<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 281 to 295.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/november-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/march-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-march-27-2017-priya-nair-and-sanjay-kumar-singh-get-an-aadhaar-card-if-you-dont-have-one"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/right-to-be-forgotten-a-tale-of-two-judgments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/buzzfeednews-pranav-dixit-april-4-2017-indias-national-id-program-may-be-turning-the-country-into-a-surveillance-state"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/identities-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/newsletters/november-2014-bulletin">
    <title>November 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/november-2014-bulletin</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society (CIS) welcome you to the eleventh issue of the newsletter (November 2014). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/about/newsletters"&gt;&lt;/a&gt; &lt;/small&gt; &lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;small&gt; Highlights &lt;/small&gt;&lt;small&gt;&lt;/small&gt;&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;small&gt;On 13 November, 2014, the Department of Industrial Policy and Promotion had released a Call for Suggestions for India's proposed National IPR 			Policy. &lt;a href="https://cis-india.org/a2k/blogs/comments-on-proposed-ip-rights-policy-to-dipp"&gt;CIS sent its comments&lt;/a&gt;.&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;As part of the Pervasive Technologies we published four methodology documents: Rohini Lakshané wrote on 			&lt;a href="https://cis-india.org/a2k/blogs/patent-landscaping-in-the-indian-mobile-device-market"&gt; Patent Landscaping for the Indian Mobile Device market &lt;/a&gt; ; Anubha Sinha wrote on 			&lt;a href="https://cis-india.org/a2k/blogs/methodology-intellectual-property-in-mobile-application-development-in-india"&gt; Intellectual Property in Mobile Application Development in India &lt;/a&gt; ; Maggie Huang wrote on			&lt;a href="https://cis-india.org/a2k/blogs/methodology-access-to-music-through-mobile"&gt;Access to Music through the Mobile&lt;/a&gt;; and Nehaa 			Chaudhari wrote on 			&lt;a href="https://cis-india.org/a2k/blogs/methodology-sub-hundred-dollar-mobile-devices-and-competition-law"&gt; Sub Hundred Dollar Mobile Devices and Competition Law &lt;/a&gt; .&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Odisha's			&lt;a href="https://cis-india.org/openness/blog/nineteen-books-by-ama-odisha-relicensed"&gt;most circulated newspaper Sambad has collaborated&lt;/a&gt; with CIS-A2K to relicense 19 books published by its sister concern "Ama Odisha".&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Vipul Kharbanda in a blog entry 			&lt;a href="https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2"&gt; examines the relationship between privacy and transparency in the context of the right to information in India &lt;/a&gt; .&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Geetha Hariharan in a 			&lt;a href="https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance"&gt; blog entry &lt;/a&gt; explores what India's ITU proposal means for Internet Governance.&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Pranesh Prakash wrote an 			&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-november-18-2014-pranesh-prakash-the-socratic-debate-whos-internet-is-it-anyway"&gt; article in the Economic Times &lt;/a&gt; exploring net neutrality.&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;In her			&lt;a href="https://cis-india.org/raw/mapping-digital-humanities-in-india-concluding-thoughts"&gt;final blog post on the mapping exercise&lt;/a&gt; undertaken by CIS-RAW, P.P.Sneha summarises some of the key concepts and terms that emerged as significant in the discourse around Digital 			Humanities in India. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Job &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/jobs/programme-officer-institutional-partnership"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge - Institutional Partnerships): CIS is seeking applications for the post of Programme Officer for its Access to Knowledge (A2K) 			Programme. The position will be based in its Bangalore office. Programme Officer will collaboratively work with the A2K Team and would report to 			the Programme Director, Access to Knowledge at CIS. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt; &lt;/small&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies 		and programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 		National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The publication has been finalised and is currently in the process of being printed. The draft chapters and the quarterly reports can be accessed on the		&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed		&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►NVDA and eSpeak &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Monthly Update &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/blog/november-e-speak-nvda-2014-report.pdf"&gt;November 2014 Report&lt;/a&gt; (Suman Dogra; November 30, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Upcoming Event &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/events/training-in-e-speak-malayalam"&gt;Training in Use of eSpeak with Malayalam&lt;/a&gt; (co-organized by CIS, DAISY Forum of India and Chakshumathi Assistive Technology Centre; Trivandrum; January 24 - 25, 2015, Trivandrum). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Other &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Blog Entry &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/blog/central-guidelines-and-schemes"&gt;Central Guidelines and Schemes&lt;/a&gt; (Anandhi Viswanathan; November 6, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt; &lt;/small&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 		Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 		intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 		grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 		that recruit and cultivate new editors and explore innovative approaches to building projects. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;small&gt; Submission &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/comments-on-proposed-ip-rights-policy-to-dipp"&gt; Comments on the Proposed Intellectual Property Rights Policy to the Department of Industrial Policy and Promotion &lt;/a&gt; (Pranesh Prakash, Nehaa Chaudhari, Anubha Sinha and Amulya P.; November 30, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Blog Entries &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/mhrd-ipr-chairs-underutilization-of-funds-and-lack-of-information-regarding-expenditures"&gt; MHRD IPR Chairs - Underutilization of Funds and Lack of Information Regarding Expenditures &lt;/a&gt; (Amulya Purushothama, November 19, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;small&gt; Participation in Events &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/a2k/news/center-for-global-communication-studies-november-6-2014-ubiquity-mobility-globality-charting-directions-in-mobile-phone-studies"&gt; Ubiquity, Mobility, Globality: Charting Directions in Mobile Phone Studies &lt;/a&gt; (Organized by Center for Global Communication Studies at the Annenberg School for Communication, University of Pennsylvania, Philadelphia; November 			6 - 7, 2014). Nehaa Chaudhari made a presentation on Pervasive Technologies: Access to Knowledge in the Marketplace. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/news/countering-us-pressure-on-indias-ip-regime"&gt;Countering US pressures on India's IP regime&lt;/a&gt; (Organized by Lawyer's Collective; November 16, 2014). Anubha Sinha attended the event. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/technology-gender-based-violence"&gt;Technology and Gender Based Violence&lt;/a&gt; (Organized by the Bachchao Project; November 24, 2014). Rohini Lakshané was a speaker at the event. She spoke about various strategies that 			women use to respond to online harassment, such as reporting the abuser, and enlisting support from online followers, or friends or family in order 			to deal with the abuser. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Pervasive Technology &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Blog Entries &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/patent-landscaping-in-the-indian-mobile-device-market"&gt;Methodology: Patent Landscaping&lt;/a&gt; (Rohini Lakshané; November 10, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/methodology-intellectual-property-in-mobile-application-development-in-india"&gt; Methodology: Intellectual Property in Mobile Application Development in India &lt;/a&gt; (Anubha Sinha; November 17, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/methodology-access-to-music-through-mobile"&gt;Methodology: Access to Music through the Mobile&lt;/a&gt; (Maggie Huang; November 18, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/methodology-sub-hundred-dollar-mobile-devices-and-competition-law"&gt; Methodology: Sub Hundred Dollar Mobile Devices and Competition Law &lt;/a&gt; (Nehaa Chaudhari; November 25, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Wikipedia &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out 		to more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under 		the Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes 		in Kannada, and 1 book on Odia language history in English). &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt;Op-Ed &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/blog/the-samaja-november-17-2014-subhashish-panigrahi-odia-wikisource-its-potential"&gt; Odia Wikisource, its Potential &lt;/a&gt; (Subhashish Panigrahi, The Samaja, November 17, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;&lt;b&gt;Blog Entries &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/blog/55-works-of-iconic-indian-writer-released-under-free-licence-to-benefit-wikisource"&gt; 55 Works of Iconic Indian writer released under Free Licence to benefit Wikisource &lt;/a&gt; (T. Vishnu Vardhan, November 13, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/blog/odia-author-nirmala-kumari-mohapatra-21-books-under-cc"&gt; Odia author Nirmala Kumari Mohapatra's 21 books relicensed under CC-by-SA 4.0 &lt;/a&gt; (Subhashish Panigrahi, November 17, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/blog/nineteen-books-by-ama-odisha-relicensed"&gt; Nineteen Books Published by Ama Odisha Relicensed under CC-by-SA 4.0 &lt;/a&gt; (Subhashish Panigrahi, November 25, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt;News and Media Coverage &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; CIS-A2K team gave its inputs to the following media coverage: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/just-kannada-november-23-2014-kannada-wikipedia-presentation-coverage"&gt; ಭಾಷಣದಿಂದ ಭಾಷೆ ಉಳಿಯಲ್ಲ, 				ಕನ್ನಡದಲ್ಲೇ ಮಾಹಿತಿ 				ಸಿಗುವುದು ಅಗತ್ಯ: ಪವನಜ &lt;/a&gt; (Just Kannada; November 23, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/prajavani-november-24-2014-kannada-wikipedia-presentation-in-mysuru"&gt; Kannada Wikipedia Presentation in Mysuru &lt;/a&gt; (Prajavani; November 24, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/the-hindu-november-24-2014-govind-d-belgaumkar-now-tulu-set-to-be-promoted-through-wikipedia-articles"&gt; Now, Tulu set to be promoted through Wikipedia articles &lt;/a&gt; (Hindu; November 24, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/the-hindu-november-26-2014-ravi-prasad-kamila-tulu-wikipedia-in-incubation-stage"&gt; 'Tulu Wikipedia' in incubation stage, 600 articles uploaded, says U.B. Pavanaja &lt;/a&gt; (Ravi Prasad Kamila; Hindu; November 26, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/odisha-sun-times-november-28-2014-odia-wikisource-launched-in-odisha-capital"&gt; Odia Wikisource launched in Odisha capital &lt;/a&gt; (Odisha Sun Times; November 28, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/news/orissa-diary-november-28-2014-odia-wikisource-aims-to-bring-valuable-and-rare-books-on-the-internet"&gt; Odia Wikisource aims to bring valuable and rare books on the Internet &lt;/a&gt; (Odisha Diary; November 28, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Event Co-organized &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/events/odia-wikisource-sabha-2014"&gt;Odia Wikisource Sabha 2014&lt;/a&gt; (Co-organized by CIS-A2K and Odia Wikimedia Community; November 28, 2014). Subhashish Panigrahi participated in the event. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Participation in Event &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/seminar-e-publishing-odia-books"&gt;A Seminar on E-publishing of Odia Books&lt;/a&gt; (Organized by Molybtech Technology Solutions; November 30, 2014). Subhashish Panigrahi was a speaker. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►&lt;b&gt;Openness &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;small&gt; Blog Entry &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/blog/privacy-v-transparency"&gt;Privacy vs. Transparency: An Attempt at Resolving the Dichotomy&lt;/a&gt; (Sunil Abraham &lt;i&gt;with feedback and inputs from Sumandro Chattapadhyay, Elonnai Hickok, Bhairav Acharya and Geetha Hariharan&lt;/i&gt;; November 14, 			2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;News and Media Coverage &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy"&gt; Getting Strategic about Openness and Privacy &lt;/a&gt; (Tim Davies; Open Data Research Lead at Web Foundation; November 3, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;small&gt; Participation in Event &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/crypto-currencies"&gt;Content co-ordination for the Panel Discussion on Crypto-Currencies&lt;/a&gt; (organized by the Law and Technology Society; November 15, 2014). Sharath Chandra Ram was a panelist and made a presentation Scalability and 			Security Issues in Distributed Trust based Cryto-Currency Systems like BITCOIN &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;/small&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Privacy &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; As part of our Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project with Privacy International we are engaged in 		enhancing respect for the right to privacy in developing countries. During the month we published the following blog entries: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt;Blog Entries &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2"&gt;White Paper on RTI and Privacy V1.2&lt;/a&gt; (Vipul Kharbanda; November 9, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables"&gt; Introduction: About the Privacy and Surveillance Roundtables &lt;/a&gt; (Manoj Kurbet; November 27, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Event Organized &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/events/iocose-talk-at-cis"&gt;IOCOSE's talk at CIS&lt;/a&gt; (CIS, Bangalore; November 27, 2014). There was a presentation of the work of the artists group IOCOSE, current artists in residence at T.A.J./SKE 			Residency. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Upcoming Event &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/news/cpdp-2015"&gt;CPDP 2015&lt;/a&gt; : The eighth international conference on computers, privacy and data protection will be held in Brussels from January 21 to 23, 2015. CIS is a 			moral supporter of CPDP. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Participation in Events &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-hague-institute-for-global-justice-november-4-2014-e-consultation-on-cyber-security-justice-and-governance-begins"&gt;&lt;b&gt; &lt;/b&gt;E-Consultation on Cyber Security, Justice, and Governance Begins! &lt;/a&gt; (Organized by the Hague Institute for Global Justice; November 4, 2014). Sunil Abraham facilitated the e-consultation on "Internet access, the 			freedom of expression online, and development in the Global South". &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/learning-forum-transparency-and-human-rights-in-the-digital-age"&gt; Learning Forum: Transparency and Human Rights in the Digital Age &lt;/a&gt; (Organized by Global Network Initiative; November 6, 2014). Pranesh Prakash gave a talk on transparency reports and their use and abuse in India; 			the Intermediary Liability Rules in India (and its non-provision of any transparency mechanism); and the need for transparency in private speech 			regulation, not just governmental speech regulation. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill"&gt; Fourth Discussion Meeting of the Expert Committee to Discuss the Draft Human DNA Profiling Bill &lt;/a&gt; (Organized by the Department of Biotechnology; New Delhi; November 10, 2014). Sunil Abraham was unable to participate because of technical 			problems. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/ground-zero-summit-2014"&gt;Ground Zero Summit 2014&lt;/a&gt; (Organized by India Infosec Consortium; November 13-14, 2014). Geetha Hariharan participated in this event. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt;&lt;small&gt;&lt;a href="https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance"&gt;Privacy,               security and surveillance: tackling international dilemmas               and dangers in the digital realm&lt;/a&gt; &lt;/small&gt;&lt;small&gt;(Organized by Wilton Park; November 17-19, 2014). Pranesh Prakash was a panelist in the session "Beyond the familiar: how do other countries deal 			with security and surveillance oversight?" &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Free Speech &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; Under a grant from the MacArthur Foundation, CIS is doing research on the restrictions placed on freedom of expression online by the Indian government 		and contribute studies, reports and policy briefs to feed into the ongoing debates at the national as well as international level. As part of the 		project we bring you the following outputs: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;&lt;b&gt;Blog Entries &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance"&gt; Good Intentions, Recalcitrant Text - II: What India's ITU Proposal May Mean for Internet Governance &lt;/a&gt; (Geetha Hariharan; November 1, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/blog/indias-statement-at-itu-plenipotentiary-conference-2014"&gt; India's Statement at ITU Plenipotentiary Conference, 2014 &lt;/a&gt; (Geetha Hariharan; November 4, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Newspaper Article &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-november-18-2014-pranesh-prakash-the-socratic-debate-whos-internet-is-it-anyway"&gt;&lt;b&gt; &lt;/b&gt;The Socratic debate: Whose internet is it anyway? &lt;/a&gt; (Pranesh Prakash; Economic Times; November 18, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt; &lt;br /&gt;CIS gave its inputs to the following media coverage: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-economic-times-vasudha-venugopal-november-2-2014-twitter-users-find-several-accounts-suspended-for-unknown-reasons"&gt; Twitter users find several accounts suspended for unknown reasons &lt;/a&gt; (Vasudha Venugopal; Economic Times; November 2, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/digit-november-3-2014-silky-malhotra-several-indian-twitter-users-accounts-suspended-due-to-tech-glitch"&gt; Several Indian Twitter users' accounts suspended due to tech glitch &lt;/a&gt; (Silky Malhotra; digit; November 3, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character"&gt; Game release cancelled over gay character &lt;/a&gt; (Jaison Lewis; Mumbai Mirror; November 19, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone"&gt;Leave the Net Alone&lt;/a&gt; (Businessworld; November 25, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt; &lt;br /&gt; &lt;/small&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and 		social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and 		document new conversations and debates that shape the contours of Digital Humanities in Asia: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt;Blog Entry &lt;/small&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/raw/mapping-digital-humanities-in-india-concluding-thoughts"&gt;&lt;b&gt; &lt;/b&gt;Mapping Digital Humanities in India - Concluding Thoughts &lt;/a&gt; (P.P.Sneha; November 30, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;/small&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 		accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), 		and engages in academic research on digital natives and digital humanities. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ► Follow us elsewhere &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ► Support Us &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at 		No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ► Request for Collaboration: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director - Research, at		&lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, 		Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core 			funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy 			International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt; &lt;/small&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/november-2014-bulletin'&gt;https://cis-india.org/about/newsletters/november-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2014-12-15T13:27:04Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights">
    <title>Security and Surveillance: A public discussion on Optimizing Security while Safeguarding Human Rights</title>
    <link>https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to a public discussion on optimizing security and safeguarding human rights at its Bangalore office on Friday, December 19th, 2014, 16:00 to 18:00.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, in collaboration with Privacy International UK, has undertaken exploratory research into surveillance, security, and the security market in India.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Through this research, we hope to understand and document policy and law associated with security, surveillance, and the security market in India and learn about the regulation of security and related technologies such as encryption, filtering, monitoring software, and interception equipment. We also hope to understand the import and export policy regime for dual use technologies.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Such findings will be critical in creating evidence based research to inform security policy and regulation in India and work towards enabling regulatory frameworks that optimize the nation’s security while protecting the rights of citizens.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights'&gt;https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-19T08:46:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules">
    <title>A Study of the Privacy Policies of Indian Service Providers and the 43A Rules</title>
    <link>https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p&gt;Written by Prachi  Arya and Kartik Chawla&lt;br /&gt;Edited by: Vipul Kharbanda, Elonnai Hickok, Anandini Rathore, and Mukta Batra&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/study-of-privacy-policies-indian-service-providers.pdf" class="internal-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Contents&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957920"&gt;Executive Summary&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957921"&gt;Introduction&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957922"&gt;Objective, Methodology, and Scope of the Study&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957923"&gt;Objective of Research&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957924"&gt;Methodology&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957925"&gt;Scope&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957926"&gt;Criteria for selection of companies being studied&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957927"&gt;Overview of Company Privacy Policy and Survey Results&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957928"&gt;Vodafone&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957929"&gt;Tata Teleservices Limited&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957930"&gt;Airtel&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957931"&gt;Aircel&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957932"&gt;Atria Convergence Technologies&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957933"&gt;Observations&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957934"&gt;International Best Practices&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957935"&gt;Australia&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957936"&gt;European Union&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957937"&gt;Recommendations&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957938"&gt;Annexure 1&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957939"&gt;Annexure 2&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.gjdgxs"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957920"&gt;Executive Summary&lt;/a&gt; &lt;a name="h.30j0zll"&gt;&lt;/a&gt; &lt;a name="h.1fob9te"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;India has one of the largest telecom subscriber base in the world, currently estimated at 898 Million users.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; With over 164.8 Million people accessing the internet	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; in the subcontinent as well, technology has concurrently improved to facilitate 	such access on mobile devices. In fact, the high penetration rate of the internet in the market can be largely attributed to mobile phones, via which over 	80% of the Indian population access the medium.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this is a positive change, concerns now loom over the expansive access that service providers have to the information of their subscribers. For the 	subscriber, a company's commitment to protect user information is most clearly defined via a privacy policy. Data protection in India is broadly governed 	by Rules notified under Section 43A of the Information Technology Act 2000.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Amongst 	other things, the Rules define requirements and safeguards that every Body Corporate is legally required to incorporate into a privacy policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The objective of this research is to understand what standards of protection service providers in India are committing to via organizational privacy 	policies. Furthermore, the research seeks to understand if the standards committed to via organizational privacy policies align with the safeguards 	mandated in the 43A Rules. Towards this, the research reviews the publicly available privacy policies from seven different service providers - Airtel, 	Aircel, Vodafone, MTNL, BSNL, ACT, and Tata Teleservices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The research finds that only Airtel, Vodafone, and Tata Teleservices fully incorporate the safeguards defined in the 43A Rules. Aircel, and ACT incorporate 	a number of such safeguards though not all. On the other hand BSNL minimally incorporates the safeguards, while MTNL does not provide a privacy policy that 	is publicly available.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957921"&gt;&lt;/a&gt; &lt;a name="h.3znysh7"&gt;&lt;/a&gt; Introduction&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The Indian Telecom Services Performance Indicators report by the Telecom Regulatory Authority of India (TRAI)	&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; pegs the total number of internet subscribers in India at 164.81 million and the 	total number of telecom subscribers at 898.02 million, as of March 2013. As mobile phones are adopted more widely, by both rural and urban populations, there is an amalgamation of telecommunications and internet users. Thus, in India, seven out of eight internet users gain access through mobiles phones.	&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this rapid evolution of technology allows greater ease of access to digital communication, it also has led to an increase in the amount of personal 	information that is shared on the internet. Subsequently, a number of privacy concerns have been raised with respect to how service providers handle and 	protect and customer data as companies rely on this data not only to provide products and services, but also as a profitable commodity in and of itself. 	Individuals are thus forced to confront the possible violation of their personal information, which is collected as a &lt;i&gt;quid pro quo &lt;/i&gt;by service 	providers for access to their services and products. In this context, protection of personal information, or data protection, is a core principle of the 	right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, the right to privacy has been developed in a piecemeal manner through judicial intervention, and is recognized, to a limited extent, as falling under the larger ambit of the fundamental rights enshrined under Part III of the Constitution of India, specifically those under Article 21.	&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In contrast, historically in India there has been limited legislative interest 	expressed by the Government and the citizens towards establishing a statutory and comprehensive privacy regime. Following this trend, the Information 	Technology Act, 2000 (IT Act), as amended in 2008, provided for a limited data protection regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, this changed in 2010 when, concerned about India's robust growth in the fields of IT industry and outsourcing business, an 'adequacy assessment' was commissioned by the European Union (EU), at the behest of India, which found that India did not have adequate personal data protection regime.	&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The main Indian legislation on the personal data security is the Information 	Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (Rules), enacted under Section 43A of the 	IT Act, which&lt;b&gt; &lt;/b&gt;extends the civil remedy by way of compensation in case wrongful loss or gain under Section 43A to cases where such loss or 	gain results from inadequate security practices and procedures while dealing with sensitive personal data or information. In 2012, the Justice AP Shah 	group of Experts was set up to review and comment on Privacy,&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; for the purpose of 	making recommendations which the government may consider while formulating the proposed framework for the Privacy Act.&lt;a name="h.2et92p0"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957922"&gt;Objective, Methodology, and Scope of the Study&lt;/a&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957923"&gt;&lt;/a&gt; &lt;a name="h.tyjcwt"&gt;&lt;/a&gt; Objective of Research&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This research aims to analyse the Privacy Policies of the selected Telecommunications (TSP) and Internet Service Providers (ISP) (collectively referred to 	as 'service providers' for the purposes of this research) in the context of the Information Technology (Reasonable Security Practices and Procedures and 	Sensitive Personal Data or Information) Rules ('Rules') in order to gain perspective on the extent to which the privacy policies of different types of 	service providers in India, align with the Rules. Lastly, this research seeks to provide broad recommendations about changes that could be incorporated to 	harmonize the respective policies and to bring them in line with the aforementioned Rules.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957924"&gt;&lt;/a&gt; &lt;a name="h.3dy6vkm"&gt;&lt;/a&gt; Methodology&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policies&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; of seven identified service providers are sought to be 	compared vis-a-vis - the requirements under the Information Technology (Reasonable security practices and procedures and sensitive personal data or 	information) Rules, 2011, (Rules) as notified by way of section 87(2) (ob) read with section 43A of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Specifically, the Privacy Policies of each of the selected companies are compared against a template that is based on of the essential principles of the 	Rules respectively, and consists of a series of yes or no questions which are answered on the basis of the respective Privacy Policy. These responses are 	meant to fulfil the first aim of this research, i.e., provide a perspective into the extent to which these companies follow the Rules and the Principles, 	and thus the extent to which they respect the privacy of their customers. See Annex 1 for the survey template and the interpretation of the 43A Rules for 	the development of the survey.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957925"&gt;&lt;/a&gt; &lt;a name="h.1t3h5sf"&gt;&lt;/a&gt; Scope&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_Toc406957926"&gt;Criteria for selection of companies being studied&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For the purpose of the study the companies selected are limited to service providers - including Telecommunication Service Providers and Internet Service 	Providers. Four broad categories of companies have been selected, namely (i) State Owned Companies, (ii) Multinational Companies, (iii) Joint Venture 	companies where one party is an Indian company and the other party is a foreign based company and (iv) Domestic companies which have a localized user base. 	The companies have been selected on this basis of categorization to better understand if the quality of their respective privacy policies is determined by 	their market reach and user base.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy policies of the following service providers have been analyzed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. State Owned Companies&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;BSNL&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Bharat Sanchar Nigam Limited, better 	known as BSNL, is a state-owned telecommunications company that was incorporated by the Indian government in the year 2000, taking over the functions of 	Central Government departments of Telecommunications Services (DTS) and Telecom Operations (DTO). It provides, &lt;i&gt;inter alia&lt;/i&gt;, landline, mobile, and broadband services, and is India's oldest and largest communication services provider.	&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It had a monopoly in India except for Mumbai and New Delhi till 1992.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;MTNL&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Mahanagar Telephone Nigam Limited is a 	state-owned telecommunications company which provides its services in Mumbai and New-Delhi in India, and Mauritius in Africa. It was set up by the Indian 	Government in the year 1986, and just like BSNL, it had a monopoly in the sector till 1992, when it was opened up to other competitors by the Indian government. It provides, &lt;i&gt;inter alia&lt;/i&gt;, Telephone, Mobile, 3G, and Broadband services.	&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Multinational Companies&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Bharti Airtel Ltd:&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt; Bharti Airtel, more 	commonly referred to as Airtel, is the largest provider of mobile telephony and the second largest provider of fixed telephony in India. Its origins lie in 	the Bharti Group founded by Sunil Bharti Mittal in 1983, and the Bharti Telecom Group which was incorporated in 1986. It is a multinational company, providing services in South Asia, Africa, and the Channel Islands. Among other services, it offers fixed line, cellular, and broadband services.	&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The company also owns a submarine cable landing station in Chennai, connecting 	Chennai and Singapore.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Vodafone&lt;/b&gt;&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;b&gt;:&lt;/b&gt; Vodafone is a British 	multinational telecom company. Its origins lie in the establishment of Racal Telecom in 1982 which then became Racal Vodafone in 1984, which was a joint venture between Racal, Vodafone and Hambros Technology Trust. Racal Telecom was demerged from Racal Electronics in 1991, and became the Vodafone group.	&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Vodafone group started its operations in India with its predecessor Hutchison Telecom, which was a joint venture of Hutchison Whampoa and the Max Group, acquiring the cellular license for Mumbai in 1994&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and it bought out Essar's share in the same in the year 2007.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As of today, it has the second largest subscriber base in India. After Airtel,	&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Vodafone is the largest provider of telecommunications and mobile internet 	services in India.&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Joint Ventures&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Tata Teleservices&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt; - Incorporated in 1996, 	Tata Teleservices Limited is an Indian telecommunications and broadband company, the origins of which lie in the Tata Group. A twenty-six percent equity stake was acquired by the Japanese company NTT Docomo in Tata Docomo, a subsidiary of Tata Teleservices, in 2008.	&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Tata Teleservices provides services under three brand names, Tata DoCoMo, Virgin 	Mobile, and T24 Mobile. As a whole, these brands under the head of Tata Teleservices provide cellular and mobile internet services, with the exception of the Tata Sky teleservices brand, which is a joint venture between and Tata Group and Sky.	&lt;sup&gt; &lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Aircel&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Aircel is an Indian mobile 	headquarter, which was started in Tamil Nadu in the year 1999, and has now expanded to Tamil Nadu, Assam, North-east India and Chennai. It was acquired by Maxis Communication Berhard in the year 2006, and is currently a joint venture with Sindya Securities &amp;amp; Investments Pvt. Ltd.	&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Aircel provides telecommunications and mobile internet services in the 	aforementioned regions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. India based Companies/Domestic Companies -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Atria Convergence Technologies (ACT)&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Atria 	Convergence Technologies Pvt. Ltd is an Indian cable television and broadband services company. Funded by the India Value Fund Advisor (IVFA), it is 	centered in Bangalore, but also provides services in Karnataka, Andhra Pradesh, and Madhya Pradesh.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957927"&gt;Overview of Company Privacy Policy and Survey Results&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This section lays out the ways in which each company's privacy policy aligns with the Rules found under section 43A of the Information Technology Act. The 	section is organized based on company and provides both a table with the survey questions and yes/no/partial ratings and summaries of each policy. The 	rationale and supporting documentation for each determination can be found in Annexure 2.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;VODAFONE&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;b&gt;[31]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Criteria&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes/No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of publicly available documents of the body corporate that 					collect personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Type&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt; Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Grievance Officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Purpose of Collection and usage of information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Disclosure of Information &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Reasonable Security practices and procedures&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="h.4d34og8"&gt;&lt;/a&gt; &lt;br clear="all" /&gt; &lt;a name="_Toc406957928"&gt;&lt;/a&gt; &lt;a name="h.2s8eyo1"&gt;&lt;/a&gt; Vodafone&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Vodafone's privacy policy partially incorporates the safeguards found in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone's privacy policy is accessible online, however, it does not include a copy of its policy with a customer application form. The policy merely lists 	the type of information collected with no categorization as to SPD/I. The information collected includes contact information, location based information, 	browsing activity and persistent cookies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no provision for consent or choice within the policy. Disclosure of personal information to third parties extends to Vodafone's group companies, 	companies that provide services to Vodafone, credit reference agencies and directories.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy mentions an email address for grievance redressal. In addition, the policy does not lay down any mechanism for correcting personal information 	that is held with Vodafone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone has a non-exhaustive list of purposes of information usage, though these primarily relate to subscriber services, personnel training, and legal or 	regulatory requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With regard to security practices, Vodafone follows the ISO 27001 Certification as per its 2012 Sustainability Report, however this goes unmentioned under 	its privacy policy&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Tata Teleservices Limited&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;b&gt;[32]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Criteria&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Yes/No&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Clear and Accessible statements of its practices and policies&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Collection of personal or sensitive personal data/information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Type&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Option&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Grievance Officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Purpose of Collection and usage of information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?					&lt;ins cite="mailto:Vipul" datetime="2014-07-01T14:26"&gt; &lt;/ins&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Disclosure of Information &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Reasonable Security practices and procedures&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957929"&gt;&lt;/a&gt; &lt;a name="h.17dp8vu"&gt;&lt;/a&gt; Tata Teleservices Limited&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Tata Teleservices Limited's Privacy Policy fully incorporates the safeguards found in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Tata Teleservices Limited privacy policy is accessible on their website, though when applying for a subscription, the terms and conditions do not 	include the privacy policy. The privacy policy is easy to understand although there are several elements of the 2011 Rules that are unaddressed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy does not make any distinction regarding sensitive personal data or information. As per the policy, TTL collects contact and billing information, 	information about the equipment the subscriber is using, and information and website usage from its customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The purposes of information collection are broadly for managing customer services and providing customized advertising. Information is also collected for 	security issues, illegal acts and acts that are violative of TTL's policy. TTL's directory services use a customer's name, address and phone number, 	however a customer may ask for his/her information to not be published on payment of a fee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the policy, the disclosure of information to third parties is limited to purposes such as identity verification, bill payments, prevention of 	identity theft and the performance of TTL's services. Third parties are meant to follow the guidelines of TTL's privacy policy in the protection of its 	user information. The consent of subscribers is only required when third parties may use personal information for marketing purposes. Consent is precluded 	under the previous conditions. Disclosure of information to governmental agencies and credit bureaus is for complying with legally authorised requests such 	as subpoenas, court orders and the enforcement of certain rights or claims. The policy provides for a grievance officer and in addition, TTL, has a 	separate Appellate Authority to deal with consumer complaints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TTL does not follow any particular security standard for the protection of subscriber information, however, it establishes other measures such as limited 	access to employees, and encryption and other security controls. Although TTL Maharashtra follows the ISO 27001 ISMS Certification, TTL does not seem to 	follow a security standard for data protection for other regions of its operations.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Airtel&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;b&gt;[33]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Criteria&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Yes/No&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the name and contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Purpose of Collection and usage of information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?					&lt;ins cite="mailto:Vipul" datetime="2014-07-01T14:44"&gt; &lt;/ins&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Disclosure of Information &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Reasonable Security practices and procedures&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.3rdcrjn"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957930"&gt;Airtel&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Airtel's Privacy Policy fully incorporates the safeguards found in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Airtel's privacy policy incorporates a number of the requirements stipulated in the Rules. Airtel's privacy policy is easily accessible on its website and 	is clear and easy to understand. The policy defines sensitive personal information, and states that information collected will be used for specified 	regulatory and business purposes, though it adds that it may be used for other purposes as well. The policy does allow for the withdrawal of consent for 	providing information, in which case, certain services may be withheld. In addition, Airtel has provided for a grievance officer and abides by the 	IS/ISO/IEC 27001 security standards. While Airtel allows for the disclosure of information including sensitive personal information to third parties, its 	policy states that such third parties will follow reasonable security practices in this regard. Concerning disclosure to the government, Airtel shares user 	information only when it is legally authorised by a government agency. Airtel's policy also provides for an opt-out provision. Such choice remains after 	subscription of Airtel's services as well. However, withdrawal of consent gives Airtel the right to withdraw its services as well. In terms of disclosure, 	sharing of user information with third parties is regulated by its Airtel's guidelines on the secrecy of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Airtel lists the purposes for information collection, it states that such collection may not be limited to these purposes alone. In addition, the 	policy states that user's personal information will be deleted, although it does not state when this will happen. Thus, the policy could be more 	transparent and specific on matters of regarding the purpose of collection of information as well as deletion of information.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Aircel&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;b&gt;[34]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Criteria&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes/No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;no&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of Collection and usage of information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure of Information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Reasonable Security practices and procedures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;ins cite="mailto:Vipul" datetime="2014-07-01T14:58"&gt; &lt;/ins&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.26in1rg"&gt;&lt;/a&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957931"&gt;Aircel&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Aircel's Privacy Policy partially complies with the safeguards in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aircel's privacy policy is accessible online through its website, though it is not included under the terms and conditions of its customer application. The 	privacy policy lists the kinds of information that is collected from subscribers, including relevant contact details, call records, browsing history, 	cookies, web beacons, server log files and location details. The policy does not demarcate information into SPD/I or personal information. Aircel provides 	subscribers with the right to withdraw consent from the provision of information before and after subscribing, while reserving the right to withdraw its 	services in this regard. The policy provides the name and contact details of a grievance officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the privacy policy, the stated purposes for use of subscriber information is limited to customer services, credit requirements, market analyses, legal 	and regulatory requirements, and directory services by Aircel or an authorised third party.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the policy, the provision on disclosure to governmental agencies is vague and does not mention the circumstances under which personal information would 	be disclosed to law enforcement. The policy provides for correction of information of a subscriber in case of error and deletion after the purpose of the 	information is served but does not specify when. Although Aircel follows the ISO 27001 standard, it does not mention this under its policy. It does 	however, provide for accountability in cases of breach or privacy.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Atria Convergence Technologies&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;b&gt;[35]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Criteria&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Yes/No&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;information not available&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of Collection and usage of information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure of Information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Reasonable Security practices and procedures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957932"&gt;&lt;/a&gt; &lt;a name="h.lnxbz9"&gt;&lt;/a&gt; Atria Convergence Technologies&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Though Atria Convergence Technologies provides a privacy policy on its website, it does not broadly incorporate the safeguards in the Rules under 43A. 	ACT's privacy policy is easily accessible online and is easy to understand as well. The information collected from subscribers is limited to contact 	details along with information on whether a subscriber has transacted with any of ACT's business partners. Though the privacy policies refers to disclosing 	information for the purpose of assisting with investigating, preventing, or take action on illegal behaviour - there is no specific provision concerning 	disclosure to government and regulatory agencies. The policy does not provide information on any security practices and procedures followed. Provisions for 	withdrawal of consent or correction of personal information are absent from the policy as well.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;BSNL: 43A Rules Survey&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Criteria&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes/No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly states that it is collecting SPD/I?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of Collection and usage of information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure of Information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Reasonable Security practices and procedures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.35nkun2"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;BSNL&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;BSNL's Privacy Policy broadly does not incorporate the safeguards in the Rules under 43A .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;BSNL's privacy is accessible online, though not on the website, and is easy to understand. The policy does not however, categorize SPD/I but defines 	personal information vaguely as information that helps BSNL identify its customers. As per its policy, subscriber information is used for subscriber 	services such as identification, assistance etc., credit-worthiness and marketing communications. The policy does not contain any provision on consent and 	with respect to marketing communications and a customer implicitly agrees to third party usage of personal information. Third parties under the policy are 	those that provide services on behalf of BSNL, which extend mailing and billing services and market research services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per its policy, BSNL may disclose personal information on the basis of legal requirements to credit organisations, BSNL's consultants, government 	agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With respect to access and correction, BSNL reserves the right to modify its privacy policy without notice to its customers. What is presumably a grievance 	officer email address has been provided for queries and corrections on personal information, however no further contact details are given.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.1ksv4uv"&gt;&lt;/a&gt; &lt;b&gt;MTNL&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;MTNL does not provide a publicly available Privacy Policy. &lt;/b&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957933"&gt;&lt;/a&gt; &lt;a name="h.44sinio"&gt;&lt;/a&gt; Observations&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;This section highlights key trends observed across the privacy policies studied in this research by contrasting the applicable Rule against the applicable 	provision in the policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Access and Location of Privacy Policy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; According to Rule 4 of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, a Body 	Corporate must provide a privacy policy on their website. Under Rule 5, all bodies corporate have to convey the purpose(s) for which SPD/I are collected 	prior to the collection and they can, under certain circumstances, move forward with the collection regardless of consent. While this does not entirely 	violate the Notice Principle of the National Privacy Principles, it does not meet the rather higher standards of the Principle, which recommends that 	notice must be provided prior to any form of collection of personal information. In addition, the Rules do not contain provisions regulating bodies 	corporate, regarding changes to their privacy policies.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : In the survey, it was found that the location and accessibility of a service provider's privacy policy varied. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a. &lt;/b&gt; &lt;b&gt;Privacy Policy on main website:&lt;/b&gt; Airtel, Aircel, and Vodafone provide a privacy policy that is accessible through the main website of each respective company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b. &lt;/b&gt; &lt;b&gt;Privacy Policy not on website&lt;/b&gt; : MTNL does not provide a Privacy Policy on the main website of each of its respective branches across India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c. &lt;/b&gt; &lt;b&gt;Privacy Policy not accessible through main website&lt;/b&gt; : TTL and BSNL have a Privacy Policy, but it is not accessible through the main website. For example, The Privacy Policy found on TTL's website is only accessible through the "terms and services" link on the homepage. Similarly, the BSNL privacy policy can only be found through its portal website.	&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;d. &lt;/b&gt; &lt;b&gt;Privacy Policy not included in Customer Application form&lt;/b&gt; : Almost all of the Service Providers do not include/refer to their Privacy Policy in the Customer Application Form, and some do not display their privacy 	policy or a link to it on its website's homepage. For example, Airtel is the only Service Provider that refers to their privacy policy in the Customer 	Application Form for an Airtel service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;e. &lt;/b&gt; &lt;b&gt;Collection of personal information before Privacy Policy: &lt;/b&gt; In some cases it appears that service providers collect private information before the privacy policy is made accessible to the user. For example, before 	the homepage of ACT's website is shown, a smaller window appears with a form asking for personal information such as name, mobile and email Id. Although 	the submission of this information is not mandatory, there is no link provided to the privacy policy at this level of collection of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Sharing of information with Government&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; Rule 6, specifically the proviso to Rule 6, and the Disclosure of Information Principle respectively govern the disclosure of information to third parties. 	Yet, while the proviso to Rule 6 directly concerns the power of the government to access information with or without consent for investigative purposes, 	the Disclosure of Information Principle only says that disclosure for law enforcement purposes should be in accordance with the laws currently in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : Though all service providers did include statements addressing the potential of sharing information with law enforcement or governmental agencies, how 	this was communicated varied. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a.) &lt;/b&gt; &lt;b&gt;Listing circumstances for disclosure to law enforcement&lt;/b&gt; : The Privacy Policy of ACT states 	&lt;i&gt; "We believe it is necessary to share information in order to investigate, prevent, or take action regarding illegal activities, suspected fraud, situations involving potential threats to the physical safety of any person".		&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; The Privacy Policy of Airtel on the other hand states 	&lt;i&gt; "Government Agencies: We may also share your personal information with Government agencies or other authorized law enforcement agencies (LEAs) mandated 		under law to obtain such information for the purpose of verification of identity or for prevention, detection, investigation including but not limited to cyber incidents, prosecution, and punishment of offences."		&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Lastly, TTL states&lt;i&gt; &lt;/i&gt;" 	&lt;i&gt; To investigate, prevent or take action regarding illegal activities, suspected fraud, situations involving potential threats to the physical safety of 		any person" or "To notify or respond to a responsible governmental entity if we reasonably believe that an emergency involving immediate danger of death or serious physical injury to any person requires or justifies disclosure without delay".		&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b.) &lt;/b&gt; &lt;b&gt;Listing authorities to whom information will be disclosed to&lt;/b&gt; : The privacy policy of&lt;i&gt; &lt;/i&gt;Aircel states 	&lt;i&gt; "There may be times when we need to disclose your personal information to third parties. If we do this, we will only disclose your information to: 		…8. Persons to whom we may be required to pass your information by reason of legal, governmental or regulatory authority including law 		enforcement agencies and emergency services".&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Similarly&lt;i&gt;, &lt;/i&gt;Vodafone&lt;i&gt; &lt;/i&gt;states 	&lt;i&gt; "There may be times when we need to disclose your personal information to third parties. If we do this, we will only disclose your information to 		persons to whom we may be required to pass your information by reason of legal, governmental or regulatory authority including law enforcement agencies and emergency services and any person or organisation as authorised by laws and regulations applicable in India."		&lt;a href="#_ftn42" name="_ftnref42"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; While BSNL states 	&lt;i&gt; "Apart from the above, BSNL may divulge your personal information to: Government bodies, Regulatory Authorities, and other organizations in accordance 		with the law or as authorised by law…".&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Readability of Privacy Policies&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle&lt;/b&gt; : In subsection (i) of Rule 4 body corporate must provide a privacy policy that is "&lt;i&gt;clear and accessible&lt;/i&gt;". Similarly, the Notice Principle requires that the data controller give a "	&lt;i&gt;simple-to-understand notice of its information practices to all individuals, in clear and concise language&lt;/i&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : It was found that, particularly with respect to clauses on the collection and disclosure of information, most Privacy Policies use:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Vague terminology: &lt;/b&gt;For example, in the Privacy Policy of ACT, it states as a purpose of collection &lt;i&gt;"conduct research" &lt;/i&gt;while 	for the collection and disclosure of information it states 	&lt;i&gt; ,"The Company may combine information about you that we have, with information we obtain from business partners or other companies. The Company shall have the right to pass on the same to its business associates, franchisees without referring the same to you."		&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Similarly, with regards to the collection of information, Vodafone's Privacy Policy states that it may collect 	&lt;i&gt; "any other information collected in relation to your use of our products and services".		&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Undefined terminology:&lt;/b&gt; On disclosure of information TTL's privacy policy states disclosure is 	&lt;i&gt; "Subject to applicable legal restrictions, such as those that exist for Customer Proprietary Network Information (CPNI)"		&lt;a href="#_ftn46" name="_ftnref46"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Confusingly, although TTL defines CPNI it does not mention what legal restriction it is referring to, and CPNI is in fact an American term and similar 	legal restrictions could not be found in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Information about security practices&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; The parameter for 'reasonable security practices and procedures' has been detailed comprehensively under Rule 8 of the Rules. The same is also covered in 	detail under the Openness Principle read with Security Principle. While the Security Principle recommends that the data controller protect the information 	they collect through reasonable security safeguards, the Openness Principle recommends that information regarding these should be made available to all 	individuals in clear and plain language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : With the exception of Airtel, no service provider has comprehensively followed the legal requirements for the purpose of their privacy policy. Thus, 	while most service providers do mention security practices, many do not provide specific or comprehensive details about their security practices and 	procedures for data protection, and instead assure users that 'reasonable security' procedures are in place. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Comprehensive information about security practices in privacy policy&lt;/b&gt;: Airtel and Aircel have provided comprehensive information about 	their security practices in the companies Privacy Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Information about security practice, but not in privacy policy&lt;/b&gt;: Vodafone has specified its security standards only in its latest 	'Sustainability Report' available on its website. In the case of TTL, the specific security standard it follows is available only for its Maharashtra 	branch (TTLM) through its annual report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Broad reference to security practices&lt;/b&gt;: Many service providers broadly reference security practices, but do not provide specifics. For example, TTL states only &lt;i&gt;"we have implemented appropriate security controls to protect Personal Information when stored or transmitted by TTL&lt;/i&gt;."	&lt;a href="#_ftn47" name="_ftnref47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. &lt;b&gt;No information about security practices: &lt;/b&gt;Some service providers do not mention any details about their security practices and 	procedures, or whether they even follow any security practices and procedures or not. An example of this would be ACT, which does not mention any security 	practices or procedures in its Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Grievance mechanisms&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; Rule 5 of the Rules mandates that applicable bodies corporate must designate a 'Grievance Officer' for redressing grievances of users regarding processing 	of their personal information, and the same is also recommended by the Ninth Principle, i.e., Accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : It was found that adherence with this requirement varied depending on service provider. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;No Grievance Officer:&lt;/b&gt; ACT and MTNL do not provide details of a grievance officer on their websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Grievance Officer, but no process details&lt;/b&gt;: Airtel, TTL, and Vodafone provide details of the Grievance Officer, but no further 	information about the grievance process is provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Grievance Officer and details of process: &lt;/b&gt;Aircel&lt;b&gt; &lt;/b&gt;provides details of the grievance officer and grievance process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;As a note:&lt;/b&gt; All service providers with the exception of ACT have a general grievance redressal mechanism in place as documented on TRAI's website.	&lt;a href="#_ftn48" name="_ftnref48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is unclear whether these mechanisms are functional, and furthermore it is 	also unclear if these mechanisms can be used for complaints under the IT Act or the Rules, or complaints on the basis of the Principles. It should be 	further noted that the multiplicity of grievance redressal officers is a cause for concern, as it may lead to confusion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Consent Mechanism &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle&lt;/b&gt; : Rules 5 and 6 of the Rules&lt;a href="#_ftn49" name="_ftnref49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; on Collection and Disclosure of information, 	respectively, require applicable bodies corporate to obtain consent/permission before collecting and disclosing personal information. The Choice and Consent Principle of the National Privacy Principles, as enumerated in the A.P. Shah Report, deals exclusively with choice and consent.	&lt;a href="#_ftn50" name="_ftnref50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Withdrawal of consent is an important facet of the choice and consent principle as evidenced by the Rules&lt;a href="#_ftn51" name="_ftnref51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the National Privacy Principles	&lt;a href="#_ftn52" name="_ftnref52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation:&lt;/b&gt; Methods of obtaining consent and for what consent was obtained for varied across service providers. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a. &lt;/b&gt; &lt;b&gt;Obtaining consent:&lt;/b&gt; Some service providers give data subjects with the choice of submitting their personal information (with some exceptions such as for legal requirements) 	and obtaining their consent for its collection and processing. For example, the policies of Airtel, Aircel, and TTL are the only ones which provide 	information on the mechanisms used to obtain consent. ACT provides for targeted advertisements based on the personal information of the user. The viewing 	or interaction of the user of such targeted advertisements is however, considered an affirmation to this third party source, that the user is the targeted 	criteria. Thus, there appears to be lack of consent in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b. &lt;/b&gt; &lt;b&gt;No Consent or choice offered:&lt;/b&gt; Some service providers do not mention consent. For example, Vodafone, and BSNL do not make any mention of choice or consent in their respective privacy 	policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c. &lt;/b&gt; &lt;b&gt;Consent for limited circumstances: &lt;/b&gt; Some service providers only provide consent in limited circumstances. For example, ACT mentions consent only in relation to targeted advertising. However, 	this information is potentially misleading, as discussed earlier in the survey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also a certain degree of assumption in all the policies regarding consent, as noted in the survey. Thus, if you employ the services of the company 	in question, you are implicitly agreeing to their terms even if you have not actually been notified of them. And the vague terminology used by most of the 	policies leaves quite a lot of wiggle room for the companies in question, allowing them to thereby collect more information than the data subject has been 	notified of without obtaining his or her consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Transparency mechanism&lt;/b&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; The Openness Principle specifically recommends transparency in all activities of the data controller.	&lt;a href="#_ftn53" name="_ftnref53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Rules provide a limited transparency mechanism under Rule 8 which require 	bodies corporate to document their security practices and procedures and Rule 4 which requires them to provide such information via a privacy policy. As a 	note, these fall short of the level of 'transparency' espoused by the Openness Principle of the National Privacy Principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation: &lt;/b&gt; All service providers fail in implementing adequate mechanisms for transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt; &lt;b&gt;Scope&lt;/b&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle&lt;/b&gt; : Though the Openness Principle does not directly speak of the scope of the policies in question, it implies that policies regarding all data collection or 	processing should be made publically available. The same is also necessary under Rule 4, which mandates that any body corporate which " 	&lt;i&gt; collects, receives, possess, stores, deals or handle information of provider of information, shall provide a privacy policy for handling of or dealing 		in personal information including sensitive personal data or information and ensure that the same are available for view by such providers of 		information who has provided such information under lawful contract. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : Though most of the companies mention the scope of their Privacy Policy and include the information collected through the websites, WAP Services, and use 	of the company's products and services, some companies do not do so. For instance, the scope of the policy is given rather vaguely in the Airtel's Policy, 	and the scope of ACT's policy is restricted to the information collected during the usage of their products and services, and not their website. BSNL's 	privacy policy is worrisome as it seems to restrict its scope to the information collected through the website only, but does not at the same time state 	that it does not apply to other methods of data collection and processing.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957934"&gt;&lt;/a&gt; &lt;a name="h.2jxsxqh"&gt;&lt;/a&gt; International Best Practices&lt;/h1&gt;
&lt;h3&gt;&lt;b&gt;Canada&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The privacy regulation regime in Canada is a mixture of the federal regulations and the provincial regulations. Of the former, the Privacy Act is 	applicable to the public sector, while the Personal Information Protection and Electronic Documents Act ('PIPEDA') applies to the private sector. There are 	also federal level sectoral regulations, of which the Telecommunications Act is relevant here. The PIPEDA covers the activities of all businesses and 	federally regulated industries regarding their collection, use, disclosure, safeguarding and provision of access to their customers' personal information. Further, in 2009, the Canadian Radio-television and Telecommunications Commission ('CRTC'), by virtue of the 'Telecom Regulatory Policy CRTC 2009-657'	&lt;a href="#_ftn54" name="_ftnref54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; made ISPs subject to privacy standards higher than the standards given under the PIPEDA, while at the same time allowing them to use Internet Traffic Management Practices ('ITMPs').	&lt;a href="#_ftn55" name="_ftnref55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2009 policy is progressive as it balances the economic needs of Internet Traffic Management Providers vis-à-vis the privacy concerns of consumers. 	The need to identify ITMP's is integral in the protection of online privacy, as ITMP's most commonly employ methods such as deep packet inspection which 	can be used to burrow into personal information of consumers as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recognising that this may not be the current practice, but a possibility in the future, the policy makes certain guidelines for ITMPs. It permits ITMP's 	that block bad traffic such as spam and malicious software. Nearly all other ITMPs however, require the prior notice of 30 days or more before initialising 	the ITMP.&lt;a href="#_ftn56" name="_ftnref56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITMP's are to be used only for the defined need of the ISP and not beyond this, and must not be used for behavioural advertising. Secondary ISPs in their 	contracts with Primary ISPs must agree to the same duties of the latter, that is the personal information entrusted to them is meant for its purpose alone 	and is not to be disclosed further.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957935"&gt;Australia&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The central privacy regulation in Australia is the Privacy Act, 1988. The Act defines two sets of privacy principles, the Information Privacy Principles which apply to the public sector, and the National Privacy Principles which apply to the private sector.&lt;a href="#_ftn57" name="_ftnref57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These principles govern the following: collection,&lt;a href="#_ftn58" name="_ftnref58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; use and disclosure,&lt;a href="#_ftn59" name="_ftnref59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; data quality,&lt;a href="#_ftn60" name="_ftnref60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; security,&lt;a href="#_ftn61" name="_ftnref61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; openness,&lt;a href="#_ftn62" name="_ftnref62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; access and correction,&lt;a href="#_ftn63" name="_ftnref63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; identifiers,&lt;a href="#_ftn64" name="_ftnref64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; anonymity,&lt;a href="#_ftn65" name="_ftnref65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; trans-border data flows,&lt;a href="#_ftn66" name="_ftnref66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and sensitive information.	&lt;a href="#_ftn67" name="_ftnref67"&gt;&lt;sup&gt;&lt;sup&gt;[67]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Telecommunications Act, 1997, is also relevant here, as it also governs the use or disclosure of information by telecommunication services providers,	&lt;a href="#_ftn68" name="_ftnref68"&gt;&lt;sup&gt;&lt;sup&gt;[68]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; but such information is only protected by the Telecommunications Act if it comes 	to a person's knowledge or possession in certain circumstances. An example of this is Section 276 of the same, which providers that the information 	protected by that section will be protected only if the person collecting the information is a current or former carrier, carriages service provider or 	telecommunications contractor, in connection with the person's business as such a carrier, provider or contractor; or if the person is an employee of a 	carrier, carriage service provider, telecommunications contractor, because the person is employed by the carrier or provider in connection with its 	business as such a carrier, provider or contractor.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957936"&gt;European Union&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The most important source of law in the European Union ('EU') regarding Data Privacy in general is the Data Protection Directive ('Directive').	&lt;a href="#_ftn69" name="_ftnref69"&gt;&lt;sup&gt;&lt;sup&gt;[69]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive has a broad ambit, covering all forms of personal data collection and processing, and mandating that such collection or processing follow the Data Protection Principles it sets out.&lt;a href="#_ftn70" name="_ftnref70"&gt;&lt;sup&gt;&lt;sup&gt;[70]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive differentiates between Personal Data and Sensitive Personal Data,	&lt;a href="#_ftn71" name="_ftnref71"&gt;&lt;sup&gt;&lt;sup&gt;[71]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; with the collection and processing of the latter being subject to more stringent 	rules. The telecommunications service providers and internet service providers are included in the definition of 'Controller' as set out in the Directive, and are hence subject to the regulations enforced by the member states of the EU under the same.	&lt;a href="#_ftn72" name="_ftnref72"&gt;&lt;sup&gt;&lt;sup&gt;[72]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive will soon be superseded by the General Data Protection directive, which is scheduled to come into force in late 2014, with a two-year transition period after that.	&lt;a href="#_ftn73" name="_ftnref73"&gt;&lt;sup&gt;&lt;sup&gt;[73]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the above, ISPs are also subject to the Directive on Privacy and Electronic Communications&lt;a href="#_ftn74" name="_ftnref74"&gt;&lt;sup&gt;&lt;sup&gt;[74]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the Data Retention Directive.	&lt;a href="#_ftn75" name="_ftnref75"&gt;&lt;sup&gt;&lt;sup&gt;[75]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive on Privacy and Electronic Communications ('E-Privacy Directive') 	sets out rules regarding processing security, confidentiality of communications, data retention, unsolicited communications, cookies, and a system of 	penalties set up by the member states under the title of 'Control'. The E-Privacy Directive supplements the original Data Privacy Directive, and replaces a 	1997 Telecommunications Privacy directive. The Data Retention Directive does not directly concern the collection and processing of data by a service 	provider, but only concerns itself with the retention of collected data. It was an amendment to the E-Privacy Directive, which required the member states 	to store the telecommunications data of their citizens for six to twenty-four months, and give police and security agencies access to details such as IP 	addresses and time of use of e-mails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The established practices considered above have the following principles, relevant to the study at hand, in common:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Notice&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Collection Limitation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Use Limitation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Access and Corrections&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Security&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Data Quality and Accuracy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Consent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. Transparency&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And the following principles are common between two of the three regimes discussed above:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. The PIPEDA and the Privacy Act both mention rules regarding Disclosure of collecting information, but the Data Protection Directive does not directly 	govern disclosure of collected information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The Principles of Accountability is covered by the Data Protection Directive and the PIPEDA, but is not directly dealt with by the Privacy Act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. The PIPEDA and the Data Protection Directive directly mention the principle of Enforcement, but it is not directly covered by the Privacy Act.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957937"&gt;&lt;/a&gt; &lt;a name="h.z337ya"&gt;&lt;/a&gt; Recommendations&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;Broadly, service providers across India could take cognizance of the following recommendations to ensure alignment with the Rules found under section 43A 	and to maximize the amount of protection afforded to customer data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;b&gt;Access and location of privacy policy:&lt;/b&gt; Service providers should ensure that the privacy policy is easily accessible through the main 	page of the company's website. Furthermore, the Privacy Policy should be accessible to users prior to the collection of personal information. All 'User 	Agreement' forms should include a written Privacy Policy or a reference to the Privacy Policy on the service provider's website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;b&gt;Scope of privacy policy:&lt;/b&gt; The privacy policy should address all practices and services offered by the service provider. If a service 	requires a different or additional privacy policy, a link to the same should be included in the privacy policy on the main website of the service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;b&gt;Defining consent&lt;/b&gt;: The Privacy Policy should clearly define what constitutes 'consent'. If the form of consent changes for different 	types of service, this should be clearly indicated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. &lt;b&gt;Clear language:&lt;/b&gt; The language in the Privacy Policy should be clear and specific, leaving no doubt or ambiguity with regards to the 	provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. &lt;b&gt;Transparent security practices:&lt;/b&gt; The Privacy Policy should include comprehensive information about a company's security practices should 	be included in the Privacy Policy. Information pertaining to audits of these procedures should be made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. &lt;b&gt;Defined and specified third parties:&lt;/b&gt; The Privacy Policy should define 'third party' as it pertains to the company's practices and 	specify which third parties information will be shared with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. &lt;b&gt;Comprehensive grievance mechanism: &lt;/b&gt;The Privacy Policy should include relevant details for users to easily use established grievance 	mechanisms. This includes contact details of the grievance officers, procedure of submitting a grievance, expected response of the grievance officer 	(recognition of the grievance, time period for resolution etc.), and method of appealing decision of the grievance officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. &lt;b&gt;Specify laws governing disclosure to governmental agencies and law enforcement:&lt;/b&gt; The Privacy Policy should specify under what laws and 	service providers are required disclose personal information to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. &lt;b&gt;Inclusion of data retention practices:&lt;/b&gt; The Privacy Policy should include provisions defining the retention practices of the company.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957938"&gt;&lt;/a&gt; &lt;a name="h.3j2qqm3"&gt;&lt;/a&gt; Annexure 1&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.1y810tw"&gt;&lt;/a&gt; Explanation and Interpretation of Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 	2011&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 43A under the Information Technology Act 2000 addresses the protection of sensitive personal data or information and the implementation of an 	information security management system, and the Rules framed under section 43A attempt establish a holistic data security regime for the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following section is a description of the requirements found under section 43A and subsequent Rules with respect to information that must be included 	in the privacy policy of a 'body corporate' and procedures that must be followed by 'body corporate' with respect to the publishing and notice of a privacy 	policy. This section also includes an explanation of how each relevant provision has been interpreted for the purpose of this research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Relevant provisions that pertain to the privacy policy of body corporate &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 3:&lt;/b&gt; This section defines the term 'Sensitive Personal Data or Information', setting out the six types of information that are considered 'sensitive personal 	data' including:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Password - Defined under the Rules as "a secret word or phrase or code or passphrase or secret key, or encryption or decryption keys that one uses to 	gain admittance or access to information"&lt;a href="#_ftn76" name="_ftnref76"&gt;&lt;sup&gt;&lt;sup&gt;[76]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Financial information - "such as Bank account or credit card or debit card or other payment instrument details"	&lt;a href="#_ftn77" name="_ftnref77"&gt;&lt;sup&gt;&lt;sup&gt;[77]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iii. Physical, physiological and mental health condition&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iv. Sexual orientation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;v. Medical records and history&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;vi. Biometric information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The two other broad categories of Sensitive Personal Data or Information that are included in the Rule are - any related details provided to the body corporate, and any information received by the body corporate in relation to the categories listed above.	&lt;a href="#_ftn78" name="_ftnref78"&gt;&lt;sup&gt;&lt;sup&gt;[78]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proviso to this section excludes any information available in the public domain or which may be provided under the Right to Information Act, 2005 from 	the ambit of SPD/I.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Rules, Sensitive Personal Data is considered to be a subset of Personal Information - which has been defined by Section 2 (1) (i) as " 	&lt;i&gt; any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be 		available with a body corporate, is capable of identifying such person &lt;/i&gt; "&lt;a href="#_ftn79" name="_ftnref79"&gt;&lt;sup&gt;&lt;sup&gt;[79]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation:&lt;/b&gt; While the Rules are clearly limited to personal and sensitive personal data or information, the use of these terms throughout the Rules is not consistent. 	For example, some provisions under the Rules ambiguously use the term 'information' in place of the terms 'personal information' and/or 'sensitive personal 	information'.&lt;a href="#_ftn80" name="_ftnref80"&gt;&lt;sup&gt;&lt;sup&gt;[80]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; While 'information' has been defined non-exhaustively as any 'data, 	message, text, images, sound, voice, codes, computer programs, software and databases or micro film or computer generated microfiche' in the Act, this definition appears to be overbroad and cannot be applied in that form for the purpose of provisions on privacy policy.	&lt;a href="#_ftn81" name="_ftnref81"&gt;&lt;sup&gt;&lt;sup&gt;[81]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Hence, 'information', when used in the Rules, is construed to mean 'personal 	information' including 'sensitive personal information' for the purpose of this survey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per Rule 3, information in the public domain isn't classified as sensitive personal data. This exception may require a relook considering that 	'providers' of information' may not want their data to be disclosed beyond its initial disclosure, or in certain cases, they may not even know of its 	existence in the public domain. Since the notice of collection, purpose and use of information is limited to SPD alone under Rule 5, information in the 	public domain should be seen together with whether the provider of information has provided the latter directly or to service provider that requires the 	information. If the source is the information provider directly, it need not be classified as SPD.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On a positive note, the addition of the term "in combination with other information available or likely to be available", gives recognition to the 	phenomenon of convergence of data. Parts of information that seem of negligible importance, when combined, provide a fuller personal profile of an 	individual, the recognition of this, in effect, gives a far wider scope to personal information under the Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the specific context of Privacy Policies, the Rules do not stipulate whether the mandated privacy policy has to explicitly mention SPD/I that is 	collected or used.{This is mentioned under Rule 4(ii) and (iii)} Since Rules do require that a privacy policy must be clear, it is construed that the 	privacy policy should explicitly recognize the type of PI and SPD/I being collected by the company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 4:&lt;/b&gt; This rule mandates that a "&lt;i&gt;body corporate that collects, receives possess, stores, deals or handles information of the provider of information&lt;/i&gt;". 	For the purposes of this research, this entity will be referred to as a 'data controller'. According to Rule 4, every data controller must provide a 	privacy policy on its website for handling of or dealing in personal information including sensitive personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following details have to be included in the privacy policy -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"(i) Clear and easily accessible statements of its practices and policies;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Type of personal or sensitive personal data or information collected under rule 3;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Purpose of collection and usage of such information;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Disclosure of information including sensitive personal data or information as provided in rule 6;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Reasonable security practices and procedures as provided under rule 8."&lt;a href="#_ftn82" name="_ftnref82"&gt;&lt;sup&gt;&lt;sup&gt;[82]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; : The Rules do not provide an adequate understanding of the terms 'clear' and 'accessible', and the terms 'practices' and 'policies' are not defined. For 	the purpose of this research, 'practices' will be construed to mean the privacy policy of the company. It is deemed to be clear and accessible if it is 	available either directly or through a link on the main website of the body corporate. To meet the standards set by this Rule, the policy or policies 	should disclose information about the company's services, products and websites, whenever personal information is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 5:&lt;/b&gt; This Rule establishes limits for collection of information. It states that prior informed consent has to be obtained by means of letter, fax or email from 	the user regarding the purpose of usage for the sensitive personal information sought to be collected. It limits the purpose for collection of SPD/I to 	collection for a lawful purpose connected with a function or activity of the body corporate or any person on its behalf and only if it is considered necessary for that purpose. Thus, the information collected can only be used for the stated purpose for which it has been collected.	&lt;a href="#_ftn83" name="_ftnref83"&gt;&lt;sup&gt;&lt;sup&gt;[83]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, Rule 5 (3) provides that consent has to be obtained and knowledge provided to a person from whom personal information is being directly collected 	- which for service providers - is understood to be through the customer application form. This rule will be deemed to have been complied with when the 	following information is provided -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. The fact that the information is being collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. The purpose of such collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Intended recipients of the collected information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. Names and addresses of the agency or agencies collecting and retaining information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, it provides that the user has to be given the option of not providing information prior to its collection. In case the user chooses this option 	or subsequently withdraws consent the body corporate has the option to withhold its services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This section also provides under Section 5 (2) (a) that the type of information that this Rule concerns itself with can only be collected for a lawful 	purpose connected with a function or activity of the body corporate or any person on its behalf and if it is considered necessary for that purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also requires that a Grievance Officer be instated to redress the grievance "	&lt;i&gt;expeditiously but within one month from the date of receipt of grievance.&lt;/i&gt;" The Grievance Redressal process has been discussed in more detail 	later.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation:&lt;/b&gt; Even though Rule 5 incorporates various major data protection principles and mandates the establishment of a Grievance Redressal Mechanism, neither Rule 5 	nor Rule 4 (3) makes a reference to the other. [Rule 4(3) uses the term "such information", and the fact that it follows Rule 4(2) which clearly refers to 	personal information as well as SPD/I, means that Rule 4(3) also refers to the same]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prima facie&lt;/i&gt; , the scope of Rule 5 is limited to collection of SPD/I. However, Rule 4 (3) ostensibly covers the broad ambit of 'information' which includes SPD/I. Construing these two provisions together using the 'Harmonious Construction' principle	&lt;a href="#_ftn84" name="_ftnref84"&gt;&lt;sup&gt;&lt;sup&gt;[84]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Rule 5 could be interpreted to cover personal information for privacy policies 	under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, Rule 5(3) doesn't expand on the reasonable steps to be taken for intimating the information provider on the extent of disclosure and purpose 	of collection. This appears as a rather large loophole considering the wide interpretation that can be given to 'reasonable' practices of service 	providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 6:&lt;/b&gt; This rule lays down the conditions and procedure for disclosure of information.&lt;a href="#_ftn85" name="_ftnref85"&gt;&lt;sup&gt;&lt;sup&gt;[85]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Under it, the following conditions apply before any disclosure of information by the 'body corporate' to any third party -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. The body corporate is required to obtain prior permission from the provider of the information, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Permission to disclose has to be agreed on in the contract between the company and the data subject, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Disclosure is necessary for the compliance of a legal obligation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An exception is made in case the disclosure is made to an authorized and legally mandated Government agency upon request for the purposes of verification 	of identity, for prevention, detection, and investigation of incidents, specifically including cyber incidents, prosecution, and punishment of offences, in 	which case no consent from the data subject will be required. Thus, the company does not need user consent to disclose information to authorized law 	enforcement or intelligence agencies when presented with an authorized request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The guidelines for disclosure limit themselves to SPD under Rule 6 leaving a vacuum with respect to information that doesn't fall within the definition of 	SPD/I. However, Rule 4 (iv)'s applies to 'information including SPD'. Reading the two together, in accordance with the 'Harmonious Construction' principle, 	the scope of SPD/I in Rule 6 is construed to extend to the same personal information and SPD/I as is covered by Rule 4 (iv), for the limited purpose of the 	privacy policies under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 7&lt;/b&gt; : This Rule requires that when the data controller transfers SPD/I to another body corporate or person, such a third party must adhere to the same 	standards of data protection that the body corporate collecting the information in the first instance follows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; : Although the privacy policy is not required to provide details of the transfer of information, the fourth sub-section of Rule 4, which concerns itself 	with the obligation of the body corporate to provide a policy for privacy including information about the disclosure of information to its consumers, 	incorporates this Rule as it deals with disclosure of information to third parties. Thus, the Policy of the body corporate must include details of the way 	the data is handled or dealt by the third party, which is shared by the body corporate in question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 8:&lt;/b&gt; This Rule details the criteria for reasonable security practices and procedures.&lt;a href="#_ftn86" name="_ftnref86"&gt;&lt;sup&gt;&lt;sup&gt;[86]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It provides that not only must the body corporate have implemented standard security practices and procedures, but it should also have documented the 	information security program and policies containing appropriate "&lt;i&gt;managerial, technical, operational and physical security control measures&lt;/i&gt;". The 	Rule specifically uses the example of IS/ISO/IEC 27001 as an international standard that would fulfill the requirements under this provision. The security 	standards or codes of best practices adopted by the company are required to be certified/audited by a Government approved independent auditor annually and 	after modification or alteration of the existing practice and procedure. Sub-section (1) of the Rule also gives the body corporate the option of creating 	its own security procedures and practices for dealing with managerial, technical, operational, and physical security control, and have comprehensive 	documentation of their information security programme and information security policies. These norms should be as strict as the type of information 	collected and processed requires. In the event of a breach, the body corporate can be called to demonstrate that these norms were suitably implemented by 	it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; : It is unclear whether the empanelled IT security auditing organizations recognized by CERT-In discussed later are qualified for the purpose of this Rule, 	but from publicly available information the Data Security Council of India and CERT-In's empanelled Security Auditors seem to be the agencies given this 	task&lt;a href="#_ftn87" name="_ftnref87"&gt;&lt;sup&gt;&lt;sup&gt;[87]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. With regards to the Privacy Policy or Policies of a company, it is only 	necessary that the company include as many details as possible regarding the steps taken to ensure the security and confidentiality of the collected 	information in the Privacy Policy and Policies, and notify them to the consumer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Relevant Policies:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Empanelled Information Technology Security Auditors&lt;/b&gt; - CERT-In has created a panel of 'IT Security Auditors' for auditing networks &amp;amp; applications of various organizations of the Government, critical infrastructure organizations and private organizations including bodies corporate.&lt;a href="#_ftn88" name="_ftnref88"&gt;&lt;sup&gt;&lt;sup&gt;[88]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The empanelled IT security auditing organization is required to,	&lt;i&gt;inter alia&lt;/i&gt;, conduct a " 	&lt;i&gt; Review of Auditee's existing IT Security Policy and controls for their adequacy as per the best practices vis-à-vis the IT Security frameworks 		outlined in standards such as COBIT, COSO, ITIL, BS7799 / ISO17799, ISO27001, ISO15150, etc." &lt;/i&gt; &lt;a href="#_ftn89" name="_ftnref89"&gt;&lt;sup&gt;&lt;sup&gt;[89]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and conduct and document various assessments and tests. Some typical reviews and tests that include privacy reviews are - Information Security Testing, 	Internet Technology Security Testing and Wireless Security Testing.&lt;a href="#_ftn90" name="_ftnref90"&gt;&lt;sup&gt;&lt;sup&gt;[90]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For this 	purpose CERT-In maintains a list of IT Security Auditing Organizations&lt;a href="#_ftn91" name="_ftnref91"&gt;&lt;sup&gt;&lt;sup&gt;[91]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.4i7ojhp"&gt;&lt;/a&gt; &lt;b&gt;Criteria for analysis of company policies based on the 43A Rules &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Clear and Accessible statements of its practices and policies&lt;a href="#_ftn92" name="_ftnref92"&gt;&lt;sup&gt;&lt;sup&gt;[92]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects personal 	information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iii. Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Type and acknowledgment of personal or sensitive personal data/information collected	&lt;a href="#_ftn93" name="_ftnref93"&gt;&lt;sup&gt;&lt;sup&gt;[93]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy explicitly states that personal and sensitive personal information will be collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Option to not provide information and withdrawal of consent&lt;a href="#_ftn94" name="_ftnref94"&gt;&lt;sup&gt;&lt;sup&gt;[94]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Existence of Grievance Officer -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the privacy policy provides details of the grievance redressal mechanism?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iii. Whether the privacy policy provides the names and contact information of the grievance officer?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Purpose of Collection and usage of information -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Disclosure of Information -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether personal information is shared with third parties (except authorized government agencies/LEA/IA) only with user consent?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the policy specifies that personal information is disclosed to Government agencies/LEA/IA only when legally mandated as per the circumstances 	laid out in 43A?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Reasonable Security practices and procedures -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to secure 	information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br clear="all" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.2xcytpi"&gt;&lt;/a&gt; &lt;a name="h.3whwml4"&gt;&lt;/a&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957939"&gt;Annexure 2&lt;/a&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.2bn6wsx"&gt;&lt;/a&gt; Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules) 2011 and Company SURVEY&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Bharti Airtel Ltd.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel's Privacy Policy&lt;a href="#_ftn95" name="_ftnref95"&gt;&lt;sup&gt;&lt;sup&gt;[95]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; is available through the 	main page of the website and it is mentioned in the Airtel Terms and Conditions and is applicable for Airtel's websites as well as its services and 	products, such as its telecommunications services. It was determined that the policy can be comprehended by individuals without legal knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type and acknowledgement of personal or sensitive personal data/information collected: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Rationale: &lt;/b&gt;Airtel's Privacy Policy indicates that sensitive personal and personal information will be collected, defines sensitive personal information&lt;a href="#_ftn96" name="_ftnref96"&gt;&lt;sup&gt;&lt;sup&gt;[96]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and specifies specific types of personal&lt;a href="#_ftn97" name="_ftnref97"&gt;&lt;sup&gt;&lt;sup&gt;[97]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and sensitive personal information	&lt;a href="#_ftn98" name="_ftnref98"&gt;&lt;sup&gt;&lt;sup&gt;[98]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that will be collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide data or information and subsequent withdrawal of consent: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Rationale: &lt;/b&gt;The Airtel Privacy Policy states that individuals have the right to choose not to provide consent or information and have 	the right to withdraw consent. The policy notes that if consent/information is not provided, Airtel reserves the right to not provide or to withdraw the 	services.&lt;a href="#_ftn99" name="_ftnref99"&gt;&lt;sup&gt;&lt;sup&gt;[99]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel provides for the contact details of nodal officers&lt;a href="#_ftn100" name="_ftnref100"&gt;&lt;sup&gt;&lt;sup&gt;[100]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and appellate authorities	&lt;a href="#_ftn101" name="_ftnref101"&gt;&lt;sup&gt;&lt;sup&gt;[101]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; on its website.&lt;b&gt; &lt;/b&gt;Additionally the website provides for the 	'Office of the Ombudsperson'&lt;a href="#_ftn102" name="_ftnref102"&gt;&lt;sup&gt;&lt;sup&gt;[102]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which is an independent forum for employees and 	external stakeholders&lt;a href="#_ftn103" name="_ftnref103"&gt;&lt;sup&gt;&lt;sup&gt;[103]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; of the company to raise concerns and complaints about 	improper practices which are in breach of the Bharti Code of Conduct. Additionally, details of the Airtel Grievance Redressal Officers can also be found in 	the TRAI website.&lt;a href="#_ftn104" name="_ftnref104"&gt;&lt;sup&gt;&lt;sup&gt;[104]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Comprehensive disclosure of purpose of collection and usage of information: Partial &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Airtel's Privacy Policy indicates eight purposes&lt;a href="#_ftn105" name="_ftnref105"&gt;&lt;sup&gt;&lt;sup&gt;[105]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that information will be 	collected and used for, but notes that the use and collection is not limited to the defined purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information&lt;a href="#_ftn106" name="_ftnref106"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[106]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel has a dedicated section explaining the company's practices around the disclosure and sharing of collected information, including ways in which consent will be collected for the sharing of personal information&lt;a href="#_ftn107" name="_ftnref107"&gt;&lt;sup&gt;&lt;sup&gt;[107]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, how collected personal information may be collected internally	&lt;a href="#_ftn108" name="_ftnref108"&gt;&lt;sup&gt;&lt;sup&gt;[108]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the disclosure of information to third parties and that the third party will 	be held accountable for protecting the information through contract&lt;a href="#_ftn109" name="_ftnref109"&gt;&lt;sup&gt;&lt;sup&gt;[109]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the 	possible transfer of personal information and its purposes&lt;a href="#_ftn110" name="_ftnref110"&gt;&lt;sup&gt;&lt;sup&gt;[110]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and the circumstances under which information will be disclosed to governmental agencies (which reflect the circumstances defined by the Rules.)	&lt;a href="#_ftn111" name="_ftnref111"&gt;&lt;sup&gt;&lt;sup&gt;[111]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Existence of reasonable security practices and procedures&lt;/b&gt; &lt;a href="#_ftn112" name="_ftnref112"&gt;&lt;sup&gt;&lt;sup&gt;[112]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;b&gt;: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel's privacy policy has a dedicated section that explains the company's security practices and procedures in place. The policy notes that Airtel's practices and procedures are IS/ISO/IEC 27001 compliant	&lt;a href="#_ftn113" name="_ftnref113"&gt;&lt;sup&gt;&lt;sup&gt;[113]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, that access is restricted to a need to know basis and that employees are 	bound by codes of confidentiality&lt;a href="#_ftn114" name="_ftnref114"&gt;&lt;sup&gt;&lt;sup&gt;[114]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and that Airtel works to ensure that third 	parties also have strong security procedures in place.&lt;a href="#_ftn115" name="_ftnref115"&gt;&lt;sup&gt;&lt;sup&gt;[115]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The policy also provides details on the retention&lt;a href="#_ftn116" name="_ftnref116"&gt;&lt;sup&gt;&lt;sup&gt;[116]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and destruction	&lt;a href="#_ftn117" name="_ftnref117"&gt;&lt;sup&gt;&lt;sup&gt;[117]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; procedures for personal information, and notes that reasonable steps are 	taken to protect against hacking and virus attacks.&lt;a href="#_ftn118" name="_ftnref118"&gt;&lt;sup&gt;&lt;sup&gt;[118]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Tata Telecommunication Services (DoCoMo and Virgin Mobile)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies&lt;/b&gt; : Partial&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale&lt;/b&gt;: Though Tata DoCoMo has a comprehensive Data Privacy Policy	&lt;a href="#_ftn119" name="_ftnref119"&gt;&lt;sup&gt;&lt;sup&gt;[119]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that is applicable to Tata Teleservices Limited's ("&lt;b&gt;TTL&lt;/b&gt;") 	products and services and the TTL website, it is not accessible to the user through the main website. In the Frequently Asked Questions Section of TTL, it is clarified under what circumstances information that you provide is not covered by the TTL privacy policy.	&lt;a href="#_ftn120" name="_ftnref120"&gt;&lt;sup&gt;&lt;sup&gt;[120]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type of personal or sensitive personal data/information collected: Partial &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rational: &lt;/b&gt;TTL defines personal information&lt;a href="#_ftn121" name="_ftnref121"&gt;&lt;sup&gt;&lt;sup&gt;[121]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; but only 	provides general examples of types of personal information&lt;a href="#_ftn122" name="_ftnref122"&gt;&lt;sup&gt;&lt;sup&gt;[122]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (and not sensitive 	personal) collected, rather than a comprehensive list. The definitions and examples of information collected are clarified in the FAQs and the Privacy 	Policy, rather than in the Privacy Policy alone. As a strength, the Privacy Policy clarifies the ways in which TTL will collect information from the user - including the fact that they receive information from third parties like credit agencies.	&lt;a href="#_ftn123" name="_ftnref123"&gt;&lt;sup&gt;&lt;sup&gt;[123]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent: N/A&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;The TTL Privacy Policy does not address the right of the individual to provide consent/information and to withdraw 	information/consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; TTL has various methods to lodge complaints and provides for an appellate authority.	&lt;a href="#_ftn124" name="_ftnref124"&gt;&lt;sup&gt;&lt;sup&gt;[124]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Additionally, details of the Grievance Redressal Officers are provided via 	the TRAI website.&lt;a href="#_ftn125" name="_ftnref125"&gt;&lt;sup&gt;&lt;sup&gt;[125]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; In its' Privacy Policy, TTL describes the way in which collected information is used.	&lt;a href="#_ftn126" name="_ftnref126"&gt;&lt;sup&gt;&lt;sup&gt;[126]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The TTL FAQs further clarify the use of cookies by the company, the use of 	provided information for advertising purposes, &lt;a href="#_ftn127" name="_ftnref127"&gt;&lt;sup&gt;&lt;sup&gt;[127]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the use of aggregate and 	anonymized data.&lt;a href="#_ftn128" name="_ftnref128"&gt;&lt;sup&gt;&lt;sup&gt;[128]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;In the Privacy Policy and the FAQs page, TTL is transparent about the circumstances on which they will share/disclose 	personal information with third parties&lt;a href="#_ftn129" name="_ftnref129"&gt;&lt;sup&gt;&lt;sup&gt;[129]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, with law enforcement/governmental agencies&lt;a href="#_ftn130" name="_ftnref130"&gt;&lt;sup&gt;&lt;sup&gt;[130]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and with other TTL companies.	&lt;a href="#_ftn131" name="_ftnref131"&gt;&lt;sup&gt;&lt;sup&gt;[131]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Interestingly, the TTL FAQ's clarify to the customer that their personal information might be processed in different jurisdictions, and thus would be accessible by law enforcement in that jurisdiction.	&lt;a href="#_ftn132" name="_ftnref132"&gt;&lt;sup&gt;&lt;sup&gt;[132]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;TTL's Privacy Policy broadly references that security practices are in place to protect user information, but the policy does not make reference to a specific security standard, or provide detail as to what these practices and procedures are.	&lt;a href="#_ftn133" name="_ftnref133"&gt;&lt;sup&gt;&lt;sup&gt;[133]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although TTL's Privacy Policy does not make mention of any specific security 	standard, Tata Teleservices (Maharashtra) Limited claims to have been awarded with ISO 27001 ISMS (Information Security Management Systems) Certification 	in May 2011, and completed its first Surveillance Audit in June 2012&lt;a href="#_ftn134" name="_ftnref134"&gt;&lt;sup&gt;&lt;sup&gt;[134]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. 	Information on IT security standards adopted by other circles could not be found on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Vodafone &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Vodafone's Privacy Policy&lt;a href="#_ftn135" name="_ftnref135"&gt;&lt;sup&gt;&lt;sup&gt;[135]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; is easily accessible from its website from a link at the bottom, directly from the home page and from all other pages of the website.	&lt;a href="#_ftn136" name="_ftnref136"&gt;&lt;sup&gt;&lt;sup&gt;[136]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Collection of personal or sensitive personal data/information: No &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Type -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Personal Information - The amount of details given by the Privacy Policy with regards to the personal information being collected is insufficient, as it 	does not include a number of relevant facts, and uses is vague language - such as '&lt;i&gt;amongst other things&lt;/i&gt;', implying that information other than 	that which is notified is being collected.&lt;a href="#_ftn137" name="_ftnref137"&gt;&lt;sup&gt;&lt;sup&gt;[137]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Sensitive Personal Data or Information - The Privacy Policy does not mention the categories or types of SPD/I, as defined under Rule 3, being collected 	by the service provider explicitly, only gives a general overview of the information that is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt; The privacy policy does not mention the consent of data subject anywhere, nor does it mention his or her right to withdraw 	it at any point of time. It also does not mention whether or not the provision of services by Vodafone is contingent on the provision of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Privacy Policy explicitly mentions and gives the email address of a grievance redressal officer, though further details 	about the other offices are given in a separate section of the website.&lt;a href="#_ftn138" name="_ftnref138"&gt;&lt;sup&gt;&lt;sup&gt;[138]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy gives an exhaustive list of purposes for which the collected information can be used by Vodafone,	&lt;a href="#_ftn139" name="_ftnref139"&gt;&lt;sup&gt;&lt;sup&gt;[139]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; but at the same time the framing of the opening sentence and the usage of the 	term 'may include' could imply that it can be used for other purposes as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy mentions that Vodafone might share the collected information with certain third parties and the terms and conditions which would apply 	to such a third party.&lt;a href="#_ftn140" name="_ftnref140"&gt;&lt;sup&gt;&lt;sup&gt;[140]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The phrasing does not imply that there are other 	conditions that have not been mentioned in the policy, under which the information would be shared with a third party. At the same time, the Privacy Policy 	does not explicitly say that the third party will necessarily follow the privacy and data security procedures and rules laid down in the Privacy Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy mentions in reasonably clear detail the security practices and procedures followed by Vodafone, and also mentions the circumstances in which the data subject should take care to protect his or her own information, wherein Vodafone will not be liable.	&lt;a href="#_ftn141" name="_ftnref141"&gt;&lt;sup&gt;&lt;sup&gt;[141]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although Vodafone India's Privacy Policy does not specify what their IT Security standard is, its 2012/2013 Sustainability Report available through its international website	&lt;a href="#_ftn142" name="_ftnref142"&gt;&lt;sup&gt;&lt;sup&gt;[142]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; states that it follows industry practices in line with the ISO 27001 standard 	and its core data centre in India follows this standard&lt;a href="#_ftn143" name="_ftnref143"&gt;&lt;sup&gt;&lt;sup&gt;[143]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Aircel&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy is accessible from every page of the Aircel website, with a link at the bottom of each page after the specific circle has been chosen. 	It is reasonably free of legalese and is intelligible.&lt;a href="#_ftn144" name="_ftnref144"&gt;&lt;sup&gt;&lt;sup&gt;[144]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type of personal or sensitive personal data/information collected: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Type -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Personal Information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the Privacy Policy, the repeated usage of the term 'may' creates some doubt about the actual extent of the data collected, and leaves the Privacy Policy 	quite unclear in this regard. At the same time, the Privacy Policy does include a fairly comprehensive list of personal information that could be 	collected. &lt;a href="#_ftn145" name="_ftnref145"&gt;&lt;sup&gt;&lt;sup&gt;[145]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The wording in the Privacy Policy thus requires further 	clarification and specification in order to make a determination on whether or not it provides complete details on the personal information that will be 	collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Sensitive Personal Data or Information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy does not mention SPDI explicitly, which adds to the lack of concrete details as noted earlier.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent - Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale&lt;/b&gt; : The Privacy Policy mentions that users do have the right to refuse to provide or the withdrawal of consent to collect personal information. In such cases, Aircel can respectively refuse or discontinue the provision of its services.	&lt;a href="#_ftn146" name="_ftnref146"&gt;&lt;sup&gt;&lt;sup&gt;[146]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though not directly mentioned in the Privacy Policy, a separate, easily noticeable link at the bottom of each webpage links to the Customer Grievance section. There are different officers in charge of each node, called the Nodal Officers.	&lt;a href="#_ftn147" name="_ftnref147"&gt;&lt;sup&gt;&lt;sup&gt;[147]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Partial &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;The usage of the term 'may' in the section of the Privacy Policy regarding the purpose of collection and usage of 	information again leaves it ambiguous in this regard, implying that it can just as easily be used for purposes that have not been notified to the data 	subject.&lt;a href="#_ftn148" name="_ftnref148"&gt;&lt;sup&gt;&lt;sup&gt;[148]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Though&lt;b&gt; &lt;/b&gt;the Privacy Policy does not specify all the circumstances under which Aircel would share the collected information with a third party, it specifies the terms and conditions that would apply in the cases that it does.	&lt;a href="#_ftn149" name="_ftnref149"&gt;&lt;sup&gt;&lt;sup&gt;[149]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy gives a reasonable amount of detail about the steps taken by Aircel to ensure the security of the information collected by it, but leaves 	certain holes uncovered.&lt;a href="#_ftn150" name="_ftnref150"&gt;&lt;sup&gt;&lt;sup&gt;[150]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Atria Convergence Technologies Private Limited (ACT)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Policy is intelligible, and is easily accessible from all the webpages of the company's website from a link at the 	bottom of all pages.&lt;a href="#_ftn151" name="_ftnref151"&gt;&lt;sup&gt;&lt;sup&gt;[151]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type of personal or sensitive personal data/information collected: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Type -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Personal Information - Yes -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy mentions the different types of Personal Information which will be collected by ACT if the customer registers with the Company.	&lt;a href="#_ftn152" name="_ftnref152"&gt;&lt;sup&gt;&lt;sup&gt;[152]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Sensitive Personal Data or Information -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The categories of SPD/I collected by ACT are not specifically mentioned in the policy, though they are mentioned as part of the general declarations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale&lt;/b&gt;: The option of the data subject not providing or withdrawing consent has not been mentioned in the Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; No Grievance Officer has been mentioned in the Privacy Policy or on the ACT website, nor has any other grievance redressal 	process been specified.&lt;a href="#_ftn153" name="_ftnref153"&gt;&lt;sup&gt;&lt;sup&gt;[153]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Policy mentions the various ways ACT might use the information it collects, though the use of the term 'general' is a 	cause for concern.&lt;a href="#_ftn154" name="_ftnref154"&gt;&lt;sup&gt;&lt;sup&gt;[154]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The list of purposes for collection given in the Privacy 	Policy is a very general list.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Policy mentions the circumstances in which ACT might share the collected information with a third party, and also 	mentions that such parties will either be subject to confidentiality agreements, or that the data subject will be notified before his or her information 	becomes subject to a different privacy policy. It also mentions the exception to above, that being when the information is shared for investigative 	purposes.&lt;a href="#_ftn155" name="_ftnref155"&gt;&lt;sup&gt;&lt;sup&gt;[155]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; At the same time, the intended recipients of the information are not 	mentioned, and the name and address of agency/agencies collecting and retaining information is not mentioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; - The security practices and procedures followed by ACT to protect the information of its customers are not mentioned in the Policy, which is a critical weak point, keeping in mind the requirements of the Rules.	&lt;a href="#_ftn156" name="_ftnref156"&gt;&lt;sup&gt;&lt;sup&gt;[156]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; . Telecom Regulatory Authority of India, Press Release 143/2012,(&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/PressRealease/Document/PR-TSD-May12.pdf"&gt; http://www.trai.gov.in/WriteReadData/PressRealease/Document/PR-TSD-May12.pdf &lt;/a&gt; &amp;gt;)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; . The Indian Telecom Service Performance Indicators, January-March 2013, Telecom Regulatory Authority of India,. (&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf"&gt; http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf &lt;/a&gt; &amp;gt;)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; . 'India is now world's third largest Internet user after U.S., China', (The Hindu, 24 August 2013) &amp;lt; 			&lt;a href="http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece"&gt; http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; . In addition, the Unified Access License Framework which allows for a single license for multiple services such as telecom, the internet and 			television, provides certain security guidelines. As per the model UIL Agreements, privacy of communications is to be maintained and network 			security practices and audits are mandated along with penalties for contravention in addition to what is prescribed under the Information 			Technology Act,2000. For internet services, the Agreement stipulates the keeping an Internet Protocol Detail Record (IPDR) and copies of packets from customer premises equipment (CPE). Accessed at &amp;lt;			&lt;a href="http://www.dot.gov.in/sites/default/files/Unified%20Licence.pdf"&gt;http://www.dot.gov.in/sites/default/files/Unified%20Licence.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; . See &amp;gt;&amp;gt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf"&gt; http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; . 'India is now world's third largest Internet user after U.S., China', (The Hindu, 24 August 2013) &amp;lt; 			&lt;a href="http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece"&gt; http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece &lt;/a&gt; &amp;gt; Accessed..&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; . Starting with &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of UP &lt;/i&gt;1963 AIR SC 1295&lt;i&gt;, &lt;/i&gt;the&lt;i&gt; &lt;/i&gt;right to privacy has been further confirmed 			and commented on in other cases, like &lt;i&gt;Govind v.State of M.P&lt;/i&gt; (1975) 2 SCC 148: 1975 SCC (Cri) 468. A full history of the development of the 			Right to Privacy can be found in B.D. Agarwala, &lt;i&gt;Right to Privacy: A Case-By-Case Development&lt;/i&gt;, (1996) 3 SCC (Jour) 9, available at 			http://www.ebc-india.com/lawyer/articles/96v3a2.htm.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; . White Paper on EU Adequacy Assessment of India, 3, ("&lt;i&gt;Based on an overall &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; analysis against the identifiable principles under Article 25, the 2010 Report concludes that India does not at present provide adequate 				protection to personal data in relation to any sector or to the whole of its private sector or to the whole of its public sector. &lt;/i&gt; ") available at &amp;lt; 			&lt;a href="https://www.dsci.in/sites/default/files/WhitePaper%20EU_Adequacy%20Assessment%20of%20India.pdf"&gt; https://www.dsci.in/sites/default/files/WhitePaper%20EU_Adequacy%20Assessment%20of%20India.pdf &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; . Planning Commission&lt;i&gt;, Report of the Group of Experts on Privacy&lt;/i&gt;, 2012, (&amp;lt;			&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/a&gt;&amp;gt;)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; . Though a company's Privacy Policy was the main document analysed for this research, when applicable a company's Terms of Service wavas also 			reviewed.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; . BSNL and MTNL are government companies as defined under section 617, Indian Companies Act, 1956, incorporated under the Indian Companies Act, 			1956. Under section 43 A (i) of the Act, a 'body corporate' has been broadly defined as "any company…sole proprietorship or other association 			of individuals engaged in commercial or professional activities". Therefore, for the purpose of this survey, BSNL and MTNL are recognized as bodies 			corporate.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; . Documents Reviewed&lt;i&gt;:&lt;/i&gt; http://portal.bsnl.in/portal/privacypolicy.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; . A full list of its services are available here: &amp;lt;			&lt;a href="http://bsnl.co.in/opencms/bsnl/BSNL/services/"&gt;http://bsnl.co.in/opencms/bsnl/BSNL/services/&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; . The MTNL website does not provide access to a privacy policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; . A full list of its services are available here &amp;lt;&amp;lt;http://mtnldelhi.in&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; . Documents Reviewed: &lt;a href="http://www.airtel.in/forme/privacy-policy"&gt;http://www.airtel.in/forme/privacy-policy&lt;/a&gt; ,			&lt;a href="http://www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp"&gt;http://www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp&lt;/a&gt;, 			&lt;a href="http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp"&gt; http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp &lt;/a&gt; , 			&lt;a href="http://www.airtel.in/about-bharti/about-bharti-airtel/ombuds-office"&gt; http://www.airtel.in/about-bharti/about-bharti-airtel/ombuds-office &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; . A full list of services provided by Bharti Airtel is available here: &amp;lt;&lt;a href="http://www.airtel.in"&gt;www.airtel.in&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; . http://submarinenetworks.com/stations/asia/india/chennai-bharti&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; . Documents Reviewed: 			&lt;a href="http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html"&gt; http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html &lt;/a&gt; &lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker&lt;/a&gt; , 			&lt;a href="http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html"&gt; http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; . See &amp;lt; 			&lt;a href="http://historyofbusiness.blogspot.in/2013/11/history-of-vodafone.html."&gt; http://historyofbusiness.blogspot.in/2013/11/history-of-vodafone.html. &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; . &lt;i&gt;Vodafone International Holdings v Union of India&lt;/i&gt;, WP 1325/2010, Bombay High Court&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; . 'Vodafone to Buy Additional Essar India Stake for $5 Billion',(&lt;i&gt;Bloomberg&lt;/i&gt;, March 31, 2011) &amp;lt; 			&lt;a href="http://www.bloomberg.com/news/2011-03-31/essar-exercises-option-to-sell-5-billion-stake-in-vodafone-essar-venture.html"&gt; http://www.bloomberg.com/news/2011-03-31/essar-exercises-option-to-sell-5-billion-stake-in-vodafone-essar-venture.html &lt;/a&gt; &amp;gt;Accessed 26 May 2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; . See &amp;lt;&lt;a href="https://www.vodafone.in/pages/aboutus.aspx?cid=ker."&gt;https://www.vodafone.in/pages/aboutus.aspx?cid=ker.&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; . Vodafone, &lt;i&gt;supra&lt;/i&gt; note 13.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; . Documents Reviewed:&lt;a href="http://www.tatadocomo.com/downloads/data-privacy-policy.pdf"&gt;http://www.tatadocomo.com/downloads/data-privacy-policy.pdf&lt;/a&gt;,			&lt;a href="http://www.tatateleservices.com/t-customercare.aspx"&gt;http://www.tatateleservices.com/t-customercare.aspx&lt;/a&gt;, 			&lt;a href="http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf"&gt; http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; . 'Japan's Docomo acquires 26% stake in Tata Tele'(The Hindu Business Line, November 13 2008) &amp;lt; 			&lt;a href="http://www.thehindubusinessline.in/bline/2008/11/13/stories/2008111352410100.htm"&gt; http://www.thehindubusinessline.in/bline/2008/11/13/stories/2008111352410100.htm &lt;/a&gt; .&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; . Further details are available at: &amp;lt;			&lt;a href="http://www.tatateleservices.com/t-aboutus-ttsl-organization.aspx"&gt;http://www.tatateleservices.com/t-aboutus-ttsl-organization.aspx&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; . Documents Reviewed&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061"&gt; http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061 &lt;/a&gt; , 			&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=customercare_consumergrievance_page"&gt; http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=customercare_consumergrievance_page &lt;/a&gt; , 			&lt;a href="http://www.aircel.com/AircelWar/ShowProperty/UCMRepository/Contribution%20Folders/Global/PDF/Manual_Customer_Grievan.pdf"&gt; http://www.aircel.com/AircelWar/ShowProperty/UCMRepository/Contribution%20Folders/Global/PDF/Manual_Customer_Grievan.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; . See &amp;lt; 			&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/ap?_nfpb=true&amp;amp;_pageLabel=aboutus_book."&gt; http://www.aircel.com/AircelWar/appmanager/aircel/ap?_nfpb=true&amp;amp;_pageLabel=aboutus_book. &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; . Documents Reviewed: &lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; . https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; . &lt;a href="http://www.tatadocomo.com/downloads/data-privacy-policy.pdf"&gt;http://www.tatadocomo.com/downloads/data-privacy-policy.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; . http://www.airtel.in/forme/privacy-policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; .http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; . &lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; . In 2012, the Minister of State for Communications &amp;amp; Information Technology informed the Rajya Sabha that "			&lt;i&gt;(a)ny change in the privacy policy is not within the purview of amended Information Technology Act, 2000&lt;/i&gt;",, while discussing changes to 			Google's privacy policy. Even though the Minister noted that the EU has reported its dissatisfaction with the changed policy, finding that the policy "			&lt;i&gt;makes it impossible to understand which purposes, personal data, recipients or access rights are relevant to the use of a specific service&lt;/i&gt; ", he argued that the Act and Rules therein merely stipulate the publication of a privacy policy which provide "			&lt;i&gt;information to the end users as to how their personal information is collected, for which it is collected, processed and secure&lt;/i&gt;". Further, 			when asked how changes to privacy policy affect end users the Minister shifted the responsibility on end users, stating that " 			&lt;i&gt; (t)he end users… need to fully understand the privacy policy of Google, the consequences of sharing their personal information and their 				privacy rights before they start using online services &lt;/i&gt; ".( &amp;lt; 			&lt;a href="http://rsdebate.nic.in/bitstream/123456789/609109/2/PQ_225_30032012_U1929_p129_p130.pdf#search=%22google%22"&gt; http://rsdebate.nic.in/bitstream/123456789/609109/2/PQ_225_30032012_U1929_p129_p130.pdf#search=%22google%22 &lt;/a&gt; &amp;gt;).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; . Available at &lt;a href="http://portal.bsnl.in/portal/privacypolicy.htm"&gt;http://portal.bsnl.in/portal/privacypolicy.htm&lt;/a&gt;, the privacy policy was 			found through a search engine and not through a link from the website. An RTI request was submitted to BSNL for a copy of its privacy policy as 			applicable to all its products, services and websites. BSNL responded by submitting a copy of this privacy policy even though the text of the 			policy does not clarify the scope.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; . See, &amp;lt;&lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.airtel.in/forme/privacy-policy"&gt;http://www.airtel.in/forme/privacy-policy&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.tataindicom.com/Download/data-privacy-policy.pdf"&gt;www.tataindicom.com/Download/data-privacy-policy.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; . See &amp;lt;&amp;lt;www.aircel.com/AircelWar/appmanager/aircel/delhi?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; . See &amp;lt;&lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; . See&amp;lt;&amp;lt; http://portal.bsnl.in/portal/privacypolicy.htm&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; . See &amp;lt;&lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.tataindicom.com/Download/data-privacy-policy.pdf"&gt;http://www.tataindicom.com/Download/data-privacy-policy.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; . Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; . The complaint center details are available here: &amp;lt;			&lt;a href="http://www.tccms.gov.in/Queries.aspx?cid=1"&gt;http://www.tccms.gov.in/Queries.aspx?cid=1&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; . Rules 5 and 6&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; . Principle 2, Principle 3, Personal Information Protection and Electronic Documents Act 2000. Available at: &amp;lt;&amp;lt;			&lt;a href="http://laws-lois.justice.gc.ca/eng/acts/P-8.6/index.html"&gt;http://laws-lois.justice.gc.ca/eng/acts/P-8.6/index.html&lt;/a&gt;&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; . Rule 5(7),&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; . Principle 2&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; . P. 21&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; . Telecom Regulatory Policy CRTC 2009-657, Review of the Internet traffic management practices of Internet service providers &amp;lt;&amp;lt;			&lt;a href="http://www.crtc.gc.ca/eng/archive/2009/2009-657.htm"&gt;www.crtc.gc.ca/eng/archive/2009/2009-657.htm&lt;/a&gt;&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; . Alex Cameron,&lt;i&gt;CRTC Imposes Super-PIPEDA Privacy Protections for Personal Information Collected by ISPs, &lt;/i&gt;Privacy and Information 			Protection Bulletin, Fasken Martineau, &amp;lt;&amp;lt; 			&lt;a href="http://www.fasken.com/files/Publication/4317fd62-0827-4d1d-b836-5b932b3b21db/Presentation/PublicationAttachment/bafbf01e-365c-47f8-86a5-5cf7d7e43787/Bulletin_-_November_2009_-_Cameron.pdf"&gt; http://www.fasken.com/files/Publication/4317fd62-0827-4d1d-b836-5b932b3b21db/Presentation/PublicationAttachment/bafbf01e-365c-47f8-86a5-5cf7d7e43787/Bulletin_-_November_2009_-_Cameron.pdf &lt;/a&gt; . &amp;gt;&amp;gt; Accessed 21 May 2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; . Bram D. Abramson, Grant Buchanan, Hank Intven, &lt;i&gt;CRTC Shapes Canadian "Net Neutrality" Rules, &lt;/i&gt;McCarthy Tetrault. &amp;lt;			&lt;a href="http://www.mccarthy.ca/article_detail.aspx?id=4720"&gt;http://www.mccarthy.ca/article_detail.aspx?id=4720&lt;/a&gt; &amp;gt; Accessed 21 May 2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; . The Privacy Act, 1988, Part III, &lt;i&gt;available at &amp;lt;&amp;lt;&lt;/i&gt; http://www.comlaw.gov.au/Series/C2004A03712.&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, note 28, Schedule 3, 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 4.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 6.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 8.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 9.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; . Telecommunications Act, Part 13 (Information or a document protected under Part 13 could relate to many forms of communications, including fixed 			and mobile telephone services, internet browsing, email and voice over internet telephone services. For telephone-based communications, this would 			include subscriber information, the telephone numbers of the parties involved, the time of the call and its duration. In relation to internet-based 			applications, the information protected under Part 13 would include the Internet Protocol (IP) address used for the session, and the start and 			finish time of each session.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; . Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the 			processing of personal data and on the free movement of such data, &lt;i&gt;available at&lt;/i&gt; http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, article 3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, article 8.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, article 2, (d). (" 			&lt;i&gt; (d) 'controller' shall mean the natural or legal person, public authority, agency or any other body which alone or jointly with others 				determines the purposes and means of the processing of personal data; where the purposes and means of processing are determined by national or 				Community laws or regulations, the controller or the specific criteria for his nomination may be designated by national or Community law; &lt;/i&gt; ")&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; . European Commission-IP-12/46, 25 January 2012, &amp;lt;			&lt;a href="http://europa.eu/rapid/press-release_IP-12-46_en.htm?locale=en."&gt;http://europa.eu/rapid/press-release_IP-12-46_en.htm?locale=en.&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; . Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection 			of privacy in the electronic communications sector.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; . Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection 			with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; . Rule 2 (h)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; . Rule 3 (ii)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; . Rule 3 (vii) and (viii)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; . Rule 2 (i)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; . Rule 4(iii), (iv)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; . Section 2(v) of the Act defines 'information'&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a href="#_ftnref82" name="_ftn82"&gt;[82]&lt;/a&gt; . Rule 4 (1).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a href="#_ftnref83" name="_ftn83"&gt;[83]&lt;/a&gt; . Rule 5 (5)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a href="#_ftnref84" name="_ftn84"&gt;[84]&lt;/a&gt; . Defined by Venkatarama Aiyar, J as: "The rule of construction is well settled that when there are in an enactment two provisions which cannot be reconciled with each other, they should be so interpreted that, if possible, effect could be given to both" in			&lt;i&gt;Venkataramana Devaru v. State of Mysore,&lt;/i&gt; AIR 1958 SC 255, p. 268: G. P. Singh, Principles of Statutory Interpretation, 1th ed. 2010, 			Lexisnexis Butterworths Wadhwa Nagpur. The principle was applied to interpret statutory Rules in A. N. Sehgal v. Raje Ram Sheoram, AIR 1991 SC 			1406.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a href="#_ftnref85" name="_ftn85"&gt;[85]&lt;/a&gt; . Rule 6&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a href="#_ftnref86" name="_ftn86"&gt;[86]&lt;/a&gt; . Rule 8&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a href="#_ftnref87" name="_ftn87"&gt;[87]&lt;/a&gt; . 52&lt;sup&gt;nd&lt;/sup&gt; Report, Standing Committee on Information Technology, 24, available at &amp;lt; 			&lt;a href="http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf.%20"&gt; http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf. &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a href="#_ftnref88" name="_ftn88"&gt;[88]&lt;/a&gt; . Panel Of Information Security Auditing Organisations, CERT-IN &amp;lt;			&lt;a href="http://www.cert-in.org.in/PDF/background.pdf"&gt;http://www.cert-in.org.in/PDF/background.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a href="#_ftnref89" name="_ftn89"&gt;[89]&lt;/a&gt; . Section 1, Guidelines for applying to CERT-In for Empanelment of IT Security Audition Organisation, &amp;lt;			&lt;a href="http://www.cert-in.org.in/PDF/InfoSecAuditorsEmpGuidelines.pdf"&gt;http://www.cert-in.org.in/PDF/InfoSecAuditorsEmpGuidelines.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a href="#_ftnref90" name="_ftn90"&gt;[90]&lt;/a&gt; . Section 2.0, Guidelines for auditee organizations, Version 2.0, IT Security&lt;/p&gt;
&lt;p&gt;Auditing Assignment, http://www.cert-in.org.in/PDF/guideline_auditee.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a href="#_ftnref91" name="_ftn91"&gt;[91]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.cert-in.org.in/PDF/Empanel_org.pdf"&gt;http://www.cert-in.org.in/PDF/Empanel_org.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a href="#_ftnref92" name="_ftn92"&gt;[92]&lt;/a&gt; . Rule 4&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a href="#_ftnref93" name="_ftn93"&gt;[93]&lt;/a&gt; . Rule 4&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a href="#_ftnref94" name="_ftn94"&gt;[94]&lt;/a&gt; . Rule 5 (7)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a href="#_ftnref95" name="_ftn95"&gt;[95]&lt;/a&gt; . See &amp;lt;&amp;lt; &lt;a href="http://www.airtel.in/forme/privacy-policy"&gt;http://www.airtel.in/forme/privacy-policy&lt;/a&gt;&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p&gt;&lt;a href="#_ftnref96" name="_ftn96"&gt;[96]&lt;/a&gt; &lt;i&gt; . 'Information that can be used by itself to uniquely identify, contact or locate a person, or can be used with information available from 				other sources to uniquely identify an individual. For the purpose of this policy, sensitive personal data or information has been considered as 				a part of personal information.' &lt;/i&gt; Accessed at &amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p&gt;&lt;a href="#_ftnref97" name="_ftn97"&gt;[97]&lt;/a&gt; . Subscriber's name, father's name, mother's name, spouse's name, date of birth, current and previous addresses, telephone number, mobile phone 			number, email address, occupation and information contained in the documents used as proof of identity and proof of address. Information related to 			your utilization of our services which may include your call details, your browsing history on our website, location details and additional 			information provided by you while using our services. We may keep a log of the activities performed by you on our network and websites by using 			various internet techniques such as web cookies, web beacons, server log files, etc.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a href="#_ftnref98" name="_ftn98"&gt;[98]&lt;/a&gt; . Password&lt;b&gt;, &lt;/b&gt;Financial information -details of Bank account, credit card, debit card, or other payment instrument detail			&lt;b&gt;s, &lt;/b&gt;Physical, physiological and mental health condition&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a href="#_ftnref99" name="_ftn99"&gt;[99]&lt;/a&gt; . Airtel states that if a customer does not provide information or consent for usage of personal information or subsequently withdraws consent, 			Airtel reserves the right to not provide the services or to withdraw the services for which the said information was sought, Avaliable at: &amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a href="#_ftnref100" name="_ftn100"&gt;[100]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp"&gt;www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn101"&gt;
&lt;p&gt;&lt;a href="#_ftnref101" name="_ftn101"&gt;[101]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp"&gt; http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn102"&gt;
&lt;p&gt;&lt;a href="#_ftnref102" name="_ftn102"&gt;[102]&lt;/a&gt; . See &amp;lt;&amp;lt; http://www.airtel.in/about-bharti/about-bharti-airtel/ombuds-office&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn103"&gt;
&lt;p&gt;&lt;a href="#_ftnref103" name="_ftn103"&gt;[103]&lt;/a&gt; . Stakeholders are defined as: employee, associate, strategic partner, vendor&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn104"&gt;
&lt;p&gt;&lt;a href="#_ftnref104" name="_ftn104"&gt;[104]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072331247805566Bharti_Airtel_CC_AA-23072013.pdf"&gt; http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072331247805566Bharti_Airtel_CC_AA-23072013.pdf &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn105"&gt;
&lt;p&gt;&lt;a href="#_ftnref105" name="_ftn105"&gt;[105]&lt;/a&gt; . Verification of customer's identity; Complete transactions effectively and bill for products and service; Respond to customer requests for 			service or assistance; Perform market analysis, market research, business and operational analysis; Provide, maintain and improve Airtel products 			and services; Anticipate and resolve issues and concerns with Airtel products and services; Promote and market Airtel products and services which 			it may consider of interest and benefit to customers; and, Ensure adherence to legal and regulatory requirements for prevention and detection of 			frauds and crimes.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn106"&gt;
&lt;p&gt;&lt;a href="#_ftnref106" name="_ftn106"&gt;[106]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/disclosure+and+transfer?contentIDR=745792ad-d6af-4684-85d4-d85773e77356&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/disclosure+and+transfer?contentIDR=745792ad-d6af-4684-85d4-d85773e77356&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn107"&gt;
&lt;p&gt;&lt;a href="#_ftnref107" name="_ftn107"&gt;[107]&lt;/a&gt; . "Airtel may obtain a customer's consent for sharing personal information in several ways, such as in writing, online, through "click-through" 			agreements; orally, including through interactive voice response; or when a customer's consent is part of the terms and conditions pursuant to 			which Airtel provides a service."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn108"&gt;
&lt;p&gt;&lt;a href="#_ftnref108" name="_ftn108"&gt;[108]&lt;/a&gt; . Airtel and its employees may utilize some or all available personal information for internal assessments, measures, operations and related 			activities…"&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn109"&gt;
&lt;p&gt;&lt;a href="#_ftnref109" name="_ftn109"&gt;[109]&lt;/a&gt; . Airtel may at its discretion employ, contract or include third parties external to itself for strategic, tactical and operational purposes. Such 			agencies though external to Airtel, will always be entities which are covered by contractual agreements. These agreements in turn include Airtel's 			guidelines to the management, treatment and secrecy of personal information&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn110"&gt;
&lt;p&gt;&lt;a href="#_ftnref110" name="_ftn110"&gt;[110]&lt;/a&gt; . Airtel may transfer subscriber's personal information or other information collected, stored, processed by it to any other entity or organization 			located in India or outside India only in case it is necessary for providing services to a subscriber or if the subscriber has consented (at the 			time of collection of information) to the same. This may also include sharing of aggregated information with them in order for them to understand 			Airtel's environment and consequently, provide the subscriber with better services. While sharing personal information with third parties, adequate 			measures shall be taken to ensure that reasonable security practices are followed at the third party."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn111"&gt;
&lt;p&gt;&lt;a href="#_ftnref111" name="_ftn111"&gt;[111]&lt;/a&gt; . Airtel may share subscribers' personal information with Government agencies or other authorized law enforcement agencies (LEAs) mandated under 			law to obtain such information for the purpose of verification of identity or for prevention, detection, investigation including but not limited to 			cyber incidents, prosecution, and punishment of offences.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn112"&gt;
&lt;p&gt;&lt;a href="#_ftnref112" name="_ftn112"&gt;[112]&lt;/a&gt; . See&amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/security+practices+and+procedures?contentIDR=9346516c-c1a1-4bd7-bce0-6945236dceaa&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/security+practices+and+procedures?contentIDR=9346516c-c1a1-4bd7-bce0-6945236dceaa&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn113"&gt;
&lt;p&gt;&lt;a href="#_ftnref113" name="_ftn113"&gt;[113]&lt;/a&gt; . Airtel adopts reasonable security practices and procedures, in line with international standard IS/ISO/IEC 27001, to include, technical, 			operational, managerial and physical security controls in order to protect a customer's personal information from unauthorized access, or 			disclosure while it is under our control.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn114"&gt;
&lt;p&gt;&lt;a href="#_ftnref114" name="_ftn114"&gt;[114]&lt;/a&gt; . Airtel's security practices and procedures limit access to personal information on need-only basis. Further, its employees are bound by Code of 			Conduct and Confidentiality Policies which obligate them to protect the confidentiality of personal information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn115"&gt;
&lt;p&gt;&lt;a href="#_ftnref115" name="_ftn115"&gt;[115]&lt;/a&gt; . Airtel takes adequate steps to ensure that its third parties adopt reasonable level of security practices and procedures to ensure security of 			personal information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn116"&gt;
&lt;p&gt;&lt;a href="#_ftnref116" name="_ftn116"&gt;[116]&lt;/a&gt; . Airtel may retain a subscriber's personal information for as long as required to provide him/her with services or if otherwise required under any 			law.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn117"&gt;
&lt;p&gt;&lt;a href="#_ftnref117" name="_ftn117"&gt;[117]&lt;/a&gt; . When Airtel disposes of its customers' personal information, it uses reasonable procedures to erase it or render it unreadable (for example, 			shredding documents and wiping electronic media)."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn118"&gt;
&lt;p&gt;&lt;a href="#_ftnref118" name="_ftn118"&gt;[118]&lt;/a&gt; . Airtel maintains the security of its internet connections, however for reasons outside of its control, security risks may still arise. Any 			personal information transmitted to Airtel or from its online products or services will therefore be at a customer's own risk. It observes 			reasonable security measures to protect a customer's personal information against hacking and virus dissemination.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn119"&gt;
&lt;p&gt;&lt;a href="#_ftnref119" name="_ftn119"&gt;[119]&lt;/a&gt; . See &amp;lt;&amp;lt;http://www.tatadocomo.com/downloads/data-privacy-policy.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn120"&gt;
&lt;p&gt;&lt;a href="#_ftnref120" name="_ftn120"&gt;[120]&lt;/a&gt; . Information that customers provide to non-TTL companies is not covered by TTL's Policy. For example: When customers download applications or make 			an online purchase from a non-TTL company while using TTL's Internet or wireless services, the information collected by the non-TTL company is not 			subject to this Policy. When you navigate to a non-TTL company from TTL websites or applications (by clicking on a link or an advertisement, for 			example), information collected by the non-TTL company is governed by its privacy policy and not TTL's Privacy Policy. If one uses public forums - 			such as social networking services, Internet bulletin boards, chat rooms, or blogs on TTL or non-TTL websites, any Personal Information disclosed 			publicly can be read, collected, or used by others. Once one chooses to reveal Personal Information on such a site, the information is publicly 			available, and TTL cannot prevent distribution and use of that information by other parties. Information on a wireless Customer 's location, usage 			and numbers dialed, which is roaming on the network of a non-TTL company will be subject to the privacy policy of the non-TTL company, and not 			TTL's Policy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn121"&gt;
&lt;p&gt;&lt;a href="#_ftnref121" name="_ftn121"&gt;[121]&lt;/a&gt; . "Personal Information" is any information that relates to a natural person which, either directly or indirectly, in combination with other 			information available or likely to be available with a body corporate, is capable of identifying such person.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn122"&gt;
&lt;p&gt;&lt;a href="#_ftnref122" name="_ftn122"&gt;[122]&lt;/a&gt; . Personal Information - Some general examples -TTL may collect Confidential Data in different forms such as Personal and other Information based 			on a customer's use of its products and services. Some examples include, Contact Information that allows us to communicate with you -- including 			your name, address, telephone number, and e-mail address; Billing information-- including payment data, credit history, credit card number, 			security codes, and service history.Equipment, Performance, TTL Website Usage, Viewing and other Technical Information about use of TTL's network, 			services, products or websites.&lt;/p&gt;
&lt;p&gt;Technical &amp;amp; Usage Information is clarified in the FAQ's as information&lt;b&gt; &lt;/b&gt;related to the services provided, use of TTL's network, 			services, products or websites. Examples of the Technical &amp;amp; Usage Information collected include: &lt;b&gt;Equipment Information &lt;/b&gt;that identifies the equipment used on TTL's network, such as equipment type, IDs, serial numbers, settings, configuration, and software.			&lt;b&gt;Performance Information &lt;/b&gt;about the operation of the equipment, services and applications used on TTL's network, such as IP 			addresses, URLs, data transmission rates and latencies, location information, security characteristics, and information about the amount of bandwidth and other network resources used in connection with uploading, downloading or streaming data to and from the Internet.			&lt;b&gt;TTL Website Usage Information &lt;/b&gt;about the use of TTL websites, including the pages visited, the length of time spent, the links or 			advertisements followed and the search terms entered on TTL sites, and the websites visited immediately before and immediately after visiting one of TTL's sites.TTL also may collect similar information about a customer's use of its applications on wireless devices.			&lt;b&gt;Viewing Information &lt;/b&gt;about the programs watched and recorded and similar choices under Value added TTL services and products.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn123"&gt;
&lt;p&gt;&lt;a href="#_ftnref123" name="_ftn123"&gt;[123]&lt;/a&gt; . Ways in which TTL collects information: On the purchase or interaction about a TTL product or service provided; Automatically collected when one 			visits TTL's websites or use its products and services; Other sources, such as credit agencies.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn124"&gt;
&lt;p&gt;&lt;a href="#_ftnref124" name="_ftn124"&gt;[124]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.tatateleservices.com/t-customercare.aspx"&gt;http://www.tatateleservices.com/t-customercare.aspx&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn125"&gt;
&lt;p&gt;&lt;a href="#_ftnref125" name="_ftn125"&gt;[125]&lt;/a&gt; .See&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341218463621Tata_CC_AA_1-23072013.pdf"&gt; http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341218463621Tata_CC_AA_1-23072013.pdf &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn126"&gt;
&lt;p&gt;&lt;a href="#_ftnref126" name="_ftn126"&gt;[126]&lt;/a&gt; . To provide the best customer experience possible; Provide the services a customer purchases, respond to customer questions; Communicate with 			customers regarding service updates, offers, and promotions; Deliver customized content and advertising that may be of interest to customers; 			Address network integrity and security issues; Investigate, prevent or take action regarding illegal activities, violations of TTL's Terms of 			Service or Acceptable Use Policies&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn127"&gt;
&lt;p&gt;&lt;a href="#_ftnref127" name="_ftn127"&gt;[127]&lt;/a&gt; . &lt;b&gt;Site functionality &lt;/b&gt;-Cookies and other tracking tools are used to help TTL analyze, manage and improve websites and storing 			customer preferences. &lt;b&gt;Advertising &lt;/b&gt;TTL and its advertising partners, including Yahoo! and other advertising networks, use anonymous 			information gathered through cookies and other similar technologies, as well as other information TTL or its advertising networks may have, to help 			tailor the ads a customer sees on its sites.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn128"&gt;
&lt;p&gt;&lt;a href="#_ftnref128" name="_ftn128"&gt;[128]&lt;/a&gt; . TTL collects some Information on an anonymous basis. TTL also may anonymize the Personal Information it collects about customers. It may obtain 			aggregate data by combining anonymous data that meet certain criteria into groups.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn129"&gt;
&lt;p&gt;&lt;a href="#_ftnref129" name="_ftn129"&gt;[129]&lt;/a&gt; . In Other Circumstances: TTL may provide Personal Information to non-TTL companies or other third parties for purposes such as: To assist with 			identity verification, and to prevent fraud and identity theft; Enforcing its agreements and property rights; Obtaining payment for products and 			services that appear on customers' TTL billing statements, including the transfer or sale of delinquent accounts to third parties for collection; 			and to comply to legal and regulatory requirements. TTL shares customer Personal Information only with non-TTL companies that perform services on 			its behalf, and only as necessary for them to perform those services. TTL requires those non-TTL companies to protect any Personal Information they 			may receive in a manner consistent with this policy. TTL does not provide Personal Information to non-TTL companies for the marketing of their own 			products and services without a customer's consent. TTL may share aggregate or anonymous Information in various formats with trusted non-TTL 			entities, and may work with those entities to do research and provide products and services.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn130"&gt;
&lt;p&gt;&lt;a href="#_ftnref130" name="_ftn130"&gt;[130]&lt;/a&gt; . TTL provides Personal Information to non-TTL companies or other third parties (for example, to government agencies, credit bureaus and collection 			agencies) without consent for certain purposes, such as: To comply with court orders, subpoenas, lawful discovery requests and other legal or 			regulatory requirements, and to enforce our legal rights or defend against legal claims, To obtain payment for products and services that appear on 			customer TTL billing statements, including the transfer or sale of delinquent accounts to third parties for collection; To enforce its agreements, 			and protect our rights or property; To assist with identity verification, and to prevent fraud and identity theft; To prevent unlawful use of TTL's 			services and to assist in repairing network outages; To provide information regarding the caller's location to a public safety entity when a call 			is made to police/investigation agencies, and to notify the public of wide-spread emergencies; To notify or respond to a responsible governmental 			entity if we reasonably believe that an emergency involving immediate danger of death or serious physical injury to any person requires or 			justifies disclosure without delay; To display name and telephone number on a Caller ID device;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn131"&gt;
&lt;p&gt;&lt;a href="#_ftnref131" name="_ftn131"&gt;[131]&lt;/a&gt; . Subject to applicable legal restrictions, such as those that exist for Customer Proprietary Network Information (CPNI), the TTL companies may 			share your Personal Information with each other to make sure your experience is as seamless as possible, and you have the benefit of what TTL has 			to offer.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn132"&gt;
&lt;p&gt;&lt;a href="#_ftnref132" name="_ftn132"&gt;[132]&lt;/a&gt; . Customers and Users should be aware that TTL affiliates and non-TTL companies that perform services on behalf of TTL may be located outside the 			country where customers access TTL's services. As a result, when customer Personal Information is shared with or processed by such entities, it may 			be accessible to government authorities according to the laws of those jurisdictions.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn133"&gt;
&lt;p&gt;&lt;a href="#_ftnref133" name="_ftn133"&gt;[133]&lt;/a&gt; . TTL has implemented appropriate security controls to protect Personal Information when stored or transmitted by TTL. It has established 			electronic and administrative safeguards designed to secure the information it collects, to prevent unauthorized access to or disclosure of that 			information and to ensure it is used appropriately. Some examples of those safeguards include: All TTL employees are subject to the internal Code 			of Business Conduct. The TTL Code requires all employees to follow the laws, rules, regulations, court and/or commission orders that apply to TTL's 			business such as legal requirements and company policies on the privacy of communications and the security and privacy of Customer records. 			Employees who fail to meet the standards embodied in the Code of Business Conduct are subject to disciplinary action, up to and including 			dismissal. TTL has implemented technology and security features and strict policy guidelines to safeguard the privacy of customer Personal 			Information. TTL has implemented encryption or other appropriate security controls to protect Personal Information when stored or transmitted by 			it; TTL limits access to Personal Information to those employees, contractors, and agents who need access to such information to operate, develop, 			or improve its services and products; TTL requires caller/online authentication before providing Account Information so that only the customer or 			someone who knows the customer's account Information will be able to access or change the information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn134"&gt;
&lt;p&gt;&lt;a href="#_ftnref134" name="_ftn134"&gt;[134]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf"&gt; http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn135"&gt;
&lt;p&gt;&lt;a href="#_ftnref135" name="_ftn135"&gt;[135]&lt;/a&gt; . See &amp;lt;&amp;lt; &lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker&lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn136"&gt;
&lt;p&gt;&lt;a href="#_ftnref136" name="_ftn136"&gt;[136]&lt;/a&gt; . "We have created this Privacy Policy to help you understand how we collect, use and protect your information when you visit our web and WAP sites 			and use our products and services."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn137"&gt;
&lt;p&gt;&lt;a href="#_ftnref137" name="_ftn137"&gt;[137]&lt;/a&gt; . Vodafone may hold information relating to customers that have been provided (such as on an application or registration form) or that it may has 			obtained from another source (such as its suppliers or from marketing organisations and credit agencies).&lt;/p&gt;
&lt;p&gt;This information may include, amongst other things, a customer's name, address, telephone numbers, information on how a customer uses Vodafone's 			products and services (such as the type, date, time, location and duration of calls or messages, the numbers called and how much a customer spends, 			and information on his/her browsing activity when visiting one of Vodafone's group companies' websites), the location of a customer's mobile phone 			from time to time, lifestyle information and any other information collected in relation to his/her use of Vodafone's products and services 			("information").&lt;/p&gt;
&lt;p&gt;It may use cookies and other interactive techniques such as web beacons to collect non-personal information about how a customer interacts with its 			website, and web-related products and services.&lt;/p&gt;
&lt;p&gt;It may use a persistent cookie to record details such as a unique user identity and general registration details on your PC. Vodafone states that 			most browser technology (such as Internet Explorer, Netscape etc) allows one to choose whether to accept cookies or not - a customer can either 			refuse all cookies or set their browser to alert them each time that a website tries to set a cookie.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn138"&gt;
&lt;p&gt;&lt;a href="#_ftnref138" name="_ftn138"&gt;[138]&lt;/a&gt; . In case of any concerns the privacy officer can be contacted at &lt;a href="mailto:privacyofficer@vodafone.com"&gt;privacyofficer@vodafone.com&lt;/a&gt;. 			Additionally details of the Grievance Redressal Officers is provided via the TRAI website. (TRAI website: 			&lt;a href="http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341567851124Vodafone_CC_AA-23072013.pdf"&gt; http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341567851124Vodafone_CC_AA-23072013.pdf &lt;/a&gt; _&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn139"&gt;
&lt;p&gt;&lt;a href="#_ftnref139" name="_ftn139"&gt;[139]&lt;/a&gt; . The information that Vodafone collects from customers is held in accordance with applicable laws and regulations in India. It may be used by us 			for a number of purposes connected with its business operations and functions, which include:&lt;/p&gt;
&lt;p&gt;2.1 Processing customer orders or applications;&lt;/p&gt;
&lt;p&gt;2.2 Carrying out credit checking and scoring (unless Vodafone have agreed otherwise);&lt;/p&gt;
&lt;p&gt;2.3 Providing the customer with products and/or services requested (including the presentation or elimination of calling or connected line 			identification) or administering his/her account;&lt;/p&gt;
&lt;p&gt;2.4 Billing&lt;/p&gt;
&lt;p&gt;2.5 Settling accounts with those who provide related services to Vodafone;&lt;/p&gt;
&lt;p&gt;2.6 Dealing with requests, enquiries or complaints and other customer care related activities; and all other general administrative and business 			purposes;&lt;/p&gt;
&lt;p&gt;2.7 Carrying out market and product analysis and marketing Vodafone and its group companies' products and services generally;&lt;/p&gt;
&lt;p&gt;2.8 Contacting a customer (including by post, email, fax, short text message (SMS), pager or telephone) about Vodafone and its group companies' 			products and services and the products and services of carefully selected third parties which it think may be of interest to customers (unless a 			customer asks us in writing not to). Electronic marketing messages may not include a marketing facility.&lt;/p&gt;
&lt;p&gt;2.9 Registering customer details and allocating or offering rewards, discounts or other benefits and fulfilling any requests that a customer may 			have in respect of our and our group companies' schemes.&lt;/p&gt;
&lt;p&gt;2.10 inclusion in any telephone or similar directory or directory enquiry service provided or operated by us or by a third party (subject to any 			objection or preference a customer may have indicated to us in writing);&lt;/p&gt;
&lt;p&gt;2.11 carrying out any activity in connection with a legal, governmental or regulatory requirement on Vodafone or in connection with legal 			proceedings, crime or fraud prevention, detection or prosecution;&lt;/p&gt;
&lt;p&gt;2.12 carrying out activities connected with the running of Vodafone's business such as personnel training, quality control, network monitoring, 			testing and maintenance of computer and other systems and in connection with the transfer of any part of Vodafone's business with respect to a 			customer or a potential customer.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn140"&gt;
&lt;p&gt;&lt;a href="#_ftnref140" name="_ftn140"&gt;[140]&lt;/a&gt; . In the need for disclosure to third parties, the personal information will only be disclosed to the third parties below:&lt;/p&gt;
&lt;p&gt;3.1 Vodafone's group companies who may in India use and disclose your information for the same purposes as us;&lt;/p&gt;
&lt;p&gt;3.2 those who provide to Vodafone or its group companies products or services that support the services that we provide, such as our dealers and 			suppliers;&lt;/p&gt;
&lt;p&gt;3.3 credit reference agencies (unless Vodafone has agreed otherwise) who may share your information with other organisations and who may keep a 			record of the searches Vodafone makes against a customer's name;&lt;/p&gt;
&lt;p&gt;3.4 if someone else pays a customer's bill, such as a customer's employer, that person;&lt;/p&gt;
&lt;p&gt;3.5 those providing telephone and similar directories or directory enquiry services&lt;/p&gt;
&lt;p&gt;3.6 anyone Vodafone transfers business to in respect of which a person is a customer or a potential customer;&lt;/p&gt;
&lt;p&gt;3.7 anyone who assists Vodafone in protecting the operation of the Vodafone India networks and systems, including the use of monitoring and 			detection in order to identify potential threats, such as hacking and virus dissemination and other security vulnerabilities;&lt;/p&gt;
&lt;p&gt;3.8 persons to whom Vodafone may be required to pass customer information by reason of legal, governmental or regulatory authority including law 			enforcement agencies and emergency services;&lt;/p&gt;
&lt;p&gt;3.9 any person or organisation as authorised by laws and regulations applicable in India.&lt;/p&gt;
&lt;p&gt;If a customer has opted in to receiving marketing material from Vodafone, it may also provide customer's personal information to carefully selected 			third parties who we reasonably believe provide products or services that may be of interest to customers and who have contracted with Vodafone 			India to keep the information confidential, or who are subject to obligations to protect your personal information.&lt;/p&gt;
&lt;p&gt;To opt-out of receiving Vodafone marketing materials,customers can send a 'Do Not Disturb' message to Vodafone. If a customer wishes to use 			Vodafone products or services abroad, his/her information may be transferred outside India to that country. Vodafone's websites and those of its 			group companies may also be based on servers located outside of India.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn141"&gt;
&lt;p&gt;&lt;a href="#_ftnref141" name="_ftn141"&gt;[141]&lt;/a&gt; . Vodafone takes reasonable steps to ensure that the personal information it collects, uses or discloses is accurate, complete, up-to-date and 			stored in a secure environment protected from unauthorized access, modification or disclosure.&lt;/p&gt;
&lt;p&gt;Vodafone makes every effort to maintain the security of our internet connections; however for reasons outside of our control, security risks may 			still arise. Any personal information transmitted to it or from its online products or services will be at a customer's own risk, however, it will 			use its best efforts to ensure that any such information remains secure. Vodafone cannot protect any information that a customer makes available to 			the general public - for example, on message boards or in chat rooms.&lt;/p&gt;
&lt;p&gt;Vodafone may use cookies and other interactive techniques such as web beacons to collect non-personal information about how a customer interacts.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn142"&gt;
&lt;p&gt;&lt;a href="#_ftnref142" name="_ftn142"&gt;[142]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.vodafone.com"&gt;http://www.vodafone.com&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn143"&gt;
&lt;p&gt;&lt;a href="#_ftnref143" name="_ftn143"&gt;[143]&lt;/a&gt; . See &amp;lt; 			&lt;a href="http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html"&gt; http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn144"&gt;
&lt;p&gt;&lt;a href="#_ftnref144" name="_ftn144"&gt;[144]&lt;/a&gt; . 			&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061"&gt; http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061 &lt;/a&gt; (Scope - This Privacy Policy has been created to help customer's understand how Aircel collects, uses and protects customer information when one 			visits its web and WAP sites and use its products and services.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn145"&gt;
&lt;p&gt;&lt;a href="#_ftnref145" name="_ftn145"&gt;[145]&lt;/a&gt; . This information may include, amongst other things, customer's name, father's name, mother's name, spouse's name, date of birth, address, 			telephone numbers, mobile phone number, email address, occupation and information contained in the documents used as proof of identity and proof of 			address. Aircel may also hold information related to utilization of its services. This may include customer call records, browsing history while 			surfing Aircel's website, location details and additional information provided by customer while using our services.&lt;/p&gt;
&lt;p&gt;Aircel may keep a log of the activities performed by a customer on its websites by using various internet techniques such as web cookies, web 			beacons, server log files, etc.&lt;/p&gt;
&lt;p&gt;Aircel may use cookies and other interactive techniques such as web beacons to collect non-personal information about how customers interact with 			Aircel's website, and web-related products and services&lt;/p&gt;
&lt;p&gt;Aircel may use a persistent cookie to record details such as a unique user identity and general registration details on customer's Personal 			Computers.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn146"&gt;
&lt;p&gt;&lt;a href="#_ftnref146" name="_ftn146"&gt;[146]&lt;/a&gt; . In case a customer does not provide information or consent for usage of personal information or later on withdraw consent for usage of the 			personal information so collected, Aircel reserves the right to discontinue the services for which the said information was sought.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn147"&gt;
&lt;p&gt;&lt;a href="#_ftnref147" name="_ftn147"&gt;[147]&lt;/a&gt; . In case of any feedback or concern regarding protection of personal information, customers can contact Aircel's &lt;b&gt;Circle Care ID.&lt;/b&gt; Alternatively, one may also direct your privacy-related feedback or concerns to the &lt;b&gt;Circle Nodal Officer.&lt;/b&gt; (e.g. - Delhi Circle 			Nodal details are as mentioned below):&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Name: Moushumi De&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; Contact Number: 9716199209&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; E-mail: &lt;/b&gt; &lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061"&gt; &lt;b&gt;nodalofficer.delhi@aircel.co.in&lt;/b&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Further it provides for a general customer grievance redressal mechanism&lt;/p&gt;
&lt;p&gt;Additionally details of the Grievance Redressal Officers is provided via the TRAI website.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; To resolve all concerns, Aircel has established a 2-tier complaint handling mechanism.&lt;/b&gt; &lt;b&gt;Level I: Our Customer Touch Points&lt;/b&gt; As an Aircel customer you have the convenience to contact at Customer Interface Points via email, post or telephone.			&lt;b&gt;Level II - Appellate Authority&lt;/b&gt;Despite the best efforts put by Aircel's executive, if a customer is still not satisfied with the 			resolution provided then he/she may submit his/her concern to the Appellate Authority of the circle. Comments - However this information 			contradicts the mechanism provided under Aircel's Manual of Practice for handling Consumer Complaints which provides for a 3&lt;b&gt;-&lt;/b&gt;tier 			complaint handling mechanism.&lt;/p&gt;
&lt;p&gt;[According to the DoT - The 			&lt;b&gt; earlier three-tier complaint redressal mechanism - Call center, Nodal Center and Appellate Authority, has been replaced by a two-tier &lt;/b&gt; one by doing away with the level of Nodal Officer. This is because the Complaint Centres are essentially registration and response centres and do 			not deal with the resolution of complaints. They only facilitate registration of consumer complaint and the level at which a problem is resolved 			within a company depends upon the complexity of the issue involved.]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn148"&gt;
&lt;p&gt;&lt;a href="#_ftnref148" name="_ftn148"&gt;[148]&lt;/a&gt; . It may be used by us for a number of purposes connected with our business operations and functions, which include:&lt;/p&gt;
&lt;p&gt;1. Processing customer orders or applications.&lt;/p&gt;
&lt;p&gt;2. Carrying out credit checking and scoring (unless agreed otherwise).&lt;/p&gt;
&lt;p&gt;3. Providing customers with products and/or services requested (including the presentation or elimination of calling or connected line 			identification) or administering a customer's account.&lt;/p&gt;
&lt;p&gt;4. Billing (unless there exists another agreed method).&lt;/p&gt;
&lt;p&gt;5. Settling accounts with those who provide related services to Aircel.&lt;/p&gt;
&lt;p&gt;6. Dealing with requests, enquiries or complaints and other customer care related activities; and all other general administrative and business 			purposes.&lt;/p&gt;
&lt;p&gt;7. Carrying out market and product analysis and marketing our and our group companies' products and services generally.&lt;/p&gt;
&lt;p&gt;8. Contacting customers (including by post, email, fax, short text message (SMS), pager or telephone) about Aircel and its group companies' 			products and services and the products and services of carefully selected third parties which it think may be of interest to a customer (unless a 			customer says 'no' in writing). Electronic messages need not have an unsubscribe facility.&lt;/p&gt;
&lt;p&gt;9. Registering customer details and allocating or offering rewards, discounts or other benefits and fulfilling any requests that customers may have 			in respect of Aircel and its group companies' loyalty or reward programmes and other similar schemes.&lt;/p&gt;
&lt;p&gt;10. Inclusion in any telephone or similar directory or directory enquiry service provided or operated by Aircel or by a third party (subject to any 			objection or preference a customer may have indicated in writing).&lt;/p&gt;
&lt;p&gt;11. Carrying out any activity in connection with a legal, governmental or regulatory requirement on Aircel or in connection with legal proceedings, 			crime or fraud prevention, detection or prosecution.&lt;/p&gt;
&lt;p&gt;12. Carrying out activities connected with the running of business such as personnel training, quality control, network monitoring, testing and 			maintenance of computer and other systems and in connection with the transfer of any part of Aircel's business with respect to a customer or 			potential customer. Aircel may use cookies and other interactive techniques such as web beacons to collect non-personal information about how 			customers interact with our website, and web-related products and services, to:&lt;/p&gt;
&lt;p&gt;● Understand what a customer likes and uses about Aircel's website.&lt;/p&gt;
&lt;p&gt;● Provide a more enjoyable, customised service and experience&lt;/p&gt;
&lt;p&gt;Aircel may use a persistent cookie to record details such as a unique user identity and general registration details on your Personal Computer.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn149"&gt;
&lt;p&gt;&lt;a href="#_ftnref149" name="_ftn149"&gt;[149]&lt;/a&gt; . Where Aircel needs to disclose your information to third parties, such third parties will be:&lt;/p&gt;
&lt;p&gt;1. Group companies who may use and disclose your information for the same purposes as us.&lt;/p&gt;
&lt;p&gt;2. Those who provide to Aircel or its group companies products or services that support the services that we provide, such as our dealers and 			suppliers.&lt;/p&gt;
&lt;p&gt;3. Credit reference agencies (unless we have agreed otherwise) who may share your information with other organisations and who may keep a record of 			the searches Aircel make against your name.&lt;/p&gt;
&lt;p&gt;4. If someone else pays a customer's bill, such as an employer.&lt;/p&gt;
&lt;p&gt;5. Those providing telephone and similar directories or directory enquiry services.&lt;/p&gt;
&lt;p&gt;6. Anyone Aircel transfers its business to in respect of which you are a customer or a potential customer.&lt;/p&gt;
&lt;p&gt;7. Anyone who assists Aircel in protecting the operation of the Aircel networks and systems, including the use of monitoring and detection in order 			to identify potential threats, such as hacking and virus dissemination and other security vulnerabilities.&lt;/p&gt;
&lt;p&gt;8. Persons to whom Aircel may be required to pass customer information by reason of legal, governmental or regulatory authority including law 			enforcement agencies and emergency services. If a customer has opted in to receiving marketing material from Aircel, it may also provide personal 			information to carefully selected third parties who it reasonably believes to provide products or services that may be of interest to customers and 			who have contracted with Aircel to keep the information confidential, or who are subject to obligations to protect customer personal information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn150"&gt;
&lt;p&gt;&lt;a href="#_ftnref150" name="_ftn150"&gt;[150]&lt;/a&gt; . We adopt reasonable security practices and procedures to include, technical, operational, managerial and physical security control measures in 			order to protect your personal information from unauthorized access, or disclosure while it is under our control.Our security practices and 			procedures limit access to personal information on need to know basis. Further, our employees, to the extent they may have limited access to your 			personal information on need to know basis, are bound by Code of Conduct and Confidentiality Policies which obligate them to protect the 			confidentiality of personal informationWe take adequate steps to ensure that our third parties adopt reasonable level of security practices and 			procedures to ensure security of personal information&lt;/p&gt;
&lt;p&gt;We may retain your personal information for as long as required to provide you with services or if otherwise required under any law. We, however 			assure you that Aircel does not disclose your personal information to unaffiliated third parties (parties outside Aircel corporate network and its 			Strategic and Business Partners) which could lead to invasion of your privacy&lt;/p&gt;
&lt;p&gt;When we dispose off your personal information, we use reasonable procedures to erase it or render it unreadable (for example, shredding documents 			and wiping electronic media).&lt;/p&gt;
&lt;p&gt;We will take reasonable steps to ensure that the personal information we collect, use or disclose is accurate, complete, up-to-date and stored in a 			secure environment protected from unauthorised access, modification or disclosure. We use a variety of security technologies and procedures to help 			protect your personal information from unauthorized access, use, or disclosure. For example, we store the personal information you provide on 			computer systems with limited access, which are located in controlled facilities. When we transmit highly confidential information (such as a 			credit card number or password) over the Internet, we protect it through the use of encryption, such as the Secure Socket Layer (SSL) protocol. If 			a password is used to help protect your accounts and personal information, it is your responsibility to keep your password confidential. Do not 			share this information with anyone. If you are sharing a computer with anyone you should always log out before leaving a site or service to protect 			access to your information from subsequent users.&lt;/p&gt;
&lt;p&gt;We make every effort to maintain the security of our internet connections; however for reasons outside of our control, security risks may still 			arise. Any personal information transmitted to us or from our online products or services will therefore be your own risk, however we will use our 			best efforts to ensure that any such information remains secure.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn151"&gt;
&lt;p&gt;&lt;a href="#_ftnref151" name="_ftn151"&gt;[151]&lt;/a&gt; . http://www.acttv.in/index.php/privacy-policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn152"&gt;
&lt;p&gt;&lt;a href="#_ftnref152" name="_ftn152"&gt;[152]&lt;/a&gt; . "When you register, we ask for information such as your name, email address, birth date, gender, zip code, occupation, industry, and personal 			interests.&lt;/p&gt;
&lt;p&gt;The Company collects information about your transactions with us and with some of our business partners, including information about your use of 			products and services that we offer."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn153"&gt;
&lt;p&gt;&lt;a href="#_ftnref153" name="_ftn153"&gt;[153]&lt;/a&gt; . Not provided for on the TRAI website as ACT is not a telecom.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn154"&gt;
&lt;p&gt;&lt;a href="#_ftnref154" name="_ftn154"&gt;[154]&lt;/a&gt; . The Company can use information for the following general purposes: to customize the advertising and content you see, fulfill your requests for 			products and services, improve our services, contact you, conduct research, and provide anonymous reporting for internal and external clients.&lt;/p&gt;
&lt;p&gt;The Company collects personal information when you register with the Company, when you use the Company products or services, when you visit the 			Company pages or the pages of certain partners of the Company. The Company may combine information about you that we have, with information we 			obtain from business partners or other companies. The Company shall have the right to pass on the same to its business associates, franchisees 			without referring the same to you.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn155"&gt;
&lt;p&gt;&lt;a href="#_ftnref155" name="_ftn155"&gt;[155]&lt;/a&gt; . Aircel provide the information to trusted partners who work on behalf of or with the Company under confidentiality agreements. These companies 			may use customer personal information to help the Company communicate about offers from the Company and marketing partners.&lt;/p&gt;
&lt;p&gt;Aircel believe it is necessary to share information in order to investigate, prevent, or take action regarding illegal activities, suspected fraud, 			situations involving potential threats to the physical safety of any person, violations of the Company's terms of use, or as otherwise required by 			law.&lt;/p&gt;
&lt;p&gt;Aircel transfer information about a customer if the Company is acquired by or merged with another company under a different management. In this 			event, the Company will notify a customer before information about a customer is transferred and becomes subject to a different privacy policy.&lt;/p&gt;
&lt;p&gt;The Company plans to display targeted advertisements based on personal information. Advertisers (including ad serving companies) may assume that 			people who interact with, view, or click on targeted ads meet the targeting criteria - for example, women ages 18-24 from a particular geographic 			area.&lt;/p&gt;
&lt;p&gt;The Company will not provide any personal information to the advertiser when customers interact with or view a targeted ad. However, by interacting 			with or viewing an ad a customer consents to the possibility that the advertiser will make the assumption that he/she meets the targeting criteria 			used to display the ad.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn156"&gt;
&lt;p&gt;&lt;a href="#_ftnref156" name="_ftn156"&gt;[156]&lt;/a&gt; . Rule 8.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules'&gt;https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-01-13T02:37:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling">
    <title>Reply to RTI filed with BSNL regarding Network Neutrality and Throttling</title>
    <link>https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling</link>
    <description>
        &lt;b&gt;As part of its work on Network Neutrality, the Centre for Internet and Society through Tarun Krishnakumar had filed a Right To Information (RTI) application with Bharat Sanchar Nigam Ltd. (BSNL), a state-owned teleco holding a market share of 65 per cent in the Indian land line and broadband markets — regarding its position on and adherence to Network Neutrality principles. 

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The application — targeted at easing the information asymmetry between internet service providers (ISPs) and consumers — elicited responses that provide interesting insights into the functioning of ISPs in India.&lt;/p&gt;
&lt;p&gt;The application queried BSNL about its:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Adherence to net neutrality / non-discrimination principles&lt;/li&gt;
&lt;li&gt;Throttling on the basis of content&lt;/li&gt;
&lt;li&gt;Throttling on the basis of protocol&lt;/li&gt;
&lt;li&gt;Limiting traffic / speeds for pornographic websites&lt;/li&gt;
&lt;li&gt;Limiting traffic / speeds for P2P / torrent connection&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In its reply, BSNL denied all forms of throttling on the basis of content and reaffirmed that it is bound by the terms of its ISP license granted by the Department of Telecommunications. The application and response are below:&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h3 style="text-align: center; "&gt;&lt;a name="application"&gt;&lt;/a&gt;&lt;b&gt;&lt;span&gt;Application&lt;/span&gt;:&lt;/b&gt;&lt;/h3&gt;
&lt;p align="center" style="text-align: center; "&gt;&lt;b&gt;&lt;span&gt;Request for Information under the Right to Information Act, 2005&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;To,&lt;/p&gt;
&lt;p&gt;Sh. Suresh Kumar&lt;br /&gt;Addl.GM (MIS)  &amp;amp; CPIO ,BSNL Co.&lt;br /&gt;R. No. -29, IR Hall&lt;br /&gt;Eastern Court, Janpath&lt;br /&gt;New Delhi – 110001&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Date of application&lt;/b&gt;: 08-10-2014&lt;/p&gt;
&lt;p align="center" style="text-align: center; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Subject: Network Neutrality / Throttling / Data discrimination policies of BSNL&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please provide information as to the policies of BSNL / decisions taken in respect of the following questions. Please supply where possible a copy of the relevant documents, minutes of meeting, position papers etc.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Does BSNL support the principle of net neutrality and non-discrimination of data?&lt;/li&gt;
&lt;li&gt;Does BSNL regulate internet traffic flows depending on the type of content being accessed by the user on its broadband connections?&lt;/li&gt;
&lt;li&gt;Does BSNL regulate internet traffic flows depending on the type of protocol being used by the user on its broadband connections?&lt;/li&gt;
&lt;li&gt;Please provide details of the various types of content/protocols for which BSNL regulates traffic and the nature of such regulations, restrictions as the case may be.&lt;/li&gt;
&lt;li&gt;Please provide a list of traffic for which BSNL engages in limiting internet speed or throttling.&lt;/li&gt;
&lt;li&gt;Does BSNL limit internet traffic or upload/download speeds for pornographic websites and content?&lt;/li&gt;
&lt;li&gt;Does BSNL limit internet traffic or upload/download speeds for Peer-to-peer or torrent connections?&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Please provide copies of all documents that pertain to BSNL’s policies and decisions in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is certified that I am a citizen of India and that I do not fall within the BPL category. I am enclosing Rupees thirty (Rs. 30) towards the application fee and photocopying costs under the RTI Act for the information and documents requested. Kindly inform me at the address stated below if any further fees are required to be paid.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Applicant&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;Tarun Krishnakumar&lt;br /&gt;Centre for Internet and Society&lt;br /&gt;No.194, 2nd C Cross Road, Domlur II Stage,&lt;br /&gt;Bangalore - 560071&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h3 style="text-align: center; "&gt;&lt;span&gt;RESPONSE FROM BSNL:&lt;/span&gt;&lt;/h3&gt;
&lt;div style="text-align: center; "&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;To,&lt;/p&gt;
&lt;p&gt;Sh. Tarun Krishnakumar&lt;br /&gt;Centre for Internet and Society&lt;br /&gt;No. 194, 2&lt;sup&gt;nd&lt;/sup&gt; C Cross Road, Domulur II stage,&lt;br /&gt;Bengaluru – 560071&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;Subject: Supply of Information under RTI ACT – 2005&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Case of Shri. Tarun Krishnakumar – reg.&lt;/p&gt;
&lt;p&gt;Ref:  -   1. No. BSNL/BBNW/RTI Act/Vol II/2012-13/52 dtd 28.10.2014&lt;/p&gt;
&lt;p&gt;2. No. 23-744/14-RTI dtd 21.10.2014&lt;/p&gt;
&lt;p&gt;With reference to the above subject, for the point wise information furnished as below:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;BSNL is following the guidelines as per the ISP License Agreement of DOT.&lt;/li&gt;
&lt;li&gt;NO, BSNL is NOT regulating the Internet traffic flow based on content.&lt;/li&gt;
&lt;li&gt;NO, BSNL is not regulating the Internet traffic flow based on the type of protocol.&lt;/li&gt;
&lt;li&gt;Not Applicable&lt;/li&gt;
&lt;li&gt;Not Applicable&lt;/li&gt;
&lt;li&gt;NO&lt;/li&gt;
&lt;li&gt;NO&lt;/li&gt;
&lt;li&gt;The documents relating to above are available on DOT’s website http://dot.gov.in&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;(Sd/-)&lt;/p&gt;
&lt;p&gt;DE Admin and APIO&lt;br /&gt;O/o General Manager&lt;br /&gt;BBNW, BSNL,&lt;br /&gt;5&lt;sup&gt;th&lt;/sup&gt; floor, BG (E), TE Building,&lt;br /&gt;Lazar Road, Fraser Town,&lt;br /&gt;Bengaluru – 560005&lt;br /&gt;Tel No. 080 - 25808878&lt;/p&gt;
&lt;p&gt;Copy to:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The Addl. GM (A) &amp;amp; CPIP O/o CGM, BBNW, New Delhi for information pl.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The scanned version of the reply is available &lt;a class="external-link" href="https://www.scribd.com/doc/250739602/BSNL-Reply-on-Net-Neutrality"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling'&gt;https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tarun</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2014-12-22T14:45:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy">
    <title>Security, Governments, and Data: Technology and Policy</title>
    <link>https://cis-india.org/internet-governance/events/security-governments-data-technology-policy</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society and the Observer Research Foundation invite you to a one day conference on January 8, 2015 in New Delhi. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;About the Conference&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conference will focus on the technologies, policies, and practices around cyber security and surveillance. The conference will reach out to a number of key stakeholders including civil society, industry, government, and academia and explore the present scenario in India to reflect on ways forward.&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;&lt;strong&gt;Conference &lt;/strong&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;&lt;span&gt;Ensuring the security of the India’s cyber space is a complex, challenging, and ever changing responsibility that the government is tasked with.  Doing so effectively requires a number of factors to come together in a harmonized strategy including: laws &amp;amp; policies, technical capabilities, markets, and a skilled workforce. It also requires collaboration on multiple levels including with foreign governments, domestic and foreign industry, and law enforcement. The first of these is particularly important given the ability of attackers to penetrate across borders and the global nature of data. Any strategy developed by India must be proactive and reactive – evolving defences to prevent a potential threat and applying tactics to respond to a real time threat. To do so, the government of India must legally have the powers to take action and must have the technical capability to do so. Yet, many of these powers and technical capabilities require a degree of intrusion into the lives of citizens and residents of India through means such as surveillance. Thus, such measures must be considered in light of principles of proportionality and necessity, and legal safeguards are needed to protect against the violation of privacy. Furthermore, a principle of optimization must be considered i.e, how much surveillance achieves the most amount of security and how can this security be achieved with the optimal mix of technology, policy and enforcement.&lt;/span&gt;&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;Panel Descriptions&lt;/h3&gt;
&lt;p align="left"&gt; &lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt;Challenges &amp;amp; Present Scenario&lt;/strong&gt;&lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Protecting and enhancing the cyber security of India is a complex and dynamic responsibility. The challenge of securing cyber space is magnified by the demarcated nature of the internet, the multiplicity of vulnerabilities that can be exploited at the national level, the magnitude of infrastructure damage possible from a cyber attack, and the complexity of application of a jurisdiction’s law to a space that is technologically borderless. A comprehensive ‘cyber security’ ecosystem is required to address such challenges – one that involves technology, skills, and capabilities – including surveillance capabilities.  The Government of India has taken numerous steps to address and resolve such challenges.  In July 2013, the National Cyber Security Policy  was published for the purpose of creating an enabling framework for the protection of India’s cyber security. In February 2014, the 52&lt;/span&gt;&lt;sup&gt;nd&lt;/sup&gt;&lt;span&gt; Standing Committee on Information Technology issued a report assessing the implementation of this policy – in which they found that a number of areas needed strengthening. The Government of India has also proposed the establishment of a number of centres focused on cyber security – such as the National Cyber Coordination Center and the National Critical Information Infrastructure Protection Centre.  CERT-IN, under the Department of Electronics and Information Technology is presently the body responsible for overseeing and enforcing cyber security in India, while other bodies such as the Resource Centre for Cyber Forensic and TERM cells under the Department of Telecommunications play critical roles in overseeing and undertaking capabilities related to cyber security.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Law &amp;amp; Policy&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India has five statutes regulating the collection and use of data for surveillance purposes. These laws define circumstances on which the government is justified in accessing and collecting real time and stored data as well as procedural safeguards they must adhere to when doing so. The Department of Telecommunications has also issued the Unified Access License which, among other things,  mandates service providers to provide technical support to enable such collection. The Indian judicial system has also provided a number of Rulings that set standards for the access, collection, and use of data as well as defining limitations and safeguards that must be respected in doing so. The draft Privacy Bill 2011, released by the Department of Personnel and Training, also contained provisions addressing surveillance in the context of interception and the use of electronic video recording devices. In the Report of the Group of Experts on Privacy, the AP Shah Committee found that the legal regime for surveillance in India was not harmonized and lacked safeguards. Furthermore, in the era where the direct collection of large volumes of data is easily possible, there is a growing need to re-visit questions about the legitimate and proportionate collection and use (particularly as evidence) of such data. Questions are also arising about the applicability of standards and safeguards to the state. At a global level, catalyzed by the leaks by Edward Snowden, there has been a strong push for governments to review and structure their surveillance regimes to ensure that they are in line with international human rights standards.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Architecture &amp;amp; Technology&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India is in the process of architecting a number of initiatives that seek to enable the collection and sharing of intelligence such as the CMS, NATGRID, and NETRA. At a regional level, the Ministry of Home Affairs is in the process of implementing ‘Mega Policing Cities’ which include the instalment of CCTV’s and centralized access to crime related information. Globally, law enforcement and governments are beginning to take advantage of the possibilities created by ‘Big Data’ and ‘open source’ policing. The architecture and technology behind any surveillance and cyber security initiative are key to its success. Intelligently and appropriately designed projects and technology can also minimize the possibility of intrusions into the private lives of citizens. Strong access controls, decentralized architecture, and targeted access are all principles that can be incorporated into the architecture and technology behind a project or initiative. At the same time, the technology or process around a project can serve as the ‘weakest link’ – as it is vulnerable to attacks and tampering. Such possibilities raise concerns about the use of foreign technology and dependencies on foreign governments and companies.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;International and Domestic Markets&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Globally, the security market is growing – with companies offering a range of services and products that facilitate surveillance and can be used towards enhancing cyber security. In India, the security market is also growing with studies predicting that it will reach $1.06 billion by 2015.  Recognizing the potential threat posed by imported security and telecom equipment, India also develops its own technologies through the Centre for Development of Telematics –attached to the Department of Telecommunications, and the Centre for Development of Advanced Computing – attached to the Department of Electronics and Information Technology. At times India has also imposed bans on the import of technologies believed to be compromised.  Towards this end, the Government of India  has a number of bodies responsible for licensing, auditing, and certifying the use of security and telecommunication equipment.  Though India has recognized the security vulnerabilities posed by these technologies, as of yet it has not formally recognized the human rights violations that are made possible. Indeed, though India has submitted a request to be a signing member of the &lt;/span&gt;&lt;span&gt;Wassenaar agreement, they have yet to be accepted.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;/td&gt;
&lt;td&gt;Registration &amp;amp; Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30&lt;/td&gt;
&lt;td&gt;Key Note Speech&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00&lt;/td&gt;
&lt;td&gt;Challenges &amp;amp; Present Scenario&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;/td&gt;
&lt;td&gt;Law &amp;amp; Policy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;/td&gt;
&lt;td&gt;Architecture &amp;amp; Technology&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00&lt;/td&gt;
&lt;td&gt;International &amp;amp; Domestic Markets&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.00&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.30&lt;/td&gt;
&lt;td&gt;Conclusion &amp;amp; Closing Remarks&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-governments-data-technology-policy'&gt;https://cis-india.org/internet-governance/events/security-governments-data-technology-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-24T08:06:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you">
    <title>UID: Are your biometric I-cards stacked against you?</title>
    <link>https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you</link>
    <description>
        &lt;b&gt;Imagine a rural family of five. Mom. Dad. Two kids. And Grandma. Assume too that they are below the poverty line. The day is coming when this family will have to give its biometrics out to myriad agencies. &lt;/b&gt;
        &lt;p&gt;&lt;a href="http://articles.economictimes.indiatimes.com/2012-06-24/news/32382928_1_biometrics-uidai-national-population-register"&gt;This article by M Rajshekhar was published in the Economic Times on June 24, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;You know that Nandan Nilekani's &lt;a href="http://economictimes.indiatimes.com/topic/Unique%20Identification%20Authority%20of%20India" target="_blank"&gt;&lt;span&gt;Unique Identification Authority of India&lt;/span&gt;&lt;/a&gt; (UIDAI) or the Registrar General's &lt;a href="http://economictimes.indiatimes.com/topic/National%20Population%20Register" target="_blank"&gt;&lt;span&gt;National Population Register&lt;/span&gt;&lt;/a&gt; (NPR) has been collecting biometrics for a while now. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; But a set of other departments have entered the fray. This ranges from  the PDS department, ministry of rural development (MoRD), states'  education departments, the Rashtriya Swasthya Bima Yojana (RSBY), banks,  the department of social welfare, the post office...they are all  collecting biometrics (see Agencies Collecting Biometrics Right Now). &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; This is the latest iteration in India's tryst with biometrics. From a beginning where only the &lt;a href="http://economictimes.indiatimes.com/topic/NPR" target="_blank"&gt;&lt;span&gt;NPR&lt;/span&gt;&lt;/a&gt; — and, a little later, the &lt;a href="http://economictimes.indiatimes.com/topic/UIDAI" target="_blank"&gt;&lt;span&gt;UIDAI&lt;/span&gt;&lt;/a&gt; — were to capture biometrics, we have now reached a point where myriad  departments and ministries are camping in India's villages and towns,  capturing &lt;a href="http://economictimes.indiatimes.com/topic/fingerprints" target="_blank"&gt;&lt;span&gt;fingerprints&lt;/span&gt;&lt;/a&gt; and iris images. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt; Identity Thieves &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; There was to be one large database. Now, we are moving to a system  where multiple agencies capture and store biometrics data in myriad  servers. This is amplifying the risk of biometric theft. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; As Sunil Abraham, the head of Bangalore-based Centre for Internet and  Society says, "If biometrics is used as authentication factor then it  would be possible for a criminal to harvest your biometrics — such as  using a glass to collect fingerprints — without your conscious  cooperation. Or the registrar can cache your biometrics and duplicate  transactions." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; As the number of databases containing biometrics rises, the risk of  this information leaking out increases. There have been complaints  against an UIDAI enrolment agency called Madras Security Printers that  it had sold data to private companies. There were also charges that  enrolment agencies had outsourced the enrolment work to other companies,  which they are not allowed to do. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; What complicates matters further is there are not many safeguards. The  country doesn't have a policy on how biometrics can be captured, used,  stored and destroyed. But before we get deeper into that story, it is  useful to understand why multiple departments have begun collecting  biometrics. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt; Biometric Rush &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; According to a senior bureaucrat who recently retired from the ministry  of planning, the answer lies in the 2014 elections. "For the  government, cash transfers are the large reforms that they think UPA 2  can point towards in the next elections. For this reason, they need all  this up and running before 2014." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; However, over the past few months, parts of the government are  increasingly unsure if UIDAI and NPR will meet their targets. "I do not  think the 2014 target can be met at all," says a senior official in the &lt;a href="http://economictimes.indiatimes.com/topic/National%20Informatics%20Centre" target="_blank"&gt;&lt;span&gt;National Informatics Centre&lt;/span&gt;&lt;/a&gt; (NIC). "We have to enroll another 800 million people. Then, we have to  deduplicate them. Then, we have to make the cards and distribute them." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; This is one reason why a set of government departments are configuring  their own alternatives. Take the Department of Financial Services (DFS).  It has been testing an online, biometric system for cash payments in  Haryana's Mewat district for months now. Here, each bank will store its  customers' biometric information in its own servers. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; If a customer of bank A goes to a banking correspondent (BC) agent of  bank B, his biometrics would be forwarded by bank B to bank A for  authentication. Once authenticated, the transaction will be completed.  "We should be rolling the new system out nationally from July or  August," says the bureaucrat. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; The rural development ministry is also testing its payment system. Once  the local administration tells the ministry about who worked how many  days, the ministry will be able to put money into their accounts  automatically via a payment gateway. Right now, this is done manually  with the block development officer and sarpanch making out the cheques. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; This pilot, says DK Jain, joint secretary, MoRD, started 3-4 months ago  in parts of Gujarat, Karnataka, Odisha and Rajasthan. In another six  months, it will be available across the country. And then, there is the  PDS. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; Here, different states are putting different systems in place. Andhra,  says a senior mandarin in the food ministry, is going with UID, Haryana  is looking at smart cards, Jharkhand is going with Aadhaar, MP and  Gujarat are testing food coupons, while Chhattisgarh has decided to use  RSBY and Orissa has chosen NPR. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; Apart from this, data is also being collected by the RSBY and BC  companies on behalf of the banks handling welfare payments, or  scrambling to meet their financial inclusion targets. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Sunil Abraham is quoted in this article&lt;/i&gt;.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you'&gt;https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-26T09:33:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/march-2017-newsletter">
    <title>March 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/march-2017-newsletter</link>
    <description>
        &lt;b&gt;Welcome to March 2017 newsletter of the Centre for Internet &amp; Society (CIS).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dear readers,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/comments-on-the-draft-rights-of-persons-with-disabilities-rules"&gt;submitted comments on the draft Rights of Persons with Disabilities  Rules&lt;/a&gt; for the consideration of the Department of Empowerment of Persons  with Disabilities, Government of India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Anubha Sinha in a blog post has &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/intellectual-property-rights-and-mobile-apps"&gt;identified the various kinds of IP in an app&lt;/a&gt; and explained the protections available under Indian IPR law. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS-A2K is &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/wikisource-internship-project-at-new-law-college-pune"&gt;conducting a Wiki internship project&lt;/a&gt; for students of New Law College, Pune under the guidance of Prof.Dr.Mukund Sarda, Dean and Principal of New Law College. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In an &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it"&gt;Op-ed published in the Hindu&lt;/a&gt;, Sunil Abraham has stated that though biometrics may be appropriate for targeted surveillance by the state, it is wholly inappropriate for everyday transactions between state and law abiding citizens.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS has &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/benefits-harms-rights-and-regulation-survey-of-literature-on-big-data"&gt;published a survey&lt;/a&gt; that draws upon a range of literature including news articles, academic articles, and presentations and seeks to disaggregate the potential benefits and harms of big data, organising them into several broad categories that reflect the existing scholarly literature.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS submitted comments on the Information Technology (Security of Prepaid Payment Instruments) Rules, 2017. The &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017"&gt;comments were in response to the Information Technology (Security of Prepaid Payment Instruments) Rules 2017&lt;/a&gt;. The Ministry of Electronics and Information Technology issued a consultation paper which called for developing a framework for security of digital wallets operating in the country. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ritam Sengupta, Dr. Richard Heeks, Sumandro Chattapadhyay, and Dr. Christopher Foster &lt;a class="external-link" href="http://cis-india.org/raw/exploring-big-data-for-development-an-electricity-sector-case-study-from-india"&gt;have co-authored a paper&lt;/a&gt; that presents exploratory research into “data-intensive development” that seeks to inductively identify issues and conceptual frameworks of relevance to big data in developing countries.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CIS in the news:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum"&gt;The 12-digit conundrum&lt;/a&gt; (Richa Mishra; Hindu Businessline; March 13, 2017)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-statesman-smriti-sharma-vasudeva-march-14-2017-evms-how-transparent-is-the-indian-election-process"&gt;EVMs: How transparent is the Indian election process?&lt;/a&gt; (Smriti Sharma Vasudeva; The Statesman; March 14, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber"&gt;Nasscom chief saying full data protection isn’t possible should wake us from our digital slumber&lt;/a&gt; (First Post; March 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/one-world-indentity-kaelyn-lowmaster-march-17-2017-privacy-concerns-multiply-for-aadhaar-indias-national-biometric-identity-registry"&gt;Privacy concerns multiply for Aadhaar, India’s national biometric identity registry&lt;/a&gt; (One World Identity; March 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-guardian-march-21-2017-no-id-no-benefits"&gt;No ID, no benefits: thousands could lose lifeline under India’s biometric scheme&lt;/a&gt; (Guardian; March 21, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar"&gt;Why We Should All Worry About The Mandatory Imposition Of Aadhaar&lt;/a&gt; (Rimin Dutt and Ivan Mehta; Huffington Post; March 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/financial-times-march-27-2017-amy-kazmin-indias-biometric-id-scans-make-sci-fi-a-reality"&gt;India’s biometric ID scans make sci-fi a reality&lt;/a&gt; (Amy Kazmin; Financial Times; March 27, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/ndtv-march-27-2017-discussion-on-aadhaar"&gt;क्‍या आधार पर जल्दबाज़ी में है सरकार?&lt;/a&gt; (NDTV; March 27, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-march-27-2017-priya-nair-and-sanjay-kumar-singh-get-an-aadhaar-card-if-you-dont-have-one"&gt;Get an Aadhaar card if you don't have one&lt;/a&gt; (Priya Nair and Sanjay Kumar Singh; Business Standard; March 27, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things"&gt;The Aadhaar of all things&lt;/a&gt; (Shriya Mohan; Hindu Businessline; March 31, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;br /&gt;CIS members wrote the following articles&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-march-19-2017-digital-native-lie-me-a-river"&gt;Digital native: Lie Me a River&lt;/a&gt; (Nishant Shah; Indian Express; March 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-hindu-businessline-march-31-2017-sunil-abraham-its-the-technology-stupid"&gt;It’s the technology, stupid&lt;/a&gt; (Sunil Abraham; Hindu Businessline; March 31, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it"&gt;How Aadhaar compromises privacy? And how to fix it?&lt;/a&gt; (Sunil Abraham; Hindu; March 31, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't    have access to read printed materials due to some form of physical,    sensory, 	cognitive or other disability. As part of our endeavour to    make available accessible content for persons with disabilities, we are    developing a text-to-speech software in 15 languages with support from    the Hans Foundation. The progress made so far in the project can be    accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Submission&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/comments-on-the-draft-rights-of-persons-with-disabilities-rules"&gt;Comments on the draft Rights of Persons with Disabilities Rules&lt;/a&gt; (Nirmita Narasimhan; March 29, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt;Our    Access to Knowledge programme currently consists of two projects. The    Pervasive Technologies project, conducted under a grant from the    International Development Research Centre (IDRC), aims to conduct    research on the complex interplay between low-cost pervasive    technologies and intellectual property, in order to encourage the    proliferation and development of such technologies as a social good. The    Wikipedia project, which is under a 	grant from the Wikimedia    Foundation, is for the growth of Indic language communities and projects    by designing community collaborations and partnerships 	that recruit    and cultivate new editors and explore innovative approaches to  building   projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Pervasive Technologies&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/intellectual-property-rights-and-mobile-apps"&gt;Intellectual Property Rights and Mobile Apps&lt;/a&gt; (Anubha Sinha; March 6, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by    organizing more than 100 outreach events and catalysed the release of    encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0)    license in four Indian languages (21 books in Telugu, 13 in Odia, 4    volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book    on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/marathi-bhasha-gaurav-din-celebrations-in-maharashtra"&gt;"Marathi Bhasha Gaurav Din" celebrations in Maharashtra&lt;/a&gt; (Manasa Rao; March 7, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/women2019s-history-month-sambad-collaborates-with-odia-wikipedia-for-a-two-day-edit-a-thon"&gt;Women’s History Month: Sambad collaborates with Odia Wikipedia for a Two Day Edit-a-thon&lt;/a&gt; (Sailesh Patnaik; March 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/wikisource-internship-project-at-new-law-college-pune"&gt;Wikisource:Internship Project at New Law College, Pune&lt;/a&gt; (Subodh Kulkarni; March 28, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/womens-day-edit-a-thon-in-pune"&gt;Women's Day Edit-a-thon&lt;/a&gt; (Co-organized by Sterlite Tech Foundation, Jnana Prabhodhini, and CIS-A2K; Pune; March 10, 2017). Subodh Kulkarni was one of the trainers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/marathi-wikipedia-edit-a-thon-on-environment-management"&gt;Marathi Wikipedia Edit-a-thon on Environment Management&lt;/a&gt; (Organized by CSIBER College and CIS-A2K; Kolhapur; March 30, 2017). Subodh Kulkarni was a trainer.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our  work in the Openness programme   focuses on open data, especially open  government data, open access,  open  education resources, open knowledge  in Indic languages, open  media, and  open technologies and standards -  hardware and software. We  approach  openness as a cross-cutting  principle for knowledge  production and  distribution, and not as a  thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/national-consultation-on-oer-for-higher-education"&gt;National Consultation on OER for Higher Education&lt;/a&gt; (Organized by Commonwealth Educational Media Centre for Asia; New Delhi; March 3, 2017). Anubha Sinha attended the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/idrc-open-development-book-authors-workshop"&gt;Open Development Book - Authors' Workshop&lt;/a&gt; (Organized by International Development Research Centre and Centre for Innovation in Learning and Teaching; University of Cape Town, South Africa; March 11 - 12, 2017). The workshop gathered the contributers to an upcoming book by IDRC on open development. Elonnai Hickok, Gus Hosein from Privacy International and Sumandro Chattapadhyay are writing a chapter for this book.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/indo-french-perspectives-on-digital-studies"&gt;Indo - French Perspectives on Digital Studies&lt;/a&gt; (Organized by Digital Studies Group; Jawaharlal Nehru University, New Delhi; March 15, 2017). Anubha Sinha was a speaker. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;b&gt; -----------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As  part of its research on privacy and   free speech, CIS is engaged with  two different projects. The first  one  (under a grant from Privacy  International and IDRC) is on  surveillance  and freedom of expression  (SAFEGUARDS). The second one  (under a grant  from MacArthur Foundation)  is on restrictions that the  Indian government  has placed on freedom of  expression online.&lt;/p&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017"&gt;Comments on Information Technology&lt;/a&gt; (Security of Prepaid Payment Instruments) Rules, 2017 (Udbhav Tiwari, Pranesh Prakash, Abhay Rana, Amber Sinha and Sunil Abraham; March 23, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/wiser-lecture-sumandro-chattapadhyay-on-deregulation-by-code"&gt;WISER Lecture : Sumandro Chattapadhyay on Deregulation by Code&lt;/a&gt; (Organized by the University of the Witwatersrand; Johannesburg; March 8, 2017). Sumandro Chattapadhyay gave a talk.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/conference-on-safety-against-online-child-sexual-abuse"&gt;Conference on Safety Against Online Child Sexual Abuse&lt;/a&gt; (Organized by CID, Telangana and the Department for Women Development and Child Welfare, Telangana; March 16 - 17, 2017). Japreet Grewal was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/state-of-digital-rights-in-india-delhi-march-24"&gt;State of Digital Rights in India&lt;/a&gt; (Organized by Centre for Communication Governance at National Law University, Delhi and the Internet Freedom Foundation, in association with Access Now; India International Centre, New Delhi; March 24, 2017). Japreet Grewal and Sumandro Chattapadhyay took part in panel discussions.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/google-hangout-on-technology-and-jobs"&gt;Hangout on Technology and Jobs&lt;/a&gt; (Organized by Google; March 24, 2017). Vanya Rakesh was a speaker. &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations"&gt;Analysis of Key Provisions of the Aadhaar Act Regulations&lt;/a&gt; (Amber Sinha and edited by Elonnai Hickok; March 31, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p&gt;►Cyber Security&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/firstfridayatcisindia-dr-madan-oberoi-digital-forensics-april-07"&gt;Digital Forensics and Cyber Investigations&lt;/a&gt; (CIS; New Delhi; April 7, 2017). IPS officer Dr. Madan M. Oberoi will give a talk. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p&gt;►Big Data&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/benefits-harms-rights-and-regulation-survey-of-literature-on-big-data"&gt;Benefits, Harms, Rights and Regulation: A Survey of Literature on Big Data&lt;/a&gt; (Amber Sinha, Vanya Rakesh, Vidushi Marda and Geethanjali Jujjavarapu; edited by Sunil Abraham, Elonnai Hickok and Leilah Elmokadem; March 23, 2017). &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-fintech-disruption-innovation-regulation-and-transformation"&gt;The Fintech Disruption - Innovation, Regulation, and Transformation&lt;/a&gt; (Organized by Carnegie India; March 28, 2017). Sumandro Chattapadhyay attended the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;►Freedom of Expression&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/essentials-of-building-internet-tools-for-inclusion"&gt;Essentials of building internet tools for inclusion &lt;/a&gt;(Valencia, Spain; March 6, 2017). A talk jointly proposed by Chinmayi SK and Rohini Lakshané was selected for the Internet Freedom Festival.&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/from-virtual-to-reliable-exploring-freedom-and-facts-in-the-world-of-www-world-wide-web"&gt;From Virtual to Reliable: Exploring Freedom and Facts in the World of WWW (World Wide Web)&lt;/a&gt; (Organized by Embassy of the Kingdom of Netherlands and Adaan Foundation; March 21, 2017). Saikat Datta and Amber Sinha were panelists.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/internet-freedom-festival-2017"&gt;Internet Freedom Festival 2017&lt;/a&gt; (Organized by IFF; Valencia, Spain; March 6 - 10, 2017). Vidushi Marda participated in the event. Vidushi also attended these sessions: &lt;a class="external-link" href="https://internetfreedomfestival.org/wiki/index.php/Data_Protection_law_and_is_different_manifestations"&gt;Data Protection Law and its Different Manifestations&lt;/a&gt;;&lt;a class="external-link" href="https://internetfreedomfestival.org/wiki/index.php/The_identity_we_can%27t_change:_a_new_wave_of_biometric_policies_around_the_world"&gt; Using the Ranking Digital Rights Corporate Accountability Index for Advocacy &amp;amp; Research; The identity we can't change: a new wave of biometric policies around the world&lt;/a&gt; and &lt;a class="external-link" href="https://internetfreedomfestival.org/wiki/index.php/Enabling_free_speech_online_by_legal_defence:_the_need_for_skilled_lawyers_to_secure_the_free_flow_of_information_online"&gt;Enabling free speech online by legal defence: the need for skilled lawyers to secure the free flow of information online&lt;/a&gt;: Vidushi channeled a discussion about Shreya Singhal v. Union of India as an important case study in understanding how legal defence has been used to secure rights online.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;&lt;b&gt;----------------------------------- 	&lt;br /&gt;&lt;/b&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; &lt;/b&gt;CIS is involved in promoting access and accessibility to   telecommunications services and resources, and has provided inputs to   ongoing policy discussions 	and consultation papers published by TRAI.   It has prepared reports on unlicensed spectrum and accessibility of   mobile phones for persons with disabilities 	and also works with the   USOF to include funding projects for persons with disabilities in its   mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-march-1-2017-shyam-ponappa-organisational-hurdles-in-telecom"&gt;Organisational Hurdles in Telecom&lt;/a&gt; (Shyam Ponappa; Business Standard; March 1, 2017 and Organizing India Blogspot; March 2, 2017)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;-----------------------------------&lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary    research initiative driven by an emerging need to understand the    reconfigurations of 	social practices and structures through the    Internet and digital media technologies, and vice versa. It aims to    produce local and contextual 	accounts of interactions, negotiations,    and resolutions between the Internet, and socio-material and    geo-political processes:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/exploring-big-data-for-development-an-electricity-sector-case-study-from-india"&gt;Exploring Big Data for Development: An Electricity Sector Case Study from India&lt;/a&gt; (Ritam Sengupta, Dr. Richard Heeks, Sumandro Chattapadhyay, and Dr. Christopher Foster; Global Development Institute, University of Manchester; March 29, 2017). &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/evaluating-safety-buttons-on-mobile-devices-preview"&gt;Evaluating Safety Buttons on Mobile Devices: Preview&lt;/a&gt; (Rohini Lakshané and Chinmayi S.K.; March 27, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation    that undertakes interdisciplinary research on internet and digital    technologies from 	policy and academic perspectives. The areas of focus    include digital accessibility for persons with disabilities,  access   to knowledge, intellectual 	property rights, openness (including  open   data, free and open source software, open standards, open access,  open   educational resources, and open video), 	internet governance,    telecommunication reform, digital privacy, and cyber-security. The    academic research at CIS seeks to understand the reconfigurations 	of    social and cultural processes and structures as mediated through the    internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="text-align: justify; "&gt;Please  help us defend consumer and   citizen rights on the Internet! Write a  cheque in favour of 'The Centre   for Internet and Society' and mail it  to us at No. 	194, 2nd 'C'  Cross,  Domlur, 2nd Stage, Bengaluru - 5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;We  invite researchers, practitioners,   artists, and theoreticians, both  organisationally and as individuals,  to  engage with us on topics  related internet 	and society, and improve  our  collective understanding  of this field. To discuss such  possibilities,  please write to Sunil  Abraham, Executive Director, at 	  sunil@cis-india.org (for policy  research), or Sumandro Chattapadhyay,   Research Director, at  sumandro@cis-india.org (for academic research),   with an 	indication of  the form and the content of the collaboration  you  might be interested  in. To discuss collaborations on Indic  language  Wikipedia projects, 	 write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;i&gt;CIS  is grateful to its primary   donor the Kusuma Trust founded by Anurag  Dikshit and Soma Pujari,   philanthropists of Indian origin for its core  funding and 	support for   most of its projects. CIS is also grateful to  its other donors,   Wikimedia Foundation, Ford Foundation, Privacy  International, UK, Hans  	 Foundation, MacArthur Foundation, and IDRC for  funding its various   projects&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/march-2017-newsletter'&gt;https://cis-india.org/about/newsletters/march-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2017-05-20T12:47:11Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-march-27-2017-priya-nair-and-sanjay-kumar-singh-get-an-aadhaar-card-if-you-dont-have-one">
    <title>Get an Aadhaar card if you don't have one</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-march-27-2017-priya-nair-and-sanjay-kumar-singh-get-an-aadhaar-card-if-you-dont-have-one</link>
    <description>
        &lt;b&gt;The Aadhaar number has been made compulsory for filing tax return. With both the government and private parties insisting on it for various activities despite the Supreme Court's assertion that is not mandatory, you need to get one at the earliest.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Priya Nair and Sanjay Kumar Singh was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/from-i-t-returns-to-phone-connections-aadhaar-gets-more-teeth-117032600717_1.html"&gt;Business Standard&lt;/a&gt; on March 27, 2017. Udbhav Tiwari was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Until now the need for an Aadhaar card arose if someone wanted to avail of the LPG subsidy, or if senior citizens wanted to enjoy a concession on train tickets. This 12-digit number, which is a proof of identity, is largely used by the government to distribute cash benefits and other subsidies under its welfare schemes. Since submitting the Aadhaar card at the time of opening a bank account, investing in a mutual fund, etc is optional (you can submit another proof of identity), many people have still not bothered to get one. That ambivalent attitude will now have to change.  &lt;br /&gt;&lt;br /&gt;This year onwards all those filing income tax returns will have to furnish their Aadhaar number. There is a field in the income tax return form for Aadhaar number. Don’t forget to fill it this year. If you do not have an Aadhaar number, you will have to submit the enrolment number of your application for Aadhaar. "In case of failure to intimate the Aadhaar number, the PAN allotted to the person shall be deemed invalid and the other provisions of the Income Tax Act shall apply, as if the person has not applied for allotment of PAN," says Amarpal Chadha, tax partner, people advisory services, EY India.&lt;br /&gt;&lt;br /&gt;Experts say that this step has been taken to deal with the problem of duplicate permanent account numbers (PAN) and to control black money. Says Kuldip Kumar, partner and leader-personal tax at PwC India: “Many people have more than one PAN, even though there is a penalty under the Income Tax Act for doing so. The government is linking PAN to Aadhaar to deal with this problem. This step will also help control black money. Whether you invest in stocks, shares, or do any other high-value transaction, over a period of time the tax department will be able to see all this information at the click of a button." Other experts also agree that this step will create an audit trail for various transactions. “Linking of Aadhaar and PAN will throw up any discrepancies in reported transactions and provide a ready database to the revenue authorities for necessary action,” says Vikas Vasal, partner, Grant Thornton India.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Interim problems&lt;/b&gt;&lt;br /&gt;This measure is expected to create a slew of problems for people. Many individuals may still not have an Aadhaar card. They should apply for one post-haste. Everyone needs to check if their Aadhaar and PAN details match. If there are discrepancies between the two, get either your Aadhaar or PAN details updated so that you do not face problems at the time of filing returns. Details on how to update the Aadhaar and PAN are available on the web sites of UID and the IT department respectively (see box).  &lt;br /&gt;&lt;br /&gt;Non-Resident Indians (NRI) and foreign nationals may also need to obtain an Aadhaar number now. Many NRIs have an income (before claiming any deduction) that exceeds the basic exemption limit of Rs 2.5 lakh, and hence file a tax return in India. Foreign nationals who have spent time in India and earned an income also need to file a tax return. Indian residents who have been sent by their companies to work abroad will also have to scramble for the card. "March is about to end and tax returns will have to be filed by the end of July. Persons who have to file a tax return but are abroad will face a challenge getting the Aadhaar card made in time since you have to be physically present in India for this purpose,’’ says Kumar. The government may possibly grant some leeway to such people.  &lt;br /&gt;&lt;br /&gt;Even though the Supreme Court has said that Aadhaar is not mandatory, there are several instances where the authorities are insisting on it. Those applying for domicile proof and those who want to get their property registered are being asked to provide this number. Some telecom providers also insist on it before giving a connection. Schools are asking for it from students. You need it to appear for competitive exams like IIT JEE. Online providers of financial products insist on Aadhaar since it makes KYC easier. With the government moving strongly towards making Aadhaar compulsory, one can't escape complying with this regulation.  &lt;br /&gt;&lt;br /&gt;&lt;b&gt;Risks of an Aadhaar-centric system&lt;/b&gt;&lt;br /&gt;There are several risks associated with Aadhaar, whose basic purpose is authentication and authorisation. The first problem arises from the fact that it is easily accessible to miscreants. Aadhaar numbers of thousands of people have been uploaded on the Internet. "Since the Aadhaar number has to be given at so many places, it can be misused to pull information about people from the centralised database. In the case of credit and debit cards, we are told not to shares these numbers publicly as the number is the first thing required for carrying out a transaction. That is not the case with Aadhaar. UID's position is that you should treat your Aadhaar number carefully. But the fact is that the Aadhaar number is not used carefully either by consumers or businesses. It is a fairly public number. With Aadhaar too much power is being vested in a number that is quite public,’’ says Udbhav Tiwari, policy officer, Centre for Internet and Society, Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, Aadhaar has a centralised database, and all centralised databases are vulnerable to hacking. Third, biometrics are not a very secure form of authentication. "Fingerprints are easy to forge. The UID says that the device (used to check the fingerprint) should not remember the biometrics but should only transfer it to UID which will verify the information. But miscreants could use a device that captures your biometrics," says Tiwari.  &lt;br /&gt;&lt;br /&gt;Other documents used for identification like PAN and passport are not easy to duplicate because of their security features. PAN, for instance, has a hologram. The power of the passport lies not in the passport number but in the document. Without the passport one cannot travel internationally. But in case of Aadhaar one can go on the Internet and print a new Aadhaar card. “If somebody has managed to capture my fingerprint and has my Aadhaar number, he can use it wherever Aadhaar is required,’’ says Tiwari.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-march-27-2017-priya-nair-and-sanjay-kumar-singh-get-an-aadhaar-card-if-you-dont-have-one'&gt;https://cis-india.org/internet-governance/news/business-standard-march-27-2017-priya-nair-and-sanjay-kumar-singh-get-an-aadhaar-card-if-you-dont-have-one&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-04T15:39:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/right-to-be-forgotten-a-tale-of-two-judgments">
    <title>Right to be Forgotten: A Tale of Two Judgements</title>
    <link>https://cis-india.org/internet-governance/blog/right-to-be-forgotten-a-tale-of-two-judgments</link>
    <description>
        &lt;b&gt;In the last few months, there have been contrasting judgments from two Indian high courts, Karnataka and Gujarat, on matters relating to the right to be forgotten. The two high courts heard pleas on issues to do the right of individuals to have either personal information redacted from the text of judgments available online or removal of such judgment from publically available sources.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While one High Court (Karnataka) ordered the removal of personal details from the judgment,&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; the other (Gujarat) dismissed the plea&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt;. In this post, we try to understand the global jurisprudence on the right to be forgotten, and how the contrasting judgments in India may be located within it.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Background&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘right to be forgotten’ has gained prominence since a matter was referred to the Court of Justice of European Union (CJEU) in 2014 by a Spanish court.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/a&gt; In this case, Mario Costeja González had disputed the Google search of his name continuing to show results leading to an auction notice of his reposed home. The fact that Google continued to make available in its search results, an event in his past, which had long been resolved, was claimed by González as a breach of his privacy. He filed a complaint with the Spanish Data Protection Agency (AEPD in its Spanish acronym), to have the online newspaper reports about him as well as related search results appearing on Google deleted or altered. While AEPD did not agree to his demand to have newspaper reports altered, it ordered Google Spain and Google, Inc. to remove the links in question from their search results. The case was brought in appeal before the Spanish High Court, which referred the matter to CJEU. In a judgement having far reaching implications, CJEU held that where the information is ‘inaccurate, inadequate, irrelevant or excessive,’ individuals have the right to ask search engines to remove links with personal information about them. The court also ruled that even if the physical servers of the search engine provider are located outside the jurisdiction of the relevant Member State of EU, these rules would apply if they have branch office or subsidiary in the Member State.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘right to be forgotten’ is a misnomer, and essentially when we speak of it in the context of the proposed laws in EU, we refer to the rights of individuals to seek erasure of certain data that concerns them. The basis of what has now evolved into this right is contained in the 1995 EU Data Protection Directive, with Article 12 of the Directive allowing a person to seek deletion of personal data once it is no longer required.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critical to our understanding of the rationale for how the ‘right to be forgotten’ is being framed in the EU, is an appreciation of how European laws perceive privacy of individuals. Unlike the United States (US), where privacy may be seen as a corollary of personal liberty protecting against unreasonable state intrusions, European laws view privacy as an aspect of personal dignity, and are more concerned with protection from third parties, particularly the media. The most important way in which this manifests itself is in where the burden to protect privacy rights lie. In Europe, privacy policy often dictates intervention from the state, whereas in the US, in many cases it is up to the individuals to protect their privacy.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the advent of the Internet, both the nature and quantity of information existing about individuals has changed dramatically. This personal information is no longer limited to newspaper reports and official or government records either. Our use of social media, micro-discussions on Twitter, photographs and videos uploaded by us or others tagging us, every page or event we like, favourite or share—all contribute to our digital footprint. Add to this the information created not by us but about us by both public and private bodies storing data about individuals in databases, our digital shadows begin to far exceed the data we create ourselves. It is abundantly clear that we exist in a world of Big Data, which relies on algorithms tracking repeated behaviour by our digital selves. It is in this context that a mechanism which enables the purging of some of this digital shadow makes sense.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, it is not only the nature and quantity of information that has changed, but also the means through which this information can be accessed. In the pre-internet era, access to records was often made difficult by procedural hurdles. Permissions or valid justifications were required to access certain kinds of data. Even for the information available in the public domain, often the process of gaining access were far too cumbersome. Now digital information not only continues to exist indefinitely, but can also be easily accessed readily through search engines. It is in this context that in a 2007 paper, Viktor Mayer-Schöenberger pioneered the idea of memory and forgetting for the digital age.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/a&gt; He proposed that all forms of personal data should have an additional meta data of expiration date to switch the default from information existing endlessly to having a temporal limit after which it is deleted. While this may be a radical suggestion, we have since seen proposals to allow individuals some control over information about them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2016, the EU released the final version of the General Data Protection Regulation. The regulation provides for a right to erasure under Article 17, which would enable a data-subject to seek deletion of data.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/a&gt; Notably, except in the heading of the provision, Article 17 makes no reference to the word ‘forgetting.’ Rather the right made available in this regulation is in the form of making possible ‘erasure’ and ‘abstention from further dissemination.’ This is significant because what the proposed regulations provide for is not an overarching framework to enable or allow ‘forgetting’ but a limited right which may be used to delete certain data or search results. Providing a true right to be forgotten would pose issues of interpretation as to what ‘forgetting’ might mean in different contexts and the extent of measures that data controllers would have to employ to ensure it. The proposed regulation attempts to provide a specific remedy which can be exercised in the defined circumstances without having to engage with the question of ‘forgetting’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The primary arguments made against the ‘right to be forgotten’ have come from its conflict with the right to freedom of speech. Jonathan Zittrain has argued against the rationale that the right to be forgotten merely alters results on search engines without deleting the actual source, thus, not curtailing the freedom of expression.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/a&gt; He has compared this altering of search results to letting a book remain in the library but making the catalogue unavailable. According to Zittrain, a better approach would be to allow data subjects to provide their side of the story and more context to the information about them, rather than allowing any kind of erasure. Unlike in the US, the European approach is to balance free speech against other concerns. So while one of the exceptions in sub-clause (3) of Article 17 provides that information may not be deleted where it is necessary to exercise the right to free speech, free speech does not completely trump privacy as the value that must be protected. On the other hand, US constitutional law would tend to give more credence to the First Amendment rights and allow them to be compromised in very limited circumstances. As per the position of the US Supreme Court in &lt;i&gt;Florida Star&lt;/i&gt; v. &lt;i&gt;B.J.F.&lt;/i&gt;, lawfully obtained information may be restricted from publication only in cases involving a ‘state interest of the highest order’. This position would allow any potential right to be forgotten to be exercised in the most limited of circumstances and privacy and reputational harm would not satisfy the standard. For these reasons the rights to be forgotten as it exists in Article 17 may be unworkable in the US.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Issues in application&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Significant technical challenges remain in the effective and consistent application of Article 17 of the EU Directive. One key issue is concerned with how ‘personal data’ is defined and understood, and how its interpretation will impact this right in different contexts. According to Article 17 of the EU directive, the term ‘personal data’ includes any information relating to an individual. Some ambiguity remains about whether information which may not uniquely identify a person, but as a part of small group, could be considered within the scope of personal data. This becomes relevant, for instance, where one seeks the erasure of information which, without referring to an individual, points fingers towards a family. At the same time, often the piece of information sought to be erased by a person may contain personal information about more than one individual. There is no clarity over whether a consensus of all the individuals concerned should be required, and if not, on what parameters should the wishes of one individual prevail over the others. Another important question, which is as yet unanswered, is whether the same standards for removal of content should apply to most individuals and those in public life.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue of what is personal data and can therefore be erased gets further complicated in cases of derived data about individuals used in statistics and other forms of aggregated content. While, it would be difficult to argue that the right to be forgotten needs to be extended to such forms of information, not erasing such derived content poses the risk of the primary information being inferred from it. In addition, Article 17(1)(a) provides for deletion in cases where the data is no longer necessary for the purposes for which they were collected or used. The standards for circumstances which satisfy this criteria are, as yet, unclear and may only be fully understood through a consistent application of this law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, once there are reasonable grounds to seek erasure of information, it is not clear how this erasure will be enforced practically. It may not be prudent to require that all copies of the impugned data are deleted such that they may not be recovered, to the extent technologically possible. A more reasonable solution might be to permit the data to continue to remain available in encrypted forms, much like certain records are sealed and subject to the strictest confidentiality obligations. In most cases, it may be sufficient to ensure that the records of the impugned data is removed from search results and database reports without actually tampering with information as it may exist. These are some of the challenges which the practical application of this right will face, and it is necessary to take them into account in enforcing the proposed regulations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The two Indian judgments&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the first case, (before the Gujarat High Court), the petitioner entered a plea for “permanent restraint [on] free public exhibition of the judgment and order.” The judgment in question concerned proceeding against the petitioner for a number of offences, including culpable homicide amounting to murder. The petitioner was acquitted, both by the Sessions court and the High Court before which he was pleading. The petitioner’s primary contention was that despite the judgment being classified as ‘unreportable’, it was published by an online repository of judgments and was also indexed by Google search. The decision of the High Court to dismiss the petition, rest of the following factors: a) failure on the part of the petitioner to show any provisions in law which are attracted, or threat to the constitutional right to life and liberty, b) publication on a website does not amount to ‘reporting’, as reporting only refers to that by law reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the second point of reasoning made by the courts is problematic in terms of the function of precedent served by the reported judgments, and the basis for reducing the scope of ‘reporting’ to only law reports, the first point is of direct relevance to our current discussion. The lack of available legal provisions points to the absence of data protection legislation in India. Had there been a privacy legislation which addressed the issues of how personal information may be dealt with, it is possible that it may have had instructive provisions to address situation like these. In the absence of such law, the only recourse that an individual has is to seek constitutional protection under one of the fundamental rights, most notably Article 21, which over the years, has emerged as the infinite repository of unenumerated rights. However, typically rights under Article 21 are of a vertical nature, i.e., available only against the state. Their application in cases where a private party is involved remains questionable, at best.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, in the second case, the Karnataka High Court ruled in favor of the petitioner. In this case, the petitioner’s daughter instituted both criminal and civil proceedings against a person. However, later they arrived at a compromise and one of the conditions was quashing all the proceedings which had been initiated. The petitioner had raised concerns about the appearance of his daughter’s name in the cause title and was easily searchable. The court, while making vague references to “trend in the Western countries where they follow this as a matter of rule “Right to be forgotten” in sensitive cases involving women in general and highly sensitive cases involving rape or affecting the modesty and reputation of the person concerned, held in the petitioner’s favor, and order that the name be redacted from the cause title and the body of the order before releasing to any service provider.  The second judgment is all the more problematic for while it makes a reference to jurisprudence in other countries, yet it does not base it on the fundamental right to privacy, but to the idea of modesty and reputation of women, which has no clear legal basis on either Indian or comparative jurisprudence.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The above two cases demonstrate the problem of lack of a clear legal basis being employed by the judiciary in interpreting the right to be forgotten. Not only were no clear legal provisions in Indian law were taken refuge of while ruling on the existence of this right, the court also do not engage in any analysis of comparative jurisprudence such as the GDPR or the Costeja judgment. Such ad-hoc jurisprudence underlines the need for a data protection legislation, as in its absence, it is likely that divergent views are taken upon this issue, without a clear legal direction. It is likely that most matters concerning the right to erasure concern private parties as data controllers. In such cases, the existing jurisprudence on the right to privacy as interpreted under Article 21 may also be of limited value. Further, as has been pointed out above, the right to be forgotten needs to be a right qualified by conditions very clearly, and its conflict with the right to freedom of expression under Article 19. Therefore, it is imperative that a comprehensive data protection law addresses these issues.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; Sri Vasunathan vs The Registrar, available at &lt;a href="http://www.iltb.net/2017/02/karnataka-hc-on-the-right-to-be-forgotten/"&gt;http://www.iltb.net/2017/02/karnataka-hc-on-the-right-to-be-forgotten/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; Dharmraj Bhanushankar Dave v. State of Gujarat, available at &lt;a href="https://drive.google.com/file/d/0BzXilfcxe7yueXFJWG5mZ1pKaTQ/view"&gt;https://drive.google.com/file/d/0BzXilfcxe7yueXFJWG5mZ1pKaTQ/view&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/a&gt; Google Spain et al v. Mario Costeja González, available at &lt;a href="http://curia.europa.eu/juris/document/document_print.jsf?doclang=EN&amp;amp;docid=152065"&gt;http://curia.europa.eu/juris/document/document_print.jsf?doclang=EN&amp;amp;docid=152065&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.europarl.europa.eu/RegData/etudes/STUD/2015/536459/IPOL_STU(2015)536459_EN.pdf"&gt;http://www.europarl.europa.eu/RegData/etudes/STUD/2015/536459/IPOL_STU(2015)536459_EN.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/a&gt; Mayer-Schoenberger, Viktor, Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing (April 2007). KSG Working Paper No. RWP07-022. Available at SSRN: https://ssrn.com/abstract=976541 or &lt;a href="http://dx.doi.org/10.2139/ssrn.976541"&gt;http://dx.doi.org/10.2139/ssrn.976541&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/a&gt; Article 17 (1) states: &lt;i&gt;The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay where one of the following grounds applies: &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a) the personal data are no longer necessary in relation to the purposes for which they were collected or otherwise processed;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b) the data subject withdraws consent on which the processing is based according to point (a) of Article 6(1), or point (a) of Article 9(2), and where there is no other legal ground for the processing;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(c) the data subject objects to the processing pursuant to Article 21(1) and there are no overriding legitimate grounds for the processing, or the data subject objects to the processing pursuant to Article 21(2);&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(d) the personal data have been unlawfully processed;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(e) the personal data have to be erased for compliance with a legal obligation in Union or Member State law to which the controller is subject;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(f) the personal data have been collected in relation to the offer of information society services referred to in Article 8(1).&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/a&gt; Zittrain, Jonathan, “Don’t Force Google to ‘Forget’”, The New York Times, May 14, 2014. Available at &lt;a href="https://www.nytimes.com/2014/05/15/opinion/dont-force-google-to-forget.html"&gt;https://www.nytimes.com/2014/05/15/opinion/dont-force-google-to-forget.html&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/right-to-be-forgotten-a-tale-of-two-judgments'&gt;https://cis-india.org/internet-governance/blog/right-to-be-forgotten-a-tale-of-two-judgments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Right to be Forgotten</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-07T02:27:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown">
    <title>NGOs, individuals urge state CMs to curb Internet shutdown</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown</link>
    <description>
        &lt;b&gt;Amid rising instances of Internet curbs, a group of individuals and organisations have urged the chief ministers of 12 states to only restrict specific online content rather than resort to complete shutdown.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/business/india-business/ngos-individuals-urge-state-cms-to-curb-internet-shutdown/articleshow/58011598.cms"&gt;published in the Times of India&lt;/a&gt; on April 4, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;SFLC.in, a Delhi-based not-for-profit organisation, along with  various Internet-related firms have sent letters in this regard to the  chief ministers of these states impacted by Internet shutdowns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letters have been written to the chief ministers of Uttar Pradesh, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Nagaland"&gt;Nagaland&lt;/a&gt;, Manipur, Maharashtra, J&amp;amp;K, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Jharkhand"&gt;Jharkhand&lt;/a&gt;, Rajasthan, Meghalaya, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Arunachal-Pradesh"&gt;Arunachal Pradesh&lt;/a&gt;, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Bihar"&gt;Bihar&lt;/a&gt;, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Gujarat"&gt;Gujarat&lt;/a&gt; and Haryana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Internet shutdowns are imposed using state power under Section  144 by these specific states and not by the Union Government. The  central government is bound to follow the process under Section 69 IT  act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These letters to the chief ministers of all 12 states, which have  been affected by Internet shutdowns till date, are an effort by us to  address the source of the problem," SFLC.in President and Legal Director  Mishi Choudhary told .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per Internet Shutdown tracker of SFLC, there have been 28  incidents of Internet closure in Jammu &amp;amp; Kashmir, 9 cases each in  Gujarat and Haryana, 8 in Rajasthan, 3 Nagaland, 2 cases each in Uttar  Pradesh, Bihar and Manipur and 1 incident each in Maharashtra,  Jharkhand, Meghalaya and Arunachal Pradesh since 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the tracker, far India has experienced a record number of 66  such incidents since 2012, with the number increasing more than  two-fold from 14 in 2015 to 31 in 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letters sent to the chief ministers urge them to "take  requisite action that would prohibit the issuance of orders that make  Internet services entirely inaccessible for a particular area, and  rather recommend that Section 69A and the procedure established by the  rules therein be applied to limit the restriction to certain specific  online content."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The signatories of the letters include the Centre for Internet and  Society, Digital Empowerment Foundation, Internet Democracy Project, IT  for Change and Society for Knowledge Commons, individuals like &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Anivar-Aravind"&gt;Anivar Aravind&lt;/a&gt; (Executive Director, Indic Project), IIT Bombay professor &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Kannan-Moudgalya"&gt;Kannan Moudgalya&lt;/a&gt; and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We are hopeful that our efforts will make the government take in  account the enormous effects of Internet shutdowns on the  social-economic condition of our citizens and understand their plight,"  Choudhary said. PRS MKJ&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown'&gt;https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Freedom</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2017-04-07T02:43:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/buzzfeednews-pranav-dixit-april-4-2017-indias-national-id-program-may-be-turning-the-country-into-a-surveillance-state">
    <title>India’s National ID Program May Be Turning The Country Into A Surveillance State</title>
    <link>https://cis-india.org/internet-governance/news/buzzfeednews-pranav-dixit-april-4-2017-indias-national-id-program-may-be-turning-the-country-into-a-surveillance-state</link>
    <description>
        &lt;b&gt; For seven years, India’s government has been scanning the irises and fingerprints of its citizens into a massive database. The once voluntary program was intended to fix the country’s corrupt welfare schemes, but critics worry about its Orwellian overtones. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Pranav Dixit was &lt;a class="external-link" href="https://www.buzzfeed.com/pranavdixit/one-id-to-rule-them-all-controversy-plagues-indias-aadhaar?utm_term=.ksRqWv6w#.vdnR3bQx"&gt;published by BuzzFeedNews&lt;/a&gt; on April 4, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p&gt;&lt;i&gt;An abridged version of the blog post containing Sunil Abraham's quotes are reproduced below&lt;/i&gt;:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;“You can’t change your fingerprints”&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham, the&lt;/b&gt; CIS director, calls himself a “technological critic” of the Aadhaar  platform. For years, he’s been warning of the security risks associated  with a centralized repository of the demographic and biometric details  of a billion or so people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Aadhaar is a sitting duck,” Abraham  told BuzzFeed News. That’s not an unreasonable assessment considering  that India’s track record for protecting people’s private data is &lt;a href="https://www.buzzfeed.com/pranavdixit/the-medical-reports-of-43000-people-including-hiv-patients-w"&gt;far from stellar&lt;/a&gt;.  Earlier this year, for example, a security researcher discovered a  website that was leaking the Aadhaar demographic data of more than  500,000 minors. The website was subsequently shut down, but the incident  raised questions about Aadhaar’s security protocols — particularly  those around data shared with third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham’s concerns are not without global precedent. In 2012, Ecuadorian police jailed blogger Paul Moreno for breaking &lt;a href="https://www.wired.com/2012/12/security-post-lands-ecuadorian-blogger-in-jail/"&gt;into the country’s online national identity database&lt;/a&gt; and registering himself as Ecuadorian President Rafael Correa. In April 2016, &lt;a href="https://www.wired.com/2016/04/hack-brief-turkey-breach-spills-info-half-citizens/"&gt;hackers posted&lt;/a&gt; a database containing names, national IDs, addresses, and birth dates  of more than 50 million Turkish citizens, including Turkish President  Recep Tayyip Erdogan; later that month, Mexico’s entire voter database —   over 87 million national IDs, addresses, and more — &lt;a href="http://www.in.techspot.com/news/security/mexicos-voter-database-containing-the-records-of-over-80-million-citizens-leaked-online/articleshow/51979787.cms"&gt; was leaked&lt;/a&gt; onto Amazon’s cloud servers by as-yet-untraced sources; and in the  Philippines, more than 55 million voters had their private information  —   including fingerprints   — &lt;a href="http://www.wired.co.uk/article/philippines-data-breach-fingerprint-data"&gt;released on the Dark Web&lt;/a&gt;.&lt;/p&gt;
&lt;div class="buzz_superlist_item_left_small  longform_pullquote buzz-superlist-item buzz_superlist_item" id="superlist_4501688_10817551" style="text-align: justify; "&gt;
&lt;blockquote class="solid white_pullquote"&gt;
&lt;p&gt;“When  this database is hacked — and it will be — it will be because someone  breaches the computer security that protects the computers actually  using the data.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;“What is the price that we pay as a nation if our database of over a  billion people  —  complete with all 10 fingerprints and iris scans —   leaks?” Abraham asked. The consequences, he said, will be permanent.  Unlike a password, which you can reset at any time, your biometrics, if  compromised, are the ultimate privacy breach. “You can’t change your  fingerprints.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI &lt;a href="https://uidai.gov.in/images/aadhaar_question_and_answers.pdf"&gt;claims&lt;/a&gt; that the Aadhaar database is protected using the “highest available  public key cryptography encryption (PKI-2048 and AES-256)” and would  take “billions of years” to crack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Encryption like this doesn’t  typically get broken, it gets circumvented,” security researcher Troy  Hunt told BuzzFeed News. “For example, the web application that sits in  front of it is compromised and data is retrieved after decryption.” Or  alternatively, he said, the encryption key itself is compromised.  “Naturally, governments will offer all sorts of assurances on these  things, but the simple, immutable fact is that once large volumes are  centralized like this, there is a heightened risk of security incidents  and of the data consequently being lost or exposed,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cryptographer  and cybersecurity expert Bruce Schneier echoed Hunt’s assessment. “When  this database is hacked — and it will be — it will be because someone  breaches the computer security that protects the computers actually  using the data,” he said. “They will go around the encryption.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nilekani  — who did not respond to BuzzFeed News’ requests for comment — recently  dismissed concerns around the project’s privacy implications as  “hand-waving.” In an &lt;a href="http://cio.economictimes.indiatimes.com/news/corporate-news/show-me-even-one-example-of-data-theft-aadhaar-is-very-very-secure-nandan-nilekani/57982816"&gt;interview&lt;/a&gt; with the &lt;i&gt;Economic Times&lt;/i&gt;,  he repeatedly stressed how secure Aadhaar’s “advanced encryption  technology” was. “I can categorically say that it’s the most secure  system in India and among the most secure systems in the world,” he  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham is unconvinced by such assurances. He believes  Aadhaar fundamentally changes the equation between a citizen and a  state. “There’s a big difference between you identifying yourself to the  government, and the government identifying who you are,” he said.&lt;/p&gt;
&lt;p&gt;Aadhaar’s opponents say the program’s implementation has left India’s  poorest people with no choice but to use it. “If you link people’s food  subsidies, wages, bank accounts, and other crucial things to Aadhaar,  you hit them where it hurts the most,” Ramanathan argued. “You leave  them with no choice but to sign up.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Can you imagine if the  United States passed a law that said that every person who wished to get  food stamps would need their fingerprints registered in a  government-owned database?” a journalist turned Aadhaar activist who did  not wished to be named told BuzzFeed News. “Imagine what a scandal that  would be.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For Nilekani, such criticism is just overstatement and  drama. “I think this so-called anti-Aadhaar lobby is really just a  small bunch of liberal elites who are in some echo chamber,” he said  during a recent &lt;a href="https://www.facebook.com/etnow/videos/1471268036248071/"&gt;interview&lt;/a&gt; with Indian business news channel &lt;i&gt;ET Now&lt;/i&gt;.  “The reality is that a billion people are using Aadhaar. A lot of the  accusations are just delusional. Aadhaar is not a system for  surveillance. [The critics] live in a bubble and are not connected to  reality.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham laughed off Nilekani’s comments. “The Unique  Identification Authority of India will become the monopoly provider of  identification and authentication services in India,” he said. “That  sounds like a centrally planned communist state to me. I don’t know  which left liberal elites he’s talking about.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/buzzfeednews-pranav-dixit-april-4-2017-indias-national-id-program-may-be-turning-the-country-into-a-surveillance-state'&gt;https://cis-india.org/internet-governance/news/buzzfeednews-pranav-dixit-april-4-2017-indias-national-id-program-may-be-turning-the-country-into-a-surveillance-state&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-07T12:49:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data">
    <title>Privacy in the Age of Big Data</title>
    <link>https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data</link>
    <description>
        &lt;b&gt;Personal data is freely accessible, shared and even sold, and those to whom this information belongs have little control over its flow.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.asianage.com/india/all-india/100417/privacy-in-the-age-of-big-data.html"&gt;Asian Age&lt;/a&gt; on April 10, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In 2011 it was estimated that the quantity of data produced globally surpassed 1.8 zettabyte. By 2013, it had increased to 4 zettabytes. This is a result of digital services which involve constant data trails left behind by human activity. This expansion in the volume, velocity, and variety of data available, together with the development of innovative forms of statistical analytics on the data collected, is generally referred to as “Big Data”. Despite significant (though largely unrealised) promises about Big Data, which range from improved decision-making, increased efficiency and productivity to greater personalisation of services, concerns remain about the impact of such datafication of all human activity on an individual’s privacy. Privacy has evolved into a sweeping concept, including within its scope matters pertaining to control over one’s body, physical space in one’s home, protection from surveillance, and from search and seizure, protection of one’s reputation as well as one’s thoughts. This generalised and vague conception of privacy not only comes with great judicial discretion, it also thwarts a fair understanding of the subject. Robert Post called privacy a concept so complex and “entangled in competing and contradictory dimensions, so engorged with various and distinct meanings”, that he sometimes “despairs whether it can be usefully addressed at all”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This also leaves the idea of privacy vulnerable to considerable suspicion and ridicule. However, while there is a lack of clarity over the exact contours of what constitutes privacy, there is general agreement over its fundamental importance to our ability to lead whole lives. In order to understand the impact of datafied societies on privacy, it is important to first delve into the manner in which we exercise our privacy. The ideas of privacy and data management that are prevalent can be traced to the Fair Information Practice Principles (FIPP). These principles are the forerunners of most privacy regimes internationally, such as the OECD Privacy Guidelines, APEC Framework, or the nine National Privacy Principles articulated by the Justice A.P. Shah Committee Report. All of these frameworks have rights to notice, consent and correction, and how the data may be used, as their fundamental principles. It makes the data subject to the decision-making agent about where and when her/his personal data may be used, by whom, and in what way. The individual needs to be notified and his consent obtained before his personal data is used. If the scope of usage extends beyond what he has agreed to, his consent will be required for the increased scope.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In theory, this system sounds fair. Privacy is a value tied to the personal liberty and dignity of an individual. It is only appropriate that the individual should be the one holding the reins and taking the large decisions about the use of his personal data. This makes the individual empowered and allows him to weigh his own interests in exercising his consent. The allure of this paradigm is that in one elegant stroke, it seeks to ensure that consent is informed and free and also to implement an acceptable trade-off between privacy and competing concerns. This approach worked well when the number of data collectors were less and the uses of data was narrower and more defined. Today’s infinitely complex and labyrinthine data ecosystem is beyond the comprehension of most ordinary users. Despite a growing willingness to share information online, most people have no understanding of what happens to their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The quantity of data being generated is expanding at an exponential rate. From smartphones and televisions, trains and airplanes, sensor-equipped buildings and even the infrastructures of our cities, data now streams constantly from almost every sector and function of daily life, “creating countless new digital puddles, lakes, tributaries and oceans of information”. The inadequacy of the regulatory approaches and the absence of a comprehensive data protection regulation is exacerbated by the emergence of data-driven business models in the private sector and the adoption of data-driven governance approach by the government. The Aadhaar project, with over a billion registrants, is intended to act as a platform for a number of digital services, all of which produce enormous troves of data. The original press release by the Central Government reporting the approval by the Cabinet of Ministers of the Digital India programme, speaks of “cradle to grave” digital identity as one of its vision areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the very idea of the government wanting to track its citizens’ lives from cradle to grave is creepy enough in itself, let us examine for a minute what this form of datafied surveillance will entail. A host of schemes under Digital India shall collect and store information through the life cycle of an individual. The result, as we can see, is building databases on individuals, which when combined, will provide a 360 degree view into the lives of individuals. Alongside the emergence of India Stack, a set of APIs built on top of the Aadhaar, conceptualised by iSPIRT, a consortium of select IT companies from India, to be deployed and managed by several agencies, including the National Payments Corporation of India, promises to provide a platform over which different private players can build their applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sum of these interconnected parts will lead to a complete loss of anonymity, greater surveillance and impact free speech and individual choice. The move towards a cashless economy — with sharp nudges from the government — could lead to lack of financial agencies in case of technological failures as has been the case in experiments with digital payments in Africa. Lack of regulation in emerging data driven sectors such as Fintech can enable predatory practices where right to remotely deny financial services can be granted to private sector companies. An architecture such as IndiaStack enables datafication of financial transactions in a way that enables linked and structured data that allows continued use of the transaction data collected. It is important to recognise that at the stage of giving consent, there are too many unknowns for us to make informed decisions about the future uses of our personal data. Despite blanket approvals allowing any kind of use granted contractually through terms of use and privacy policies, there should be legal obligations overriding this consent for certain kinds of uses that may require renewed consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Biometrics-based identification in UK: &lt;/b&gt;In  2005, researchers from London School of Economics and Political Science  came out with a detailed report on the UK Identity Cards Bill (‘UK  Bill’) — the proposed legislation for a national identification system  based on biometrics. The project also envisaged a centralised database  (like India) that would store personal information along with the entire  transaction history of every individual. The report pointed strongly  against the centralising storage of information and suggested other  alternatives such as a system based on smartcards (where biometrics are  stored on the card itself) or offline biometric-reader terminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the report, the alternatives would also have been cheaper as neither required real-time online connectivity. In India, online authentication is a far greater challenge. According to Network Readiness Index, 2016, India ranks 91, whereas UK is placed eight. Poor Internet connectivity can raise a lot of problems in the future including paralysis of transactions. The UK identification project was subsequently discarded as a result of the privacy and cost considerations raised in this report.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aadhaar: Privacy concerns&lt;/h3&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Once the data is collected through National Information Utilities, it will be privatised and controlled by private utilities.&lt;/li&gt;
&lt;li&gt;Once an individual’s data is entered in the system, it cannot be deleted. That individual will have no control over it.&lt;/li&gt;
&lt;li&gt;Aadhaar Data (Demographic details along with photographs) are shared/transferred with the private entities including telecom companies as per the Aadhaar (Targeted delivery of Financial and other subsidies, benefits and services) Act, 2016 with the consent of Aadhaar number holder to fulfil their e-KYC requirements. The data is shared in encrypted form through secured channel.&lt;/li&gt;
&lt;li&gt;Aadhaar Enabled Payment System (AEPS) on which 119 banks are live.&lt;/li&gt;
&lt;li&gt;More than 33.87 crore transactions have taken place through AEPS, which was only 46 lakhs in May 2014.&lt;/li&gt;
&lt;li&gt;As on 30-9-2016, 78 government schemes were linked to Aadhaar.&lt;/li&gt;
&lt;li&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, provides that no core-biometric information (fingerprints, iris scan) shall be shared with anyone for any reason whatsoever (Sec 29) and that the biometric information shall not be used for any purpose other than generation of Aadhaar and authentication.&lt;/li&gt;
&lt;li&gt;Access to the data repository of UIDAI, called the Central Identities Data Repository(CIDR), is provided to third parties or private companies.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Central Monitoring System&lt;/b&gt; (CMS) is already live in  Delhi, New Delhi and Mumbai. Union minister Ravi Shankar Prasad revealed  this in one of his replies in the Lok Sabha last year. CMS has been set  up to automate the process of Lawful Interception &amp;amp; Monitoring of  telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Central Monitoring System&lt;/b&gt; (CMS) is already live in  Delhi, New Delhi and Mumbai. Union minister Ravi Shankar Prasad revealed  this in one of his replies in the Lok Sabha last year. CMS has been set  up to automate the process of Lawful Interception &amp;amp; Monitoring of  telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lawful Intercept &lt;/b&gt;and Monitoring (LIM) systems are used  by the Indian Government to intercept records of voice, SMSes, GPRS  data, details of a subscriber’s application and recharge history and  call detail record (CDR) and monitor Internet traffic, emails,  web-browsing, Skype and any other Internet activity of Indian users.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data'&gt;https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-11T14:43:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/identities-research">
    <title>Identities Research</title>
    <link>https://cis-india.org/internet-governance/news/identities-research</link>
    <description>
        &lt;b&gt;Caribou Digital organized an identity research event in Bengaluru at TERI on April 6, 2017. A total of 16 participants attended the event. Sunil Abraham and Pranesh Prakash represented CIS at the event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Identities research project explores user experiences of identity technology, brought to you by Caribou Digital, Omidyar Network and the International Institute of Information Technology, Bangalore (IIITB). The need for user-centered research in “digital identity” arose out of concerns around top-down identity systems and lack of insights on how these are being understood and used, particularly amongst lower income populations. For more information on the event and viewing the episode videos &lt;a class="external-link" href="https://www.identitiesproject.com/"&gt;click here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/identities-research'&gt;https://cis-india.org/internet-governance/news/identities-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-04-12T13:54:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must">
    <title>Opposition questions govt move to make Aadhaar must</title>
    <link>https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must</link>
    <description>
        &lt;b&gt;Congress leader Jairam Ramesh claimed that the Aadhaar system was becoming an instrument of social exclusion rather than one of identity. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was &lt;a class="external-link" href="http://www.livemint.com/Politics/nwqpFParHM0Ym8F4Dwt3yL/Rajya-Sabha-debates-Aadhaar-Opposition-points-to-flaws.html"&gt;published in Livemint&lt;/a&gt; on April 11, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Rajya Sabha on Monday witnessed a lively debate on Aadhaar, with the opposition questioning the government’s move to make the 12-digit unique identification number mandatory for a host of welfare benefits.&lt;br /&gt;&lt;br /&gt;Congress leader Jairam Ramesh claimed that the Aadhaar system was becoming an instrument of social exclusion rather than one of identity.&lt;br /&gt;&lt;br /&gt;“My major concern is implementation, how Aadhaar is being used to exclude people to avail benefits of the schemes which have been designed for them…If you need to apply to avail benefits, it’s as good as mandatory,” said Ramesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The former cabinet minister argued that over 25% of the population will stand excluded.&lt;br /&gt;&lt;br /&gt;“The Rs50,000 crore savings due to Aadhaar linkage as given by the government is highly questionable,” he said, adding that according to Comptroller and Auditor General (CAG) reports, 92% of the savings on domestic gas subsidies is not on account of Aadhaar implementation or direct benefit transfer. “Instead, it is because of the fall in international oil prices,” Ramesh argued.&lt;br /&gt;&lt;br /&gt;Trinamool Congress member Derek O’Brien said that for manual labourers, biometric identification does not always match and that can deprive them of welfare.&lt;br /&gt;&lt;br /&gt;He gave the example of Andhra Pradesh, where almost half the 85,000 ration card holders in 2014 were unable to get subsidized foodgrains due to faulty point of sale machines and biometrics not matching.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;K.T.S Tulsi, member of Parliament and senior Supreme Court advocate, said, “Not in my whole career have I come across a greater mutilation of a statutory provision than what has taken place in the case of Aadhaar.” He said Section 29 of the Aadhaar Act doesn’t permit data stored with the Unique Identification Authority of India (UIDAI) to be shared with anyone but a provision was later made for voluntary agreement to allow the sharing of data.&lt;br /&gt;&lt;br /&gt;IT and law minister Ravi Shankar Prasad said, “No religion, income, medical history, ethnicity or education is asked in Aadhaar. Even email ID and phone number is optional.”&lt;br /&gt;&lt;br /&gt;“The right of privacy of individuals must be respected. The privacy of the data cannot be breached by us except in the case of national security,” Prasad added.&lt;br /&gt;&lt;br /&gt;He claimed that the government has been blacklisting operators that share data from the Aadhaar system. It has blacklisted 34,000 operators, and has taken action against 1,000 of them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasad also said that UIDAI will be accountable to the Parliament.&lt;br /&gt;&lt;br /&gt;Expressing concern on mandating the use of Aadhaar for different services, Pranesh Prakash, Policy director of the Centre for Internet and Society, said, “As an enabler, people would want to have Aadhaar. But when it is made mandatory, it becomes more of a disenabler instead of an enabler.”&lt;br /&gt;&lt;br /&gt;“With the move towards a digital economy, setting up of a data protection authority as recommended by the Shah committee is important along with mass surveillance and greater accountability from the government,” he added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must'&gt;https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-12T14:19:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards">
    <title>An Open Digital Global South: Risks and Rewards</title>
    <link>https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards</link>
    <description>
        &lt;b&gt;Pranesh Prakash will be speaking at a conference to be organized by UC Davis Law School on May 25 and 26, 2017, in California, USA. &lt;/b&gt;
        &lt;p&gt;The event is open to the public. Please register &lt;a href="https://www.eventbrite.com/e/an-open-digital-south-risks-and-rewards-registration-33599812945"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This conference explores the promises and risks of openness in scholarship in relationship to the Global South. Scholars increasingly are under pressure to make their work “open” through sharing their research as reusable open data and open source software, and making their publications open access. Scholarly “openness”—for example, open data, open access, open source—is intended to facilitate the free flow of information, to address barriers to access, and to foster global intellectual conversations. Do attempts at promoting openness in scholarship create new forms of exclusion or hierarchy? How are Southern scholars and publishers’ experiences with open access and open data taken into account within conversations on developing standards and models for open access and open data in the Global North? What are the unanticipated risks created through the implementation of models for open data or open access?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For more info &lt;a class="external-link" href="http://icis.ucdavis.edu/?tribe_events=openness-and-the-global-south-new-access-or-new-exclusions"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards'&gt;https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2017-04-12T14:25:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
