The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 11 to 25.
Platformisation of Domestic Work in India: Report from a Multistakeholder Consultation
https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-from-a-multistakeholder-consultation
<b>On November 16, 2019, The Centre for Internet and Society invited officials from the Department of Labour (Government of Karnataka), members of domestic worker unions, domestic workers, company representatives, and civil society researchers at the Student Christian Mission of India House to discuss preliminary findings of an ongoing research project and facilitate a multistakeholder consultation to understand the contemporaneous platformisation of domestic work in India. Please find here a report from this consultation authored by Tasneem Mewa. </b>
<p> </p>
<h4>Report from the consultation: <a href="https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-february-2020/" target="_blank">Download</a> (PDF)</h4>
<h4>Agenda and details of the consultation: <a href="https://cis-india.org/raw/domestic-work-in-the-gig-economy-20191116" target="_blank">URL</a></h4>
<hr />
<h3>Introduction</h3>
<p>On November 16, 2019, The Centre for Internet and Society invited officials from the Department of Labour (Government of Karnataka), members of domestic worker unions, domestic workers, company representatives, and civil society researchers at the Student Christian Mission of India House to discuss preliminary findings of an
ongoing research project and facilitate a multistakeholder consultation to understand the contemporaneous platformisation of domestic work in India.</p>
<p>This collaborative project is being led by the the Centre for Internet and Society, India (CIS) together with Domestic Workers Rights Union (DWRU) in Bangalore. The research team comprises of Geeta Menon, Parijatha G.P., Sumathi, Radha K., and Zennathunnisa from DWRU, and Aayush Rathi and Ambika Tandon from CIS. Through a collective research process, this research team has explored the proliferation of digital platforms as a key intermediary in the domestic work sector, and in supporting or challenging deeply rooted structural inequities. For more information on the research project, see the project announcement published on the CIS website [1]. This work forms part of the Association for Progressive Communications’ <a href="https://www.apc.org/en/project/firn-feminist-internet-research-network" target="_blank">Feminist Internet Research Network</a> project, supported by the International Development Research Centre, Ottawa, Canada.</p>
<p>The multistakeholder consultation was structured in two segments: a) a presentation outlining initial observations and analysis, and b) a semi-moderated open discussion. Together, these sessions aimed to initiate conversations pertaining to the role of digital platforms, the legal classification of domestic and gig workers, and devising regulatory solutions to improve conditions of work. Preliminary findings were based on qualitative in-depth interviews with workers, platform companies, unions, skilling agencies, and labour officials in both Bengaluru and
New Delhi. Feminist approaches were employed in conducting these interviews, and participatory, consensual, reflexive and collaborative research was prioritised.</p>
<p>Situating the lived realities of domestic workers, the event sought to centre the voice of domestic workers in the consultation around the future of their work. The event had attendance from multilingual attendees. The original presentation was made in English, and Geeta Menon translated the presentation and the discussion that followed in Kannada [2].</p>
<p> </p>
<h3>Footnotes</h3>
<p>[1] Tandon, A., & Rathi, A. (2019, October 1). Digital mediation of domestic and care work in India: Project
Announcement. Retrieved from <a href="https://cis-india.org/raw/https://cis-india.org/raw/digital-domestic-work-india-announcement" target="_blank">https://cis-india.org/raw/digital-domestic-work-india-announcement</a></p>
<p>[2] Rathi, A. (2019, November 16). Domestic Work in the 'Gig Economy'. Retrieved from
<a href="https://cis-india.org/raw/domestic-work-in-the-gig-economy-20191116" target="_blank">https://cis-india.org/raw/domestic-work-in-the-gig-economy-20191116</a>; Tandon, A., & Rathi, A. (2019).
Domestic workers in the ‘gig’ economy [PowerPoint slides]. Retrieved from
<a href="https://cis-india.org/raw/domestic-work-and-platforms-presentation" target="_blank">https://cis-india.org/raw/domestic-work-and-platforms-presentation</a></p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-from-a-multistakeholder-consultation'>https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-from-a-multistakeholder-consultation</a>
</p>
No publishertasneemDigital EconomyRAW EventsDigital LabourResearchResearchers at WorkDigital Domestic Work2020-02-17T09:46:52ZBlog EntryDomestic Work in the ‘Gig Economy’
https://cis-india.org/raw/domestic-work-in-the-gig-economy-20191116
<b>The CIS and Domestic Workers’ Rights Union (DWRU) are hosting a discussion on the ‘gig economy’ and domestic work on Saturday, November 16 at Student Christian Movement of India, Mission Road, Bangalore. This event is a part of a project supported by the Feminist Internet Research Network led by Association for Progressive Communication (APC) and the International Development Research Centre (IDRC), Canada.</b>
<hr />
<p style="text-align: justify;"><img src="https://cis-india.org/home-images/FutureofWork.jpeg" alt="Domestic work in the gig economy, 16 December 2019, Student Christian Mission of India, Bangalore" /></p>
<p> </p>
<h4>Presentation: <a href="https://cis-india.org/raw/domestic-work-and-platforms-presentation" class="internal-link" title="Domestic Work and Platforms Presentation">Download</a> (PDF)</h4>
<h4>Concept Note: <a href="https://cis-india.org/raw/cis-dwru-apc-firn-domestic-work-in-the-gig-economy-concept-note" target="_blank">Download</a> (PDF)</h4>
<h4>Venue: Student Christian Movement of India (29, 2nd Cross, CSI Compound, Mission Road, Sampangi Rama Nagara)</h4>
<h4>Date and Time: Saturday, November 16, 3:00-5:30 pm</h4>
<h4>Location: <a href="https://goo.gl/maps/dCnQhid1eiyLG3DE6" target="_blank">URL</a> (Google Maps)</h4>
<h4>Feminist Internet Research Network: <a href="https://www.apc.org/en/project/firn-feminist-internet-research-network" target="_blank">URL</a></h4>
<hr />
<p style="text-align: justify;">Over the last few months, the Centre for Internet and Society, India (CIS) and the Domestic Workers’ Rights Union (DWRU) have been doing research on the platformisation of domestic work in India. In the first phase of the research, we gathered data through interviews with several stakeholders. More information about the project can be found here: <a href="https://cis-india.org/raw/digital-domestic-work-india-announcement" target="_blank">https://cis-india.org/raw/digital-domestic-work-india-announcement</a>.</p>
<p style="text-align: justify;">We now find ourselves in the second phase of the research in which we have prepared a preliminary report and are seeking feedback and inputs from experts. For this, we invite you to a roundtable discussion on domestic workers in the ‘gig economy’.</p>
<p style="text-align: justify;">The participants at the roundtable will comprise of representatives from key stakeholder groups including platform workers (i.e. domestic workers sourcing jobs through platforms), platform companies, domestic workers organisations, civil society researchers and the state labour department.</p>
<p style="text-align: justify;">The event will begin with a presentation of the project and our initial findings. The rest of the time is set aside for a semi-moderated discussion between all participants. To ensure a focused discussion, we are also limiting participation to 30, and are hoping to have a good mix across stakeholder groups.</p>
<h4>If you will be joining us, please RSVP to Aayush Rathi at aayush@cis-india.org.</h4>
<p>
For more details visit <a href='https://cis-india.org/raw/domestic-work-in-the-gig-economy-20191116'>https://cis-india.org/raw/domestic-work-in-the-gig-economy-20191116</a>
</p>
No publisheraayushDigital EconomyRAW EventsDigital LabourResearchers at WorkEventDigital Domestic Work2019-12-06T04:52:11ZEventDoing Standpoint Theory
https://cis-india.org/raw/doing-standpoint-theory
<b>Feminist research methodology has evolved from different epistemologies, with several different schools of thought. Some of the more popular ones are feminist standpoint theory, feminist empiricism, and feminist relativism. Standpoint theory holds the experiences of the marginalised as the source of ‘truth’ about structures of oppression, which is silenced by traditional objectivist research methods as they produce knowledge from the standpoint of voices in positions of power. In this essay published on the GenderIT website, Ambika Tandon and Aayush Rathi [1] discuss the practical applicability of these epistemologies to research practices in the field of technology and gender.</b>
<p> </p>
<h4>Cross-posted from <a href="https://www.genderit.org/articles/doing-standpoint-theory" target="_blank">GenderIT</a>, September 1, 2019</h4>
<hr />
<p><img src="https://cis-india.org/CatalinaAlzate.jpg/image" alt="Catalina Alzate - Speech Bubbles" class="image-left image-inline" title="Catalina Alzate - Speech Bubbles" /></p>
<h6>Image description: Three speech bubbles on different textures. Artist: <a href="https://www.genderit.org/users/catalina-alzate" target="_blank">Catalina Alzate</a><br /></h6>
<p>Feminist research methodology has evolved from different epistemologies, with several different schools of thought. Some of the more popular ones are feminist standpoint theory, feminist empiricism, and feminist relativism. Standpoint theory holds the experiences of the marginalised as the source of ‘truth’ about structures of oppression, which is silenced by traditional objectivist research methods as they produce knowledge from the standpoint of voices in positions of power [2]. Feminist empiricism does not eschew traditional modes of knowledge production, but emphasises diversity of research participants for feminist (and therefore also rigorous) knowledge production [3]. Relativists have critiqued standpoint theory for its tendency to essentialise the experience of marginalised groups, and subsume them into one homogenous voice to achieve the goal of ‘emancipatory’ research [4]. Relativists instead focus on multiple standpoints, which could be Dalit women, lesbian women, or women with disabilities [5]. We will be discussing the practical applicability of these epistemologies to research practices in the field of technology and gender.</p>
<h4>Standpoint theory holds the experiences of the marginalised as the source of ‘truth’ about structures of oppression, which is silenced by traditional objectivist research methods as they produce knowledge from the standpoint of voices in positions of power.</h4>
<p>As part of the Feminist Internet Research Network, the Centre for Internet and Society is undertaking research on the <a href="https://cis-india.org/raw/digital-domestic-work-india-announcement" target="_blank">digital mediation of domestic and care work in India</a>. The project aims to assess shifts in the sector, including conditions of work, brought on by the entry of digital platforms. Our starting point for designing a methodology for the research was standpoint theory, which we thought to be the best fit as the goal of the project was to disrupt dominant narratives of women’s labour in relation to platformisation. In the context of dalit feminis, Rege warns that standpoint research risks producing a narrow frame of identity politics, although it is critical to pay attention to lived experience and the “naming of difference” between dalit women and savarna women [6]. She asserts that neither ‘women’ nor ‘dalit women’ is a homogenous category. While feminist researchers from outside these categories cannot claim to “speak for” those within, they can “reinvent” themselves as dalit feminists and ally themselves with their politics.</p>
<p>In order to address this risk of appropriating the voices of domestic workers (“speaking for”), we chose to directly work with a domestic workers’ union in Bengaluru called Stree Jagruti Smiti. Bengaluru is one of the two cities we are conducting research in (the other being Delhi, with very few registered unions). This is meant to radically destabilise power hierarchies and material relations within the research process, as benefits of participatory research tend to accumulate with the researchers rather than participants [7].</p>
<p>Along with amplifying the voices of workers, a central objective of our project is to question the techno-solutionism that has accompanied the entry of digital platforms into the domestic work sector, which is unorganised and unregulated. To do so, we included companies and state labour departments as participants whose standpoint is to be interrogated. By juxtaposing the standpoints of stakeholders that have differential access to power and resources, the researcher is able to surface various conflicts and intersections in dominant and alternative narratives. This form of research also brings with it unique challenges, as researchers could find themselves mediating between the different stakeholders, while constantly choosing to privilege the standpoint of the least powerful - in this case the workers. Self-reflexivity then becomes necessary to ensure that the project does not slip into an absolutely relativist position, rather using the narratives of workers to challenge those of governments and private actors. This can also be done by ensuring that workers have agency to shape the agenda of researchers, thereby producing research which is instrumental in supporting grassroots campaigns and movements.</p>
<h4>Self-reflexivity then becomes necessary to ensure that the project does not slip into an absolutely relativist position, rather using the narratives of workers to challenge those of governments and private actors.</h4>
<p>Feminist participatory research itself, despite its many promises, is not a linear pathway to empowerment for participants [8]. At the very outset of the project, we were constantly asked the question by domestic workers and unions – why should we participate in this project? Researchers, in their experience, acquire information from the community throughout the process of data collection by positioning themselves as allies. However, as all such engagements are bound to limited timelines and budgets, researchers are then often absent at critical junctures where the community may need external support. We were also told that all too often, the output of the research itself does not make its way back to the participants, making it a one-way process of knowledge extraction. Being mindful of these experiences, we have integrated a feedback loop into our research design, which will allow us to design outputs that are accessible and useful to collectives of domestic workers.</p>
<p>Not only domestic workers and their organisations, many corporations operating these online portals and platforms often questioned the benefits of participating in the project. However, the manner of articulation differed. While attempting to reject the hierarchical nature of the researcher/participant relationship, we increasingly became aware that the underlying power equation was not a monolith. Rather, it varied across stakeholder groups and was explicitly contingent on the socially constructed positionalities already existing outside of the space of the interview. Companies, governments and workers all exemplified varying degrees of engagement with, knowledge of, and contributions to research. Interviews with workers and unions, and even some bootstrapped (i.e. without much external funding) , socially-minded companies, were often cathartic with an expectation of some benefits in return for opening themselves up to researchers. This was quite different for governments and larger companies, as conversations typically adhered to the patriarchal and classed notions of professionalism in sanitised, formal spaces [9] and the strict dichotomy between public and personal spaces. Their contribution seemingly required lesser affective engagement from the interviewee, thereby resulting in lesser investment in the outcome of the research itself.</p>
<p>The cathartic nature of interviews also speak to the impossibility of the distanced, Platonic, school of research. We were often asked politically charged questions, our advice solicited and information sought. Workers and representatives from platform companies alike would question our motivations with the research and challenge us by inquiring about the benefits accruing to us. Again, both set of stakeholders would often ask differently about how other platforms were; workers already registered on a platform would wonder if another platform would be ‘better’ and representatives of platform companies would be curious about competition. This is perhaps a consequence of attempting to design a study that is of use and of interest to the workers we have been reaching out to [10]. At times, we found ourselves at a place in the conversation where we were compelled to respond to political positions for the conversation to continue. There were interviews where notions of caste hierarchies (within oppressed classes) as a justification/complaint for engaging/having to engage in certain tasks would surface. Despite being beholden to a feminist consciousness that disregards the idea of the interviewer as neutral, we often found ourselves only hesitantly forthcoming. At times, it was to keep the interview broadly focused around the research subject, at others it was due to our own ignorance about the research artefact (in this instance, platforms mediating domestic work services). This underscores the challenges of seeing the interview as a value ridden space, where the contradictions between the interview as a data collection method and as a consciousness raising emerged - how could we share information about the artefact we were in the process of collecting data about?</p>
<h4>We were often asked politically charged questions, our advice solicited and information sought.</h4>
<p>The fostering of ‘rapport’ [11] has made its may into method, almost unknowingly. Often, respondents across stakeholder groups started from an initial place of hesitation, sometimes even suspicion. Several structural issues could be at work here - our inability in being able to accurately describe research itself, the class differences and at times, ideological ones as well. While with most participants, rapport was eventually established, its establishment was a laboured process. Especially given that we were using one-off, in-depth interviews as our method, securing an interview was contingent on the establishment of rapport. This isn’t to suggest that feminist research mandatorily requires the ‘doing of rapport’ [12], but that when it does, it’s a fortunate outcome and that feminist researchers engage with it more critically.</p>
<p>Building rapport creates an impression of having minimised the exploitation of the participant, however the underlying politics and pressures of building rapport need to be interrogated. Rapport, like research itself, is at times a performance; rapport is often not naturally occuring. Rather, rapport may also be built to conceal the very structural factors preventing it. For instance, during instances of ideological differences during the interview, we were at times complicit through our silence. This may have been to further a certain notion of ‘objectivity’ itself whereby the building and maintenance of rapport is essential to surfacing a participant’s real views. This then raises the questions: What are the ethical questions that the suppression of certain viewpoints and reactions pose? How does the building, maintenance and continuance of rapport inform the research findings? Rapport, then, comes in all shapes and sizes and its manifold forms implicate the research process differently. Another critical question to be addressed is - why does some rapport take less work than others? With platform companies, building rapport came by easier than it did with workers both on and off platforms. If understood as removing degrees of distance between the researcher and participants, several factors could play into the effort required to build rapport. For instance, language was a critical determinant of the ease of relationship-building. Being more fluent in English than in colloquial Hindi enabled clearer articulation of the research. Further, familiarity with the research process was, as expected, mediated along class lines. This influenced the manner in which we articulated research outcomes and objectives to workers with complete unfamiliarity with the meaning of research. Among workers, this unfamiliarity often resulted in distrust, which required the underlying politics of the research to be more critically articulated.</p>
<p>By and large, the feminist engagement with research methods has been quite successful in its resistance and transformation of traditional forms. Since Oakley’s conception of the interview as a deeply subjective space [13] and Harding’s dialectical conception of masculinist science through its history [14], the application of feminist critical theory has increasingly subverted assumptions around the averseness of research to political motivations. At the same time, it has made knowledge-production occur in a more equitable space. It is in this context that standpoint theory has had wide purchase, but challenges persist in its application. As the foregoing discussion outlines, we have been able to achieve some of the goals of feminist standpoint research while missing out on others. We also found the ‘multiple standpoints’ approach of relativists to be useful in a project involving multiple stakeholders - thereby also avoiding the risk of essentialisation of the identities of domestic workers. However, unlike the tendency of relativists to focus on each perspective as ‘equally valid truth’, we are choosing to focus on the conflicts and intersections between emerging discourses. Through this hybrid theoretical framework, we are seeking to make knowledge production more equitable. At the same time, the discussion around rapport shows that this may nevertheless happen in a limited fashion. Feminist research may never be fully non-extractive. The reflexivity exercised and choices made during the course of the research are key.</p>
<h4>Unlike the tendency of relativists to focus on each perspective as ‘equally valid truth’, we are choosing to focus on the conflicts and intersections between emerging discourses.</h4>
<p> </p>
<h3><strong>Endnotes</strong></h3>
<p>[1] The names of the authors are in alphabetical order.</p>
<p>[2] Harding, S. (2003) The Feminist Standpoint Theory Reader: Intellectual and Political Controversies, Routledge.</p>
<p>[3] M. Wickramasinghe, Feminist Research Methodology: Making meaning out of meaning-making, Zubaan, 2014</p>
<p>[4] Pease, D. (2000) Researching profeminist men's narratives: participatory methodologies in a postmodern frame. In B. Fawcett, D. Featherstone, J. Fook ll)'ld A. Rossiter (eds) Restarching and Practising in Social Work: Postmodern Feminist Perspectives (London: Routledge).</p>
<p>[5] Stanley, L. and Wise, S. (1983) Breaking Out: Feminist Consciousness and Feminist Research (London: Routledge and Kegan Paul).</p>
<p>[6] Rege, S. 1998. ” Dalit Women Talk Differently: A critique of ‘Difference’ and Towards a Dalit Feminist Standpoint.” Economic and Political Weekly, Vol. 33, No.44, pp 39-48.</p>
<p>[7] Heeks, R. and Shekhar, S. (2018) An Applied Data Justice Framework: Analysing Datafication and Marginalised Communities in Cities of the Global South. Working Paper Series, Centre for Development Informatics, University of Manchester.</p>
<p>[8] Stone, E. and Priestley, M. (1996) Parasites, pawn and partners: disability research and the role of nondisabled researchers. British Journal of Sociology, 47(4), 699-716.</p>
<p>[9] Evans, L. (2010). Professionalism, professionality and the development of education professionals. Br. J. Educ. Stud. 56, 20–38. doi:10.1111/j.1467-8527.2007.00392.x</p>
<p>[10] Webb C. Feminist methodology in nursing research. J Adv Nurs. 1984 May;9(3):249-56.</p>
<p>[11] Berger, R. (2015). Now I see it, now I don’t: researcher’s position and reflexivity in qualitative research. Qual. Res. 15, 219–234. doi:10.1177/1468794112468475; Pitts, M. J., and Miller-Day, M. (2007). Upward turning points and positive rapport development across time in researcher-participant relationships. Qual. Res. 7, 177–201. doi:10.1177/1468794107071409</p>
<p>[12] Dunscombe, J., and Jessop, J. (2002). “Doing rapport, and the ethics of ’faking friendship’,” in Ethics in Qualitative Research, eds T. Miller, M. Birch, M. Mauthner, and J. Jessop (London: SAGE), 108–121.</p>
<p>[13] Oakley, A. (1981). “Interviewing women: a contradiction in terms?” in Doing Feminist Research, ed. H. Roberts (London: Routledge and Kegan Paul), 30–61.</p>
<p>[14] Harding, S. (1986). The Science Question in Feminism. Ithaca: Cornell University Press.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/raw/doing-standpoint-theory'>https://cis-india.org/raw/doing-standpoint-theory</a>
</p>
No publisherAmbika Tandon and Aayush RathiDigital EconomyGenderDigital LabourResearchPublicationsResearchers at WorkDigital Domestic Work2019-12-06T04:59:35ZBlog EntryDigital mediation of domestic and care work in India: Project Announcement
https://cis-india.org/raw/digital-domestic-work-india-announcement
<b>It is our great pleasure to announce that we are undertaking a study on digital mediation of domestic and care work in India, as part of and supported by the Feminist Internet Research Network led by the Association for Progressive Communications (APC), funded by the International Development Research Centre (IDRC). The study is exploring the ways in which structural inequalities, such as those of gender and class, are being reproduced or challenged by digital
platforms. The project sites are Delhi and Bangalore, where we are conducting interviews with workers, companies, and unions. In Bangalore, we are collaborating with Stree Jagruti Samiti to collect qualitative data from different stakeholders. The outputs of the research will include a report, policy brief, and other communication materials in English, Hindi, and Kannada. This study is being led by Ambika Tandon and Aayush Rathi, along with Sumandro Chattapadhyay.</b>
<p> </p>
<h4>Feminist Internet Research Network: <a href="https://www.apc.org/en/project/firn-feminist-internet-research-network" target="_blank">apc.org/en/project/firn-feminist-internet-research-network</a></h4>
<hr />
<h3>Introduction to the Project</h3>
<p>This project seeks to investigate the mediation of domestic and care work through digital platforms in India. These forms of labour fall within the informal economy, which employs the largest share of non-agricultural workers in the global South [1]. Workers and economic units in the informal economy differ widely in terms of all metrics, including income levels, size and type of enterprise, and status of worker. According to the International Labour Organisation’s Resolution on decent work and the informal economy, it refers to “all economic activities by workers and economic units that are - in law of practice - not covered or insufficiently covered by formal arrangements” [2]. What this implies in practice for workers in the informal economy is greater vulnerability to poor work conditions, poverty, and violation of labour rights [3].</p>
<p>Women, particularly those with intersectional marginalities, including that of caste and class, are overrepresented in the informal economy globally and in India. Domestic work in particular has been stratified along the lines of caste and gender historically. Further, class has become more salient in producing stratifications in labour relations following urbanisation and gentrification. These intersections have shaped employment relations in the sector in different ways, which range from feudal to contractual models. Digital platforms are increasingly becoming intermediaries in this space, mediating between so called ‘semi-skilled’ or ‘low-skilled’ workers from lower classes, and millions of middle and upper class employers in tier I cities. This is expected to shift the stratification of workers and employment relations in key ways.</p>
<p>Through a feminist approach to digital labour, our project aims to examine platforms offering domestic or reproductive care work. This will be situated within larger feminist critiques around the devaluation and invisibilisation of women’s labour within patriarchal-capitalist economic discourse. The project further seeks to unpack technocratic imaginaries of the platform economy by looking at access and meaningful use of technology and qualifying narratives around labour market optimisation, empowerment, and agency. We will include within this
scope two kinds of platforms: marketplaces for workers to post their profiles; and on-demand platforms with algorithmic matching of workers and employers.</p>
<h3>Research Questions</h3>
<p>Our hypothesis is that platforms are reconfiguring labour conditions, which would empower and/or exploit workers in ways qualitatively different than non-standard work off the platform. In order to interrogate this further, we will study wages, conditions of work, social security, skill levels, and worker surveillance off platforms. This will be used to develop contextual knowledge around the conditions of work among (a) domestic workers on and off platforms in particular, and (b) informal sector workers joining the web-based gig economy in general.</p>
<p>The overarching question that the research will address is, <strong>what are the ways in which structural inequalities are challenged or reproduced through the growth of digital platforms in reproductive and care work?</strong></p>
<ul><li>How are relations of social inequality, including along the axes of caste and gender, reworked through digital platforms, especially in a context where domestic and care work remains historically undervalued and dominated by women workers with intersectional marginalities?<br /><br /></li>
<li>How do workers on platforms envision the role of the state, market, and informal networks of kinship in intervening in employment relations?<br /><br /></li>
<li>How is inequality and exploitation in informal labour reconfigured through platforms, with specific reference to work conditions (including hours of work, and physical and mental demands of the workplace), wages, social security, and surveillance?<br /><br /></li>
<li>What strategies of negotiation are being and have been adopted by care workers on and off platforms?<br /><br /></li>
<li>Is collectivisation an aspiration for care workers across different models of employment?<br /><br /></li>
<li>How can negotiation and collectivisation strategies inform the ongoing challenges faced by both care workers and platform workers?</li></ul>
<h3>Endnotes</h3>
<p>[1] International Labour Office, (2018). Women and men in the informal economy: A statistical picture. Third Edition. International labour Organisation. <a href="https://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/docu-&#xA;ments/publication/wcms_626831.pdf" target="_blank">https://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/docu-
ments/publication/wcms_626831.pdf</a></p>
<p>[2] International Labour Organisation, (2002). 2002 ILC Resolution and Conclusions on Decent Work and the Informal Economy. <a href="https://www.ilo.org/global/topics/employment-promotion/informal-economy/lang--en/index.htm&#xA; target=">https://www.ilo.org/global/topics/employment-promotion/informal-economy/lang--en/index.htm</a></p>
<p>[3] Ibid.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/raw/digital-domestic-work-india-announcement'>https://cis-india.org/raw/digital-domestic-work-india-announcement</a>
</p>
No publisherAmbika Tandon and Aayush RathiDigital EconomyDigital LabourResearchResearchers at WorkDigital Domestic Work2019-10-10T08:09:34ZBlog EntryResearch Symposium on Digital Transitions in Cultural and Creative Industries in India, New Delhi, Feb 27-28
https://cis-india.org/raw/digital-transitions-in-cultural-and-creative-industries-in-india-symposium-2018
<b>It is our privilege to collaborate with LabEx ICCA (Université Paris 13), UNESCO New Delhi, Centre for Social Sciences and Humanities (CSH), and Centre d'études de l'Inde et de l'Asie du Sud (CEIAS), to organise a Research Symposium on Digital Transitions in Cultural and Creative Industries in India. The symposium gathers researchers and practitioners engaging with the changing landscape of cultural and creative industries in India in the context of the rapid expansion of digital technologies and social media. We invite you to join us for a critical exploration of the prevalent discourse around cultural and creative industries, to identify what could be the different forms of digital creative and cultural industries developing in India, and how they problematise the questions of cultural expression, knowledge production, creativity, and labour.</b>
<p> </p>
<h4>Venue: <a href="https://www.google.com/maps/place/UNESCO+NEW+DELHI/@28.5962104,77.1766346,17z/data=!4m12!1m6!3m5!1s0x390d1d69e65aea35:0x95c8f02076400bf2!2sUNESCO+NEW+DELHI!8m2!3d28.5962104!4d77.1788233!3m4!1s0x390d1d69e65aea35:0x95c8f02076400bf2!8m2!3d28.5962104!4d77.1788233?hl=en" target="_blank">Conference Room, UNESCO New Delhi, 1 San Martin Marg, Chanakyapuri, New Delhi, 110021</a> (<em>Note: Please bring your identity document to enter the UNESCO premises</em>)</h4>
<h4>RSVP: Registration is closed</h4>
<h4>Booklet: <a href="https://github.com/cis-india/website/raw/master/docs/labex-icca-cis-unesco_symposium-2018_booklet.pdf">Download</a> (PDF)</h4>
<h4>Programme: <a href="https://cis-india.org/raw/files/research-symposium-on-transitions-in-cultural-and-creative-industries-in-india-programme-2018/at_download/file">Download</a> (PDF)</h4>
<h4>Poster: <a href="https://raw.githubusercontent.com/cis-india/website/master/img/labex-icca-cis-unesco_symposium-2018_poster.png">Download</a> (PNG)</h4>
<h4>Organisers: <a href="https://icca.univ-paris13.fr/" target="_blank">LabEx ICCA, Université Paris 13</a>, <a href="http://www.unesco.org/new/en/newdelhi" target="_blank">UNESCO New Delhi</a>, <a href="http://csh-delhi.com/" target="_blank">Centre for Social Sciences and Humanities (CSH)</a>, <a href="http://ceias.ehess.fr/" target="_blank">Centre d'études de l'Inde et de l'Asie du Sud (CEIAS)</a>, and the Centre for Internet and Society (CIS), India</h4>
<hr />
<img src="digital-transitions-in-cultural-and-creative-industries-in-india-symposium-2018/leadImage" alt="Research Symposium on Digital Transitions in Cultural and Creative Industries in India, New Delhi, Feb 27-28" width="50%" />
<p> </p>
<h3><strong>Concept Note</strong></h3>
<p>Digital technologies involve, accompany and provoke changes in the structuring of industrial sectors. How are they more particularly transforming the creation, production, distribution processes in cultural and creative industries? What are reconfigurations and challenges associated with the rise in power of actors from the industries of communication and information? What are the new stakeholder strategies, economic models and power relationships involved? Does digital have the effect of empowering the smallest actors / self-employed / freelancers or on the contrary does it allow large players to relieve themselves of the promotion, production costs on individual creator?</p>
<p>A growing interest in fields such as digital humanities, new media, digital cultures and the Galleries, Libraries, Archives and Museums (GLAM) sector is another important development here. The rise of a number of digital initiatives in arts and humanities practice, research and teaching has also brought up significantly the question of new skills or expertise required in these fields. The need for digital literacy and ‘re-skilling’ to adapt to new forms of arts and humanities practice in a digital environment has often come with much criticism, as it is viewed as an effort towards vocationalisation and professionalization of these disciplines, a result of the changing mandates of the university and higher education in general. How do we then productively engage with these questions of skill, expertise and labour that goes into the building of new digital industries, which are often located within and at the periphery of academia and creative practices? Importantly, how can concerns about a perceived conflict of creativity and industry be addressed as these transformations take place rapidly with the advent of the digital is an important point of focus.</p>
<p>A critical exploration of the prevalent discourse around creative industries would offer ways of identifying what could be the different forms of digital creative and cultural industries developing in India, and how they problematize for us questions of cultural expression, knowledge production, creativity and labour. The conflation and overlap of both ‘cultural’ and ‘creative industries’ and the location of these terms within a larger discourse around policy, economic development, livelihoods and rights, takes on different dimensions post the digital turn. In the context of initiatives like Digital India, and efforts to consolidate an IPR regime, the implications of policy reforms for creative work, especially that performed within informal/underground economies and in the cultural heritage sector are many. These discussions would inform and draw from the ongoing efforts in fostering of a digital economy in India, and the many ways in which it determines cultural production in the rest of the world.</p>
<p>Topics that will be addressed at the symposium include, but are not restricted to:</p>
<p>- Digital turns and transformations in cultural and creative industries</p>
<p>- Media infrastructure, digital platforms, and changing landscape of actors</p>
<p>- Digital transitions in the Indian news industry</p>
<p>- Online/offline lives of creative industries and media consumption</p>
<p>Presented by the Labex ICCA and the Center for Internet and Society (CIS), the symposium will gather Indian, French, and international specialists in the cultural industries, new media and technology, information and communication sciences, and social sciences but also professionals and industrial actors in the cultural and artistic sectors. The event is driven an ambition to promote the creation of an interdisciplinary and inter-institutional Franco-Indian research network to initiate, develop and share research on cultural industries in India and more widely in South Asia.</p>
<h4>Organising Committee</h4>
<p>- Christine Ithurbide (LabEx ICCA, Université Paris 13 / CSH)</p>
<p>- Philippe Bouquillion (LabEx ICCA, Université Paris 13)</p>
<p>- Vibodh Parthasarathi (Jamia Millia Islamia)</p>
<p>- Sumandro Chattapadhyay (The Centre for Internet and Society)</p>
<p>- Puthiya Purayil Sneha (The Centre for Internet and Society)</p>
<p> </p>
<h3><strong>Symposium Programme (Draft)</strong></h3>
<h4>First Day – Tuesday, February 27, 2018</h4>
<p>10:00-10:30<br />
<strong>Tea and Coffee</strong></p>
<p>10:30-11:00<br />
<strong>Welcoming Address</strong><br />
<em>Snigdha Bisht (UNESCO Cultural Department)</em><br />
<strong>Introductions</strong><br />
<em>Shailendra Sigdel (UNESCO Institute for Statistics), Christine Ithurbide (LabEx ICCA / CSH), and Vibodh Parthasarathi (Jamia Millia Islamia)</em></p>
<p>11:00-12:30<br />
<strong>Session 1: Digital Opportunities and Challenges in the Cultural Industries</strong><br />
<em><strong>Speakers:</strong> Tanishka Kachru (National Institute of Design, Ahmedabad), Akshaya Kumar (IIT Indore), and Vivan Sharan (KOAN Advisory)<br />
<strong>Chair:</strong> Christine Ithurbide (LabEx ICCA / CSH)</em></p>
<p>12:30-13:30<br />
<strong>Lunch</strong></p>
<p>13:30-15:00<br />
<strong>Session 2: Digital Transitions in the News Landscape</strong><br />
<em><strong>Speakers:</strong> Zeenab Aneez (Freelance Journalist), Ravichandran Bathran (Dalit Camera), and Franck Rebillard (University of Paris 3 – Sorbonne Nouvelle and Labex ICCA)<br />
<strong>Chair:</strong> Vibodh Parthasarathi (Jamia Millia Islamia)</em></p>
<p>15:00-15:30<br />
<strong>Tea and Coffee</strong></p>
<p>15:30-17:00<br />
<strong>Session 3: Technology, Creativity, and (Re)Skilling</strong><br />
<em><strong>Speakers:</strong> Padmini Ray Murray (Srishti School of Art Design and Technology), Sneha Raghavan (Asia Art Archive), and Xenia Zeiler (University of Helsinki)<br />
<strong>Chair:</strong> Puthiya Purayil Sneha (The Centre for Internet and Society)</em></p>
<h4>Second Day – Wednesday, February 28, 2018</h4>
<p>10:00-10:30<br />
<strong>Tea and Coffee</strong></p>
<p>10:30-12:30<br />
<strong>Session 4: Digital Platforms and Media Distribution</strong><br />
<em><strong>Speakers:</strong> Narendra Ganesh (KPMG), Mae Thomas (Maed in India), Philippe Bouquillion (Université Paris 13 / LabEx ICCA), and Nikhil Pahwa (Medianama)<br />
<strong>Chair:</strong> Sumandro Chattapadhyay (The Centre for Internet and Society)</em></p>
<p>12:30-13:30<br />
<strong>Lunch</strong></p>
<p>13:30-15:00<br />
<strong>Session 5: Copyright, Creative Content, and Rights of Performers</strong><br />
<em><strong>Speakers:</strong> Nandita Saikia (Lawyer), Anubha Sinha (The Centre for Internet and Society), and Manojna Yeluri (Artistik License)<br />
<strong>Chair:</strong> Neha Paliwal (Sahapedia)</em></p>
<p>15:00-15:30<br />
<strong>Tea and Coffee</strong></p>
<p>15:30-17:00<br />
<strong>Session 6: Technologies of Aesthetic Imagi/nation</strong><br />
<em><strong>Speakers:</strong> Farrah Miranda (Artists), Rashmi Munikempanna (Artist), Swati Janu (Architect), and Tara Atluri (Writer, Researcher, Artist)<br />
<strong>Chair:</strong> Tara Atluri (Writer, Researcher, Artist)</em></p>
<p>17:00-18:00<br />
<strong>Concluding Remarks</strong><br />
<em><strong>Speakers:</strong> Christine Ithurbide (LabEx ICCA / CSH), Neha Paliwal (Sahapedia), Philippe Bouquillion (Université Paris 13 / LabEx ICCA), Puthiya Purayil Sneha (The Centre for Internet and Society), Tara Atluri (Writer, Researcher, Artist), and Vibodh Parthasarathi (Jamia Millia Islamia)<br />
<strong>Chair:</strong> Sumandro Chattapadhyay (The Centre for Internet and Society)</em></p>
<p> </p>
<h3><strong>Location of Venue</strong></h3>
<iframe src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3503.1188754990826!2d77.17663461441647!3d28.596210382432034!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x390d1d69e65aea35%3A0x95c8f02076400bf2!2sUNESCO+NEW+DELHI!5e0!3m2!1sen!2sin!4v1518344368273" frameborder="0" height="450" width="600"></iframe>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/raw/digital-transitions-in-cultural-and-creative-industries-in-india-symposium-2018'>https://cis-india.org/raw/digital-transitions-in-cultural-and-creative-industries-in-india-symposium-2018</a>
</p>
No publishersumandroDigital NewsRAW EventsDigital EconomyDigital KnowledgeDigital MediaCreative IndustriesResearchers at Work2018-02-26T11:04:24ZEventMediaNama - #NAMAprivacy: The Future of User Data (Delhi, Sep 6)
https://cis-india.org/internet-governance/news/medianama-namaprivacy-the-future-of-user-data-delhi-sep-6
<b>MediaNama is hosting a full day conference on "the future of user data in India", on the 6th of September 2017, which is particularly significant given the recent Supreme Court ruling on the fundamental right to privacy, and two government consultations: one at the TRAI, and another at MEITY. This discussion is supported by Facebook, Google, and Microsoft. Sumandro Chattapadhyay, Research Director, will participate as a speaker in the session titled "regulating storage, sharing and transfer of data."</b>
<p> </p>
<h4>Details</h4>
<p>Time: September 6th 2017, 9 am to 4:30 pm</p>
<p>Venue: Gulmohar Hall, India Habitat Centre, Lodhi Road (please enter from Gate #3)</p>
<p>Agenda: <a href="https://www.medianama.com/2017/08/223-agenda-namaprivacy-future-of-user-data/">https://www.medianama.com/2017/08/223-agenda-namaprivacy-future-of-user-data/</a></p>
<h4>Announced Speakers</h4>
<ul><li>Chinmayi Arun, Centre for Communication Governance at NLU Delhi</li>
<li>Malavika Raghavan, IFMR Finance Foundation</li>
<li>Renuka Sane, NIPFP</li>
<li>Smitha Krishna Prasad, Centre for Communication Governance at NLU Delhi</li>
<li>Ananth Padmanabhan, Carnegie India</li>
<li>Avinash Ramachandra, Amazon</li>
<li>Hitesh Oberoi, Naukri</li>
<li>Jochai Ben-Avie, Mozilla</li>
<li>Mrinal Sinha, Mobikwik</li>
<li>Murari Sreedharan, Bankbazaar</li>
<li>Sumandro Chattapadhyay, Centre for Internet and Society</li></ul>
<h4>Facilitators</h4>
<ul><li>Saikat Datta, Asia Times Online</li>
<li>Shashidar KJ, MediaNama</li>
<li>Nikhil Pahwa, MediaNama</li></ul>
<h4>Attendees</h4>
<p>We have confirmed 140+ attendees from: Adobe, Amber Health, Amazon, APCO Worldwide, Bank Bazaar, Bloomberg-Quint, Blume Ventures, Broadband India Forum, Business Standard, BuzzFeed News, CCOAI, CEIP, Change Alliance, Chase India, CIS, CNN News18, DEF, Deloitte, DNA, DSCI, E2E Networks, British High Commission, Eurus Network Services, FICCI, Firefly Networks, Flipkart, Forrester Research, Fortumo, DoT, MEITY, IAMAI, IBM, ICRIER, IFMR Finance Foundation, IIMC, Indian Law Institute, Indic Project, Info Edge, ISPAI, IT for Change, ITU-APT, Jamia Millia Islamia, Jindal Global Law School, Mimir Technologies, Mozilla, Newslaundry, NIPFP, Nishith Desai Associates, NIXI, NLU-Delhi, ORF, Paytm, PLR Chambers, PRS Legislative Research, Publicis Groupe, Quartz India, Reliance Jio, Reuters, Saikrishna & Associates, Scroll.in, SFLC.in, Spectranet, The Economics Times, The Indian Express, The Times of India, The Wire, Times Internet, Twitter, and more.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/medianama-namaprivacy-the-future-of-user-data-delhi-sep-6'>https://cis-india.org/internet-governance/news/medianama-namaprivacy-the-future-of-user-data-delhi-sep-6</a>
</p>
No publishersumandroBig DataDigital EconomyPrivacyInternet GovernanceData GovernanceData ProtectionDigital Rights2017-09-05T10:22:12ZBlog EntrySeminar on Understanding Financial Technology, Cashless India, and Forced Digitalisation (Delhi, January 24)
https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017
<b>The Centre for Financial Accountability is organising a seminar on "Understanding Financial Technology, Cashless India, and Forced Digitalisation" on Tuesday, January 24, at YWCA, Ashoka Road, New Delhi. Sumandro Chattapadhyay will participate in the seminar and speak on the emerging architecture of FinTech in India, as being developed and deployed by UIDAI and NPCI.</b>
<p> </p>
<p><em>Cross-posted from <a href="https://letstalkfinancialaccountability.wordpress.com/2017/01/20/understanding-financial-technology-cashless-india-forced-digitalisation/">Centre for Financial Accountability</a>.</em></p>
<hr />
<h2>Programme Schedule</h2>
<h4>09.30 - Registration</h4>
<h4>10:00 - Introduction to the Seminar & Setting the Context</h4>
<p>Madhuresh Kumar, National Alliance of People’s Movements</p>
<h4>10:15–11:30 - Session 1 - Understanding the Political Context of FinTech</h4>
<p>B P Mathur, Former Dy CAG</p>
<p>Prabir Purkayastha, Free Software Movement of India and Knowledge Commons</p>
<p>C P Chandrasekhar, Centre for Economic Studies and Planning, JNU</p>
<h4>11:30-11:45 – Tea / Coffee break</h4>
<h4>11:45-13:15 - Session 2 - How will FinTech Impact the Poor, and Labour and Banking Sector?</h4>
<p>Ashim Roy, New Trade Union of India</p>
<p>Nikhil Dey, Mazdoor Kisan Shakti Sangathan</p>
<p>Ravinder Gupta, General Secretary, State Bank of India Officers Association</p>
<h4>13:15-14:00 – Lunch</h4>
<h4>14:00-15:30 - Session 3 - Understanding the Economic Context of FinTech</h4>
<p>Indira Rajaraman, Former Director, RBI</p>
<p>Tony Joseph, Sr. Journalist</p>
<h4>15:30-17:00 - Session 4 - Understanding the Architecture of FinTech: Linkages to Aadhaar, IndiaStack etc</h4>
<p>Sumandro Chattapadhyay, the Centre for Internet and Society</p>
<p>Gopal Krishna, ToxicsWatch</p>
<h4>17:00 – Tea</h4>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017'>https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017</a>
</p>
No publishersumandroUnified Payments InterfaceFinancial TechnologyDigital IDBig DataDigital EconomyUIDInternet GovernanceDigital IndiaAadhaarFinancial InclusionBiometricsDigital Payment2017-01-23T13:17:19ZBlog EntryThe soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint
https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint
<b>Paying for your groceries and other goods by using your biometrics instead of an e-wallet, debit card or cash seems to be the next phase in the Centre’s ambitious push to shift the country to a “less cash” economy, as its mandarins term it.</b>
<p style="text-align: justify; ">The article by Indulekha Aravind was <a class="external-link" href="http://economictimes.indiatimes.com/news/economy/policy/the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint/articleshow/56542475.cms">published in the Economic Times</a> on 15 January 2017. Sunil Abraham was <a class="external-link" href="http://economictimes.indiatimes.com/et-now/experts/sunil-abraham-on-aadhaars-misuse-during-demonetisation/videoshow/56544492.cms">consulted for this</a>.</p>
<hr />
<p style="text-align: justify; "> </p>
<p style="text-align: justify; ">Ajay Bhushan Pandey, CEO of the Unique Identification Authority of India (UIDAI), says it will be rolling out Aadhaar-enabled payment system, or Aadhaar Pay, for merchants in the next few weeks. This will be an app for merchants that enables them to receive payments through biometric authentication of the customer, provided their bank accounts are linked to their Aadhaar number. "A pilot is under way in fair price shops in Andhra Pradesh where shopkeepers are accepting payments from PDS beneficiaries. The results are very encouraging," says Pandey.</p>
<p style="text-align: justify; ">The idea takes off from the existing Aadhaar-enabled payment system (AEPS) used by bank business correspondents (BCs) in rural areas to disburse and accept cash, using micro ATMs. "We are trying to tweak this so that a similar device can be used by a local merchant," says Pandey. Adoption will depend on two factors: merchants’ acceptance of it and whether they can use an app rather than a micro ATM. The biggest advantage through this method of payment, says Pandey, is that the customer will not need a credit or debit card, or even a smartphone.</p>
<p style="text-align: justify; "><img alt="The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint" class="gwt-Image" src="http://img.etimg.com/photo/56542603/page-19-1.jpg" title="The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint" /></p>
<p style="text-align: justify; ">The limits for transactions using AEPS, such as the number of daily transactions, will be left to the discretion of the banks. In the long term, the AEPS will be migrated to the BHIM (Bharat Interface for Money) platform but the rollout of Aadhaar Pay will happen before that. Post demonetisation, banking BC’s number of transactions using AEPS has leapt from 4-5 lakh to 14-15 lakh, says Pandey. According to Reserve Bank of India data on electronic payment systems, the total volume of such transactions jumped from 671 million in November 2016 to 957 million in December. USSD-based payments, which can be done using a basic feature phone, are among the biggest beneficiaries: the volume rose from just 7,000 in November to 1,02,000 in December, and value of transactions from over Rs 7,000 to over Rs 1 lakh. Prepaid payment instruments — mainly mobile wallets — rose from 59 million to 88 million in the same period (and value from Rs 1,300 crore to Rs 2,100 crore).</p>
<p style="text-align: justify; ">While Aadhaar Pay is likely to ride the demonetisation wave if it is launched soon, certain concerns remain, as the list is how secure such a payment system will be. The UIDAI CEO says it is a paramount concern for the organisation, too. "We are using the latest technology to ensure the information stays encrypted end to-end, so that information is not leaked or misused. In the months to come, we will strengthen the security."</p>
<p style="text-align: justify; "><b>Wary About Security</b> <br /> Sunil Abraham, executive director of the Centre for Internet and Society, a think tank that has been analysing the Aadhaar project for six years, outlines several reasons why Aadhaar-based biometrics is inappropriate for authentication in payments, unlike card-based payments that use cryptography. <br /> <br /> "With biometrics, there is always an error ratio. It is imprecise matching, whereas with cryptography (smart cards), there is no false positive or negative. You either have the key (PIN) or you don’t. It is also very cheap to defeat biometric authentication — even an unlettered person can do it," says Abraham. It would be easy enough, he says, to replicate someone else’s fingerprint by pressing it against lukewarm wax and filling the mould with glue to get a dummy finger. In contrast, compromising a smart card requires more cost and effort, from tech-savviness to machines such as a skimmer that will read the card. "And once you are compromised,you are compromised forever. You can’t change it, like a debit card PIN."</p>
<p style="text-align: justify; ">Using Aadhaar for authentication had proved to be a failure during the exchange of currency notes following demonetisation, he adds, pointing to how the poor and the middle class stood in queues for money while stacks of new currency were recovered from the homes of businessmen and bureaucrats. "When you have bank officials who are corrupt, giving them your biometrics is giving them more ammunition for corruption." To catch the criminals, law enforcement agencies had to resort to CCTV footage,a relatively older technology, he says. Others point out that while it may be secure, certain factors stand in the way of making biometrics-based payment authentication a large-scale success. Amrish Rau, CEO of PayU India, a payment gateway provider, cites a list of reasons why it would inevitably take off but only in 5-10 years.</p>
<p style="text-align: justify; ">"For one, the technology is not yet good enough. There are also bandwidth and data constraints in sending biometric data," says Rau. Even in more mature markets, it has yet to find widespread acceptance, he says, pointing to the slow adoption of Apple Pay and Samsung Pay in the US. "It’s not the answer today.” This is in contrast to NITI Aayog CEO Amitabh Kant’s recent remarks that cards and PoS machines would become redundant by 2020 because Indians would be making payments using their thumb (biometrics). "... my view is that in the next two and a half years, India will make all its debit cards, credit cards, all ATM machines, all PoS machines totally irrelevant,” Kant had said at a Pravasi Bharatiya Divas session in Bengaluru.</p>
<div style="text-align: justify; ">UIDAI’s Pandey is more circumspect. “I wouldn’t say who would replace what. But from the government’s side we are encouraging all modes of digital payment. India has a diverse population and some people might prefer using a card, others a wallet. Collectively, they will contribute to a less-cash society.”</div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint'>https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint</a>
</p>
No publisherpraskrishnaDemonetisationDigital PaymentDigital GovernanceDigital EconomyPrivacyInternet GovernanceDigital MoneyVideoAadhaarBiometrics2017-01-16T03:14:22ZNews ItemMillions of Indians move from cash to digital payments. But some ask whether it’s safe
https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments
<b>Minutes after Indian Prime Minister Narendra Modi began an ambitious new mobile-phone-payment application in December, several clones of the app popped up at Android smartphone stores.</b>
<p style="text-align: justify; ">The article by Rama Lakshmi was <a class="external-link" href="https://www.washingtonpost.com/world/asia_pacific/millions-of-indians-move-from-cash-to-digital-payments-but-some-ask-whether-its-safe/2017/01/13/e807ebf0-ae9b-488b-9eb1-1dcba80ba984_story.html?utm_term=.fc710ade922b">published by Washington Post</a> on 14 January 2017, Sunil Abraham was quoted. Annie Gowen contributed to this report.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">In the first few days, users were flooded with <a href="http://www.livemint.com/Industry/Q1z2di95uWbhcSMUKcx1SK/BHIM-app-users-raise-security-concerns-within-first-week.html">spam</a> requests for money.</p>
<p style="text-align: justify; ">The Bhim app sponsored by the government was rushed out after Modi’s abrupt <a href="https://www.washingtonpost.com/world/asia_pacific/india-invalidates-large-bank-notes-in-crackdown-on-crime/2016/11/08/cc705ee2-a5c6-11e6-ba46-53db57f0e351_story.html?tid=a_inl&utm_term=.1e0d0920f753">withdrawal</a> of large currency bills two months ago. More than 10 million people downloaded it in just 10 days, but in a country where awareness and regulation of <a href="https://www.washingtonpost.com/world/asia_pacific/privacy-concerns-grow-in-india/2012/01/26/gIQAyM0UmQ_story.html">privacy</a>, data protection and digital <a href="http://timesofindia.indiatimes.com/business/india-business/None-of-mobile-payment-apps-in-India-fully-secure-warns-Qualcomm/articleshow/55967778.cms">security</a> are low, the number of cyberattacks is rising.</p>
<p style="text-align: justify; ">“We are rushing toward launching and using these plethora of financial tech apps without the exhaustive security testing and education that is needed,” said Sunil Abraham, executive director of the Center for Internet and Society. “We are operating in a bit of a regulatory vacuum.”</p>
<p style="text-align: justify; ">Modi’s ambitious move to swap old bills for new was intended to fight the hoarding of <a href="https://www.washingtonpost.com/world/asia_pacific/india-targets-tax-evaders-who-hide-black-money-at-home-and-abroad/2015/09/04/2532b7c2-50c4-11e5-b225-90edbd49f362_story.html?utm_term=.6a8c7baf45d0">illicit</a> cash reserves. But it was derailed by shoddy implementation, left citizens in Asia’s third-largest economy without <a href="https://www.washingtonpost.com/world/panic-anger-and-scramble-to-stash-cash-amid-indias-black-money-squeeze/2016/11/10/32cb222a-565a-4c6f-8d40-59257c042109_story.html?utm_term=.6316c5fcb192">cash</a> for weeks, slowed <a href="https://www.washingtonpost.com/world/indias-currency-crisis-is-stalling-small-industries-and-sending-workers-home/2016/12/24/5a2d3aea-c7b2-11e6-acda-59924caa2450_story.html?utm_term=.ad60424e45f2">manufacturing</a> and sent workers home, and is now likely to significantly affect the country’s economic growth this year, economists say. It was acutely painful for a country where 80 percent of transactions were conducted with cash.</p>
<p style="text-align: justify; ">Modi quickly responded by turning the adversity into a call for Indians to kick their overwhelming dependence on <a href="https://www.washingtonpost.com/world/asia_pacific/indians-like-to-pay-cash-the-government-is-now-forcing-them-to-swipe-cards/2016/12/16/58a5a42c-c0a6-11e6-b527-949c5893595e_story.html">cash</a> and opt for digital payments overnight. The Bhim app is just one of many available. But in this leap, experts say, security concerns are being overlooked.</p>
<p style="text-align: justify; ">The new payment apps and e-wallet companies are governed by India’s outdated information technology law of 2008 and central bank guidelines.</p>
<p style="text-align: justify; ">“India urgently needs a new digital payment law that regulates all these mobile payment apps that have sprung up overnight,” said Pavan Duggal, a cyber-law expert. “We are right now in a completely uncharted and unsupervised territory legally. The norms for wallet companies are undefined. If I lose my money due to a fraud, I can go round and round in circles with no remedy.”</p>
<p style="text-align: justify; ">The central bank recently issued guidelines asking payment banks to carry out security audits, but Duggal said “there is no penalty or punishment for noncompliance.”</p>
<p style="text-align: justify; ">The problem is compounded by the fact that education about security risks online is abysmally sparse, especially in India’s small towns and villages. Indians are complacent about cyber risks in their online behavior, according to the Norton Cyber Security Insights <a href="http://indianexpress.com/article/technology/tech-news-technology/indian-users-complacent-when-it-comes-to-cyber-security-norton-report/">Report</a>. India does not have a privacy law.</p>
<p style="text-align: justify; ">India reported more than 39,000 incidents of cyberattacks in the first nine months of 2016, <a href="http://164.100.47.190/loksabhaquestions/annex/10/AS16.pdf">according</a> to the government, including phishing, scanning and probing, website intrusions, defacements, virus and malicious code, and denial-of-service attacks.</p>
<p style="text-align: justify; ">“The Pentagon got hacked, right? You haven’t closed down the Pentagon as yet,” said Piyush Goyal, a minister. “These things will happen, and we have to be one step ahead of the hackers and the so-called security breaches and continuously improving and improvising as they do in America or other developed economies.”</p>
<p style="text-align: justify; ">In October, top banks had to fix the security codes of about 3.2 million debit cards in one of the biggest data breaches in India. Some users complained that their cards had been used in China.</p>
<p style="text-align: justify; ">Last month, <a href="https://www.washingtonpost.com/news/worldviews/wp/2016/12/12/the-man-hacking-indias-rich-and-powerful-talks-motives-music-drugs-and-next-targets/?utm_term=.33bc426ae67a">hackers</a> attacked Twitter and email accounts of prominent politicians and journalists and defaced the website of the National Security Guard, an elite commando force.</p>
<p style="text-align: justify; ">“The focus of global hackers has shifted to India. The cyber risk is a direct fallout of the growth in the number of digital users,” said Saket Modi, the chief executive of Lucideus Tech, the firm that conducted the security audit of the government’s Bhim app.</p>
<p style="text-align: justify; ">Since the cash crunch began, the largest private e-wallet company, Paytm, has experienced a 400 percent jump in new downloads.</p>
<p style="text-align: justify; ">But only <a href="http://gadgets.ndtv.com/telecom/news/mobile-internet-subscribers-in-india-reached-34265-million-in-march-sinha-863186" shape="rect">342 million people</a> access the Internet on their mobile phones. The government has introduced dial-in service for those who have basic cellphones to make digital payments.</p>
<p style="text-align: justify; ">The government is airing radio jingles telling citizens not to share their personal identification numbers and has a toll-free helpline to teach people how to make online payments.</p>
<p style="text-align: justify; ">“Officials understand how security worries can be a big dampener in their campaign to get people to go digital,” said Vinayak Godse, senior director at the Data Security Council of India, an industry body that advises the government.</p>
<p style="text-align: justify; ">But in a trade-off between convenience and security, the central bank recently <a href="http://tech.economictimes.indiatimes.com/news/internet/payment-firms-applaud-rbis-move-to-relax-2-factor-authentication-for-small-value-transactions/55858515">waived</a> the mandatory two-factor authentication for transactions less than $30 online.</p>
<p style="text-align: justify; ">Some cybersecurity experts say that Indians are not ready for this step.</p>
<p style="text-align: justify; ">The police recently arrested a gang in the eastern state of Jharkhand; operators were calling people posing as bank executives and tricking them into sharing their card details. They used the cards to do online shopping and transferred money into their e-wallet accounts.</p>
<p style="text-align: justify; ">“People are gullible and can be threatened or lured to part with their bank details easily. We need as many safeguards as we can have,” said Surendra Kumar, a senior police officer in New Delhi who busted the gang.</p>
<p style="text-align: justify; ">But the biggest problem people face is that police in one state get very little cooperation from those in another state in digital-crime complaints, said Rakshit Tandon, a cybersecurity expert who trains police, military members and school students.</p>
<p style="text-align: justify; ">“Only in big-ticket frauds will police departments from different states coordinate their investigations,” Tandon said. “If a person loses a relatively smaller amount digitally, the case won’t go far. Even though that amount may mean a lot in that person’s life.”</p>
<p style="text-align: justify; "> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments'>https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments</a>
</p>
No publisherpraskrishnaDigital MoneyInternet GovernanceDigital GovernanceDigital Economy2017-01-16T02:52:33ZNews ItemComments on the Report of the Committee on Digital Payments (December 2016)
https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016
<b>The Committee on Digital Payments constituted by the Ministry of Finance and chaired by Ratan P. Watal, Principal Advisor, NITI Aayog, submitted its report on the "Medium Term Recommendations to Strengthen Digital Payments Ecosystem" on December 09, 2016. The report was made public on December 27, and comments were sought from the general public. Here are the comments submitted by the Centre for Internet and Society.</b>
<p> </p>
<h3><strong>1. Preliminary</strong></h3>
<p><strong>1.1.</strong> This submission presents comments by the Centre for Internet and Society (“CIS”) <strong>[1]</strong> in response to the report of the Committee on Digital Payments, chaired by Mr. Ratan P. Watal, Principal Advisor, NITI Aayog, and constituted by the Ministry of Finance, Government of India (“the report”) <strong>[2]</strong>.</p>
<h3><strong>2. The Centre for Internet and Society</strong></h3>
<p><strong>2.1.</strong> The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, and cyber-security.</p>
<p><strong>2.2.</strong> CIS is not an expert organisation in the domain of banking in general and payments in particular. Our expertise is in matters of internet and communication governance, data privacy and security, and technology regulation. We deeply appreciate and are most inspired by the Ministry of Finance’s decision to invite entities from both the sectors of finance and information technology. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved, especially the citizens and the users. CIS is thankful to the Ministry of Finance for this opportunity to provide a general response on the report.</p>
<h3><strong>3. Comments</strong></h3>
<p><strong>3.1.</strong> CIS observes that the decision by the Government of India to withdraw the legal tender character of the old high denomination banknotes (that is, Rs. 500 Rs. 1,000 notes), declared on November 08, 2016 <strong>[3]</strong>, have generated <strong>unprecedented data about the user base and transaction patterns of digital payments systems in India, when pushed to its extreme use due to the circumstances</strong>. The majority of this data is available with the National Payments Corporation of India and the Reserve Bank of India. CIS requests the authorities concerned to consider <strong>opening up this data for analysis and discussion by public at large and experts in particular, before any specific policy and regulatory decisions are taken</strong> towards advancing digital payments proliferation in India. This is a crucial opportunity for the Ministry of Finance to embrace (open) data-driven regulation and policy-making.</p>
<p><strong>3.2.</strong> While the report makes a reference to the European General Data Protection Directive, it does not make a reference to any substantive provisions in the Directive which may be relevant to digital payments. Aside from the recommendation that privacy protections around the purpose limitation principle be relaxed to ensure that payment service providers be allowed to process data to improve fraud monitoring and anti-money laundering services, the report is silent on significant privacy and data protection concerns posed by digital payments services. <strong>CIS strongly warns that the existing data protection and security regulations under Information Technology (Reasonable security practices and procedures and sensitive personal data or information), Rules are woefully inadequate in their scope and application to effectively deal with potential privacy concerns posed by digital payments applications and services.</strong> Some key privacy issues that must be addressed either under a comprehensive data protection legislation or a sector specific financial regulation are listed below. The process of obtaining consent must be specific, informed and unambiguous and through a clear affirmative action by the data subject based upon a genuine choice provided along with an option to opt out at any stage. The data subjects should have clear and easily enforceable right to access and correct their data. Further, data subjects should have the right to restrict the usage of their data in circumstances such as inaccuracy of data, unlawful purpose and data no longer required in order to fulfill the original purpose.</p>
<p><strong>3.3.</strong> The initial recommendation of the report is to “[m]ake regulation of payments independent from the function of central banking” (page 22). This involves a fundamental transformation of the payment and settlement system in India and its regulation. <strong>We submit that a decision regarding transformation of such scale and implications is taken after a more comprehensive policy discussion, especially involving a wider range of stakeholders</strong>. The report itself notes that “[d]igital payments also have the potential of becoming a gateway to other financial services such as credit facilities for small businesses and low-income households” (page 32). Thus, a clear functional, and hence regulatory, separation between the (digital) payments industry and the lending/borrowing industry may be either effective or desirable. Global experience tells us that digital transactions data, along with other alternative data, are fast becoming the basis of provision of financial and other services, by both banking and non-banking (payments) companies. We appeal to the Ministry of Finance to adopt a comprehensive and concerted approach to regulating, enabling competition, and upholding consumers’ rights in the banking sector at large.</p>
<p><strong>3.4.</strong> The report recognises “banking as an activity is separate from payments, which is more of a technology business” (page 154). Contemporary banking and payment businesses are both are primarily technology businesses where information technology particularly is deployed intimately to extract, process, and drive asset management decisions using financial transaction data. Further, with payment businesses (such as, pre-paid instruments) offering return on deposited money via other means (such as, cashbacks), and potentially competing and/or collaborating with established banks to use financial transaction data to drive lending decisions, including but not limited to micro-loans, it appears unproductive to create a separation between banking as an activity and payments as an activity merely in terms of the respective technology intensity of these sectors. <strong>CIS firmly recommends that regulation of these financial services and activities be undertaken in a technology-agnostic manner, and similar regulatory regimes be deployed on those entities offering similar services irrespective of their technology intensity or choice</strong>.</p>
<p><strong>3.5.</strong> The report highlights two major shortcomings of the current regulatory regime for payments. Firstly “the law does not impose any obligation on the regulator to promote competition and innovation in the payments market” (page 153). It appears to us that the regulator’s role should not be to promote market expansion and innovation but to ensure and oversee competition. <strong>We believe that the current regulator should focus on regulating the existing market, and the work of the expansion of the digital payments market in particular and the digital financial services market in general be carried out by another government agency, as it creates conflict of interest for the regulator otherwise.</strong> Secondly, the report mentions that Payment and Settlement Systems Act does not “focus the regulatory attention on the need for consumer protection in digital payments” and then it notes that a “provision was inserted to protect funds collected from customers” in 2015 (page 153). <strong>This indicates that the regulator already has the responsibility to ensure consumer protection in digital payments. The purview and modalities of how this function of course needs discussion and changes with the growth in digital payments</strong>.</p>
<p><strong>3.6.</strong> The report identifies the high cost of cash as a key reason for the government’s policy push towards digital payments. Further, it mentions that a “sample survey conducted in 2014 across urban and rural neighbourhoods in Delhi and Meerut, shows that despite being keenly aware of the costs associated with transacting in cash, most consumers see three main benefits of cash, viz. freedom of negotiations, faster settlements, and ensuring exact payments” (page 30). It further notes that “[d]igital payments have significant dependencies upon power and telecommunications infrastructure. Therefore, the roll out of robust and user friendly digital payments solutions to unelectrified areas/areas without telecommunications network coverage, remains a challenge.” <strong>CIS much appreciates the discussion of the barriers to universal adoption and rollout of digital payments in the report, and appeals to the Ministry of Finance to undertake a more comprehensive study of the key investments required by the Government of India to ensure that digital payments become ubiquitously viable as well as satisfy the demands of a vast range of consumers that India has</strong>. The estimates about investment required to create a robust digital payment infrastructure, cited in the report, provide a great basis for undertaking studies such as these.</p>
<p><strong>3.7.</strong> CIS is very encouraged to see the report highlighting that “[w]ith the rising number of users of digital payment services, it is absolutely necessary to develop consumer confidence on digital payments. Therefore, it is essential to have legislative safeguards to protect such consumers in-built into the primary law.” <strong>We second this recommendation and would like to add further that financial transaction data is governed under a common data protection and privacy regime, without making any differences between data collected by banking and non-banking entities</strong>.</p>
<p><strong>3.8.</strong> We are, however, very discouraged to see the overtly incorrect use of the word “Open Access” in this report in the context of a payment system disallowing service when the client wants to transact money with a specific entity <strong>[4]</strong>. This is not an uncommon anti-competitive measure adopted by various platform players and services providers so as to disallow users from using competing products (such as, not allowing competing apps in the app store controlled by one software company). <strong>The term “Open Access” is not only the appropriate word to describe the negation of such anti-competitive behaviour, its usage in this context undermines its accepted meaning and creates confusion regarding the recommendation being proposed by the report.</strong> The closest analogy to the recommendation of the report would perhaps be with the principle of “network neutrality” that stands for the network provider not discriminating between data packets being processed by them, either in terms of price or speed.</p>
<p><strong>3.9.</strong> A major recommendation by the report involves creation of “a fund from savings generated from cash-less transactions … by the Central Government,” which will use “the trinity of JAM (Jan Dhan, Adhaar, Mobile) [to] link financial inclusion with social protection, contributing to improved Social and Financial Security and Inclusion of vulnerable groups/ communities” (page 160-161). <strong>This amounts to making Aadhaar a mandatory ID for financial inclusion of citizens, especially the marginal and vulnerable ones, and is in direct contradiction to the government’s statements regarding the optional nature of the Aadhaar ID, as well as the orders by the Supreme Court on this topic</strong>.</p>
<p><strong>3.10.</strong> The report recommends that “Aadhaar should be made the primary identification for KYC with the option of using other IDs for people who have not yet obtained Aadhaar” (page 163) and further that “Aadhaar eKYC and eSign should be a replacement for paper based, costly, and shared central KYC registries” (page 162). <strong>Not only these measures would imply making Aadhaar a mandatory ID for undertaking any legal activity in the country, they assume that the UIDAI has verified and audited the personal documents submitted by Aadhaar number holders during enrollment.</strong> A mandate for <em>replacement</em> of the paper-based central KYC agencies will only remove a much needed redundancy in the the identity verification infrastructure of the government.</p>
<p><strong>3.11.</strong> The report suggests that “[t]ransactions which are permitted in cash without KYC should also be permitted on prepaid wallets without KYC” (page 164-165). This seems to negate the reality that physical verification of a person remains one of the most authoritative identity verification process for a natural person, apart from DNA testing perhaps. <strong>Thus, establishing full equivalency of procedure between a presence-less transaction and one involving a physically present person making the payment will only amount to removal of relatively greater security precautions for the former, and will lead to possibilities of fraud</strong>.</p>
<p><strong>3.12.</strong> In continuation with the previous point, the report recommends promotion of “Aadhaar based KYC where PAN has not been obtained” and making of “quoting Aadhaar compulsory in income tax return for natural persons” (page 163). Both these measures imply a replacement of the PAN by Aadhaar in the long term, and a sharp reduction in growth of new PAN holders in the short term. <strong>We appeal for this recommendation to be reconsidered as integration of all functionally separate national critical information infrastructures (such as PAN and Aadhaar) into a single unified and centralised system (such as Aadhaar) engenders massive national and personal security threats</strong>.</p>
<p><strong>3.13.</strong> The report suggest the establishment of “a ranking and reward framework” to recognise and encourage for the best performing state/district/agency in the proliferation of digital payments. <strong>It appears to us that creation of such a framework will only lead to making of an environment of competition among these entities concerned, which apart from its benefits may also have its costs. For example, the incentivisation of quick rollout of digital payment avenues by state government and various government agencies may lead to implementation without sufficient planning, coordination with stakeholders, and precautions regarding data security and privacy</strong>. The provision of central support for digital payments should be carried out in an environment of cooperation and not competition.</p>
<p><strong>3.14.</strong> CIS welcomes the recommendation by the report to generate greater awareness about cost of cash, including by ensuring that “large merchants including government agencies should account and disclose the cost of cash collection and cash payments incurred by them periodically” (page 164). It, however, is not clear to whom such periodic disclosures should be made. <strong>We would like to add here that the awareness building must simultaneously focus on making public how different entities shoulder these costs. Further, for reasons of comparison and evidence-driven policy making, it is necessary that data for equivalent variables are also made open for digital payments - the total and disaggregate cost, and what proportion of these costs are shouldered by which entities</strong>.</p>
<p><strong>3.15.</strong> The report acknowledges that “[t]oday, most merchants do not accept digital payments” and it goes on to recommend “that the Government should seize the initiative and require all government agencies and merchants where contracts are awarded by the government to provide at-least one suitable digital payment option to its consumers and vendors” (page 165). This requirement for offering digital payment option will only introduce an additional economic barrier for merchants bidding for government contracts. <strong>We appeal to the Ministry of Finance to reconsider this approach of raising the costs of non-digital payments to incentivise proliferation of digital payments, and instead lower the existing economic and other barriers to digital payments that keep the merchants away</strong>. The adoption of digital payments must not lead to increasing costs for merchants and end-users, but must decrease the same instead.</p>
<p><strong>3.16.</strong> As the report was submitted on December 09, 2016, and was made public only on December 27, 2016, <strong>it would have been much appreciated if at least a month-long window was provided to study and comment on the report, instead of fifteen days</strong>. This is especially crucial as the recently implemented demonetisation and the subsequent banking and fiscal policy decisions taken by the government have rapidly transformed the state and dynamics of the payments system landscape in India in general, and digital payments in particular.</p>
<h3><strong>Endnotes</strong></h3>
<p><strong>[1]</strong> See: <a href="http://cis-india.org/">http://cis-india.org/</a>.</p>
<p><strong>[2]</strong> See: <a href="http://finmin.nic.in/reports/Note-watal-report.pdf">http://finmin.nic.in/reports/Note-watal-report.pdf</a> and <a href="http://finmin.nic.in/reports/watal_report271216.pdf">http://finmin.nic.in/reports/watal_report271216.pdf</a>.</p>
<p><strong>[3]</strong> See: <a href="http://finmin.nic.in/cancellation_high_denomination_notes.pdf">http://finmin.nic.in/cancellation_high_denomination_notes.pdf</a>.</p>
<p><strong>[4]</strong> Open Access refers to “free and unrestricted online availability” of scientific and non-scientific literature. See: <a href="http://www.budapestopenaccessinitiative.org/read">http://www.budapestopenaccessinitiative.org/read</a>.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016'>https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016</a>
</p>
No publisherSumandro Chattapadhyay and Amber SinhaUIDDigital IDBig DataDigital EconomyDigital AccessPrivacyDigital SecurityData RevolutionDigital PaymentInternet GovernanceDigital IndiaData ProtectionDemonetisationHomepageFeaturedAadhaar2017-01-12T12:32:22ZBlog EntryCISxScholars Delhi - William F. Stafford (Nov 03, 6:30 pm)
https://cis-india.org/raw/cisxscholars-delhi-william-f-stafford-thursday-nov-03
<b>We are delighted to have William F. Stafford, PhD candidate in UC Berkeley, present on "Public Measurements, Private Measurements, and the Convergence of Units" at the CIS office in Delhi on Thursday, Nov 03, at 6:30 pm. Please RSVP if you are joining us: <raw@cis-india.org>.</b>
<p> </p>
<p><em>CISxScholars are informal events organised by CIS for presentation, discussion, and exchange of academic research and policy analysis.</em></p>
<hr />
<h2>Public Measurements, Private Measurements and the Convergence of Units</h2>
<p>In this discussion I will focus on a comparison between the standard government prescribed meters for autorickshaws and taxis and the role of ridesharing apps as instruments which take measurements, as the basis for the calculation of fares, and the more general questions which arise for commerce, technology and their regulation. I will organise the paper around the observations of a paratransit operations engineer on the distinction between public and private instruments, and explore the possible implications of new forms of commercialisation of location and proximity and reactions to such developments for understanding questions of fairness and corruption.</p>
<h2>William F. Stafford</h2>
<p>William F. Stafford, Jr., is a PhD candidate in the Department of Anthropology, UC Berkeley. William's research focuses on the auto-rickshaw meter in New Delhi, as a way to engage with classical questions concerning the relationship between measurement, quantification and delimitations of domains of labour. William's general interests concern the analytics of labour and the reconfiguration of what are often taken as its axiomatic aspects. Before joining Berkeley, he studied Sociology at Jawaharlal Nehru University and the Delhi School of Economics.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/raw/cisxscholars-delhi-william-f-stafford-thursday-nov-03'>https://cis-india.org/raw/cisxscholars-delhi-william-f-stafford-thursday-nov-03</a>
</p>
No publishersumandroCISxScholarsData SystemsDigital EconomyResearchers at WorkDigital LabourNetwork EconomiesHomepageEvent2019-03-13T00:30:39ZEventTrans Pacific Partnership and Digital 2 Dozen: Implications for Data Protection and Digital Privacy
https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy
<b>In this essay, Shubhangi Heda explores the concerns related to data protection and digital privacy under the Trans Pacific Partnership (TPP) agreement signed recently between United States of America and eleven countries located around the pacific ocean region, across South America, Australia, and Asia. TPP is a free trade agreement (FTA) that emphasises, among other things, the need for liberalising global digital economy. The essay also analyses the critical document titled ‘Digital 2 Dozen’ (D2D), which compiles the key action items within TPP addressing liberalisation of digital economy, and sets up the relevant goals for the member nations.</b>
<p> </p>
<p>1. <strong><a href="#1">Introduction</a></strong></p>
<p>2. <strong><a href="#2">Analysis of TPP and D2D</a></strong></p>
<p>2.1. <strong><a href="#2-1">Trans Pacific Partnership (TPP)</a></strong></p>
<p>2.2. <strong><a href="#2-2">Digital 2 Dozen (D2D)</a></strong></p>
<p>3. <strong><a href="#3">Major Criticisms of the Digital Agenda of TPP</a></strong></p>
<p>3.1. <strong><a href="#3-1">Data Protection</a></strong></p>
<p>3.2. <strong><a href="#3-2">Digital Privacy</a></strong></p>
<p>4. <strong><a href="#4">Implications of TPP for RCEP</a></strong></p>
<p>5. <strong><a href="#5">Implications of TPP in the Context of EU Safe Harbour Judgement</a></strong></p>
<p>6. <strong><a href="#6">Implications of TPP for India after US-India Cyber Relationship Agreement</a></strong></p>
<p>7. <strong><a href="#7">Conclusion</a></strong></p>
<p>8. <strong><a href="#8">Endnotes</a></strong></p>
<p>9. <strong><a href="#9">Author Profile</a></strong></p>
<hr />
<h2 id="1">1. Introduction</h2>
<p>This essay explores the concerns related to data protection and digital privacy under the Trans Pacific Partnership (TPP) agreement signed recently between United States of America and eleven countries located around the pacific ocean region, across South America, Australia, and Asia <strong>[1]</strong>. TPP is a free trade agreement (FTA) that emphasises, among other things, the need for liberalising global digital economy. The essay also analyses the critical document titled ‘Digital 2 Dozen’ (D2D), which compiles the key action items within TPP addressing liberalisation of digital economy, and sets up the relevant goals for the member nations. TPP requires the member countries to facilitate unhindered digital data flow across nations, for commercial and governmental purposes, which evidently have major implications for national and regional data protection and privacy regimes. These implications must also be seen in the context the recent judgement by the EU Court of Justice against the validity of the EU-USA data transfer agreement of 2000. Further, the essay discusses the potential impacts that TPP/D2D might have on India, in the context of the ongoing USA-India Cyber Relationship dialogue. If the privacy concerns are not raised right now TPP might act as a model framework for future FTAs which will fail to encompass proper data protection and digital privacy regime within it.</p>
<h2 id="2">2. Analysis of TPP and D2D</h2>
<h3 id="2-1">2.1. Trans Pacific Partnership (TPP)</h3>
<p>Trans Pacific Partnership (TPP) is a large multi-partner free trade agreement amongst twelve Asia-Pacific countries, which is closely led by geo-political and economic strategies of the USA. Countries started the negotiation of TPP in 2008 when USA joined Pacific Four (P-4) negotiations and in 2015 negotiations of TPP was concluded and text was released. Ministers from the member countries signed the agreement on February 4, 2016 <strong>[2]</strong>. The main aim of TPP is to liberalise trade and investment beyond what is provided for within the WTO. It is also considered to be a strategic move by the US to counter the trade linkages that are being established in the Asian region. TPP largely covers topics of market access, and rules on various related issues such as intellectual property rights, labour laws, and environment standards <strong>[3]</strong>.</p>
<p>Between 1992 -2012 there has been an upsurge in bilateral trade agreements being signed in Asia from 25 to 103 and the effect of these FTAs is called the ‘noodle bowl effect’. TPP is seen as framework which will replace these FTAs which are causing the ‘noodle bowl effect’.While these FTAs are being replaced but with TPP being signed there are various bilateral arrangements signed along with TPP. USA has also stated that TPP will not affect the already existing NAFTA <strong>[4]</strong>. While TPP is being concluded there is another free trade agreement being negotiated between USA and EU , which is Trans Trade and Investment Partnership (TTIP). Both TPP and TTIP and are considered to be serving similar objective which is to deal with new and modern trade issues. Also both the agreements are US led and since negotiation for TPP are now finalised it may have a significant impact on TTIP <strong>[5]</strong>.</p>
<p>TPP is one of the first document which deals specifically with digital economy and applies across borders. The main aims of TPP are to promote free flow of data across borders without data localisation. It aims to remove national clouts and regional internets. It also includes provisions to combat theft of trade secrets. It allows you to create transparent regulatory process with inputs from various stakeholders. It also aims to provide access to tools and procedures for conduct of e-commerce <strong>[6]</strong>.</p>
<p>Some of the major criticism to TPP were regarding the issues related to <strong>[7]</strong>:</p>
<ul><li>environment, wherein it does not address the issue of climate change and the language used in the agreement is very weak;</li>
<li>labour rights provision mandates parties to adhere to the ILO provision but it does not seem to provide for effective framework and might not bring the desired change;</li>
<li>investment chapter is seen to be controversial because of the investor state dispute settlement clause which will allow foreign investor to sue government over policies that might cause harm to them;</li>
<li>e-commerce and telecommunication chapter raises major privacy concerns;</li>
<li>intellectual property chapter wherein it includes controversial rules regarding pharmaceutical companies and data exclusivity apart from the privacy concerns.</li></ul>
<h3 id="2-2">2.2 Digital 2 Dozen (D2D)</h3>
<p>D2D is set of rules and aims which is specifically drafted to be followed for the trade agreements related to open internet and digital economy. More specific aims of TPP as provided within the ‘Digital 2 Dozen,’ aiming for more liberalised trade in digital goods and services, are <strong>[8]</strong>:</p>
<ul><li>promoting free and open internet,</li>
<li>prohibiting digital custom duties,</li>
<li>securing basic non-discrimination principles,</li>
<li>enabling cross-border data flows,</li>
<li>preventing localization barriers,</li>
<li>barring forced technology transfers,</li>
<li>advancing innovative authentication methods,</li>
<li>delivering enforceable consumer protections,</li>
<li>safeguarding network competition,</li>
<li>fostering innovative encryption products, and</li>
<li>building an adaptable framework.</li></ul>
<p>Strategic goal of the US in introducing D2D as goals of TPP has been to set up a trend within Asian region for all the trade agreements. It is expected to ensure that if TPP is a success, similar goals and policy frameworks will be followed for other trade agreements as we. For example, the USA-India partnership also enshrines similar aims and so does the USA-Korea partnership. Hence while India is not part of TPP, USA is nonetheless trying to get India into a partnership which is similar to the TPP. The language proposed by the USA in TPP negotiations has always been supportive for cross border data flows as it claims that companies have mechanism to keep a privacy check and privacy would not be undermined, but countries like New Zealand and Australia which have strong privacy protection laws nationally have raised concerns which will be discussed in further sections <strong>[9]</strong>. Also not only in privacy rights but Digital Dozen initiative also affects other digital rights related to - excessive copyright terms TPP proposed to extend the term of copyright to hundred years which deprive access to knowledge; as in the U.S motive to give more power to private entities , the ISP obligations enumerated within TPP which puts freedom of expression and privacy at risk as ISPs are allowed to check for copyright infringement and TPP does not put any privacy restriction in this regard; introduction of new fair use rules; ban on circumvention of digital locks or DRMs; no compulsory limitation for persons with disabilities; lack of fair use for journalistic right; while net neutrality is major issue is many developing nations in Asia no effective provision for net neutrality is aimed at in the D2D initiative; prohibits open source mandates which puts barrier for countries which want to release any software as open source as a policy decision <strong>[10]</strong>.</p>
<h2 id="3">3. Major Issues Related to Data Protection and Privacy in the TPP</h2>
<h3 id="3-1">3.1. Data Protection</h3>
<p>One of the major concern raised against TPP is regarding data protection provisions that have been integrated within the E- Commerce chapter of the agreement. Article 14.11 and Article 14 .13 are the ones that deal with data flow related to consumer information.Article 14.11 in the agreement puts a requirement on the member states to allow transfer of data across border and Article 14.13 does not allow the companies to host data on local servers. Concerns were raised in few member states for instance, Australian Privacy Foundation raised concerns over Article 14.11 which requires transfers to be allowed in context of business activities of service suppliers. It claimed that exception to this provision is very narrow and the repercussion for not following the exception is that investor state dispute settlement proceedings can be initiated, which is not sufficient to protect privacy. Also, it highlighted the issue that with the narrow exception provided under Article 14.13 which relates to prohibition on data localisation, it might have adverse effect on the implementation of national privacy laws within Australia <strong>[11]</strong>.</p>
<p>Another provision which is of major concern is Article 14.13 which prohibit data localisation. It will raise problems for countries like Indonesia and China which will have to change their local laws to implement the provision <strong>[12]</strong>. Since there already has been a major concern with regard to USA- EU Safe Harbour Agreement which was later made subject to the ECJ’s ruling on data protection, which invalidated any arrangement which provides voluntary enterprises responsibility to enforce privacy. But both the USA and EU are in process of renegotiating the agreement.The major concern was that in EU data protection is a fundamental right while in USA data protection is more consumer centric. When similar concerns were raised in TPP negotiations, they were rebutted as USA claimed that FTA does not concern itself with data protection <strong>[13]</strong>.</p>
<p>In 2012 Australia proposed an alternative language to TPP which allowed countries to place restriction on data flow as long as it was not a barrier to trade. U.S responded to concerns raised by the Australia through a side letter which ensured Australia that U.S and Australia have a mutual understanding in relation to privacy and U.S will ensure the privacy of data with regards to Australia. While Australia’s concern was given acknowledgement other countries which raised similar issues were not given any assurances <strong>[14]</strong>. US instead proposed ad- hoc strategy that gave private companies power to form privacy policy with implementation through state machinery <strong>[15]</strong>.</p>
<h3 id="3-2">3.2. Digital Privacy</h3>
<p>Article 14.8 in the E- Commerce chapter of the agreement states that countries can form legal framework for the protection of rights but the kind of ‘legal framework’ is not defined. Also, nowhere it states that the privacy protection or data protection laws are expressly exempted, rather it states that any such policy implemented by member states will be put under review of TPP standards. The standards which TPP proposes to follow are based on the underlying idea that any such policy should not hinder free trade in any way. This test will be applied by tribunals which are experts in trade and investment and not on data protection or human rights <strong>[16]</strong>. While Article 14.8 provides for protection of private information of consumers but the footnote to the provision renders it ineffective. The footnote states that member countries can adopt legal framework for the protection of data which can be done by self-regulation by industry and does not provide for any comprehensive data protection obligation upon the member states <strong>[17]</strong>. Similar to this Article 13.4 of the telecommunications chapter under TPP also states that the countries can apply regulation regarding confidentiality of the messages as long as it is not “a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services" <strong>[18]</strong>.</p>
<p>Another chapter which raises major concerns about the privacy rights is intellectual property. It affects privacy through the provisions related to technological protective measures and the provision that regulate ISP’s liability. Regarding the TPM provision, the TPP follows the DMCA model whereby the exception to anti- circumvention provision is very narrow and does not apply to anti- trafficking provision. The exception allows user to circumvent TPM if it affect the user's privacy in any way, although this provision does not apply to ant- trafficking of TPM. The provision regarding ISP’s liability states that there should be cooperation between ISPs and rights holders and it does not prohibit ISPs to monitor its users. Also TPP proposes the notice for takedown and identification of the infringer by the ISP but this provision is not in consonance with laws of member states, like that of Peru which does not have any copyright law on ISP . Also many countries have tried to introduce proper privacy laws along with implementation of ISP liability but that is not done within the TPP <strong>[19]</strong>. TPP as whole aims to give greater power to private regulators without providing for minimum standard for protection of privacy.</p>
<p>Although TPP is not a data protection agreement but it consequently deals with various aspects of data protection, hence it is prospective model for privacy and data protection practices in future trade agreements. If positive obligations are included within the free trade agreements it will have an advancing impact on the data protection regime.</p>
<h2 id="4">4.Implications of TPP for RCEP</h2>
<p>While TPP has such lacunas similar provision are proposed in RCEP to which India is a party and which will have serious implication as many of the countries have inadequate data protection laws nationally and with the introduction of such an FTA the exploitation of privacy rights will be rampant <strong>[20]</strong>. To avoid this EU directive on data protection should be taken into consideration in the negotiations of such FTAs. But for the RCEP negotiations are still going on and in India many companies like Flipkart, Snapdeal etc. have started preparing for the changing norms. The government claims that it is going to accept best practices in the region which indicates that it is going to have same policies as that of TPP. Although people from industry have raised concerns that while there are national laws but it is difficult to check third party involvement within the business and it is becoming increasingly difficult to keep the consumer data confidential <strong>[21]</strong>.</p>
<h2 id="5">5. Implications of TPP in the Context of EU Safe-Harbour Judgement</h2>
<p>Mr. Maximillian Schrems, an Austrian National residing in Austria, has been a user of the Facebook social network since 2008. Any person residing in EU who wishes to use Facebook is required to conclude, at the time of his registration, a contract with Facebook Ireland (a subsidiary of Facebook Inc. which itself is established in Unites States). Some or all of the personal data of the Facebook Ireland’s users who residing in EU is transferred to servers belonging to Facebook Inc. that are located in United States, where it undergoes processing. On 25 June 2013 Mr Schrems made a complaint to the commissioner by which he in essence asked the latter to exercise his statutory powers by prohibiting Facebook Ireland from transferring his personal data to Unites States, and this led to the <em>Maximillian Schrems v Data Protection Commissioner</em> case <strong>[22]</strong>. He contended that in his complaint that the law and practice in force in that country did not ensure adequate protection of the personal data held in its territory against the surveillance activities that were engaged in thereby by the public authorities. Mr Schrems referred in this regard to the revelations made by Edward Snowden concerning the activities of the United States intelligence services, in particular those of the NSA.(para 26, 27, 28). The case came in the court ruled that “that a third country which ensures an adequate level of protection, does not prevent a supervisory authority of a Member State, within the meaning of Article 28 of the EU 94/46 directive as amended, from examining the claim of a person concerning the protection of his rights and freedoms in regard to the processing of personal data relating to him which has been transferred from a Member State to that third country when that person contends that the law and practices in force in the third country do not ensure an adequate level of protection. The ruling implies that personal data cannot be transferred to third country which does not provide adequate level of protection.</p>
<p>EU safe harbour judgment and EU directive on privacy provide contrasting rules related to privacy. While TPP gives power to private entities to formulate rules regarding privacy while the recent ECJ judgment invalidated giving such power to private entities under EU-US Safe Harbour Agreement. Also in context of the same judgment Hamburg’s Commissioner for Data Privacy And Freedom of Information announced an investigation into the data transfer taking place through Facebook and Google to U.S. Hence in the light of the recent judgment member states within EU are not allowed to permit cross border data flow, in contrast to this one of the main goals of TPP is to maintain free flow of data across border <strong>[23]</strong>. EU is this regard has also set forth the proposal to introduce General Data Protection Regulation. (GDPR). Although U.S and EU are trying to renegotiate the agreement but the privacy concerns raised cannot be ignored. Hence following the same model as was invalidate under the ECJ judgment lets US exploit privacy of member states under TPP. Similar concerns as raised within the judgment are also raised in India as it also following the same model within U.S-India Cyber Relationship Agreement and in RCEP negotiations.</p>
<h2 id="6">6. Implications of TPP in the context of USA-India Cyber Relationship</h2>
<p>While India is not part of TPP but it might have an effect on the U.S India Cyber Relationship Agreement. In August 2015 there was re- initiation of the India-U.S cyber dialogue to address common concerns related to cybersecurity and to develop better partnerships between public and private sector for betterment of digital economy <strong>[24]</strong>. One of the key aim of this agreement is free flow of information between two nations, which suffers from similar problem that it will put privacy of the citizens at risk. Also India does not have any bilateral treaty which ensures cyber data protection in such a scenario the only solution is data localisation, but this agreement will put data at risk <strong>[25]</strong>. Hence while the TPP negotiations were going on and also RCEP is being discussed the concerns about privacy and data protection need to be raised as mention in earlier section regarding implications of TPP on RCEP, the USA-India Cyber Relationship also faces the same implications..Although the aim of USA-India Cyber Relationship is to ensure cybersecurity. After the cases of Muzaffarnagar riots, upheaval in North -Eastern states and Gujarat riots, India has realised it is important to ensure compliance from the social media companies. India sees the USA-India Cyber Relationship as an opportunity to achieve this goal. The Google Transparency Report states that that India made around three thousand requests to Google for user data <strong>[26]</strong>, which indicate at the country's interest in having a common data understanding with the major social media companies (almost all of which are located in USA) about requesting and sharing of user activity data. While this concern is being addressed through the agreement, it is difficult to ignore the clause related to free flow of information, and if the meaning of the term is extended and adopted from TPP itself will put digital privacy of Indian citizens at risk <strong>[27]</strong>.</p>
<h2 id="7">7. Conclusion</h2>
<p>Even though TPP negotiation are completed but the ratification of the agreement is still underway. TPP is being seen as one of a kind trade agreement because it is the first time that countries across the globe have come together as a whole to address concerns of modern trade. Although it fails to address some of the key concerns related to privacy and data protection which are becoming increasingly important. Data protection and privacy issues cannot be seen in isolation and needs to merged within the modern day trade agreements. The D2D component by the USA is strategic move to have trade dominance in Asia and to compete with China’s growth . TPP has privacy and data protection lacunae within the e- commerce , telecommunications and intellectual property discussion.Although it might have serious implications on RCEP negotiation and USA- India Cyber Relationship Dialogue. Similar concern regarding data protection has already been addressed by ECJ judgment invalidating USA-EU Safe Harbour Agreement but the similar ad - hoc strategy has been incorporated within TPP. Since TPP might be considered as best practice model for future FTAs in the Asian region it is important to raise and address these privacy concerns now.</p>
<h2 id="8">8. Endnotes</h2>
<p><strong>[1]</strong> The signatory countries include Australia, Canada, Japan, Malaysia, Mexico, Peru, United States of America, Vietnam, Chile, Brunei, Singapore, New Zealand. "The Trans-Pacific Partnership,"
<a href="http://www.ustr.gov/tpp">http://www.ustr.gov/tpp</a> (last visited Jul 7, 2016).</p>
<p><strong>[2]</strong> "The Origins and Evolution of the Trans-Pacific Partnership (TPP)," Global Research, <a href="http://www.globalresearch.ca/the-origins-and-evolution-of-the-trans-pacific-partnership-tpp/5357495">http://www.globalresearch.ca/the-origins-and-evolution-of-the-trans-pacific-partnership-tpp/5357495</a> (last visited Jul 7, 2016).</p>
<p><strong>[3]</strong> Fergusson, Ian F., Mark A. McMinimy & Brock R. Williams, "The Trans-Pacific Partnership (TPP): In Brief," (2015), <a href="http://digitalcommons.ilr.cornell.edu/key_workplace/1477/">http://digitalcommons.ilr.cornell.edu/key_workplace/1477/</a> (last visited Jul 1, 2016).</p>
<p><strong>[4]</strong> Gajdos, Lukas, <em>The Trans-Pacific Partnership and its impact on EU trade</em>, Policy Department, Directorate-General for External Policies, Policy Briefing (2013), <a href="http://www.europarl.europa.eu/RegData/etudes/briefing_note/join/2013/491479/EXPO-INTA_SP(2013)491479_EN.pdf">http://www.europarl.europa.eu/RegData/etudes/briefing_note/join/2013/491479/EXPO-INTA_SP(2013)491479_EN.pdf</a>.</p>
<p><strong>[5]</strong> Twining, Daniel, Hans Kundnani & Peter Sparding, <em>Trans-Pacific Partnership: geopolitical implications for EU-US relations</em>, Policy Department, Directorate-General for External Policies, June 24 (2016), <a href="http://www.europarl.europa.eu/RegData/etudes/STUD/2016/535008/EXPO_STU(2016)535008_EN.pdf">http://www.europarl.europa.eu/RegData/etudes/STUD/2016/535008/EXPO_STU(2016)535008_EN.pdf</a>.</p>
<p><strong>[6]</strong> USTR, "Remarks by Deputy U.S. Trade Representative Robert Holleyman to the New Democrat Network," <a href="https://ustr.gov/about-us/policy-offices/press-office/speechestranscripts/2015/may/remarks-deputy-us-trade">https://ustr.gov/about-us/policy-offices/press-office/speechestranscripts/2015/may/remarks-deputy-us-trade</a> (last visited Jul 4, 2016).</p>
<p><strong>[7]</strong> Murphy, Katharine, "Trans-Pacific Partnership: four key issues to watch out for," The Guardian, November 6, 2015, <a href="https://www.theguardian.com/business/2015/nov/06/trans-pacific-partnership-four-key-issues-to-watch-out-for">https://www.theguardian.com/business/2015/nov/06/trans-pacific-partnership-four-key-issues-to-watch-out-for</a> (last visited Jul 7, 2016).</p>
<p><strong>[8]</strong> USTR, "The Digital 2 Dozen" (2016), <a href="https://ustr.gov/sites/default/files/Digital-2-Dozen-Final.pdf">https://ustr.gov/sites/default/files/Digital-2-Dozen-Final.pdf</a> (last visited Jul 1, 2016).</p>
<p><strong>[9]</strong> Fergusson, Ian F.m Mark A. McMinimy & Brock R. Williams, "The Trans-Pacific Partnership (TPP) negotiations and issues for congress," (2015), <a href="http://digitalcommons.ilr.cornell.edu/key_workplace/1412/">http://digitalcommons.ilr.cornell.edu/key_workplace/1412/</a> (last visited Jul 8, 2016).</p>
<p><strong>[10]</strong> "How the TPP Will Affect You and Your Digital Rights," Electronic Frontier Foundation (2015), <a href="https://www.eff.org/deeplinks/2015/12/how-tpp-will-affect-you-and-your-digital-rights">https://www.eff.org/deeplinks/2015/12/how-tpp-will-affect-you-and-your-digital-rights</a> (last visited Jul 7, 2016).</p>
<p><strong>[11]</strong> Australian Privacy Foundation (APF), <em>Trans Pacific Partnership Agreement</em> (2016), <a href="https://www.privacy.org.au/Papers/Parlt-TPP-160310.pdf">https://www.privacy.org.au/Papers/Parlt-TPP-160310.pdf</a>.</p>
<p><strong>[12]</strong> Greenleaf, Graham, "The TPP & Other Free Trade Agreements: Faustian Bargains for Privacy?," SSRN (2016), <a href="http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2732386">http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2732386</a> (last visited Jul 1, 2016).</p>
<p><strong>[13]</strong> "GED-Project: Transatlantic Data Flows and Data Protection," GED Blog (2015), <a href="https://ged-project.de/topics/competitiveness/transatlantic-data-flows-and-data-protection-the-state-of-the-debate/">https://ged-project.de/topics/competitiveness/transatlantic-data-flows-and-data-protection-the-state-of-the-debate/</a> (last visited Jul 1, 2016).</p>
<p><strong>[14]</strong> Geist, Michael, "The Trouble with the TPP, Day 14: No U.S. Assurances for Canada on Privacy," (2016), <a href="http://www.michaelgeist.ca/2016/01/the-trouble-with-the-tpp-day-14-no-u-s-assurances-for-canada-on-privacy/">http://www.michaelgeist.ca/2016/01/the-trouble-with-the-tpp-day-14-no-u-s-assurances-for-canada-on-privacy/</a> (last visited Jul 4, 2016).</p>
<p><strong>[15]</strong> Aaronson, Susan Ariel, "What does TPP mean for the Open Internet?" From <em>Policy Brief on Trade Agreements and Internet Governance Prepared for the Global Commission on Internet Governance</em> (2015), <a href="https://www.gwu.edu/~iiep/events/DigitalTrade2016/TPPPolicyBrief.pdf">https://www.gwu.edu/~iiep/events/DigitalTrade2016/TPPPolicyBrief.pdf</a> (last visited Jul 5, 2016).</p>
<p><strong>[16]</strong> Lomas, Natasha, "TPP Trade Agreement Slammed For Eroding Online Rights," TechCrunch, <a href="http://social.techcrunch.com/2015/11/05/tpp-vs-privacy/">http://social.techcrunch.com/2015/11/05/tpp-vs-privacy/</a> (last visited Jun 30, 2016).</p>
<p><strong>[17]</strong> "Q&A: The Trans-Pacific Partnership," Human Rights Watch (2016), <a href="https://www.hrw.org/news/2016/01/12/qa-trans-pacific-partnership">https://www.hrw.org/news/2016/01/12/qa-trans-pacific-partnership</a> (last visited Jul 1, 2016).</p>
<p><strong>[18]</strong> "TPP Full Text Released," People Over Politics (2015), <a href="http://peopleoverpolitics.org/2015/11/07/tpp-just-as-bad-as-you-thought/">http://peopleoverpolitics.org/2015/11/07/tpp-just-as-bad-as-you-thought/</a> (last visited Jul 7, 2016).</p>
<p><strong>[19]</strong> "Right to Privacy in Trans-Pacific Partnership (TPP ) Negotiations," Knowledge Ecology International, <a href="http://keionline.org/node/1164">http://keionline.org/node/1164</a> (last visited Jul 1, 2016).</p>
<p><strong>[20]</strong> Asian Trade Centre, "E-Commerce and Digital Trade Proposals for RCEP (2016)," <a href="http://static1.squarespace.com/static/5393d501e4b0643446abd228/t/575a654c86db438e86009fa1/1465541967821/RCEP+E-commerce+June+2016.pdf">http://static1.squarespace.com/static/5393d501e4b0643446abd228/t/575a654c86db438e86009fa1/1465541967821/RCEP+E-commerce+June+2016.pdf</a> (last visited Jul 1, 2016).</p>
<p><strong>[21]</strong> "E-commerce companies like Flipkart, Snapdeal to beef up data security to meet RCEP norms," The Economic Times, <a href="http://economictimes.indiatimes.com//articleshow/49068419.cms">http://economictimes.indiatimes.com//articleshow/49068419.cms</a> (last visited Jul 1, 2016).</p>
<p><strong>[22]</strong> ECLI:EU:C:2015:650 (C -362/14)</p>
<p><strong>[23]</strong> King et al., "Privacy law, cross-border data flows, and the Trans Pacific Partnership Agreement: what counsel need to know," Lexology, <a href="http://www.lexology.com/library/detail.aspx?g=b5c0b400-8161-4439-a4b7-131552ad5209">http://www.lexology.com/library/detail.aspx?g=b5c0b400-8161-4439-a4b7-131552ad5209</a> (last visited Jul 4, 2016).</p>
<p><strong>[24]</strong> "U.S.-India Business Council Applauds Resumption of Cybersecurity Dialogue," U.S.-India Business Council (2015), <a href="http://www.usibc.com/press-release/us-india-business-council-applauds-resumption-cybersecurity-dialogue">http://www.usibc.com/press-release/us-india-business-council-applauds-resumption-cybersecurity-dialogue</a> (last visited Jul 5, 2016).</p>
<p><strong>[25]</strong> Sukumar, Arun Mohan, "India Is Coming up Against the Limits of Its Strategic Partnership With the United States," The Wire (2016), <a href="http://thewire.in/40403/india-is-coming-up-against-the-limits-of-its-strategic-partnership-with-the-united-states/">http://thewire.in/40403/india-is-coming-up-against-the-limits-of-its-strategic-partnership-with-the-united-states/</a> (last visited Jul 4, 2016).</p>
<p><strong>[26]</strong> Countries – Google Transparency Report, <a href="https://www.google.com/transparencyreport/userdatarequests/countries/">https://www.google.com/transparencyreport/userdatarequests/countries/</a> (last visited Jul 8, 2016).</p>
<p><strong>[27]</strong> Sukumar, Arun Mohan, "A case for the Net’s Ctrl+Alt+Del," The Hindu, September 5, 2015, <a href="http://www.thehindu.com/opinion/op-ed/a-case-for-the-nets-ctrlaltdel/article7616355.ece">http://www.thehindu.com/opinion/op-ed/a-case-for-the-nets-ctrlaltdel/article7616355.ece</a> (last visited Jul 5, 2016).</p>
<h2 id="9">9. Author Profile</h2>
<p><strong>Shubhangi Heda</strong> is a Student of Jindal Global Law School, O.P Jindal Global University. She has completed her fourth year. She gives due importance to popular culture in her life and loves to read fiction and like to watch TV-shows, her favorite being 'White Collar'.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy'>https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy</a>
</p>
No publisherShubhangi HedaTrans Pacific PartnershipPrivacyFree Trade AgreementDigital EconomyInternet GovernanceData Protection2016-07-12T07:56:24ZBlog EntryStudying Digital Creative Industries in India: Initial Questions
https://cis-india.org/raw/studying-digital-creative-industries-in-india-initial-questions
<b>This brief overview of the discourse around creative industries is an attempt to explore some ways of identifying what could be digital creative industries in India, and the questions they raise and problematize for us in terms of cultural expression, knowledge production, creativity and labour. The term ‘creative industries’ has been around for a while now, but with the advent of the digital, and with interest from different sectors, especially with a focus on policy and economic development, it would be essential to critically examine the discourse around the term, and see where it may be changing to open up new possibilities, particularly for the arts, humanities and design.</b>
<p> </p>
<h3>Introduction</h3>
<p>The term ‘creative industries’ has been popular for more than two decades now, and continues to remain an important sector for research and development, as indicated by several shifts in policy and public discourse in the last few years. A significant move has been the foregrounding of creativity and knowledge as important resources for economic growth and social well–being. The term has a connection with the older and more specific term ‘cultural industries’, with its origins in the Frankfurt School <strong>[1]</strong> of theory, but has developed as part of a larger discourse around the creative economy/knowledge economy. First used in Australia in 1994 as part of a report titled Creative Nation <strong>[2]</strong>, it became more widely recognized in the following years with the setting up of the Creative Industries Task Force by the United Kingdom’s Department of Culture, Media and Sport in 1997.The UNESCO Convention on the Protection and Promotion of the Diversity of Cultural Expressions (2005) <strong>[3]</strong> was perhaps the most prominent global effort in recognizing and taking steps towards fostering the growth of creativity and cultural production as part of sustainable development.</p>
<p>Following this there have been several other initiatives across the world, most noticeably in the Anglo-American context, that have built upon this framework to ease and facilitate cross-cultural flows and diversity in the circulation of information, labour and goods. Increasingly, the attempt now is to understand the relevance of these efforts in the digital age, where several advancements in technology and the ubiquitous presence of the internet continue to determine the creation, circulation and consumption of cultural commodities. This blog post is an attempt to outline some initial thoughts on what could be the possibilities of studying ‘digital’ creative industries in India. The digital is an inherent aspect of much cultural and creative expression today, given the steady transition from analogue to digital and the increased presence of internet in almost every domain. What would constitute creative digital industries in the present moment, how do they determine the larger course of cultural production, and pose new questions for labour, commodities, creativity and technology more broadly are some of the questions explored here.</p>
<p>According to the UN Creative Economy Report 2010 <strong>[4]</strong> the creative industries:</p>
<ul>
<li>are the cycles of creation, production and distribution of goods and services that use creativity and intellectual capital as primary inputs;</li>
<li>constitute a set of knowledge-based activities, focused on but not limited to arts, potentially generating revenues from trade and intellectual property rights;</li>
<li>comprise tangible products and intangible intellectual or artistic services with creative content, economic value and market objectives;</li>
<li>stand at the crossroads of the artisan, services and industrial sectors; and</li>
<li>constitute a new dynamic sector in world trade.</li></ul>
<p>As the report mentions, these are ‘evolving’ concepts and definitions, and just the number of areas that can come within the purview of the creative industries has increased greatly in the last decade. The report classifies creative industries under four different models as illustrated here:</p>
<img src="https://github.com/cis-india/website/raw/master/img/CIS-RAW_CreativeIndustriesClassification_CER2010.png" alt="Classification of creative industries." />
<h6>Source: <a href="http://unctad.org/en/Docs/ditctab20103_en.pdf">UN Creative Economy Report 2010</a>.</h6>
<p> </p>
<h3>Creative Industries in India</h3>
<p>In India, there has been a keen interest in the potential of creativity as a resource, although creative industries may not be a popularly used term. From a policy perspective it is largely in terms of opportunities for economic growth, and more recently the potential for innovation and entrepreneurship, as seen in the Niti Aayog report presented in 2015 <strong>[5]</strong>, which says that:</p>
<blockquote>the committee proposes using digital platforms to encourage innovation, reforming the educational system to encourage creativity and upskilling workers to make them more employable, improving the ease of doing business, and strengthening intellectual property rights. Finally, the committee also proposes a number of measures to change cultural biases and attitudes towards entrepreneurship in the long-term, including attaching entrepreneurship to large scale economic and social programs, promoting new high-potential sectors via the government’s “Make in India” campaign, fostering a culture of coordination and collaboration, attempting to redefine cultural notions of success, and tying entrepreneurship with the social inclusion agenda.</blockquote>
<p>The report therefore reflects an interest in harnessing creativity or creative labour as a significant factor in fostering innovation and entrepreneurship, and in some sense also expanding the scope of such entrepreneurship by tying it with social inclusion and encouraging collaboration. What this also has implications then is for educational reform, capacity-building and upskilling for increased employability and better livelihoods, something that requires a systemic and focused effort spread over time. The report also explicitly speaks of strengthening an existing intellectual property regime, which also has been a rather dominant framework for the creative industries discourse from a policy perspective. While there is a need to focus on growth and innovation, a perceived objective of IP, the easy conflation of the two is problematic. Further, the role of IPR in fostering innovation and socio-economic development, as reflected in the draft National IPR policy (2014) <strong>[6]</strong> is contentious, as responses to the draft have pointed out <strong>[7]</strong>. It would also be imperative to understand better the ‘cultural notions of success’ and how these would also impact the creative industries discourse in India.</p>
<p>As part of a large research initiative titled <em>Culture: Industries and Diversity in Asia</em> (CIDASIA) <strong>[8]</strong> spread over two years, the Centre for the Study of Culture and Society Bangalore worked on some of the pertinent questions that emerged out of the creative industries discourse in India and the sub-continent. In a report produced as part of this initiative creative industries are described as:</p>
<blockquote>[T]he vast sector that has emerged with the arrival of modern technologies (emphasis as in the original) and forms of mass reproduction since the colonial period. This sector has now become an important site of intervention for both governments such as in UK, Australia and India and international agencies such as the United Nations.</blockquote>
<p>Further, about the programme the report says:</p>
<blockquote>The initiative attempts to assess the viability of international and government policies for cultural and creative industries and thus lay the groundwork for a hitherto unprecedented intervention of philanthropic organizations in the domain. We specifically focus on culture industries through the node of ‘livelihoods’ that we see as inextricably tied to this sector.</blockquote>
<p>The importance of the question of livelihood to the growth in culture industries remains even today, as they are a source of employment for a vast section of society, mostly in rural areas, and often fall into what is called the unorganized sector. Low capital investment and the disputable legality of many of these industries however, make this connection a complicated one, as pointed out by the CIDASIA research. The study critiqued existing models of creative and cultural industries which emphasized copyright and intellectual property rights (IPR) as safeguards of livelihood and identity, a rather contentious connection given the presence of a large underground economy based on creative labour, which is also often migrant in nature. Other initiatives in the programme included a consultation to rethink the existing debates around cultural policy and diversity, with a focus on the rights of marginalized people, rights in the domain of mass culture, copyright and IPR. Diminishing spaces for cultural or political-artistic performances, and the role of creative cities in fostering such spaces was another area of concern.</p>
<p>There were several learnings from these initiatives about the nature of creative industries (audio-visual media including film and television), the conflation and overlap with culture industries (including craft and legacy industries) and the complex relationship between the two, and how the latter benefits from the first. The question of livelihoods, particularly those of non-citizens, or the migrant is an important one, for it highlights the cultural visibility of these industries, and more importantly establishes the presence of an underground economy that produces goods of high economic value, using cheap labour. Policy reforms, especially with respect to IPR and any regulation of these industries would need to take into account these features. The convergence of difference forms of cultural production with the growth of new media technologies, in particular is a pertinent question. Along with growing concerns around piracy, growth of new kinds of content, exclusivity and distribution become important factors here. The availability of capital and technology, and a growing global presence has also changed dramatically the nature of several creative industries, such as media, entertainment and advertising, but also brought with it challenges of finding creative and sustainable business models <strong>[9]</strong>. The problem of cultural impenetrability, or the difficulty of certain commodities to find a market in certain countries was also brought up as part of a study on the Korean wave in India. The translation of cultural worth into economic value, here studied through an examination of the cinema as cultural object, produced interesting observations in addressing the commodification of these objects and understanding the problem of value in this context <strong>[10]</strong>. The role of technology in the growth of the creative industries was an inherent aspect of all these studies, with factors such as context, conditions and quality of access, and the need to understand the problem of the 'last mile' as a conceptual and cultural problem, rather than a technological one, being emphasized in these findings <strong>[11]</strong>.</p>
<p> </p>
<h3>Creative Labour?</h3>
<p>The importance of the question of livelihood to the growth in culture industries remains even today, as they are a source of employment for a vast section of society, mostly in rural areas, and often fall into what is called the unorganized sector. Low capital investment and the disputable legality of many of these industries however, make this connection a complicated one, as pointed out by the CIDASIA research. The study also critiqued existing models of creative and cultural industries which emphasized copyright and intellectual property rights (IPR) as safeguards of livelihood and identity, a rather contentious connection given the presence of a large underground economy based on creative labour, which is also often migrant in nature. Other initiatives in the programme included a consultation to rethink the existing debates around cultural policy and diversity, with a focus on the rights of marginalized people, rights in the domain of mass culture, copyright and IPR. Diminishing spaces for cultural or political-artistic performances, and the role of creative cities in fostering such spaces was another area of concern.</p>
<p>In the last decade alone, the internet and digital technologies have grown at an exponential pace in India. Creative industries have been driven greatly by advancements in technology, and the role of the digital here then becomes an important aspect of the discourse, in terms of either a space, object or context. The term itself has drawn different kinds of criticism, beginning with the juxtaposition of creativity and industry, or the ‘economisation of culture’, as another product of contemporary capitalism, a critique that stems from the Frankfurt School. The problems are several, as outlined here by Andrew Ross <strong>[12]</strong>:</p>
<blockquote>It may be too early to predict the ultimate fate of the paradigm. But sceptics have already prepared the way for its demise:: it will not generate jobs; it is a recipe for magnifying patterns of class polarisation; its function as a cover for the corporate intellectual property (IP) grab will become all too apparent; its urban development focus will price out the very creatives on whose labour it depends; its reliance on self-promoting rhetoric runs far in advance of its proven impact; its cookie-cutter approach to economic development does violence to regional specificity; its adoption of an instrumental value of creativity will cheapen the true worth of artistic creation.2 Still others are inclined simply to see the new policy rubric as ‘old wine in new bottles’ – a glib production of spin-happy New Labourites, hot for naked marketization but mindful of the need for socially acceptable dress. For those who take a longer, more orthodox Marxist view, the turn toward creative industries is surely a further symptom of an accumulation regime at the end of its effective rule, spent as a productive force, awash in financial speculation, and obsessed with imagery, rhetoric and display.</blockquote>
<p>Similar concerns may be highlighted in the Indian context as well, where the employability of many in creative fields of work, which often fall under the informal or unorganized sector, has always been fraught with uncertainty. The access to cultural and social capital also defines the discourse in a certain manner, as largely urban-centric and focused around a particular class. Education, training and capacity-building efforts in creative fields, and access to these are an important factor that requires further exploration. As reflected in the discussions above, the prevalent imagination of cultural and creative industries still focusses on IPR and socio-economic development of certain sectors of the knowledge economy, therefore making invisible other kinds of labour. The appropriation of the term itself to focus on innovation in certain sectors, at the cost of others, and streamlining and regulation of these in some way would be another aspect of concern. More importantly, the definition of creativity, as beyond skilling for certain kinds of work also needs to be emphasized in these discussions.</p>
<p> </p>
<h3>Key Questions</h3>
<p>Whether these are still pertinent criticisms now is a question, and more importantly, what would be new ways to frame the creative industries debate today would be a relevant starting point of engagement. The following are some questions that could be useful in mapping the creative industries discourse and how it could be thought about today, post the digital turn:</p>
<ol><li>What are digital creative industries? Is it possible to identify a smaller subset of industries that would come within the purview of this term, or is it another entry point into the creative industries discourse in India, where the digital is all pervasive? What are new kinds of creative industries that are heavily and/or purely reliant on the internet and digital technologies?<br /><br /></li>
<li>Does the digital add a new perspective/dimension to how we theorise the notion of creative labour, because of the manner in which it affects, or determines creative expressions in the present, on the internet and more broadly in the digital? More importantly, do we need to critically think about a definition of creativity itself, today within the digital context? How do we then understand questions of precarity in working conditions, innovation and entrepreneurship in this space?<br /><br /></li>
<li>Who is the creative subject? Is it possible to understand such a subject outside of the very Eurocentric discourse around creativity and ‘creation’, which paints the creator as hegemonic in some sense? Another new way to reframe the livelihoods question is to understand the creative worker/knowledge worker, and how to think of these distinctions. What are the new ways to understand this debate?<br /><br /></li>
<li>The discourse around creative industries has largely been framed within the context of the intellectual property rights, and as a method to ensure the stability of the IPR regime. Given the changes, and many nuances to the IPR debates in the last few years, and the growth of the Free/Libre and Open Source Software (FLOSS) movement, it would be useful to understand the growth of creative digital industries in this context.<br /><br /></li>
<li>What does this tell us about a growing digital economy in India? Creative industries would raise interesting questions about the fostering of a digital economy in India, and the many ways in which it determines cultural production in the rest of the world.<br /><br /></li></ol>
<p> </p>
<h3>Endnotes</h3>
<p><strong>[1]</strong> Theodor Adorno and Max Horkheimer, 'The Culture Industry: Enlightenment as Mass Deception,' 1944. <a href="https://www.marxists.org/reference/archive/adorno/1944/culture-industry.htm">https://www.marxists.org/reference/archive/adorno/1944/culture-industry.htm</a>.</p>
<p><strong>[2]</strong> See: <a href="http://apo.org.au/resource/creative-nation-commonwealth-cultural-policy-october-1994">http://apo.org.au/resource/creative-nation-commonwealth-cultural-policy-october-1994</a>.</p>
<p><strong>[3]</strong> See: <a href="http://portal.unesco.org/en/ev.php-URL_ID=31038&URL_DO=DO_TOPIC&URL_SECTION=201.html">http://portal.unesco.org/en/ev.php-URL_ID=31038&URL_DO=DO_TOPIC&URL_SECTION=201.html</a>.</p>
<p><strong>[4]</strong> See: <a href="http://unctad.org/en/Docs/ditctab20103_en.pdf">http://unctad.org/en/Docs/ditctab20103_en.pdf</a>.</p>
<p><strong>[5]</strong> See: <a href="http://niti.gov.in/mgov_file/report%20of%20the%20expert%20committee.pdf">http://niti.gov.in/mgov_file/report%20of%20the%20expert%20committee.pdf</a>.</p>
<p><strong>[6]</strong> See: <a href="http://dipp.nic.in/English/Schemes/Intellectual_Property_Rights/IPR_Policy_24December2014.pdf">http://dipp.nic.in/English/Schemes/Intellectual_Property_Rights/IPR_Policy_24December2014.pdf</a>.</p>
<p><strong>[7]</strong> For more on this see: 'Comments on the First Draft Of The National IPR Policy' submitted by the Centre for Internet and Society, 2015 <a href="http://cis-india.org/a2k/blogs/cis-comments_first-draft-of-national-ipr-stategy.pdf">http://cis-india.org/a2k/blogs/cis-comments_first-draft-of-national-ipr-stategy.pdf</a>, and 'SpicyIP Tidbit: New IPR Policy in 2 months' by Balaji Subramanian, SpicyIP, October 2015, <a href="http://spicyip.com/2015/10/spicyip-tidbit-new-ipr-policy-in-2-months.html">http://spicyip.com/2015/10/spicyip-tidbit-new-ipr-policy-in-2-months.html</a>.</p>
<p><strong>[8]</strong> See: <a href="http://cscs.res.in/irps/cidasia-1">http://cscs.res.in/irps/cidasia-1</a>.</p>
<p><strong>[9]</strong> S. Ananth, 'Business of Culture in India,' 2008. <a href="http://cscs.res.in/dataarchive/textfiles/textfile.2009-12-18.9970782136">http://cscs.res.in/dataarchive/textfiles/textfile.2009-12-18.9970782136</a>.</p>
<p><strong>[10]</strong>'When The Host Arrived: A Report on the Problems and Prospects for the Exchange of Popular Cultural Commodities with India,' 2008. <a href="http://cscs.res.in/dataarchive/textfiles/textfile.2009-07-17.9853066637/file">http://cscs.res.in/dataarchive/textfiles/textfile.2009-07-17.9853066637/file</a>.</p>
<p><strong>[11]</strong>Ashish Rajadhyaksha, 'The Last Cultural Mile' (Bangalore: Centre for Internet and Society, 2011) <a href="http://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/the-last-cultural-mile-blog-old">http://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/the-last-cultural-mile-blog-old</a>.</p>
<p><strong>[12]</strong> Andrew Ross, 'Nice Work of You Can get it: The Mercurial Career of Creative Industries Policy,' in <em>MyCreativity Reader</em>. Eds. Geert Lovink and Ned Rossiter (Amsterdam: Institute of Network Cultures, 2007).</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/raw/studying-digital-creative-industries-in-india-initial-questions'>https://cis-india.org/raw/studying-digital-creative-industries-in-india-initial-questions</a>
</p>
No publishersneha-ppDigital EconomyDigital KnowledgeResearchCreative IndustriesResearchers at Work2016-03-18T13:55:56ZBlog EntryContestations of Data, ECJ Safe Harbor Ruling and Lessons for India
https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india
<b>The European Court of Justice has invalidated a European Commission decision, which had previously concluded that the 'Safe Harbour Privacy Principles' provide adequate protections for European citizens’ privacy rights for the transfer of personal data between European Union and United States. The inadequacies of the framework is not news for the European Commission and action by ECJ has been a long time coming. The ruling raises important questions about how the claims of citizenship are being negotiated in the context of the internet, and how increasingly the contestations of personal data are being employed in the discourse. </b>
<p align="justify">The European Court of Justice
(ECJ) has invalidated a European Commission (EC) decision<a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"><sup>1</sup></a>
which had previously concluded that the 'Safe Harbor Privacy
Principles'<a class="sdfootnoteanc" name="sdfootnote2anc" href="#sdfootnote2sym"><sup>2</sup></a>
provide adequate protections for European citizens’ privacy rights<a class="sdfootnoteanc" name="sdfootnote3anc" href="#sdfootnote3sym"><sup>3</sup></a>
for the transfer of personal data between European Union and United
States. This challenge stems from the claim that public law
enforcement authorities in America obtain personal data from
organisations in safe harbour for incompatible and disproportionate
purposes in violation of the Safe Harbour Privacy Principles. The
court's judgment follows the advice of the Advocate General of the
Court of Justice of the European Union (CJEU) who recently opined<a class="sdfootnoteanc" name="sdfootnote4anc" href="#sdfootnote4sym"><sup>4</sup></a>
that US practices allow for large-scale collection and transfer of
personal data belonging to EU citizens without them benefiting from
or having access to judicial protection under US privacy laws. The
inadequacies of the framework is not news for the Commission and
action by ECJ has been a long time coming. The ruling raises
important questions about how increasingly the contestations of
personal data are being employed in asserting claims of citizenship
in context of the internet.</p>
<p align="justify">
As the highest court in Europe,
the ECJ's decisions are binding on all member states. With this
ruling the ECJ has effectively restrained US firms from
indiscriminate collection and sharing of European citizens’ data on
American soil. The implications of the decision are significant,
because it shifts the onus of evaluating protections of personal data
for EU citizens from the 4,400 companies<a class="sdfootnoteanc" name="sdfootnote5anc" href="#sdfootnote5sym"><sup>5</sup></a>
subscribing to the system onto EU privacy watchdogs. Most
significantly, in addressing the rights of a citizen against an
established global brand, the judgement goes beyond political and
legal opinion to challenge the power imbalance that exists with
reference to US based firms.</p>
<p align="justify">
Today, the free movement of data
across borders is a critical factor in facilitating trade, financial
services, governance, manufacturing, health and development. However,
to consider the ruling as merely a clarification of transatlantic
mechanisms for data flows misstates the real issue. At the heart of
the judgment is the assessment whether US firms apply the tests of
‘necessity and proportionality’ in the collection and
surveillance of data for national security purposes. Application of
necessity and proportionality test to national security exceptions
under safe harbor has been a sticking point that has stalled the
renegotiation of the agreement that has been underway between the
Commission and the American data protection authorities.<a class="sdfootnoteanc" name="sdfootnote6anc" href="#sdfootnote6sym"><sup>6</sup></a></p>
<p align="justify">
For EU citizens the stake in the
case are even higher, as while their right to privacy is enshrined
under EU law, they have no administrative or judicial means of
redress, if their data is used for reasons they did not intend. In
the EU, citizens accessing and agreeing to use of US based firms are
presented with a false choice between accessing benefits and giving
up on their fundamental right to privacy. In other words, by seeking
that governments and private companies provide better data protection
for the EU citizens and in restricting collection of personal data on
a generalised basis without objective criteria, the ruling is
effectively an assertion of ‘data sovereignty’. The term ‘data
sovereignty’, while lacking a firm definition, refers to a spectrum
of approaches adopted by different states to control data generated
in or passing through national internet infrastructure.<a class="sdfootnoteanc" name="sdfootnote7anc" href="#sdfootnote7sym"><sup>7</sup></a>
Underlying the ruling is the growing policy divide between the US and
EU privacy and data protection standards, which may lead to what is
referred to as the balkanization<a class="sdfootnoteanc" name="sdfootnote8anc" href="#sdfootnote8sym"><sup>8</sup></a>
of the internet in the future.</p>
<p align="justify">
<em>US-EU Data Protection Regime </em></p>
<p align="justify">
The safe harbor pact between the
EU and US was negotiated in the late 1990s as an attempt to bridge
the different approaches to online privacy. Privacy is addressed in
the EU as a fundamental human right while in the US it is defined
under terms of consumer protection, which<em><strong>
</strong></em>allow trade-offs
and exceptions when national security seems to be under threat. In
order to address the lower standards of data protection prevalent in
the US, the pact facilitates data transfers from EU to US by
establishing certain safeguards equivalent to the requirements of the
EU data protection directive. The safe harbor provisions include
firms undertaking not to pass personal information to third parties
if the EU data protection standards are not met and giving users
right to opt out of data collection.<a class="sdfootnoteanc" name="sdfootnote9anc" href="#sdfootnote9sym"><sup>9</sup></a></p>
<p align="justify">
The agreement was due to be
renewed by May 2015<a class="sdfootnoteanc" name="sdfootnote10anc" href="#sdfootnote10sym"><sup>10</sup></a>
and while negotiations have been ongoing for two years, EU discontent
on safe harbour came to the fore following the Edward Snowden
revelations of collection and monitoring facilitated by large private
companies for the PRISM program and after the announcement of the
TransAtlantic Trade and Investment Partnership (TTIP).<a class="sdfootnoteanc" name="sdfootnote11anc" href="#sdfootnote11sym"><sup>11</sup></a>
EU member states have mostly stayed silent as they run their own
surveillance programs often times, in cooperation with the NSA. EU
institutions cannot intervene in matters of national security
however, they do have authority on data protection matters. European
Union officials and Members of Parliament have expressed shock and
outrage at the surveillance programs unveiled by Snowden's 2013
revelations. Most recently, following the CJEU Advocate General’s
opinion, 50 Members of European Parliament (MEP) sent a strongly
worded letter the US Congress hitting back on claims of ‘digital
protectionism’ emanating from the US<a class="sdfootnoteanc" name="sdfootnote12anc" href="#sdfootnote12sym"><sup>12</sup></a>.
In no uncertain terms the letter clarified that the EU has different
ideas on privacy, platforms, net neutrality, encryption, Bitcoin,
zero-days, or copyright and will seek to improve and change any
proposal from the EC in the interest of our citizens and of all
people.</p>
<p align="justify">
<em>Towards Harmonization </em></p>
<p align="justify">
In November 2013, as an attempt
to minimize the loss of trust following the Snowden revelations, the
European Commission (EC) published recommendations in its report on
'Rebuilding Trust is EU-US Data Flows'.<a class="sdfootnoteanc" name="sdfootnote13anc" href="#sdfootnote13sym"><sup>13</sup></a>
The recommendations revealed two critical initiatives at the EU
level—first was the revision of the EU-US safe harbor agreement<a class="sdfootnoteanc" name="sdfootnote14anc" href="#sdfootnote14sym"><sup>14</sup></a>
and second the adoption of the 'EU-US Umbrella Agreement<a class="sdfootnoteanc" name="sdfootnote15anc" href="#sdfootnote15sym"><sup>15</sup></a>'—a
framework for data transfer for the purpose of investigating,
detecting, or prosecuting a crime, including terrorism. The Umbrella
Agreement was recently initialed by EU and US negotiators and it only
addresses the exchange of personal data between law enforcement
agencies.<a class="sdfootnoteanc" name="sdfootnote16anc" href="#sdfootnote16sym"><sup>16</sup></a>
The Agreement has gained momentum in the wake of recent cases around
issues of territorial duties of providers, enforcement jurisdictions
and data localisation.<a class="sdfootnoteanc" name="sdfootnote17anc" href="#sdfootnote17sym"><sup>17</sup></a>
However, the adoption of the Umbrella Act depends on US Congress
adoption of the<em><strong>
</strong></em>Judicial Redress
Act (JRA) as law.<a class="sdfootnoteanc" name="sdfootnote18anc" href="#sdfootnote18sym"><sup>18</sup></a></p>
<p align="justify">
<em>Judicial Redress Act </em></p>
<p align="justify">
The JRA is a key reform that the
EC is pushing for in an attempt to address the gap between privacy
rights and remedies available to US citizens and those extended to EU
citizens, including allowing EU citizens to sue in American courts.
The JRA seeks to extend certain protections under the Privacy Act to
records shared by EU and other designated countries with US law
enforcement agencies for the purpose of investigating, detecting, or
prosecuting criminal offenses. The JRA protections would extend to
records shared under the Umbrella Agreement and while it does include
civil remedies for violation of data protection, as noted by the
Center for Democracy and Technology, the present framework does not
provide citizens of EU countries with redress that is at par with
that which US persons enjoy under the Privacy Act.<a class="sdfootnoteanc" name="sdfootnote19anc" href="#sdfootnote19sym"><sup>19</sup></a></p>
<p align="justify">
For example, the measures
outlined under the JRA would only be applicable to countries that
have outlined appropriate privacy protections agreements for data
sharing for investigations and ‘efficiently share’ such
information with the US. Countries that do not have agreements with
US cannot seek these protections leaving the personal data of their
citizens open for collection and misuse by US agencies. Further, the
arrangement leaves determination of 'efficiently sharing' in the
hands of US authorities and countries could lose protection if they
do not comply with information sharing requests promptly. Finally,
JRA protections do not apply to non-US persons nor to records shared
for purposes other than law enforcement such as intelligence
gathering. JRA is also weakened by allowing heads of agencies to
exercise their discretion to seek exemption from the Act and opt out
of compliance.</p>
<p align="justify">
Taken together the JRA, the
Umbrella Act and the renegotiation of the Safe Harbor Agreement need
considerable improvements. It is worth noting that EU’s acceptance
of the redundancy of existing agreements and in establishing the
independence of national data protection authorities in investigating
and enforcing national laws as demonstrated in the Schrems and in the
Weltimmo<a class="sdfootnoteanc" name="sdfootnote20anc" href="#sdfootnote20sym"><sup>20</sup></a>
case point to accelerated developments in the broader EU privacy
landscape.</p>
<p align="justify">
<em>Consequences </em></p>
<p align="justify">
The ECJ Safe Harbor ruling will
have far-reaching consequences for the online industry. Often, costly
government rulings solidify the market dominance of big companies. As
high regulatory costs restrict the entrance of small and medium
businesses the market, competition is gradually wiped out. Further,
complying with high standards of data protection means that US firms
handling European data will need to consider alternative legal means
of transfer of personal data. This could include evolving 'model
contracts' binding them to EU data protection standards. As Schrems
points out, “Big companies don’t only rely on safe harbour: they
also rely on binding corporate rules and standard contractual
clauses.”<a class="sdfootnoteanc" name="sdfootnote21anc" href="#sdfootnote21sym"><sup>21</sup></a></p>
<p align="justify">
The ruling is good news for
European consumers, who can now approach a national regulator to
investigate suspicions of data mishandling. EU data protection
regulators may be be inundated with requests from companies seeking
authorization of new contracts and with consumer complaints. Some are
concerned that the ruling puts a dent in the globalized flow of
data<a class="sdfootnoteanc" name="sdfootnote22anc" href="#sdfootnote22sym"><sup>22</sup></a>,
effectively requiring data localization in Europe.<a class="sdfootnoteanc" name="sdfootnote23anc" href="#sdfootnote23sym"><sup>23</sup></a>
Others have pointed out that it is unclear how this decision sits
with other trade treaties such as the TPP that ban data
localisation.<a class="sdfootnoteanc" name="sdfootnote24anc" href="#sdfootnote24sym"><sup>24</sup></a>
While the implications of the decision will take some time in playing
out, what is certain is that US companies will be have to
restructure management, storage and use of data. The ruling has
created the impetus for India to push for reforms to protect its
citizens from harms by US firms and improve trade relations with EU.</p>
<p align="justify"><em>The Opportunity for India</em></p>
<p align="justify">
Multiple data flows taking place
over the internet simultaneously and that has led to ubiquity of data
transfers o ver the Internet, exposing individuals to privacy risks.
There has also been an enhanced economic importance of data
processing as businesses collect and correlate data using analytic
tools to create new demands, establish relationships and generate
revenue for their services. The primary concern of the Schrems case
may be the protection of the rights of EU citizens but by seeking to
extend these rights and ensure compliance in other jurisdictions, the
case touches upon many underlying contestations around data and
sovereignty.</p>
<p align="justify">
Last year, Mr Ram Narain, India
Head of Delegation to the Working Group Plenary at ITU had stressed, “respecting the principle of sovereignty of information through
network functionality and global norms will go a long way in
increasing the trust and confidence in use of ICT.”<a class="sdfootnoteanc" name="sdfootnote25anc" href="#sdfootnote25sym"><sup>25</sup></a>
In the absence of the recognition of privacy as a right and
empowering citizens through measures or avenues to seek redressal
against misuse of data, the demand of data sovereignty rings empty.
The kind of framework which empowered an ordinary citizen in the EU
to approach the highest court seeking redressal based on presumed
overreach of a foreign government and from harms abetted by private
corporations simply does not exist in India. Securing citizen’s
data in other jurisdictions and from other governments begins with
establishing protection regimes within the country.</p>
<p align="justify">
The Indian government has also
stepped up efforts to restrict transfer of data from India including
pushing for private companies to open data centers in India.<a class="sdfootnoteanc" name="sdfootnote26anc" href="#sdfootnote26sym"><sup>26</sup></a>
Negotiating data localisation does not restrict the power of private
corporations from using data in a broad ways including tailoring ads
and promoting products. Also, data transfers impact any organisation
with international operations for example, global multinationals who
need to coordinate employee data and information. Companies like
Facebook, Google and Microsoft transfer and store data belonging to
Indian citizens and it is worth remembering that the National
Security Agency (NSA) would have access to this data through servers
of such private companies. With no existing measures to restrict such
indiscriminate access, the ruling purports to the need for India to
evolve strong protection mechanisms. Finally, the lack of such
measures also have an economic impact, as reported in a recent
Nasscom-Data Security Council of India (DSCI) survey<a class="sdfootnoteanc" name="sdfootnote27anc" href="#sdfootnote27sym"><sup>27</sup></a>
that pegs revenue losses incurred by the Indian IT-BPO industry at
$2-2.5 billion for a sample size of 15 companies. DSCI has further
estimated that outsourcing business can further grow by $50 billion
per annum once India is granted a “data secure” status by the
EU.<a class="sdfootnoteanc" name="sdfootnote28anc" href="#sdfootnote28sym"><sup>28</sup></a>
EU’s refusal to grant such a status is understandable given the
high standard of privacy as incorporated under the European Union
Data Protection Directive a standard to which India does not match
up, yet. The lack of this status prevents the flow of data which is
vital for Digital India vision and also affects the service industry
by restricting the flow of sensitive information to India such as
information about patient records.</p>
<p align="justify">
Data and information structures
are controlled and owned by private corporations and networks
transcend national borders, therefore the foremost emphasis needs to
be on improving national frameworks. While, enforcement mechanisms
such as the Mutual Legal Assistance Treaty (MLAT) process or other
methods of international cooperation may seem respectful of
international borders and principles of sovereignty,<a class="sdfootnoteanc" name="sdfootnote29anc" href="#sdfootnote29sym"><sup>29</sup></a>
for users that live in undemocratic or oppressive regimes such
agreements are a considerable risk. Data is also increasingly being
stored across multiple jurisdictions and therefore merely applying
data location lens to protection measures may be too narrow. Further
it should be noted that when companies begin taking data storage
decisions based on legal considerations it will impact the speed and
reliability of services.<a class="sdfootnoteanc" name="sdfootnote30anc" href="#sdfootnote30sym"><sup>30</sup></a>
Any future regime must reflect the challenges of data transfers
taking place in legal and economic spaces that are not identical and
may be in opposition. Fundamentally, the protection of privacy will
always act as a barrier to the free flow of information even so, as
the Schrems case ruling points out not having adequate privacy
protections could also restrict flow of data, as has been the case
for India.</p>
<p align="justify">
The time is right for India to
appoint a data controller and put in place national frameworks, based
on nuanced understanding of issues of applying jurisdiction to govern
users and their data. Establishing better protection measures will
not only establish trust and enhance the ability of users to control
data about themselves it is also essential for sustaining economic
and social value generated from data generation and collection.
Suggestions for such frameworks have been considered previously by
the Group of Experts on Privacy constituted by the Planning
Commission.<a class="sdfootnoteanc" name="sdfootnote31anc" href="#sdfootnote31sym"><sup>31</sup></a>
By incorporating transparency in mechanisms for data and access
requests and premising requests on established necessity and
proportionality Indian government can lead the way in data protection
standards. This will give the Indian government more teeth to
challenge and address both the dangers of theft of data stored on
servers located outside of India and restrain indiscriminate access
arising from terms and conditions of businesses that grant such
rights to third parties. </p>
<div id="sdfootnote1">
<p>
<a class="sdfootnotesym" name="sdfootnote1sym" href="#sdfootnote1anc">1</a>
Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC
of the European Parliament and of the Council on the adequacy of the
protection provided by the safe harbour privacy principles and
related frequently asked questions issued by the US Department of
Commerce (notified under document number C(2000) 2441) (Text with
EEA relevance.) <em>Official
Journal L 215 , 25/08/2000 P. 0007 -0047 </em>
2000/520/EC:
<u><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">http</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">://</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">eur</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">-</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">lex</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">.</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">europa</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">.</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">eu</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">/</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">LexUriServ</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">/</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">LexUriServ</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">.</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">do</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">?</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">uri</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">=</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">CELEX</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">:32000</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">D</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">0520:</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">EN</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">:</a><a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML">HTML</a></u></p>
</div>
<div id="sdfootnote2">
<p>
<a class="sdfootnotesym" name="sdfootnote2sym" href="#sdfootnote2anc">2</a>
Safe Harbour Privacy Principles Issued by the U.S. Department of
Commerce on July 21, 2000
<u><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">http</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">://</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">www</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">.</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">export</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">.</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">gov</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">/</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">safeharbor</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">/</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">eu</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">/</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">eg</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">_</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">main</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">_018475.</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">asp</a></u></p>
</div>
<div id="sdfootnote3">
<p>
<a class="sdfootnotesym" name="sdfootnote3sym" href="#sdfootnote3anc">3</a>
Megan Graham, <a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">Adding</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">Some</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">Nuance</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">on</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">the</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">European</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">Court</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">’</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">s</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">Safe</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">Harbor</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">Decision</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">,
</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">Just</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">security</a></p>
<p>
<u><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">https</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">://</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">www</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">.</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">justsecurity</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">.</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">org</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">/26651/</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">adding</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">-</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">nuance</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">-</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">ecj</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">-</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">safe</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">-</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">harbor</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">-</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">decision</a><a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/">/</a></u></p>
</div>
<div id="sdfootnote4">
<p>
<a class="sdfootnotesym" name="sdfootnote4sym" href="#sdfootnote4anc">4</a>
Advocate
General’s Opinion in Case C-362/14 Maximillian Schrems v Data
Protection Commissioner Court of Justice of the European Union,
Press Release, No 106/15 Luxembourg, 23 September 2015
<u><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">http</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">://</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">curia</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">.</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">europa</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">.</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">eu</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">/</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">jcms</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">/</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">upload</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">/</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">docs</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">/</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">application</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">/</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">pdf</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">/2015-09/</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">cp</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">150106</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">en</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">.</a><a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf">pdf</a></u></p>
</div>
<div id="sdfootnote5">
<p>
<a class="sdfootnotesym" name="sdfootnote5sym" href="#sdfootnote5anc">5</a>
Jennifer Baker, ‘EU desperately pushes just-as-dodgy safe harbour
alternatives’, The Register, October 7, 2015
<u><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">http</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">://</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">www</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">.</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">theregister</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">.</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">co</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">.</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">uk</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">/2015/10/07/</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">eu</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">_</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">pushes</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">_</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">safe</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">_</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">harbour</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">_</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">alternatives</a><a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/">/</a></u> </p>
</div>
<div id="sdfootnote6">
<p>
<a class="sdfootnotesym" name="sdfootnote6sym" href="#sdfootnote6anc">6</a>
Draft Report, General Data Protection Regulation, Committee on Civil
Liberties, Justice and Home Affairs, European Parliament, 2009-2014
<a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">http</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">://</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">www</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">.</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">europarl</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">.</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">europa</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">.</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">eu</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">/</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">meetdocs</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">/2009_2014/</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">documents</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">/</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">libe</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">/</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">pr</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">/922/922387/922387</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">en</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">.</a><a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf">pdf</a></p>
</div>
<div id="sdfootnote7">
<p>
<a class="sdfootnotesym" name="sdfootnote7sym" href="#sdfootnote7anc">7</a>
Dana Polatin-Reuben, Joss Wright, ‘An Internet with BRICS
Characteristics: Data Sovereignty and the Balkanisation of the
Internet’, University of Oxford, July 7, 2014
<u><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">https</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">://</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">www</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">.</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">usenix</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">.</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">org</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">/</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">system</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">/</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">files</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">/</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">conference</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">/</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">foci</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">14/</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">foci</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">14-</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">polatin</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">-</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">reuben</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">.</a><a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf">pdf</a></u></p>
</div>
<div id="sdfootnote8">
<p>
<a class="sdfootnotesym" name="sdfootnote8sym" href="#sdfootnote8anc">8</a>
Sasha
Meinrath, The Future of the Internet: Balkanization and Borders,
Time, October 2013
<u><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">http</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">://</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">ideas</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">.</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">time</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">.</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">com</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">/2013/10/11/</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">the</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">-</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">future</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">-</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">of</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">-</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">the</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">-</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">internet</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">-</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">balkanization</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">-</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">and</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">-</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">borders</a><a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/">/</a></u></p>
</div>
<div id="sdfootnote9">
<p>
<a class="sdfootnotesym" name="sdfootnote9sym" href="#sdfootnote9anc">9</a>
Safe Harbour Privacy Principles, Issued by the U.S. Department of
Commerce, July 2001
<u><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">http</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">://</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">www</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">.</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">export</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">.</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">gov</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">/</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">safeharbor</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">/</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">eu</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">/</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">eg</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">_</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">main</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">_018475.</a><a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp">asp</a></u></p>
</div>
<div id="sdfootnote10">
<p>
<a class="sdfootnotesym" name="sdfootnote10sym" href="#sdfootnote10anc">10</a>
Facebook
case may force European firms to change data storage practices, The
Guardian, September 23, 2015
<u><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">http</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">://</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">www</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">.</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">theguardian</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">.</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">com</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">/</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">us</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">-</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">news</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">/2015/</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">sep</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">/23/</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">us</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">-</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">intelligence</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">-</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">services</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">-</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">surveillance</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">-</a><a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy">privacy</a></u></p>
</div>
<div id="sdfootnote11">
<p>
<a class="sdfootnotesym" name="sdfootnote11sym" href="#sdfootnote11anc">11</a>
Privacy Tracker, US-EU Safe Harbor Under Pressure, August 2, 2013
<u><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">https</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">://</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">iapp</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">.</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">org</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">/</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">news</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">/</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">a</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">/</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">us</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">-</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">eu</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">-</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">safe</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">-</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">harbor</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">-</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">under</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">-</a><a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure">pressure</a></u></p>
</div>
<div id="sdfootnote12">
<p>
<a class="sdfootnotesym" name="sdfootnote12sym" href="#sdfootnote12anc">12</a>
Kieren
McCarthy, Privacy, net neutrality, security, encryption ... Europe
tells Obama, US Congress to back off, The Register, 23 September,
2015
<u><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">http</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">://</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">www</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">.</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">theregister</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">.</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">co</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">.</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">uk</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">/2015/09/23/</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">european</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">_</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">politicians</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">_</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">to</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">_</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">congress</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">_</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">back</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">_</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">off</a><a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/">/</a></u></p>
</div>
<div id="sdfootnote13">
<p>
<a class="sdfootnotesym" name="sdfootnote13sym" href="#sdfootnote13anc">13</a>
Communication from the Commission to the European Parliament and the
Council, Rebuilding Trust in EU-US Data Flows, European Commission,
November 2013
<u><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">http</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">://</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">ec</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">.</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">europa</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">.</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">eu</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">/</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">justice</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">/</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">data</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">-</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">protection</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">/</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">files</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">/</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">com</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">_2013_846_</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">en</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">.</a><a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf">pdf</a></u></p>
</div>
<div id="sdfootnote14">
<p>
<a class="sdfootnotesym" name="sdfootnote14sym" href="#sdfootnote14anc">14</a>
Safe
Harbor on trial in the European Union, Access Blog, September 2014
<u><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">https</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">://</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">www</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">.</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">accessnow</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">.</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">org</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">/</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">blog</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">/2014/11/13/</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">safe</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">-</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">harbor</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">-</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">on</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">-</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">trial</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">-</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">in</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">-</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">the</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">-</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">european</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">-</a><a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union">union</a></u></p>
</div>
<div id="sdfootnote15">
<p>
<a class="sdfootnotesym" name="sdfootnote15sym" href="#sdfootnote15anc">15</a>
European
Commission - Fact Sheet Questions and Answers on the EU-US data
protection "Umbrella agreement", September 8, 2015
<u><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">http</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">://</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">europa</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">.</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">eu</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">/</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">rapid</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">/</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">press</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">-</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">release</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">_</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">MEMO</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">-15-5612_</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">en</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">.</a><a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm">htm</a></u> </p>
</div>
<div id="sdfootnote16">
<p>
<a class="sdfootnotesym" name="sdfootnote16sym" href="#sdfootnote16anc">16</a>
McGuire Woods, ‘EU and U.S. reach “Umbrella Agreement” on data
transfers’, Lexology, September 14, 2015
<u><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">http</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">://</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">www</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">.</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">lexology</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">.</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">com</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">/</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">library</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">/</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">detail</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">.</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">aspx</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">?</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">g</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">=422</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">bca</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">41-2</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">d</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">54-4648-</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">ae</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">57-00</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">d</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">678515</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">e</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">1</a><a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f">f</a></u></p>
</div>
<div id="sdfootnote17">
<p>
<a class="sdfootnotesym" name="sdfootnote17sym" href="#sdfootnote17anc">17</a>
Andrew
Woods, Lowering the Temperature on the Microsoft-Ireland Case,
Lawfare September, 2015
<u><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">https</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">://</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">www</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">.</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">lawfareblog</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">.</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">com</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">/</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">lowering</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">-</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">temperature</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">-</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">microsoft</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">-</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">ireland</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">-</a><a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case">case</a></u></p>
</div>
<div id="sdfootnote18">
<p>
<a class="sdfootnotesym" name="sdfootnote18sym" href="#sdfootnote18anc">18</a>
Jens-Henrik Jeppesen, Greg Nojeim, ‘The EU-US Umbrella Agreement
and the Judicial Redress Act: Small Steps Forward for EU Citizens’
Privacy Rights’, October 5, 2015
<u><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">https</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">://</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">cdt</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">.</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">org</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">/</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">blog</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">/</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">the</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">eu</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">us</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">umbrella</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">agreement</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">and</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">the</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">judicial</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">redress</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">act</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">small</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">steps</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">forward</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">for</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">eu</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">citizens</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">privacy</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">-</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">rights</a><a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/">/</a></u></p>
</div>
<div id="sdfootnote19">
<p>
<a class="sdfootnotesym" name="sdfootnote19sym" href="#sdfootnote19anc">19</a>
Ibid 18.</p>
</div>
<div id="sdfootnote20">
<p>
<a class="sdfootnotesym" name="sdfootnote20sym" href="#sdfootnote20anc">20</a>
Landmark ECJ data protection ruling could impact Facebook and
Google, The Guardian, 2 October, 2015
<u><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">http</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">://</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">www</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">.</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">theguardian</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">.</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">com</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">/</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">technology</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">/2015/</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">oct</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">/02/</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">landmark</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">-</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">ecj</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">-</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">data</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">-</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">protection</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">-</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">ruling</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">-</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">facebook</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">-</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">google</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">-</a><a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo">weltimmo</a></u></p>
</div>
<div id="sdfootnote21">
<p>
<a class="sdfootnotesym" name="sdfootnote21sym" href="#sdfootnote21anc">21</a>
Julia Powles, Tech companies like Facebook not above the law, says
Max Schrems, The Guardian, Octover 9, 2015
<a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">http</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">://</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">www</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">.</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">theguardian</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">.</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">com</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">/</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">technology</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">/2015/</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">oct</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">/09/</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">facebook</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">-</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">data</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">-</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">privacy</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">-</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">max</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">-</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">schrems</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">-</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">european</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">-</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">court</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">-</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">of</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">-</a><a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice">justice</a></p>
</div>
<div id="sdfootnote22">
<p>
<a class="sdfootnotesym" name="sdfootnote22sym" href="#sdfootnote22anc">22</a>
Adam
Thierer,
Unintended
Consequences of the EU Safe Harbor Ruling, The Technology Liberation
Front, October 6, 2015
<u><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">http</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">://</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">techliberation</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">.</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">com</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">/2015/10/06/</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">unintended</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">-</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">consequenses</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">-</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">of</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">-</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">the</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">-</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">eu</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">-</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">safe</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">-</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">harbor</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">-</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">ruling</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">/#</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">more</a><a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831">-75831</a></u></p>
</div>
<div id="sdfootnote23">
<p>
<a class="sdfootnotesym" name="sdfootnote23sym" href="#sdfootnote23anc">23</a>
Anupam
Chander, Tweeted ECJ<a href="https://twitter.com/hashtag/schrems?src=hash">
#</a><a href="https://twitter.com/hashtag/schrems?src=hash">schrems</a>
ruling may effectively require data localization within Europe,
<u><a href="https://twitter.com/AnupamChander/status/651369730754801665">https</a><a href="https://twitter.com/AnupamChander/status/651369730754801665">://</a><a href="https://twitter.com/AnupamChander/status/651369730754801665">twitter</a><a href="https://twitter.com/AnupamChander/status/651369730754801665">.</a><a href="https://twitter.com/AnupamChander/status/651369730754801665">com</a><a href="https://twitter.com/AnupamChander/status/651369730754801665">/</a><a href="https://twitter.com/AnupamChander/status/651369730754801665">AnupamChander</a><a href="https://twitter.com/AnupamChander/status/651369730754801665">/</a><a href="https://twitter.com/AnupamChander/status/651369730754801665">status</a><a href="https://twitter.com/AnupamChander/status/651369730754801665">/651369730754801665</a></u></p>
</div>
<div id="sdfootnote24">
<p>
<a class="sdfootnotesym" name="sdfootnote24sym" href="#sdfootnote24anc">24</a>
Lokman Tsui, Tweeted, “If the TPP bans data localization, but the
ECJ ruling effectively mandates it, what does that mean for the
internet?”
<u><a href="https://twitter.com/lokmantsui/status/651393867376275456">https</a><a href="https://twitter.com/lokmantsui/status/651393867376275456">://</a><a href="https://twitter.com/lokmantsui/status/651393867376275456">twitter</a><a href="https://twitter.com/lokmantsui/status/651393867376275456">.</a><a href="https://twitter.com/lokmantsui/status/651393867376275456">com</a><a href="https://twitter.com/lokmantsui/status/651393867376275456">/</a><a href="https://twitter.com/lokmantsui/status/651393867376275456">lokmantsui</a><a href="https://twitter.com/lokmantsui/status/651393867376275456">/</a><a href="https://twitter.com/lokmantsui/status/651393867376275456">status</a><a href="https://twitter.com/lokmantsui/status/651393867376275456">/651393867376275456</a></u></p>
</div>
<div id="sdfootnote25">
<p>
<a class="sdfootnotesym" name="sdfootnote25sym" href="#sdfootnote25anc">25</a>
Statement from Indian Head of Delegation, Mr Ram Narain for WGPL,
<a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">Indian</a><a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">statement</a><a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">on</a><a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">ITU</a><a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">and</a><a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">Internet</a><a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">at</a><a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">the</a><a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">Working</a><a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">Group</a><a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">Plenary</a><a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">November</a><a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/">
4, 2014 </a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">https</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">://</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">ccgnludelhi</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">.</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">wordpress</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">.</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">com</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">/</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">author</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">/</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">asukum</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">87/</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">page</a><a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/">/2/</a></p>
</div>
<div id="sdfootnote26">
<p>
<a class="sdfootnotesym" name="sdfootnote26sym" href="#sdfootnote26anc">26</a>
Sounak
Mitra, Xiaomi bets big on India despite problems, Business Standard,
December 2014
<u><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">http</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">://</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">www</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">.</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">business</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">-</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">standard</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">.</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">com</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">/</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">article</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">/</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">companies</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">/</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">xiaomi</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">-</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">bets</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">-</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">big</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">-</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">on</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">-</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">india</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">-</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">despite</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">-</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">problems</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">-114122201023_1.</a><a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html">html</a></u></p>
</div>
<div id="sdfootnote27">
<p>
<a class="sdfootnotesym" name="sdfootnote27sym" href="#sdfootnote27anc">27</a>
Neha
Alawadi, Ruling on data flow between EU & US may impact India’s
IT sector, Economic Times,October 7, 2015
<a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">http</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">://</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">economictimes</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">.</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">indiatimes</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">.</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">com</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">/</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">articleshow</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">/49250738.</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">cms</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">?</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">utm</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">_</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">source</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">=</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">contentofinterest</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">&</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">utm</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">_</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">medium</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">=</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">text</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">&</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">utm</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">_</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">campaign</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">=</a><a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">cppst</a></p>
</div>
<div id="sdfootnote28">
<p>
<a class="sdfootnotesym" name="sdfootnote28sym" href="#sdfootnote28anc">28</a>
Pranav Menon, Data Protection Laws in India and Data Security-
Impact on India and Data Security-Impact on India - EU Free Trade
Agreement, CIS Access to Knowledge, 2011
<u><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">http</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">://</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">cis</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">-</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">india</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">.</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">org</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">/</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">a</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">2</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">k</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">/</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">blogs</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">/</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">data</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">-</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">security</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">-</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">laws</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">-</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">india</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">.</a><a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf">pdf</a></u></p>
</div>
<div id="sdfootnote29">
<p>
<a class="sdfootnotesym" name="sdfootnote29sym" href="#sdfootnote29anc">29</a>
Surendra
Kumar Sinha, India wants Mutual Legal Assistance treaty with
Bangladesh, Economic Times, October 7, 2015
h<u><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">ttp</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">://</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">economictimes</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">.</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">indiatimes</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">.</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">com</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">/</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">articleshow</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">/49262294.</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">cms</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">?</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">utm</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">_</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">source</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">=</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">contentofinterest</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">&</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">utm</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">_</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">medium</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">=</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">text</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">&</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">utm</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">_</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">campaign</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">=</a><a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">cppst</a></u></p>
</div>
<div id="sdfootnote30">
<p>
<a class="sdfootnotesym" name="sdfootnote30sym" href="#sdfootnote30anc">30</a>
Pablo
Chavez, Director, Public Policy and Government Affairs, Testifying
before the U.S. Senate on transparency legislation, November 3,
2013
<u><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">http</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">://</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">googlepublicpolicy</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">.</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">blogspot</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">.</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">in</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">/2013/11/</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">testifying</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">-</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">before</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">-</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">us</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">-</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">senate</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">-</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">on</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">.</a><a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html">htm</a></u> </p>
</div>
<div id="sdfootnote31">
<p>
<a class="sdfootnotesym" name="sdfootnote31sym" href="#sdfootnote31anc">31</a>
Report
of the Group of Experts on Privacy (Chaired by Justice A P Shah,
Former Chief Justice, Delhi High Court), Planning Commission,
October 2012
<u><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">http</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">://</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">planningcommission</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">.</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">nic</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">.</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">in</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">/</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">reports</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">/</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">genrep</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">/</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">rep</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">_</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">privacy</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">.</a><a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">pdf</a></u></p>
<p align="justify"> </p>
</div>
<div id="sdfootnote31">
<p align="justify"> </p>
</div>
<div id="sdfootnote30"> </div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india'>https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india</a>
</p>
No publisherjyotiAccess to KnowledgeDigital EconomyPublic AccountabilityPrivacyPlatform ResponsibilityData ProtectionAccountabilityDigital SecurityDigital IndiaInternet Governance2015-10-14T14:40:08ZBlog EntrySurvey of Estimates of Economic Value of Open Government Data
https://cis-india.org/openness/survey-of-estimates-of-economic-value-of-open-government-data
<b>This is a survey of estimates of economic value of open government data, and public sector information in general, across regions, countries, and sectors offered by several reports published during the last decade. The survey is undertaken by Ömer Faruk Sarı, a student of Business Administration at Koc University in Istanbul, Turkey, and research intern with CIS. </b>
<p> </p>
<h2>Introduction</h2>
<p>This is a survey of economic value estimates of open government data, and public sector information in general, by consultancy groups and government bodies across the world. The first part of the post lists estimates from different regions and countries, while the second part collects estimates for different sectors. Major reports surveyed in this study include the 'MEPSIR: Measuring European Public Sector Information Resources' report (2006), 'The Value of Spatial Information' report by ACIL Tasman (2008), 'Review of Recent Studies on PSI Re-Use and Related Market Developments' report by Graham Vickery (2012), 'Market Assessment of Public Sector Information' report by Deloitte (2013), 'Open Data: Unlocking Innovation and Performance with Liquid Information' by McKinsey (2013), 'Big and Open Data in Europe: A Growth Engine or a Missed Opportunity?' by Warsaw Institute for Economic Studies (2014), and 'Open for Business: How Open Data can Help Achieve the G20 Growth Target' report by Omidyar Network (2014).</p>
<p><strong>Note about Exchange Rate:</strong>The monetary values stated in these reports vary by years and currencies. The original estimates are mentioned in the currency concerned followed by the converted amount in US Dollar (using exchange rate of the same year) provided within brackets. The exchange rates concerned are mentioned at the bottom of the post.</p>
<p> </p>
<h2>Countries and Regions</h2>
<h3>Global</h3>
<p>McKinsey estimates global economic value of open data as USD 3.2 Trillion for seven sectors - Education, Transportation, Consumer Products, Electricity, Oil and Gas, Healthcare, and Consumer Finance. [1]</p>
<h3>European Union</h3>
<p>Pira International Ltd. et al, in 2000, estimated the monetary value of open data for EU countries as EUR 68 Billion (USD 76 Billion). [2]</p>
<p>Zangenberg and Company, estimated this number for EU countries as for minimum EUR 29 Billion (USD 38 Billion) and for an upper limit of EUR 143 Billion (USD 188 Billion). [3]</p>
<p>The Warsaw Institute for Economic Studies (WISE Institute) estimates the economic value of open data in EU, as increase in GDP by 2020, as EUR 206 Billion (USD 253 Billion). [4]</p>
<p>Graham Vickery estimated this number as EUR 200 Billion (USD 264 Billion) in 2012. [5]</p>
<p>In 2006, MEPSIR, in their report for European Commission, mentioned EUR 27 Billion (USD 36 Billion) could be gained by use of open data. [6]</p>
<p>McKinsey, in their report in 2013, estimated the monetary value of open data for EU countries as USD 900 Billion. [1]</p>
<iframe src="http://ajantriks.github.io/cis/charts/2015.08_open-data-value-eu/index.html" frameborder="0" height="300" width="700"></iframe>
<h3>G20</h3>
<p>For G20 countries taken together, Omidyar Network estimates the economic value of open data as USD 2.6 Trillion. [7]</p>
<h3>Australia</h3>
<p>Omidyar Network, in their study on business value of open data, estimated the potential of open data for Australia as AUD 3.4 Billion (USD 2.8 Billion). [7]</p>
<p>In 2008, ACIL Tasman estimated the potential economic value of open data for Australia as AUD 1.4 Billion (USD 938 Million). [8]</p>
<p>John Houghton's estimation for the monetary value of open data is AUD 195 Million (USD 197 Million). [9]</p>
<h3>Denmark</h3>
<p>Zangenberg and Company, in 2011, estimated the economic value of open data for Denmark as DKK 520 Million (USD 92 Million). [3]</p>
<h3>France</h3>
<p>SerdaLAB, in 2009, estimated EUR 1.57 Billion (USD 2.3 Billion) can be gained by open data in France. [10]</p>
<h3>Germany</h3>
<p>In 2011, Dr, Martin Fornefeld et al estimated the economic value of open data for Germany as EUR 1.7 Billion (USD 2.2 Billion), only for geo-information. [11]</p>
<p>The POPSIS study estimated this number as EUR 3.2 Million (USD 4.2 Million), in the same year, 2011. [12]</p>
<h3>Norway</h3>
<p>Graham Vickery's report mentions the potential value of open data as NOK 260 Million (USD 43 Million). [5]</p>
<h3>Spain</h3>
<p>The Proyecto Aporta (Spanish open data portal project) study estimated the economic value of the infomediary sector in Spain as EUR 330-550 Million (USD 452-753 Million), in 2012. [13]</p>
<h3>The Netherlands</h3>
<p>In 2011, the POPSIS study estimated the economic potential that can be gained from open data in Netherlands as EUR 78 Million (USD 102 Million). [12]</p>
<h3>United Kingdom</h3>
<p>Deloitte, in their report, estimated the value of open data as GBP 6.2-7.2 Billion (USD 10-11.8 Billion) for United Kingdom. [14]</p>
<p>Rufus Pollock, in 2011, estimated GBP 4.5-6 Billion (USD 7-9.3 Billion) that can be unlocked by use of open data. [15]</p>
<p>Dot-Econ's estimation for monetary value of open data in United Kingdom is EUR 590 Million (USD 778 Million). [16]</p>
<h3>United States</h3>
<p>McKinsey's estimation, in 2013, for the value that can be unlocked by open data in United States is quite remarkable at USD 1.1 Trillion. [1]</p>
<p>Pira International Ltd. et al, in 2000, estimated the value as EUR 750 Billion (USD 838 Billion). [2]</p>
<p> </p>
<h2>Data Types and Sectors</h2>
<h3>Consumer Finance</h3>
<p>McKinsey estimates USD 210-280 Billion, globally, for the consumer finance sector. [1]</p>
<p><strong>Based on McKinsey's Report:</strong> The estimate for G20 countries is USD 169 Billion; for Australia, the estimate is AUD 4.2 Billion (USD 4.3 Billion).</p>
<h3>Consumer Products</h3>
<p>Across the globe, with the use of open data McKinsey estimates USD 520-1470 Billion can be generated from services of consumer products. [1]</p>
<p><strong>Based on McKinsey's Report:</strong> G20 countries, in total, have a potential value of USD 419 Billion for this sector; the value is estimated at AUD 10 Billion (USD 10.2 Billion) for Australia.</p>
<h3>Education</h3>
<p>McKinsey estimates that USD 890-1180 Billion can be generated alone in education sector, across the globe. [1]</p>
<p><strong>Based on McKinsey's Report:</strong> Open data in the education sector in G20 countries can generate USD 717 Billion; for Australia, value of open data in education sector is estimated to be AUD 14 Billion (USD 14.2 Billion).</p>
<h3>Electricity</h3>
<p>McKinsey estimates USD 340-580 Billion, across the globe. [1]</p>
<p><strong>Based on McKinsey's Report:</strong> For electricity sector, USD 193 Billion is estimated for G20 countries; estimate for Australia for electricity sector depending on open data is AUD 6.7 Billion (USD 6.8 Billion).</p>
<h3>Geospatial Data</h3>
<p>Dr. Nam D. Pham estimates the potential value of Geo-spatial information in US as USD 96 Billion. [17]</p>
<p>In the report by Pira International Limited et al, the economic value of geo-spatial information in EU estimated as EUR 36 Billion (USD 40 Billion). [2]</p>
<p>Fornefeld et al estimates the value of geo-spatial information in Germany as EUR 1.7 Billion (USD 2.2 Billion). [11]</p>
<p>The POPSIS study estimates the economic value of Meteorological data re-use market in Netherlands as EUR 10 Million (USD 13 Million). [12]</p>
<p>Graham Vickery estimates (in 2012) NOK 72 Million (USD 12 Million) can be generated in Norway through geo-spatial information. [5]</p>
<p>The Proyecto Aporta study estimates potential value of geo-spatial information in Spain as EUR 183 Million (USD 240 Million). [13]</p>
<p>ACIL Tasman in their report, estimated that as a direct result of the uptake of spatial technologies New Zealand’s real GDP increased by NZD 1.2 Billion (USD 670 Million) in 2008 through productivity-related gains as a result of the increasing adoption of modern spatial information technologies since 1995. [8]</p>
<p>In the United Kingdom, a 'supply-side' assessment estimated the market size and growth potential for geographic information (GI) products and services. The market size in year 2007 was estimated to be GBP 657 Million (USD 1.32 Billion). [18]</p>
<p>Based on PwC's study in 2010, John Houghton estimates the value of spatial data in Australia as AUD 25 Million (USD 25.3 Million). [9]</p>
<p>Ordnance Survey of UK estimates the economic value of open data published by the same agency as GBP 2.9-6.1 Million (USD 4.5-9.5 Million). [19]</p>
<iframe src="http://ajantriks.github.io/cis/charts/2015.08_open-geo-data-value/index.html" frameborder="0" height="400" width="700"></iframe>
<h3>Healthcare</h3>
<p>Globally, USD 300-450 Billion is the estimate of McKinsey, depending on open data use in healthcare sector.[1]</p>
<p><strong>Based on McKinsey's Report:</strong> Open data in the healthcare sector can generate USD 242 Billion for G20 countries; estimate for Australia is AUD 5.9 Billion (USD 6 Billion).</p>
<h3>Oil and Gas</h3>
<p>McKinsey estimates USD 240-510 Billion that can be generated through open data for the oil and gas sector, across the globe. [1]</p>
<p><strong>Based on McKinsey's Report:</strong> Oil and gas sector, with the use of open data, can generate USD 169 Billion for G20 countries; the value for Australia is estimated to generate AUD 4.8 Billion (USD 4.9 Billion).</p>
<h3>Transportation</h3>
<p>McKinsey estimates the value of transportation sector with the use of open data as USD 720-920 Billion for the transportation sector, globally. [1]</p>
<p><strong>Based on McKinsey's Report:</strong> G20 countries altogether can generate USD 580 Billion in transportation sector; estimate of the value of open data in the transportation sector in Australia is AUD 18 Billion (USD 18.2 Billion).</p>
<p> </p>
<h2>Reference</h2>
<p>[1] Manyika, James, et al. 2013. Open Data: Unlocking Innovation and Performance with Liquid Information. McKinsey Global Institute. October. Accessed from <a href="http://www.mckinsey.com/insights/business_technology/open_data_unlocking_innovation_and_performance_with_liquid_information">http://www.mckinsey.com/insights/business_technology/open_data_unlocking_innovation_and_performance_with_liquid_information</a>.</p>
<p>[2] Pira International Ltd. et al. 2000. Commercial exploitation of Europe’s Public Sector Information - Executive Summary. European Commission, Brussels. Aceeseed from <a href="ftp://ftp.cordis.europa.eu/pub/econtent/docs/2000_1558_en.pdf">ftp://ftp.cordis.europa.eu/pub/econtent/docs/2000_1558_en.pdf</a>.</p>
<p>[3] Zangenberg and Company. 2011, Kvantificering af værdien af åbne offentlige data (Quantifying the Value of Open Government Data). Report Prepared for the Danish National Information Technology and Telecom Agency. Accessed from <a href="https://digitaliser.dk/resource/1021067/artefact/Kvantificering+af+den+erhvervsm%c3%a6ssige+v%c3%a6rdi+af+%c3%a5bne+offentlige+data+-+Zangenberg2011.pdf">https://digitaliser.dk/resource/1021067/artefact/Kvantificering+af+den+erhvervsm%c3%a6ssige+v%c3%a6rdi+af+%c3%a5bne+offentlige+data+-+Zangenberg2011.pdf</a>.</p>
<p>[4] Buchholtz, Sonia, et al. 2014. Big and Open Data in Europe: A Growth Engine or a Missed Opportunity? demosEUROPA – Centre for European Strategy and Warsaw Institute for Economic Studies. Accessed from <a href="http://www.bigopendata.eu/wp-content/uploads/2014/01/bod_europe_2020_full_report_singlepage.pdf">http://www.bigopendata.eu/wp-content/uploads/2014/01/bod_europe_2020_full_report_singlepage.pdf</a>.</p>
<p>[5] Vickery, Graham. 2012. Review of Recent Studies on PSI Re-Use and Related Market Developments. European Commission, Brussels. Accessed form <a href="http://ec.europa.eu/information_society/newsroom/cf//document.cfm?doc_id=1093">http://ec.europa.eu/information_society/newsroom/cf//document.cfm?doc_id=1093</a>.</p>
<p>[6] Dekkers, Makx, et al. 2006. MEPSIR: Measuring European Public Sector Information Resources - Final Report of Study on Exploitation of Public Sector Information – Benchmarking of EU Framework Conditions. European Commission, Brussels. Accessed from <a href="http://ec.europa.eu/information_society/newsroom/cf/document.cfm?doc_id=1198">http://ec.europa.eu/information_society/newsroom/cf/document.cfm?doc_id=1198</a>.</p>
<p>[7] Lateral Economics. 2014. Open for Business: How Open Data can Help Achieve the G20 Growth Target. Omidyar Network. June. Accessed from <a href="https://www.omidyar.com/sites/default/files/file_archive/insights/ON%20Report_061114_FNL.pdf">https://www.omidyar.com/sites/default/files/file_archive/insights/ON%20Report_061114_FNL.pdf</a>.</p>
<p>[8] ACIL Tasman. 2008. The Value of Spatial Information: The Impact of Modern Spatial Information
Technologies on the Australian Economy. March. Accessed from <a href="http://www.crcsi.com.au/assets/Resources/7d60411d-0ab9-45be-8d48-ef8dab5abd4a.pdf">http://www.crcsi.com.au/assets/Resources/7d60411d-0ab9-45be-8d48-ef8dab5abd4a.pdf</a>.</p>
<p>[9] Houghton, John. 2011. Costs and Benefits of Data Provision. Report to the Australian National Data Service. September. Accessed from <a href="http://www.ands.org.au/resource/houghton-cost-benefit-study.pdf">http://www.ands.org.au/resource/houghton-cost-benefit-study.pdf</a>.</p>
<p>[10] Guerre, Louise, et al. 2009. Le marché de l’information électronique professionnelle en France. SerdaLAB. Presentation at CCIP on January 27. Accessed from <a href="http://www.fnps.fr/Public/Article/File/DOCUMENTS/Presentation_ET_IEP09_270109.pdf">http://www.fnps.fr/Public/Article/File/DOCUMENTS/Presentation_ET_IEP09_270109.pdf</a>.</p>
<p>[11] Fornefeld, Martin, et al. 2011. Die europäische Gesetzgebung als Motor für das deutsche GeoBusiness (European Legislation as a Driver for German GeoBusiness). Accessed from <a href="http://www.micus.de/pdf/MICUS_GeoBusiness-BMWi.pdf">http://www.micus.de/pdf/MICUS_GeoBusiness-BMWi.pdf</a>.</p>
<p>[12] Citadel Consulting et al. 2011. POPSIS: Pricing Of Public Sector Information Study - Models of Supply and Charging for Public Sector Information (ABC) - Final Report. European Commission. October. Accessed from <a href="http://ec.europa.eu/newsroom/dae/document.cfm?doc_id=1158">http://ec.europa.eu/newsroom/dae/document.cfm?doc_id=1158</a>.</p>
<p>[13] Ministry of Finance and Public Administration et al. 2012. Characterization Study of the Infomediary Sector. Proyecto Aporta. Accessed from <a href="http://datos.gob.es/sites/default/files/files/Estudio_infomediario/121001%20RED%20007%20Final%20Report_2012%20Edition_vF_en.pdf">http://datos.gob.es/sites/default/files/files/Estudio_infomediario/121001%20RED%20007%20Final%20Report_2012%20Edition_vF_en.pdf</a>.</p>
<p>[14] Deloitte. 2013. Market Assessment of Public Sector Information. Report to the Department for Business, Innovation and Skills, Government of UK. Accessed from <a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/198905/bis-13-743-market-assessment-of-public-sector-information.pdf">https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/198905/bis-13-743-market-assessment-of-public-sector-information.pdf</a>.</p>
<p>[15] Pollock, Rufus. 2010. Welfare Gains from Opening up Public Sector Information in the UK. University of Cambridge. Accessed from <a href="http://rufuspollock.org/economics/papers/psi_openness_gains.pdf">http://rufuspollock.org/economics/papers/psi_openness_gains.pdf</a>.</p>
<p>[16] DotEcon. 2006. The Commercial Use of Public Information (CUPI). Report OFT861. Office of Fair Trading, Government of UK. Accessed from <a href="http://www.opsi.gov.uk/advice/poi/oft-cupi.pdf">http://www.opsi.gov.uk/advice/poi/oft-cupi.pdf</a>.</p>
<p>[17] Pham, Nam D. 2011. The Economic Benefits of Commercial GPS Use in the U.S. and the Costs of Potential Disruption. June. Accessed from <a href="http://www.gpsalliance.org/docs/GPS_Report_June_21_2011.pdf">http://www.gpsalliance.org/docs/GPS_Report_June_21_2011.pdf</a>.</p>
<p>[18] Coote, Andrew, and Les Rackham. 2008. An Assessment of the Size and Prospects for Growth of the UK Market for Geographic Information Products and Services. ConsultingWhere. Accessed from <a href="http://www.consultingwhere.com/wp-content/uploads/resources/UK_Market_Assessment_v11_Final.pdf">http://www.consultingwhere.com/wp-content/uploads/resources/UK_Market_Assessment_v11_Final.pdf</a>.</p>
<p>[19] Carpenter, John, and Phil Watts. 2013. Assessing the Value of OS OpenData™ to the Economy of Great Britain - Synopsis. Ordnance Survey. June. Accessed from <a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/207692/bis-13-950-assessing-value-of-opendata-to-economy-of-great-britain.pdf">https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/207692/bis-13-950-assessing-value-of-opendata-to-economy-of-great-britain.pdf</a>.</p>
<p> </p>
<h2>Exchange Rates</h2>
<p>Note: Exchange rates are taken for December of the year concerned.</p>
<table>
<tbody>
<tr>
<th>Euro per 1 US Dollar</th>
</tr>
<tr>
<td>2000</td>
<td>0.8947</td>
</tr>
<tr>
<td>2006</td>
<td>0.7580</td>
</tr>
<tr>
<td>2009</td>
<td>0.6868</td>
</tr>
<tr>
<td>2010</td>
<td>0.7562</td>
</tr>
<tr>
<td>2011</td>
<td>0.7599</td>
</tr>
<tr>
<td>2013</td>
<td>0.7296</td>
</tr>
<tr>
<td>2014</td>
<td>0.8123</td>
</tr>
<tr>
<th>British Pound per 1 US Dollar</th>
</tr>
<tr>
<td>2006</td>
<td>0.5095</td>
</tr>
<tr>
<td>2011</td>
<td>0.6415</td>
</tr>
<tr>
<td>2013</td>
<td>0.6106</td>
</tr>
<tr>
<td>2014</td>
<td>0.6397</td>
</tr>
<tr>
<th>Australian Dollar per 1 US Dollar</th>
</tr>
<tr>
<td>2008</td>
<td>1.4919</td>
</tr>
<tr>
<td>2011</td>
<td>0.9874</td>
</tr>
<tr>
<td>2014</td>
<td>1.2144</td>
</tr>
<tr>
<th>New Zealand Dollar per 1 US Dollar</th>
</tr>
<tr>
<td>2008</td>
<td>1.7923</td>
</tr>
<tr>
<th>Norwegian Krone per 1 US Dollar</th>
</tr>
<tr>
<td>2010</td>
<td>5.9774</td>
</tr>
<tr>
<th>Danish Krone per 1 US Dollar</th>
</tr>
<tr>
<td>2011</td>
<td>5.6495</td>
</tr>
</tbody>
</table>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/openness/survey-of-estimates-of-economic-value-of-open-government-data'>https://cis-india.org/openness/survey-of-estimates-of-economic-value-of-open-government-data</a>
</p>
No publisherÖmer Faruk SarıOpen Government DataDigital EconomyOpen DataEconomicsOpenness2015-08-22T08:42:30ZBlog Entry