<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 21 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/transparency-in-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue">
    <title>The Gujarat High Court Judgment on the Snoopgate Issue </title>
    <link>https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Pranlal N. Soni v. State of Gujarat, C/SCA/14389/2014&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the year 2013 the media widely reported that a female civil services officer was regularly spied upon in 2009 due to her acquaintance with the then Chief Minister of Gujarat (and current Prime Minister of India) Mr. Narendra Modi. It was reported that the surveillance was being supervised by the current president of the BJP, Mr. Amit Shah at the behest of Mr. Modi. The case took another twist when the officer and her father said that they had no problems with such surveillance, and had repeatedly conveyed to various statutory authorities including the National Commission for Women, the State Commission for Women, as also before the Hon’ble Supreme Court of India, that they never felt that their privacy was being interfered with by any of the actions of the State Authorities. Infact, para 3.5 of the petition indicated that it was at the behest of the father of the female officer that the State government had carried out the surveillance on his daughter as a security measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Inspite of the repeated claims of the subject of surveillance and her father, the Gujarat Government passed a Notification under the Commissions of Inquiry Act, 1952 appointing a two member Commission of Inquiry to enquire into this incident without jeopardizing the identity or interest of the female officer. This Notification was challenged in the Gujarat High Court by the very same female officer and her father on the ground that it violated their fundamental right to life and liberty. The petitioners claimed that they had to change their residential accommodation four times in the preceding few months due to the constant media glare. The print, electronic and social media, so called social workers and other busybodies constantly intruded into the private life of the petitioners and their family members. The petitioner's email accounts were hacked and scores of indecent calls were received from all over. Under the guise of protecting the petitioner's privacy, every action undertaken by the so called custodians for and on behalf of the petitioners resulted into a breach of privacy of the petitioners, making life impossible for them on a day to day basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After hearing the arguments of the petitioners, including arguments on technical points the Court struck down the Notification issued by the State government to enquire into the issue of the alleged illegal surveillance. However the Court also briefly touched upon the issue of violation of the privacy of the female officer in this whole episode. However, instead of enquiring into whether there was any breach of privacy in the facts of the case, the Court relied upon the statement made by the female officer that whatever surveillance was done did not cause any invasion into her privacy, rather it was the unwelcome media glare that followed the revelations regarding the surveillance which had caused an invasion of her privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus we see that even though the whole snoopgate episode started out as one of “alleged” unwarranted and illegal surveillance this particular judgment is limited only to challenging the validity of the Inquiry Commission appointed by the State Government. In order to challenge the Notification in a PIL the female officer had to show that some fundamental right of hers was violated and in such circumstances privacy is the most obvious fundamental right which was violated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although this judgment talks about privacy, it does not have enough legal analysis of the right to privacy to have any significant ramifications for how privacy is interpreted in the Indian context. The only issue that could possibly be of some importance is that the we could interpret the Court’s reliance on the statement of the female officer that there was no breach of privacy rather than its own examination of facts to mean that in cases of breach of privacy, if the person whose privacy has been breached did not feel his or her privacy to have been invaded then the Courts would rely on the person’s statements rather than the facts. However this is only an interpretation from the facts and it does not seem that the Court has spent any significant amount of time to examine this issue, therefore it may not be prudent to consider this as establishing any legal principle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Note&lt;/b&gt;: The details of the case as well as the judgment can be found at &lt;a href="http://gujarathc-casestatus.nic.in/gujarathc/tabhome.jsp"&gt;http://gujarathc-casestatus.nic.in/gujarathc/tabhome.jsp&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue'&gt;https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-10-27T04:40:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/transparency-in-surveillance">
    <title>Transparency in Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/transparency-in-surveillance</link>
    <description>
        &lt;b&gt;Transparency is an essential need for any democracy to function effectively. It may not be the only requirement for the effective functioning of a democracy, but it is one of the most important principles which need to be adhered to in a democratic state.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A democracy involves the state machinery being 	accountable to the citizens that it is supposed to serve, and for the citizens to be able to hold their state machinery accountable, they need accurate and 	adequate information regarding the activities of those that seek to govern them. However, in modern democracies it is often seen that those in governance 	often try to circumvent legal requirements of transparency and only pay lip service to this principle, while keeping their own functioning as opaque as 	possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This tendency to not give adequate information is very evident in the departments of the government which are concerned with surveillance, and merit can be 	found in the argument that all of the government's clandestine surveillance activities cannot be transparent otherwise they will cease to be "clandestine" 	and hence will be rendered ineffective. However, this argument is often misused as a shield by the government agencies to block the disclosure of all types 	of information about their activities, some of which may be essential to determine whether the current surveillance regime is working in an effective, 	ethical, and legal manner or not. It is this exploitation of the argument, which is often couched in the language of or coupled with concerns of national 	security, that this paper seeks to address while voicing the need for greater transparency in surveillance activities and structures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the first section the paper examines the need for transparency, and specifically deals with the requirement for transparency in surveillance. In the 	next part, the paper discusses the regulations governing telecom surveillance in India. The final part of the paper discusses possible steps that may be 	taken by the government in order to increase transparency in telecom surveillance while keeping in mind that the disclosure of such information should not 	make future surveillance ineffective.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Need for Transparency&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In today's age where technology is all pervasive, the term "surveillance" has developed slightly sinister overtones, especially in the backdrop of the 	Edward Snowden fiasco. Indeed, there have been several independent scandals involving mass surveillance of people in general as well as illegal 	surveillance of specific individuals. The fear that the term surveillance now invokes, especially amongst those social and political activists who seek to 	challenge the status quo, is in part due to the secrecy surrounding the entire surveillance regime. Leaving aside what surveillance is carried out, upon 	whom, and when - the state actors are seldom willing and open to talk about how surveillance is carried out, how decisions regarding who and how to target, 	are reached, how agency budgets are allocated and spent, how effective surveillance actions were, etc. While there may be justified security based 	arguments to not disclose the full extent of the state's surveillance activities, however this cloak of secrecy may be used illegally and in an 	unauthorized manner to achieve ends more harmful to citizen rights than the maintenance of security and order in the society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance and interception/collection of communications data can take place under different legal processes in different countries, ranging from 	court-ordered requests of specified data from telecommunications companies to broad executive requests sent under regimes or regulatory frameworks 	requiring the disclosure of information by telecom companies on a pro-active basis. However, it is an open secret that data collection often takes place 	without due process or under non-legal circumstances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is widely believed that transparency is a critical step towards the creation of mechanisms for increased accountability through which law enforcement 	and government agencies access communications data. It is the first step in the process of starting discussions and an informed public debate regarding how 	the state undertakes activities of surveillance, monitoring and interception of communications and data. Since 2010, a large number of ICT companies have 	begun to publish transparency reports on the extent that governments request their user data as well as requirements to remove content. However, 	governments themselves have not been very forthcoming in providing such detailed information on surveillance programs which is necessary for an informed 	debate on this issue.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; Although some countries currently report limited information on their surveillance 	activities, e.g. the U.S. Department of Justice publishes an annual Wiretap Report (U.S. Courts, 2013a), and the United Kingdom publishes the Interception 	of Communications Commissioner Annual Report (May, 2013), which themselves do not present a complete picture, however even such limited measures are 	unheard of in a country such as India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is obvious that Governments can provide a greater level of transparency regarding the limits in place on the freedom of expression and privacy than 	transparency reports by individual companies. Company transparency reports can only illuminate the extent to which any one company receives requests and 	how that company responds to them. By contrast, government transparency reports can provide a much greater perspective on laws that can potentially restrict the freedom of expression or impact privacy by illustrating the full extent to which requests are made across the ICT industry.	&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, the courts and the laws have traditionally recognized the need for transparency and derive it from the fundamental right to freedom of speech and 	expression guaranteed in our Constitution. This need coupled with a sustained campaign by various organizations finally fructified into the passage of the 	Right to Information Act, 2005, (RTI Act) which amongst other things also places an obligation on the sate to place its documents and records online so 	that the same may be freely available to the public. In light of this law guaranteeing the right to information, the citizens of India have the fundamental 	right to know what the Government is doing in their name. The free flow of information and ideas informs political growth and the freedom of speech and 	expression is the lifeblood of a healthy democracy, it acts as a safety valve. People are more ready to accept the decisions that go against them if they 	can in principle seem to influence them. The Supreme Court of India is of the view that the imparting of information about the working of the government on 	the one hand and its decision affecting the domestic and international trade and other activities on the other is necessary, and has imposed an obligation 	upon the authorities to disclose information.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court, in &lt;i&gt;Namit Sharma&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;,&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; while discussing the importance of 	transparency and the right to information has held:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Right to Information was harnessed as a tool for promoting development; strengthening the democratic governance and effective delivery of 	socio-economic services. 	&lt;i&gt; Acquisition of information and knowledge and its application have intense and pervasive impact on the process of taking informed decision, resulting in 		overall productivity gains &lt;/i&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;……..&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government procedures and regulations shrouded in the veil of secrecy do not allow the litigants to know how their cases are being handled. They shy away 	from questioning the officers handling their cases because of the latters snobbish attitude. Right to information should be guaranteed and needs to be given real substance. In this regard, the Government must assume a major responsibility and mobilize skills to ensure flow of information to citizens.	&lt;i&gt;The traditional insistence on secrecy should be discarded.&lt;/i&gt;"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although these statements were made in the context of the RTI Act the principle which they try to illustrate can be understood as equally applicable to the 	field of state sponsored surveillance. Though Indian intelligence agencies are exempt from the RTI Act, it can be used to provide limited insight into the 	scope of governmental surveillance. This was demonstrated by the Software Freedom Law Centre, who discovered via RTI requests that approximately 7,500 - 	9,000 interception orders are sent on a monthly basis.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is true that transparency alone will not be able to eliminate the barriers to freedom of expression or harm to privacy resulting from overly broad 	surveillance,, transparency provides a window into the scope of current practices and additional measures are needed such as oversight and mechanisms for 	redress in cases of unlawful surveillance. Transparency offers a necessary first step, a foundation on which to examine current practices and contribute to 	a debate on human security and freedom.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is no secret that the current framework of surveillance in India is rife with malpractices of mass surveillance and instances of illegal surveillance. 	There have been a number of instances of illegal and/or unathorised surveillance in the past, the most scandalous and thus most well known is the incident 	where a woman IAS officer was placed under surveillance at the behest of Mr. Amit Shah who is currently the president of the ruling party in India 	purportedly on the instructions of the current prime minister Mr. Narendra Modi.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; There are also a number 	of instances of private individuals indulging in illegal interception and surveillance; in the year 2005, it was reported that Anurag Singh, a private 	detective, along with some associates, intercepted the telephonic conversations of former Samajwadi Party leader Amar Singh. They allegedly contacted 	political leaders and media houses for selling the tapped telephonic conversation records. The interception was allegedly carried out by stealing the genuine government letters and forging and fabricating them to obtain permission to tap Amar Singh's telephonic conversations.	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; The same individual was also implicated for tapping the telephone of the current finance minister Mr. 	Arun Jaitely.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is therefore obvious that the status quo with regard to the surveillance mechanism in India needs to change, but this change has to be brought about in 	a manner so as to make state surveillance more accountable without compromising its effectiveness and addressing legitimate security concerns. Such changes 	cannot be brought about without an informed debate involving all stakeholders and actors associated with surveillance, however the basic minimum 	requirement for an "informed" debate is accurate and sufficient information about the subject matter of the debate. This information is severely lacking in 	the public domain when it comes to state surveillance activities - with most data points about state surveillance coming from news items or leaked 	information. Unless the state becomes more transparent and gives information about its surveillance activities and processes, an informed debate to 	challenge and strengthen the status quo for the betterment of all parties cannot be started.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Current State of Affairs&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Surveillance laws in India are extremely varied and have been in existence since the colonial times, remnants of which are still being utilized by the 	various State Police forces. However in this age of technology the most important tools for surveillance exist in the digital space and it is for this 	reason that this paper shall focus on an analysis of surveillance through interception of telecommunications traffic, whether by tracking voice calls or 	data. The interception of telecommunications actually takes place under two different statutes, the Telegraph Act, 1885 (which deals with interception of 	calls) as well as the Information Technology Act, 2000 (which deals with interception of data).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the telecom surveillance is done as per the procedure prescribed in the Rules under the relevant sections of the two statutes mentioned above,	&lt;i&gt;viz. &lt;/i&gt;Rule 419A of the Telegraph Rules, 1951 for surveillance under the Telegraph Act, 1885 and the Information Technology (Procedure and 	Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 for surveillance under the Information Technology Act, 2000. These Rules put in place various checks and balances and try to ensure that there is a paper trail for every interception request.	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The assumption is that the generation of a paper trail would reduce the number of unauthorized 	interception orders thus ensuring that the powers of interception are not misused. However, even though these checks and balances exist on paper as 	provided in the laws, there is not enough information in the public domain regarding the entire mechanism of interception for anyone to make a judgment on 	whether the system is working or not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As mentioned earlier, currently the only sources of information on interception that are available in the public domain are through news reports and a 	handful of RTI requests which have been filed by various activists.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; The only other institutionalized 	source of information on surveillance in India is the various transparency reports brought out by companies such as Google, Yahoo, Facebook, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, Google was the first major corporation to publish a transparency report in 2010 and has been updating its report ever since. The latest data that 	is available for Google is for the period between January, 2015 to June, 2015 and in that period Google and Youtube together received 3,087 requests for 	data which asked for information on 4,829 user accounts from the Indian Government. Out of these requests Google only supplied information for 44% of the 	requests.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; Although Google claims that they "review each request to make sure that it complies with both 	the spirit and the letter of the law, and we may refuse to produce information or try to narrow the request in some cases", it is not clear why Google 	rejected 56% of the requests. It may also be noted that the number of requests for information that Google received from India were the fifth highest 	amongst all the other countries on which information was given in the Transparency Report, after USA, Germany, France and the U.K.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook's transparency report for the period between January, 2015 to June, 2015 reveals that Facebook received 5,115 requests from the Indian Government 	for 6,268 user accounts, out of which Facebook produced data in 45.32% of the cases.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; Facebook's 	transparency report claims that they respond to requests relating to criminal cases and "Each and every request we receive is checked for legal sufficiency 	and we reject or require greater specificity on requests that are overly broad or vague." However, even in Facebook's transparency report it is unclear why 	55.68% of the requests were rejected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Yahoo transparency report also gives data from the period between January 1, 2015 to June 30, 2015 and reveals that Yahoo received 831 requests for 	data, which related to 1,184 user accounts from the Indian Government. The Yahoo report is a little more detailed and also reveals that 360 of the 831 	requests were rejected by Yahoo, however no details are given as to why the requests were rejected. The report also specifies that in 63 cases, no data was found by Yahoo, in 249 cases only non content data&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; was disclosed while in 159 cases content	&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; was disclosed. The Yahoo report also claims that "We carefully scrutinize each request to make sure 	that it complies with the law, and we push back on those requests that don't satisfy our rigorous standards."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Vodafone Transparency Report gives information regarding government requests for data in other jurisdictions,	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; it does not give any information on government requests in India. This is because Vodafone interprets 	the provisions contained in Rule 25(4) of the IT (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 	(Interception Rules) and Rule 11 of the IT (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009 as well as Rule 	419A(19) of the Indian Telegraph Rules, 1954 which require service providers to maintain confidentiality/secrecy in matters relating to interception, as 	being a legal prohibition on Vodafone to reveal such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the four major companies discussed above, there are a large number of private corporations which have published transparency reports in order to 	acquire a sense of trustworthiness amongst their customers. Infact, the Ranking Digital Rights Project has been involved in ranking some of the biggest 	companies in the world on their commitment to accountability and has brought out the Ranking Digital Rights 2015 Corporate Accountability Index that has 	analysed a representative group of 16 companies "that collectively hold the power to shape the digital lives of billions of people across the globe".&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Suggestions on Transparency&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is clear from the discussions above, as well as a general overview of various news reports on the subject, that telecom surveillance in India is 	shrouded in secrecy and it appears that a large amount of illegal and unauthorized surveillance is taking place behind the protection of this veil of 	secrecy. If the status quo continues, then it is unlikely that any meaningful reforms would take place to bring about greater accountability in the area of 	telecom surveillance. It is imperative, for any sort of changes towards greater accountability to take place, that we have enough information about what 	exactly is happening and for that we need greater transparency since transparency is the first step towards greater accountability.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Transparency Reports&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In very simplistic terms transparency, in anything, can best be achieved by providing as much information about that thing as possible so that there are no 	secrets left. However, it would be naïve to say that all information about interception activities can be made public on the altar of the principle of 	transparency, but that does not mean that there should be no information at all on interception. One of the internationally accepted methods of bringing 	about transparency in interception mechanisms, which is increasingly being adopted by both the private sector as well as governments, is to publish 	Transparency Reports giving various details of interception while keeping security concerns in mind. The two types of transparency reports that we require 	in India and what that would entail is briefly discussed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;By the Government&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem with India's current regime for interception is that the entire mechanism appears more or less adequate on paper with enough checks and 	balances involved in it to prevent misuse of the allotted powers. However, because the entire process is veiled in secrecy, nobody knows exactly how good 	or how rotten the system has become and whether it is working to achieve its intended purposes. It is clear that the current system of interception and 	surveillance being followed by the government has some flaws, as can be gathered from the frequent news articles which talk about incidents of illegal 	surveillance. However, without any other official or more reliable sources of information regarding surveillance activities these anecdotal pieces of 	evidence are all we have to shape the debate regarding surveillance in India. It is only logical then that the debate around surveillance, which is 	informed by such sketchy and unreliable news reports will automatically be biased against the current mechanism since the newspapers would also only be 	interested in reporting the scandalous and the extraordinary incidents. For example, some argue that the government undertakes mass surveillance, while 	others argue that India only carries out targeted surveillance, but there is not enough information publicly available for a third party to support or 	argue against either claim. It is therefore necessary and highly recommended that the government start releasing a transparency report such as the one's 	brought out by the United States and the UK as mentioned above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no need for a separate department or authority just to make the transparency report and this task could probably be performed in-house by any 	department, but considering the sector involved, it would perhaps be best if the Department of Telecommunications is given the responsibility to bring out 	a transparency report. These transparency reports should contain certain minimum amount of data for them to be an effective tool in informing the public 	discourse and debate regarding surveillance and interception. The report needs to strike a balance between providing enough information so that an informed 	analysis can be made of the effectiveness of the surveillance regime without providing so much information so as to make the surveillance activities 	ineffective. Below is a list of suggestions as to what kind of data/information such reports should contain:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Reports should contain data regarding the number of interception orders that have been passed. This statistic would be extremely useful in 	determining how elaborate and how frequently the state indulges in interception activities. This information would be easily available since all 	interception orders have to be sent to the Review Committee set up under Rule 419A of the Telegraph Rules, 1954.&lt;/li&gt;
&lt;li&gt;The Report should contain information on the procedural aspects of surveillance including the delegation of powers to different authorities and 	individuals, information on new surveillance schemes, etc. This information would also be available with the Ministry of Home Affairs since it is a 	Secretary or Joint Secretary level officer in the said Ministry which is supposed to authorize every order for interception.&lt;/li&gt;
&lt;li&gt;The report should contain an aggregated list of reasons given by the authorities for ordering interception. This information would reveal whether 	the authorities are actually ensuring legal justification before issuing interception or are they just paying lip service to the rules to ensure a proper 	paper trail. Since every order of interception has to be in writing, the main reasons for interception can easily be gleaned from a perusal of the orders.&lt;/li&gt;
&lt;li&gt;It should also reveal the percentage of cases where interception has actually found evidence of culpability or been successful in prevention of 	criminal activities. This one statistic would itself give a very good review of the effectiveness of the interception regime. Granted that this information 	may not be very easily obtainable, but it can be obtained with proper coordination with the police and other law enforcement agencies.&lt;/li&gt;
&lt;li&gt;The report should also reveal the percentage of order that have been struck down by the Review Committee as not following the process envisaged 	under the various Rules. This would give a sense of how often the Rules are being flouted while issuing interception orders. This information can easily be 	obtained from the papers and minutes of the meetings of the Review Committee.&lt;/li&gt;
&lt;li&gt;The report should also state the number of times the Review Committee has met in the period being reported upon. The Review Committee is an 	important check on the misuse of powers by the authorities and therefore it is important that the Review Committee carries out its activities in a diligent 	manner.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;It may be noted here that some provisions of the Telegraph Rules, 1954 especially sub-Rules 17 and 18 of Rule 419A as well as Rules 22, 23(1) and 25 of the 	Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009 may need to be amended so as to 	make them compliant with the reporting mechanism proposed above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;By the Private Sector&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have already discussed above the transparency reports published by certain private companies. Suffice it to say that reports from private companies 	should give as much of the information discussed under government reports as possible and/or applicable, since they may not have a large amount of the 	information that is sought to be published in the government reports such as whether the interception was successful, the reasons for interception, etc. It 	is important to have ISPs provide such transparency reports as this will provide two different data points for information on interception and the very 	existence of these private reports may act as a check to ensure the veracity of the government transparency reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As in the case of government reports, for the transparency reports of the private sector to be effective, certain provisions of the Telegraph Rules, 1954 	and the Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009, viz. sub-Rules 14, 15 and 	19 of Rule 419A of the Telegraph Rules, 1954 and Rules 20, 21, 23(1) and 25 of the Information Technology (Procedure and Safeguards for Monitoring and 	Collecting Traffic Data or Information) Rules, 2009.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Overhaul of the Review Committee&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Review Committee which acts as a check on the misuse of powers by the competent authorities is a very important cog in the entire process. However, it 	is staffed entirely by the executive and does not have any members of any other background. Whilst it is probably impractical to have civilian members in 	the Review Committee which has access to potentially sensitive information, it is extremely essential that the Committee has wider representation from 	other sectors specially the judiciary. One or two members from the judiciary on the Review Committee would provide a greater check on the workings of the 	Committee as this would bring in representation from the judicial arm of the State so that the Review Committee does not remain a body manned purely by the 	executive branch. This could go some ways to ensure that the Committee does not just "rubber stamp" the orders of interception issued by the various 	competent authorities.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is not in dispute that there is a need for greater transparency in the government's surveillance activities in order to address the problems associated 	with illegal and unauthorised interceptions. This paper is not making the case that greater transparency in and by itself will be able to solve the 	problems that may be associated with the government's currency interception and surveillance regime, however it is not possible to address any problem 	unless we know the real extent of it. It is essential for an informed debate and discussion that the people participating in the discussion are "informed", 	i.e. they should have accurate and adequate information regarding the issues which are being discussed. The current state of the debate on interception is 	rife with individuals using illustrative and anecdotal evidence which, in the absence of any other evidence, they assume to be the norm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A more transparent and forthcoming state machinery which regularly keeps its citizens abreast of the state of its surveillance regime would be likely to 	get better suggestions and perhaps less criticisms if it does come out that the checks and balances imposed in the regulations are actually making a 	difference to check unauthorized interceptions, and if not, then it is the right of the citizens to know about this and ask for reforms.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; James Losey, "Surveillance of Communications: A Legitimization Crisis and the Need for Transparency",			&lt;i&gt;International Journal of Communication 9(2015)&lt;/i&gt;, Feature 3450-3459, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Namit Sharma v. Union of India,			&lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566&lt;/a&gt; . Although the judgment was overturned on review, however this observation quoted above would still hold as it has not been specifically 			overturned.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;a href="http://sflc.in/wp-content/uploads/2014/09/SFLC-FINAL-SURVEILLANCE-REPORT.pdf"&gt; http://sflc.in/wp-content/uploads/2014/09/SFLC-FINAL-SURVEILLANCE-REPORT.pdf &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; James Losey, "Surveillance of Communications: A Legitimization Crisis and the Need for Transparency",			&lt;i&gt;International Journal of Communication 9 (2015)&lt;/i&gt;, Feature 3450-3459, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;a href="http://gulail.com/the-stalkers/"&gt;http://gulail.com/the-stalkers/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; &lt;a href="http://timesofindia.indiatimes.com/india/Amar-Singh-phone-tap-accused-tracked-Arun-Jaitleys-mobile/articleshow/18582508.cms"&gt; http://timesofindia.indiatimes.com/india/Amar-Singh-phone-tap-accused-tracked-Arun-Jaitleys-mobile/articleshow/18582508.cms &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; &lt;a href="http://ibnlive.in.com/news/arun-jaitley-phonetapping-case-all-accused-get-bail/394997-37-64.html"&gt; http://ibnlive.in.com/news/arun-jaitley-phonetapping-case-all-accused-get-bail/394997-37-64.html &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; For a detailed discussion of the Rules of interception please see Policy Paper on Surveillance in India, by Vipul Kharbanda, 			&lt;a href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india"&gt; http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; As an example please see 			&lt;a href="http://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india"&gt; http://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="https://www.google.com/transparencyreport/userdatarequests/countries/"&gt; https://www.google.com/transparencyreport/userdatarequests/countries/ &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; &lt;a href="https://govtrequests.facebook.com/country/India/2015-H1/"&gt;https://govtrequests.facebook.com/country/India/2015-H1/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Non-content data (NCD) such as basic subscriber information including the information captured at the time of registration such as an alternate 			e-mail address, name, location, and IP address, login details, billing information, and other transactional information (e.g., "to," "from," and 			"date" fields from email headers).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Data that users create, communicate, and store on or through Yahoo. This could include words in a communication (e.g., Mail or Messenger), photos 			on Flickr, files uploaded, Yahoo Address Book entries, Yahoo Calendar event details, thoughts recorded in Yahoo Notepad or comments or posts on 			Yahoo Answers or any other Yahoo property.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;a href="https://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement/country_by_country.html"&gt; https://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement/country_by_country.html &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/transparency-in-surveillance'&gt;https://cis-india.org/internet-governance/blog/transparency-in-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2016-01-23T15:11:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india">
    <title>Policy Paper on Surveillance in India</title>
    <link>https://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india</link>
    <description>
        &lt;b&gt;This policy brief analyses the different laws regulating surveillance at the State and Central level in India and calls out ways in which the provisions are unharmonized. The brief then provides recommendations for the harmonization of  surveillance law in India.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The current legal framework for surveillance in India is a legacy of the colonial era laws that had been drafted by the British. Surveillance activities by the police are an everyday phenomenon and are included as part of their duties in the various police manuals of the different states. It will become clear from an analysis of the laws and regulations below, that whilst the police manuals cover the aspect of physical surveillance in some detail, they do not discuss the issue of interception of telephone or internet traffic. These issues are dealt with separately under the Telecom Act and the Information Technology Act and the Rules made thereunder, which are applicable to all security agencies and not just the police. Since the Indian laws deal with different aspects of surveillance under different legislations, the regulations dealing with this issue do not have any uniform standards. This paper therefore argues that the need of the hour is to have a single legislation which deals with all aspects of surveillance and interception in one place so that there is uniformity in the laws and practices of surveillance in the entire country.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Legal Regime&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India does not have one integrated policy on surveillance and law enforcement and security agencies have to rely upon a number of different sectoral legislations to carry out their surveillance activities. These include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Police Surveillance under Police Acts and Model Police Manual&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 246(3) of the Constitution of India, read with Entry 2, List II, of the VIIth Schedule, empowers the States to legislate in matters relating to the police. This means that the police force is under the control of the state government rather than the Central government. Consequently, States have their own Police Acts to govern the conduct of the police force. Under the authority of these individual State Police Acts, rules are formulated for day-to-day running of the police. These rules are generally found in the Police Manuals of the individual states. Since a discussion of the Police Manual of each State with its small deviations is beyond the scope of this study, we will discuss the Model Police Manual issued by the Bureau of Police Research and Development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the Model Police Manual, “surveillance and checking of bad characters” is considered to be one of the duties of the police force mentioned in the “Inventory of Police Duties, Functions and Jobs”.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; Surveillance is also one of the main methods utilized by the police for preventing law and order situations and crimes.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; As per the Manual the nature and degree of surveillance depends on the circumstances and persons on whom surveillance is mounted and it is only in very rare cases and on rare occasions that round the clock surveillance becomes necessary for a few days or weeks.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Surveillance of History Sheeted Persons&lt;/i&gt;: Beat Police Officers should be fully conversant with the movements or changes of residence of all persons for whom history sheets of any category are maintained. They are required to promptly report the exact information to the Station House Officer (SHO), who make entries in the relevant registers. The SHO on the basis of this information reports, by the quickest means, to the SHO in whose jurisdiction the concerned person/persons are going to reside or pass through. When a history-sheeted person is likely to travel by the Railway, intimation of his movements should also be given to the nearest Railway Police Station.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; It must be noted that the term “history sheet” or “history sheeter” is not defined either in the Indian Penal Code, 1860, most of the State Police Acts or the Model Police Manual, but it is generally understood and defined in the Oxford English Dictionary as persons with a criminal record.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Surveillance of “Bad Characters”&lt;/i&gt;: Keeping tabs on and getting information regarding “bad characters” is part of the duties of a beat constable. In the case of a “bad character” who is known to have gone to another State, the SHO of the station in the other state is informed using the quickest means possible followed by sending of a BC Roll 'A' directly to the SHO.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; When a “bad character” absents himself or goes out of view, whether wanted in a case or not, the information is required to be disseminated to the police stations having jurisdiction over the places likely to be visited by him and also to the neighbouring stations, whether within the State or outside. If such person is traced and intimation is received of his arrest or otherwise, arrangements to get a complete and true picture of his activities are required to be made and the concerned record updated.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Police Manual clarifies the term “bad characters” to mean “offenders, criminals, or members of organised crime gangs or syndicates or those who foment or incite caste, communal violence, for which history sheets are maintained and require surveillance.”&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; A fascinating glimpse into the history of persons who were considered to be “bad characters” is contained in the article by Surjan Das &amp;amp; Basudeb Chattopadhyay in EPW&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; wherein they bring out the fact that in colonial times a number of the stereotypes propagated by the British crept into their police work as well. It appears that one did not have to be convicted to be a bad character, but people with a dark complexion, strong built, broad chins, deep-set eyes, broad forehead, short hair, scanty or goatee beard, marks on face, moustache, blunt nose, white teeth and monkey-face would normally fit the description of “bad characters”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Surveillance of Suspicious Strangers&lt;/i&gt;: When a stranger of suspicious conduct or demeanour is found within the limits of a police station, the SHO is required to forward a BC Roll to the Police Station in whose jurisdiction the stranger claims to have resided. The receipt of such a roll is required to be immediately acknowledged and replied. If the suspicious stranger states that he resides in another State, a BC Roll is sent directly to the SHO of the station in the other State.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The manual however, does not define who a “suspicious stranger” is and how to identify one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Release of Foreign Prisoners&lt;/i&gt;: Before a foreign prisoner (whose finger prints are taken for record) is released the Superintendent of Police of the district where the case was registered is required to send a report to the Director, I.B. through the Criminal Investigation Department informing the route and conveyance by which such person is likely to leave the country.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Shadowing of convicts and dangerous persons:&lt;/i&gt; The Police Manual contains the following rules for shadowing the convicts on their release from jails:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Dangerous convicts who are not likely to return to their native places are required to be shadowed. The fact, when a convict is to be shadowed is entered in the DCRB in the FP register and communicated to the Superintendent of Jails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) The Police Officer deputed for shadowing an ex-convict is required to enter the fact in the notebook. The Police Officers area furnished with a challan indicating the particulars of the ex-convict marked for shadowing. This form is returned by the SHO of the area where the ex-convict takes up his residence or passes out of view to the DCRB / OCRS where the jail is situated, where it is put on record for further reference and action if any. Even though the subjects being shadowed are kept in view, no restraint is to put upon their movements on any account.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the provisions discussed above, there are also provisions in the Police Manual regarding surveillance of convicts who have been released on medical grounds as well as surveillance of ex-convicts who are required to report their movements to the police as per the provisions of section 356 of the Code of Criminal Procedure.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted above, the various police manuals are issued under the State Police Acts and they govern the police force of the specific states. The fact that each state has its own individual police manual itself leads to non-uniformity regarding standards and practices of surveillance. But it is not only the legislations at the State levels which lead to this problem, even legislation at the Central level, which are applicable to the country as a whole also have differing standards regarding different aspects of surveillance. In order to explore this further, we shall now discuss the central legislations dealing with surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. The Indian Telegraph Act, 1885&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 5 of the Indian Telegraph Act, 1885, empowers the Central Government and State Governments of India to order the interception of messages in two circumstances: (1) in the occurrence of any public emergency or in the interest of public safety, and (2) if it is considered necessary or expedient to do so in the interest of:&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;the sovereignty and integrity of India; or&lt;/li&gt;
&lt;li&gt;the security of the State; or&lt;/li&gt;
&lt;li&gt;friendly relations with foreign states; or&lt;/li&gt;
&lt;li&gt;public order; or&lt;/li&gt;
&lt;li&gt;for preventing incitement to the commission of an offence.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court of India has specified the terms 'public emergency' and 'public safety', based on the following&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"Public emergency would mean the prevailing of a sudden condition or state of affairs affecting the people at large calling for immediate action. The expression 'public safety' means the state or condition of freedom from danger or risk for the people at large. When either of these two conditions are not in existence, the Central Government or a State Government or the authorised officer cannot resort to telephone tapping even though there is satisfaction that it is necessary or expedient so to do in the interests of it sovereignty and integrity of India etc. In other words, even if the Central Government is satisfied that it is necessary or expedient so to do in the interest of the sovereignty and integrity of India or the security of the State or friendly relations with sovereign States or in public order or for preventing incitement to the commission of an offence, it cannot intercept the message, or resort to telephone tapping unless a public emergency has occurred or the interest of public safety or the existence of the interest of public safety requires. Neither the occurrence of public emergency nor the interest of public safety are secretive conditions or situations. Either of the situations would be apparent to a reasonable person."&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2007, Rule 419A was added to the Indian Telegraph Rules, 1951 framed under the Indian Telegraph Act which provided that orders on the interception of communications should only be issued by the Secretary in the Ministry of Home Affairs. However, it provided that in unavoidable circumstances an order could also be issued by an officer, not below the rank of a Joint Secretary to the Government of India, who has been authorised by the Union Home Secretary or the State Home Secretary.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Rule 419A, the interception of any message or class of messages is to be carried out with the prior approval of the Head or the second senior most officer of the authorised security agency at the Central Level and at the State Level with the approval of officers authorised in this behalf not below the rank of Inspector General of Police, in the belowmentioned emergent cases:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;in remote areas, where obtaining of prior directions for interception of messages or class of messages is not feasible; or&lt;/li&gt;
&lt;li&gt;for operational reasons, where obtaining of prior directions for interception of message or class of messages is not feasible;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;however, the concerned competent authority is required to be informed of such interceptions by the approving authority within three working days and such interceptions are to be confirmed by the competent authority within a period of seven working days. If the confirmation from the competent authority is not received within the stipulated seven days, such interception should cease and the same message or class of messages should not be intercepted thereafter without the prior approval of the Union Home Secretary or the State Home Secretary.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 419A also tries to incorporate certain safeguards to curb the risk of unrestricted surveillance by the law enforcement authorities which include the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Any order for interception issued by the competent authority should contain reasons for such direction and a copy of such an order should be forwarded to the Review Committee within a period of seven working days;&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Directions for interception should be issued only when it is not possible to acquire the information by any other reasonable means;&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The directed interception should include the interception of any message or class of messages that are sent to or from any person n or class of persons or relating to any particular subject whether such message or class of messages are received with one or more addresses, specified in the order being an address or addresses likely to be used for the transmission of communications from or to one particular person specified or described in the order or one particular set of premises specified or described in the order;&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The interception directions should specify the name and designation of the officer or the authority to whom the intercepted message or class of messages is to be disclosed to;&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The directions for interception would remain in force for sixty days, unless revoked earlier, and may be renewed but the same should not remain in force beyond a total period of one hundred and eighty days;&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The directions for interception should be conveyed to the designated officers of the licensee(s) in writing by an officer not below the rank of Superintendent of Police or Additional Superintendent of Police or the officer of the equivalent rank;&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The officer authorized to intercept any message or class of messages should maintain proper records mentioning therein, the intercepted message or class of messages, the particulars of persons whose message has been intercepted, the name and other particulars of the officer or the authority to whom the intercepted message or class of messages has been disclosed, etc.;&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;All the requisitioning security agencies should designate one or more nodal officers not below the rank of Superintendent of Police or the officer of the equivalent rank to authenticate and send the requisitions for interception to the designated officers of the concerned service providers to be delivered by an officer not below the rank of Sub-Inspector of Police;&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Records pertaining to directions for interception and of intercepted messages should be destroyed by the competent authority and the authorized security and Law Enforcement Agencies every six months unless these are, or likely to be, required for functional requirements;&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;According to Rule 419A, service providers \are required by law enforcement to intercept communications are required to comply with the following&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Service providers should designate two senior executives of the company in every licensed service area/State/Union Territory as the nodal officers to receive and handle such requisitions for interception;&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The designated nodal officers of the service providers should issue acknowledgment letters to the concerned security and Law Enforcement Agency within two hours on receipt of intimations for interception;&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The system of designated nodal officers for communicating and receiving the requisitions for interceptions should also be followed in emergent cases/unavoidable cases where prior approval of the competent authority has not been obtained;&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The designated nodal officers of the service providers should forward every fifteen days a list of interception authorizations received by them during the preceding fortnight to the nodal officers of the security and Law Enforcement Agencies for confirmation of the authenticity of such authorizations;&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Service providers are required to put in place adequate and effective internal checks to ensure that unauthorized interception of messages does not take place, that extreme secrecy is maintained and that utmost care and precaution is taken with regards to the interception of messages;&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Service providers are held responsible for the actions of their employees. In the case of an established violation of license conditions pertaining to the maintenance of secrecy and confidentiality of information and unauthorized interception of communication, action shall be taken against service providers as per the provisions of the Indian Telegraph Act, and this shall not only include a fine, but also suspension or revocation of their license;&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Service providers should destroy records pertaining to directions for the interception of messages within two months of discontinuance of the interception of such messages and in doing so they should maintain extreme secrecy.&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Review Committee&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 419A of the Indian Telegraph Rules requires the establishment of a Review Committee by the Central Government and the State Government, as the case may be, for the interception of communications, as per the following conditions:&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) The Review Committee to be constituted by the Central Government shall consist of the following members, namely:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Cabinet Secretary - Chairman&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Secretary to the Government of India in charge, Legal Affairs - Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) Secretary to the Government of India, Department of Telecommunications – Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Review Committee to be constituted by a State Government shall consist of the following members, namely:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Chief Secretary – Chairman&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Secretary Law/Legal Remembrancer in charge, Legal Affairs – Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) Secretary to the State Government (other than the Home Secretary) – Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The Review Committee meets at least once in two months and records its findings on whether the issued interception directions are in accordance with the provisions of sub-section (2) of Section 5 of the Indian Telegraph Act. When the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above it may set aside the directions and order for destruction of the copies of the intercepted message or class of messages;&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be noted that the Unlawful Activities (Prevention) Act, 1967, (which is currently used against most acts of urban terrorism) also allows for the interception of communications but the procedures and safeguards are supposed to be the same as under the Indian Telegraph Act and the Information Technology Act.&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Telecom Licenses&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The telecom sector in India has seen immense activity in the last two decades ever since it was opened up to private competition. These last twenty years have seen a lot of turmoil and have offered a tremendous learning opportunity for the private players as well as the governmental bodies regulating the sector. Currently any entity wishing to get a telecom license is offered a UL (Unified License) which contains terms and conditions for all the services that a licensee may choose to offer. However there were a large number of other licenses before the current regime, and since the licenses have a long phase out, we have tried to cover what we believe are the four most important licenses issued to telecom operators starting with the CMTS License:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cellular Mobile Telephony Services (CMTS) License&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of National Telecom Policy (NTP)-1994, the first phase of liberalization in mobile telephone service started with issue of 8 licenses for Cellular Mobile Telephony Services (CMTS) in the 4 metro cities of Delhi, Mumbai, Calcutta and Chennai to 8 private companies in November 1994. Subsequently, 34 licenses for 18 Territorial Telecom Circles were also issued to 14 private companies during 1995 to 1998. During this period a maximum of two licenses were granted for CMTS in each service area and these licensees were called 1st &amp;amp; 2nd cellular licensees.&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt; Consequent upon announcement of guidelines for Unified Access (Basic &amp;amp; Cellular) Services licenses on 11.11.2003, some of the CMTS operators were permitted to migrate from CMTS License to Unified Access Service License (UASL) but currently no new CMTS and Basic service licenses are being awarded after issuing the guidelines for Unified Access Service Licence (UASL).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The important provisions regarding surveillance in the CMTS License are listed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for Interception&lt;/i&gt;: The CMTS License requires the Licensee to provide necessary facilities to the designated authorities for interception of the messages passing through its network.&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring of Telecom Traffic&lt;/i&gt;: The designated person of the Central/State Government as conveyed to the Licensor from time to time in addition to the Licensor or its nominee have the right to monitor the telecommunication traffic in every MSC or any other technically feasible point in the network set up by the licensee. The Licensee is required to make arrangement for monitoring simultaneous calls by Government security agencies. The hardware at licensee’s end and software required for monitoring of calls shall be engineered, provided/installed and maintained by the Licensee at licensee’s cost. In case the security agencies intend to locate the equipment at licensee’s premises for facilitating monitoring, the licensee is required to extend all support in this regard including space and entry of the authorised security personnel. The interface requirements as well as features and facilities as defined by the Licensor are to be implemented by the licensee for both data and speech. The Licensee is also required to ensure suitable redundancy in the complete chain of Monitoring equipment for trouble free operations of monitoring of at least 210 simultaneous calls.&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring Records to be maintained:&lt;/i&gt; Along with the monitored call following records are to be made available:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Called/calling party mobile/PSTN numbers.&lt;/li&gt;
&lt;li&gt;Time/date and duration of interception.&lt;/li&gt;
&lt;li&gt;Location of target subscribers. Cell ID should be provided for location of the target subscriber. However, Licensor may issue directions from time to time on the precision of location, based on technological developments and integration of Global Positioning System (GPS) which shall be binding on the LICENSEE.&lt;/li&gt;
&lt;li&gt;Telephone numbers if any call-forwarding feature has been invoked by target subscriber.&lt;/li&gt;
&lt;li&gt;Data records for even failed call attempts.&lt;/li&gt;
&lt;li&gt;CDR (Call Data Record) of Roaming Subscriber.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to provide the call data records of all the specified calls handled by the system at specified periodicity, as and when required by the security agencies.&lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Protection of Privacy&lt;/i&gt;: It is the responsibility of the Licensee to ensure the protection of privacy of communication and ensure unathorised interception of messages does not take place.&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;License Agreement for Provision of Internet Services (ISP License)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet services were launched in India on 15th August, 1995 by Videsh Sanchar Nigam Limited. In November, 1998, the Government opened up the sector for providing Internet services by private operators. The major provisions dealing with surveillance contained in the ISP License are given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Authorization for monitoring&lt;/i&gt;: Monitoring shall only be by the authorization of the Union Home Secretary or Home Secretaries of the States/Union Territories.&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Access to subscriber list by authorized intelligence agencies and licensor&lt;/i&gt;: The complete and up to date list of subscribers will be made available by the ISP on a password protected website – accessible to authorized intelligence agencies.&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt; Information such as customer name, IP address, bandwidth provided, address of installation, data of installation, contact number and email of leased line customers shall be included in the website.&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt; The licensor or its representatives will also have access to the Database relating to the subscribers of the ISP which is to be available at any instant.&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Right to monitor by the central/state government&lt;/i&gt;: The designated person of the central/state government or the licensor or nominee will have the right to monitor telecommunications traffic in every node or any other technically feasible point in the network. To facilitate this, the ISP must make arrangements for the monitoring of simultaneous calls by the Government or its security agencies.&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Right of DoT to monitor&lt;/i&gt;: DoT will have the ability to monitor customers who generate high traffic value and verify specified user identities on a monthly basis.&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of mirror images:&lt;/i&gt; Mirror images of the remote access information should be made available online for monitoring purposes.&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt; A safeguard provided for in the license is that remote access to networks is only allowed in areas approved by the DOT in consultation with the Security Agencies.&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of information stored on dedicated transmission link:&lt;/i&gt; The ISP will provide the login password to DOT and authorized Government agencies on a monthly basis for access to information stored on any dedicated transmission link from ISP node to subscriber premises.&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of subscriber identity and geographic location:&lt;/i&gt; The ISP must provide the traceable identity and geographic location of their subscribers, and if the subscriber is roaming – the ISP should try to find traceable identities of roaming subscribers from foreign companies.&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for monitoring:&lt;/i&gt; The ISP must provide the necessary facilities for continuous monitoring of the system as required by the licensor or its authorized representatives.&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for tracing&lt;/i&gt;: The ISP will also provide facilities for the tracing of nuisance, obnoxious or malicious calls, messages, or communications. These facilities are to be provided specifically to authorized officers of the Government of India (police, customs, excise, intelligence department) when the information is required for investigations or detection of crimes and in the interest of national security.&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities and equipment to be specified by government:&lt;/i&gt; The types of interception equipment to be used will be specified by the government of India.&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt; This includes the installation of necessary infrastructure in the service area with respect to Internet Telephony Services offered by the ISP including the processing, routing, directing, managing, authenticating the internet calls including the generation of Call Details Record, IP address, called numbers, date, duration, time, and charge of the internet telephony calls.&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for surveillance of mobile terminal activity&lt;/i&gt;: The ISP must also provide the government facilities to carry out surveillance of Mobile Terminal activity within a specified area whenever requested.&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for monitoring international gateway:&lt;/i&gt; As per the requirements of security agencies, every international gateway location having a capacity of 2 Mbps or more will be equipped will have a monitoring center capable of monitoring internet telephony traffic.&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for monitoring in the premise of the ISP&lt;/i&gt;: Every office must be at least 10x10 with adequate power, air conditioning, and accessible only to the monitoring agencies. One local exclusive telephone line must be provided, and a central monitoring center must be provided if the ISP has multiple nodal points.&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Protection of privacy&lt;/i&gt;: There is a responsibility on the ISP to protect the privacy of its communications transferred over its network. This includes securing the information and protecting against unauthorized interception, unauthorized disclosure, ensure the confidentiality of information, and protect against over disclosure of information- except when consent has been given.&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Log of users:&lt;/i&gt; Each ISP must maintain an up to date log of all users connected and the service that they are using (mail, telnet, http, etc). The ISPs must also log every outward login or telnet through their computers. These logs as well as copies of all the packets must be made available in real time to the Telecom Authority.&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Log of internet leased line customers:&lt;/i&gt; A record of each internet leased line customer should be kept along with details of connectivity, and reasons for taking the link should be kept and made readily available for inspection.&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Log of remote access activities:&lt;/i&gt; The ISP will also maintain a complete audit trail of the remote access activities that pertain to the network for at least six months. This information must be available on request for any agency authorized by the licensor.&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring requirements&lt;/i&gt;: The ISP must make arrangements for the monitoring of the telecommunication traffic in every MSC exchange or any other technically feasible point, of at least 210 calls simultaneously.&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Records to be made available&lt;/i&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;CDRS&lt;/i&gt;: When required by security agencies, the ISP must make available records of i) called/calling party mobile/PSTN numbers ii) time/date and duration of calls iii) location of target subscribers and from time to time precise location iv) telephone numbers – and if any call forwarding feature has been evoked – records thereof v) data records for failed call attempts vi) CDR of roaming subscriber.&lt;a href="#_ftn64" name="_ftnref64"&gt;[64]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Bulk connections&lt;/i&gt;: On a monthly basis, and from time to time, information with respect to bulk connections shall be forwarded to DoT, the licensor, and security agencies.&lt;a href="#_ftn65" name="_ftnref65"&gt;[65]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Record of calls beyond specified threshold&lt;/i&gt;: Calls should be checked, analyzed, and a record maintained of all outgoing calls made by customers both during the day and night that exceed a set threshold of minutes. A list of suspected subscribers should be created by the ISP and should be informed to DoT and any officer authorized by the licensor at any point of time.&lt;a href="#_ftn66" name="_ftnref66"&gt;[66]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Record of subscribers with calling line identification restrictions&lt;/i&gt;: Furthermore, a list of calling line identification restriction subscribers with their complete address and details should be created on a password protected website that is available to authorized government agencies.&lt;a href="#_ftn67" name="_ftnref67"&gt;[67]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Unified Access Services (UAS) License&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unified Access Services operators provide services of collection, carriage, transmission and delivery of voice and/or non-voice messages within their area of operation, over the Licensee’s network by deploying circuit and/or packet switched equipment. They may also provide Voice Mail, Audiotex services, Video Conferencing, Videotex, E-Mail, Closed User Group (CUG) as Value Added Services over its network to the subscribers falling within its service area on a non-discriminatory basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The terms of providing the services are regulated under the Unified Access Service License (UASL) which also contains provisions regarding surveillance/interception. These provisions are regularly used by the state agencies to intercept telephonic and data traffic of subscribers. The relevant terms of the UASL dealing with surveillance and interception are discussed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Confidentiality of Information&lt;/i&gt;: The Licensee cannot employ bulk encryption equipment in its network. Any encryption equipment connected to the Licensee’s network for specific requirements has to have prior evaluation and approval of the Licensor or officer specially designated for the purpose. However, any encryption equipment connected to the Licensee’s network for specific requirements has to have prior evaluation and approval of the Licensor or officer specially designated for the purpose. However, the Licensee has the responsibility to ensure protection of privacy of communication and to ensure that unauthorised interception of messages does not take place.&lt;a href="#_ftn68" name="_ftnref68"&gt;[68]&lt;/a&gt; The Licensee shall take necessary steps to ensure that the Licensee and any person(s) acting on its behalf observe confidentiality of customer information.&lt;a href="#_ftn69" name="_ftnref69"&gt;[69]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Responsibility of the Licensee:&lt;/i&gt; The Licensee has to take all necessary steps to safeguard the privacy and confidentiality of any information about a third party and its business to whom it provides the service and from whom it has acquired such information by virtue of the service provided and shall use its best endeavors to secure that :&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;No person acting on behalf of the Licensee or the Licensee divulges or uses any such information except as may be necessary in the course of providing such service to the third party; and&lt;/li&gt;
&lt;li&gt;No such person seeks such information other than is necessary for the purpose of providing service to the third party.&lt;a href="#_ftn70" name="_ftnref70"&gt;[70]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of monitoring facilities&lt;/i&gt;: Requisite monitoring facilities /equipment for each type of system used, shall be provided by the service provider at its own cost for monitoring as and when required by the licensor.&lt;a href="#_ftn71" name="_ftnref71"&gt;[71]&lt;/a&gt; The license also requires the Licensee to provide necessary facilities to the designated authorities for interception of the messages passing through its network.&lt;a href="#_ftn72" name="_ftnref72"&gt;[72]&lt;/a&gt; The licensor in this case is the President of India, as the head of the State, therefore all references to the term licensor can be assumed to be to the government of India (which usually acts through the department of telecom (DOT). For monitoring traffic, the licensee company has to provide access of their network and other facilities as well as to books of accounts to the security agencies.&lt;a href="#_ftn73" name="_ftnref73"&gt;[73]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring by Designated Person:&lt;/i&gt; The designated person of the Central/ State Government as conveyed to the Licensor from time to time in addition to the Licensor or its nominee has the right to monitor the telecommunication traffic in every MSC/Exchange/MGC/MG&lt;b&gt; &lt;/b&gt;or any other technically feasible point in the network set up by the Licensee. The Licensee is required to make arrangement for monitoring simultaneous calls by Government security agencies. The hardware at Licensee’s end and software required for monitoring of calls shall be engineered, provided/installed and maintained by the Licensee at Licensee’s cost. However, the respective Government instrumentality bears the cost of user end hardware and leased line circuits from the MSC/ Exchange/MGC/MG&lt;b&gt; &lt;/b&gt;to the monitoring centres to be located as per their choice in their premises or in the premises of the Licensee. In case the security agencies intend to locate the equipment at Licensee’s premises for facilitating monitoring, the Licensee should extend all support in this regard including space and entry of the authorized security personnel. The Licensee is required to implement the interface requirements as well as features and facilities as defined by the Licensor for both data and speech. The Licensee is to ensure suitable redundancy in the complete chain of Monitoring equipment for trouble free operations of monitoring of at least 210 simultaneous calls for seven security agencies.&lt;a href="#_ftn74" name="_ftnref74"&gt;[74]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring Records to be maintained:&lt;/i&gt; Along with the monitored call following records are to be made available:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Called/calling party mobile/PSTN numbers.&lt;/li&gt;
&lt;li&gt;Time/date and duration of interception.&lt;/li&gt;
&lt;li&gt;Location of target subscribers. Cell ID should be provided for location of the target subscriber. However, Licensor may issue directions from time to time on the precision of location, based on technological developments and integration of Global Positioning System (GPS) which shall be binding on the LICENSEE.&lt;/li&gt;
&lt;li&gt;Telephone numbers if any call-forwarding feature has been invoked by target subscriber.&lt;/li&gt;
&lt;li&gt;Data records for even failed call attempts.&lt;/li&gt;
&lt;li&gt;CDR (Call Data Record) of Roaming Subscriber.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to provide the call data records of all the specified calls handled by the system at specified periodicity, as and when required by the security agencies.&lt;a href="#_ftn75" name="_ftnref75"&gt;[75]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;List of Subscribers:&lt;/i&gt; The complete list of subscribers shall be made available by the Licensee on their website (having password controlled access), so that authorized Intelligence Agencies are able to obtain the subscriber list at any time, as per their convenience with the help of the password.&lt;a href="#_ftn76" name="_ftnref76"&gt;[76]&lt;/a&gt; The Licensor or its representative(s) have an access to the Database relating to the subscribers of the Licensee. The Licensee shall also update the list of his subscribers and make available the same to the Licensor at regular intervals. The Licensee shall make available, at any prescribed instant, to the Licensor or its authorized representative details of the subscribers using the service.&lt;a href="#_ftn77" name="_ftnref77"&gt;[77]&lt;/a&gt; The Licensee must provide traceable identity of their subscribers,&lt;a href="#_ftn78" name="_ftnref78"&gt;[78]&lt;/a&gt; and should be able to provide the geographical location (BTS location) of any subscriber at a given point of time, upon request by the Licensor or any other agency authorized by it.&lt;a href="#_ftn79" name="_ftnref79"&gt;[79]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CDRs for Large Number of Outgoing Calls:&lt;/i&gt; The call detail records for outgoing calls made by subscribers making large number of outgoing calls day and night and to the various telephone numbers should be analyzed. Normally, no incoming call is observed in such cases. This can be done by running special programs for this purpose.&lt;a href="#_ftn80" name="_ftnref80"&gt;[80]&lt;/a&gt; Although this provision itself does not say that it is limited to bulk subscribers (subscribers with more than 10 lines), it is contained as a sub-clause of section 41.19 which talks about specific measures for bulk subscribers, therefore it is possible that this provision is limited only to bulk subscribers and not to all subscribers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;No Remote Access to Suppliers&lt;/i&gt;: Suppliers/manufacturers and affiliate(s) are not allowed any remote access to the be enabled to access Lawful Interception System(LIS), Lawful Interception Monitoring(LIM), Call contents of the traffic and any such sensitive sector/data, which the licensor may notify from time to time, under any circumstances.&lt;a href="#_ftn81" name="_ftnref81"&gt;[81]&lt;/a&gt; The Licensee is also not allowed to use remote access facility for monitoring of content.&lt;a href="#_ftn82" name="_ftnref82"&gt;[82]&lt;/a&gt; Further, suitable technical device is required to be made available at Indian end to the designated security agency/licensor in which a mirror image of the remote access information is available on line for monitoring purposes.&lt;a href="#_ftn83" name="_ftnref83"&gt;[83]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring as per the Rules under Telegraph Act&lt;/i&gt;: In order to maintain the privacy of voice and data, monitoring shall be in accordance with rules in this regard under Indian Telegraph Act, 1885.&lt;a href="#_ftn84" name="_ftnref84"&gt;[84]&lt;/a&gt; It interesting to note that the monitoring under the UASL license is required to be as per the Rules prescribed under the Telegraph Act, but no mention is made of the Rules under the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring from Centralised Location&lt;/i&gt;: The Licensee has to ensure that necessary provision (hardware/ software) is available in its equipment for doing lawful interception and monitoring from a centralized location.&lt;a href="#_ftn85" name="_ftnref85"&gt;[85]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Unified License (UL)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Telecom Policy - 2012 recognized the fact that the evolution from analog to digital technology has facilitated the conversion of voice, data and video to the digital form which are increasingly being rendered through single networks bringing about a convergence in networks, services and devices. It was therefore felt imperative to move towards convergence between various services, networks, platforms, technologies and overcome the incumbent segregation of licensing, registration and regulatory mechanisms in these areas. It was for this reason that the Government of India decided to move to the Unified License regime under which service providers could opt for all or any one or more of a number of different services.&lt;a href="#_ftn86" name="_ftnref86"&gt;[86]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of interception facilities by Licensee&lt;/i&gt;: The UL requires that the requisite monitoring/ interception facilities /equipment for each type of service, should be provided by the Licensee at its own cost for monitoring as per the requirement specified by the Licensor from time to time.&lt;a href="#_ftn87" name="_ftnref87"&gt;[87]&lt;/a&gt; The Licensee is required to provide necessary facilities to the designated authorities of Central/State Government as conveyed by the Licensor from time to time for interception of the messages passing through its network, as per the provisions of the Indian Telegraph Act.&lt;a href="#_ftn88" name="_ftnref88"&gt;[88]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Bulk encryption and unauthorized interception&lt;/i&gt;: The UL prohibits the Licensee from employing bulk encryption equipment in its network. Licensor or officers specially designated for the purpose are allowed to evaluate any encryption equipment connected to the Licensee’s network. However, it is the responsibility of the Licensee to ensure protection of privacy of communication and to ensure that unauthorized interception of messages does not take place.&lt;a href="#_ftn89" name="_ftnref89"&gt;[89]&lt;/a&gt; The use of encryption by the subscriber shall be governed by the Government Policy/rules made under the Information Technology Act, 2000.&lt;a href="#_ftn90" name="_ftnref90"&gt;[90]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Safeguarding of Privacy and Confidentiality&lt;/i&gt;: The Licensee shall take necessary steps to ensure that the Licensee and any person(s) acting on its behalf observe confidentiality of customer information.&lt;a href="#_ftn91" name="_ftnref91"&gt;[91]&lt;/a&gt; Subject to terms and conditions of the license, the Licensee is required to take all necessary steps to safeguard the privacy and confidentiality of any information about a third party and its business to whom it provides services and from whom it has acquired such information by virtue of the service provided and shall use its best endeavors to secure that: a) No person acting on behalf of the Licensee or the Licensee divulges or uses any such information except as may be necessary in the course of providing such service; and b) No such person seeks such information other than is necessary for the purpose of providing service to the third party.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided the above para does not apply where: a) The information relates to a specific party and that party has consented in writing to such information being divulged or used, and such information is divulged or used in accordance with the terms of that consent; or b) The information is already open to the public and otherwise known.&lt;a href="#_ftn92" name="_ftnref92"&gt;[92]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;No Remote Access to Suppliers&lt;/i&gt;: Suppliers/manufacturers and affiliate(s) are not allowed any remote access to the be enabled to access Lawful Interception System(LIS), Lawful Interception Monitoring(LIM), Call contents of the traffic and any such sensitive sector/data, which the licensor may notify from time to time, under any circumstances.&lt;a href="#_ftn93" name="_ftnref93"&gt;[93]&lt;/a&gt; The Licensee is also not allowed to use remote access facility for monitoring of content.&lt;a href="#_ftn94" name="_ftnref94"&gt;[94]&lt;/a&gt; Further, suitable technical device is required to be made available at Indian end to the designated security agency/licensor in which a mirror image of the remote access information is available on line for monitoring purposes.&lt;a href="#_ftn95" name="_ftnref95"&gt;[95]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring as per the Rules under Telegraph Act&lt;/i&gt;: In order to maintain the privacy of voice and data, monitoring shall be in accordance with rules in this regard under Indian Telegraph Act, 1885.&lt;a href="#_ftn96" name="_ftnref96"&gt;[96]&lt;/a&gt; Just as in the UASL, the monitoring under the UL license is required to be as per the Rules prescribed under the Telegraph Act, but no mention is made of the Rules under the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Terms specific to various services &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the UL License intends to cover all services under a single license, in addition to the general terms and conditions for interception, it also has terms for each specific service. We shall now discuss the terms for interception specific to each service offered under the Unified License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Access Service&lt;/i&gt;: The designated person of the Central/ State Government, in addition to the Licensor or its nominee, shall have the right to monitor the telecommunication traffic in every MSC/ Exchange/ MGC/ MG/ Routers or any other technically feasible point in the network set up by the Licensee. The Licensee is required to make arrangement for monitoring simultaneous calls by Government security agencies. For establishing connectivity to Centralized Monitoring System, the Licensee at its own cost shall provide appropriately dimensioned hardware and bandwidth/dark fibre upto a designated point as required by Licensor from time to time. In case the security agencies intend to locate the equipment at Licensee’s premises for facilitating monitoring, the Licensee should extend all support in this regard including space and entry of the authorized security personnel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Interface requirements as well as features and facilities as defined by the Licensor should be implemented by the Licensee for both data and speech. The Licensee should ensure suitable redundancy in the complete chain of Lawful Interception and Monitoring equipment for trouble free operations of monitoring of at least 480 simultaneous calls as per requirement with at least 30 simultaneous calls for each of the designated security/ law enforcement agencies. Each MSC of the Licensee in the service area shall have the capacity for provisioning of at least 3000 numbers for monitoring. Presently there are ten (10) designated security/ law enforcement agencies. The above capacity provisions and no. of designated security/ law enforcement agencies may be amended by the Licensor separately by issuing instructions at any time&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along with the monitored call following records are to be made available:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Called/calling party mobile/PSTN numbers.&lt;/li&gt;
&lt;li&gt;Time/date and duration of interception.&lt;/li&gt;
&lt;li&gt;Location of target subscribers. Cell ID should be provided for location of the target subscriber. However, Licensor may issue directions from time to time on the precision of location, based on technological developments and integration of Global Positioning System (GPS) which shall be binding on the LICENSEE.&lt;/li&gt;
&lt;li&gt;Telephone numbers if any call-forwarding feature has been invoked by target subscriber.&lt;/li&gt;
&lt;li&gt;Data records for even failed call attempts.&lt;/li&gt;
&lt;li&gt;CDR (Call Data Record) of Roaming Subscriber.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to provide the call data records of all the specified calls handled by the system at specified periodicity, as and when required by the security agencies.&lt;a href="#_ftn97" name="_ftnref97"&gt;[97]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The call detail records for outgoing calls made by those subscribers making large number of outgoing calls day and night to the various telephone numbers with normally no incoming calls, is required to be analyzed by the Licensee. The service provider is required to run special programme, devise appropriate fraud management and prevention programme and fix threshold levels of average per day usage in minutes of the telephone connection; all telephone connections crossing the threshold of usage are required to be checked for &lt;i&gt;bona fide&lt;/i&gt; use. A record of check must be maintained which may be verified by Licensor any time. The list/details of suspected subscribers should be informed to the respective TERM Cell of DoT and any other officer authorized by Licensor from time to time.&lt;a href="#_ftn98" name="_ftnref98"&gt;[98]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee shall provide location details of mobile customers as per the accuracy and time frame mentioned in the Unified License. It shall be a part of CDR in the form of longitude and latitude, besides the co-ordinate of the BTS, which is already one of the mandated fields of CDR. To start with, these details will be provided for specified mobile numbers. However, within a period of 3 years from effective date of the Unified License, location details shall be part of CDR for all mobile calls.&lt;a href="#_ftn99" name="_ftnref99"&gt;[99]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Internet Service&lt;/i&gt;: The Licensee is required to maintain CDR/IPDR for Internet including Internet Telephony Service for a minimum period of one year. The Licensee is also required to maintain log-in/log-out details of all subscribers for services provided such as internet access, e-mail, Internet Telephony, IPTV etc. These logs are to be maintained for a minimum period of one year. For the purpose of interception and monitoring of traffic, the copies of all the packets originating from / terminating into the Customer Premises Equipment (CPE) shall be made available to the Licensor/Security Agencies. Further, the list of Internet Lease Line (ILL) customers is to be placed on a password protected website in the format prescribed in the Unified License.&lt;a href="#_ftn100" name="_ftnref100"&gt;[100]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawful Interception and Monitoring (LIM) systems of requisite capacities are to be set up by the Licensees for Internet traffic including Internet telephony traffic through their Internet gateways and /or Internet nodes at their own cost, as per the requirement of the security agencies/Licensor prescribed from time to time. The cost of maintenance of the monitoring equipment and infrastructure at the monitoring centre located at the premises of the licensee shall be borne by the Licensee. In case the Licensee obtains Access spectrum for providing Internet Service / Broadband Wireless Access using the Access Spectrum, the Licensee shall install the required Lawful Interception and Monitoring systems of requisite capacities prior to commencement of service. The Licensee, while providing downstream Internet bandwidth to an Internet Service provider is also required to ensure that all the traffic of downstream ISP passing through the Licensee’s network can be monitored in the network of the Licensee. However, for nodes of Licensee having upstream bandwidth from multiple service providers, the Licensee may be mandated to install LIM/LIS at these nodes, as per the requirement of security agencies. In such cases, upstream service providers may not be required to monitor this bandwidth.&lt;a href="#_ftn101" name="_ftnref101"&gt;[101]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case the Licensee has multiple nodes/points of presence and has capability to monitor the traffic in all the Routers/switches from a central location, the Licensor may accept to monitor the traffic from the said central monitoring location, provided that the Licensee is able to demonstrate to the Licensor/Security Agencies that all routers / switches are accessible from the central monitoring location. Moreover, the Licensee would have to inform the Licensor of every change that takes place in their topology /configuration, and ensure that such change does not make any routers/switches inaccessible from the central monitoring location. Further, Office space of 10 feet x 10 feet with adequate and uninterrupted power supply and air-conditioning which is physically secured and accessible only to the monitoring agencies shall be provided by the Licensee at each Internet Gateway location at its cost.&lt;a href="#_ftn102" name="_ftnref102"&gt;[102]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;National Long Distance (NLD) Service&lt;/i&gt;: The requisite monitoring facilities are required to be provided by the Licensee as per requirement of Licensor. The details of leased circuit provided by the Licensee is to be provided monthly to security agencies &amp;amp; DDG (TERM) of the Licensed Service Area where the licensee has its registered office.&lt;a href="#_ftn103" name="_ftnref103"&gt;[103]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;International Long Distance (ILD) Service&lt;/i&gt;: Office space of 20’x20’ with adequate and uninterrupted power supply and air-conditioning which is physically secured and accessible only to the personnel authorized by the Licensor is required to be provided by the Licensee at each Gateway location free of cost.&lt;a href="#_ftn104" name="_ftnref104"&gt;[104]&lt;/a&gt; The cost of monitoring equipment is to be borne by the Licensee. The installation of the monitoring equipment at the ILD Gateway Station is to be done by the Licensee. After installation of the monitoring equipment, the Licensee shall get the same inspected by monitoring /security agencies. The permission to operate/commission the gateway will be given only after this.&lt;a href="#_ftn105" name="_ftnref105"&gt;[105]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The designated person of the Central/ State Government, in addition to the Licensor or its nominee, has the right to monitor the telecommunication traffic in every ILD Gateway / Routers or any other technically feasible point in the network set up by the Licensee. The Licensee is required to make arrangement for monitoring simultaneous calls by Government security agencies. For establishing connectivity to Centralized Monitoring System, the Licensee, at its own cost, is required to provide appropriately dimensioned hardware and bandwidth/dark fibre upto a designated point as required by Licensor from time to time. In case the security agencies intend to locate the equipment at Licensee’s premises for facilitating monitoring, the Licensee should extend all support in this regard including Space and Entry of the authorized security personnel. The Interface requirements as well as features and facilities as defined by the Licensor should be implemented by the Licensee for both data and speech. The Licensee should ensure suitable redundancy in the complete chain of Monitoring equipment for trouble free operations of monitoring of at least 480 simultaneous calls as per requirement with at least 30 simultaneous calls for each of the designated security/ law enforcement agencies. Each ILD Gateway of the Licensee shall have the capacity for provisioning of at least 5000 numbers for monitoring. Presently there are ten (10) designated security/ law enforcement agencies. The above capacity provisions and number of designated security/ law enforcement agencies may be amended by the Licensor separately by issuing instructions at any time&lt;i&gt;.&lt;/i&gt;&lt;a href="#_ftn106" name="_ftnref106"&gt;[106]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to provide the call data records of all the specified calls handled by the system at specified periodicity, as and when required by the security agencies in the format prescribed from time to time.&lt;a href="#_ftn107" name="_ftnref107"&gt;[107]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Global Mobile Personal Communication by Satellite (GMPCS) Service&lt;/i&gt;: The designated Authority of the Central/State Government shall have the right to monitor the telecommunication traffic in every Gateway set up in India. The Licensee shall make arrangement for monitoring of calls as specified in the Unified License.&lt;a href="#_ftn108" name="_ftnref108"&gt;[108]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hardware/software required for monitoring of calls shall be engineered, provided/installed and maintained by the Licensee at the ICC (Intercept Control Centre) to be established at the GMPCS Gateway(s) as also in the premises of security agencies at Licensee’s cost. The Interface requirements as well as features and facilities shall be worked out and implemented by the Licensee for both data and speech. The Licensee should ensure suitable redundancy in the complete chain of Monitoring equipment for trouble free operations. The Licensee shall provide suitable training to the designated representatives of the Licensor regarding operation and maintenance of Monitoring equipment (ICC &amp;amp; MC). Interception of target subscribers using messaging services should also be provided even if retrieval is carried out using PSTN links. For establishing connectivity to Centralized Monitoring System, the Licensee at its own cost shall provide appropriately dimensioned hardware and bandwidth/dark fibre upto a designated point as required by Licensor from time to time.&lt;a href="#_ftn109" name="_ftnref109"&gt;[109]&lt;/a&gt; The License also has specific obligations to extend monitored calls to designated security agencies as provided in the UL.&lt;a href="#_ftn110" name="_ftnref110"&gt;[110]&lt;/a&gt; Further, the Licensee is required to provide the call data records of all the calls handled by the system at specified periodicity, if and as and when required by the security agencies.&lt;a href="#_ftn111" name="_ftnref111"&gt;[111]&lt;/a&gt; It is the responsibility of the service provider for Global Mobile Personal Communication by Satellite (GMPCS) to provide facility to carry out surveillance of User Terminal activity.&lt;a href="#_ftn112" name="_ftnref112"&gt;[112]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee has to make available adequate monitoring facility at the GMPCS Gateway in India to monitor all traffic (traffic originating/terminating in India) passing through the applicable system. For this purpose, the Licensee shall set up at his cost, the requisite interfaces, as well as features and facilities for monitoring of calls by designated agencies as directed by the Licensor from time to time. In addition to the Target Intercept List (TIL), it should also be possible to carry out specific geographic location based interception, if so desired by the designated security agencies. Monitoring of calls should not be perceptible to mobile users either during direct monitoring or when call has been grounded for monitoring. The Licensee shall not prefer any charges for grounding a call for monitoring purposes. The intercepted data is to be pushed to designated Security Agencies’ server on fire and forget basis. No records shall be maintained by the Licensee regarding monitoring activities and air-time used beyond prescribed time limit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee has to ensure that any User Terminal (UT) registered in the gateway of another country shall re-register with Indian Gateway when operating from Indian Territory. Any UT registered outside India, when attempting to make/receive calls from within India, without due authority, shall be automatically denied service by the system and occurrence of such attempts along with information about UT identity as well as location shall be reported to the designated authority immediately.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to have provision to scan operation of subscribers specified by security/ law enforcement agencies through certain sensitive areas within the Indian territory and shall provide their identity and positional location (latitude and longitude) to Licensor on as and when required basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Public Mobile Radio Trunking Service (PMRTS)&lt;/i&gt;: Suitable monitoring equipment prescribed by the Licensor for each type of System used has to be provided by the Licensee at his own cost for monitoring, as and when required.&lt;a href="#_ftn113" name="_ftnref113"&gt;[113]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Very Small Aperture Terminal (VSAT) Closed User Group (CUG) Service&lt;/i&gt;: Requisite monitoring facilities/ equipment for each type of system used have to be provided by the Licensee at its own cost for monitoring as and when required by the Licensor.&lt;a href="#_ftn114" name="_ftnref114"&gt;[114]&lt;/a&gt; The Licensee shall provide at its own cost technical facilities for accessing any port of the switching equipment at the HUB for interception of the messages by the designated authorities at a location to be determined by the Licensor.&lt;a href="#_ftn115" name="_ftnref115"&gt;[115]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Surveillance of MSS-R Service&lt;/i&gt;: The Licensee has to provide at its own cost technical facilities for accessing any port of the switching equipment at the HUB for interception of the messages by the designated authorities at a location as and when required.&lt;a href="#_ftn116" name="_ftnref116"&gt;[116]&lt;/a&gt; It is the responsibility of the service provider of INSAT- Mobile Satellite System Reporting (MSS-R) service to provide facility to carry out surveillance of User Terminal activity within a specified area.&lt;a href="#_ftn117" name="_ftnref117"&gt;[117]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Resale of International Private Leased Circuit (IPLC) Service&lt;/i&gt;: The Licensee has to take IPLC from the licensed ILDOs. The interception and monitoring of Resellers circuits will take place at the Gateway of the ILDO from whom the IPLC has been taken by the Licensee. The provisioning for Lawful Interception &amp;amp; Monitoring of the Resellers’ IPLC shall be done by the ILD Operator and the concerned ILDO shall be responsible for Lawful Interception and Monitoring of the traffic passing through the IPLC. The Resellers shall extend all cooperation in respect of interception and monitoring of its IPLC and shall be responsible for the interception results. The Licensee shall be responsible to interact, correspond and liaise with the licensor and security agencies with regard to security monitoring of the traffic. The Licensee shall, before providing an IPLC to the customer, get the details of services/equipment to be connected on both ends of IPLC, including type of terminals, data rate, actual use of circuit, protocols/interface to be used etc. The Resellers shall permit only such type of service/protocol on the IPLC for which the concerned ILDO has capability of interception and monitoring. The Licensee has to pass on any direct request placed by security agencies on him for interception of the traffic on their IPLC to the concerned ILDOs within two hours for necessary actions.&lt;a href="#_ftn118" name="_ftnref118"&gt;[118]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. The Information Technology Act, 2000&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Act, 2000, was amended in a major way in 2008 and is the primary legislation which regulates the interception, monitoring, decryption and collection of traffic information of digital communications in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More specifically, section 69 of the Information Technology Act empowers the central Government and the state governments to issue directions for the monitoring, interception or decryption of any information transmitted, received or stored through a computer resource. Section 69 of the Information Technology Act, 2000 expands the grounds upon which interception can take place as compared to the Indian Telegraph Act, 1885. As such, the interception of communications under Section 69 is carried out in the interest of&lt;a href="#_ftn119" name="_ftnref119"&gt;[119]&lt;/a&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The sovereignty or integrity of India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Defence of India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Security of the State&lt;/li&gt;
&lt;li&gt;Friendly relations with foreign States&lt;/li&gt;
&lt;li&gt;Public order&lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any cognizable offense relating to the above&lt;/li&gt;
&lt;li&gt;For the investigation of any offense&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;While the grounds for interception are similar to the Indian Telegraph Act (except for the condition of prevention of incitement of only &lt;i&gt;cognizable&lt;/i&gt; offences and the addition of investigation of any offence) the Information Technology Act does not have the overarching condition that interception can only occur in the case of public emergency or in the interest of public safety.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, section 69 of the Act mandates that any person or intermediary who fails to assist the specified agency with the interception, monitoring, decryption or provision of information stored in a computer resource shall be punished with imprisonment for a term which may extend to seven years and shall be liable for a fine.&lt;a href="#_ftn120" name="_ftnref120"&gt;[120]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 69B of the Information Technology Act empowers the Central Government to authorise the monitoring and collection of information and traffic data generated, transmitted, received or stored through any computer resource for the purpose of cyber security. According to this section, any intermediary who intentionally or knowingly fails to provide technical assistance to the authorised agency which is required to monitor and collection information and traffic data shall be punished with an imprisonment which may extend to three years and will also be liable to a fine.&lt;a href="#_ftn121" name="_ftnref121"&gt;[121]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main difference between Section 69 and Section 69B is that the first requires the interception, monitoring and decryption of all information generated, transmitted, received or stored through a computer resource when it is deemed “necessary or expedient” to do so, whereas Section 69B specifically provides a mechanism for all metadata of all communications through a computer resource for the purpose of combating threats to “cyber security”. Directions under Section 69 can be issued by the Secretary to the Ministry of Home Affairs, whereas directions under Section 69B can only be issued by the Secretary of the Department of Information Technology under the Union Ministry of Communications and Information Technology.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Overlap with the Telegraph Act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Thus while the Telegraph Act only allows for interception of messages or class of messages transmitted by a telegraph, the Information Technology Act enables interception of any information being transmitted or stored in a computer resource. Since a “computer resource” is defined to include a communication device (such as cellphones and PDAs) there is a overlap between the provisions of the Information Technology Act and the Telegraph Act concerning the provisions of interception of information sent through mobile phones. This is further complicated by the fact that the UAS License specifically states that it is governed by the provisions of the Indian Telegraph Act, the Indian Wireless Telegraphy Act and the Telecom Regulatory Authority of India Act, but does not mention the Information Technology Act.&lt;a href="#_ftn122" name="_ftnref122"&gt;[122]&lt;/a&gt; This does not mean that the Licensees under the Telecom Licenses are not bound by any other laws of India (including the Information Technology Act) but it is just an invitation to unnecessary complexities and confusions with regard to a very serious issue such as interception. This situation has thankfully been remedied by the Unified License (UL) which, although issued under section of 4 of the Telegraph Act, also references the Information Technology Act thus providing essential clarity with respect to the applicability of the Information Technology Act to the License Agreement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The interception of internet communications is mainly covered by the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009under the Information Technology Act (the “&lt;b&gt;IT Interception Rules&lt;/b&gt;”). In particular, the rules framed under Section 69 and 69B include safeguards stipulating to who may issue directions of interception and monitoring, how such directions are to be executed, the duration they remain in operation, to whom data may be disclosed, confidentiality obligations of intermediaries, periodic oversight of interception directions by a Review Committee under the Indian Telegraph Act, the retention of records of interception by intermediaries and to the mandatory destruction of information in appropriate cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the IT Interception Rules, only the competent authority can issue an order for the interception, monitoring or decryption of any information generated, transmitted, received or stored in any computer resource under sub-section (2) of section 69 of the Information Technology Act.&lt;a href="#_ftn123" name="_ftnref123"&gt;[123]&lt;/a&gt; At the State and Union Territory level, the State Secretaries respectively in charge of the Home Departments are designated as “competent authorities” to issue interception directions.&lt;a href="#_ftn124" name="_ftnref124"&gt;[124]&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt;In unavoidable circumstances the Joint Secretary to the Government of India, when so authorised by the Competent Authority, may issue an order. Interception may also be carried out with the prior approval of the Head or the second senior most officer of the authorised security agency at the Central Level and at the State Level with the approval of officers authorised in this behalf not below the rank of Inspector General of Police, in the belowmentioned emergent cases:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) in remote areas, where obtaining of prior directions for interception or monitoring or decryption of information is not feasible; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) for operational reasons, where obtaining of prior directions for interception or monitoring or decryption of any information generation, transmitted, received or stored in any computer resource is not feasible,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;however, in the above circumstances the officer would have to inform the competent authority in writing within three working days about the emergency and of the interception, monitoring or decryption and obtain the approval of the competent authority within a period of seven working days. If the approval of the competent authority is not obtained within the said period of seven working days, such interception or monitoring or decryption shall cease and the information shall not be intercepted or monitored or decrypted thereafter without the prior approval of the competent authority.&lt;a href="#_ftn125" name="_ftnref125"&gt;[125]&lt;/a&gt; If a state wishes to intercept information that is beyond its jurisdiction, it must request permission to issue the direction from the Secretary in the Ministry of Home Affairs.&lt;a href="#_ftn126" name="_ftnref126"&gt;[126]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to avoid the risk of unauthorised interception, the IT Interception Rules provide for the following safeguards:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;If authorised by the competent authority, any agency of the government may intercept, monitor, or decrypt information transmitted, received, or stored in any computer resource only for the purposes specified in section 69(1) of the IT Act.&lt;a href="#_ftn127" name="_ftnref127"&gt;[127]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The IT Interception Rules further provide that the competent authority may give any decryption direction to the decryption key holder.&lt;a href="#_ftn128" name="_ftnref128"&gt;[128]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The officer issuing an order for interception is required to issue requests in writing to designated nodal officers of the service provider.&lt;a href="#_ftn129" name="_ftnref129"&gt;[129]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Any direction issued by the competent authority must contain the reasons for direction, and must be forwarded to the review committee seven days after being issued.&lt;a href="#_ftn130" name="_ftnref130"&gt;[130]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;In the case of issuing or approving an interception order, in arriving at its decision the competent authority must consider all alternate means of acquiring the information.&lt;a href="#_ftn131" name="_ftnref131"&gt;[131]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The order must relate to information sent or likely to be sent from one or more particular computer resources to another (or many) computer resources.&lt;a href="#_ftn132" name="_ftnref132"&gt;[132]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The reasons for ordering interceptions must be recorded in writing, and must specify the name and designation of the officer to whom the information obtained is to be disclosed, and also specify the uses to which the information is to be put.&lt;a href="#_ftn133" name="_ftnref133"&gt;[133]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The directions for interception will remain in force for a period of 60 days, unless renewed. If the orders are renewed they cannot be in force for longer than 180 days.&lt;a href="#_ftn134" name="_ftnref134"&gt;[134]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Authorized agencies are prohibited from using or disclosing contents of intercepted communications for any purpose other than investigation, but they are permitted to share the contents with other security agencies for the purpose of investigation or in judicial proceedings. Furthermore, security agencies at the union territory and state level will share any information obtained by following interception orders with any security agency at the centre.&lt;a href="#_ftn135" name="_ftnref135"&gt;[135]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;All records, including electronic records pertaining to interception are to be destroyed by the government agency “every six months, except in cases where such information is required or likely to be required for functional purposes”.&lt;a href="#_ftn136" name="_ftnref136"&gt;[136]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The contents of intercepted, monitored, or decrypted information will not be used or disclosed by any agency, competent authority, or nodal officer for any purpose other than its intended purpose.&lt;a href="#_ftn137" name="_ftnref137"&gt;[137]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The agency authorised by the Secretary of Home Affairs is required to appoint a nodal officer (not below the rank of superintendent of police or equivalent) to authenticate and send directions to service providers or decryption key holders.&lt;a href="#_ftn138" name="_ftnref138"&gt;[138]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The IT Interception Rules also place the following obligations on the service providers:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;In addition, all records pertaining to directions for interception and monitoring are to be destroyed by the service provider within a period of two months following discontinuance of interception or monitoring, unless they are required for any ongoing investigation or legal proceedings.&lt;a href="#_ftn139" name="_ftnref139"&gt;[139]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Upon receiving an order for interception, service providers are required to provide all facilities, co-operation, and assistance for interception, monitoring, and decryption. This includes assisting with: the installation of the authorised agency's equipment, the maintenance, testing, or use of such equipment, the removal of such equipment, and any action required for accessing stored information under the direction.&lt;a href="#_ftn140" name="_ftnref140"&gt;[140]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Additionally, decryption key holders are required to disclose the decryption key and provide assistance in decrypting information for authorized agencies.&lt;a href="#_ftn141" name="_ftnref141"&gt;[141]&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Every fifteen days the officers designated by the intermediaries are required to forward to the nodal officer in charge a list of interceptions orders received by them. The list must include the details such as reference and date of orders of the competent authority.&lt;a href="#_ftn142" name="_ftnref142"&gt;[142]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The service provider is required to put in place adequate internal checks to ensure that unauthorised interception does not take place, and to ensure the extreme secrecy of intercepted information is maintained.&lt;a href="#_ftn143" name="_ftnref143"&gt;[143]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The contents of intercepted communications are not allowed to be disclosed or used by any person other than the intended recipient.&lt;a href="#_ftn144" name="_ftnref144"&gt;[144]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Additionally, the service provider is required to put in place internal checks to ensure that unauthorized interception of information does not take place and extreme secrecy is maintained. This includes ensuring that the interception and related information are handled only by the designated officers of the service provider.&lt;a href="#_ftn145" name="_ftnref145"&gt;[145]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009, under section 69B of the Information Technology Act, stipulate that directions for the monitoring and collection of traffic data or information can be issued by an order made by the competent authority&lt;a href="#_ftn146" name="_ftnref146"&gt;[146]&lt;/a&gt; for any or all of the following purposes related to cyber security:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;forecasting of imminent cyber incidents;&lt;/li&gt;
&lt;li&gt;monitoring network application with traffic data or information on computer resource;&lt;/li&gt;
&lt;li&gt;identification and determination of viruses or computer contaminant;&lt;/li&gt;
&lt;li&gt;tracking cyber security breaches or cyber security incidents;&lt;/li&gt;
&lt;li&gt;tracking computer resource breaching cyber security or spreading virus or computer contaminants;&lt;/li&gt;
&lt;li&gt;identifying or tracking any person who has breached, or is suspected of having breached or likely to breach cyber security;&lt;/li&gt;
&lt;li&gt;undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resources;&lt;/li&gt;
&lt;li&gt;accessing stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force;&lt;/li&gt;
&lt;li&gt;any other matter relating to cyber security.&lt;a href="#_ftn147" name="_ftnref147"&gt;[147]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;According to these Rules, any direction issued by the competent authority should contain reasons for such direction and a copy of such direction should be forwarded to the Review Committee within a period of seven working days.&lt;a href="#_ftn148" name="_ftnref148"&gt;[148]&lt;/a&gt; Furthermore, these Rules state that the Review Committee shall meet at least once in two months and record its finding on whether the issued directions are in accordance with the provisions of sub-section (3) of section 69B of the Act. If the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and issue an order for the destruction of the copies, including corresponding electronic record of the monitored or collected traffic data or information.&lt;a href="#_ftn149" name="_ftnref149"&gt;[149]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information Technology (Guidelines for Cyber Cafes) Rules, 2011&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology (Guidelines for Cyber Cafes) Rules, 2011, were issued under powers granted under section 87(2), read with section 79(2) of the Information Technology Act, 2000.&lt;a href="#_ftn150" name="_ftnref150"&gt;[150]&lt;/a&gt; These rules require cyber cafes in India to store and maintain backup logs for each login by any user, to retain such records for a year and to ensure that the log is not tampered. Rule 7 requires the inspection of cyber cafes to determine that the information provided during registration is accurate and remains updated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. The Indian Post Office Act, 1898&lt;/b&gt;&lt;br /&gt;Section 26 of the Indian Post Office Act, 1898, empowers the Central Government and the State Governments to intercept postal articles.&lt;a href="#_ftn151" name="_ftnref151"&gt;[151]&lt;/a&gt; In particular, section 26 of the Indian Post Office Act, 1898, states that on the occurrence of any public emergency or in the interest of public safety or tranquility, the Central Government, State Government or any officer specially authorised by the Central or State Government may direct the interception, detention or disposal of any postal article, class or description of postal articles in the course of transmission by post. Furthermore, section 26 states that if any doubt arises regarding the existence of public emergency, public safety or tranquility then a certificate to that effect by the Central Government or a State Government would be considered as conclusive proof of such condition being satisfied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to this section, the Central Government and the State Governments of India can intercept postal articles if it is deemed to be in the instance of a 'public emergency' or for 'public safety or tranquility'. However, the Indian Post Office Act, 1898, does not cover electronic communications and does not mandate their interception, which is covered by the Information Technology Act, 2000 and the Indian Telegraph Act, 1885.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. The Indian Wireless Telegraphy Act, 1933&lt;/b&gt;&lt;br /&gt;The Indian Wireless Telegraphy Act was passed to regulate and govern the possession of wireless telegraphy equipment within the territory of India. This Act essentially provides that no person can own “wireless telegraphy apparatus”&lt;a href="#_ftn152" name="_ftnref152"&gt;[152]&lt;/a&gt; except with a license provided under this Act and must use the equipment in accordance with the terms provided in the license.&lt;a href="#_ftn153" name="_ftnref153"&gt;[153]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the major sources of revenue for the Indian State Broadcasting Service was revenue from the licence fee from working of wireless apparatus under the Indian Telegraph Act, 1885.The Indian State Broadcasting Service was losing revenue due to lack of legislation for prosecuting persons using unlicensed wireless apparatus as it was difficult to trace them at the first place and then prove that such instrument has been installed, worked and maintained without licence. Therefore, the current legislation was proposed, in order to prohibit possession of wireless telegraphy apparatus without licence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presently the Act is used to prosecute cases, related to illegal possession and transmission via satellite phones. Any person who wishes to use satellite phones for communication purposes has to get licence from the Department of Telecommunications.&lt;a href="#_ftn154" name="_ftnref154"&gt;[154]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. The Code of Criminal Procedure&lt;/b&gt;&lt;br /&gt;Section 91 of the Code of Criminal Procedure regulates targeted surveillance. In particular, section 91 states that a Court in India or any officer in charge of a police station may summon a person to produce any document or any other thing that is necessary for the purposes of any investigation, inquiry, trial or other proceeding under the Code of Criminal Procedure.&lt;a href="#_ftn155" name="_ftnref155"&gt;[155]&lt;/a&gt; Under section 91, law enforcement agencies in India could theoretically access stored data. Additionally, section 92 of the Code of Criminal Procedure regulates the interception of a document, parcel or thing in the possession of a postal or telegraph authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further section 356(1) of the Code of Criminal Procedure provides that in certain cases the Courts have the power to direct repeat offenders convicted under certain provisions, to notify his residence and any change of, or absence from, such residence after release for a term not exceeding five years from the date of the expiration of the second sentence.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Policy Suggestions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In order to avoid the different standards being adopted for different aspects of surveillance and in different parts of the country, there should be one single policy document or surveillance and interception manual which should contain the rules and regulations regarding all kinds of surveillance. This would not only help in identifying problems in the law but may also be useful in streamlining the entire surveillance regime. However it is easier said than done and requires a mammoth effort at the legislative stage. This is because under the Constitutional scheme of India law and order is a State subject and the police machinery in every State is under the authority of the State government. Therefore it would not be possible to issue a single legislation dealing with all aspects of surveillance since the States are independent in their powers to deal with the police machinery.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even when we look at the issue of interception, certain state legislations especially the ones dealing with organized crime and bootleggers such as the Maharashtra Control of Organized Crime Act, 1999, the Andhra Pradesh Control of Organized Crime Act, 2001, also deal with the issue of interception and contain provisions empowering the state government to intercept communications for the purpose of using it to investigate or prevent criminal activities. Further even the two central level legislations that deal with interception, &lt;i&gt;viz.&lt;/i&gt; the Telegraph Act and the Information Technology Act, specifically empower the State governments also to intercept communications on the same grounds as the Central Government. Since interception of communications is mostly undertaken by security and law enforcement agencies, broadly for the maintenance of law and order, State governments cannot be prevented from issuing their own legislations to deal with interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to the abovementioned legal and constitutional complexities the major problem in achieving harmonization is to get both the Central and State governments on to the same page. Even if the Central government amends the Telegraph Act and the IT Act to bring them in line with each other, the State governments will still be free to do whatever they please. Therefore it seems the best approach in order to achieve harmonization may be to have a two pronged strategy, i.e. (i) issue a National Surveillance Policy covering both interception and general surveillance; and (ii) amend the central legislations i.e. the Telegraph Act and the Information Technology Act in accordance with the National Surveillance Policy. Once a National Surveillance Policy, based on scientific data and the latest theories on criminology is issued, it is hoped that State governments will themselves like to adopt the principles enshrined therein and amend their own legislations dealing with interception to fall in line with the National Surveillance Policy.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Section 6(2)(b) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Section 191 (D) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Section 200 (D) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Section 2011 (I) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Section 201 (II) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Section 201 (IV) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Section 193 (III) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Surjan Das &amp;amp; Basudeb Chattopadhyay, &lt;i&gt;Rural Crime in Police Perception&lt;/i&gt;: &lt;i&gt;A Study of Village Crime Note Books&lt;/i&gt;, 26(3) Economic and Political Weekly 129, 129 (1991).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Section 201 (III) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Section 201 (V) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Section 201 (VII) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Section 356(1) of the Criminal Procedure Code states as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;356. Order for notifying address of previously convicted offender.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) When any person, having been convicted by a Court in India of an offence punishable under section 215, section 489A, section 489B, section 489C or section 489D of the Indian Penal Code, (45 of 1860 ) or of any offence punishable under Chapter XII or Chapter XVII of that Code, with imprisonment for a term of three years or upwards, is again convicted of any offence punishable under any of those sections or Chapters with imprisonment for a term of three years or upwards by any Court other than that of a Magistrate of the second class, such Court may, if it thinks fit, at the time of passing a sentence of imprisonment on such person, also order that his residence and any change of, or absence from, such residence after release be notified as hereinafter provided for a term not exceeding five years from the date of the expiration of such sentence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; The Indian Telegraph Act, 1885, &lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Privacy International, Report: &lt;i&gt;“India”, &lt;/i&gt;Chapter 3: “Surveillance Policies”, &lt;a href="https://www.privacyinternational.org/reports/india/iii-surveillance-policies"&gt;https://www.privacyinternational.org/reports/india/iii-surveillance-policies&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Rule 419A(1), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Rule 419A(1), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Rule 419A(2), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Rule 419A(3), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Rule 419A(4), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Rule 419A(5), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Rule 419A(6), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Rule 419A(7), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Rule 419A(8), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Rule 419A(9), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Rule 419A(18), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt;&lt;i&gt; Ibid.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Rule 419A(10), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Rule 419A(11), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; Rule 419A(12), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Rule 419A(13), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Rule 419A(14), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Rule 419A(15), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Rule 419A(19), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt;&lt;i&gt; Ibid&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt;&lt;i&gt; Ibid&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; Section 46 of the Unlawful Activities Prevention Act, 1967. The Unlawful Activities (Prevention) Act, 1967 has certain additional safeguards such as not allowing intercepted information to be disclosed or received in evidence unless the accused has been provided with a copy of the same atleast 10 days in advance, unless the period of 10 days is specifically waived by the judge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; State owned Public Sector Undertakings (PSUs) (Mahanager Telephone Nigam Limited (MTNL) and Bharat Sanchar Nigam Limited (BSNL)) were issued licenses for provision of CMTS as third operator in various parts of the country. Further, 17 fresh licenses were issued to private companies as fourth cellular operator in September/ October, 2001, one each in 4 Metro cities and 13 Telecom Circles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Section 45.2 of the CMTS License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Section 41.09 of the CMTS License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; Section 41.09 of the CMTS License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Section 44.4 of the CMTS License. Similar provision exists in section 44.11 of the CMTS License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Section 34.28 (xix) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; Section 34.12 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; Section 34.13 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Section 34.22 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Section 34.6 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; Section 34.15 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; Section 34.28 (xiv) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; Section 34.28 (xi) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; Section 34.14 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; Section 34.28 (ix)&amp;amp;(x) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; Section 30.1 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; Section 33.4 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Section 34.4 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; Section 34.7 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; Section 34.9 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; Section 34.27 (a)(i) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; Section 34.27(a)(ii-vi) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Section 32.1, 32.2 (i)(ii), 32.3 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; Section 34.8 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; Section 34.18 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; Section 34.28 (xv) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; Section 41.10 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; Section 41.10 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; Section 41.19(i) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; Section 41.19(ii) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; Section 41.19(iv) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; Section 39.1 of the UASL. Similar provision is contained in section 41.4, 41.12 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; Section 39.3 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; Section 39.2 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; Section 23.2 of the UASL. Similar provisions are contained in section 41.7 of the UASL regarding provision of monitoring equipment for monitoring in the “interest of security”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; Section 42.2 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; Section 41.20(xx) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; Section 41.10 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; Section 41.10 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; Section 41.14 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; Section 41.16 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; Section 41.20(ix) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; Section 41.20(ix) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; Section 41.19(ii) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; Section 41.20(xii) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref82" name="_ftn82"&gt;[82]&lt;/a&gt; Section 41.20(xiii) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref83" name="_ftn83"&gt;[83]&lt;/a&gt; Section 41.20(xiv) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref84" name="_ftn84"&gt;[84]&lt;/a&gt; Section 41.20 (xix) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref85" name="_ftn85"&gt;[85]&lt;/a&gt; Section 41.20(xvi) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref86" name="_ftn86"&gt;[86]&lt;/a&gt; The different services covered by the Unified License are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Unified License (All Services)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Access Service (Service Area-wise)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Internet Service (Category-A with All India jurisdiction)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. Internet Service (Category-B with jurisdiction in a Service Area)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e. Internet Service (Category-C with jurisdiction in a Secondary Switching Area)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;f. National Long Distance (NLD) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;g. International Long Distance (ILD) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;h. Global Mobile Personal Communication by Satellite (GMPCS) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Public Mobile Radio Trunking Service (PMRTS) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;j. Very Small Aperture Terminal (VSAT) Closed User Group (CUG) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;k. INSAT MSS-Reporting (MSS-R) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;l. Resale of International private Leased Circuit (IPLC) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Authorisation for Unified License (All Services) would however cover all services listed at para 2(ii) (b) in all service areas, 2 (ii) (c), 2(ii) (f) to 2(ii) (l) above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref87" name="_ftn87"&gt;[87]&lt;/a&gt; Chapter IV, Para 23.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref88" name="_ftn88"&gt;[88]&lt;/a&gt; Chapter VI, Para 40.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref89" name="_ftn89"&gt;[89]&lt;/a&gt; Chapter V, Para 37.1 of the UL. Similar provision is contained in Chapter VI, Para 39.4,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref90" name="_ftn90"&gt;[90]&lt;/a&gt; Chapter V, Para 37.5 of the UL/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref91" name="_ftn91"&gt;[91]&lt;/a&gt; Chapter V, Para 37.3 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref92" name="_ftn92"&gt;[92]&lt;/a&gt; Chapter V, Para 37.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref93" name="_ftn93"&gt;[93]&lt;/a&gt; Chapter VI, Para 39.23(xii) of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref94" name="_ftn94"&gt;[94]&lt;/a&gt; Chapter VI, Para 39.23 (xiii) of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref95" name="_ftn95"&gt;[95]&lt;/a&gt; Chapter VI, Para 39.23 (xiv) of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref96" name="_ftn96"&gt;[96]&lt;/a&gt; Chapter VI, Para 39.23 (xix) of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref97" name="_ftn97"&gt;[97]&lt;/a&gt; Chapter VIII, Para 8.3 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref98" name="_ftn98"&gt;[98]&lt;/a&gt; Chapter VIII, Para 8.4 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref99" name="_ftn99"&gt;[99]&lt;/a&gt; Chapter VIII, Para 8.5 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref100" name="_ftn100"&gt;[100]&lt;/a&gt; Chapter IX, Paras 7.1 to 7.3 of the UL. Further obligations have also been imposed on the Licensee to ensure that its ILL customers maintain the usage of IP addresses/Network Address Translation (NAT) syslog, in case of multiple users on the same ILL, for a minimum period of one year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref101" name="_ftn101"&gt;[101]&lt;/a&gt; Chapter IX, Paras 8.1 to 8.3 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref102" name="_ftn102"&gt;[102]&lt;/a&gt; Chapter IX, Paras 8.4 and 8.5 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref103" name="_ftn103"&gt;[103]&lt;/a&gt; Chapter X, Para 5.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref104" name="_ftn104"&gt;[104]&lt;/a&gt; Chapter XI, Para 6.3 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref105" name="_ftn105"&gt;[105]&lt;/a&gt; Chapter XI, Para 6.4 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref106" name="_ftn106"&gt;[106]&lt;/a&gt; Chapter XI, Para 6.6 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref107" name="_ftn107"&gt;[107]&lt;/a&gt; Chapter XI, Para 6.7 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref108" name="_ftn108"&gt;[108]&lt;/a&gt; Chapter XII, Para 7.4 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref109" name="_ftn109"&gt;[109]&lt;/a&gt; Chapter XII, Para 7.5 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref110" name="_ftn110"&gt;[110]&lt;/a&gt; Chapter XII, Para 7.6 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref111" name="_ftn111"&gt;[111]&lt;/a&gt; Chapter XII, Para 7.7 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref112" name="_ftn112"&gt;[112]&lt;/a&gt; Chapter XII, Para 7.8 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref113" name="_ftn113"&gt;[113]&lt;/a&gt; Chapter XIII, Para 7.1 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref114" name="_ftn114"&gt;[114]&lt;/a&gt; Chapter XIV, Para 8.1 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref115" name="_ftn115"&gt;[115]&lt;/a&gt; Chapter XIV, Para 8.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref116" name="_ftn116"&gt;[116]&lt;/a&gt; Chapter XV, Para 8.1 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref117" name="_ftn117"&gt;[117]&lt;/a&gt; Chapter XV, Para 8.5 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref118" name="_ftn118"&gt;[118]&lt;/a&gt; Chapter XVI, Paras 4.1 - 4.4 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref119" name="_ftn119"&gt;[119]&lt;/a&gt; Section 69 of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref120" name="_ftn120"&gt;[120]&lt;/a&gt;&lt;i&gt; Ibid&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref121" name="_ftn121"&gt;[121]&lt;/a&gt; Section 69B of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref122" name="_ftn122"&gt;[122]&lt;/a&gt; Section 32 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref123" name="_ftn123"&gt;[123]&lt;/a&gt; Rule 3, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref124" name="_ftn124"&gt;[124]&lt;/a&gt; Rule 2(d), Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref125" name="_ftn125"&gt;[125]&lt;/a&gt; Rule 3, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref126" name="_ftn126"&gt;[126]&lt;/a&gt; Rule 6, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref127" name="_ftn127"&gt;[127]&lt;/a&gt; Rule 4, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref128" name="_ftn128"&gt;[128]&lt;/a&gt; Rule 5, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref129" name="_ftn129"&gt;[129]&lt;/a&gt; Rule 13, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref130" name="_ftn130"&gt;[130]&lt;/a&gt; Rule 7, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref131" name="_ftn131"&gt;[131]&lt;/a&gt; Rule 8, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref132" name="_ftn132"&gt;[132]&lt;/a&gt; Rule 9, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref133" name="_ftn133"&gt;[133]&lt;/a&gt; Rule 10, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref134" name="_ftn134"&gt;[134]&lt;/a&gt; Rule 11, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref135" name="_ftn135"&gt;[135]&lt;/a&gt; Rule 25(2)&amp;amp;(6), Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref136" name="_ftn136"&gt;[136]&lt;/a&gt; Rule 23, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref137" name="_ftn137"&gt;[137]&lt;/a&gt; Rule 25, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref138" name="_ftn138"&gt;[138]&lt;/a&gt; Rule 12, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref139" name="_ftn139"&gt;[139]&lt;/a&gt; Rule 23(2), Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref140" name="_ftn140"&gt;[140]&lt;/a&gt; Rule 19, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref141" name="_ftn141"&gt;[141]&lt;/a&gt; Rule 17, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref142" name="_ftn142"&gt;[142]&lt;/a&gt; Rule 18, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref143" name="_ftn143"&gt;[143]&lt;/a&gt; Rule 20&amp;amp; 21, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref144" name="_ftn144"&gt;[144]&lt;/a&gt; Rule 25, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref145" name="_ftn145"&gt;[145]&lt;/a&gt; Rule 20, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref146" name="_ftn146"&gt;[146]&lt;/a&gt; Rule 3(1) of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref147" name="_ftn147"&gt;[147]&lt;/a&gt; Rule 3(2) of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref148" name="_ftn148"&gt;[148]&lt;/a&gt; Rule 3(3) of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref149" name="_ftn149"&gt;[149]&lt;/a&gt; Rules 7 of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref150" name="_ftn150"&gt;[150]&lt;/a&gt; Introduction to the Information Technology (Guidelines for Cyber Cafe) Rules, 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref151" name="_ftn151"&gt;[151]&lt;/a&gt; The Indian Post Office Act, 1898, &lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref152" name="_ftn152"&gt;[152]&lt;/a&gt; The expression “wireless telegraphy apparatus” has been defined as “any apparatus, appliance, instrument or material used or capable of use in wireless communication, and includes any article determined by rule made under Sec. 10 to be wireless telegraphy apparatus, but does not include any such apparatus, appliance, instrument or material commonly used for other electrical purposes, unless it has been specially designed or adapted for wireless communication or forms part of some apparatus, appliance, instrument or material specially so designed or adapted, nor any article determined by rule made under Section 10 not to be wireless telegraphy apparatus;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref153" name="_ftn153"&gt;[153]&lt;/a&gt; Section 4, Wireless Telegraphy Act, 1933.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref154" name="_ftn154"&gt;[154]&lt;/a&gt; Snehashish Ghosh, Indian Wireless Telegraphy Act, 1933, &lt;a href="http://cis-india.org/telecom/resources/indian-wireless-telegraphy-act"&gt;http://cis-india.org/telecom/resources/indian-wireless-telegraphy-act&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref155" name="_ftn155"&gt;[155]&lt;/a&gt; The Code of Criminal Procedure, 1973, Section 91, &lt;a href="http://www.icf.indianrailways.gov.in/uploads/files/CrPC.pdf"&gt;http://www.icf.indianrailways.gov.in/uploads/files/CrPC.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india'&gt;https://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-03T15:27:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril">
    <title>Right to Privacy in Peril</title>
    <link>https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril</link>
    <description>
        &lt;b&gt;It seems to have become quite a fad, especially amongst journalists, to use this headline and claim that the right to privacy which we consider so inherent to our being, is under attack. However, when I use this heading in this piece I am not referring to the rampant illegal surveillance being done by the government, or the widely reported recent raids on consenting (unmarried) adults who were staying in hotel rooms in Mumbai. I am talking about the fact that the Supreme Court of India has deemed it fit to refer the question of the very existence of a fundamental right to privacy to a Constitution Bench to finally decide the matter, and define the contours of such right if it does exist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In an order dated August 11, 2015 the Supreme Court finally gave in to the arguments advanced by the Attorney General and admitted that there is some “unresolved contradiction” regarding the existence of a constitutional “right to privacy” under the Indian Constitution and requested that a Constitutional Bench of appropriate strength.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court was hearing a petition challenging the implementation of the Adhaar Card Scheme of the government, where one of the grounds to challenge the scheme was that it was violative of the right to privacy guaranteed to all citizens under the Constitution of India. However to counter this argument, the State (via the Attorney General) challenged the very concept that the Constitution of India guarantees a right to privacy by relying on an “unresolved contradiction” in judicial pronouncements on the issue, which so far had only been of academic interest. This “unresolved contradiction” arose because in the cases of &lt;b&gt;&lt;i&gt;M.P. Sharma &amp;amp; Others v. Satish Chandra &amp;amp; Others&lt;/i&gt;&lt;/b&gt;,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of U.P. &amp;amp; Others,&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;b&gt;[2]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt;&lt;/i&gt;(decided by &lt;i&gt;Eight &lt;/i&gt;and &lt;i&gt;Six &lt;/i&gt;Judges respectively) the Supreme Court has categorically denied the existence of a right to privacy under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However somehow the later case of &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of M.P. and another&lt;/i&gt;,&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; (which was decided by a two Judge Bench of the Supreme Court) relied upon the opinion given by the minority of two judges in &lt;i&gt;Kharak Singh&lt;/i&gt; to hold that a right to privacy does exist and is guaranteed as a fundamental right under the Constitution of India.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; Thereafter a large number of cases have held the right to privacy to be a fundamental right, the most important of which are &lt;b&gt;&lt;i&gt;R. Rajagopal &amp;amp; Another &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of Tamil Nadu &amp;amp; Others,&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;b&gt;[5]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt;&lt;/i&gt;(popularly known as &lt;i&gt;Auto Shanker’s &lt;/i&gt;case) and &lt;b&gt;&lt;i&gt;People’s Union for Civil Liberties (PUCL) &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India &amp;amp; Another&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; However, as was noticed by the Supreme Court in its August 11 order, all these judgments were decided by two or three Judges only.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petitioners on the other hand made a number of arguments to counter those made by the Attorney General to the effect that the fundamental right to privacy is well established under Indian law and that there is no need to refer the matter to a Constitutional Bench. These arguments are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The observations made in &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;regarding the absence of right to privacy are not part of the &lt;i&gt;ratio decidendi&lt;/i&gt; of that case and, therefore, do not bind the subsequent smaller Benches such as &lt;b&gt;&lt;i&gt;R. Rajagopal &lt;/i&gt;&lt;/b&gt;and &lt;b&gt;&lt;i&gt;PUCL&lt;/i&gt;&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Even in &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;it was held that the right of a person not to be disturbed at his residence by the State is recognized to be a part of a fundamental right guaranteed under Article 21. It was argued that this is nothing but an aspect of privacy. The observation in para 20 of the majority judgment (quoted in footnote 2 above) at best can be construed only to mean that there is no fundamental right of privacy against the State’s authority to keep surveillance on the activities of a person. However, they argued that such a conclusion cannot be good law any more in view of the express declaration made by a seven-Judge bench decision of this Court in &lt;b&gt;&lt;i&gt;Maneka Gandhi &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India &amp;amp; Another&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Both &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;were decided on an interpretation of the Constitution based on the principles expounded in &lt;b&gt;&lt;i&gt;A.K. Gopalan &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of Madras&lt;/b&gt;&lt;/i&gt;,&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; which have themselves been declared wrong by a larger Bench in &lt;b&gt;&lt;i&gt;Rustom Cavasjee Cooper &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other than the points above, it was also argued that world over in all the countries where Anglo-Saxon jurisprudence is followed, ‘privacy’ is recognized as an important aspect of the liberty of human beings. The petitioners also submitted that it was too late in the day for the Union of India to argue that the Constitution of India does not recognize privacy as an aspect of the liberty under Article 21 of the Constitution of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However these arguments of the petitioners were not enough to convince the Supreme Court that there is no doubt regarding the existence and contours of the right to privacy in India. The Court, swayed by the arguments presented by the Attorney General, admitted that questions of far reaching importance for the Constitution were at issue and needed to be decided by a Constitutional Bench.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Giving some insight into its reasoning to refer this issue to a Constitutional Bench, the Court did seem to suggest that its decision to refer the matter to a larger bench was more an exercise in judicial propriety than an action driven by some genuine contradiction in the law. The Court said that if the observations in &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;were accepted as the law of the land, the fundamental rights guaranteed under the Constitution of India would get “denuded of vigour and vitality”. However the Court felt that institutional integrity and judicial discipline require that smaller benches of the Court follow the decisions of larger benches, unless they have very good reasons for not doing so, and since in this case it appears that the same was not done therefore the Court referred the matter to a larger bench to scrutinize the ratio of &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra)&lt;/i&gt; and decide the judicial correctness of subsequent two judge and three judge bench decisions which have asserted or referred to the right to privacy.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; AIR 1954 SC 300. In para 18 of the Judgment it was held: “A power of search and seizure is in any system of jurisprudence an overriding power of the State for the protection of social security and that power is necessarily regulated by law. When the Constitution makers have thought fit not to subject such regulation to constitutional limitations &lt;i&gt;by recognition of a fundamental right to privacy&lt;/i&gt;, analogous to the American Fourth Amendment, &lt;i&gt;we have no justification to import it, into a totally different fundamental right, by some process of strained construction&lt;/i&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; AIR 1963 SC 1295. In para 20 of the judgment it was held: “&lt;b&gt;… &lt;/b&gt;Nor do we consider that Art. 21 has any relevance in the context as was sought to be suggested by learned counsel for the petitioner. As already pointed out, &lt;i&gt;the right of privacy is not a guaranteed right under our Constitution&lt;/i&gt;and therefore the attempt to ascertain the movement of an individual which is merely a manner in which privacy is invaded is not an infringement of a fundamental right guaranteed by Part III.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; (1975) 2 SCC 148.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; It is interesting to note that while the decisions in both &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; were given in the context of similar facts (challenging the power of the police to make frequent domiciliary visits both during the day and night at the house of the petitioner) while the majority in &lt;i&gt;Kharak Singh&lt;/i&gt; specifically denied the existence of a fundamental right to privacy, however they held the conduct of the police to be violative of the right to personal liberty guaranteed under Article 21, since the Regulations under which the police actions were undertaken were themselves held invalid. On the other hand, while &lt;i&gt;Gobind&lt;/i&gt; held that a fundamental right to privacy does exist in Indian law, it may be interfered with by the State through procedure established by law and therefore upheld the actions of the police since they were acting under validly issued Regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; (1994) 6 SCC 632.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; (1997) 1 SCC 301.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; (1978) 1 SCC 248.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; AIR 1950 SC 27.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; (1970) 1 SCC 248.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril'&gt;https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-13T15:32:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending">
    <title>RBI Consultation Paper on P2P Lending: Data Security and Privacy Concerns</title>
    <link>https://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending</link>
    <description>
        &lt;b&gt;On April 28, 2016 the Reserve Bank of India published a consultation paper on P2P Lending and invited comments from the public on the same. The Paper discusses what P2P lending is, the various regulatory practices that govern P2P lending in different jurisdictions and lists our arguments for and against regulating P2P lending platforms.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Arguments against Regulation&lt;/h2&gt;
&lt;p&gt;The arguments against regulation of P2p lending companies as set out in the paper are (briefly):&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Regulating an exempt or nascent sector may be perceived as rubber stamping the industry through regulation, thus lending credibility to the P2P lending which could attract ill informed lenders to the sector who may not understand all the risks associated with the industry. In this way Regulation may cause more harm than good.&lt;/li&gt;
&lt;li&gt;Regulations may also be perceived as too stringent, thus stifling the growth of an innovative, efficient and accessible industry.&lt;/li&gt;
&lt;li&gt;The P2P lending market is currently in a nascent stage and does not pose an immediate systemic risk meriting regulation.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Arguments in favour of Regulation&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The arguments for regulating the market on the other hand are:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Considering the significance of the online industry and the impact which it can have on the traditional banking channels/NBFC sector, it would be prudent to regulate this emerging industry.&lt;/li&gt;
&lt;li&gt;The, the importance of these methods of financing, specially in sectors where formal lending cannot reach, needs to be acknowledged.&lt;/li&gt;
&lt;li&gt;If the sector is left unregulated altogether, there is the risk of unhealthy practices being adopted by one or more players, which may have deleterious consequences.&lt;/li&gt;
&lt;li&gt;Section 45S of RBI Act prohibits an individual or a firm or an unincorporated association of individuals from accepting deposits “if its business wholly or partly includes any of the activities specified in clause (c) of section 45-I (i.e. activities of a financial institution); or if his or its principal business is that of receiving of deposits under any scheme or arrangement or in any other manner, or lending in any manner. Contravention of Section 45S is an offence punishable under section 58B (5A) of RBI Act. As per the Act, ‘‘deposit’’ includes and shall be deemed always to have included any receipt of money by way of deposit or loan or in any other form, but does not include any amount received from an individual or a firm or an association of individuals not being a body corporate, registered under any enactment relating to money lending which is for the time being in force in any State. Since the borrowers and lenders brought together by a P2P platform could fall within these prohibitions, absence of regulation may lead to perpetrating an illegality.”&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;After listing out the arguments, the paper adopts the approach of regulating this industry and proposes to bring P2P lending platforms under the purview of RBI’s regulation by defining them as Non Banking Financial Companies (NBFCs) under section 45-I(f)(iii) of the RBI Act. Once notified as NBFCs, RBI can issue regulations under sections 45JA and 45L. Though there is scope to comment on many aspects of the consultation paper our comments here will be limited to the data security and privacy aspects of the recommendations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Data Security and Privacy Concerns&lt;/h2&gt;
&lt;p&gt;While the understanding of potential borrowers, specially those who have had experiences with commercial financial institutions, is that the more amount of information they provide, the better their chances become of getting a loan. This perception emanates from the fact that any potential borrower is asked for a myriad of documents, including personally identifying documents before a request for a loan is considered, infact for almost all financial institutions it is part of their core prudential norms to ask for identity documents before disbursing a loan. Getting as much information as possible from the borrower is not just a quirk of the financial institutions but it makes business sense for them, since it is those institutions who bear the risk of recovery of their money. There is no reason why the same logic or allowing creditors all the information about the borrower should not be applicable to P2P lending platforms, as far as the principle of prudential business practices is concerned. However, the key difference between disclosing information to P2P lending platforms as opposed to financial institutions is that whilst the information supplied to financial institutions stays limited to the institution and its employees, a large amount of the information (though not necessarily all) given to P2P platforms is made available to all potential creditors, which in P2P lending translates to any internet user who registers as a potential creditor. In this way the potential for the information to reach a wider group of people is much higher and therefore privacy and data security risks require special attention in P2P lending.&lt;/p&gt;
&lt;p&gt;In section 5.3(v) of the Paper it is recommended that “Confidentiality of the customer data and data security would be the responsibility of the Platform. Transparency in operations, adequate measures for data confidentiality and minimum disclosures to borrowers and lenders would also be mandated through a fair practices code.” Whilst the fair practices code has not yet been developed or at least not yet made publicly available, as companies in the P2P lending industry are body corporates, these fair practice codes&amp;nbsp; should be in line with and satisfy the requirements of section 43A of the Information Technology Act, 2000 (“&lt;strong&gt;IT Act&lt;/strong&gt;”) as well as the Guidelines issued by the RBI’s Guidelines on Information security, Electronic Banking, Technology risk management and cyber frauds &lt;strong&gt;[1]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The minimum standards for data protection in Indian law have been laid down by section 43A of the IT Act and the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 (“&lt;strong&gt;Rules&lt;/strong&gt;”) issued under section 43A. As per Rule 4 of the Rules P2P platforms would be required to have a privacy policy to deal with sensitive personal data, which includes any details regarding financial information such bank account, credit/debit cards, etc &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;This policy would have to be published on the website of the platforms and would provide for a number of things such as (i) Clear and easily accessible statements of its practices and policies; (ii) type of personal or sensitive personal data or information collected; (iii) purpose of collection and usage of such information; (iv) disclosure of information including sensitive personal data or information; (v) reasonable security practices and procedures for the data. The other requirements of the Rules as regards consent before usage of the information, collection limitations, imparting information/notice to the consumer (information provider), retention limitation, purpose limitation, opt-out option, disclosure, etc. will also be applicable to P2P platforms and the fair practices code that the RBI would issue for this purpose will have to take all these issues into account.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Rules also provide that body corporates will be considered to have complied with reasonable security practices if they have implemented such security practices and standards and have a comprehensive documented information security programme and information security policies that contain managerial, technical, operational and physical security control measures that are commensurate with the information assets being protected with the nature of business. Although there are no such practices which have been endorsed by any governmental body for P2P lending platforms, however the Department of Banking Supervision, Reserve Bank of India, has issued guidelines on “Information security, Electronic Banking, Technology risk management and cyber frauds" &lt;strong&gt;[3]&lt;/strong&gt;. which could be relied upon until a fair practices code is put into place. The major privacy and data security provisions of these guidelines are given below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Security Baselines&lt;/strong&gt;: The guidelines require banks to be proactive in identifying and specifying the minimum security baselines to be adhered to by the service providers to ensure confidentiality and security of data;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Back up records&lt;/strong&gt;: A cloud computing system must ensure backup of all its clients' information;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Security steps&lt;/strong&gt;: An institution may take the following steps to ensure that risks with respect to confidentiality and security of data are adequately mitigated: (i) Address, agree, and document specific responsibilities of the respective parties in outsourcing; (ii) Discuss and agree on the instances where customer data shall be accessed; (iii) Ensure that service provider employees are adequately aware and informed on the security and privacy policies.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Confidentiality&lt;/strong&gt;: Agreements should provide for maintaining confidentiality of customer's information even after the contract expires or is terminated by either party and specify the liability in case of security breach or leakage.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encryption&lt;/strong&gt;: Normally, a minimum of 128-bit SSL encryption is expected. Banks should only select encryption algorithms which are well established international standards.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Fraud Risk Management&lt;/strong&gt;: It is also necessary that customer confidential information and other data/information available with banks is secured adequately to ensure that fraudsters do not access it to perpetrate fraudulent transactions.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Although inclusion of the above principles in the fair practices code would be helpful, however since the workings of P2P platforms are quite unique, therefore it would be counterproductive to restrict the security and privacy protocols to only those applied to regular banking transactions and the fair practices code should take into account these unique problems of P2P lending rather than seek to apply the existing norms blindly.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="https://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf"&gt;https://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; The Rules define “sensitive personal data or information” as information relating to: "(i) password, (ii) financial information such as Bank account or credit card or debit card or other payment instrument details, (iii) physical, physiological and mental health condition, (iv) sexual orientation, (v) medical records and history, (vi) Biometric information, (vii) any detail relating to the above clauses as provided to body corporate for providing service, and (viii) any of the information received under above clauses by body corporate for processing, stored or processed under lawful contract or otherwise."&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf"&gt;http://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending'&gt;https://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Reserve Bank of India</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Network Economies</dc:subject>
    
    
        <dc:subject>P2P Lending</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-06-01T11:41:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
