACT mentions consent only in relation to targeted advertising. However, 	this information is potentially misleading, as discussed earlier in the survey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also a certain degree of assumption in all the policies regarding consent, as noted in the survey. Thus, if you employ the services of the company 	in question, you are implicitly agreeing to their terms even if you have not actually been notified of them. And the vague terminology used by most of the 	policies leaves quite a lot of wiggle room for the companies in question, allowing them to thereby collect more information than the data subject has been 	notified of without obtaining his or her consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Transparency mechanism&lt;/b&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; The Openness Principle specifically recommends transparency in all activities of the data controller.	&lt;a href="#_ftn53" name="_ftnref53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Rules provide a limited transparency mechanism under Rule 8 which require 	bodies corporate to document their security practices and procedures and Rule 4 which requires them to provide such information via a privacy policy. As a 	note, these fall short of the level of 'transparency' espoused by the Openness Principle of the National Privacy Principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation: &lt;/b&gt; All service providers fail in implementing adequate mechanisms for transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt; &lt;b&gt;Scope&lt;/b&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle&lt;/b&gt; : Though the Openness Principle does not directly speak of the scope of the policies in question, it implies that policies regarding all data collection or 	processing should be made publically available. The same is also necessary under Rule 4, which mandates that any body corporate which " 	&lt;i&gt; collects, receives, possess, stores, deals or handle information of provider of information, shall provide a privacy policy for handling of or dealing 		in personal information including sensitive personal data or information and ensure that the same are available for view by such providers of 		information who has provided such information under lawful contract. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : Though most of the companies mention the scope of their Privacy Policy and include the information collected through the websites, WAP Services, and use 	of the company's products and services, some companies do not do so. For instance, the scope of the policy is given rather vaguely in the Airtel's Policy, 	and the scope of ACT's policy is restricted to the information collected during the usage of their products and services, and not their website. BSNL's 	privacy policy is worrisome as it seems to restrict its scope to the information collected through the website only, but does not at the same time state 	that it does not apply to other methods of data collection and processing.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957934"&gt;&lt;/a&gt; &lt;a name="h.2jxsxqh"&gt;&lt;/a&gt; International Best Practices&lt;/h1&gt;
&lt;h3&gt;&lt;b&gt;Canada&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The privacy regulation regime in Canada is a mixture of the federal regulations and the provincial regulations. Of the former, the Privacy Act is 	applicable to the public sector, while the Personal Information Protection and Electronic Documents Act ('PIPEDA') applies to the private sector. There are 	also federal level sectoral regulations, of which the Telecommunications Act is relevant here. The PIPEDA covers the activities of all businesses and 	federally regulated industries regarding their collection, use, disclosure, safeguarding and provision of access to their customers' personal information. Further, in 2009, the Canadian Radio-television and Telecommunications Commission ('CRTC'), by virtue of the 'Telecom Regulatory Policy CRTC 2009-657'	&lt;a href="#_ftn54" name="_ftnref54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; made ISPs subject to privacy standards higher than the standards given under the PIPEDA, while at the same time allowing them to use Internet Traffic Management Practices ('ITMPs').	&lt;a href="#_ftn55" name="_ftnref55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2009 policy is progressive as it balances the economic needs of Internet Traffic Management Providers vis-à-vis the privacy concerns of consumers. 	The need to identify ITMP's is integral in the protection of online privacy, as ITMP's most commonly employ methods such as deep packet inspection which 	can be used to burrow into personal information of consumers as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recognising that this may not be the current practice, but a possibility in the future, the policy makes certain guidelines for ITMPs. It permits ITMP's 	that block bad traffic such as spam and malicious software. Nearly all other ITMPs however, require the prior notice of 30 days or more before initialising 	the ITMP.&lt;a href="#_ftn56" name="_ftnref56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITMP's are to be used only for the defined need of the ISP and not beyond this, and must not be used for behavioural advertising. Secondary ISPs in their 	contracts with Primary ISPs must agree to the same duties of the latter, that is the personal information entrusted to them is meant for its purpose alone 	and is not to be disclosed further.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957935"&gt;Australia&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The central privacy regulation in Australia is the Privacy Act, 1988. The Act defines two sets of privacy principles, the Information Privacy Principles which apply to the public sector, and the National Privacy Principles which apply to the private sector.&lt;a href="#_ftn57" name="_ftnref57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These principles govern the following: collection,&lt;a href="#_ftn58" name="_ftnref58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; use and disclosure,&lt;a href="#_ftn59" name="_ftnref59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; data quality,&lt;a href="#_ftn60" name="_ftnref60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; security,&lt;a href="#_ftn61" name="_ftnref61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; openness,&lt;a href="#_ftn62" name="_ftnref62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; access and correction,&lt;a href="#_ftn63" name="_ftnref63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; identifiers,&lt;a href="#_ftn64" name="_ftnref64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; anonymity,&lt;a href="#_ftn65" name="_ftnref65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; trans-border data flows,&lt;a href="#_ftn66" name="_ftnref66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and sensitive information.	&lt;a href="#_ftn67" name="_ftnref67"&gt;&lt;sup&gt;&lt;sup&gt;[67]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Telecommunications Act, 1997, is also relevant here, as it also governs the use or disclosure of information by telecommunication services providers,	&lt;a href="#_ftn68" name="_ftnref68"&gt;&lt;sup&gt;&lt;sup&gt;[68]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; but such information is only protected by the Telecommunications Act if it comes 	to a person's knowledge or possession in certain circumstances. An example of this is Section 276 of the same, which providers that the information 	protected by that section will be protected only if the person collecting the information is a current or former carrier, carriages service provider or 	telecommunications contractor, in connection with the person's business as such a carrier, provider or contractor; or if the person is an employee of a 	carrier, carriage service provider, telecommunications contractor, because the person is employed by the carrier or provider in connection with its 	business as such a carrier, provider or contractor.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957936"&gt;European Union&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The most important source of law in the European Union ('EU') regarding Data Privacy in general is the Data Protection Directive ('Directive').	&lt;a href="#_ftn69" name="_ftnref69"&gt;&lt;sup&gt;&lt;sup&gt;[69]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive has a broad ambit, covering all forms of personal data collection and processing, and mandating that such collection or processing follow the Data Protection Principles it sets out.&lt;a href="#_ftn70" name="_ftnref70"&gt;&lt;sup&gt;&lt;sup&gt;[70]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive differentiates between Personal Data and Sensitive Personal Data,	&lt;a href="#_ftn71" name="_ftnref71"&gt;&lt;sup&gt;&lt;sup&gt;[71]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; with the collection and processing of the latter being subject to more stringent 	rules. The telecommunications service providers and internet service providers are included in the definition of 'Controller' as set out in the Directive, and are hence subject to the regulations enforced by the member states of the EU under the same.	&lt;a href="#_ftn72" name="_ftnref72"&gt;&lt;sup&gt;&lt;sup&gt;[72]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive will soon be superseded by the General Data Protection directive, which is scheduled to come into force in late 2014, with a two-year transition period after that.	&lt;a href="#_ftn73" name="_ftnref73"&gt;&lt;sup&gt;&lt;sup&gt;[73]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the above, ISPs are also subject to the Directive on Privacy and Electronic Communications&lt;a href="#_ftn74" name="_ftnref74"&gt;&lt;sup&gt;&lt;sup&gt;[74]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the Data Retention Directive.	&lt;a href="#_ftn75" name="_ftnref75"&gt;&lt;sup&gt;&lt;sup&gt;[75]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive on Privacy and Electronic Communications ('E-Privacy Directive') 	sets out rules regarding processing security, confidentiality of communications, data retention, unsolicited communications, cookies, and a system of 	penalties set up by the member states under the title of 'Control'. The E-Privacy Directive supplements the original Data Privacy Directive, and replaces a 	1997 Telecommunications Privacy directive. The Data Retention Directive does not directly concern the collection and processing of data by a service 	provider, but only concerns itself with the retention of collected data. It was an amendment to the E-Privacy Directive, which required the member states 	to store the telecommunications data of their citizens for six to twenty-four months, and give police and security agencies access to details such as IP 	addresses and time of use of e-mails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The established practices considered above have the following principles, relevant to the study at hand, in common:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Notice&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Collection Limitation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Use Limitation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Access and Corrections&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Security&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Data Quality and Accuracy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Consent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. Transparency&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And the following principles are common between two of the three regimes discussed above:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. The PIPEDA and the Privacy Act both mention rules regarding Disclosure of collecting information, but the Data Protection Directive does not directly 	govern disclosure of collected information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The Principles of Accountability is covered by the Data Protection Directive and the PIPEDA, but is not directly dealt with by the Privacy Act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. The PIPEDA and the Data Protection Directive directly mention the principle of Enforcement, but it is not directly covered by the Privacy Act.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957937"&gt;&lt;/a&gt; &lt;a name="h.z337ya"&gt;&lt;/a&gt; Recommendations&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;Broadly, service providers across India could take cognizance of the following recommendations to ensure alignment with the Rules found under section 43A 	and to maximize the amount of protection afforded to customer data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;b&gt;Access and location of privacy policy:&lt;/b&gt; Service providers should ensure that the privacy policy is easily accessible through the main 	page of the company's website. Furthermore, the Privacy Policy should be accessible to users prior to the collection of personal information. All 'User 	Agreement' forms should include a written Privacy Policy or a reference to the Privacy Policy on the service provider's website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;b&gt;Scope of privacy policy:&lt;/b&gt; The privacy policy should address all practices and services offered by the service provider. If a service 	requires a different or additional privacy policy, a link to the same should be included in the privacy policy on the main website of the service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;b&gt;Defining consent&lt;/b&gt;: The Privacy Policy should clearly define what constitutes 'consent'. If the form of consent changes for different 	types of service, this should be clearly indicated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. &lt;b&gt;Clear language:&lt;/b&gt; The language in the Privacy Policy should be clear and specific, leaving no doubt or ambiguity with regards to the 	provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. &lt;b&gt;Transparent security practices:&lt;/b&gt; The Privacy Policy should include comprehensive information about a company's security practices should 	be included in the Privacy Policy. Information pertaining to audits of these procedures should be made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. &lt;b&gt;Defined and specified third parties:&lt;/b&gt; The Privacy Policy should define 'third party' as it pertains to the company's practices and 	specify which third parties information will be shared with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. &lt;b&gt;Comprehensive grievance mechanism: &lt;/b&gt;The Privacy Policy should include relevant details for users to easily use established grievance 	mechanisms. This includes contact details of the grievance officers, procedure of submitting a grievance, expected response of the grievance officer 	(recognition of the grievance, time period for resolution etc.), and method of appealing decision of the grievance officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. &lt;b&gt;Specify laws governing disclosure to governmental agencies and law enforcement:&lt;/b&gt; The Privacy Policy should specify under what laws and 	service providers are required disclose personal information to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. &lt;b&gt;Inclusion of data retention practices:&lt;/b&gt; The Privacy Policy should include provisions defining the retention practices of the company.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957938"&gt;&lt;/a&gt; &lt;a name="h.3j2qqm3"&gt;&lt;/a&gt; Annexure 1&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.1y810tw"&gt;&lt;/a&gt; Explanation and Interpretation of Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 	2011&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 43A under the Information Technology Act 2000 addresses the protection of sensitive personal data or information and the implementation of an 	information security management system, and the Rules framed under section 43A attempt establish a holistic data security regime for the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following section is a description of the requirements found under section 43A and subsequent Rules with respect to information that must be included 	in the privacy policy of a 'body corporate' and procedures that must be followed by 'body corporate' with respect to the publishing and notice of a privacy 	policy. This section also includes an explanation of how each relevant provision has been interpreted for the purpose of this research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Relevant provisions that pertain to the privacy policy of body corporate &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 3:&lt;/b&gt; This section defines the term 'Sensitive Personal Data or Information', setting out the six types of information that are considered 'sensitive personal 	data' including:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Password - Defined under the Rules as "a secret word or phrase or code or passphrase or secret key, or encryption or decryption keys that one uses to 	gain admittance or access to information"&lt;a href="#_ftn76" name="_ftnref76"&gt;&lt;sup&gt;&lt;sup&gt;[76]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Financial information - "such as Bank account or credit card or debit card or other payment instrument details"	&lt;a href="#_ftn77" name="_ftnref77"&gt;&lt;sup&gt;&lt;sup&gt;[77]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iii. Physical, physiological and mental health condition&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iv. Sexual orientation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;v. Medical records and history&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;vi. Biometric information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The two other broad categories of Sensitive Personal Data or Information that are included in the Rule are - any related details provided to the body corporate, and any information received by the body corporate in relation to the categories listed above.	&lt;a href="#_ftn78" name="_ftnref78"&gt;&lt;sup&gt;&lt;sup&gt;[78]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proviso to this section excludes any information available in the public domain or which may be provided under the Right to Information Act, 2005 from 	the ambit of SPD/I.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Rules, Sensitive Personal Data is considered to be a subset of Personal Information - which has been defined by Section 2 (1) (i) as " 	&lt;i&gt; any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be 		available with a body corporate, is capable of identifying such person &lt;/i&gt; "&lt;a href="#_ftn79" name="_ftnref79"&gt;&lt;sup&gt;&lt;sup&gt;[79]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation:&lt;/b&gt; While the Rules are clearly limited to personal and sensitive personal data or information, the use of these terms throughout the Rules is not consistent. 	For example, some provisions under the Rules ambiguously use the term 'information' in place of the terms 'personal information' and/or 'sensitive personal 	information'.&lt;a href="#_ftn80" name="_ftnref80"&gt;&lt;sup&gt;&lt;sup&gt;[80]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; While 'information' has been defined non-exhaustively as any 'data, 	message, text, images, sound, voice, codes, computer programs, software and databases or micro film or computer generated microfiche' in the Act, this definition appears to be overbroad and cannot be applied in that form for the purpose of provisions on privacy policy.	&lt;a href="#_ftn81" name="_ftnref81"&gt;&lt;sup&gt;&lt;sup&gt;[81]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Hence, 'information', when used in the Rules, is construed to mean 'personal 	information' including 'sensitive personal information' for the purpose of this survey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per Rule 3, information in the public domain isn't classified as sensitive personal data. This exception may require a relook considering that 	'providers' of information' may not want their data to be disclosed beyond its initial disclosure, or in certain cases, they may not even know of its 	existence in the public domain. Since the notice of collection, purpose and use of information is limited to SPD alone under Rule 5, information in the 	public domain should be seen together with whether the provider of information has provided the latter directly or to service provider that requires the 	information. If the source is the information provider directly, it need not be classified as SPD.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On a positive note, the addition of the term "in combination with other information available or likely to be available", gives recognition to the 	phenomenon of convergence of data. Parts of information that seem of negligible importance, when combined, provide a fuller personal profile of an 	individual, the recognition of this, in effect, gives a far wider scope to personal information under the Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the specific context of Privacy Policies, the Rules do not stipulate whether the mandated privacy policy has to explicitly mention SPD/I that is 	collected or used.{This is mentioned under Rule 4(ii) and (iii)} Since Rules do require that a privacy policy must be clear, it is construed that the 	privacy policy should explicitly recognize the type of PI and SPD/I being collected by the company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 4:&lt;/b&gt; This rule mandates that a "&lt;i&gt;body corporate that collects, receives possess, stores, deals or handles information of the provider of information&lt;/i&gt;". 	For the purposes of this research, this entity will be referred to as a 'data controller'. According to Rule 4, every data controller must provide a 	privacy policy on its website for handling of or dealing in personal information including sensitive personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following details have to be included in the privacy policy -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"(i) Clear and easily accessible statements of its practices and policies;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Type of personal or sensitive personal data or information collected under rule 3;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Purpose of collection and usage of such information;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Disclosure of information including sensitive personal data or information as provided in rule 6;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Reasonable security practices and procedures as provided under rule 8."&lt;a href="#_ftn82" name="_ftnref82"&gt;&lt;sup&gt;&lt;sup&gt;[82]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; : The Rules do not provide an adequate understanding of the terms 'clear' and 'accessible', and the terms 'practices' and 'policies' are not defined. For 	the purpose of this research, 'practices' will be construed to mean the privacy policy of the company. It is deemed to be clear and accessible if it is 	available either directly or through a link on the main website of the body corporate. To meet the standards set by this Rule, the policy or policies 	should disclose information about the company's services, products and websites, whenever personal information is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 5:&lt;/b&gt; This Rule establishes limits for collection of information. It states that prior informed consent has to be obtained by means of letter, fax or email from 	the user regarding the purpose of usage for the sensitive personal information sought to be collected. It limits the purpose for collection of SPD/I to 	collection for a lawful purpose connected with a function or activity of the body corporate or any person on its behalf and only if it is considered necessary for that purpose. Thus, the information collected can only be used for the stated purpose for which it has been collected.	&lt;a href="#_ftn83" name="_ftnref83"&gt;&lt;sup&gt;&lt;sup&gt;[83]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, Rule 5 (3) provides that consent has to be obtained and knowledge provided to a person from whom personal information is being directly collected 	- which for service providers - is understood to be through the customer application form. This rule will be deemed to have been complied with when the 	following information is provided -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. The fact that the information is being collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. The purpose of such collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Intended recipients of the collected information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. Names and addresses of the agency or agencies collecting and retaining information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, it provides that the user has to be given the option of not providing information prior to its collection. In case the user chooses this option 	or subsequently withdraws consent the body corporate has the option to withhold its services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This section also provides under Section 5 (2) (a) that the type of information that this Rule concerns itself with can only be collected for a lawful 	purpose connected with a function or activity of the body corporate or any person on its behalf and if it is considered necessary for that purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also requires that a Grievance Officer be instated to redress the grievance "	&lt;i&gt;expeditiously but within one month from the date of receipt of grievance.&lt;/i&gt;" The Grievance Redressal process has been discussed in more detail 	later.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation:&lt;/b&gt; Even though Rule 5 incorporates various major data protection principles and mandates the establishment of a Grievance Redressal Mechanism, neither Rule 5 	nor Rule 4 (3) makes a reference to the other. [Rule 4(3) uses the term "such information", and the fact that it follows Rule 4(2) which clearly refers to 	personal information as well as SPD/I, means that Rule 4(3) also refers to the same]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prima facie&lt;/i&gt; , the scope of Rule 5 is limited to collection of SPD/I. However, Rule 4 (3) ostensibly covers the broad ambit of 'information' which includes SPD/I. Construing these two provisions together using the 'Harmonious Construction' principle	&lt;a href="#_ftn84" name="_ftnref84"&gt;&lt;sup&gt;&lt;sup&gt;[84]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Rule 5 could be interpreted to cover personal information for privacy policies 	under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, Rule 5(3) doesn't expand on the reasonable steps to be taken for intimating the information provider on the extent of disclosure and purpose 	of collection. This appears as a rather large loophole considering the wide interpretation that can be given to 'reasonable' practices of service 	providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 6:&lt;/b&gt; This rule lays down the conditions and procedure for disclosure of information.&lt;a href="#_ftn85" name="_ftnref85"&gt;&lt;sup&gt;&lt;sup&gt;[85]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Under it, the following conditions apply before any disclosure of information by the 'body corporate' to any third party -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. The body corporate is required to obtain prior permission from the provider of the information, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Permission to disclose has to be agreed on in the contract between the company and the data subject, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Disclosure is necessary for the compliance of a legal obligation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An exception is made in case the disclosure is made to an authorized and legally mandated Government agency upon request for the purposes of verification 	of identity, for prevention, detection, and investigation of incidents, specifically including cyber incidents, prosecution, and punishment of offences, in 	which case no consent from the data subject will be required. Thus, the company does not need user consent to disclose information to authorized law 	enforcement or intelligence agencies when presented with an authorized request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The guidelines for disclosure limit themselves to SPD under Rule 6 leaving a vacuum with respect to information that doesn't fall within the definition of 	SPD/I. However, Rule 4 (iv)'s applies to 'information including SPD'. Reading the two together, in accordance with the 'Harmonious Construction' principle, 	the scope of SPD/I in Rule 6 is construed to extend to the same personal information and SPD/I as is covered by Rule 4 (iv), for the limited purpose of the 	privacy policies under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 7&lt;/b&gt; : This Rule requires that when the data controller transfers SPD/I to another body corporate or person, such a third party must adhere to the same 	standards of data protection that the body corporate collecting the information in the first instance follows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; : Although the privacy policy is not required to provide details of the transfer of information, the fourth sub-section of Rule 4, which concerns itself 	with the obligation of the body corporate to provide a policy for privacy including information about the disclosure of information to its consumers, 	incorporates this Rule as it deals with disclosure of information to third parties. Thus, the Policy of the body corporate must include details of the way 	the data is handled or dealt by the third party, which is shared by the body corporate in question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 8:&lt;/b&gt; This Rule details the criteria for reasonable security practices and procedures.&lt;a href="#_ftn86" name="_ftnref86"&gt;&lt;sup&gt;&lt;sup&gt;[86]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It provides that not only must the body corporate have implemented standard security practices and procedures, but it should also have documented the 	information security program and policies containing appropriate "&lt;i&gt;managerial, technical, operational and physical security control measures&lt;/i&gt;". The 	Rule specifically uses the example of IS/ISO/IEC 27001 as an international standard that would fulfill the requirements under this provision. The security 	standards or codes of best practices adopted by the company are required to be certified/audited by a Government approved independent auditor annually and 	after modification or alteration of the existing practice and procedure. Sub-section (1) of the Rule also gives the body corporate the option of creating 	its own security procedures and practices for dealing with managerial, technical, operational, and physical security control, and have comprehensive 	documentation of their information security programme and information security policies. These norms should be as strict as the type of information 	collected and processed requires. In the event of a breach, the body corporate can be called to demonstrate that these norms were suitably implemented by 	it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; : It is unclear whether the empanelled IT security auditing organizations recognized by CERT-In discussed later are qualified for the purpose of this Rule, 	but from publicly available information the Data Security Council of India and CERT-In's empanelled Security Auditors seem to be the agencies given this 	task&lt;a href="#_ftn87" name="_ftnref87"&gt;&lt;sup&gt;&lt;sup&gt;[87]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. With regards to the Privacy Policy or Policies of a company, it is only 	necessary that the company include as many details as possible regarding the steps taken to ensure the security and confidentiality of the collected 	information in the Privacy Policy and Policies, and notify them to the consumer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Relevant Policies:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Empanelled Information Technology Security Auditors&lt;/b&gt; - CERT-In has created a panel of 'IT Security Auditors' for auditing networks &amp;amp; applications of various organizations of the Government, critical infrastructure organizations and private organizations including bodies corporate.&lt;a href="#_ftn88" name="_ftnref88"&gt;&lt;sup&gt;&lt;sup&gt;[88]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The empanelled IT security auditing organization is required to,	&lt;i&gt;inter alia&lt;/i&gt;, conduct a " 	&lt;i&gt; Review of Auditee's existing IT Security Policy and controls for their adequacy as per the best practices vis-à-vis the IT Security frameworks 		outlined in standards such as COBIT, COSO, ITIL, BS7799 / ISO17799, ISO27001, ISO15150, etc." &lt;/i&gt; &lt;a href="#_ftn89" name="_ftnref89"&gt;&lt;sup&gt;&lt;sup&gt;[89]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and conduct and document various assessments and tests. Some typical reviews and tests that include privacy reviews are - Information Security Testing, 	Internet Technology Security Testing and Wireless Security Testing.&lt;a href="#_ftn90" name="_ftnref90"&gt;&lt;sup&gt;&lt;sup&gt;[90]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For this 	purpose CERT-In maintains a list of IT Security Auditing Organizations&lt;a href="#_ftn91" name="_ftnref91"&gt;&lt;sup&gt;&lt;sup&gt;[91]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.4i7ojhp"&gt;&lt;/a&gt; &lt;b&gt;Criteria for analysis of company policies based on the 43A Rules &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Clear and Accessible statements of its practices and policies&lt;a href="#_ftn92" name="_ftnref92"&gt;&lt;sup&gt;&lt;sup&gt;[92]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects personal 	information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iii. Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Type and acknowledgment of personal or sensitive personal data/information collected	&lt;a href="#_ftn93" name="_ftnref93"&gt;&lt;sup&gt;&lt;sup&gt;[93]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy explicitly states that personal and sensitive personal information will be collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Option to not provide information and withdrawal of consent&lt;a href="#_ftn94" name="_ftnref94"&gt;&lt;sup&gt;&lt;sup&gt;[94]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Existence of Grievance Officer -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the privacy policy provides details of the grievance redressal mechanism?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iii. Whether the privacy policy provides the names and contact information of the grievance officer?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Purpose of Collection and usage of information -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Disclosure of Information -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether personal information is shared with third parties (except authorized government agencies/LEA/IA) only with user consent?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the policy specifies that personal information is disclosed to Government agencies/LEA/IA only when legally mandated as per the circumstances 	laid out in 43A?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Reasonable Security practices and procedures -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to secure 	information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br clear="all" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.2xcytpi"&gt;&lt;/a&gt; &lt;a name="h.3whwml4"&gt;&lt;/a&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957939"&gt;Annexure 2&lt;/a&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.2bn6wsx"&gt;&lt;/a&gt; Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules) 2011 and Company SURVEY&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Bharti Airtel Ltd.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel's Privacy Policy&lt;a href="#_ftn95" name="_ftnref95"&gt;&lt;sup&gt;&lt;sup&gt;[95]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; is available through the 	main page of the website and it is mentioned in the Airtel Terms and Conditions and is applicable for Airtel's websites as well as its services and 	products, such as its telecommunications services. It was determined that the policy can be comprehended by individuals without legal knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type and acknowledgement of personal or sensitive personal data/information collected: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Rationale: &lt;/b&gt;Airtel's Privacy Policy indicates that sensitive personal and personal information will be collected, defines sensitive personal information&lt;a href="#_ftn96" name="_ftnref96"&gt;&lt;sup&gt;&lt;sup&gt;[96]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and specifies specific types of personal&lt;a href="#_ftn97" name="_ftnref97"&gt;&lt;sup&gt;&lt;sup&gt;[97]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and sensitive personal information	&lt;a href="#_ftn98" name="_ftnref98"&gt;&lt;sup&gt;&lt;sup&gt;[98]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that will be collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide data or information and subsequent withdrawal of consent: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Rationale: &lt;/b&gt;The Airtel Privacy Policy states that individuals have the right to choose not to provide consent or information and have 	the right to withdraw consent. The policy notes that if consent/information is not provided, Airtel reserves the right to not provide or to withdraw the 	services.&lt;a href="#_ftn99" name="_ftnref99"&gt;&lt;sup&gt;&lt;sup&gt;[99]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel provides for the contact details of nodal officers&lt;a href="#_ftn100" name="_ftnref100"&gt;&lt;sup&gt;&lt;sup&gt;[100]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and appellate authorities	&lt;a href="#_ftn101" name="_ftnref101"&gt;&lt;sup&gt;&lt;sup&gt;[101]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; on its website.&lt;b&gt; &lt;/b&gt;Additionally the website provides for the 	'Office of the Ombudsperson'&lt;a href="#_ftn102" name="_ftnref102"&gt;&lt;sup&gt;&lt;sup&gt;[102]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which is an independent forum for employees and 	external stakeholders&lt;a href="#_ftn103" name="_ftnref103"&gt;&lt;sup&gt;&lt;sup&gt;[103]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; of the company to raise concerns and complaints about 	improper practices which are in breach of the Bharti Code of Conduct. Additionally, details of the Airtel Grievance Redressal Officers can also be found in 	the TRAI website.&lt;a href="#_ftn104" name="_ftnref104"&gt;&lt;sup&gt;&lt;sup&gt;[104]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Comprehensive disclosure of purpose of collection and usage of information: Partial &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Airtel's Privacy Policy indicates eight purposes&lt;a href="#_ftn105" name="_ftnref105"&gt;&lt;sup&gt;&lt;sup&gt;[105]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that information will be 	collected and used for, but notes that the use and collection is not limited to the defined purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information&lt;a href="#_ftn106" name="_ftnref106"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[106]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel has a dedicated section explaining the company's practices around the disclosure and sharing of collected information, including ways in which consent will be collected for the sharing of personal information&lt;a href="#_ftn107" name="_ftnref107"&gt;&lt;sup&gt;&lt;sup&gt;[107]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, how collected personal information may be collected internally	&lt;a href="#_ftn108" name="_ftnref108"&gt;&lt;sup&gt;&lt;sup&gt;[108]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the disclosure of information to third parties and that the third party will 	be held accountable for protecting the information through contract&lt;a href="#_ftn109" name="_ftnref109"&gt;&lt;sup&gt;&lt;sup&gt;[109]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the 	possible transfer of personal information and its purposes&lt;a href="#_ftn110" name="_ftnref110"&gt;&lt;sup&gt;&lt;sup&gt;[110]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and the circumstances under which information will be disclosed to governmental agencies (which reflect the circumstances defined by the Rules.)	&lt;a href="#_ftn111" name="_ftnref111"&gt;&lt;sup&gt;&lt;sup&gt;[111]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Existence of reasonable security practices and procedures&lt;/b&gt; &lt;a href="#_ftn112" name="_ftnref112"&gt;&lt;sup&gt;&lt;sup&gt;[112]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;b&gt;: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel's privacy policy has a dedicated section that explains the company's security practices and procedures in place. The policy notes that Airtel's practices and procedures are IS/ISO/IEC 27001 compliant	&lt;a href="#_ftn113" name="_ftnref113"&gt;&lt;sup&gt;&lt;sup&gt;[113]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, that access is restricted to a need to know basis and that employees are 	bound by codes of confidentiality&lt;a href="#_ftn114" name="_ftnref114"&gt;&lt;sup&gt;&lt;sup&gt;[114]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and that Airtel works to ensure that third 	parties also have strong security procedures in place.&lt;a href="#_ftn115" name="_ftnref115"&gt;&lt;sup&gt;&lt;sup&gt;[115]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The policy also provides details on the retention&lt;a href="#_ftn116" name="_ftnref116"&gt;&lt;sup&gt;&lt;sup&gt;[116]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and destruction	&lt;a href="#_ftn117" name="_ftnref117"&gt;&lt;sup&gt;&lt;sup&gt;[117]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; procedures for personal information, and notes that reasonable steps are 	taken to protect against hacking and virus attacks.&lt;a href="#_ftn118" name="_ftnref118"&gt;&lt;sup&gt;&lt;sup&gt;[118]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Tata Telecommunication Services (DoCoMo and Virgin Mobile)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies&lt;/b&gt; : Partial&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale&lt;/b&gt;: Though Tata DoCoMo has a comprehensive Data Privacy Policy	&lt;a href="#_ftn119" name="_ftnref119"&gt;&lt;sup&gt;&lt;sup&gt;[119]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that is applicable to Tata Teleservices Limited's ("&lt;b&gt;TTL&lt;/b&gt;") 	products and services and the TTL website, it is not accessible to the user through the main website. In the Frequently Asked Questions Section of TTL, it is clarified under what circumstances information that you provide is not covered by the TTL privacy policy.	&lt;a href="#_ftn120" name="_ftnref120"&gt;&lt;sup&gt;&lt;sup&gt;[120]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type of personal or sensitive personal data/information collected: Partial &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rational: &lt;/b&gt;TTL defines personal information&lt;a href="#_ftn121" name="_ftnref121"&gt;&lt;sup&gt;&lt;sup&gt;[121]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; but only 	provides general examples of types of personal information&lt;a href="#_ftn122" name="_ftnref122"&gt;&lt;sup&gt;&lt;sup&gt;[122]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (and not sensitive 	personal) collected, rather than a comprehensive list. The definitions and examples of information collected are clarified in the FAQs and the Privacy 	Policy, rather than in the Privacy Policy alone. As a strength, the Privacy Policy clarifies the ways in which TTL will collect information from the user - including the fact that they receive information from third parties like credit agencies.	&lt;a href="#_ftn123" name="_ftnref123"&gt;&lt;sup&gt;&lt;sup&gt;[123]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent: N/A&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;The TTL Privacy Policy does not address the right of the individual to provide consent/information and to withdraw 	information/consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; TTL has various methods to lodge complaints and provides for an appellate authority.	&lt;a href="#_ftn124" name="_ftnref124"&gt;&lt;sup&gt;&lt;sup&gt;[124]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Additionally, details of the Grievance Redressal Officers are provided via 	the TRAI website.&lt;a href="#_ftn125" name="_ftnref125"&gt;&lt;sup&gt;&lt;sup&gt;[125]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; In its' Privacy Policy, TTL describes the way in which collected information is used.	&lt;a href="#_ftn126" name="_ftnref126"&gt;&lt;sup&gt;&lt;sup&gt;[126]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The TTL FAQs further clarify the use of cookies by the company, the use of 	provided information for advertising purposes, &lt;a href="#_ftn127" name="_ftnref127"&gt;&lt;sup&gt;&lt;sup&gt;[127]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the use of aggregate and 	anonymized data.&lt;a href="#_ftn128" name="_ftnref128"&gt;&lt;sup&gt;&lt;sup&gt;[128]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;In the Privacy Policy and the FAQs page, TTL is transparent about the circumstances on which they will share/disclose 	personal information with third parties&lt;a href="#_ftn129" name="_ftnref129"&gt;&lt;sup&gt;&lt;sup&gt;[129]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, with law enforcement/governmental agencies&lt;a href="#_ftn130" name="_ftnref130"&gt;&lt;sup&gt;&lt;sup&gt;[130]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and with other TTL companies.	&lt;a href="#_ftn131" name="_ftnref131"&gt;&lt;sup&gt;&lt;sup&gt;[131]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Interestingly, the TTL FAQ's clarify to the customer that their personal information might be processed in different jurisdictions, and thus would be accessible by law enforcement in that jurisdiction.	&lt;a href="#_ftn132" name="_ftnref132"&gt;&lt;sup&gt;&lt;sup&gt;[132]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;TTL's Privacy Policy broadly references that security practices are in place to protect user information, but the policy does not make reference to a specific security standard, or provide detail as to what these practices and procedures are.	&lt;a href="#_ftn133" name="_ftnref133"&gt;&lt;sup&gt;&lt;sup&gt;[133]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although TTL's Privacy Policy does not make mention of any specific security 	standard, Tata Teleservices (Maharashtra) Limited claims to have been awarded with ISO 27001 ISMS (Information Security Management Systems) Certification 	in May 2011, and completed its first Surveillance Audit in June 2012&lt;a href="#_ftn134" name="_ftnref134"&gt;&lt;sup&gt;&lt;sup&gt;[134]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. 	Information on IT security standards adopted by other circles could not be found on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Vodafone &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Vodafone's Privacy Policy&lt;a href="#_ftn135" name="_ftnref135"&gt;&lt;sup&gt;&lt;sup&gt;[135]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; is easily accessible from its website from a link at the bottom, directly from the home page and from all other pages of the website.	&lt;a href="#_ftn136" name="_ftnref136"&gt;&lt;sup&gt;&lt;sup&gt;[136]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Collection of personal or sensitive personal data/information: No &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Type -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Personal Information - The amount of details given by the Privacy Policy with regards to the personal information being collected is insufficient, as it 	does not include a number of relevant facts, and uses is vague language - such as '&lt;i&gt;amongst other things&lt;/i&gt;', implying that information other than 	that which is notified is being collected.&lt;a href="#_ftn137" name="_ftnref137"&gt;&lt;sup&gt;&lt;sup&gt;[137]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Sensitive Personal Data or Information - The Privacy Policy does not mention the categories or types of SPD/I, as defined under Rule 3, being collected 	by the service provider explicitly, only gives a general overview of the information that is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt; The privacy policy does not mention the consent of data subject anywhere, nor does it mention his or her right to withdraw 	it at any point of time. It also does not mention whether or not the provision of services by Vodafone is contingent on the provision of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Privacy Policy explicitly mentions and gives the email address of a grievance redressal officer, though further details 	about the other offices are given in a separate section of the website.&lt;a href="#_ftn138" name="_ftnref138"&gt;&lt;sup&gt;&lt;sup&gt;[138]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy gives an exhaustive list of purposes for which the collected information can be used by Vodafone,	&lt;a href="#_ftn139" name="_ftnref139"&gt;&lt;sup&gt;&lt;sup&gt;[139]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; but at the same time the framing of the opening sentence and the usage of the 	term 'may include' could imply that it can be used for other purposes as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy mentions that Vodafone might share the collected information with certain third parties and the terms and conditions which would apply 	to such a third party.&lt;a href="#_ftn140" name="_ftnref140"&gt;&lt;sup&gt;&lt;sup&gt;[140]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The phrasing does not imply that there are other 	conditions that have not been mentioned in the policy, under which the information would be shared with a third party. At the same time, the Privacy Policy 	does not explicitly say that the third party will necessarily follow the privacy and data security procedures and rules laid down in the Privacy Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy mentions in reasonably clear detail the security practices and procedures followed by Vodafone, and also mentions the circumstances in which the data subject should take care to protect his or her own information, wherein Vodafone will not be liable.	&lt;a href="#_ftn141" name="_ftnref141"&gt;&lt;sup&gt;&lt;sup&gt;[141]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although Vodafone India's Privacy Policy does not specify what their IT Security standard is, its 2012/2013 Sustainability Report available through its international website	&lt;a href="#_ftn142" name="_ftnref142"&gt;&lt;sup&gt;&lt;sup&gt;[142]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; states that it follows industry practices in line with the ISO 27001 standard 	and its core data centre in India follows this standard&lt;a href="#_ftn143" name="_ftnref143"&gt;&lt;sup&gt;&lt;sup&gt;[143]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Aircel&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy is accessible from every page of the Aircel website, with a link at the bottom of each page after the specific circle has been chosen. 	It is reasonably free of legalese and is intelligible.&lt;a href="#_ftn144" name="_ftnref144"&gt;&lt;sup&gt;&lt;sup&gt;[144]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type of personal or sensitive personal data/information collected: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Type -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Personal Information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the Privacy Policy, the repeated usage of the term 'may' creates some doubt about the actual extent of the data collected, and leaves the Privacy Policy 	quite unclear in this regard. At the same time, the Privacy Policy does include a fairly comprehensive list of personal information that could be 	collected. &lt;a href="#_ftn145" name="_ftnref145"&gt;&lt;sup&gt;&lt;sup&gt;[145]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The wording in the Privacy Policy thus requires further 	clarification and specification in order to make a determination on whether or not it provides complete details on the personal information that will be 	collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Sensitive Personal Data or Information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy does not mention SPDI explicitly, which adds to the lack of concrete details as noted earlier.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent - Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale&lt;/b&gt; : The Privacy Policy mentions that users do have the right to refuse to provide or the withdrawal of consent to collect personal information. In such cases, Aircel can respectively refuse or discontinue the provision of its services.	&lt;a href="#_ftn146" name="_ftnref146"&gt;&lt;sup&gt;&lt;sup&gt;[146]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though not directly mentioned in the Privacy Policy, a separate, easily noticeable link at the bottom of each webpage links to the Customer Grievance section. There are different officers in charge of each node, called the Nodal Officers.	&lt;a href="#_ftn147" name="_ftnref147"&gt;&lt;sup&gt;&lt;sup&gt;[147]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Partial &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;The usage of the term 'may' in the section of the Privacy Policy regarding the purpose of collection and usage of 	information again leaves it ambiguous in this regard, implying that it can just as easily be used for purposes that have not been notified to the data 	subject.&lt;a href="#_ftn148" name="_ftnref148"&gt;&lt;sup&gt;&lt;sup&gt;[148]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Though&lt;b&gt; &lt;/b&gt;the Privacy Policy does not specify all the circumstances under which Aircel would share the collected information with a third party, it specifies the terms and conditions that would apply in the cases that it does.	&lt;a href="#_ftn149" name="_ftnref149"&gt;&lt;sup&gt;&lt;sup&gt;[149]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy gives a reasonable amount of detail about the steps taken by Aircel to ensure the security of the information collected by it, but leaves 	certain holes uncovered.&lt;a href="#_ftn150" name="_ftnref150"&gt;&lt;sup&gt;&lt;sup&gt;[150]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Atria Convergence Technologies Private Limited (ACT)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Policy is intelligible, and is easily accessible from all the webpages of the company's website from a link at the 	bottom of all pages.&lt;a href="#_ftn151" name="_ftnref151"&gt;&lt;sup&gt;&lt;sup&gt;[151]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type of personal or sensitive personal data/information collected: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Type -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Personal Information - Yes -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy mentions the different types of Personal Information which will be collected by ACT if the customer registers with the Company.	&lt;a href="#_ftn152" name="_ftnref152"&gt;&lt;sup&gt;&lt;sup&gt;[152]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Sensitive Personal Data or Information -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The categories of SPD/I collected by ACT are not specifically mentioned in the policy, though they are mentioned as part of the general declarations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale&lt;/b&gt;: The option of the data subject not providing or withdrawing consent has not been mentioned in the Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; No Grievance Officer has been mentioned in the Privacy Policy or on the ACT website, nor has any other grievance redressal 	process been specified.&lt;a href="#_ftn153" name="_ftnref153"&gt;&lt;sup&gt;&lt;sup&gt;[153]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Policy mentions the various ways ACT might use the information it collects, though the use of the term 'general' is a 	cause for concern.&lt;a href="#_ftn154" name="_ftnref154"&gt;&lt;sup&gt;&lt;sup&gt;[154]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The list of purposes for collection given in the Privacy 	Policy is a very general list.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Policy mentions the circumstances in which ACT might share the collected information with a third party, and also 	mentions that such parties will either be subject to confidentiality agreements, or that the data subject will be notified before his or her information 	becomes subject to a different privacy policy. It also mentions the exception to above, that being when the information is shared for investigative 	purposes.&lt;a href="#_ftn155" name="_ftnref155"&gt;&lt;sup&gt;&lt;sup&gt;[155]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; At the same time, the intended recipients of the information are not 	mentioned, and the name and address of agency/agencies collecting and retaining information is not mentioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; - The security practices and procedures followed by ACT to protect the information of its customers are not mentioned in the Policy, which is a critical weak point, keeping in mind the requirements of the Rules.	&lt;a href="#_ftn156" name="_ftnref156"&gt;&lt;sup&gt;&lt;sup&gt;[156]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; . Telecom Regulatory Authority of India, Press Release 143/2012,(&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/PressRealease/Document/PR-TSD-May12.pdf"&gt; http://www.trai.gov.in/WriteReadData/PressRealease/Document/PR-TSD-May12.pdf &lt;/a&gt; &amp;gt;)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; . The Indian Telecom Service Performance Indicators, January-March 2013, Telecom Regulatory Authority of India,. (&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf"&gt; http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf &lt;/a&gt; &amp;gt;)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; . 'India is now world's third largest Internet user after U.S., China', (The Hindu, 24 August 2013) &amp;lt; 			&lt;a href="http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece"&gt; http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; . In addition, the Unified Access License Framework which allows for a single license for multiple services such as telecom, the internet and 			television, provides certain security guidelines. As per the model UIL Agreements, privacy of communications is to be maintained and network 			security practices and audits are mandated along with penalties for contravention in addition to what is prescribed under the Information 			Technology Act,2000. For internet services, the Agreement stipulates the keeping an Internet Protocol Detail Record (IPDR) and copies of packets from customer premises equipment (CPE). Accessed at &amp;lt;			&lt;a href="http://www.dot.gov.in/sites/default/files/Unified%20Licence.pdf"&gt;http://www.dot.gov.in/sites/default/files/Unified%20Licence.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; . See &amp;gt;&amp;gt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf"&gt; http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; . 'India is now world's third largest Internet user after U.S., China', (The Hindu, 24 August 2013) &amp;lt; 			&lt;a href="http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece"&gt; http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece &lt;/a&gt; &amp;gt; Accessed..&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; . Starting with &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of UP &lt;/i&gt;1963 AIR SC 1295&lt;i&gt;, &lt;/i&gt;the&lt;i&gt; &lt;/i&gt;right to privacy has been further confirmed 			and commented on in other cases, like &lt;i&gt;Govind v.State of M.P&lt;/i&gt; (1975) 2 SCC 148: 1975 SCC (Cri) 468. A full history of the development of the 			Right to Privacy can be found in B.D. Agarwala, &lt;i&gt;Right to Privacy: A Case-By-Case Development&lt;/i&gt;, (1996) 3 SCC (Jour) 9, available at 			http://www.ebc-india.com/lawyer/articles/96v3a2.htm.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; . White Paper on EU Adequacy Assessment of India, 3, ("&lt;i&gt;Based on an overall &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; analysis against the identifiable principles under Article 25, the 2010 Report concludes that India does not at present provide adequate 				protection to personal data in relation to any sector or to the whole of its private sector or to the whole of its public sector. &lt;/i&gt; ") available at &amp;lt; 			&lt;a href="https://www.dsci.in/sites/default/files/WhitePaper%20EU_Adequacy%20Assessment%20of%20India.pdf"&gt; https://www.dsci.in/sites/default/files/WhitePaper%20EU_Adequacy%20Assessment%20of%20India.pdf &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; . Planning Commission&lt;i&gt;, Report of the Group of Experts on Privacy&lt;/i&gt;, 2012, (&amp;lt;			&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/a&gt;&amp;gt;)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; . Though a company's Privacy Policy was the main document analysed for this research, when applicable a company's Terms of Service wavas also 			reviewed.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; . BSNL and MTNL are government companies as defined under section 617, Indian Companies Act, 1956, incorporated under the Indian Companies Act, 			1956. Under section 43 A (i) of the Act, a 'body corporate' has been broadly defined as "any company…sole proprietorship or other association 			of individuals engaged in commercial or professional activities". Therefore, for the purpose of this survey, BSNL and MTNL are recognized as bodies 			corporate.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; . Documents Reviewed&lt;i&gt;:&lt;/i&gt; http://portal.bsnl.in/portal/privacypolicy.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; . A full list of its services are available here: &amp;lt;			&lt;a href="http://bsnl.co.in/opencms/bsnl/BSNL/services/"&gt;http://bsnl.co.in/opencms/bsnl/BSNL/services/&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; . The MTNL website does not provide access to a privacy policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; . A full list of its services are available here &amp;lt;&amp;lt;http://mtnldelhi.in&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; . Documents Reviewed: &lt;a href="http://www.airtel.in/forme/privacy-policy"&gt;http://www.airtel.in/forme/privacy-policy&lt;/a&gt; ,			&lt;a href="http://www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp"&gt;http://www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp&lt;/a&gt;, 			&lt;a href="http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp"&gt; http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp &lt;/a&gt; , 			&lt;a href="http://www.airtel.in/about-bharti/about-bharti-airtel/ombuds-office"&gt; http://www.airtel.in/about-bharti/about-bharti-airtel/ombuds-office &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; . A full list of services provided by Bharti Airtel is available here: &amp;lt;&lt;a href="http://www.airtel.in"&gt;www.airtel.in&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; . http://submarinenetworks.com/stations/asia/india/chennai-bharti&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; . Documents Reviewed: 			&lt;a href="http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html"&gt; http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html &lt;/a&gt; &lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker&lt;/a&gt; , 			&lt;a href="http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html"&gt; http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; . See &amp;lt; 			&lt;a href="http://historyofbusiness.blogspot.in/2013/11/history-of-vodafone.html."&gt; http://historyofbusiness.blogspot.in/2013/11/history-of-vodafone.html. &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; . &lt;i&gt;Vodafone International Holdings v Union of India&lt;/i&gt;, WP 1325/2010, Bombay High Court&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; . 'Vodafone to Buy Additional Essar India Stake for $5 Billion',(&lt;i&gt;Bloomberg&lt;/i&gt;, March 31, 2011) &amp;lt; 			&lt;a href="http://www.bloomberg.com/news/2011-03-31/essar-exercises-option-to-sell-5-billion-stake-in-vodafone-essar-venture.html"&gt; http://www.bloomberg.com/news/2011-03-31/essar-exercises-option-to-sell-5-billion-stake-in-vodafone-essar-venture.html &lt;/a&gt; &amp;gt;Accessed 26 May 2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; . See &amp;lt;&lt;a href="https://www.vodafone.in/pages/aboutus.aspx?cid=ker."&gt;https://www.vodafone.in/pages/aboutus.aspx?cid=ker.&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; . Vodafone, &lt;i&gt;supra&lt;/i&gt; note 13.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; . Documents Reviewed:&lt;a href="http://www.tatadocomo.com/downloads/data-privacy-policy.pdf"&gt;http://www.tatadocomo.com/downloads/data-privacy-policy.pdf&lt;/a&gt;,			&lt;a href="http://www.tatateleservices.com/t-customercare.aspx"&gt;http://www.tatateleservices.com/t-customercare.aspx&lt;/a&gt;, 			&lt;a href="http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf"&gt; http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; . 'Japan's Docomo acquires 26% stake in Tata Tele'(The Hindu Business Line, November 13 2008) &amp;lt; 			&lt;a href="http://www.thehindubusinessline.in/bline/2008/11/13/stories/2008111352410100.htm"&gt; http://www.thehindubusinessline.in/bline/2008/11/13/stories/2008111352410100.htm &lt;/a&gt; .&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; . Further details are available at: &amp;lt;			&lt;a href="http://www.tatateleservices.com/t-aboutus-ttsl-organization.aspx"&gt;http://www.tatateleservices.com/t-aboutus-ttsl-organization.aspx&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; . Documents Reviewed&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061"&gt; http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061 &lt;/a&gt; , 			&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=customercare_consumergrievance_page"&gt; http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=customercare_consumergrievance_page &lt;/a&gt; , 			&lt;a href="http://www.aircel.com/AircelWar/ShowProperty/UCMRepository/Contribution%20Folders/Global/PDF/Manual_Customer_Grievan.pdf"&gt; http://www.aircel.com/AircelWar/ShowProperty/UCMRepository/Contribution%20Folders/Global/PDF/Manual_Customer_Grievan.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; . See &amp;lt; 			&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/ap?_nfpb=true&amp;amp;_pageLabel=aboutus_book."&gt; http://www.aircel.com/AircelWar/appmanager/aircel/ap?_nfpb=true&amp;amp;_pageLabel=aboutus_book. &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; . Documents Reviewed: &lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; . https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; . &lt;a href="http://www.tatadocomo.com/downloads/data-privacy-policy.pdf"&gt;http://www.tatadocomo.com/downloads/data-privacy-policy.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; . http://www.airtel.in/forme/privacy-policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; .http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; . &lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; . In 2012, the Minister of State for Communications &amp;amp; Information Technology informed the Rajya Sabha that "			&lt;i&gt;(a)ny change in the privacy policy is not within the purview of amended Information Technology Act, 2000&lt;/i&gt;",, while discussing changes to 			Google's privacy policy. Even though the Minister noted that the EU has reported its dissatisfaction with the changed policy, finding that the policy "			&lt;i&gt;makes it impossible to understand which purposes, personal data, recipients or access rights are relevant to the use of a specific service&lt;/i&gt; ", he argued that the Act and Rules therein merely stipulate the publication of a privacy policy which provide "			&lt;i&gt;information to the end users as to how their personal information is collected, for which it is collected, processed and secure&lt;/i&gt;". Further, 			when asked how changes to privacy policy affect end users the Minister shifted the responsibility on end users, stating that " 			&lt;i&gt; (t)he end users… need to fully understand the privacy policy of Google, the consequences of sharing their personal information and their 				privacy rights before they start using online services &lt;/i&gt; ".( &amp;lt; 			&lt;a href="http://rsdebate.nic.in/bitstream/123456789/609109/2/PQ_225_30032012_U1929_p129_p130.pdf#search=%22google%22"&gt; http://rsdebate.nic.in/bitstream/123456789/609109/2/PQ_225_30032012_U1929_p129_p130.pdf#search=%22google%22 &lt;/a&gt; &amp;gt;).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; . Available at &lt;a href="http://portal.bsnl.in/portal/privacypolicy.htm"&gt;http://portal.bsnl.in/portal/privacypolicy.htm&lt;/a&gt;, the privacy policy was 			found through a search engine and not through a link from the website. An RTI request was submitted to BSNL for a copy of its privacy policy as 			applicable to all its products, services and websites. BSNL responded by submitting a copy of this privacy policy even though the text of the 			policy does not clarify the scope.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; . See, &amp;lt;&lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.airtel.in/forme/privacy-policy"&gt;http://www.airtel.in/forme/privacy-policy&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.tataindicom.com/Download/data-privacy-policy.pdf"&gt;www.tataindicom.com/Download/data-privacy-policy.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; . See &amp;lt;&amp;lt;www.aircel.com/AircelWar/appmanager/aircel/delhi?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; . See &amp;lt;&lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; . See&amp;lt;&amp;lt; http://portal.bsnl.in/portal/privacypolicy.htm&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; . See &amp;lt;&lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.tataindicom.com/Download/data-privacy-policy.pdf"&gt;http://www.tataindicom.com/Download/data-privacy-policy.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; . Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; . The complaint center details are available here: &amp;lt;			&lt;a href="http://www.tccms.gov.in/Queries.aspx?cid=1"&gt;http://www.tccms.gov.in/Queries.aspx?cid=1&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; . Rules 5 and 6&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; . Principle 2, Principle 3, Personal Information Protection and Electronic Documents Act 2000. Available at: &amp;lt;&amp;lt;			&lt;a href="http://laws-lois.justice.gc.ca/eng/acts/P-8.6/index.html"&gt;http://laws-lois.justice.gc.ca/eng/acts/P-8.6/index.html&lt;/a&gt;&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; . Rule 5(7),&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; . Principle 2&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; . P. 21&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; . Telecom Regulatory Policy CRTC 2009-657, Review of the Internet traffic management practices of Internet service providers &amp;lt;&amp;lt;			&lt;a href="http://www.crtc.gc.ca/eng/archive/2009/2009-657.htm"&gt;www.crtc.gc.ca/eng/archive/2009/2009-657.htm&lt;/a&gt;&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; . Alex Cameron,&lt;i&gt;CRTC Imposes Super-PIPEDA Privacy Protections for Personal Information Collected by ISPs, &lt;/i&gt;Privacy and Information 			Protection Bulletin, Fasken Martineau, &amp;lt;&amp;lt; 			&lt;a href="http://www.fasken.com/files/Publication/4317fd62-0827-4d1d-b836-5b932b3b21db/Presentation/PublicationAttachment/bafbf01e-365c-47f8-86a5-5cf7d7e43787/Bulletin_-_November_2009_-_Cameron.pdf"&gt; http://www.fasken.com/files/Publication/4317fd62-0827-4d1d-b836-5b932b3b21db/Presentation/PublicationAttachment/bafbf01e-365c-47f8-86a5-5cf7d7e43787/Bulletin_-_November_2009_-_Cameron.pdf &lt;/a&gt; . &amp;gt;&amp;gt; Accessed 21 May 2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; . Bram D. Abramson, Grant Buchanan, Hank Intven, &lt;i&gt;CRTC Shapes Canadian "Net Neutrality" Rules, &lt;/i&gt;McCarthy Tetrault. &amp;lt;			&lt;a href="http://www.mccarthy.ca/article_detail.aspx?id=4720"&gt;http://www.mccarthy.ca/article_detail.aspx?id=4720&lt;/a&gt; &amp;gt; Accessed 21 May 2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; . The Privacy Act, 1988, Part III, &lt;i&gt;available at &amp;lt;&amp;lt;&lt;/i&gt; http://www.comlaw.gov.au/Series/C2004A03712.&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, note 28, Schedule 3, 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 4.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 6.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 8.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 9.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; . Telecommunications Act, Part 13 (Information or a document protected under Part 13 could relate to many forms of communications, including fixed 			and mobile telephone services, internet browsing, email and voice over internet telephone services. For telephone-based communications, this would 			include subscriber information, the telephone numbers of the parties involved, the time of the call and its duration. In relation to internet-based 			applications, the information protected under Part 13 would include the Internet Protocol (IP) address used for the session, and the start and 			finish time of each session.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; . Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the 			processing of personal data and on the free movement of such data, &lt;i&gt;available at&lt;/i&gt; http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, article 3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, article 8.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, article 2, (d). (" 			&lt;i&gt; (d) 'controller' shall mean the natural or legal person, public authority, agency or any other body which alone or jointly with others 				determines the purposes and means of the processing of personal data; where the purposes and means of processing are determined by national or 				Community laws or regulations, the controller or the specific criteria for his nomination may be designated by national or Community law; &lt;/i&gt; ")&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; . European Commission-IP-12/46, 25 January 2012, &amp;lt;			&lt;a href="http://europa.eu/rapid/press-release_IP-12-46_en.htm?locale=en."&gt;http://europa.eu/rapid/press-release_IP-12-46_en.htm?locale=en.&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; . Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection 			of privacy in the electronic communications sector.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; . Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection 			with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; . Rule 2 (h)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; . Rule 3 (ii)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; . Rule 3 (vii) and (viii)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; . Rule 2 (i)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; . Rule 4(iii), (iv)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; . Section 2(v) of the Act defines 'information'&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a href="#_ftnref82" name="_ftn82"&gt;[82]&lt;/a&gt; . Rule 4 (1).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a href="#_ftnref83" name="_ftn83"&gt;[83]&lt;/a&gt; . Rule 5 (5)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a href="#_ftnref84" name="_ftn84"&gt;[84]&lt;/a&gt; . Defined by Venkatarama Aiyar, J as: "The rule of construction is well settled that when there are in an enactment two provisions which cannot be reconciled with each other, they should be so interpreted that, if possible, effect could be given to both" in			&lt;i&gt;Venkataramana Devaru v. State of Mysore,&lt;/i&gt; AIR 1958 SC 255, p. 268: G. P. Singh, Principles of Statutory Interpretation, 1th ed. 2010, 			Lexisnexis Butterworths Wadhwa Nagpur. The principle was applied to interpret statutory Rules in A. N. Sehgal v. Raje Ram Sheoram, AIR 1991 SC 			1406.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a href="#_ftnref85" name="_ftn85"&gt;[85]&lt;/a&gt; . Rule 6&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a href="#_ftnref86" name="_ftn86"&gt;[86]&lt;/a&gt; . Rule 8&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a href="#_ftnref87" name="_ftn87"&gt;[87]&lt;/a&gt; . 52&lt;sup&gt;nd&lt;/sup&gt; Report, Standing Committee on Information Technology, 24, available at &amp;lt; 			&lt;a href="http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf.%20"&gt; http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf. &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a href="#_ftnref88" name="_ftn88"&gt;[88]&lt;/a&gt; . Panel Of Information Security Auditing Organisations, CERT-IN &amp;lt;			&lt;a href="http://www.cert-in.org.in/PDF/background.pdf"&gt;http://www.cert-in.org.in/PDF/background.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a href="#_ftnref89" name="_ftn89"&gt;[89]&lt;/a&gt; . Section 1, Guidelines for applying to CERT-In for Empanelment of IT Security Audition Organisation, &amp;lt;			&lt;a href="http://www.cert-in.org.in/PDF/InfoSecAuditorsEmpGuidelines.pdf"&gt;http://www.cert-in.org.in/PDF/InfoSecAuditorsEmpGuidelines.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a href="#_ftnref90" name="_ftn90"&gt;[90]&lt;/a&gt; . Section 2.0, Guidelines for auditee organizations, Version 2.0, IT Security&lt;/p&gt;
&lt;p&gt;Auditing Assignment, http://www.cert-in.org.in/PDF/guideline_auditee.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a href="#_ftnref91" name="_ftn91"&gt;[91]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.cert-in.org.in/PDF/Empanel_org.pdf"&gt;http://www.cert-in.org.in/PDF/Empanel_org.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a href="#_ftnref92" name="_ftn92"&gt;[92]&lt;/a&gt; . Rule 4&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a href="#_ftnref93" name="_ftn93"&gt;[93]&lt;/a&gt; . Rule 4&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a href="#_ftnref94" name="_ftn94"&gt;[94]&lt;/a&gt; . Rule 5 (7)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a href="#_ftnref95" name="_ftn95"&gt;[95]&lt;/a&gt; . See &amp;lt;&amp;lt; &lt;a href="http://www.airtel.in/forme/privacy-policy"&gt;http://www.airtel.in/forme/privacy-policy&lt;/a&gt;&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p&gt;&lt;a href="#_ftnref96" name="_ftn96"&gt;[96]&lt;/a&gt; &lt;i&gt; . 'Information that can be used by itself to uniquely identify, contact or locate a person, or can be used with information available from 				other sources to uniquely identify an individual. For the purpose of this policy, sensitive personal data or information has been considered as 				a part of personal information.' &lt;/i&gt; Accessed at &amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p&gt;&lt;a href="#_ftnref97" name="_ftn97"&gt;[97]&lt;/a&gt; . Subscriber's name, father's name, mother's name, spouse's name, date of birth, current and previous addresses, telephone number, mobile phone 			number, email address, occupation and information contained in the documents used as proof of identity and proof of address. Information related to 			your utilization of our services which may include your call details, your browsing history on our website, location details and additional 			information provided by you while using our services. We may keep a log of the activities performed by you on our network and websites by using 			various internet techniques such as web cookies, web beacons, server log files, etc.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a href="#_ftnref98" name="_ftn98"&gt;[98]&lt;/a&gt; . Password&lt;b&gt;, &lt;/b&gt;Financial information -details of Bank account, credit card, debit card, or other payment instrument detail			&lt;b&gt;s, &lt;/b&gt;Physical, physiological and mental health condition&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a href="#_ftnref99" name="_ftn99"&gt;[99]&lt;/a&gt; . Airtel states that if a customer does not provide information or consent for usage of personal information or subsequently withdraws consent, 			Airtel reserves the right to not provide the services or to withdraw the services for which the said information was sought, Avaliable at: &amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a href="#_ftnref100" name="_ftn100"&gt;[100]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp"&gt;www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn101"&gt;
&lt;p&gt;&lt;a href="#_ftnref101" name="_ftn101"&gt;[101]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp"&gt; http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn102"&gt;
&lt;p&gt;&lt;a href="#_ftnref102" name="_ftn102"&gt;[102]&lt;/a&gt; . See &amp;lt;&amp;lt; http://www.airtel.in/about-bharti/about-bharti-airtel/ombuds-office&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn103"&gt;
&lt;p&gt;&lt;a href="#_ftnref103" name="_ftn103"&gt;[103]&lt;/a&gt; . Stakeholders are defined as: employee, associate, strategic partner, vendor&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn104"&gt;
&lt;p&gt;&lt;a href="#_ftnref104" name="_ftn104"&gt;[104]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072331247805566Bharti_Airtel_CC_AA-23072013.pdf"&gt; http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072331247805566Bharti_Airtel_CC_AA-23072013.pdf &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn105"&gt;
&lt;p&gt;&lt;a href="#_ftnref105" name="_ftn105"&gt;[105]&lt;/a&gt; . Verification of customer's identity; Complete transactions effectively and bill for products and service; Respond to customer requests for 			service or assistance; Perform market analysis, market research, business and operational analysis; Provide, maintain and improve Airtel products 			and services; Anticipate and resolve issues and concerns with Airtel products and services; Promote and market Airtel products and services which 			it may consider of interest and benefit to customers; and, Ensure adherence to legal and regulatory requirements for prevention and detection of 			frauds and crimes.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn106"&gt;
&lt;p&gt;&lt;a href="#_ftnref106" name="_ftn106"&gt;[106]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/disclosure+and+transfer?contentIDR=745792ad-d6af-4684-85d4-d85773e77356&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/disclosure+and+transfer?contentIDR=745792ad-d6af-4684-85d4-d85773e77356&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn107"&gt;
&lt;p&gt;&lt;a href="#_ftnref107" name="_ftn107"&gt;[107]&lt;/a&gt; . "Airtel may obtain a customer's consent for sharing personal information in several ways, such as in writing, online, through "click-through" 			agreements; orally, including through interactive voice response; or when a customer's consent is part of the terms and conditions pursuant to 			which Airtel provides a service."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn108"&gt;
&lt;p&gt;&lt;a href="#_ftnref108" name="_ftn108"&gt;[108]&lt;/a&gt; . Airtel and its employees may utilize some or all available personal information for internal assessments, measures, operations and related 			activities…"&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn109"&gt;
&lt;p&gt;&lt;a href="#_ftnref109" name="_ftn109"&gt;[109]&lt;/a&gt; . Airtel may at its discretion employ, contract or include third parties external to itself for strategic, tactical and operational purposes. Such 			agencies though external to Airtel, will always be entities which are covered by contractual agreements. These agreements in turn include Airtel's 			guidelines to the management, treatment and secrecy of personal information&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn110"&gt;
&lt;p&gt;&lt;a href="#_ftnref110" name="_ftn110"&gt;[110]&lt;/a&gt; . Airtel may transfer subscriber's personal information or other information collected, stored, processed by it to any other entity or organization 			located in India or outside India only in case it is necessary for providing services to a subscriber or if the subscriber has consented (at the 			time of collection of information) to the same. This may also include sharing of aggregated information with them in order for them to understand 			Airtel's environment and consequently, provide the subscriber with better services. While sharing personal information with third parties, adequate 			measures shall be taken to ensure that reasonable security practices are followed at the third party."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn111"&gt;
&lt;p&gt;&lt;a href="#_ftnref111" name="_ftn111"&gt;[111]&lt;/a&gt; . Airtel may share subscribers' personal information with Government agencies or other authorized law enforcement agencies (LEAs) mandated under 			law to obtain such information for the purpose of verification of identity or for prevention, detection, investigation including but not limited to 			cyber incidents, prosecution, and punishment of offences.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn112"&gt;
&lt;p&gt;&lt;a href="#_ftnref112" name="_ftn112"&gt;[112]&lt;/a&gt; . See&amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/security+practices+and+procedures?contentIDR=9346516c-c1a1-4bd7-bce0-6945236dceaa&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/security+practices+and+procedures?contentIDR=9346516c-c1a1-4bd7-bce0-6945236dceaa&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn113"&gt;
&lt;p&gt;&lt;a href="#_ftnref113" name="_ftn113"&gt;[113]&lt;/a&gt; . Airtel adopts reasonable security practices and procedures, in line with international standard IS/ISO/IEC 27001, to include, technical, 			operational, managerial and physical security controls in order to protect a customer's personal information from unauthorized access, or 			disclosure while it is under our control.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn114"&gt;
&lt;p&gt;&lt;a href="#_ftnref114" name="_ftn114"&gt;[114]&lt;/a&gt; . Airtel's security practices and procedures limit access to personal information on need-only basis. Further, its employees are bound by Code of 			Conduct and Confidentiality Policies which obligate them to protect the confidentiality of personal information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn115"&gt;
&lt;p&gt;&lt;a href="#_ftnref115" name="_ftn115"&gt;[115]&lt;/a&gt; . Airtel takes adequate steps to ensure that its third parties adopt reasonable level of security practices and procedures to ensure security of 			personal information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn116"&gt;
&lt;p&gt;&lt;a href="#_ftnref116" name="_ftn116"&gt;[116]&lt;/a&gt; . Airtel may retain a subscriber's personal information for as long as required to provide him/her with services or if otherwise required under any 			law.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn117"&gt;
&lt;p&gt;&lt;a href="#_ftnref117" name="_ftn117"&gt;[117]&lt;/a&gt; . When Airtel disposes of its customers' personal information, it uses reasonable procedures to erase it or render it unreadable (for example, 			shredding documents and wiping electronic media)."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn118"&gt;
&lt;p&gt;&lt;a href="#_ftnref118" name="_ftn118"&gt;[118]&lt;/a&gt; . Airtel maintains the security of its internet connections, however for reasons outside of its control, security risks may still arise. Any 			personal information transmitted to Airtel or from its online products or services will therefore be at a customer's own risk. It observes 			reasonable security measures to protect a customer's personal information against hacking and virus dissemination.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn119"&gt;
&lt;p&gt;&lt;a href="#_ftnref119" name="_ftn119"&gt;[119]&lt;/a&gt; . See &amp;lt;&amp;lt;http://www.tatadocomo.com/downloads/data-privacy-policy.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn120"&gt;
&lt;p&gt;&lt;a href="#_ftnref120" name="_ftn120"&gt;[120]&lt;/a&gt; . Information that customers provide to non-TTL companies is not covered by TTL's Policy. For example: When customers download applications or make 			an online purchase from a non-TTL company while using TTL's Internet or wireless services, the information collected by the non-TTL company is not 			subject to this Policy. When you navigate to a non-TTL company from TTL websites or applications (by clicking on a link or an advertisement, for 			example), information collected by the non-TTL company is governed by its privacy policy and not TTL's Privacy Policy. If one uses public forums - 			such as social networking services, Internet bulletin boards, chat rooms, or blogs on TTL or non-TTL websites, any Personal Information disclosed 			publicly can be read, collected, or used by others. Once one chooses to reveal Personal Information on such a site, the information is publicly 			available, and TTL cannot prevent distribution and use of that information by other parties. Information on a wireless Customer 's location, usage 			and numbers dialed, which is roaming on the network of a non-TTL company will be subject to the privacy policy of the non-TTL company, and not 			TTL's Policy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn121"&gt;
&lt;p&gt;&lt;a href="#_ftnref121" name="_ftn121"&gt;[121]&lt;/a&gt; . "Personal Information" is any information that relates to a natural person which, either directly or indirectly, in combination with other 			information available or likely to be available with a body corporate, is capable of identifying such person.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn122"&gt;
&lt;p&gt;&lt;a href="#_ftnref122" name="_ftn122"&gt;[122]&lt;/a&gt; . Personal Information - Some general examples -TTL may collect Confidential Data in different forms such as Personal and other Information based 			on a customer's use of its products and services. Some examples include, Contact Information that allows us to communicate with you -- including 			your name, address, telephone number, and e-mail address; Billing information-- including payment data, credit history, credit card number, 			security codes, and service history.Equipment, Performance, TTL Website Usage, Viewing and other Technical Information about use of TTL's network, 			services, products or websites.&lt;/p&gt;
&lt;p&gt;Technical &amp;amp; Usage Information is clarified in the FAQ's as information&lt;b&gt; &lt;/b&gt;related to the services provided, use of TTL's network, 			services, products or websites. Examples of the Technical &amp;amp; Usage Information collected include: &lt;b&gt;Equipment Information &lt;/b&gt;that identifies the equipment used on TTL's network, such as equipment type, IDs, serial numbers, settings, configuration, and software.			&lt;b&gt;Performance Information &lt;/b&gt;about the operation of the equipment, services and applications used on TTL's network, such as IP 			addresses, URLs, data transmission rates and latencies, location information, security characteristics, and information about the amount of bandwidth and other network resources used in connection with uploading, downloading or streaming data to and from the Internet.			&lt;b&gt;TTL Website Usage Information &lt;/b&gt;about the use of TTL websites, including the pages visited, the length of time spent, the links or 			advertisements followed and the search terms entered on TTL sites, and the websites visited immediately before and immediately after visiting one of TTL's sites.TTL also may collect similar information about a customer's use of its applications on wireless devices.			&lt;b&gt;Viewing Information &lt;/b&gt;about the programs watched and recorded and similar choices under Value added TTL services and products.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn123"&gt;
&lt;p&gt;&lt;a href="#_ftnref123" name="_ftn123"&gt;[123]&lt;/a&gt; . Ways in which TTL collects information: On the purchase or interaction about a TTL product or service provided; Automatically collected when one 			visits TTL's websites or use its products and services; Other sources, such as credit agencies.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn124"&gt;
&lt;p&gt;&lt;a href="#_ftnref124" name="_ftn124"&gt;[124]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.tatateleservices.com/t-customercare.aspx"&gt;http://www.tatateleservices.com/t-customercare.aspx&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn125"&gt;
&lt;p&gt;&lt;a href="#_ftnref125" name="_ftn125"&gt;[125]&lt;/a&gt; .See&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341218463621Tata_CC_AA_1-23072013.pdf"&gt; http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341218463621Tata_CC_AA_1-23072013.pdf &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn126"&gt;
&lt;p&gt;&lt;a href="#_ftnref126" name="_ftn126"&gt;[126]&lt;/a&gt; . To provide the best customer experience possible; Provide the services a customer purchases, respond to customer questions; Communicate with 			customers regarding service updates, offers, and promotions; Deliver customized content and advertising that may be of interest to customers; 			Address network integrity and security issues; Investigate, prevent or take action regarding illegal activities, violations of TTL's Terms of 			Service or Acceptable Use Policies&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn127"&gt;
&lt;p&gt;&lt;a href="#_ftnref127" name="_ftn127"&gt;[127]&lt;/a&gt; . &lt;b&gt;Site functionality &lt;/b&gt;-Cookies and other tracking tools are used to help TTL analyze, manage and improve websites and storing 			customer preferences. &lt;b&gt;Advertising &lt;/b&gt;TTL and its advertising partners, including Yahoo! and other advertising networks, use anonymous 			information gathered through cookies and other similar technologies, as well as other information TTL or its advertising networks may have, to help 			tailor the ads a customer sees on its sites.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn128"&gt;
&lt;p&gt;&lt;a href="#_ftnref128" name="_ftn128"&gt;[128]&lt;/a&gt; . TTL collects some Information on an anonymous basis. TTL also may anonymize the Personal Information it collects about customers. It may obtain 			aggregate data by combining anonymous data that meet certain criteria into groups.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn129"&gt;
&lt;p&gt;&lt;a href="#_ftnref129" name="_ftn129"&gt;[129]&lt;/a&gt; . In Other Circumstances: TTL may provide Personal Information to non-TTL companies or other third parties for purposes such as: To assist with 			identity verification, and to prevent fraud and identity theft; Enforcing its agreements and property rights; Obtaining payment for products and 			services that appear on customers' TTL billing statements, including the transfer or sale of delinquent accounts to third parties for collection; 			and to comply to legal and regulatory requirements. TTL shares customer Personal Information only with non-TTL companies that perform services on 			its behalf, and only as necessary for them to perform those services. TTL requires those non-TTL companies to protect any Personal Information they 			may receive in a manner consistent with this policy. TTL does not provide Personal Information to non-TTL companies for the marketing of their own 			products and services without a customer's consent. TTL may share aggregate or anonymous Information in various formats with trusted non-TTL 			entities, and may work with those entities to do research and provide products and services.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn130"&gt;
&lt;p&gt;&lt;a href="#_ftnref130" name="_ftn130"&gt;[130]&lt;/a&gt; . TTL provides Personal Information to non-TTL companies or other third parties (for example, to government agencies, credit bureaus and collection 			agencies) without consent for certain purposes, such as: To comply with court orders, subpoenas, lawful discovery requests and other legal or 			regulatory requirements, and to enforce our legal rights or defend against legal claims, To obtain payment for products and services that appear on 			customer TTL billing statements, including the transfer or sale of delinquent accounts to third parties for collection; To enforce its agreements, 			and protect our rights or property; To assist with identity verification, and to prevent fraud and identity theft; To prevent unlawful use of TTL's 			services and to assist in repairing network outages; To provide information regarding the caller's location to a public safety entity when a call 			is made to police/investigation agencies, and to notify the public of wide-spread emergencies; To notify or respond to a responsible governmental 			entity if we reasonably believe that an emergency involving immediate danger of death or serious physical injury to any person requires or 			justifies disclosure without delay; To display name and telephone number on a Caller ID device;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn131"&gt;
&lt;p&gt;&lt;a href="#_ftnref131" name="_ftn131"&gt;[131]&lt;/a&gt; . Subject to applicable legal restrictions, such as those that exist for Customer Proprietary Network Information (CPNI), the TTL companies may 			share your Personal Information with each other to make sure your experience is as seamless as possible, and you have the benefit of what TTL has 			to offer.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn132"&gt;
&lt;p&gt;&lt;a href="#_ftnref132" name="_ftn132"&gt;[132]&lt;/a&gt; . Customers and Users should be aware that TTL affiliates and non-TTL companies that perform services on behalf of TTL may be located outside the 			country where customers access TTL's services. As a result, when customer Personal Information is shared with or processed by such entities, it may 			be accessible to government authorities according to the laws of those jurisdictions.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn133"&gt;
&lt;p&gt;&lt;a href="#_ftnref133" name="_ftn133"&gt;[133]&lt;/a&gt; . TTL has implemented appropriate security controls to protect Personal Information when stored or transmitted by TTL. It has established 			electronic and administrative safeguards designed to secure the information it collects, to prevent unauthorized access to or disclosure of that 			information and to ensure it is used appropriately. Some examples of those safeguards include: All TTL employees are subject to the internal Code 			of Business Conduct. The TTL Code requires all employees to follow the laws, rules, regulations, court and/or commission orders that apply to TTL's 			business such as legal requirements and company policies on the privacy of communications and the security and privacy of Customer records. 			Employees who fail to meet the standards embodied in the Code of Business Conduct are subject to disciplinary action, up to and including 			dismissal. TTL has implemented technology and security features and strict policy guidelines to safeguard the privacy of customer Personal 			Information. TTL has implemented encryption or other appropriate security controls to protect Personal Information when stored or transmitted by 			it; TTL limits access to Personal Information to those employees, contractors, and agents who need access to such information to operate, develop, 			or improve its services and products; TTL requires caller/online authentication before providing Account Information so that only the customer or 			someone who knows the customer's account Information will be able to access or change the information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn134"&gt;
&lt;p&gt;&lt;a href="#_ftnref134" name="_ftn134"&gt;[134]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf"&gt; http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn135"&gt;
&lt;p&gt;&lt;a href="#_ftnref135" name="_ftn135"&gt;[135]&lt;/a&gt; . See &amp;lt;&amp;lt; &lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker&lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn136"&gt;
&lt;p&gt;&lt;a href="#_ftnref136" name="_ftn136"&gt;[136]&lt;/a&gt; . "We have created this Privacy Policy to help you understand how we collect, use and protect your information when you visit our web and WAP sites 			and use our products and services."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn137"&gt;
&lt;p&gt;&lt;a href="#_ftnref137" name="_ftn137"&gt;[137]&lt;/a&gt; . Vodafone may hold information relating to customers that have been provided (such as on an application or registration form) or that it may has 			obtained from another source (such as its suppliers or from marketing organisations and credit agencies).&lt;/p&gt;
&lt;p&gt;This information may include, amongst other things, a customer's name, address, telephone numbers, information on how a customer uses Vodafone's 			products and services (such as the type, date, time, location and duration of calls or messages, the numbers called and how much a customer spends, 			and information on his/her browsing activity when visiting one of Vodafone's group companies' websites), the location of a customer's mobile phone 			from time to time, lifestyle information and any other information collected in relation to his/her use of Vodafone's products and services 			("information").&lt;/p&gt;
&lt;p&gt;It may use cookies and other interactive techniques such as web beacons to collect non-personal information about how a customer interacts with its 			website, and web-related products and services.&lt;/p&gt;
&lt;p&gt;It may use a persistent cookie to record details such as a unique user identity and general registration details on your PC. Vodafone states that 			most browser technology (such as Internet Explorer, Netscape etc) allows one to choose whether to accept cookies or not - a customer can either 			refuse all cookies or set their browser to alert them each time that a website tries to set a cookie.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn138"&gt;
&lt;p&gt;&lt;a href="#_ftnref138" name="_ftn138"&gt;[138]&lt;/a&gt; . In case of any concerns the privacy officer can be contacted at &lt;a href="mailto:privacyofficer@vodafone.com"&gt;privacyofficer@vodafone.com&lt;/a&gt;. 			Additionally details of the Grievance Redressal Officers is provided via the TRAI website. (TRAI website: 			&lt;a href="http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341567851124Vodafone_CC_AA-23072013.pdf"&gt; http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341567851124Vodafone_CC_AA-23072013.pdf &lt;/a&gt; _&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn139"&gt;
&lt;p&gt;&lt;a href="#_ftnref139" name="_ftn139"&gt;[139]&lt;/a&gt; . The information that Vodafone collects from customers is held in accordance with applicable laws and regulations in India. It may be used by us 			for a number of purposes connected with its business operations and functions, which include:&lt;/p&gt;
&lt;p&gt;2.1 Processing customer orders or applications;&lt;/p&gt;
&lt;p&gt;2.2 Carrying out credit checking and scoring (unless Vodafone have agreed otherwise);&lt;/p&gt;
&lt;p&gt;2.3 Providing the customer with products and/or services requested (including the presentation or elimination of calling or connected line 			identification) or administering his/her account;&lt;/p&gt;
&lt;p&gt;2.4 Billing&lt;/p&gt;
&lt;p&gt;2.5 Settling accounts with those who provide related services to Vodafone;&lt;/p&gt;
&lt;p&gt;2.6 Dealing with requests, enquiries or complaints and other customer care related activities; and all other general administrative and business 			purposes;&lt;/p&gt;
&lt;p&gt;2.7 Carrying out market and product analysis and marketing Vodafone and its group companies' products and services generally;&lt;/p&gt;
&lt;p&gt;2.8 Contacting a customer (including by post, email, fax, short text message (SMS), pager or telephone) about Vodafone and its group companies' 			products and services and the products and services of carefully selected third parties which it think may be of interest to customers (unless a 			customer asks us in writing not to). Electronic marketing messages may not include a marketing facility.&lt;/p&gt;
&lt;p&gt;2.9 Registering customer details and allocating or offering rewards, discounts or other benefits and fulfilling any requests that a customer may 			have in respect of our and our group companies' schemes.&lt;/p&gt;
&lt;p&gt;2.10 inclusion in any telephone or similar directory or directory enquiry service provided or operated by us or by a third party (subject to any 			objection or preference a customer may have indicated to us in writing);&lt;/p&gt;
&lt;p&gt;2.11 carrying out any activity in connection with a legal, governmental or regulatory requirement on Vodafone or in connection with legal 			proceedings, crime or fraud prevention, detection or prosecution;&lt;/p&gt;
&lt;p&gt;2.12 carrying out activities connected with the running of Vodafone's business such as personnel training, quality control, network monitoring, 			testing and maintenance of computer and other systems and in connection with the transfer of any part of Vodafone's business with respect to a 			customer or a potential customer.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn140"&gt;
&lt;p&gt;&lt;a href="#_ftnref140" name="_ftn140"&gt;[140]&lt;/a&gt; . In the need for disclosure to third parties, the personal information will only be disclosed to the third parties below:&lt;/p&gt;
&lt;p&gt;3.1 Vodafone's group companies who may in India use and disclose your information for the same purposes as us;&lt;/p&gt;
&lt;p&gt;3.2 those who provide to Vodafone or its group companies products or services that support the services that we provide, such as our dealers and 			suppliers;&lt;/p&gt;
&lt;p&gt;3.3 credit reference agencies (unless Vodafone has agreed otherwise) who may share your information with other organisations and who may keep a 			record of the searches Vodafone makes against a customer's name;&lt;/p&gt;
&lt;p&gt;3.4 if someone else pays a customer's bill, such as a customer's employer, that person;&lt;/p&gt;
&lt;p&gt;3.5 those providing telephone and similar directories or directory enquiry services&lt;/p&gt;
&lt;p&gt;3.6 anyone Vodafone transfers business to in respect of which a person is a customer or a potential customer;&lt;/p&gt;
&lt;p&gt;3.7 anyone who assists Vodafone in protecting the operation of the Vodafone India networks and systems, including the use of monitoring and 			detection in order to identify potential threats, such as hacking and virus dissemination and other security vulnerabilities;&lt;/p&gt;
&lt;p&gt;3.8 persons to whom Vodafone may be required to pass customer information by reason of legal, governmental or regulatory authority including law 			enforcement agencies and emergency services;&lt;/p&gt;
&lt;p&gt;3.9 any person or organisation as authorised by laws and regulations applicable in India.&lt;/p&gt;
&lt;p&gt;If a customer has opted in to receiving marketing material from Vodafone, it may also provide customer's personal information to carefully selected 			third parties who we reasonably believe provide products or services that may be of interest to customers and who have contracted with Vodafone 			India to keep the information confidential, or who are subject to obligations to protect your personal information.&lt;/p&gt;
&lt;p&gt;To opt-out of receiving Vodafone marketing materials,customers can send a 'Do Not Disturb' message to Vodafone. If a customer wishes to use 			Vodafone products or services abroad, his/her information may be transferred outside India to that country. Vodafone's websites and those of its 			group companies may also be based on servers located outside of India.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn141"&gt;
&lt;p&gt;&lt;a href="#_ftnref141" name="_ftn141"&gt;[141]&lt;/a&gt; . Vodafone takes reasonable steps to ensure that the personal information it collects, uses or discloses is accurate, complete, up-to-date and 			stored in a secure environment protected from unauthorized access, modification or disclosure.&lt;/p&gt;
&lt;p&gt;Vodafone makes every effort to maintain the security of our internet connections; however for reasons outside of our control, security risks may 			still arise. Any personal information transmitted to it or from its online products or services will be at a customer's own risk, however, it will 			use its best efforts to ensure that any such information remains secure. Vodafone cannot protect any information that a customer makes available to 			the general public - for example, on message boards or in chat rooms.&lt;/p&gt;
&lt;p&gt;Vodafone may use cookies and other interactive techniques such as web beacons to collect non-personal information about how a customer interacts.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn142"&gt;
&lt;p&gt;&lt;a href="#_ftnref142" name="_ftn142"&gt;[142]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.vodafone.com"&gt;http://www.vodafone.com&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn143"&gt;
&lt;p&gt;&lt;a href="#_ftnref143" name="_ftn143"&gt;[143]&lt;/a&gt; . See &amp;lt; 			&lt;a href="http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html"&gt; http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn144"&gt;
&lt;p&gt;&lt;a href="#_ftnref144" name="_ftn144"&gt;[144]&lt;/a&gt; . 			&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061"&gt; http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061 &lt;/a&gt; (Scope - This Privacy Policy has been created to help customer's understand how Aircel collects, uses and protects customer information when one 			visits its web and WAP sites and use its products and services.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn145"&gt;
&lt;p&gt;&lt;a href="#_ftnref145" name="_ftn145"&gt;[145]&lt;/a&gt; . This information may include, amongst other things, customer's name, father's name, mother's name, spouse's name, date of birth, address, 			telephone numbers, mobile phone number, email address, occupation and information contained in the documents used as proof of identity and proof of 			address. Aircel may also hold information related to utilization of its services. This may include customer call records, browsing history while 			surfing Aircel's website, location details and additional information provided by customer while using our services.&lt;/p&gt;
&lt;p&gt;Aircel may keep a log of the activities performed by a customer on its websites by using various internet techniques such as web cookies, web 			beacons, server log files, etc.&lt;/p&gt;
&lt;p&gt;Aircel may use cookies and other interactive techniques such as web beacons to collect non-personal information about how customers interact with 			Aircel's website, and web-related products and services&lt;/p&gt;
&lt;p&gt;Aircel may use a persistent cookie to record details such as a unique user identity and general registration details on customer's Personal 			Computers.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn146"&gt;
&lt;p&gt;&lt;a href="#_ftnref146" name="_ftn146"&gt;[146]&lt;/a&gt; . In case a customer does not provide information or consent for usage of personal information or later on withdraw consent for usage of the 			personal information so collected, Aircel reserves the right to discontinue the services for which the said information was sought.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn147"&gt;
&lt;p&gt;&lt;a href="#_ftnref147" name="_ftn147"&gt;[147]&lt;/a&gt; . In case of any feedback or concern regarding protection of personal information, customers can contact Aircel's &lt;b&gt;Circle Care ID.&lt;/b&gt; Alternatively, one may also direct your privacy-related feedback or concerns to the &lt;b&gt;Circle Nodal Officer.&lt;/b&gt; (e.g. - Delhi Circle 			Nodal details are as mentioned below):&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Name: Moushumi De&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; Contact Number: 9716199209&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; E-mail: &lt;/b&gt; &lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061"&gt; &lt;b&gt;nodalofficer.delhi@aircel.co.in&lt;/b&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Further it provides for a general customer grievance redressal mechanism&lt;/p&gt;
&lt;p&gt;Additionally details of the Grievance Redressal Officers is provided via the TRAI website.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; To resolve all concerns, Aircel has established a 2-tier complaint handling mechanism.&lt;/b&gt; &lt;b&gt;Level I: Our Customer Touch Points&lt;/b&gt; As an Aircel customer you have the convenience to contact at Customer Interface Points via email, post or telephone.			&lt;b&gt;Level II - Appellate Authority&lt;/b&gt;Despite the best efforts put by Aircel's executive, if a customer is still not satisfied with the 			resolution provided then he/she may submit his/her concern to the Appellate Authority of the circle. Comments - However this information 			contradicts the mechanism provided under Aircel's Manual of Practice for handling Consumer Complaints which provides for a 3&lt;b&gt;-&lt;/b&gt;tier 			complaint handling mechanism.&lt;/p&gt;
&lt;p&gt;[According to the DoT - The 			&lt;b&gt; earlier three-tier complaint redressal mechanism - Call center, Nodal Center and Appellate Authority, has been replaced by a two-tier &lt;/b&gt; one by doing away with the level of Nodal Officer. This is because the Complaint Centres are essentially registration and response centres and do 			not deal with the resolution of complaints. They only facilitate registration of consumer complaint and the level at which a problem is resolved 			within a company depends upon the complexity of the issue involved.]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn148"&gt;
&lt;p&gt;&lt;a href="#_ftnref148" name="_ftn148"&gt;[148]&lt;/a&gt; . It may be used by us for a number of purposes connected with our business operations and functions, which include:&lt;/p&gt;
&lt;p&gt;1. Processing customer orders or applications.&lt;/p&gt;
&lt;p&gt;2. Carrying out credit checking and scoring (unless agreed otherwise).&lt;/p&gt;
&lt;p&gt;3. Providing customers with products and/or services requested (including the presentation or elimination of calling or connected line 			identification) or administering a customer's account.&lt;/p&gt;
&lt;p&gt;4. Billing (unless there exists another agreed method).&lt;/p&gt;
&lt;p&gt;5. Settling accounts with those who provide related services to Aircel.&lt;/p&gt;
&lt;p&gt;6. Dealing with requests, enquiries or complaints and other customer care related activities; and all other general administrative and business 			purposes.&lt;/p&gt;
&lt;p&gt;7. Carrying out market and product analysis and marketing our and our group companies' products and services generally.&lt;/p&gt;
&lt;p&gt;8. Contacting customers (including by post, email, fax, short text message (SMS), pager or telephone) about Aircel and its group companies' 			products and services and the products and services of carefully selected third parties which it think may be of interest to a customer (unless a 			customer says 'no' in writing). Electronic messages need not have an unsubscribe facility.&lt;/p&gt;
&lt;p&gt;9. Registering customer details and allocating or offering rewards, discounts or other benefits and fulfilling any requests that customers may have 			in respect of Aircel and its group companies' loyalty or reward programmes and other similar schemes.&lt;/p&gt;
&lt;p&gt;10. Inclusion in any telephone or similar directory or directory enquiry service provided or operated by Aircel or by a third party (subject to any 			objection or preference a customer may have indicated in writing).&lt;/p&gt;
&lt;p&gt;11. Carrying out any activity in connection with a legal, governmental or regulatory requirement on Aircel or in connection with legal proceedings, 			crime or fraud prevention, detection or prosecution.&lt;/p&gt;
&lt;p&gt;12. Carrying out activities connected with the running of business such as personnel training, quality control, network monitoring, testing and 			maintenance of computer and other systems and in connection with the transfer of any part of Aircel's business with respect to a customer or 			potential customer. Aircel may use cookies and other interactive techniques such as web beacons to collect non-personal information about how 			customers interact with our website, and web-related products and services, to:&lt;/p&gt;
&lt;p&gt;● Understand what a customer likes and uses about Aircel's website.&lt;/p&gt;
&lt;p&gt;● Provide a more enjoyable, customised service and experience&lt;/p&gt;
&lt;p&gt;Aircel may use a persistent cookie to record details such as a unique user identity and general registration details on your Personal Computer.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn149"&gt;
&lt;p&gt;&lt;a href="#_ftnref149" name="_ftn149"&gt;[149]&lt;/a&gt; . Where Aircel needs to disclose your information to third parties, such third parties will be:&lt;/p&gt;
&lt;p&gt;1. Group companies who may use and disclose your information for the same purposes as us.&lt;/p&gt;
&lt;p&gt;2. Those who provide to Aircel or its group companies products or services that support the services that we provide, such as our dealers and 			suppliers.&lt;/p&gt;
&lt;p&gt;3. Credit reference agencies (unless we have agreed otherwise) who may share your information with other organisations and who may keep a record of 			the searches Aircel make against your name.&lt;/p&gt;
&lt;p&gt;4. If someone else pays a customer's bill, such as an employer.&lt;/p&gt;
&lt;p&gt;5. Those providing telephone and similar directories or directory enquiry services.&lt;/p&gt;
&lt;p&gt;6. Anyone Aircel transfers its business to in respect of which you are a customer or a potential customer.&lt;/p&gt;
&lt;p&gt;7. Anyone who assists Aircel in protecting the operation of the Aircel networks and systems, including the use of monitoring and detection in order 			to identify potential threats, such as hacking and virus dissemination and other security vulnerabilities.&lt;/p&gt;
&lt;p&gt;8. Persons to whom Aircel may be required to pass customer information by reason of legal, governmental or regulatory authority including law 			enforcement agencies and emergency services. If a customer has opted in to receiving marketing material from Aircel, it may also provide personal 			information to carefully selected third parties who it reasonably believes to provide products or services that may be of interest to customers and 			who have contracted with Aircel to keep the information confidential, or who are subject to obligations to protect customer personal information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn150"&gt;
&lt;p&gt;&lt;a href="#_ftnref150" name="_ftn150"&gt;[150]&lt;/a&gt; . We adopt reasonable security practices and procedures to include, technical, operational, managerial and physical security control measures in 			order to protect your personal information from unauthorized access, or disclosure while it is under our control.Our security practices and 			procedures limit access to personal information on need to know basis. Further, our employees, to the extent they may have limited access to your 			personal information on need to know basis, are bound by Code of Conduct and Confidentiality Policies which obligate them to protect the 			confidentiality of personal informationWe take adequate steps to ensure that our third parties adopt reasonable level of security practices and 			procedures to ensure security of personal information&lt;/p&gt;
&lt;p&gt;We may retain your personal information for as long as required to provide you with services or if otherwise required under any law. We, however 			assure you that Aircel does not disclose your personal information to unaffiliated third parties (parties outside Aircel corporate network and its 			Strategic and Business Partners) which could lead to invasion of your privacy&lt;/p&gt;
&lt;p&gt;When we dispose off your personal information, we use reasonable procedures to erase it or render it unreadable (for example, shredding documents 			and wiping electronic media).&lt;/p&gt;
&lt;p&gt;We will take reasonable steps to ensure that the personal information we collect, use or disclose is accurate, complete, up-to-date and stored in a 			secure environment protected from unauthorised access, modification or disclosure. We use a variety of security technologies and procedures to help 			protect your personal information from unauthorized access, use, or disclosure. For example, we store the personal information you provide on 			computer systems with limited access, which are located in controlled facilities. When we transmit highly confidential information (such as a 			credit card number or password) over the Internet, we protect it through the use of encryption, such as the Secure Socket Layer (SSL) protocol. If 			a password is used to help protect your accounts and personal information, it is your responsibility to keep your password confidential. Do not 			share this information with anyone. If you are sharing a computer with anyone you should always log out before leaving a site or service to protect 			access to your information from subsequent users.&lt;/p&gt;
&lt;p&gt;We make every effort to maintain the security of our internet connections; however for reasons outside of our control, security risks may still 			arise. Any personal information transmitted to us or from our online products or services will therefore be your own risk, however we will use our 			best efforts to ensure that any such information remains secure.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn151"&gt;
&lt;p&gt;&lt;a href="#_ftnref151" name="_ftn151"&gt;[151]&lt;/a&gt; . http://www.acttv.in/index.php/privacy-policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn152"&gt;
&lt;p&gt;&lt;a href="#_ftnref152" name="_ftn152"&gt;[152]&lt;/a&gt; . "When you register, we ask for information such as your name, email address, birth date, gender, zip code, occupation, industry, and personal 			interests.&lt;/p&gt;
&lt;p&gt;The Company collects information about your transactions with us and with some of our business partners, including information about your use of 			products and services that we offer."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn153"&gt;
&lt;p&gt;&lt;a href="#_ftnref153" name="_ftn153"&gt;[153]&lt;/a&gt; . Not provided for on the TRAI website as ACT is not a telecom.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn154"&gt;
&lt;p&gt;&lt;a href="#_ftnref154" name="_ftn154"&gt;[154]&lt;/a&gt; . The Company can use information for the following general purposes: to customize the advertising and content you see, fulfill your requests for 			products and services, improve our services, contact you, conduct research, and provide anonymous reporting for internal and external clients.&lt;/p&gt;
&lt;p&gt;The Company collects personal information when you register with the Company, when you use the Company products or services, when you visit the 			Company pages or the pages of certain partners of the Company. The Company may combine information about you that we have, with information we 			obtain from business partners or other companies. The Company shall have the right to pass on the same to its business associates, franchisees 			without referring the same to you.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn155"&gt;
&lt;p&gt;&lt;a href="#_ftnref155" name="_ftn155"&gt;[155]&lt;/a&gt; . Aircel provide the information to trusted partners who work on behalf of or with the Company under confidentiality agreements. These companies 			may use customer personal information to help the Company communicate about offers from the Company and marketing partners.&lt;/p&gt;
&lt;p&gt;Aircel believe it is necessary to share information in order to investigate, prevent, or take action regarding illegal activities, suspected fraud, 			situations involving potential threats to the physical safety of any person, violations of the Company's terms of use, or as otherwise required by 			law.&lt;/p&gt;
&lt;p&gt;Aircel transfer information about a customer if the Company is acquired by or merged with another company under a different management. In this 			event, the Company will notify a customer before information about a customer is transferred and becomes subject to a different privacy policy.&lt;/p&gt;
&lt;p&gt;The Company plans to display targeted advertisements based on personal information. Advertisers (including ad serving companies) may assume that 			people who interact with, view, or click on targeted ads meet the targeting criteria - for example, women ages 18-24 from a particular geographic 			area.&lt;/p&gt;
&lt;p&gt;The Company will not provide any personal information to the advertiser when customers interact with or view a targeted ad. However, by interacting 			with or viewing an ad a customer consents to the possibility that the advertiser will make the assumption that he/she meets the targeting criteria 			used to display the ad.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn156"&gt;
&lt;p&gt;&lt;a href="#_ftnref156" name="_ftn156"&gt;[156]&lt;/a&gt; . Rule 8.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules'&gt;https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-01-13T02:37:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
