<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/rethinking-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/information-influx-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/identity-and-databases"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table-chennai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-policy-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you">
    <title>Big Brother is watching you</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you</link>
    <description>
        &lt;b&gt;India has no requirements of transparency whether in the form of disclosing the quantum of interception or in the form of notification to people whose communication was intercepted.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article by Chinmayi Arun was &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/big-brother-is-watching-you/article5530857.ece"&gt;published in the Hindu&lt;/a&gt; on January 3, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Gujarat telephone tapping controversy is just one of  many kinds of abuse that surveillance systems enable. If a relatively  primitive surveillance system can be misused so flagrantly despite  safeguards that the government claims are adequate, imagine what is to  come with the Central Monitoring System (CMS) and Netra in place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;News  reports indicate Netra — a “NEtwork TRaffic Analysis system” — will  intercept and examine communication over the Internet for keywords like  “attack,” “bomb,” “blast” or “kill.” While phone tapping and the CMS  monitor specific targets, Netra is vast and indiscriminate. It appears  to be the Indian government’s first attempt at mass surveillance rather  than surveillance of predetermined targets. It will scan tweets, status  updates, emails, chat transcripts and even voice traffic over the  Internet (including from platforms like Skype and Google Talk) in  addition to scanning blogs and more public parts of the Internet.  Whistle-blower Edward Snowden said of mass-surveillance dragnets that  “they were never about terrorism: they’re about economic spying, social  control, and diplomatic manipulation. They’re about power.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;So  far, our jurisprudence has dealt with only targeted surveillance; and  even that in a woefully inadequate manner. This article discusses the  slow evolution of the right to privacy in India, highlighting the  context and manner in which it is protected. It then discusses  international jurisprudence to demonstrate how the right to privacy  might be protected more effectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and the Constitution&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A  proposal to include the right to privacy in the Constitution was  rejected by the Constituent Assembly with very little debate.  Separately, a proposal to give citizens an explicit fundamental right  against unreasonable governmental search and seizure was also put before  the Constituent Assembly. This proposal was supported by Dr. B.R.  Ambedkar. If accepted, it would have included within our Constitution  the principles from which the United States derives its protection  against state surveillance. However, the proposed amendment was rejected  by the Constituent Assembly.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Fortunately, the  Supreme Court has gradually been reading the right to privacy into the  fundamental rights explicitly listed in the Constitution. After its  initial reluctance to affirm the right to privacy in the 1954 case of &lt;i&gt;M.P. Sharma vs. Satish Chandra, &lt;/i&gt;the  court came around to the view that other rights and liberties  guaranteed in the Constitution would be seriously affected if the right  to privacy was not protected. In &lt;i&gt;Kharak Singh vs. The State of U.P., &lt;/i&gt;the  court recognised “the right of the people to be secure in their  persons, houses, papers, and effects” and declared that their right  against unreasonable searches and seizures was not to be violated. The  right to privacy here was conceived around the home, and unauthorised  intrusions into homes were seen as interference with the right to  personal liberty.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If the &lt;i&gt;Kharak Singh &lt;/i&gt;judgment  was progressive in its recognition of the right to privacy, it was  conservative about the circumstances in which the right applies. The  majority of judges held that shadowing a person could not be seen to  interfere with that person’s liberty. Dissenting with the majority,  Justice Subba Rao maintained that broad surveillance powers put innocent  citizens at risk, and that the right to privacy is an integral part of  personal liberty. He recognised that when a person is shadowed, her  movements will be constricted, and will certainly not be free movements.  His dissenting judgment showed remarkable foresight and his reasoning  is consistent with what is now a universally acknowledged principle that  there is a “chilling effect” on expression and action when people think  that they are being watched.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The right to privacy as defined by the Supreme Court now extends beyond government intrusion into private homes. After &lt;i&gt;Govind vs. State of M.P.&lt;/i&gt;, and &lt;i&gt;Dist. Registrar and Collector of Hyderabad vs. Canara Bank&lt;/i&gt;,  this right is seen to protect persons and not places. Any inroads into  this right for surveillance of communication must be for permissible  reasons and according to just, fair and reasonable procedure. State  action in violation of this procedure is open to a constitutional  challenge.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Our meagre procedural safeguards against phone tapping were introduced in &lt;i&gt;PUCL vs. Union of India &lt;/i&gt;(1997)  after the Supreme Court was confronted with extensive, undocumented  phone tapping by the government. The apex court found itself compelled  to lay down what it saw as bare minimum safeguards, consisting mostly of  proper record-keeping and internal executive oversight by senior  officers such as the home secretary, the cabinet secretary, the law  secretary and the telecommunications secretary. These safeguards are of  little use since they are opaque and rely solely on members of the  executive to review surveillance requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Right and safeguards&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There  is a difference between targeted surveillance in which reasons have to  be given for surveillance of particular people, and the  mass-surveillance which Netra sets up. The question of mass surveillance  and its attendant safeguards has been considered by the European Court  of Human Rights in &lt;i&gt;Liberty and Others vs. the United Kingdom&lt;/i&gt;.  Drawing upon its own past jurisprudence, the European Court insisted on  reasonable procedural safeguards. It stated quite clearly that there are  significant risks of arbitrariness when executive power is exercised in  secret and that the law should be sufficiently clear to give citizens  an adequate indication of the circumstances in which interception might  take place. Additionally, the extent of discretion conferred and the  manner of its exercise must be clear enough to protect individuals from  arbitrary interference. The principles laid down by the European Court  in relation to phone-tapping also require that the nature of the  offences which may give rise to an interception order, the procedure to  be followed for examining, using and storing the data obtained, the  precautions to be taken when communicating the data to other parties,  and the circumstances in which recordings may or must be erased or the  tapes destroyed be made clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;b&gt;Opaque and ineffective&lt;/b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Our  safeguards apply only to targeted surveillance, and require written  requests to be provided and reviewed before telephone tapping or  Internet interception is carried out. CMS makes the process of tapping  more prone to misuse by the state, by making it even more opaque: if the  state can intercept communication directly, without making requests to a  private telecommunication service provider, then it is one less layer  of scrutiny through which the abuse of power can reach the public. There  is no one to ask whether the requisite paperwork is in place or to  notice a dramatic increase in interception requests.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;India  has no requirements of transparency whether in the form of disclosing  the quantum of interception taking place each year, or in the form of  subsequent notification to people whose communication was intercepted.  It does not even have external oversight in the form of an independent  regulatory body or the judiciary to ensure that no abuse of surveillance  systems takes place. Given these structural flaws, the Amit Shah  controversy is just the beginning of what is to come. Unfettered mass  surveillance does not bode well for democracy.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;(Chinmayi  Arun is research director, Centre for Communication Governance,  National Law University, Delhi, and fellow, Centre for Internet and  Society, Bangalore.)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you'&gt;https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-06T09:31:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability">
    <title>UK’s Interception of Communications Commissioner — A Model of Accountability</title>
    <link>https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability</link>
    <description>
        &lt;b&gt;The United Kingdom maintains sophisticated electronic surveillance operations through a number of government agencies, ranging from military intelligence organizations to police departments to tax collection agencies. However, all of this surveillance is governed by one set of national laws outlining specifically what surveillance agencies can and cannot do.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The primary law that governs government investigations is the Regulation of Investigatory Powers Act 2000, abbreviated as RIPA 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To ensure that this law is being followed and surveillance operations in the United Kingdom are not conducted illegally, the RIPA 2000 Part I establishes an Interception of Communications Commissioner, who is tasked with inspecting the surveillance operations, assessing their legality, and compiling an annual &lt;a href="http://www.iocco-uk.info/docs/2013%20Annual%20Report%20of%20the%20IOCC%20Accessible%20Version.pdf"&gt;report&lt;/a&gt; to for the Prime Minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On April 8, 2014 the current Commissioner, Rt Hon. Sir Anthony May, laid the 2013 annual report before the House of Commons and the Scottish Parliament. In its introduction, the report notes that it is responding to concerns raised as a result of Edward Snowden’s actions, especially misuse of powers by intelligence agencies and invasion of privacy. The report also acknowledges that the laws governing surveillance, and particularly RIPA 2000, are difficult for the average citizen to understand, so the report includes a narrative outline of relevant provisions in an attempt to make the legislation clear and accessible. However, the report points out that while the Commissioner had complete access to any documents or investigative records necessary to construct the report, the Commissioner was unable to publish surveillance details indiscriminately, due to confidentiality concerns in a report being issued to the public. (It is worth noting here that though the Commissioner is one man, he has an entire agency working under him, so it is possible that he himself did not do or write all of that the report attributes to him). As a whole, the report outlines a series of thorough audits of surveillance operations, and reveals that the overwhelming majority of surveillance in the UK is conducted entirely legally, and that the small minority of incorrectly conducted surveillance appears to be unintentional. Looking beyond the borders of the United Kingdom, the report represents a powerful model of a government initiative to ensure transparency in surveillance efforts across the globe.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Role of the Commissioner&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The report begins in the first person, by outlining the role of the Commissioner. May’s role, he writes, is primarily to audit the interception of data, both to satisfy his own curiosity and to prepare a report for the Prime Minister. Thus, his primary responsibility is to review the lawfulness of surveillance actions, and to that end, his organization possesses considerable investigative powers. He is also tasked with ensuring that prisons are legally administrated, though he makes this duty an afterthought in his report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Everyone associated with surveillance or interception in the government must disclose whatever the commissioner asks for. In short, he seems well equipped to carry out his work. The Commissioner has a budget of £1,101,000, almost all of which, £948,000 is dedicated to staff salaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report directly addresses questions about the Commissioner’s ability to carry out his duties. Does the Commissioner have full access to whatever materials or data it needs to conduct its investigations, the report asks, and it answers bluntly, yes. It is likely, the report concludes, that the Commissioner also has sufficient resources to adequately carry out his duties. Yes, the Commissioner is fully independent from other government interests; the commissioner answers his own question. Finally, the report asks if the Commissioner should be more open in his reports to the public about surveillance, and he responds that the sensitivity of the material prohibits him from disclosing more, but that the report adequately addresses public concern regardless. There is a degree to which this question and answer routine seems self-congratulatory, but it is good to see that the Commissioner is considering these questions as he carries out his duties.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Interception of Communications&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The report first goes into detail about the Commissioner’s audits of communications interception operations, where interception means wiretapping or reading the actual content of text messages, emails, or other communications, as opposed to the metadata associated with communications, such as timestamps and numbers contacted. In this section, the report outlines the steps necessary to conduct an interception, outlining that an interception requires a warrant, and only a Secretary of State (one of five officials) can authorize an interception warrant. Moreover, the only people who can apply for such warrants are the directors of various intelligence, police, and revenue agencies. In practice, the Secretaries of State have senior staff that read warrant applications and present those they deem worthy to the Secretary for his or her signature, as their personal signature is required for authorization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a warrant to be granted, it must meet a number of criteria. First, interception warrants must be &lt;i&gt;necessary&lt;/i&gt; in the interests of national security, to prevent or detect serious crime, or to safeguard economic wellbeing of the UK. Additionally, a warrant can be granted if it is necessary for similar reasons in other countries with mutual assistance agreements with the UK. Warrants must be &lt;i&gt;proportionate &lt;/i&gt;to the ends sought. Finally, interception warrants for communications inside the UK must specify either a person or a location where the interception will take place. Warrants for communications outside of the UK require no such specificity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2013, 2760 interception warrants were authorized, 19% fewer warrants than in 2012. The Commissioner inspected 26 different agencies and examined 600 different warrants throughout 2013. He gave inspected agencies a report on his findings after each inspection, so they could see whether or not they were following the law. He concluded that the agencies that undertake interception “do so lawfully, conscientiously, effectively, and in our national interest.” Thus, all warrants adequately meet the application and authorization requirements outlined in RIPA 2000.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Communications Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The report goes on to discuss communications data collection, where communications data refers to metadata–not the content of the communications itself, but data associated with it, such as call durations, or a list of email recipients. The Commissioner explains that metadata is easier to obtain than an interception warrant. Designated officials in their respective surveillance organization read and grant metadata warrant applications, instead of one of the Secretaries of State who could grant interception warrants. Additionally, the requirements for a metadata warrant are looser than for interception warrants. Metadata warrants must still be necessary, but necessary for a broader range of causes, ranging from collecting taxes, protecting public health, or for &lt;i&gt;any&lt;/i&gt; purpose specified by a Secretary of State.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The relative ease of obtaining a metadata warrant is consistent with a higher number of warrants approved. In 2013, 514,608 metadata warrants were authorized, down from 570,135 in 2012. Local law enforcement applied for 87.5% of those warrants while intelligence agencies accounted for 11.5%. Only a small minority of requests was sent from the revenue office or other departments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The purposes of these warrants were similarly concentrated. 76.9% of metadata warrants were issued for prevention or detection of crime. Protecting national security justified 11.4% of warrants and another 11.4% of warrants were issued to prevent death or injury. 0.2% of warrants were to identify people who had died or otherwise couldn’t identify themselves, 0.11% of warrants were issued to protect the economic wellbeing of the United Kingdom, and 0.02% of warrants were associated with tax collection. The Commissioner identified less than 0.01% of warrants as being issued in a miscarriage of justice, a very low proportion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Commissioner inspected metadata surveillance efforts, conducting 75 inspections in 2013, and classified the practices of those operations inspected as good, fair or poor. 4% of operations had poor practices. He noticed two primary errors. The first was that data was occasionally requested on an incorrect communications address, and the second was that he could not verify that some metadata was not being stored past its useful lifetime. May highlighted that RIPA 2000 does not give concrete lengths for which data should be stored, as Section 15(3) states only that data must be deleted “as soon as there are no longer grounds for retaining it as necessary for any of the authorized purposes.”  He noted that he was only concerned because some metadata was being stored for longer periods than associated interception data. As May put it, “I have yet to satisfy myself fully that some of these periods are justified and in those cases I required the agencies to shorten their retention periods or, if not, provide me with more persuasive reasons.” The Commissioner seems determined that this practice will either be eliminated or better justified to him in the near future.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Indian Applications&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The United Kingdom’s Interception of Communications Commissioner has similar powers to the Indian Privacy Commissioner suggested by the &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report&lt;/a&gt; of the Group of Experts on Privacy.  Similar to the United Kingdom, it is recommended that a Privacy Commissioner in India have investigative powers in the execution of its charter, and that the Privacy Commissioner represent citizen interests, ensuring that data controllers are in line with the stipulated regulations. The Report also broadly states that “with respect to interception/access, audio &amp;amp; video recordings, the use of personal identifiers, and the use of bodily or genetic material, the Commissioner may exercise broad oversight functions.”  In this way, the Report touches upon the need for oversight of surveillance, and suggests that this responsibility may be undertaken by the Privacy Commissioner, but does not clearly place this responsibility with the Privacy Commissioner. This raises the question of if India should adopt a similar model to the United Kingdom – and create a privacy commissioner – responsible primarily for overseeing and enforcing data protection standards, and a separate surveillance commissioner – responsible for overseeing and enforcing standards relating to surveillance measures. When evaluating the different approaches there are a number of considerations that should be kept in mind:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Law enforcement and security agencies are the exception to a number of data protection standards including access and disclosure.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There is a higher level of ‘sensitivity’ around issues relating to surveillance than data protection and each needs to be handled differently. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ‘competence’ required to deliberate on issues related to data protection is different then the ‘competence’ required deliberating on issues related to surveillance.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Additionally, this raises the question of whether India needs a separate regulation governing data protection and a separate regulation governing surveillance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Allegations of Wrongdoing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is worth noting that though May describes surveillance operations conducted in compliance with the law, many other organizations have accused the UK government of abusing their powers and spying on citizens and internet users in illegal ways. The GCHQ, the government’s communications surveillance center has come under particular fire. The organization has been accused indiscriminate spying and introducing malware into citizen’s computers, among other things. Led by the NGO Privacy International, internet service providers around the world have &lt;a href="http://www.theguardian.com/world/2014/jul/02/isp-gchq-mass-surveillance-privacy-court-claim"&gt;recently&lt;/a&gt; lodged complaints against the GCHQ, alleging that it uses malicious software to break into their networks. Many of these &lt;a href="http://www.theguardian.com/uk-news/2014/may/13/gchq-spy-malware-programme-legal-challenge-privacy-international"&gt;complaints&lt;/a&gt; are based on the information brought to light in Edward Snowden’s document leaks. Privacy International alleges that malware distributed by GCHQ enables access to any stored content, logging keystrokes and “the covert and unauthorized photography or recording of the user and those around him,” which they claim is similar to physically searching through someone’s house unbeknownst to them and without permission. They also accuse GCHQ malware of leaving devices open to attacks by others, such as identity thieves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Snowden’s files also indicate a high level of collaboration between GCHQ and the NSA. According to the &lt;a href="http://www.theguardian.com/uk-news/2013/aug/02/gchq-accused-selling-services-nsa"&gt;Guardian&lt;/a&gt;, which analyzed and reported on many of the Snowden files, the NSA has in past years paid GCHQ to conduct surveillance operations through the US program called Prism. Leaked documents &lt;a href="http://www.theguardian.com/uk-news/2013/aug/02/gchq-accused-selling-services-nsa"&gt;report&lt;/a&gt; that the British intelligence agency used Prism to generate 197 intelligence reports in the year to May 2012. Prism is not mentioned at all in the Interception of Communications Commissioner’s report. In fact, while the report’s introduction explains that it will attempt to address details revealed in Snowden’s leaked documents, very little of what those documents indicate is later referenced in the report. May ignores the plethora of accusations of GCHQ wrongdoing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, while May’s tone appears genuine and sincere, the details of his report do little to dispel fears of widespread surveillance. It is unclear whether May is being totally forthcoming in his report, especially when he devotes so little energy to directly responding to concerns raised by Snowden’s leaks.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;May wrapped up his report with some reflections on the state of surveillance in the United Kingdom. He concluded that RIPA 2000 protects consumers in an internet age, though small incursions are imaginable, and especially lauds the law for it’s technological neutrality. That is, RIPA 2000 is a strong law because it deals with surveillance in general and not with any specific technologies like telephones or Facebook, use of which changes over time. The Commissioner also was satisfied that powers were not being misused in the United Kingdom. He reported that there have been a small number of unintentional errors, he noted, and some confusion about the duration of data retention. However, any data storage mistakes seemed to stem from an unspecific law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite May’s report of surveillance run by the books, other UK groups have accused GCHQ, the government’s communications surveillance center, of indiscriminate spying and introducing malware into citizen’s computers. &lt;a href="https://www.privacyinternational.org/press-releases/privacy-international-files-legal-challenge-against-uk-government-over-mass"&gt;Privacy International has submitted a claim arguing that a litany of malware is employed by the GCHQ to log detailed personal data such as keystrokes.&lt;/a&gt; The fact that May’s report does little to disprove these claims casts the Commissioner in an uncertain light.  It is unclear whether surveillance is being conducted illegally or, as the report suggests, all surveillance of citizens is being conducted as authorized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, the concept of a transparency report and audit of a nation’s surveillance initiatives report is a step towards government accountability done right, and should serve as a model for enforcement methods in other nations. May’s practice of giving feedback to the organizations he inspects allows them to improve, and the public report he releases serves as a deterrent to illegal surveillance activity. The Interception of Communications Commissioner–provided he reports truthfully and accurately–is what gives the safeguards built into the UK’s interception regime strength and accountability. In other nations looking to establish privacy protections, a similar role would make their surveillance provisions balanced with safeguards and accountability to ensure that the citizens fundamental rights–including the right to privacy–are not compromised.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability'&gt;https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>joe</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-24T06:08:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/rethinking-privacy">
    <title>Rethinking Privacy: The Link between Florida v. Jardines and the Surveillance of Nature Films</title>
    <link>https://cis-india.org/news/rethinking-privacy</link>
    <description>
        &lt;b&gt;Bhairav Acharya gave a talk on "Rethinking Privacy" at an event organized by the Indian Institute of Technology, Madras (IIT-M) on July 11, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In a 2010 article in Continuum: Journal of Media &amp;amp; Cultural Studies, Brett Mills proposed that animals have a right to privacy and that wildlife documentaries, specifically BBC's Nature's Great Events (2009), invaded this right without an examination of animal conservation ethics. In the 2013 &lt;i&gt;Florida v. Jardines&lt;/i&gt; decision, the Supreme Court of the United States re-examined the constitutional validity of 'dog sniff laws' that permitted police animals to enter the threshold of private property to conduct 'minimally invasive warant-less searches' and 'Terry stops'; this was the latest in a long line of Fourth Amendment cases that examine the ethics of conserving and protecting public order. I attempt to draw links between the two scenarios that highlight the dissonance between sociological and jurisprudential constructions of privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/rethinking-privacy'&gt;https://cis-india.org/news/rethinking-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-28T05:51:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/information-influx-conference">
    <title>Information Influx Conference</title>
    <link>https://cis-india.org/news/information-influx-conference</link>
    <description>
        &lt;b&gt;Malavika Jayaram was a speaker at the event organized by the Institute for Information Law, University of Amsterdam from July 2 to 4, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Click to read the &lt;a class="external-link" href="http://informationinflux.org/wp-content/uploads/2014/05/20140530_Programme_InformationInflux_flyer.pdf"&gt;full details here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;When IViR set up its research 25 years ago, the digital transition was just starting to gather speed. Since then, our societies have been undergoing enormous changes in the modes of expression, organization and (re)use of information. Traditional roles of producers, intermediaries, users and governments blur and are recast. Information is the central building block of market economies. New ways of creating, disseminating and using it impact the workings of democracy, of science and education, creativity and culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information Influx will bridge disciplines, regions and institutional perspectives to confront the major challenges of developing the rules that govern the expression, organization and re(use) of information in our society – as the central aspects of IViR’s Research Programme.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Wednesday 2 July&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13.00 – 16.30&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information Influx Young Scholars Competition:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13.00 – 15.00&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Welcome by Prof. &lt;b&gt;Mireille van Eechoud&lt;/b&gt; &amp;amp; 	&lt;b&gt;Dr. L. Guibault&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Catherine Doldirina&lt;/b&gt; (Joint Research Centre 	EC) – Open data and Earth observations: the case of opening access 	to and use of EO through the Global Earth Observation System of 	Systems&lt;br /&gt;Comments by &lt;b&gt;Prof. Mark Perry&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Jenny Metzdorf&lt;/b&gt; (University of Luxembourg) – 	The implementation of the Audiovisual Media Services Directive by 	national regulatory authorities – National reponses to regulatory 	challenges&lt;br /&gt;Comments by&lt;b&gt; Dr. Tarlach McGonagle&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Harry Halpin&lt;/b&gt; (MIT/W3C) – No Safe Haven: 	The Storage of Data Secrets&lt;br /&gt;Comments by &lt;b&gt;Dr. Philippe 	Aigrain&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15.00 – 15.15&lt;/b&gt;&lt;br /&gt;Refreshments break&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15.15 – 16.30&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Ellen Wauters&lt;/b&gt; (ICRI – University of 	Leuven) – Social Networking Sites’ Terms of Use: addressing 	imbalances in the user-provider relationship through ex ante and ex 	post mechanisms&lt;br /&gt;Comments by &lt;b&gt;Dr. Chantal Mak&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Nicolo Zingales&lt;/b&gt; (Tilburg University) – 	Virtues and perils of anonymity: should intermediaries bear the 	burden?&lt;br /&gt;Comments by &lt;b&gt;Prof. Joel Reidenberg&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Closing remarks&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17.00 – 18.30&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;p&gt;Information Influx public opening:&lt;/p&gt;
&lt;li&gt;
&lt;p&gt;Welcome &lt;b&gt;Louise Gunning-Schepers&lt;/b&gt; (University of Amsterdam), &lt;b&gt;Edgar du Perron&lt;/b&gt; (University of 	Amsterdam) and &lt;b&gt;Bernt Hugenholtz&lt;/b&gt; (Institute for Information 	Law)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Keynote&lt;/b&gt; – 	Degrees of Freedom: Sketches of a political theory for an age of 	deep uncertainty and persistent imperfection – &lt;b&gt;prof. Yochai 	Benkler&lt;/b&gt; (Harvard Law School)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Young Scholars Award ceremony&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Speech by&lt;/b&gt; &lt;b&gt;Neelie Kroes&lt;/b&gt; (Vice-President of the European Commission) – &lt;a href="http://europa.eu/rapid/press-release_SPEECH-14-528_en.htm" target="_blank"&gt;Our 	Single Market is Crying out for Copyright Reform!&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;19.00 – 22.00&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;IViR 25th birthday soirée – by invitation&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Thursday 3 July&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9.00 – 10.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Keynote – Governance, Function and Form – prof. Deirdre Mulligan (University of California, Berkeley)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As data and technology to wield it become pervasive, privacy protection must take new forms. Traditional models of governance centered on state actors, and human oversight do not scale to today’s challenges. Drawing from several research projects Mulligan suggests that focusing on roles and functions, rather than traditional forms and actors, can assist us in leveraging the potential of a range of human and technical actors towards privacy’s protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10.30 – 12.30&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parallel sessions:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel1"&gt;Rights 	in the mix&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel2"&gt;Behavioural 	targeting – If you cannot control it, ban it?&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel3"&gt;Tomorrow’s 	news: bright, mutualized and open?&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel4"&gt;Filtering away 	Infringement: copyright, Injunctions and the role of ISPs&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12.30 – 13.45&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lunch&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13.45 – 14.30&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Julian Oliver &amp;amp; Danja Vasiliev&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14.30 – 16.30&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parallel sessions:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel5"&gt;Mass-digitization 	and the conundrum of online access&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel6"&gt;The 	algorithmic public: towards a normative framework for automated 	media&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel7"&gt;Accountability 	and the public sector data push&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel8"&gt;A new 	governance model for communications security?&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17.00 – 18.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Keynote – Copyright as Innovation Policy – Fred von Lohmann (Google)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Copyright has historically been concerned with encouraging commercial cultural production. Thanks to digital technology, however, copyright law today finds itself called upon to take on additional unfamiliar roles, including fostering technological innovation and encouraging amateur creative expression. The talk will suggest some ways that copyright can successfully grow into these new roles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;19.00 – 22.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Conference Dinner&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Friday 4 July&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9.00 – 10.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Keynote – Datafication, dataism and dataveillance – prof. José van Dijck (University of Amsterdam)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The popularization of datafication as a neutral paradigm is carried by a widespread belief  and supported by institutional guardians of trust. That notion of trust becomes problematic when it leads to dataveillance by a number of institutions that handle people’s (meta)data. The interlocking of government, business, and academia in the adaptation of this ideology (“dataism”) prompts us to look more critically at the entire ecosystem of connective media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10.30 – 12.30&lt;/b&gt;&lt;br /&gt;Parallel sessions:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel9"&gt;Global 	information flows and the nation state&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel10"&gt;United 	in diversity – the future of the public mission&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel11"&gt;Legalizing 	file-sharing: an idea whose time has come – or gone?&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12.30 – 14.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Buffet Lunch, plus: Brown bag lunch with &lt;b&gt;Rob Frieden&lt;/b&gt; – Net Neutrality: One step beyond&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14.00 – 15.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Keynote – Intellectual Property: Two Pasts and A Future – prof. James Boyle (Duke Law School)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twenty years from now, will our children look up from their digital devices and ask “Daddy, did anyone ever own a book”? In his keynote speech, James Boyle will trace the past lives of intellectual property, the battles fought, the technologies regulated. Can we find hints of the future in the battles of our past? Boyle’s answer is yes, and that answer should give us pause.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15.30 – 17.30&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parallel sessions:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel12"&gt;Assembly 	(Information.influx)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel13"&gt;Big 	brother is back&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel14"&gt;Who owns the 	World Cup? The case for and against property rights in sports events&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17.30 – 18.30&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Farewell drinks&lt;/p&gt;
&lt;h2 class="western" style="text-align: justify; "&gt;Parallel sessions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rights in the mix&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among amateur and professional creators alike there is a manifest need to not only share but also remix existing works. The panel discusses how adequately open content licensing systems support these needs. It also looks to how well this licensing system fits in the wider legal framework.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Séverine 	Dusollier (University of Namur) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Paul Keller (Kennisland)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Daniel Gervais (Vanderbilt 	Law School)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Volker Grassmuck (Lüneburg University)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Behavioural targeting – If you cannot control it, ban it?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion about the potential pitfalls of behavioural targeting practices and the problems it may create for users and user rights continues in full force. The growing evidence of the ineffectiveness of the existing informed-consent-approach to regulation can no longer be ignored. Is it time for the regulator to move to more drastic means and ban certain behavioural targeting practices, and if so, which practices?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Chris Hoofnagle (University 	of California, Berkeley) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Neil Richards (Washington 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Frederik Borgesius (Institute for 	Information Law)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Joseph Turow (University of 	Pennsylvania)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Mireille Hildebrandt 	(University of Nijmegen)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Tal Zarsky (University of Haifa)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Tomorrow’s news: bright, mutualized and open? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As public debate becomes more diversified, crowded, interactive, noisy and technology-dependent than ever before, what survival strategies are being devised for the news as we know it? Are existing expressive and communicative rights, and related duties and responsibilities, fit-for-purpose in increasingly digitized and networked democratic societies? Will tomorrow’s news still be worth tuning into?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;dr. Tarlach McGonagle (Institute 	for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Susanne Nikoltchev (European 	Audiovisual Observatory)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Aidan White (Ethical Journalism 	Network)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Luís Santos (University of 	Minho)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Eugenia Siapera (Dublin City 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Gillian Phillips (The Guardian)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Filtering away infringement: copyright, injunctions and the role of ISPs&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Can technology solve the problem of intermediary liability for online copyright infringement? If so, should technology be allowed to determine law? This panel shall focus on the issue of injunctions imposed on online intermediaries to force them to adopt measures that filter or block copyright infringements by third parties on their websites.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Bernt Hugenholtz (Institute 	for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Dirk Visser (University of 	Leiden)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Remy Chavannes (Brinkhof)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Fred von Lohmann (Google)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Sir Richard Arnold (High Court UK)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Niva Elkin-Koren (University 	of Haifa)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Reto Hilty (Max Planck Institute)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mass-digitization and the conundrum of online access&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cultural heritage institutions face difficulties providing online access to digitized materials in their collections. This session examines a number of pressing issues, taking a trans-Atlantic perspective.  When does digitization in public-private partnerships pose a threat to access to public domain materials? What ways are there to manage rights clearance of copyrighted materials and deal with territoriality?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Martin Senftleben (VU 	University Amsterdam) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Pamela Samuelson (University 	of California, Berkeley)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Elisabeth Niggemann (Deutsche 	Nationalbibliothek)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Martin Kretschmer (Glasgow University)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The algorithmic public: towards a normative framework for automated media&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the online media, decisions about what users get to see (or not to see) are increasingly automated, through the use of smart algorithms and extensive data about users’ preferences and online behaviour. This raises a number of fundamental questions about freedom of expression, editorial integrity and user autonomy. Leading thinkers will debate algorithmic decision-making in online media and explore the contours of a much needed normative framework for automated media.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Natali Helberger (Institute 	for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Joris van Hoboken (New York 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Wolfgang Schulz 	(Hans-Bredow-Institut)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Niva Elkin-Koren (University 	of Haifa)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Bernhard Rieder (University of Amsterdam)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Accountability and the public sector data push&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initiatives to make governments more ‘transparent’ abound. Freedom of information laws are reconfigured to push out ever more information to citizens and businesses. Promises of benefits abound too: better accountability and increased participation, as well as efficiency gains and new business opportunities. Can and should the next generation of freedom of information laws serve both political-democratic objectives and economic ones?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Mireille van Eechoud 	(Institute for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Chris Taggart (Open Corporates)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Helen Darbishire (Access Info)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Deirdre Curtin (University 	of Amsterdam)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Ben Worthy (Birkbeck 	University College London)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Jonathan Gray (Open Knowledge Foundation / University of 	London)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A new governance model for communications security?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today, the vulnerable state of electronic communications security dominates headlines across the globe, while money and power increasingly permeate the policy arena. 2013 has seen no less than five sweeping legislative initiatives in the E.U., while the U.S. seems to trust in the market to deliver. Amidst these diverging approaches, how should communications security be regulated?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Axel Arnbak (Institute for 	Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Deirdre Mulligan (University 	of California, Berkeley)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Ian Brown (Oxford 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Michel van Eeten (Delft 	university of technology)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Amelia Andersdotter (European 	Parliament)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Ashkan Soltani (independent researcher)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Global information flows and the nation state&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information flows contest the physical spaces in which the nation state has been deemed a sovereign for almost five centuries. This tension dominates nearly all areas of information law, from data protection and IP enforcement to mass surveillance by national intelligence agencies. This session reflects on the broader challenges that territoriality presents for information law today.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Urs Gasser (Harvard) 	(moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Joel Reidenberg (Fordham Law 	School)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Graeme Dinwoodie (Oxford 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Malavika Jayaram (Harvard)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Hielke Hijmans (Vrije Universiteit Brussel)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;United in diversity – the future of the public mission&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digital technologies and the information economy create fascinating new opportunities but also pose fundamental challenges to the fulfilment of the public mission of the media, public archives and libraries alike. This panel is a step towards establishing a dialogue between the three institutions: to explore the congruence between their missions, and their responses to critical issues such as technological convergence, the changing habits of users, the growing abundance of content and their relationship to new information intermediaries, such as search engines, social networks or content platforms.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Natali Helberger (Institute 	for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Klaus Schönbach (University 	of Vienna)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Frank Huysmans (University 	of Amsterdam)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Egbert Dommering (Institute 	for Information Law)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Maarten Brinkerink (Netherlands 	Institute for Sound and Vision)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Richard Burnley (European Broadcasting Union)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legalizing file-sharing: an idea whose time has come – or gone?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alternative compensation systems are designed to legalize and monetize online copyright restricted acts of distributing and consuming content. Empirical evidence shows that end-users strongly support paying flat-rate fees for the ability to legally download and share content. So what prevents us from introducing such schemes? The group of experts convened debates the future of alternative compensation systems in light of current legal, business and technology trends.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Bernt Hugenholtz (Institute 	for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Neil Netanel (University of 	California, Los Angeles)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Alexander Peukert 	(University of Frankfurt)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Philippe Aigrain (Quadrature 	du Net)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Séverine Dusollier (University of Namur)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Assembly (Information influx)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking legal cases and controversies involving intellectual property, art collective Agency composes a growing list of “Things” that resist the split between “nature” and “culture”, a split that intellectual property relies upon. From the list of over a 1,000 Things, Agency calls forth Thing 002094, the copyright controversy Être et Avoir, to jointly speculate upon. The purpose is less to re-enact the judgment and more to prolong hesitation.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Agency&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Severine Dusollier&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Wilco Kalff&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Sanne Rovers&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Margot van de Linde&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Arnisa Zeqo&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Big brother is back&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate about the pervasive surveillance of the online environment is roaring. Considering what we know now, what better metaphor is there than to conclude that we live in the world of Big Brother? This session will bring together leading thinkers and doers related to power and control in the communication environment, who will provide critical input on the way we think and speak about information freedom and control. Should we aspire to tame Big Brother or should we think differently about the problem?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Axel Arnbak (Institute for 	Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Joris van Hoboken (New York 	University) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;John McGrath (National Theatre of 	Wales)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Seda Gürses (New York 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Hans de Zwart (Bits of Freedom)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Who owns the World Cup? The case for and against property rights in sports events&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sports have important economic, social and cultural dimensions. What is the optimal form of legal protection of sports events considering the public-private nature of sports? The focus of debate will be on football because of its major relevance in Europe in terms of diffusion, commercial exploitation, and social impact; but we can expect many insights to hold true for other sports as well.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Bernt Hugenholtz (Institute 	for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Lionel Bently (University of 	Cambridge)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Dirk Voorhoof (Ghent 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Peter Jaszi (American 	University Washington)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Graeme Dinwoodie (Oxford 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Egbert Dommering (Institute 	for Information Law)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Alan Bairner (Loughborough University)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 class="western" style="text-align: justify; "&gt;Associated events&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Invitation only&lt;/b&gt;:&lt;br /&gt;Wednesday 2 July: Big Breakfast with &lt;b&gt;Joseph Turow&lt;/b&gt; &amp;amp; &lt;b&gt;Tal Zarksy&lt;/b&gt; – Ethical, normative, social and cultural implications of profiling &amp;amp; targeting in an era of big data – towards a research agenda, Institute for Information Law (IViR) &amp;amp; Amsterdam School of Communication Research (ASCoR), East India House, room E0.02, 09.00-12.00 a.m.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Public event:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Friday 4 July: Lecture &lt;b&gt;James Boyle&lt;/b&gt; &amp;amp; &lt;b&gt;Marjan Hammersma about cultural heritage and the public domain&lt;br /&gt;&lt;/b&gt;More information and registration at:&lt;br /&gt;&lt;a href="https://news.rijksmuseum.nl/2/3fde87960331d4d6027365f23775a21213f3b7240794a3874320c261e5164567e2c4a28236f2500097115073023" target="_blank"&gt;Cultural heritage institutions as guardians of public domain works in the digital environment&lt;/a&gt;, Rijksmuseum &amp;amp; Kennisland in cooperation with IViR, Rijksmuseum Auditorium, 18.00-20.00 p.m.&lt;/p&gt;
&lt;h2 class="western" style="text-align: justify; "&gt;About IViR&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Institute for Information Law (IViR) is a centre of excellence in academic research which consistently seeks to further our understanding of how legal norms reflect and shape the creation, dissemination and use of information in our societies. That is the ambition at the heart of the many research initiatives IVIR has undertaken since its foundation in 1989. The urgency of taking an interdisciplinary and international approach has only grown in the past decades. It is crucial if we want to understand and evaluate the rapidly evolving complex and myriad legal norms that govern information relations in markets, in social and in political spaces. With over &lt;a href="http://www.ivir.nl/staff/overview.html" target="_blank"&gt;30 researchers, teachers and support staff&lt;/a&gt; based in our &lt;a href="http://www.ivir.nl/about.html" target="_blank"&gt;offices &lt;/a&gt;in the historic centre of Amsterdam, we have the critical mass to broach key regulatory challenges of today’s information society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our focus on information relations deliberately cuts across traditional boundaries in legal scholarship. We bring together insights from constitutional law, human rights, public administration, intellectual property, contract and property law, and competition law. Our functional approach enables fruitful collaboration with experts from an array of academic disciplines, in information and communications technology, economics, media studies, political science and the arts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Continuing a long Dutch tradition of openness towards the world, our work has a strong international orientation. It shows in the topics we study, the strong global network of affiliations we have in academia and the wonderful dynamic mix of upcoming and experienced researchers from all over Europe and beyond that make up IViR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With each consecutive research programme we prioritize legal developments that fascinate us, and translate them into a variety of research projects. This includes doctoral research, research for policymakers at national, European and international level, and projects funded through national and European research grant programmes. Our current research programme and an overview of research projects can be found &lt;a href="http://www.ivir.nl/research/overview.html" target="_blank"&gt;here&lt;/a&gt;. Doctoral dissertations, journal articles, books, case comments, studies, reports, lectures, debates, workshops, conferences and summer schools are the staple means of communicating what we do. Browse our publications &lt;a href="http://www.ivir.nl/publications/overview.html" target="_blank"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media reports and conference outputs will be posted on the &lt;a href="http://www.ivir.nl/influx.html" target="_blank"&gt;IViR website&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/information-influx-conference'&gt;https://cis-india.org/news/information-influx-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-28T06:31:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/identity-and-databases">
    <title>Identity and Databases</title>
    <link>https://cis-india.org/events/identity-and-databases</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) and the Say No to UID Campaign invite you to a discussion identity,  databases and facilitating technologies that explores the use of personal identifiers across databases and the potential violations of privacy on August 9, 2014 (10.30 a.m. to 1.00 p.m.) at the CIS office in Bangalore.&lt;/b&gt;
        &lt;p&gt;The discussions will specifically focus on the UID and the NPR and seek to answer:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;What information is being collected and databased by each scheme?&lt;/li&gt;
&lt;li&gt;What type of technology is needed to collect and database this information? &lt;/li&gt;
&lt;li&gt;How and where is this information being databased? &lt;/li&gt;
&lt;li&gt;What are the potential risks to the databasing of this information? &lt;/li&gt;
&lt;li&gt;Are there legal safeguards protecting against misuse of this information, and if not, what safeguards are needed? &lt;/li&gt;
&lt;li&gt;Is there a difference between the state collecting, storing, and using this information and a private entity? &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/identity-and-databases'&gt;https://cis-india.org/events/identity-and-databases&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-07T08:32:16Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications">
    <title>Learning to Forget the ECJ's Decision on the Right to be Forgotten and its Implications</title>
    <link>https://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications</link>
    <description>
        &lt;b&gt;“The internet never forgets” is a proposition which is equally threatening and promising.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The phrase reflects the dichotomy presented by the extension on     the lease of public memory granted by the internet – as information is more accessible and more permanent, letting go of the past is becoming increasingly     difficult. The question of how to govern information on the internet – a space which is growing increasingly important in society and also one that     presents a unique social environment - is one that persistently challenges courts and policy makers. A recent decision by the European Court of Justice,     the highest judicial authority of the European Union, perfectly encapsulates the way the evolution of the internet is constantly changing our conceptions of individual privacy and the realm of information. On the 13&lt;sup&gt;th&lt;/sup&gt; of May, 2014, the ECJ in its ruling in    &lt;i&gt;Google v Costeja,&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;b&gt;[1]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt;effectively read a “right to be forgotten” into existing EU     data protection law. The right, broadly, provides that an individual may be allowed to control the information available about them on the web by removing     such information in certain situations - known as the right to erasure. In certain situations such a right is non-controversial, for example, the deletion     of a social media profile by its user. However, the right to erasure has serious implications for the freedom of information on the internet when it     extends to the removal of information not created by the person to whom it pertains.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy and Perfect Memory&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The internet has, in a short span, become the biggest and arguably the most important tool for communication on the planet. However, a peculiar and     essential feature of the internet is that it acts as a repository and a reflection of public memory – usually, whatever is once made public and shared on     the internet remains available for access across the world without an expiry date. From public information on social networks to comments on blog posts,     home addresses, telephone numbers and candid photos, personal information is disseminated all across the internet, perpetually ready for access - and often     without the possibility of correcting or deleting what was divulged. This aspect of the internet means that the internet is a now an ever-growing     repository of personal data, indexed and permanently filed. This unlimited capacity for information has a profound impact on society and in shaping social     relations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The core of the internet lies in its openness and accessibility and the ability to share information with ease – most any information to any person is now     a Google search away. The openness of information on the internet prevents history from being corrupted, facts from being manipulated and encourages     unprecedented freedom of information. However, these virtues often become a peril when considering the vast amount of personal data that the internet now     holds. This “perfect memory” of the internet means that people are perpetually under the risk of being constantly scrutinized and being tied to their     pasts, specifically a generation of users that from their childhood have been active on the internet.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Consider the example of online criminal databases in the United States, which regularly and permanently upload criminal records of convicted offenders even     after their release, which is accessible to all future employers;&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; or the example of the Canadian psychotherapist who was permanently banned from the United States after an internet search revealed that he had experimented with LSD in his past;    &lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; or the cases of “revenge porn” websites, which (in most cases legally) publically host deeply private photos or videos of persons, often with their personal information, for the specific purpose of causing them deep embarrassment.    &lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These examples show that, due to the radically unrestricted spread of personal data across the web, people are no longer able to control how and by whom     and in what context their personal data is being viewed. This creates the vulnerability of the data collectively being “mined” for purposes of surveillance     and also of individuals being unable to control the way personal data is revealed online and therefore lose autonomy over that information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Right to be Forgotten and the ECJ judgement in &lt;i&gt;Costeja&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The problems highlighted above were the considerations for the European Union data protection regulation, drafted in 2012, which specifically provides for     a right to be forgotten, as well as the judgement of the European Court of Justice in &lt;i&gt;Google Spain v Mario Costeja Gonzalves. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petitioner in this case, sought for the removal of links related to attachment proceedings for his property, which showed up upon entering his name on     Google’s search engine. After refusing to remove the links, he approached the Spanish Data Protection Agency (the AEPD) to order their removal. The AEPD     accepted the complaints against Google Inc. and ordered the removal of the links. On appeal to the Spanish High Court, three questions were referred to the     European Court of Justice. The first related to the applicability of the data protection directive (Directive 95/46/EC) to search engines, i.e. whether     they could be said to be “processing personal data” under Article 2(a) and (b) of the directive,&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; and     whether they can be considered data controllers as per Section 2(d) of the directive. The court found that, because the search engines retrieve, record and     organize data, and make it available for viewing (as a list of results), they can be said to process data. Further, interpreting the definition of “data     controller” broadly, the court found that ‘     &lt;i&gt; It is the search engine operator which determines the purposes and means of that activity and thus of the processing of personal data that it itself         carries out within the framework of that activity and which must, consequently, be regarded as the ‘controller’ &lt;/i&gt; ’&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; and that ‘     &lt;i&gt; it is undisputed that that activity of search engines plays a decisive role in the overall dissemination of those data in that it renders the latter         accessible to any internet user making a search on the basis of the data subject’s name, including to internet users who otherwise would not have found         the web page on which those data are published.’&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;b&gt;[8]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt; The latter reasoning highlights the particular role of search engines, as indexers of data, in increasing the accessibility and visibility of data from     multiple sources, lending to the “database” effect, which could allow the structured profiling of an individual, and therefore justifies imposing the same     (and even higher) obligations on search engines as on other data controllers, notwithstanding that the search engine operator has no knowledge of the     personal data which it is processing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second question relates to the territorial scope of the directions, i.e. whether Google Inc., being the parent company based out of the US, came within     the court’s jurisdiction – which only applies to member states of the EU. The court held that even though it did not carry on the specific activity of     processing personal data, Google Spain, being a subsidiary of Google Inc. which promotes and sells advertisement for the parent company, was an     “establishment” in the EU and Google Inc., and, because it processed data “in the context of the activities” of the establishment specifically directed     towards the inhabitants of a member state (here Spain), came under the scope of the EU law. The court also reaffirmed a broad interpretation of the data protection law in the interests of the fundamental right to privacy and therefore imputed policy considerations in interpreting the directive.    &lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third question was whether Google Spain was in breach of the data protection directive, specifically Articles 12(b) and 14(1)(a), which state that a     data subject may object to the processing of data by a data controller, and may enforce such a right against the data controller, as long as the conditions     for their removal are met. The reasoning for enforcing such a claim against search engines in particular can be found in paragraphs 80 and 84 of the     judgement, where the court holds that     &lt;i&gt; “(a search engine) enables any internet user to obtain through the list of results a structured overview of the information relating to that individual         that can be found on the internet — information which potentially concerns a vast number of aspects of his private life and which, without the search         engine, could not have been interconnected or could have been only with great difficulty — and thereby to establish a more or less detailed profile of         him.” &lt;/i&gt; and that “     &lt;i&gt; Given the ease with which information published on a website can be replicated on other sites and the fact that the persons responsible for its         publication are not always subject to European Union legislation, effective and complete protection of data users could not be achieved if the latter         had to obtain first or in parallel the erasure of the information relating to them from the publishers of websites.” &lt;/i&gt; In fact, the court seems to apply a higher threshold for search engines due to their peculiar nature as indexes and databases.    &lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the court’s conception of the right of erasure, search engines are mandated to remove content upon request by individuals, when the information is     deemed to be personal data that is “     &lt;i&gt; inadequate, irrelevant or excessive in relation to the purposes of the processing, that they are not kept up to date, or that they are kept for longer than is necessary unless they are required to be kept for historical, statistical or scientific purposes,”        &lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;b&gt;[11]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt; notwithstanding that the publication itself is lawful and causes no prejudice to the data subject. The court reasoned that when the data being projected     qualified on any of the above grounds, it would violate Article 6 of the directive, on grounds of the data not being processed “     &lt;i&gt; fairly and lawfully’, that they are ‘collected for specified, explicit and legitimate purposes and not further processed in a way incompatible with         those purposes’, that they are ‘adequate, relevant and not excessive in relation to the purposes for which they are collected and/or further         processed’, that they are ‘accurate and, where necessary, kept up to date’ and, finally, that they are ‘kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the data were collected or for which they are further processed’.”        &lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;b&gt;[12]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt; Therefore, the court held that, due to the nature of the information, the data subject has a right to no longer have such information linked to his or her     name on a list of results following a search made on their name. The grounds laid down by the court, i.e. relevancy, inadequacy, etc. are very broad, yet     such a broad conception is necessary in order to effectively deal with the problems of the nature described above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The judgement of the ECJ concludes by applying a balancing test between the rights of the data subject and both the economic rights of the data controller     as well as the general right of the public to information. It states that generally, as long as the information meets the criteria laid down by the     directive, the right of the data subject trumps both these rights. However, it adds an important caveat – such a right is inapplicable “     &lt;i&gt; the in specific cases, on the nature of the information in question and its sensitivity for the data subject’s private life and on the interest of the         public in having that information, an interest which may vary, in particular, according to the role played by the data subject in public life.” &lt;/i&gt; This crucial point on the balancing of two rights directly hit by the judgement was only summarily dealt with by the ECJ, without effectively giving any clarity as to what standards to apply or laying down any specific guidelines for the application of the new rule.    &lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; Doing so, it effectively left the decision to determine what was in the public interest and how the     rights are to be balanced to the search engines themselves. Delegating such a task to a private party takes away from the idea of the internet as a common     resource which should be developed for the benefit of the larger internet community as a whole, by allowing it to be governed and controlled by private     stakeholders, and therefore paves an uncertain path for this crucial aspect of internet governance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Implications of the ECJ ruling&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The decision has far reaching consequences on both privacy and on freedom of information on the internet. Google began implementing the decision through a     form submission process, which requires the individual to specify which links to remove and why, and verifies that the request comes from the individual     themselves via photo identification, and has also constituted an expert panel to oversee its implementation (similar to the process for removing links     which infringe copyright law).&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Google has since received more than 91,000 requests for removal,     pertaining to 328,000 links of which it has approved more than half.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; In light of such large volumes of     data to process, the practical implementation of the ruling has been necessarily problematic. The implementation has been criticized both for implicating     free speech on the internet as well as disregarding the spirit of the right to be forgotten. On the first count, Google has been criticized for taking down     several links which are clearly are in public interest to be public, including several opinion pieces on politicians and corporate leaders, which amounts     to censorship of a free press.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; On the second count, EU privacy watchdogs have been critical of Google’s     decision to notify sources of the removed content, which prompts further speculation on the issue, and secondly, privacy regulators have challenged     Google’s claim that the decision is restricted to the localised versions of the websites, since the same content can be accessed through any other version     of the search engine, for example, by switching over to “Google.com”.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This second question also raises complicated questions about the standards for free speech and privacy which should apply on the internet. If the EU wishes     for Google Inc. to remove all links from all versions of its search engine, it is, in essence, applying the balancing test of privacy and free speech which     are peculiar to the EU (which evolved from a specific historical and social context, and from laws emerging out of the EU) across the entire world, and is     radically different from the standard applicable in the USA or India, for example. In spirit, therefore, although the judgement seeks to protect individual     privacy, the vagueness of the ruling and the lack of guidelines has had enormous negative implications for the freedom of information. In light of these     problems, the uproar that has been caused in the two months since the decision is expected, especially amongst news media sites which are most affected by     this ruling. However, the faulty application of the ruling does not necessarily mean that a right to be forgotten is a concept which should be buried.     Proposed solutions such as archiving of data or limited restrictions, instead of erasure may be of some help in maintaining a balance between the two     rights.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; EU regulators hope to end the confusion through drafting comprehensive guidelines for the search engines, pursuant to meetings with various stakeholders, which should come out by the end of the year.    &lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; Until then, the confusion will most likely continue.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Is there a Right to be Forgotten in India?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Indian law is notorious for its lackadaisical approach towards both freedom of information and privacy on the internet. The law, mostly governed by the     Information Technology Act, is vague and broad, and the essence of most laws is controlled by the rules enacted by non-legislative bodies pursuant to     various sections of the Act. The “right to be forgotten” in India can probably be found within this framework, specifically under Rule 3(2) of the     Intermediary Guideline Rules, 2011, under Section 79 of the IT Act. Under this rule, intermediaries are liable for content which is “invasive of another’s     privacy”. Read with the broad definition of intermediaries under the same rules (which includes search engines specifically) and of “affected person”, the     applicable law for takedown of online content is much more broad and vague than the standard laid down in &lt;i&gt;Costeja. &lt;/i&gt;It remains to be seen whether     the EU’s interpretation of privacy and the “right to be forgotten” would further the chilling effect caused by these rules.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; &lt;i&gt;Google Spain v Mario Costeja Gonzalves, &lt;/i&gt; C‑131/12,             &lt;i&gt; Available at                 http://curia.europa.eu/juris/document/document.jsf?text=&amp;amp;docid=152065&amp;amp;pageIndex=0&amp;amp;doclang=en&amp;amp;mode=req&amp;amp;dir=&amp;amp;occ=first&amp;amp;part=1&amp;amp;cid=264438. &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;i&gt;See &lt;/i&gt; Victor Mayer-Schonberger, Delete: The Virtue of Forgetting in the Digital Age, (Princeton, 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; For example, &lt;i&gt;See &lt;/i&gt; http://mugshots.com/; and http://www.peoplesearchpro.com/resources/background-check/criminal-records/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; LSD as Therapy? Write about It, Get Barred from US, (April, 2007) &lt;i&gt;available at&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;http://thetyee.ca/News/2007/04/23/Feldmar/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;i&gt;It’s nearly impossible to get revenge porn of the internet, &lt;/i&gt; (June, 2014), &lt;i&gt;available t &lt;/i&gt;http://www.vox.com/2014/6/25/5841510/its-nearly-impossible-to-get-revenge-porn-off-the-internet&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Article 2(a) -             &lt;i&gt; “personal data” shall mean any information relating to an identified or identifiable natural person (“data subject”); an identifiable person is                 one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to                 his physical, physiological, mental, economic, cultural or social identity; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Article 2(b) - “             &lt;i&gt; processing of personal data” (“processing”) shall mean any operation or set of operations which is performed upon personal data, whether or not                 by automatic means, such as collection, recording, organisation, storage, adaptation or alteration, retrieval, consultation, use, disclosure by                 transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction; &lt;/i&gt; &lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; ¶36, judgment.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; The court also recognizes the implications on data profiling through the actions of search engines organizing results in ¶37.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; ¶74 judgment.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; In ¶83, the court notes that the processing by a search engine affect the data subject &lt;i&gt;additionally &lt;/i&gt;to publication on a webpage; ¶87            &lt;i&gt;- &lt;/i&gt; &lt;i&gt; Indeed, since the inclusion in the list of results, displayed following a search made on the basis of a person’s name, of a web page and of the                 information contained on it relating to that person makes access to that information appreciably easier for any internet user making a search                 in respect of the person concerned and may play a decisive role in the dissemination of that information, it is liable to constitute a more                 significant interference with the data subject’s fundamental right to privacy than the publication on the web page. &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; ¶92, judgment.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; ¶72, judgment.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; ¶81, judgment.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; The form is available at https://support.google.com/legal/contact/lr_eudpa?product=websearch&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; &lt;i&gt;Is Google intentionally overreacting on the right to be forgotten? &lt;/i&gt; (June, 2014), &lt;i&gt;available at &lt;/i&gt;http://www.pcpro.co.uk/news/389602/is-google-intentionally-overreacting-on-right-to-be-forgotten.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;i&gt;Will the right to be forgotten extend to Google.com?,&lt;/i&gt; (July, 2014), &lt;i&gt;available at http://www.pcpro.co.uk/news/389983/will-right-to-be-forgotten-extend-to-google-com. &lt;/i&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; &lt;i&gt;The right to be forgotten is a nightmare to enforce, &lt;/i&gt; (July, 2014), &lt;i&gt;available at &lt;/i&gt;http://www.forbes.com/sites/kashmirhill/2014/07/24/the-right-to-be-forgotten-is-a-nightmare-to-enforce.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Michael Hoven, &lt;i&gt;Balancing privacy and speech in the right to be forgotten, available ati &lt;/i&gt; http://jolt.law.harvard.edu/digest/privacy/balancing-privacy-and-speech-in-the-right-to-be-forgotten#_edn15&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; EU poses 26 questions on the right to be forgotten, (July, 2014), &lt;i&gt;available at &lt;/i&gt; http://www.cio-today.com/article/index.php?story_id=1310024135B0&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications'&gt;https://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-19T05:24:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears">
    <title>Oyo Hotels’ Real-Time Digital Record Database Sparks Privacy Fears</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears</link>
    <description>
        &lt;b&gt;Oyo Hotels’ pilot to maintain a real-time digital database of guests and plan to share it with law-enforcement agencies has triggered privacy concerns.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nishant Sharma was &lt;a class="external-link" href="https://www.bloombergquint.com/business/oyos-real-time-digital-record-database-sparks-privacy-fears"&gt;published by Bloomberg Quint&lt;/a&gt; on January 16, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The digital check-in and check-out database of guests will do away with the conventional arrival and departure registers, &lt;a href="https://www.bloombergquint.com/technology/former-indigo-president-aditya-ghosh-roped-in-as-ceo-of-oyo-hotels" target="_blank"&gt;Aditya Ghosh, chief executive India and South Asia at the hotel chain&lt;/a&gt; said at a CII event, according to a &lt;a href="https://www.business-standard.com/article/companies/oyo-s-digital-records-to-give-state-govts-law-enforcers-info-on-guests-119011400888_1.html" target="_blank"&gt;report&lt;/a&gt; in Business Standard. That will make the process efficient and  transparent and the SoftBank-backed startup has received acceptance from  governments of Haryana, Rajasthan and Telangana for the proposed  digitisation of guest entry and departure records, the report said  quoting Ghosh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That triggered an outrage on social media, with users calling it invasion of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Oyo,  in an emailed statement to BloombergQuint, said it will provide  information to the law-enforcement agencies about who is staying only  after an information order is issued by the police. The company said it  will create “stronger data security net”. Oyo, however, didn't clarify  who will maintain the data centres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centralisation of data of any  kind isn't good and will make data more fragile, Sunil Abraham, founder  of research think tank Center for Internet and Society, told  BloombergQuint. “If someone manages to break into the police data, or  where the data is stored then they will be able to have the access to  the data. It is always good to store data locally.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just last  year, Marriott International Inc. reported a hack in which passport  numbers, emails and mailing addresses of 327 million of its 500 million  Starwood guests was leaked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To be sure, police always have access  to data of customers staying at hotels, one way or the another. As per  existing regulations, all hotels, bed and breakfasts and guest-houses  have to make an entry of guests checking in and out in a register. This  can be checked by the local police when an information order is  presented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chances of manipulating information in such a register  is high, and at times police go through the data without having an  information order as well, said an industry executive requesting  anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srinivas Kodali, a cybersecurity expert, said such a  centralised database makes business sense for Oyo because they will get  access to data not just of people who booked through them but also of  others who checked in without booking online. “Because there is no law,  the entities can do it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, a technology policy  analyst and affiliated fellow at CIS, sees this as an invasion of  privacy in the absence of law. Digitisation of data can be allowed only  after there’s a law on what happens in the case it’s misused. There is  no legal framework about how and where the data will be used, he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-18T02:26:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table-chennai">
    <title>A Privacy Round Table in Chennai</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table-chennai</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Data Security Council of India and the Federation of Indian Chambers of Commerce and Industry cordially invite you to a "Privacy Round Table" at the Residency Towers in Chennai on Saturday, May 18, 2013, 10.30 a.m. to 4.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf" class="external-link"&gt;The Privacy Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/strengthening-privacy-protection.pdf" class="internal-link"&gt;Strengthening Privacy Protection through Co-Regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt;Click for the invite&lt;/a&gt;&lt;/li&gt;
&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt; 
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To discuss the "Report of the Group of Experts on Privacy" by the Justice AP Shah Committee, the text of the "Citizens' Privacy (Protection) Bill 2013", drafted by the Centre for Internet and Society, and "Strengthening Privacy Protection through Co-regulation" by DSCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions and recommendations from the meeting will be published into a compilation, and presented at the Internet Governance meeting planned for October 2013.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Draft Agenda for the Roundtable Discussion&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30 a.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: The Report of the Group of Experts on Privacy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 a.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: Strengthening Privacy Protection through Co-regulation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.15 p.m.&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.30 p.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: The Citizens Privacy (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.15 p.m.&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.15 p.m.&lt;/td&gt;
&lt;td&gt;In depth discussions: The Citizens Privacy (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.15 p.m.&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Confirmations and RSVP&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Please send your email confirmations for attending the Chennai Privacy Roundtable on &lt;b&gt;May 18th, 2013&lt;/b&gt;, to &lt;b&gt;Snehashish Ghosh&lt;/b&gt; at &lt;a class="mail-link" href="mailto:snehashish@cis-india.org"&gt;snehashish@cis-india.org&lt;/a&gt;, mobile no. +91- 9902763325,latest by end-of-business 5:30 p.m. on Monday&lt;b&gt; May 13, 2013&lt;/b&gt;.  As the conference is a roundtable dialogue, we request that attendees  submit a brief introduction about themselves and their interest in the  topic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table-chennai'&gt;https://cis-india.org/internet-governance/events/privacy-round-table-chennai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-05-06T10:01:45Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns">
    <title>Shopping on apps raise privacy and security concerns</title>
    <link>https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns</link>
    <description>
        &lt;b&gt;The recently concluded online Diwali sales frequently offered consumers hefty discounts on merchandise if they shopped via store app, a move that experts say increases security risks for internet users.&lt;/b&gt;
        &lt;p&gt;The article by Vivek Ananth was &lt;a class="external-link" href="http://www.thesoftcopy.in/23_11_15_shopping_on_apps_raise_concerns.html"&gt;published by the Softcopy, an IIJNM Web Publication&lt;/a&gt; on November 23, 2015. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“It makes the security much worse because of  increased complexity from  the user perspective,” said Sunil Abraham, executive  director at Centre  for Internet and Society.&lt;br /&gt; &lt;br /&gt; “User will have to install  multiple apps and then  worry about the security implications arising from each  app. From the  e-commerce corporation perspective it might reduce effort but for  users  this is a nightmare.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Do  apps increase security risks? &lt;br /&gt; &lt;br /&gt; The degree of risk depends on the specific app and   can only be determined after a detailed security audit, Abraham said.&lt;br /&gt; &lt;br /&gt; “Unfortunately there aren't many organisations doing   such audits and making their results available to the public,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are some users who say that privacy on the  internet isn’t an option.&lt;br /&gt; &lt;br /&gt; “Once you are online your privacy is kind of gone,”   said Hasmit Trivedi of Mumbai. “I mean you are vulnerable.”&lt;br /&gt; &lt;br /&gt; “That (browsing history being used to target   advertisements) does concern me, but not to the extent that I'll stop  using  these websites,” said Sweta Rajan, a lawyer from Mumbai.&lt;br /&gt; &lt;br /&gt; “Google has done this forever," said Dinoo Muthappa.“I  don't even care if they use my search to place advertisements of what  they  think I need while browsing.”&lt;b&gt;&lt;/b&gt;&lt;br /&gt; &lt;b&gt;&lt;br /&gt; Comfort  and Convenience trumps privacy&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; “I don't really shop for things I'm not comfortable   allowing the world to know. I'm ok with them using this (usage pattern  and  browsing information) for commercial reasons,” Rajan said.&lt;br /&gt; &lt;br /&gt; “We live in a world where the cost of convenience is   our privacy. Take my user preferences,” said Dinoo Muthappa, a lawyer  from  Delhi.“If it means you'll make money and somehow reflect as a  discount to me  later, that's fine,” she added.&lt;br /&gt; &lt;br /&gt; “I frankly don't have a problem with it in   principle,” said Akshara Kumar Chitoor, a lawyer from Bengaluru, about   companies mining data to target advertisements at her. “I don't think  it's very  different from how certain TV channels carry certain  advertisements because  they know the audiences.I mean,  you get Rin and  Horlicks ads on Zee and Sony but not Romedy Now or Comedy  Central.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The convenience of having it come home  when I want  and not having to face the guy who I know is ripping me  off; these guys can use  and sell my information,” Muthappa said.&lt;br /&gt; &lt;br /&gt; “With my work timings I literally do not find time  to go to a store and  shop,”Rajan said. “I buy everything online. It's very  convenient and  time saving.”&lt;br /&gt; &lt;br /&gt; “Personally, I think just browsing stuff to buy is  much easier on your  computer,” said Sreenath Unnikrishnan, a product developer  from  Singapore. “However, I do think apps are more convenient for payment. As   in your card information is normally stored and can be accessed  without having  to log in and all. I can do that on a computer too, but  it's less secure. At  least that's what I think.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/GoogleandFacebook.png" alt="Google and Facebook" class="image-inline" title="Google and Facebook" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="style24" href="https://www.google.com/policies/technologies/ads/"&gt;Google&lt;/a&gt; and &lt;a class="external-link" href="https://www.facebook.com/help/516147308587266/?helpref=hc_fnav"&gt;Facebook&lt;/a&gt; have their advertisement norms disclosed.&lt;br /&gt; &lt;br /&gt; Twitter also follows a&lt;a class="style23" href="https://support.twitter.com/articles/20170405"&gt; similar model &lt;/a&gt;using the email ids that their users have associated with their twitter  handles.&lt;br /&gt; &lt;br /&gt; “If the service is free - then as many have said  before - you are the  product, said Sunil Abraham executive director at Centre  for Internet  and Society. “Your personal information is being sold to marketers  and  advertisers. As Bruce Schneier puts it ‘surveillance is the business  model  of the Internet’".&lt;br /&gt; &lt;br /&gt; The terms and conditions are sometimes very long and  use difficult language.&lt;br /&gt; &lt;br /&gt; “Transparency and Informed Consent are principles in  most jurisdictions that have data protection law modelled on the &lt;a class="style24" href="http://ec.europa.eu/justice/data-protection/index_en.htm"&gt;EU  Data Protection Directive&lt;/a&gt;,” Abraham said.“Part of the transparency  principle is the accessibility of the language.”&lt;br /&gt; &lt;br /&gt; The user though still has an option to opt out of  the above process where their data is collected by these companies.&lt;br /&gt; Privacy policies of internet companies are legal  documents. These are  required under data protection laws. This makes them  complicated, said  Abraham. &lt;br /&gt; &lt;br /&gt; The users don’t care that their usage data is being  mined by businesses  till they have a bad experience, Abraham said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns'&gt;https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-21T14:56:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia">
    <title>Net Neutrality across South Asia</title>
    <link>https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) and the Observer Research Foundation in association with Centre for Global Communication Studies, Annenberg School for Communication, University of Pennnsylvania and Internet Policy Observatory is organizing this event at the Observer Research Foundation's office in New Delhi from 10 a.m. to 5 p.m., on December 12, 2015.&lt;/b&gt;
        &lt;h3&gt;Context&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Net neutrality can broadly be understood as the principle of non-discrimination which in practice allows the internet to be free and open by preventing service providers from slowing or interfering with the transfer of data. Net neutrality has risen as a global policy issue, yet cultural, political, commercial, and economical factors influence how net neutrality is understood and addressed in a particular context. Indeed, the factors driving the net neutrality debate, the way in which governments are addressing net neutrality, the role and response of industry, the public response, and the role of civil society has been varied across contexts. The topic of net neutrality is not limited to a technical debate and brings together a number of issues including the right to access, the right to freedom of expression, fair competition practices, and privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This conference seeks to bring together domain experts, industry, government, and civil society across South Asia to understand how net neutrality is understood in different contexts, how it is being addressed from a policy point of view, what the varying public dialogues around net neutrality are, and what role civil society can play in influencing the debate.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/concept-note-network-neutrality-in-south-asia" class="internal-link"&gt;&lt;strong&gt;Download the Concept Note&lt;/strong&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/NN_Conference%20Report.pdf" class="internal-link"&gt;&lt;b&gt;Download Event Report &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia'&gt;https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-02-27T08:09:29Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-policy-research">
    <title>Privacy Policy Research</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-policy-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives.&lt;/b&gt;
        &lt;ol&gt;
&lt;li&gt;Raising public awareness  and dialogue around privacy, &lt;/li&gt;
&lt;li&gt;Undertaking in depth research of domestic and international policy pertaining to privacy &lt;/li&gt;
&lt;li&gt;Driving comprehensive privacy legislation in India through research.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;India does not have a comprehensive legislation covering issues of privacy or establishing the right to privacy In 2010 an "Approach Paper on Privacy" was published, in 2011 the Department of Personnel and Training released a draft Right to Privacy Bill, in 2012 the Planning Commission constituted a group of experts which published The Report of the Group of Experts on Privacy, in 2013 CIS drafted the citizens Privacy Protection Bill, and in 2014 the Right to Privacy Bill was leaked. Currently the Government is in the process of drafting and finalizing the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/DraftRighttoPrivacyBill.png" alt="Draft Right to Privacy" class="image-inline" title="Draft Right to Privacy" /&gt;&lt;/p&gt;
&lt;p&gt;Privacy Research -&lt;/p&gt;
&lt;p&gt;1. Approach Paper on Privacy, 2010 -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following article contains the reply drafted by CIS in response to the Paper on Privacy in 2010. The Paper on Privacy was a document drafted by a group 	of officers created to develop a framework for a privacy legislation that would balance the need for privacy protection, security, sectoral interests, and 	respond to the domain legislation on the subject.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; CIS Responds to Privacy Approach Paper &lt;a href="http://bit.ly/16dEPB3"&gt;http://bit.ly/16dEPB3&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;2. Report on Privacy, 2012 -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report on Privacy, 2012 was drafted and published by a group of experts under the Planning Commission pertaining to the current legislation with 	respect to privacy. The following articles contain the responses and criticisms to the report and the current legislation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; The National Cyber Security Policy: Not a Real Policy &lt;a href="http://bit.ly/16yLYFq"&gt;http://bit.ly/16yLYFq&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Privacy Law Must Fit the Bill &lt;a href="http://bit.ly/19DNYjs"&gt;http://bit.ly/19DNYjs&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;3. Privacy Protection Bill, 2013 -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Protection Bill, 2013 was a legislation that aims to formulate the rules and law that governs privacy protection. The following articles refer 	to this legislation including a citizen's draft of the legislation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; The Privacy (Protection) Bill 2013: A Citizen's Draft &lt;a href="http://bit.ly/1bXYbL6"&gt;http://bit.ly/1bXYbL6&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Privacy Protection Bill, 2013 (With Amendments based on Public Feedback) &lt;a href="http://bit.ly/1efkgbe"&gt;http://bit.ly/1efkgbe&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Privacy (Protection) Bill, 2013: Updated Third Draft &lt;a href="http://bit.ly/14WAgI7"&gt;http://bit.ly/14WAgI7&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; The Privacy Protection Bill, 2013 &lt;a href="http://bit.ly/1g3TwIX"&gt;http://bit.ly/1g3TwIX&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; The New Right to Privacy Bill 2011: A Blind Man's View of the Elephant &lt;a href="http://bit.ly/17VSgCH"&gt;http://bit.ly/17VSgCH&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;4. Right to Privacy Act, 2014 (Leaked Bill) -&lt;/p&gt;
&lt;p&gt;The Right to Privacy Act, 2014 is a bill still under proposal that was leaked, linked below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Leaked Privacy Bill: 2014 vs. 2011 http://bit.ly/QV0Y0w &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-policy-research'&gt;https://cis-india.org/internet-governance/blog/privacy-policy-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:40:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-research">
    <title>Security Research</title>
    <link>https://cis-india.org/internet-governance/blog/security-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives.&lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Research on the issue of privacy in different sectors in India.&lt;/li&gt;
&lt;li&gt;Monitoring projects, practices, and policies around those sectors.&lt;/li&gt;
&lt;li&gt;Raising public awareness around the issue of privacy, in light of varied projects, industries, sectors and instances.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;State surveillance in India has been carried out by Government agencies for many years. Recent projects include: NATGRID, CMS, NETRA, etc. which aim to overhaul the overall security and intelligence infrastructure in the country. The purpose of such initiatives has been to maintain national security and ensure interconnectivity and interoperability between departments and agencies. Concerns regarding the structure, regulatory frameworks (or lack thereof), and technologies used in these programmes and projects have attracted criticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance/Security Research -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Central Monitoring System -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Central Monitoring System or CMS is a clandestine mass electronic surveillance data mining program installed by the Center for Development of 	Telematics (C-DOT), a part of the Indian government. It gives law enforcement agencies centralized access to India's telecommunications network and the 	ability to listen in on and record mobile, landline, satellite, Voice over Internet Protocol (VoIP) calls along with private e-mails, SMS, MMS. It also 	gives them the ability to geo-locate individuals via cell phones in real time.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Central Monitoring System: Some Questions to be Raised in Parliament &lt;span&gt;http://bit.ly/1fln2vu&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India´s ´Big Brother´: The Central Monitoring System (CMS) &lt;a href="http://bit.ly/1kyyzKB"&gt;http://bit.ly/1kyyzKB&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India's Central Monitoring System (CMS): Something to Worry About? &lt;a href="http://bit.ly/1gsM4oQ"&gt;http://bit.ly/1gsM4oQ&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; C-DoT's surveillance system making enemies on internet 	&lt;a href="http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet"&gt; http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2. Surveillance Industry : Global And Domestic -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry is a multi-billion dollar economic sector that tracks individuals along with their actions such as e-mails and texts. With the 	cause for its existence being terrorism and the government's attempts to fight it, a network has been created that leaves no one with their privacy. All 	that an individual does in the digital world is suspect to surveillance. This included surveillance in the form of snooping where an individual's phone 	calls, text messages and e-mails are monitored or a more active kind where cameras, sensors and other devices are used to actively track the movements and 	actions of an individual. This information allows governments to bypass the privacy that an individual has in a manner that is considered unethical and 	incorrect. This information that is collected also in vulnerable to cyber-attacks that are serious risks to privacy and the individuals themselves. The 	following set of articles look into the ethics, risks, vulnerabilities and trade-offs of having a mass surveillance industry in place.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance Technologies http://bit.ly/14pxg74 &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;New Standard Operating Procedures for Lawful Interception and Monitoring &lt;span&gt;http://bit.ly/1mRRIo4&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Video Surveillance and Its Impact on the Right to Privacy 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy"&gt; http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;More than a Hundred Global Groups Make a Principled Stand against Surveillance 	&lt;a href="http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance"&gt; http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Models for Surveillance and Interception of Communications Worldwide 	&lt;a href="http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide"&gt; http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why 'Facebook' is More Dangerous than the Government Spying on You 	&lt;a href="http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you"&gt; http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Difficult Balance of Transparent Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance"&gt; http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; UK's Interception of Communications Commissioner - A Model of Accountability 		&lt;a href="http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"&gt; http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India 		&lt;a href="http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"&gt; http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; State Surveillance and Human Rights Camp: Summary &lt;a href="http://bit.ly/ZZNm6M"&gt;http://bit.ly/ZZNm6M&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis - It is Now Officially Confirmed		&lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Spy Files 3: WikiLeaks Sheds More Light on the Global Surveillance Industry &lt;a href="http://bit.ly/1d6EmjD"&gt;http://bit.ly/1d6EmjD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance Camp IV: Disproportionate State Surveillance - A Violation of Privacy &lt;a href="http://bit.ly/1ilTJts"&gt;http://bit.ly/1ilTJts&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Hacking without borders: The future of artificial intelligence and surveillance &lt;a href="http://bit.ly/1kWiwGv"&gt;http://bit.ly/1kWiwGv&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Driving in the Surveillance Society: Cameras, RFID tags and Black Boxes &lt;a href="http://bit.ly/1mr3KTH"&gt;http://bit.ly/1mr3KTH&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Brief: Oversight Mechanisms for Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance"&gt; http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;3. Judgements By the Indian Courts -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry in India has been brought before the court in different cases. The following articles look into the cause of action in these 	cases along with their impact on India and its citizens.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Anvar v. Basheer and the New (Old) Law of Electronic Evidence 	&lt;a href="http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt; http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Gujarat High Court Judgement on the Snoopgate Issue 	&lt;a href="http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue"&gt; http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;4. International Privacy Laws -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to the universality of the internet, many questions of accountability arise and jurisdiction becomes a problem. Therefore certain treaties, agreements 	and other international legal literature was created to answer these questions. The articles listed below look into the international legal framework which 	governs the internet.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Learning to Forget the ECJ's Decision on the Right to be Forgotten and its Implications 		&lt;a href="http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications"&gt; http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy and Security Can Co-exist		&lt;a href="http://cis-india.org/internet-governance/blog/privacy-and-security"&gt;http://cis-india.org/internet-governance/blog/privacy-and-security&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; European Union Draft Report Admonishes Mass Surveillance, Calls for Stricter Data Protection and Privacy Laws 		&lt;a href="http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance"&gt; http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Draft International Principles on Communications Surveillance and Human Rights &lt;a href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Indian Surveillance Framework -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government's mass surveillance systems are configured a little differently from the networks of many countries such as the USA and the UK. This 	is because of the vast difference in infrastructure both in existence and the required amount. In many ways, it is considered that the surveillance network 	in India is far worse than other countries. This is due to the present form of the legal system in existence. The articles below explore the system and its 	functioning including the various methods through which we are spied on. The ethics and vulnerabilities are also explored in these articles.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Paper-thin Safeguards and Mass Surveillance in India - 	&lt;a href="http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india"&gt; http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers! - 	&lt;a href="http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India - An Analysis of Indian Security Expos 	&lt;a href="http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos"&gt; http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;GSMA Research Outputs: different legal and regulatory aspects of security and surveillance in India	&lt;a href="http://cis-india.org/internet-governance/blog/gsma-research-outputs"&gt;http://cis-india.org/internet-governance/blog/gsma-research-outputs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Way to watch 		&lt;a href="http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch"&gt; http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Free Speech and Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/free-speech-and-surveillance"&gt; http://cis-india.org/internet-governance/blog/free-speech-and-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance rises, privacy retreats 		&lt;a href="http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats"&gt; http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Freedom from Monitoring: India Inc. should Push For Privacy Laws 	&lt;a href="http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"&gt; http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Surat's Massive Surveillance Network Should Cause Concern, Not Celebration 	&lt;a href="http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration"&gt; http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Vodafone Report Explains Government Access to Customer Data 	&lt;a href="http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data"&gt; http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Review of the Functioning of the Cyber Appellate Tribunal and Adjudicator officers under the IT Act 	&lt;a href="http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act"&gt; http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Comparison of Indian Legislation to Draft International Principles on Surveillance of Communications	&lt;a href="http://bit.ly/U6T3xy"&gt;http://bit.ly/U6T3xy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;SEBI and Communication Surveillance: New Rules, New Responsibilities? &lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Snooping Can Lead to Data Abuse		&lt;a href="http://cis-india.org/internet-governance/blog/snooping-to-data-abuse"&gt;http://cis-india.org/internet-governance/blog/snooping-to-data-abuse&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Big Brother is Watching You &lt;a href="http://bit.ly/1arbxwm"&gt;http://bit.ly/1arbxwm&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Moving Towards a Surveillance State 		&lt;a href="http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state"&gt; http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; How Surveillance Works in India 		&lt;a href="http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"&gt; http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Big Democracy, Big Surveillance: India's Surveillance State http://bit.ly/1nkg8Ho &lt;/li&gt;
&lt;li&gt; Can India Trust Its Government on Privacy? 		&lt;a href="http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy"&gt; http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Indian surveillance laws &amp;amp; practices far worse than US 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"&gt; http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Security, Surveillance and Data Sharing Schemes and Bodies in India 		&lt;a href="http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view"&gt; http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Paper on Surveillance in India 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp:/cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"&gt; http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Constitutionality of Indian Surveillance Law: Public Emergency as a Condition Precedent for Intercepting Communications 		&lt;a href="http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law"&gt; http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 1: Foundations http://bit.ly/1ntqsen &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 2: Gobind and the Compelling State Interest Test		&lt;a href="http://bit.ly/1dH3meL"&gt;http://bit.ly/1dH3meL&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 3: The Public/Private Distinction and the Supreme Court's Wrong Turn		&lt;a href="http://bit.ly/1kBosnw"&gt;http://bit.ly/1kBosnw&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Mastering the Art of Keeping Indians Under Surveillance 		http://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-research'&gt;https://cis-india.org/internet-governance/blog/security-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:55:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-research">
    <title>UID Research</title>
    <link>https://cis-india.org/internet-governance/blog/uid-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives. &lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Researching the vision and implementation of the UID Scheme - both from a technical and regulatory perspective.&lt;/li&gt;
&lt;li&gt;Understanding the validity and legality of collection, usage and storage of Biometric information for this scheme.&lt;/li&gt;
&lt;li&gt;Raising public awareness around issues concerning privacy, data security and the objectives of the UID Scheme.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The UID scheme seeks to provide all residents of India an identity number based on their biometrics that can be used to authenticate individuals for the purpose of Government benefits and services. A 2015 Supreme Court ruling has clarified that the UID can only be used in the PDS and LPG Schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns with the scheme include the broad consent taken at the time of enrolment, the lack of clarity as to what happens with transactional metadata, the centralized storage of the biometric information in the CIDR, the seeding of the aadhaar number into service providers’ databases, and the possibility of function creep. Also, there are concerns due to absence of a legislation to look into the privacy and security concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UID Research -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Ramifications of Aadhar and UID schemes -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID and Aadhar systems have been bombarded with criticisms and plagued with issues ranging from privacy concerns to security risks. The following 	articles deal with the many problems and drawbacks of these systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID and NPR: Towards Common Ground 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground"&gt; http://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Public Statement to Final Draft of UID Bill &lt;a href="http://bit.ly/1aGf1NN"&gt;http://bit.ly/1aGf1NN&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID Project in India - Some Possible Ramifications	&lt;a href="http://cis-india.org/internet-governance/blog/uid-in-india"&gt;http://cis-india.org/internet-governance/blog/uid-in-india&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Aadhaar Number vs the Social Security Number 	&lt;a href="http://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number"&gt; http://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Feedback to the NIA Bill	&lt;a href="http://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill"&gt;http://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Unique ID System: Pros and Cons &lt;a href="http://bit.ly/1jmxbZS"&gt;http://bit.ly/1jmxbZS&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Submitted seven open letters to the Parliamentary Finance Committee on the UID covering the following aspects: SCOSTA Standards 	(http://bit.ly/1hq5Rqd), Centralized Database (http://bit.ly/1hsHJDg), Biometrics (http://bit.ly/196drke), UID Budget (http://bit.ly/1e4c2Op), Operational 	Design (http://bit.ly/JXR61S), UID and Transactions (http://bit.ly/1gY6B8r), and Deduplication (http://bit.ly/1c9TkSg)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Comments on Finance Committee Statements to Open Letters on Unique Identity: The Parliamentary Finance Committee responded to the open letters sent by CIS through an email on 12 October 2011. CIS has commented on the points raised by the Committee:	&lt;a href="http://bit.ly/1kz4H0F"&gt;http://bit.ly/1kz4H0F&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Unique Identification Scheme (UID) &amp;amp; National Population Register (NPR), and Governance 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note"&gt; http://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Financial Inclusion and the UID	&lt;a href="http://cis-india.org/internet-governance/privacy_uidfinancialinclusion"&gt;http://cis-india.org/internet-governance/privacy_uidfinancialinclusion&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Aadhaar Case	&lt;a href="http://cis-india.org/internet-governance/blog/the-aadhaar-case"&gt;http://cis-india.org/internet-governance/blog/the-aadhaar-case&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Do we need the Aadhaar scheme &lt;a href="http://bit.ly/1850wAz"&gt;http://bit.ly/1850wAz&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ 4 Popular Myths about UID &lt;a href="http://bit.ly/1bWFoQg"&gt;http://bit.ly/1bWFoQg&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Does the UID Reflect India? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/uid-reflects-india"&gt; http://cis-india.org/internet-governance/blog/privacy/uid-reflects-india &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Would it be a unique identity crisis?	&lt;a href="http://cis-india.org/news/unique-identity-crisis"&gt;http://cis-india.org/news/unique-identity-crisis&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID: Nothing to Hide, Nothing to Fear? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear"&gt; http://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Right to Privacy and UID -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID system has been hit by many privacy concerns from NGOs, private individuals and others. The sharing of one's information, especially fingerprints 	and retinal scans to a system that is controlled by the government and is not vetted as having good security irks most people. These issues are dealt with 	the in the following articles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ India Fears of Privacy Loss Pursue Ambitious ID Project	&lt;a href="http://cis-india.org/news/india-fears-of-privacy-loss"&gt;http://cis-india.org/news/india-fears-of-privacy-loss&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Analysing the Right to Privacy and Dignity with Respect to the UID &lt;a href="http://bit.ly/1bWFoQg"&gt;http://bit.ly/1bWFoQg&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Analysing the Right to Privacy and Dignity with Respect to the UID 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/privacy-uiddevaprasad"&gt; http://cis-india.org/internet-governance/blog/privacy/privacy-uiddevaprasad &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Supreme Court order is a good start, but is seeding necessary? 	&lt;a href="http://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary"&gt; http://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Right to Privacy in Peril 	&lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Data Flow in the UID -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The articles below deal with the manner in which data is moved around and handled in the UID system in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UIDAI Practices and the Information Technology Act, Section 43A and Subsequent Rules 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules"&gt; http://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Data flow in the Unique Identification Scheme of India 	&lt;a href="http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india"&gt; http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india &lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-research'&gt;https://cis-india.org/internet-governance/blog/uid-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:59:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table">
    <title>Report on the 2nd Privacy Round Table meeting</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table</link>
    <description>
        &lt;b&gt;This post entails a report on the second Privacy Round Table meeting which took place on 20th April 2013. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In furtherance of Internet Governance multi-stakeholder Initiatives and Dialogue in 2013, the Centre for Internet and Society (CIS) in collaboration with the Federation of Indian Chambers of Commerce and Industry (FICCI), and the Data Security Council of India (DSCI), is holding a series of six multi-stakeholder round table meetings on “privacy” from April 2013 to August 2013. The CIS is undertaking this initiative as part of their work with Privacy International UK on the SAFEGUARD project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the CIS and DSCI were members of the Justice AP Shah Committee which created the “Report of Groups of Experts on Privacy”. The CIS has recently drafted a Privacy (Protection) Bill 2013, with the objective of contributing to privacy legislation in India. The CIS has also volunteered to champion the session/workshops on “privacy” in the meeting on Internet Governance proposed for October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the roundtables the Report of the Group of Experts on Privacy, DSCI´s paper on “Strengthening Privacy Protection through Co-regulation” and the text of the Privacy (Protection) Bill 2013 will be discussed. The discussions and recommendations from the six round table meetings will be presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dates of the six Privacy Round Table meetings are enlisted below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;New Delhi Roundtable: 13 April 2013&lt;/li&gt;
&lt;li&gt;Bangalore Roundtable: 20 April 2013&lt;/li&gt;
&lt;li&gt;Chennai Roundtable: 18 May 2013&lt;/li&gt;
&lt;li&gt;Mumbai Roundtable: 15 June 2013&lt;/li&gt;
&lt;li&gt;Kolkata Roundtable: 13 July 2013&lt;/li&gt;
&lt;li&gt;New Delhi Final Roundtable and National Meeting: 17 August 2013&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the first Privacy Round Table in Delhi, this &lt;a href="https://cis-india.org/internet-governance/blog/report-on-bangalore-privacy-meeting" class="internal-link"&gt;report&lt;/a&gt; entails an overview of the discussions and recommendations of the second Privacy Round Table meeting in Bangalore, on 20&lt;sup&gt;th&lt;/sup&gt; April 2013.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Overview of DSCI´s paper on “Strengthening Privacy Protection through Co-regulation”&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting began with a brief summary of the first Privacy Round Table meeting which took place in Delhi on 13&lt;sup&gt;th&lt;/sup&gt; April 2013. Following the summary, the Data Security Council of India (DSCI) presented the paper “Strengthening Privacy Protection through Co-regulation”. In particular, DSCI presented the regulatory framework for data protection under the IT (Amendment) Act 2008, which entails provisions for sensitive personal information, privacy principles and “reasonable security practices”. It was noted that the privacy principles, as set out in the Justice AP Shah Report, refer to: data collection limitation, data quality, purpose specification, use limitation, security safeguards, openness and individual participation. The generic definitions of identified privacy principles refer to: notice, choice and consent, collection limitation, purpose specification, access and correction, disclosure of information, security, openness/transparency and accountability. However, the question which prevailed is what type of regulatory framework should be adopted to incorporate all these privacy principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DSCI suggested a co-regulatory framework which would evolve from voluntary self-regulation with legal recognition. The proposed co-regulatory regime could have different types of forms based on the role played by the government and industry in the creation and enforcement of rules. DSCI mentioned that the Justice AP Shah Committee recommends: (1) the establishment of the office of the Privacy Commissioner, both at the central and regional levels, (2) a system of co-regulation, with emphasis on SROs and (3) that SROs would be responsible for appointing an ombudsman to receive and handle complaints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion points brought forward by DSCI were:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;What role should government and industry respectively play in developing and enforcing a regulatory framework? &lt;/li&gt;
&lt;li&gt;How can the codes of practice developed by industry be enforced in a co-regulatory regime? How will the SRO check the successful implementation of codes of practice? How can the SRO penalize non-compliances?&lt;/li&gt;
&lt;li&gt;How can an organization be incentivized to follow the codes of practice under the SRO?&lt;/li&gt;
&lt;li&gt;What should be the role of SROs in redressal of complaints?&lt;/li&gt;
&lt;li&gt;What should be the business model for SROs?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;DSCI further recommended the establishment of “light weight” regulations based on global privacy principles that value economic beliefs of data flow and usage, while guaranteeing privacy to citizens. DSCI also recommended that bureaucratic structures that could hinder business interests be avoided, as well as that the self-regulatory framework of businesses adapts technological advances to the privacy principles. Furthermore, DSCI recommended that self-regulatory bodies are legally recognised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion on the draft Privacy (Protection) Bill 2013&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Discussion of definitions and preamble: Chapter I &amp;amp; II&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The second session began with a discussion of definitions used in the Bill. In particular, many participants argued that the term ´personal data´ should be more specific, especially since the vague definition of the term could create a potential for abuse. Other participants asked who the protection of personal data applies to and whether it covers both companies and legal persons. Furthermore, the question of whether the term ´personal data´ entails processed and stored data was raised, as well as whether the same data protection regulations apply to foreign citizens residing in India. A participant argued that the preamble of the Bill should be amended to include the term ´governance´ instead of ´democracy´, as this privacy legislation should be applicable in all cases in India, regardless of the current political regime.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Sensitive Personal Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded with a discussion of the term ´sensitive personal data´ and many participants argued that the term should be broadened to include more categories, such as religion, ethic group, race, caste, financial information and others. Although the majority of the participants agreed that the term ´sensitive personal data´ should be redefined, they disagreed in regards to what should be included in the term. In particular, the participants were not able to reach a consensus on whether religion, caste and financial information should be included in the definition of the term ´sensitive personal data´. Other participants argued that passwords should be included within the scope of ´sensitive personal data´, as they can be just as crucial as financial information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information vs. Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;During the discussion, a participant argued that there is a subtle difference between the term ´information´ and ´data´ and that this should be pointed out in the Bill to prevent potential abuse. Another participant argued that ´sensitive personal data´ should be restricted to risk factors, which is why unique identifiers, such as passwords, should be included in the definition of the term. Other participants argued that the context of data defines whether it is ´sensitive´ or not, as it may fall in the category of ´national security´ in one instance, but may not in another. Thus, all types of data should be considered within their context, rather than separately. The fact that privacy protection from several financial services already exists was pointed out and the need to exclude pre-existing protections from the Bill was emphasised. In particular, a participant argued that banks are obliged to protect their customers´ financial information either way, which is why it should not be included in the definition of the term ´sensitive personal data´.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Exemptions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Several exemptions to the right to privacy were discussed throughout the meeting. A participant asked whether the right to privacy would also apply to deceased persons and to unborn infants.  Another participant asked whether the term ´persons´ would be restricted to natural persons or if it would also apply to artificial persons. The fact that children should also have privacy rights was discussed in the meeting and in particular, participants questioned whether children´s right to privacy should be exempted in cases when they are being surveilled by their own parents.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of “Protection of Personal Data”: Chapter III&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Following the discussion of definitions used in the Bill, the meeting proceeded with a discussion on the protection of personal data. A participant emphasized that the probability of error in data is real and that this could lead to major human rights violations if not addressed appropriately and in time. The fact that the Bill does not address the element of error within data was pointed out and suggested that it be included in draft Privacy (Protection) Bill. Another participant recommended an amendment to the Bill which would specify the parties, such as the government or companies, which would be eligible to carry out data collection in India. As new services are been included, the end purpose of data collection should be taken into consideration and, in particular, the ´new purposes´ for data collection would have to be specified at every given moment.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Collection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In terms of data collection, a participant emphasized that the objectives and purposes are different from an individual and an industry perspective, which should be explicitly considered through the Bill. Furthermore, the participant argued that the fact that multiple purposes for data collection may arise should be taken into consideration and relevant provisions should be incorporated in the in Bill. Another participant argued that the issue of consent for data collection may be problematic, especially since the purpose of data collection may change in the process and while an individual may have given consent to the initial purpose for data collection, he/she may not have given consent to the purposes which evolved throughout the process. Thus, explicitly defining the instances for data collection may not be feasible.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the issue of consent, several participants argued that it would be important to distinguish between ´mandatory´ and ´optional´ information, as, although individuals may be forced by the government to hand over certain cases, in other cases they &lt;i&gt;choose &lt;/i&gt;to disclose their personal data. Thus participants argued that the Bill should provide different types of privacy protections for these two separate cases. Other participants argued that the term ´consent´ varies depending on its context and that this should too be taken into consideration within the draft Privacy (Protection) Bill. It was also argued that a mechanism capable of gaining individual consent prior to data collection should be developed. However, a participant emphasized upon the fact that, in many cases, it is very difficult to gain individual consent for data collection, especially when individuals cannot read or write. Thus the need to include provisions for uneducated or disabled persons within the Bill was highly emphasized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further questions were raised in regards to the withdrawal of consent. Several participants argued that the draft Privacy (Protection) Bill should explicitly determine that all data is destroyed once an individual has withdrawn consent. Participants also argued that consent should also be a prerequisite to the collection, processing, sharing and retention of secondary users´ data, such as the data of individuals affiliated to the individual in question. A participant argued that there are two problematic areas of consent: (1) financial distribution (such as loans) and (2) every financial institution must store data for a minimum of seven to eight years. Having taken these two areas in consideration, the participant questioned whether it is feasible to acquire consent for such cases, especially since the purpose for data retention may change in the process. Participants also referred to extreme cases through which consent may not be acquired prior to the collection, processing, sharing and retention of data, such as in disastrous situations (e.g. earthquake) or in extreme medical cases (e.g. if a patient is in a coma), and suggested that relevant provisions are included in the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Disclosure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In terms of data disclosure, several participants argued that the disclosure of data can potentially be a result of blackmail and that the Bill does not provide any provisions for such extreme cases. Furthermore, participants argued that although consent may be taken from an individual for a specific purpose, such data may be used in the process for multiple other purposes by third parties and that it is very hard to prevent this. It was recommended that the Bill should incorporate provisions to prevent the disclosure of data for purposes other than the ones for which consent was given.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant recommended that individuals are informed of the name of the Data Processor prior to the provision of consent for the disclosure of data, which could potentially increase transparency. Many participants raised questions in regards to the protection of data which goes beyond the jurisdiction of a country. It remains unclear how data will be processed, shared, retained when it is not handled within India and several participants argued that this should be encountered within the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Destruction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In terms of data destruction, a participant emphasized upon the fact that the draft Privacy (Protection) Bill lacks provisions for the confirmation of the destruction of data. In particular, although the Bill guarantees the destruction of data in certain cases, it does not provide a mechanism through which individuals can be assured that their data has actually been deleted from databases. Another individual argued that since the purposes for data collection may change within the process, it is hard to determine the cases under which data can be destroyed. Since the purposes for data collection and data retention may change in time, the participant argued that it would be futile to set a specific regulatory framework for data destruction. Another participant emphasized upon the value of data and stated that although some data may appear to have no value today, it may in the future, which is why data should not be destroyed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Processing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In terms of data processing, participants argued that privacy protection complications have arisen in light of the social media. In particular, they argued that social media develop and expand technologically constantly and that it is very difficult to regulate the processing of data that may be conducted by such companies. A participant emphasized the difference between (1) the processing of data when it is being read and (2) the processing of data when it is being analysed. Such a distinction should be considered within the Bill, as well as the use of data which is being processed. Many participants distinguished between the primary and secondary use of data and argued that the secondary use of data should also be included in the privacy statements of companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, participants also pointed out that purposes for the collection of data may overlap and that it may be difficult to distinguish between primary and secondary purposes for data collection. A participant disagreed with this argument and stated that it is possible to distinguish between primary and secondary purposes of data collection, as long as companies are transparent about why they are collecting information and about the purpose of its processing. This argument was seconded by another participant who argued that the specific purposes for the processing of data should be incorporated in the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In brief, the following questions with regards to chapter III of the bill were raised during the meeting:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Should consent be required prior to the collection of data?&lt;/li&gt;
&lt;li&gt;Should consent be acquired prior and after the disclosure of data? &lt;/li&gt;
&lt;li&gt;Should the purpose of data collection be the same as the purpose for the disclosure of data?&lt;/li&gt;
&lt;li&gt;Should an executive order or a court order be required to disclose data?&lt;/li&gt;
&lt;li&gt;At the background of national security, anyone´s data can be under the ´suspicion list´. How can the disclosure of data be prevented in such circumstances? Non-criminals may have their data in the ´suspicion list´ and under national security, the government can disclose information; how can their information be protected in such cases?&lt;/li&gt;
&lt;li&gt;An individual may not be informed of the collection, analysis, disclosure and retention of his/her data; how can an individual prevent the breach of his/her data?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Should companies notify individuals when they share their (individuals´) data with international third parties?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In brief, the following recommendations with regards to chapter III of the bill were raised during the meeting:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The data subject has to be informed, unless there is a model contract. &lt;/li&gt;
&lt;li&gt;The request for consent should depend on the type of data that is to be disclosed.&lt;/li&gt;
&lt;li&gt;Some exceptions need to be qualified (for example, in instances of medical patients different exceptions may apply).&lt;/li&gt;
&lt;li&gt;The shared data may be considered private data (need of a relevant regulatory framework).&lt;/li&gt;
&lt;li&gt;An international agreement should deal with the sharing of data with international third parties - incorporating such provisions in Indian law would probably be inadequate.&lt;/li&gt;
&lt;li&gt;If any country is not data-secure, there should be an approval mechanism for the transfer of data to such a country. &lt;/li&gt;
&lt;li&gt;India could have an export law which would monitor which data is sensitive and should not be shared with international third parties.&lt;/li&gt;
&lt;li&gt;The problem with disclosure is when there is an exception for certain circumstances &lt;/li&gt;
&lt;li&gt;Records should be kept on individuals who disclose data; there should be a trail of disclosure, so that there can be more transparency and accountability. &lt;/li&gt;
&lt;li&gt;Ownership of data is a controversial issue and so is the disclosure of data; consumers give up the ownership of their data when they share it with third parties and ergo cannot control its disclosure (or non-disclosure).&lt;/li&gt;
&lt;li&gt;´Data ownership´ should be included in the definitions of the Bill. &lt;/li&gt;
&lt;li&gt;What is the ´quality´ of data? The definition for ´quality´ under section 11 of the Bill is not well defined and should be improved.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of “Interception of Communications”: Chapter IV&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on the interception of communications started off with a statement that 70 percent of the citizens in India are enrolled on “voice”, which means that the interception of communications affects a large proportion of the population in the country. A participant asked whether the body corporate in India should be treated as a telecommunications provider and whether it should be responsible for the interception of communications. Another participant argued that the disclosure of information should be closely regulated, even when it is being intercepted for judicial purposes. Many participants agreed that data which is collected and intercepted should not be used for other purposes other than the original purpose, as well as that such information should not be shared with third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions were raised in regards to who should authorise the interception of communications and a participant recommended that a judicial warrant should be a prerequisite to the interception of communications in India. Some participants argued that the Bill should clearly specify the instances under which communications can be intercepted, as well as the legitimate purposes for interception. It was also argued that some form of ´check and balance´ should exist for the interception of communications and that the Bill should provide mechanisms to ensure that interception is carried out in a legal way. Several participants recommended that the Privacy Commissioner is mandated to approve the interception of communications, while questions were raised in regards to the sharing of intercepted data.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion on self-regulation and co-regulation&lt;/h2&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The final session of the meeting consisted of a debate on self-regulation and co-regulation. Questions were raised in regards to how self-regulation and co-regulation could be enforced. Some participants recommended the establishment of sector regulations which would mandate the various forms of surveillance, such as a separate regulation for the UID scheme. However, this recommendation was countered by participants who argued that the government would probably not approve every sector regulation and that this would leave large areas of surveillance unregulated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The participants who supported the self-regulation framework argued that the government should not intervene in the industry and that the industry should determine its own rules in terms of handling its customers´ data. Other participants supported the co-regulatory framework and argued that companies should cooperate with the Privacy Commissioner in terms of handling customers´ data, especially since this would increase transparency on how the industry regulates the use of customers´ data. The supporters of co-regulation supplemented this statement by arguing that the members of the industry should comply with regulations and that if they do not, there should be sanctions. Such arguments were countered by supporters of self-regulation, who stated that the industry should create its own code of conduct and that the government should not regulate its work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, it was argued that although government regulations for the handling of data could make more sense in other countries, in India, the industry became aware of privacy far sooner than what the government did, which is why a self-regulatory regime should be established in terms of handling data. Such arguments were countered by supporters of co-regulation who argued that the industry has vested interest in self-regulation, which should be countered by public policy. This argument was also countered by participants arguing that, given the high levels of corruption in India, the Privacy Commissioner in India may be corrupt and co-regulation may end up being ineffective. Other participants questioned this argument by stating that if India lacks legal control over the use of data by companies, individuals are exposed to potential data breaches. Supporters of co-regulation stated that the Privacy Commissioner should formulate a set of practices and both the industry and the government should comply with them.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Meeting conclusion&lt;/h2&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second Privacy Round Table entailed a discussion of the definitions used in the draft Privacy (Protection) Bill 2013, as well as of chapters II, III and IV on the right to privacy, the protection of personal data and the interception of communications. The majority of the participants agreed that India needs a privacy legislation and that individuals´ data should be legally protected. However, participants disagreed in regards to how data would be safeguarded and the extent to which data collection, processing, sharing, disclosure, destruction and retention should be regulated. This was supplemented by the debate on self-regulation and co-regulation which concluded the meeting; participants disagreed on whether the industry should regulate the use of customers´ data autonomously from government regulation or whether the industry should co-operate with the Privacy Commissioner for the regulation of the use of data. Though a consensus was not reached in regards to co-regulation and self-regulation, the majority of the participants agreed upon the establishment of a privacy legislation which would safeguard individuals´ personal data. The major issue, however, with the creation of a privacy legislation in India would probably be its adequate enforcement.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table'&gt;https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:54:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore">
    <title>Consilience – 2013</title>
    <link>https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore</link>
    <description>
        &lt;b&gt;The Law and Technology Committee of National Law School of India University, Bangalore is organising ‘Consilience – 2013′, an annual conference on law and technology, to be held on May 25 and 26, 2013. The Centre for Internet and Society is a co-partner for this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Theme: Data Protection and Cyber Security in India. Click to read the &lt;a href="https://cis-india.org/internet-governance/blog/consilience-2013.pdf" class="internal-link"&gt;report here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Topics:&lt;br /&gt;Frameworks for Data Protection in India: The J. A.P. Shah “Report of the Group of Experts on Privacy”&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       What is the scope of the principles/framework?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      What could be the strengths and limitation of their application?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.       How does Report define privacy for India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d.      Would an alternative framework for privacy in India be better? If so, what would this framework look like?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;India and the EU: The Privacy Debate&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       How does the Indian data protection regime differ from the EU regime?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      Was the EU is justified in not accepting India as a data secure country? Reason for or against.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.      In what way does the Indian regime on data protection not meet the requirements of EU’s data protection directive?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d.      What changes need to be made in the Indian regime to become  EU compliant? Are these changes feasible? Should India make these  changes?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Governmental Schemes, Data Protection, and Security&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. In India, do private public partnerships between government  and the private sector adequately incorporate data protection standards?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. What have been concerns related to data protection and  security that have arisen from government schemes? (Please use two  governmental schemes as case studies)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Are these concerns related to the policy associated with the  project – the architecture of the project as well as the implementation?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. Should the larger question of data protection for governmental  schemes be incorporated into a privacy legislation? If yes, how so?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contracts and Data Protection in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       How are contracts used to ensure data protection in India? What actors use contracts?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      Are there weaknesses in using contracts to ensure data protection standards?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.       Do contracts address questions brought about from technology like the cloud?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cyber security in India&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;a.      What are the perceived challenges and threats to cyber security in India?&lt;/p&gt;
&lt;p&gt;b.      Are these currently being addressed through policy/projects? If yes, how so?&lt;/p&gt;
&lt;p&gt;c.      How does India’s cyber security regime compare to other countries?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance and Cyber Security&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.      Does policy in India enable the Government of India to surveil individuals for reasons related to cyber security?&lt;/p&gt;
&lt;p&gt;b.      If so – through what policy, projects, legislation?&lt;/p&gt;
&lt;p&gt;c.      Do the relevant policies, projects, and legislation impact privacy? How so?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Draft National Cyber Security Policy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.   What is the scope of the National Cyber Security Policy of  India? Does the draft policy adequately address all of the concerns  within the ambit of cyber security?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.   Would the Draft National Cyber Security Policy of India be  effective in meeting the goal of enhancing cyber security levels in  India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.    How does the Draft National Cyber Security Policy compare to other countries cyber security policies?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Word Limit&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;Abstract:              750-800 words&lt;/p&gt;
&lt;p&gt;Paper:                   2,500 words&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Deadlines:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Abstract Submission:     April 30, 2013&lt;/p&gt;
&lt;p&gt;Paper Submission:        May 15, 2013&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contact Details&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;consilience2013[at]gmail[dot]com&lt;/p&gt;
&lt;p&gt;Mohak Arora:  +91-90359-21926&lt;/p&gt;
&lt;p&gt;Shivam Singla: +91-99167-08701&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each participant is required to submit an abstract on &lt;b&gt;any one&lt;/b&gt; of the seven topics above and can choose the specific issue within the selected topic to discuss.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For additional details, click&lt;b&gt; &lt;a href="http://consilience.co.in/index.php/component/content/article/20-frontpage/310-call-for-papers"&gt;here&lt;/a&gt;.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore'&gt;https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-20T06:15:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
