<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 41 to 55.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/high-level-comparison-and-analysis-of-the-use-and-regulation-of-dna-based-technology-bill-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/enabling-elections"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/navigating-the-digitalisation-of-finance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/ifat-itf-locking-down-the-impact-of-covid-19"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/apc-april-23-2017-sunil-abraham-and-vidushi-marda-economic-social-and-cultural-rights-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ai-for-healthcare-understanding-data-supply-chain-and-auditability-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-in-healthcare-policy-guide"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi">
    <title>CIS Submission to TRAI Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks</title>
    <link>https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi</link>
    <description>
        &lt;b&gt;​This submission presents responses by the CIS on the ​Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks published by the TRAI on November 15, 2016. Our analysis of the solution proposed in the Note, in brief, is that there is no need of a solution for non-existing interoperability problem for authentication and payment services for accessing public Wi-Fi networks. The proposed solution in this Note only adds to over-regulation in this sector, and does not incentivise new investment in the sector, but only establishes UIDAI and NPCI as the monopoly service providers for authentication and payment services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The comments were authored by Japreet Grewal, Pranesh Prakash, Sharath Chandra, Sumandro Chattapadhyay, Sunil Abraham, and Udbhav Tiwari, with expert comments from Amelia Andersdotter.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;1. Preliminary&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents responses by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; on the &lt;em&gt;Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks&lt;/em&gt; (“the Note”) published by the Telecom Regulatory Authority of India (“TRAI”) on November 15, 2016 &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.2.&lt;/strong&gt; The CIS welcomes the effort undertaken by TRAI to map regulatory and other barriers to deployment of public Wi-Fi in India. We especially appreciate that TRAI has recognised &lt;strong&gt;[3]&lt;/strong&gt; two key barriers to provision of public Wi-Fi networks identified and highlighted in our earlier response to the &lt;em&gt;Consultation Paper on Proliferation of Broadband through Public Wi­Fi&lt;/em&gt; &lt;strong&gt;[4]&lt;/strong&gt;: 1) over regulation (including, licensing requirements, data retention, and Know Your Customer policy), and 2) paucity of spectrum &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;2. General Responses&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; Before responding to the specific questions posed by the Note, we would like to make the following observations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; There is no need of a solution for non-existing interoperability problem for authentication and payment services for accessing public Wi-Fi networks. The proposed solution in this Note only adds to over-regulation in this sector. The proposed solution does not incentivise new investment in the sector, but only establishes UIDAI and NPCI as the monopoly service providers for authentication and payment services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.3.&lt;/strong&gt; As the TRAI has consulted widely with industry and other stakeholders before it settled on the list of priority issues contained in Section C.6 of the Note, we are surprised to find that this Note aims to address only the problem of lack of “seamless interoperable payment system for Wi-Fi networks” (Section C.6.d. Of the Note), and does not discuss and propose solutions for any other key barriers identified by the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.4.&lt;/strong&gt; The Note fails to clarify the “interoperability” problem in the payment system for usage of public Wi-Fi networks that it is attempting to solve. The Note identifies that lack of “single standard” for “authentication and  payment  mechanisms” for accessing public Wi-Fi networks as a key impediment to provide scalable and interoperable public Wi-Fi networks across the country &lt;strong&gt;[6]&lt;/strong&gt;. By conceptualising the problem in this manner, TRAI has bundled together two completely different concerns - authentication and payment - into one and this is at the root of the problems emanating from the proposed solution in this Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.5.&lt;/strong&gt; Lack of standard process for authentication is created by over-regulation via Know Your Customer (“KYC”) policies, and selection of eKYC service provided by UIDAI as the only acceptable authentication mechanism for all users of public Wi-Fi networks across India, creating further economic and legal challenges for smaller would-be providers of public Wi-Fi networks as they assess their liabilities and start-up costs. Additionally, since this would amount to making UID/Aadhaar enrolment mandatory for any user of public wi-fi networks, it seems to create a contradiction with previously communicated policy from the UIDAI and the Government that no such obligation should arise. Supreme Court has also mandated over successive Orders that enrolment for UID/Aadhaar number should remain optional for the citizens and residents.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.6.&lt;/strong&gt; As was observed by the respondents to the TRAI Consultation concluded earlier this year, there is no interoperability problem that needs to be solved regarding payments for accessing public Wi-Fi networks. Payment services continue to be evolved and payment aggregator services provided by existing companies may be expected to resolve many of the outstanding issues of service proliferation in the upcoming years, at least in the absence of additional mandatory technical measures imposed by the government. Bundling of payment with authentication will only undermine the already existing independent market for payment aggregators, and further enforce mandatoriness of UID/Aadhaar number.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.7.&lt;/strong&gt; Further, the payment mechanism proposed would seem to worsen difficulties for tourists and foreigners in accessing public Wi-Fi in India, as well adds an additional layer of authentication in a system already identified (even in the Note itself) to be overburdened by regulations regarding KYC and data retention. Section C.6.b of the Note highlights the problems faced by foreigners and tourists when the authentication mechanism is premised upon use of One Time Password (OTP) that requires a functioning local mobile phone number. It contradicts itself later by proposing an authentication method that requires the user to not only download an application onto their mobile/desktop device, but also to enrol for UID/Aadhaar number and/or to use their existing UID/Aadhaar number. Instead of reducing the existing barriers to provision of and access to public Wi-Fi, which the Note is supposed to achieve, it creates significant new barriers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.8.&lt;/strong&gt; The technological architecture advanced by the Note upholds support of governance and surveillance projects that, in addition to being costly in their implementation and thereby slowing down the objective of getting India connected, are also of questionable value to the security of the Indian polity. UID, UPI, and related projects risk undermining cyber-security through their reliance on centralised architectures and interfere with healthy competitive market dynamics between commercial and non-commercial actors.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.9.&lt;/strong&gt; The Note continues to only consider and enable commercial models for the provision of public Wi-Fi networks. We have identified this as a problematic assumption in our last submission &lt;strong&gt;[7]&lt;/strong&gt;. It is most crucial that TRAI does not ignore and fail to promote and facilitate the possibility of not-for-profit models that involve grassroot communities, academia, and civil society.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.10.&lt;/strong&gt; Last but not the least, the term “Wi-Fi” refers to a particular technology for establishing wireless local area networks. Further, the term is a trademark of the Wi-Fi Alliance &lt;strong&gt;[8]&lt;/strong&gt;. It is this not a neutral term, and it must not be used as a general and universal synonym for wireless local area networks. We recommend that TRAI may consider using a technology-neutral term, say “public wireless services” or “public networking services”, to describe the sector. Following the terminology used in the Note, we have decided to continue using the term “Wi-Fi” in this response. This does not reflect our agreement about the appropriateness of this term. Important: The recommendation for technology-neutral regulation also comes with the qualification that safeguards like regulations on Listen Before Talk and Cycle Time are required to prevent technologies like LTE-U from squatting on spectrum and interfering with connections based on other standards.&lt;/p&gt;
&lt;h2&gt;3. Specific Responses&lt;/h2&gt;
&lt;h4&gt;Q1. Is the architecture suggested in the consultation note for creating unified authentication and payment infrastructure will enable nationwide standard for authentication and payment interoperability?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; No. The proposed infrastructure is likely to be costly for a large number of actors to implement and undermine some of the ongoing innovation in the Indian digital payment services industry. Rather than being helpful, it risks introducing additional requirements on an industry that TRAI has already identified as facing a number of large challenges.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; There is no need for a unified architecture that provides nationwide standard for authentication and payment interoperability. It does not offer any incentive towards provision of public Wi-Fi networks. Neither is there an interoperability problem at the physical or data link layers that has been pointed out, nor is government mandated interoperability required at the payment or ID layer since there are private entities that provide such interoperability (like, payment aggregators). Additionally, we believe it is inappropriate that the TRAI is trying to predict the most suitable business/technological model for digital payments to be used for accessing commercial Wi-Fi networks. India has a booming online payments industry, and it must be allowed to evolve in an enabling regulatory environment that allow for competition and ensures responsible practices.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.&lt;/strong&gt; The Note identifies several structural impediments to expansion of public Wi-Fi networks in India, namely paucity of backhaul connectivity infrastructure (Section C.6.a), Inadequate associated infrastructure to offer carrier  grade  Wi-Fi network (Section C.6.c), dependency of authentication mechanism on pre-existing (Indian) mobile phone connection (Section C.6.b), and limited availability of spectrum to be used for public Wi-Fi networks (Section C.6.e). All these are crucial concerns and none of them have been addressed by the architecture suggested in the Note.&lt;/p&gt;
&lt;h4&gt;Q2. Would you like to suggest any alternate model?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.4.&lt;/strong&gt; Yes. The model proposed in the Note is likely to exclude several types of potential users (say, foreigners and tourists), and impose a single authentication and payment service provider for accessing public Wi-Fi networks, which may undermine both competition and security in the market for these services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.&lt;/strong&gt; Internationally, there are cities and regions (say, the city of Barcelona and the Catalonia region in Spain) where public Wi-Fi networks have been provided in a pervasive and efficient manner by taking a light regulatory approach that enables opportunities for potential providers to set up their own infrastructures and additionally have access to backhaul. Further, reducing legal requirements on authentication should be considered in place of government mandated technical architectures for authentication and payment. In particular, allowing for anonymous access to Public Wi-Fi or wireless connectivity would reduce both the administrative and the technical burden on potential providers at the hyper-local level, especially for providers whose main activity it is not, and cannot be, to provide internet services (say, event venues, malls, and shops).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.&lt;/strong&gt; The CIS suggests the following steps towards conceptualising an “alternative model”:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;remove existing regulatory disincentives,&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;urgently explore policies to promote deployment of wired infrastructures in general, and to enable a larger range of actors, including local authorities, to invest in and deploy local infrastructures by reducing licensing requirements in particular,&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;examine spectrum requirements for provision of public Wi-Fi, and&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;provide incentives, such as allowing telecom service providers to share backhaul traffic over public Wi-Fi, and ways for telecom service providers to lower their costs if they also make Internet access available for free.&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Q3. Can Public Wi-Fi access providers resell capacity and bandwidth to retail users? Is “light touch regulation” using methods such as “registration” instead of “licensing” preferred for them?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.7.&lt;/strong&gt; CIS holds that capacity and bandwidth are neither comparable to tangible goods nor to digital currency. They are a utility, and the provider of the utility has to accept that their customers use the utility in the way they see fit, even if that use entails sharing said capacity and bandwidth with downstream private persons or customers. Wi-Fi capabilities are currently a built-in standardised feature of all consumer routers. Any individual, community, or store with access to an internet connection and a consumer router could become a public Wi-Fi access provider at no additional cost to themselves, furthering the goals of the Indian government in its Digital India strategy to ensure public and universal access to the internet.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.&lt;/strong&gt; In order to exploit the opportunities awarded by a large amount of entities in the Indian society potentially becoming Public Wi-Fi providers, TRAI should require neither registration nor licensing of these actors. Imposing administrative burdens on potential public Wi-Fi access providers creates legal uncertainty and will cause a lot of actors, who may otherwise contribute to the goals of Digital India, not to do so. This is particularly true for community organisers and citizens, who may not have access to legal assistance and therefore may avoid contributing to the goals of the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.&lt;/strong&gt; Light touch regulation when it comes to both granting license to  public Wi-Fi access providers as well as authentication of retail users, however, are needed not only as an exceptional practice for such instances but as a general practice in case of entities offering public Wi-Fi services, either commercially or otherwise. Further, additional laxity in administrative responsibilities is needed to incentivise provision of free, that is non-commercial, public Wi-Fi networks.&lt;/p&gt;
&lt;h4&gt;Q4. What should be the regulatory guidelines on “unbundling” Wi-Fi at access and backhaul level?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.10.&lt;/strong&gt; The Note refers to unbundling of activities related to provision of Wi-Fi but it does not define the term. It is neither explained which specific activities at access and backhaul levels must be considered for unbundling.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.11.&lt;/strong&gt; While unbundling should clearly be allowed and any regulatory hurdles to unbundling should be removed, any such decision must be taken with a focus on urgently addressing the stagnated growth in landline and backhaul, as identified in Section C.6.a of the Note. Relying only on spectrum intensive infrastructures, such as mobile base stations, for providing connectivity, creates a heavy regulatory burden for the TRAI, while simultaneously not ensuring optimal connectivity for business and private users. The CIS is concerned that the focus of the Note on standardising a government-mediated authentication and payment mechanism detracts attention from this urgent obstacle to the fulfillment of the Digital India plans of accelerated provision of broadband highways, universal access, and public, especially free, access to internet services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; From the example of European telecommunications legislations, implementation of policy measures to ensure that vertical integration between infrastructure (say, cables, switches, and hubs) providers and service (say, providing a subscriber with a household modem or a SIM card) providers in the telecommunications sector does not become a barrier to new market entrants has yielded much success in countries that have pursued it, like Sweden and Great Britain.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.&lt;/strong&gt; Further,  there should be no default assumption of bundling by the TRAI. In particular, the TRAI should consider reviewing all regulations that may cause bundling to occur when this is not necessary, and put in place in a monitoring mechanism for ensuring that bundled practises (especially in electronic networks, base station infrastructures, backhaul and similar) do not cause competitive problems or raise market entry barriers &lt;strong&gt;[9]&lt;/strong&gt;. In most EU countries, especially where the corporate structure of incumbent(s) is not highly vertically integrated, interconnection requirements for electronic network providers of wired networks in the backhaul or backbone (effectively price regulated interconnection), and a conscious effort to ensure that new market players can enter the field, have ensured a competitive telecommunications environment. TRAI may consider reviewing the European regulation on local loop unbundling (1999) and discussions on functional separation (especially by the British regulatory authority Ofcom), within an Indian context.&lt;/p&gt;
&lt;h4&gt;Q5. Whether reselling of bandwidth should be allowed to venue owners such as shop keepers through Wi-Fi at premise? In such a scenario please suggest the mechanism for security compliance.&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.14.&lt;/strong&gt; Yes. Venue owners should be allowed to provide public Wi-Fi service both on a commercial and non-commercial basis.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.15.&lt;/strong&gt; It is not clear from the Note and the question what type of security concerns the TRAI is seeking to address. In terms of payment security, the payment industry already has a large range of verification and testing mechanisms. The CIS objects to the mandatory introduction of the proposed payment system so as to ensure greater security for Wi-Fi access providers and the users.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.16.&lt;/strong&gt; As far as hardware-related security issues are concerned, it is again unclear why consumer equipment compliant with existing Wi-Fi standards would not be sufficiently secure in the Indian context. Wi-Fi has proven to be a sturdy technical standard, its adoption is high in multiple jurisdictions around the world, and it also enjoys great technical stability. Similar security assessments could easily be made for alternative wireless technologies, such as WiMaX.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.17.&lt;/strong&gt; The CIS foresees problems is in the allocation of risk and liability by law. The already existing legal obligation to verify the identity of each user, for instance, is likely to introduce a large administrative burden on potential Public Wi-Fi providers, which may lead to such potential providers abstaining from entering the market. Should the identification requirement be removed, however, other concerns pertaining to legal obligations may arise. These include liability for user activities on the web or on the internet (cf. copyright infringement, libel, hate speech). We propose a “safe harbour” mechanism in these cases, limiting the liability of the potential public Wi-Fi provider.&lt;/p&gt;
&lt;h4&gt;Q6. What should be the guidelines regarding sharing of costs and revenue across all entities in the public Wi-Fi value chain? Is regulatory intervention required or it should be left to forbearance and individual contracting?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.18.&lt;/strong&gt; The market segments identified by the TRAI in Section F.18 of the Note should normally all be competitive markets themselves, and so do not require regulatory assistance in sharing of costs and revenues. The more elaborate the requirements imposed on each actor of each market segment identified by the TRAI in Section F.18, the more costly the roll-out of public Wi-Fi is going to be for the market actors. Such a cost is not avoided by price regulation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.19.&lt;/strong&gt; The TRAI may instead consider introducing public funding for backhaul roll-out in remote areas, where the market is unlikely to engage in such roll-out on its own. Presently, some Indian states (such as Karnataka) are committing to public funding for wireless access in remote areas. The Union Government can assist such endeavours.&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://trai.gov.in/Content/ConDis/20801_0.aspx"&gt;http://trai.gov.in/Content/ConDis/20801_0.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See Section C.6 of the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://trai.gov.in/Content/ConDis/20782_0.aspx"&gt;http://trai.gov.in/Content/ConDis/20782_0.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"&gt;http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See Section E.11. of the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"&gt;http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="https://www.wi-fi.org/"&gt;https://www.wi-fi.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: Monitoring bundled products in the telecommunications sector is also recommended by the OECD: &lt;a href="http://oecdinsights.org/2015/06/22/triple-and-quadruple-play-bundles-of-communication-services-towards-all-in-one-packages/"&gt;http://oecdinsights.org/2015/06/22/triple-and-quadruple-play-bundles-of-communication-services-towards-all-in-one-packages/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi'&gt;https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal, Pranesh Prakash, Sharath Chandra, Sumandro Chattapadhyay, Sunil Abraham, and Udbhav Tiwari, with expert comments from Amelia Andersdotter</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Public Wireless Network</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2016-12-12T13:59:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016">
    <title>Comments on  the Report of the Committee on Digital Payments (December 2016)</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016</link>
    <description>
        &lt;b&gt;The Committee on Digital Payments constituted by the Ministry of Finance and chaired by Ratan P. Watal, Principal Advisor, NITI Aayog, submitted its report on the "Medium Term Recommendations to Strengthen Digital Payments Ecosystem" on December 09, 2016. The report was made public on December 27, and comments were sought from the general public. Here are the comments submitted by the Centre for Internet and Society.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;1. Preliminary&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; in response to the report of the Committee on Digital Payments, chaired by Mr. Ratan P. Watal, Principal Advisor, NITI Aayog, and constituted by the Ministry of Finance, Government of India (“the report”) &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;2. The Centre for Internet and Society&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, and cyber-security.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; CIS is not an expert organisation in the domain of banking in general and payments in particular. Our expertise is in matters of internet and communication governance, data privacy and security, and technology regulation. We deeply appreciate and are most inspired by the Ministry of Finance’s decision to invite entities from both the sectors of finance and information technology. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved, especially the citizens and the users. CIS is thankful to the Ministry of Finance for this opportunity to provide a general response on the report.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;3. Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; CIS observes that the decision by the Government of India to withdraw the legal tender character of the old high denomination banknotes (that is, Rs. 500 Rs. 1,000 notes), declared on November 08, 2016 &lt;strong&gt;[3]&lt;/strong&gt;, have generated &lt;strong&gt;unprecedented data about the user base and transaction patterns of digital payments systems in India, when pushed to its extreme use due to the circumstances&lt;/strong&gt;. The majority of this data is available with the National Payments Corporation of India and the Reserve Bank of India. CIS requests the authorities concerned to consider &lt;strong&gt;opening up this data for analysis and discussion by public at large and experts in particular, before any specific policy and regulatory decisions are taken&lt;/strong&gt; towards advancing digital payments proliferation in India. This is a crucial opportunity for the Ministry of Finance to embrace (open) data-driven regulation and policy-making.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; While the report makes a reference to the European General Data Protection Directive, it does not make a reference to any substantive provisions in the Directive which may be relevant to digital payments. Aside from the recommendation that privacy protections around the purpose limitation principle be relaxed to ensure that payment service providers be allowed to process data to improve fraud monitoring and anti-money laundering services, the report is silent on significant privacy and data protection concerns posed by digital payments services. &lt;strong&gt;CIS strongly warns that the existing data protection and security regulations under Information Technology (Reasonable security practices and procedures and sensitive personal data or information), Rules are woefully inadequate in their scope and application to effectively deal with potential privacy concerns posed by digital payments applications and services.&lt;/strong&gt; Some key privacy issues that must be addressed either under a comprehensive data protection legislation or a sector specific financial regulation are listed below. The process of obtaining consent must be specific, informed and unambiguous and through a clear affirmative action by the data subject based upon a genuine choice provided along with an option to opt out at any stage. The data subjects should have clear and easily enforceable right to access and correct their data. Further, data subjects should have the right to restrict the usage of their data in circumstances such as inaccuracy of data, unlawful purpose and data no longer required in order to fulfill the original purpose.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.&lt;/strong&gt; The initial recommendation of the report is to “[m]ake regulation of payments independent from the function of central banking” (page 22). This involves a fundamental transformation of the payment and settlement system in India and its regulation. &lt;strong&gt;We submit that a decision regarding transformation of such scale and implications is taken after a more comprehensive policy discussion, especially involving a wider range of stakeholders&lt;/strong&gt;. The report itself notes that “[d]igital payments also have the potential of becoming a gateway to other financial services such as credit facilities for small businesses and low-income households” (page 32). Thus, a clear functional, and hence regulatory, separation between the (digital) payments industry and the lending/borrowing industry may be either effective or desirable. Global experience tells us that digital transactions data, along with other alternative data, are fast becoming the basis of provision of financial and other services, by both banking and non-banking (payments) companies. We appeal to the Ministry of Finance to adopt a comprehensive and concerted approach to regulating, enabling competition, and upholding consumers’ rights in the banking sector at large.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.&lt;/strong&gt; The report recognises “banking as an activity is separate from payments, which is more of a technology business” (page 154). Contemporary banking and payment businesses are both are primarily technology businesses where information technology particularly is deployed intimately to extract, process, and drive asset management decisions using financial transaction data. Further, with payment businesses (such as, pre-paid instruments) offering return on deposited money via other means (such as, cashbacks), and potentially competing and/or collaborating with established banks to use financial transaction data to drive lending decisions, including but not limited to micro-loans, it appears unproductive to create a separation between banking as an activity and payments as an activity merely in terms of the respective technology intensity of these sectors. &lt;strong&gt;CIS firmly recommends that regulation of these financial services and activities be undertaken in a technology-agnostic manner, and similar regulatory regimes be deployed on those entities offering similar services irrespective of their technology intensity or choice&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.&lt;/strong&gt; The report highlights two major shortcomings of the current regulatory regime for payments. Firstly “the law does not impose any obligation on the regulator to promote competition and innovation in the payments market” (page 153). It appears to us that the regulator’s role should not be to promote market expansion and innovation but to ensure and oversee competition. &lt;strong&gt;We believe that the current regulator should focus on regulating the existing market, and the work of the expansion of the digital payments market in particular and the digital financial services market in general be carried out by another government agency, as it creates conflict of interest for the regulator otherwise.&lt;/strong&gt; Secondly, the report mentions that Payment and Settlement Systems Act does not “focus the regulatory attention on the need for consumer protection in digital payments” and then it notes that a “provision was inserted to protect funds collected from customers” in 2015 (page 153). &lt;strong&gt;This indicates that the regulator already has the responsibility to ensure consumer protection in digital payments. The purview and modalities of how this function of course needs discussion and changes with the growth in digital payments&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.&lt;/strong&gt; The report identifies the high cost of cash as a key reason for the government’s policy push towards digital payments. Further, it mentions that a “sample survey conducted in 2014 across urban and rural neighbourhoods in Delhi and Meerut, shows that despite being keenly aware of the costs associated with transacting in cash, most consumers see three main benefits of cash, viz. freedom of negotiations, faster settlements, and ensuring exact payments” (page 30). It further notes that “[d]igital payments have significant dependencies upon power and telecommunications infrastructure. Therefore, the roll out of robust and user friendly digital payments solutions to unelectrified areas/areas without telecommunications network coverage, remains a challenge.” &lt;strong&gt;CIS much appreciates the discussion of the barriers to universal adoption and rollout of digital payments in the report, and appeals to the Ministry of Finance to undertake a more comprehensive study of the key investments required by the Government of India to ensure that digital payments become ubiquitously viable as well as satisfy the demands of a vast range of consumers that India has&lt;/strong&gt;. The estimates about investment required to create a robust digital payment infrastructure, cited in the report, provide a great basis for undertaking studies such as these.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.7.&lt;/strong&gt; CIS is very encouraged to see the report highlighting that “[w]ith the rising number of users of digital payment services, it is absolutely necessary to develop consumer confidence on digital payments. Therefore, it is essential to have legislative safeguards to protect such consumers in-built into the primary law.” &lt;strong&gt;We second this recommendation and would like to add further that financial transaction data is governed under a common data protection and privacy regime, without making any differences between data collected by banking and non-banking entities&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.&lt;/strong&gt; We are, however, very discouraged to see the overtly incorrect use of the word “Open Access” in this report in the context of a payment system disallowing service when the client wants to transact money with a specific entity &lt;strong&gt;[4]&lt;/strong&gt;. This is not an uncommon anti-competitive measure adopted by various platform players and services providers so as to disallow users from using competing products (such as, not allowing competing apps in the app store controlled by one software company). &lt;strong&gt;The term “Open Access” is not only the appropriate word to describe the negation of such anti-competitive behaviour, its usage in this context undermines its accepted meaning and creates confusion regarding the recommendation being proposed by the report.&lt;/strong&gt; The closest analogy to the recommendation of the report would perhaps be with the principle of “network neutrality” that stands for the network provider not discriminating between data packets being processed by them, either in terms of price or speed.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.&lt;/strong&gt; A major recommendation by the report involves creation of “a fund from savings generated from cash-less transactions … by the Central Government,” which will use “the trinity of JAM (Jan Dhan, Adhaar, Mobile) [to] link financial inclusion with social protection, contributing to improved Social and Financial Security and Inclusion of vulnerable groups/ communities” (page 160-161). &lt;strong&gt;This amounts to making Aadhaar a mandatory ID for financial inclusion of citizens, especially the marginal and vulnerable ones, and is in direct contradiction to the government’s statements regarding the optional nature of the Aadhaar ID, as well as the orders by the Supreme Court on this topic&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.10.&lt;/strong&gt; The report recommends that “Aadhaar should be made the primary identification for KYC with the option of using other IDs for people who have not yet obtained Aadhaar” (page 163) and further that “Aadhaar eKYC and eSign should be a replacement for paper based, costly, and shared central KYC registries” (page 162). &lt;strong&gt;Not only these measures would imply making Aadhaar a mandatory ID for undertaking any legal activity in the country, they assume that the UIDAI has verified and audited the personal documents submitted by Aadhaar number holders during enrollment.&lt;/strong&gt; A mandate for &lt;em&gt;replacement&lt;/em&gt; of the paper-based central KYC agencies will only remove a much needed redundancy in the the identity verification infrastructure of the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.11.&lt;/strong&gt; The report suggests that “[t]ransactions which are permitted in cash without KYC should also be permitted on prepaid wallets without KYC” (page 164-165). This seems to negate the reality that physical verification of a person remains one of the most authoritative identity verification process for a natural person, apart from DNA testing perhaps. &lt;strong&gt;Thus, establishing full equivalency of procedure between a presence-less transaction and one involving a physically present person making the payment will only amount to removal of relatively greater security precautions for the former, and will lead to possibilities of fraud&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; In continuation with the previous point, the report recommends promotion of “Aadhaar based KYC where PAN has not been obtained” and making of “quoting Aadhaar compulsory in income tax return for natural persons” (page 163). Both these measures imply a replacement of the PAN by Aadhaar in the long term, and a sharp reduction in growth of new PAN holders in the short term. &lt;strong&gt;We appeal for this recommendation to be reconsidered as integration of all functionally separate national critical information infrastructures (such as PAN and Aadhaar) into a single unified and centralised system (such as Aadhaar) engenders massive  national and personal security threats&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.&lt;/strong&gt; The report suggest the establishment of “a ranking and reward framework” to recognise and encourage for the best performing state/district/agency in the proliferation of digital payments. &lt;strong&gt;It appears to us that creation of such a framework will only lead to making of an environment of competition among these entities concerned, which apart from its benefits may also have its costs. For example, the incentivisation of quick rollout of digital payment avenues by state government and various government agencies may lead to implementation without sufficient planning, coordination with stakeholders, and precautions regarding data security and privacy&lt;/strong&gt;. The provision of central support for digital payments should be carried out in an environment of cooperation and not competition.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.14.&lt;/strong&gt; CIS welcomes the recommendation by the report to generate greater awareness about cost of cash, including by ensuring that “large merchants including government agencies should account and disclose the cost of cash collection and cash payments incurred by them periodically” (page 164). It, however, is not clear to whom such periodic disclosures should be made. &lt;strong&gt;We would like to add here that the awareness building must simultaneously focus on making public how different entities shoulder these costs. Further, for reasons of comparison and evidence-driven policy making, it is necessary that data for equivalent variables are also made open for digital payments - the total and disaggregate cost, and what proportion of these costs are shouldered by which entities&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.15.&lt;/strong&gt; The report acknowledges that “[t]oday, most merchants do not accept digital payments” and it goes on to recommend “that the Government should seize the initiative and require all government agencies and merchants where contracts are awarded by the government to provide at-least one suitable digital payment option to its consumers and vendors” (page 165). This requirement for offering digital payment option will only introduce an additional economic barrier for merchants bidding for government contracts. &lt;strong&gt;We appeal to the Ministry of Finance to reconsider this approach of raising the costs of non-digital payments to incentivise proliferation of digital payments, and instead lower the existing economic and other barriers to digital payments that keep the merchants away&lt;/strong&gt;. The adoption of digital payments must not lead to increasing costs for merchants and end-users, but must decrease the same instead.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.16.&lt;/strong&gt; As the report was submitted on December 09, 2016, and was made public only on December 27, 2016, &lt;strong&gt;it would have been much appreciated if at least a month-long window was provided to study and comment on the report, instead of fifteen days&lt;/strong&gt;. This is especially crucial as the recently implemented demonetisation and the subsequent banking and fiscal policy decisions taken by the government have rapidly transformed the state and dynamics of the payments system landscape in India in general, and digital payments in particular.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://finmin.nic.in/reports/Note-watal-report.pdf"&gt;http://finmin.nic.in/reports/Note-watal-report.pdf&lt;/a&gt; and &lt;a href="http://finmin.nic.in/reports/watal_report271216.pdf"&gt;http://finmin.nic.in/reports/watal_report271216.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://finmin.nic.in/cancellation_high_denomination_notes.pdf"&gt;http://finmin.nic.in/cancellation_high_denomination_notes.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Open Access refers to “free and unrestricted online availability” of scientific and non-scientific literature. See: &lt;a href="http://www.budapestopenaccessinitiative.org/read"&gt;http://www.budapestopenaccessinitiative.org/read&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sumandro Chattapadhyay and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Data Revolution</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2017-01-12T12:32:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process">
    <title>Flaws in the UIDAI Process </title>
    <link>https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process</link>
    <description>
        &lt;b&gt;The accuracy of biometric identification depends on the chance of a false positive: the probability that the identifiers of two persons will match. Individuals whose identifiers match might be termed duplicands. When very many people are to be identified success can be measured by the (low) proportion of duplicands. The Government of India is engaged upon biometrically identifying the entire population of India. An experiment performed at an early stage of the programme has allowed us to estimate the chance of a false positive: and from that to estimate the proportion of duplicands. For the current population of 1.2 billion the expected proportion of duplicands is 1/121, a ratio which is far too high. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html"&gt;Economic &amp;amp; Political Weekly&lt;/a&gt;, Journal » Vol. 51, Issue No. 9, 27 Feb, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A legal challenge is being mounted in the Supreme Court, currently, to the programme of biometric identification that the Unique Identification Authority of India (UIDAI) is engaged upon: an identification preliminary and a requisite to providing citizens with “Aadhaar numbers” that can serve them as “unique identiﬁers” in their transactions with the state. What follows will recount an assessment of their chances of success. We shall be using data that was available to the UIDAI and shall employ only elementary ways of calculation. It should be recorded immediately that an earlier technical paper by the author (Mathews 2013) has been of some use to the plaintiffs, and reference will be made to that in due course.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar numbers themselves may or may not derive, in some way, from the biometrics in question; the question is not material here. For our purposes a biometric is a numerical representation of some organic feature: like the iris or the retina, for instance, or the inside of a ﬁnger, or the hand taken whole even. We shall consider them in some more detail later. The UIDAI is using ﬁngerprints and iris images to generate a combination of biometrics for each individual. This paper bears on the accuracy of the composite biometric identiﬁer. How well those composites will distinguish between individuals can be assessed, actually, using the results of an experiment conducted by the UIDAI itself in the very early stages of its operation; and our contention is that, from those results themselves, the UIDAI should have been able to estimate &lt;i&gt;how many individuals would have their biometric identiﬁers matching those of some other person&lt;/i&gt;, under the best of circumstances even, when any good part of population has been identiﬁed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf"&gt;Read the full article here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The author thanks Nico Temme of the Centrum Wiskunde &amp;amp; Informatica in The Netherlands for the bounds he derived on the chance of a false positive. He is particularly grateful to the anonymous referee of this journal who, through two rounds of comment, has very much improved the presentation of the results. A technical supplement to this paper is placed on the EPW website along with this paper&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process'&gt;https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>hans</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-03-06T10:40:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india">
    <title>Platforms, Power, and Politics: Perspectives from Domestic and Care Work in India</title>
    <link>https://cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india</link>
    <description>
        &lt;b&gt;CIS has been undertaking a two-year project studying the entry of digital platforms in the domestic and care work in India, supported by the Association for Progressive Communications as part of the Feminist Internet Research Network. Implemented through 2019-21, the objective of the project is to use a feminist lens to critique platform modalities and orient platformisation dynamics in radically different, worker-first ways. Ambika Tandon and Aayush Rathi led the research team at CIS. The Domestic Workers’ Rights Union is a partner in the implementation of the project, as co-researchers. Geeta Menon, head of DWRU, was an advisor on the project, and the research team consisted of Parijatha G.P., Radha Keerthana, Zeenathunnisa, and Sumathi, who are office holders in the union and are responsible for organising workers and addressing their concerns.
&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;The Executive Summary for the project report is below.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The full report, ‘Platforms, power, and politics: Perspectives from domestic and care work in India’, can be found &lt;a href="https://cis-india.org/raw/platforms-power-and-politics-pdf" class="external-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The press release can be found &lt;a href="https://cis-india.org/raw/platforms-power-and-politics-press-release-pdf" class="external-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;span&gt;Introduction&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Paid domestic and care work is witnessing the entry of digital intermediaries over the past decade. More recently, there has been tremendous growth of digital platforms. This holds the potential to impact millions of workers in the sector, which is characterised by a long history of informality and exclusion from rights-according legal frameworks. Digital intermediation of domestic and care work has been a space of high-growth, but also high-attrition. In India, order books of digital platforms providing domestic and care work services were reported to have been growing by upto 60 percent month-on-month in 2016. This is expected to shift the organisation of workers and employment relations profoundly. &lt;br /&gt;&lt;br /&gt;Broadly, the discourse on digital platforms providing home-based services can be summarised as follows: proponents argue that digitisation will act as a step towards bringing formalisation to the sector, while critics argue that platforms could replicate the exploitation of workers by further disguising the employer-employee relationship. Similar debates around lack of protections and precarity have also taken place in other occupations in gig work such as transportation and food delivery. In fact, the similarity in precarity and the informal nature of this relationship across gig work and domestic work has led to domestic workers being labelled the original gig workers. Domestic work is a particularly vulnerable and unprotected sector, which makes work in the sector qualitatively different from most other sectors in the gig or sharing economy.&lt;br /&gt;&lt;br /&gt;Through a feminist approach to digital labour, our project aimed to examine the dynamics of platformisation in, and of domestic or reproductive care work. Our hypothesis was that platforms are reconfiguring labour conditions, which could empower and/or exploit workers in ways qualitatively different from non-standard work off the platform. In order to interrogate this further, we studied several aspects of the work relationship, including wages, conditions of work, social security, skill levels, and worker surveillance off platforms.&lt;/p&gt;
&lt;h3&gt;Methodology&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We borrowed from ethnographic methods and feminist principles to co-design and implement the research tools with grassroots workers and organisers. Between June to November 2019, we conducted 65 in-depth semi-structured interviews primarily in New Delhi and Bengaluru. A majority of these were with domestic workers who were seeking or had found work through platforms. We also did interviews with workers who had found work through traditional placement agencies to compare our findings, and with representatives from platforms, government labour departments, and workers collectives. Of the workers we interviewed, a majority were women, but men were included as well. Interviews in New Delhi were undertaken by CIS, while interviews with workers in Bengaluru were undertaken by grassroots activists in Bengaluru, affiliated with the Domestic Workers Rights Union (DWRU).&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In implementing the data collection approach, we employed feminist methodological principles of intersectionality, self-reflexivity, and participation. The methodology draws on standpoint theory, which encourages knowledge production that centres the lived experiences of marginalised groups. We were acutely aware of our own positionality as high income, Savarna researchers studying a sector dominated by Dalit, Bahujan and Adivasi women from low income groups. This power differential was softened partially by involving DWRU through the course of the project. Workers across both field sites were also interviewed in spaces familiar to them, most often their homes, in languages that they were comfortable with including Hindi, Kannada, and Tamil.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Feminist principles also instrumental during the data analysis, with focus on intersectionality and self-reflexivity. We highlighted the ways in which inequalities of gender, income, migration status, caste, and religion are replicated and amplified in the platform economy. In particular, we discussed the impact of the digital gender gap in access and skills on workers’ ability to find economic opportunities.&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;Findings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Our typology of platforms mediating domestic work finds three types of platforms – (i) marketplace, or platforms that list workers’ data on their profile, provide certain filters for automated selection of a pool of workers, and charge a fee from customers for access to workers’ contact details, (ii) digital placement agency, or platforms that provide an end-to-end placement service to customers, identify appropriate workers on the basis of selection criteria, and negotiate conditions of work on behalf of workers, and (iii) on-demand platforms, or companies that provide services or ‘gigs’ such as cleaning on an hourly basis, performed by a roster of workers who are characterised as ‘independent contractors’.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;When it comes to the role played by platforms in determining employment relations, there is a wide variation within and across platform categories. There are both weak and strong models of intervention. On one end of the spectrum are marketplaces, with minimal intervention in the recruitment process, and on the other on-demand platforms, that exact control over each aspect of work. Digital platforms reconfigure the conception of intermediaries in the domestic work sector, functioning as next-generation placement agencies. All three platform types contain aspects that provide workers agency, as well as those that reinforce their positions of low-power. Platform design impacts the role platforms play in setting conditions of work, but does not determine it entirely.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;(Re)shaping the terms of work&lt;/strong&gt;&lt;br /&gt;Across the three types of platforms, wages are slightly higher than or matching those of workers off platforms. Some marketplace platforms have incorporated features to nudge customers towards setting higher wages, such as enforcing minimum wage standards, or informing customers of expected wages in their locality. Conversely, on-demand platforms charge a high rate of commission from workers, despite refusing to recognise them as employees. This indicates that this is a misclassification of an employment relationship, given that workers are unable to set their own conditions or wages for work. Despite the high rates of commission and appropriation of labour by platforms, on-demand workers earn higher wages than workers on other platforms. The relatively high wage is a result of marketing on-demand cleaning as professionalised and more skilled than day-to-day cleaning. Tasks in the sector continue to be distributed along the lines of gender and caste, as has historically been the case. Dalit, Bahujan and Adivasi women are more likely to take up work such as cleaning and washing dishes, while men and women across castes are equally distributed in cooking work. Women dominate tasks such as elderly and childcare, as in the traditional economy. Workers in professionalised tasks such as deep cleaning that requires technical equipment and chemicals are almost entirely men.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Digital divides and workers’ agency&lt;/strong&gt;&lt;br /&gt;We find that workers are primarily onboarded onto platforms by learning about it from other workers, through onboarding camps held by platforms, or offline advertising by platforms. Such in-person onboarding techniques allows workers with no digital access or literacy to register themselves on marketplace platforms and digital placement agencies.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;However, we find that low levels of education and digital literacy continue to impact platformed labour by creating a strong informational asymmetry between workers and platforms. For instance, we find that women workers from low income communities have very little information about how platforms work, causing deep distrust. Workers with digital devices and literacy (and therefore a relatively better understanding of the functionality of the platform), physical mobility and the resources to bear indirect costs that were outsourced to them were at a significant advantage in finding better-paying jobs. Workers who were seeking flexibility and were not necessarily dependent on the platform for their primary income were also better placed than those entirely dependent on platforms. Women workers tended to be disadvantaged on all these counts, limiting their agency and capacity to reap the benefits of the platform economy.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Across the three types of platforms, systems of placement and ratings add to the information asymmetry, as workers are not aware of the impact of ratings on their ability to find work or charge better wages. Ratings and filtering systems also hard-code the impact of workers’ social characteristics on their work. Workers are unable to exercise control over their data, further undermining their agency vis-a-vis platforms and employers. We identify a clear need for collective bargaining structures to protect workers’ rights, although platformed domestic workers remained distant from both domestic work unions and emergent unions of platform workers in other sectors.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Intersectionalities of formalisation&lt;/strong&gt;&lt;br /&gt;We find that inequalities of caste, class, and gender that have historically shaped the sector continue to be replicated or even amplified in the platform economy. What remains clear is that platforms in the domestic work sector adopt the logics of this sector, more than the converse. Platformisation is conflated with formalisation, and it is within this vector, from complete informality to piecemeal formalisation, that platforms operate. Labour benefits do not take the form of labour protections or welfare entitlements that are the central function of formalisation processes. Instead, the so-called benefits are intended to transform domestic workers to participate within the logics and vagaries of the market.&lt;/p&gt;
&lt;h3&gt;Policy Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recognise and implement labour protections for domestic workers &lt;/strong&gt;&lt;br /&gt;Domestic workers have historically occupied the most vulnerable positions in the workforce, with limited legal protections. Exposed to the regulatory grey areas that platforms operate in, this doubly exposes domestic workers to precarious conditions of work. Despite an avowed move towards formalisation of domestic work, platform-mediated labour continues to retain characteristics of informal labour, even heightening some.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;If pushed to do so, platform companies can be instrumental in resolving some of the implementation challenges that governments have faced in enforcing legislative protections sought to be made available to domestic workers. Platforms have databases of workers, which can be used to mandatorily register them for social security schemes offered by the government. This data can also be used for better policy making, in the absence of reliable statistics particularly on migrant workers in the informal economy.&lt;em&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Reduce the protective gap between employment and self-employment &lt;/strong&gt;&lt;br /&gt;The (mis)classification of “gig” work within labour law frameworks is still a matter that continues to be hotly debated within policy practitioners, legal scholarship, and civil society actors. Three positions, in particular, have been taken—treating gig workers as employees, independent contractors, or occupying a third intermediate category. More recently, there have been some legal victories guaranteeing employment protections and increasing platform companies’ accountability. However, these successes have been more visible in Global North jurisdictions.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Regardless of the resolution of these ongoing debates over employment status, labour frameworks should provide some universal protections to all categories of labour. Such protections must include universal coverage of social security, in addition to rights such as freedom of association, collective bargaining, equal remuneration and anti-discrimination. Policies geared towards achieving this objective would be significant in reducing the protective gaps between different categories of labour, and would particularly help historical and emerging occupational categories of workers such as “gig” workers and domestic workers.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recognise the specific challenge(s) and potential of platformisation of domestic work &lt;/strong&gt;&lt;br /&gt;Platforms hold the potential of acting as effective facilitators in informal labour markets. Even when they do not replace existing recruitment pathways, they provide alternate ones. Workers were more likely to register on a platform if they were entering the domestic work labour market recently (often distress and migration driven), or had not enjoyed success with informal, word-of-mouth networks. However, platforms also heighten labour market insecurities, and create new ones. These potential risks need to be specifically recognised through appropriate frameworks, such as social security, discrimination law and data protection.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Tailor policy-making to platform models &lt;/strong&gt;&lt;br /&gt;We identify three types of platforms, each of which intervene to varying degrees in the work relationship. We recommend that digital placement agencies and marketplace platforms be registered with governments and enforce basic protections for workers such as provision of minimum wage, preventing abuse (including non-payment of wages) and trafficking. On-demand companies on the other hand, must be treated as employers, and workers be accorded employment protections including social security.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In addition to rights-based policy actions, legal-regulatory mechanisms geared towards mitigating the precariousness of platform-based work are required. This can take the shape of clarifying and expanding existing legal-regulatory formulations, or preparing new ones. Such policy making should factor in the power and information asymmetry between domestic workers (and gig workers, generally) and platforms.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Further, in the absence of health or retirement benefits, risks and indirect costs of operations are shifted from employers to workers. For instance, workers provide capital in the form of tools or equipment, support the fluctuation of business and income, and can be ‘deactivated’ from an application as a result of poor ratings or periods of inactivity. Any regulation aiming to extend employee status should mandate platforms to support such indirect costs.&lt;/p&gt;
&lt;h3&gt;Related Publications&lt;/h3&gt;
&lt;p&gt;1. &lt;a class="external-link" href="https://www.genderit.org/articles/digital-mediation-of-reproductive-and-care-work"&gt;Research notes&lt;/a&gt; with reflections from union members. &lt;br /&gt;2. The &lt;a class="external-link" href="https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-from-a-multistakeholder-consultation"&gt;event report&lt;/a&gt; from a stakeholder consultation with workers, unions, companies and government representatives. &lt;br /&gt;3. A &lt;a class="external-link" href="https://www.genderit.org/articles/doing-standpoint-theory"&gt;reflection note&lt;/a&gt; on the participatory approach taken by the project. &lt;br /&gt;4. A &lt;a class="external-link" href="https://library.fes.de/pdf-files/bueros/singapur/17840.pdf"&gt;paper&lt;/a&gt; with a comparative analysis of the policy landscape on domestic work in the platform economy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india'&gt;https://cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi, and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Platform-Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>RAW Research</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Digital Domestic Work</dc:subject>
    

   <dc:date>2021-07-07T15:19:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights">
    <title>Delhi High Court Orders Blocking of Websites after Sony Complains Infringement of 2014 FIFA World Cup Telecast Rights</title>
    <link>https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights</link>
    <description>
        &lt;b&gt;Of late the Indian judiciary has been issuing John Doe orders to block websites, most recently in Multi Screen Media v. Sunit Singh and Others. The order mandated blocking of 472 websites, out of which approximately 267 websites were blocked as on July 7, 2014. This trend is an extremely dangerous one because it encourages flagrant censorship by intermediaries based on a judicial order which does not provide for specific blocking of a URL, instead provides for blocking of the entire website. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The High Court of Delhi on June 23, 2014 issued a &lt;a class="external-link" href="http://delhihighcourt.nic.in/dhcqrydisp_o.asp?pn=119642&amp;amp;yr=2014"&gt;John Doe injunction&lt;/a&gt; restraining more than 400 websites from broadcasting 2014 FIFA world cup matches. &lt;a href="http://www.khelnama.com/140624/football/news/delhi-high-court-bans-400-websites-live-streaming-fifa-wold-cup/16001"&gt;News reports&lt;/a&gt; indicate that the Single judge bench of Justice V. Kameswar Rao directed the &lt;a class="external-link" href="http://www.dot.gov.in/"&gt;Department of Telecom&lt;/a&gt; to issue appropriate directions to ISPs to block the websites that Multi Screen Media provided, as well as &lt;b&gt;“any other website identified by the plaintiff”&lt;/b&gt; in the future. &lt;b&gt;On July 4, Justice G. S. Sistani permitted &lt;a href="http://ibnlive.in.com/news/airtel-blocks-219-websites-for-infringing-on-sonys-world-cup-2014-telecast-rights/484439-11.html"&gt;reducing the list to 219 websites&lt;/a&gt;&lt;/b&gt;. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Background&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Multi Screen Media (MSM) is the official broadcaster for the ongoing 2014 FIFA World Cup tournament. FIFA (the Governing body) had exclusively licensed rights to MSM which included live, delayed, highlights, on demand, and repeat broadcast of the FIFA matches. MSM complained that the defendants indulged in hosting, streaming, providing access to, etc, thereby infringing the exclusive rights and broadcast and reproduction rights of MSM.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court in the instant order held that the defendants had &lt;b&gt;&lt;i&gt;prima facie&lt;/i&gt;&lt;/b&gt; infringed MSM’s broadcasting rights, which are guaranteed by section 37 of the &lt;a class="external-link" href="http://copyright.gov.in/Documents/CopyrightRules1957.pdf"&gt;Copyright Act, 1957&lt;/a&gt;.  In an over-zealous attempt to pre-empt infringement the court called for a blanket ban on all websites identified by MSM. Further, the court directed the concerned authorities to ensure ISPs complied with this order and block the websites mentioned by MSM presently, and other websites which may be subsequently be notified by MSM.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Where the Court went Wrong&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The court stated that MSM successfully established a &lt;b&gt;prima facie case&lt;/b&gt;, and on its basis granted a sweeping injunction to MSM ordering &lt;b&gt;blocking 471 second level domains&lt;/b&gt;. I’d like to point out numerous flaws with the order-&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Dissatisfactory "Prima facie case"&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;In my opinion the court could have scrutinised the list of websites provided by MSM more carefully. There is nothing in the order to suggest that evidence was proffered by MSM in support of the list. The order reveals that the list was prepared by &lt;/span&gt;&lt;a href="http://www.markscan.co.in/index.php" style="text-align: justify; "&gt;MarkScan&lt;/a&gt;&lt;span style="text-align: justify; "&gt;, a &lt;/span&gt;&lt;i style="text-align: justify; "&gt;“consulting boutique dedicated to (the client’s) IP requirements in the cyberspace and the Indian sub-continent.”&lt;/i&gt;&lt;span style="text-align: justify; "&gt; The list throws up names such as docs.google.com, goo.gl &amp;amp; ad.ly (provide URL shortening service &lt;/span&gt;&lt;i style="text-align: justify; "&gt;only&lt;/i&gt;&lt;span style="text-align: justify; "&gt;), torrent indexing websites, IP addresses, online file streaming websites, etc., at a cursory glance. Evidently, perfectly legitimate websites have been targeted by an ill conducted search and shoddily prepared list which may lead to blocking of legitimate content on account of no verification by the court. &lt;/span&gt;&lt;b style="text-align: justify; "&gt;471 websites out of 472 mentioned in the first list are second level domains&lt;/b&gt;&lt;span style="text-align: justify; "&gt; and &lt;/span&gt;&lt;b style="text-align: justify; "&gt;23&lt;/b&gt;&lt;span style="text-align: justify; "&gt; websites have been &lt;/span&gt;&lt;b style="text-align: justify; "&gt;listed twice&lt;/b&gt;&lt;span style="text-align: justify; "&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b style="text-align: justify; "&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;2. &lt;/span&gt;&lt;b style="text-align: justify; "&gt;Generic order which abysmally fails to identify specific infringing URLS&lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Out of the 472 websites (list provided in the order by MarkScan)-&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;471 are file streaming websites, video sharing websites, file lockers, URL shorteners, file storage websites; &lt;b&gt;only one is a specific URL&lt;/b&gt; [&lt;a href="http://www.24livestreamtv.com/brazil-2014-fifa-world-cup-football-%20%C2%A0%C2%A0live-streaming-online-t"&gt;http://www.24livestreamtv.com/brazil-2014-fifa-world-cup-football-%20%C2%A0%C2%A0live-streaming-online-t&lt;/a&gt; ].&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/copy_of_Untitled.jpg/image_preview" alt="Breakdown of the list in the July 23rd Order" class="image-inline image-inline" title="Breakdown of the list in the July 23rd Order" /&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;The order calls for blocking of complete websites. This is in complete contradiction to the 2012 Madras High Court’s order in &lt;a href="https://cis-india.org/internet-governance/blog/internet-governance/resources/john-doe-order-r.k.-productions-v.-bsnl-mtnl-and-ors.-movie-3"&gt;R K Productions v BSNL&lt;/a&gt; which held that only a particular URL where the infringing content is kept should be blocked, rather than the entire website. The Madras High Court order had also made it mandatory for the complainants to provide exact URLs where they find illegal content, such that ISPs could block only that content and not the entire site. MSM did not adhere to this and I have serious doubts if the defendants brought the distinguishing Madras High Court judgment to the attention of the bench. The entire situation is akin to MarkScan scamming MSM by providing their clients a dodgy list, and MSM scamming the court and the public at large.&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;3.&lt;b&gt; Lack of Transparency – Different blocking messages on different ISPs&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;The message displayed uniformly on blocked websites was:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This website/URL has been blocked until further notice either pursuant to court orders or on the directions issued by the Department of Telecommunications."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I observed that a few websites showed the message &lt;b&gt;“Error 404 – File or Directory not found”&lt;/b&gt; without the blocking message (above) on the network provider Reliance, and same Error 404 with the blocking message on the network provider Airtel highlighting the non-transparent manner of adherence to the order. Further, both the messages do not indicate the end period of the block.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Legality of John Doe orders in Website Blocking&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is pertinent to reiterate the ‘misuse’ of John Doe orders to block websites in India. The judiciary has erred in applying the John Doe order to protect copyrightable content on the internet. While the &lt;i&gt;R K Productions v BSNL&lt;/i&gt; case appears reasonable in terms of permitting blocking of only URL specific content, the application of John Doe order to block websites remains unfounded in law. Ananth Padmanabhan in a three part study (&lt;a href="https://cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-1"&gt;Part I&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-2"&gt;II&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-3"&gt;III&lt;/a&gt;) had earlier analysed the improper use of John Doe injunctions to block websites in India. The John Doe order was conceived by US courts to pre-emptively remedy the irreparable damages suffered by copyright holders on account of unidentified/unnamed infringers. The interim injunction allowed collection of evidence from infringers, who were identified later as certain defendants and the final relief was accordingly granted. The courts routinely advocated judicious use of the order, and ensured that the identified defendants were provided and informed of their right to apply to the court within twenty four hours for a review of the order and a right to claim damages in an appropriate case. Therefore, the John Doe order applied against &lt;i&gt;primary&lt;/i&gt; infringers &lt;i&gt;per se.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, whilst extending this remedy in India the &lt;b&gt;courts have unfortunately placed onus on the conduit i.e. the ISP to block websites&lt;/b&gt;. This is &lt;a href="https://cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-1"&gt;tantamount to providing final relief at the interim stage&lt;/a&gt;, since all content definitely gets blocked; however, this hardly helps in identifying the actual infringer on the internet. &lt;b&gt;The court is prematurely doling out blocking remedies to the complaining party, which, legally speaking should be meted out only during the final disposition of the case after careful examination of the evidence available.&lt;/b&gt; Thus, the intent of a John Doe order is miserably lost in such an application. Moreover, this lends an arbitrary amount of power in the hands of intermediaries since ISPs may or may not choose to approach the court for directions to specifically block URLs which provide access to infringing content only.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights'&gt;https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2014-07-08T07:02:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/high-level-comparison-and-analysis-of-the-use-and-regulation-of-dna-based-technology-bill-2017">
    <title>High Level Comparison and Analysis of the Use and Regulation of DNA Based Technology Bill 2017</title>
    <link>https://cis-india.org/internet-governance/blog/high-level-comparison-and-analysis-of-the-use-and-regulation-of-dna-based-technology-bill-2017</link>
    <description>
        &lt;b&gt;This blog post seeks to provide a high level comparison of the 2017 and 2015 DNA Profiling Bill - calling out positive changes, remaining issues, and missing provisions. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In July 2017 the Law Commission published a report on DNA profiling and the &lt;a href="http://lawcommissionofindia.nic.in/reports/Report271.pdf"&gt;&lt;i&gt;“Draft Use and Regulation of DNA Based Technology Bill 2017”&lt;/i&gt;&lt;/a&gt;. India has  been contemplating a draft DNA Profiling Bill since 2007. There have been two publicly available versions of the bill, &lt;a href="https://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf"&gt;2012,&lt;/a&gt; and &lt;a href="http://www.prsindia.org/uploads/media/draft/Draft%20Human%20DNA%20Profiling%20Bill%202015.pdf"&gt;2015,&lt;/a&gt; and one version in 2016. In 2013, the Department of Biotechnology formulated an &lt;a href="https://cis-india.org/internet-governance/blog/expert-committee-meetings.zip/view"&gt;Expert Committee &lt;/a&gt;to discuss different aspects and issues raised regarding the Bill towards finalizing the text. The Centre for Internet and Society was a member of the Expert Committee, and in its conclusion, issued a note of &lt;a href="https://cis-india.org/internet-governance/blog/dna-dissent"&gt;dissent to the Expert Committee for DNA Profiling&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This post provides a high level overview of the Use and Regulation of DNA Based Technology Bill 2017 and calls out positive changes from the 2015 Bill, remaining issues, and missing provisions. The post also calls out if, and where, CIS's recommendations to the Expert Committee have been incorporated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If enacted, the 2017 Bill will establish national and regional DNA data banks that will maintain five different types of indices: a crime scene  index, missing persons, offenders, suspects, and unknown deceased persons. The data banks will be led by a Director, responsible for communicating information with requesting entities, foreign states, and international organizations.  Information relating to DNA profiles, DNA samples, and records maintained in a DNA laboratory can be made available in six instances: to law enforcement and investigating agencies, in judicial proceedings, for facilitating prosecution and adjudication of criminal cases, for taking defence of an accused, for investigation of civil disputes, and other cases which might be specified by regulations. Offences related to unauthorized disclosure of information in the DNA data bank, obtaining information from DNA data banks without authorization, unlawful access to information in the DNA Data Bank, using DNA sample or result without authorization, and destroying, altering, contaminating, or tampering with biological evidence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Below are some key positive changes from the 2015 Bill, remaining issues, and missing safeguards from the 2017 Bill:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Positive Changes: &lt;/b&gt;The Bill contains a number of positive changes from the 2015 draft. Key ones include: &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Consent:&lt;/b&gt; Section 21 prohibits the taking of samples from arrested persons without consent, except in the case of a specified offence - a specified offence being any offence punishable with death or imprisonment for a term exceeding seven years. If consent is refused, a magistrate can order the taking of the sample. This can be in the case of any matter listed in the Schedule of the Act. Section 22 provides for consent from volunteers. It is important to note that despite being an improvement from the 2015 Bill, which did not address instances of collection with our without consent,  this provision is still broad as the list of offences under the Schedule is expansive and can be further expanded by the Central Government.&lt;b&gt; &lt;/b&gt;Furthermore, the Magistrate can overrule a refusal of consent of the parent or guardian of a voluneet who is a minor, which does not provide adequate protection to childrens' rights.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Deletion&lt;/b&gt;: Section 31 defines instances for deletion of suspect profiles, under trial profiles, and all other profiles. Though a step in the right direction, as the 2015 Bill only addressed retention and deletion of the offenders index, this provision does not address the automatic removal of innocents.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Purpose limitation&lt;/b&gt;: Section 33 limits the purpose of profiles in the DNA Data Bank to that of facilitating identification. This is a positive step from the 2015 Bill - which enabled use of DNA profiles for the creation and maintenance of a population statistics data bank.  Section 34 also limits the purposes for which information relating to DNA profiles, samples, and records can be made available.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Destruction of samples:&lt;/b&gt; Section 20 defines instances for destruction of DNA samples. Destruction of samples was not address in the 2015 Bill, and is an important protection as it prevents samples from being re-analyzed.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Comparison of profiles&lt;/b&gt;: Section 29 clarifies that if the individual is not an offender or a suspect, their information will not be compared with DNA profiles in the offenders’ or suspects index. This creates an important distinction between types of indices held in the data bank and the purpose for the same i.e missing persons are not treated as potential offenders. In the 2015 Bill, profiles entered in the offenders or crime scene index could be compared by the DNA Data Bank Manger against all profiles contained in the DNA Data Bank.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Re-testing&lt;/b&gt;: Section 24 allows for an accused person to request for a re-examination of fresh bodily substances if it is believed the sample has been contaminated. The closest provision to this in the 2015 was the creation a post - conviction right for DNA profiling - which is now deleted. It is important to note that fresh samples can easily be obtained from individuals, but if contamination happens at a crime scene, it is much more difficult to obtain a fresh sample.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Limiting Indices and including a crime scene index&lt;/b&gt;: The 2017 Bill limits the number of indices to five - a crime scene  index, missing persons, offenders, suspects, and unknown deceased persons.  This is an improvement from the 2015 Bill which provides for the maintenance of indices in the DNA Bank and includes a missing person’s index, an unknown deceased person’s index, a volunteers’ index, and such other DNA indices as may be specified by regulation. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Remaining Issues: &lt;/b&gt;There are some remaining issues in the 2017 Bill. Some of these include:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Delegating and Expanding through Regulation:&lt;/b&gt; The Bill delegates a number of procedures to regulation - many which should be in the text of the Bill. For example: the format for receiving and storing DNA profiles, and additional criteria for entry, retention, and deletion of DNA profiles. Furthermore, a number of provisions allow for expansion through regulation. For example, the sources from which DNA can be collected from to be expanded as specified by regulations. Further purposes for making DNA profiles available can be defined by regulation. Important procedures such as privacy and security safeguards are also left to regulation.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Broad Powers and Composition of the Board:&lt;/b&gt; The Bill designates twenty one responsibilities to the Board. As pointed out in 1, many of these should be detailed in the text of the legislation. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;While serving on the Expert Committee,&lt;a href="http://cis-india.org/internet-governance/blog/expert-committee-meetings.zip/view"&gt;CIS recommended&lt;/a&gt; that the functions of the DNA Profiling Board should be limited to licensing, developing standards and norms, safeguarding privacy and other rights, ensuring public transparency, promoting information and debate and a few other limited functions necessary for a regulatory authority. This recommendation has not been incorporated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ideally, the Board should also include privacy experts, an expert in ethics, as well as civil society. Towards this, the Board should be comprised of separate Committees to address these different functions. There should be a Committee addressing regulatory issues pertaining to the functioning of Data Banks and Laboratories and an Ethics Committee to provide independent scrutiny of ethical issues.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;As a positive note, the reduction of the size of the Board was agreed upon by &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/blog/expert-committee-meetings.zip/view"&gt;&lt;b&gt;the Expert Committee from 16 members (2012 Bill) to 11 member&lt;/b&gt;&lt;/a&gt;&lt;b&gt;s. This reccomendation has been incorporated. &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS also provided &lt;a href="http://cis-india.org/internet-governance/blog/dna-dissent"&gt;language regarding&lt;/a&gt; how the Board could consult with the public:&lt;i&gt;The Board, in carrying out its functions and activities, shall be required to consult with all persons and groups of persons whose rights and related interests may be affected or impacted by any DNA collection, storage, or profiling activity. The Board shall, while considering any matter under its purview, co-opt or include any person, group of persons, or organisation, in its meetings and activities if it is satisfied that that person, group of persons, or organisation, has a substantial interest in the matter and that it is necessary in the public interest to allow such participation. The Board shall, while consulting or co-opting persons, ensure that meetings, workshops, and events are conducted at different places in India to ensure equal regional participation and activities.&lt;/i&gt; This language has not been fully incorporated&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Lack of Authorization Procedure:&lt;/b&gt; Though the Bill defines instances of when DNA information can be made available, it fails to establish or refer to an authorization process for making information available and the decision currently seems to rest with the DNA Bank Director.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Expansive Schedule:&lt;/b&gt; The Bill creates a schedule containing a list of matters for DNA testing which includes whole acts and a range of civil disputes and matters that are broad and do not relate to criminal cases - most notably “issues relating to immigration or emigration and issues relating to establishment of individual identity.”&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Unclear Data Stored:&lt;/b&gt; Though the Bill clarifies the circumstance that the identity of the individual will be associated with a profile, it allows for ‘information of data  based on DNA testing and records relating thereto” to be stored, yet it is unclear what information this would entail.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Lack of procedures for chain of custody:&lt;/b&gt; Presently, the Bill defines quality assurance procedures for a sample that is already at the lab. There are no provisions defining a process for the examination of a crime scene and laying down standards for the chain of custody of a sample from the crime scene to a DNA laboratory. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Missing Safeguards: &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are some safeguards that, if added, would strengthen the Bill and ensure rights to the individual:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Notification to the individual:&lt;/b&gt; There are no provisions that ensure that notification is given to an individual if his/her information is accessed or made available.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Right  to challenge&lt;/b&gt;: There are no provisions that give the individual the right to challenge the storage of their DNA.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Established profiling standard&lt;/b&gt;: Though the Law Commission report refers to the 13 CODIS standard, the Bill does not mandate the use of the 13 CODIS profiling standard.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Reporting standard&lt;/b&gt;: There are no standards for how matches or other information should be communicated from the DNA director to the authority or receiving entity including instances of partial matches.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Right to access and review:&lt;/b&gt; There are no provisions that allow an individual to review his/her information contained in the  regional or the national database.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Lack of costing:&lt;/b&gt; There is  no cost estimate in the report or a requirement for one to be carried out.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Study for the potential for false matches:&lt;/b&gt; This must consider the size of the population and large family size, i.e. relatively large numbers of closely related people and is particularly necessary given the the size over population as large as India's. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Importantly&lt;/b&gt;, in the DNA Expert Committee, CIS requested the Expert Committee that the Bill be brought in line with the nine national principles defined in the Report of Experts on Privacy led by Justice AP Shah. These include the principles of notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, openness, and accountability. These principles have not been fully incorporated.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/high-level-comparison-and-analysis-of-the-use-and-regulation-of-dna-based-technology-bill-2017'&gt;https://cis-india.org/internet-governance/blog/high-level-comparison-and-analysis-of-the-use-and-regulation-of-dna-based-technology-bill-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-08-11T02:16:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/enabling-elections">
    <title>Enabling Elections</title>
    <link>https://cis-india.org/accessibility/blog/enabling-elections</link>
    <description>
        &lt;b&gt;For making the 2014 General Elections in India participatory and accessible for voters with disabilities the Centre for Law and Policy Research and the Centre for Internet and Society have come up with a report. The report addresses the barriers that people with disabilities face during elections and recommends solutions for the same.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Executive Summary&lt;/h2&gt;
&lt;p&gt;The report examines three main areas:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The barriers that people with disabilities face at the time of elections.&lt;/li&gt;
&lt;li&gt;The legal framework around this issue.&lt;/li&gt;
&lt;li&gt;The measures which need to be taken to eliminate the barriers in the pre-voting phase, during voting phase and also post-voting phase, so as to enhance the participation of voters with disabilities.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Access to the public sphere and full political participation is a matter of right for persons with disabilities and the state is constitutionally mandated to enforce this right. The rights of voters with disabilities are examined under the constitutional provisions, the Representation of People’s Act 1951, the relevant directions of the Supreme Court and the international conventions. This report also considers international best practices while making recommendations, to the extent that they are suitable and practical in the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report looks at Electoral Participation in two dimensions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;“Pre-electoral Participation” and&lt;/li&gt;
&lt;li&gt;“Actual Electoral Participation”&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The report then goes on to make recommendations for enhancing accessibility in both these categories.&lt;/p&gt;
&lt;p&gt;On Pre-electoral Participation, the report inter alia recommends the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Opportunities for people with disabilities to participate in public consultations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Immediate outreach programs for higher voter registrations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Making election material and candidate guides available in different formats such as large print, Braille and audio formats upon request so that voters can have full knowledge of the candidate they want to vote for.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Providing information for voters about locations which have special access, wheelchair facilities, technological assistance for visually impaired, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;On Actual Electoral Participation, we inter alia recommend the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Accessible polling sites.&lt;/li&gt;
&lt;li&gt;Training election staff to be sensitive to diverse needs of voters.&lt;/li&gt;
&lt;li&gt;Enabling privacy and independent voting by persons with disabilities.&lt;/li&gt;
&lt;li&gt;Arranging for mobile polling booths.&lt;/li&gt;
&lt;li&gt;Making EVM’s compatible and accessible such as by providing for Braille, large print.&lt;/li&gt;
&lt;li&gt;Tactile buttons, 'sip and puff' and audio devices.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The report also recommends the need to monitor participation of voters with disabilities in the forthcoming elections.There is a need to collect data, surveys and studies in the pre-election, election and post-election phases.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/accessibility/blog/enabling-elections.pdf" class="internal-link"&gt;Click here&lt;/a&gt; to download and read the full report (PDF, 4.5 MB)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/enabling-elections'&gt;https://cis-india.org/accessibility/blog/enabling-elections&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2014-05-10T00:12:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india">
    <title>Crowdsourcing Incidents of Communication Privacy Violation in India</title>
    <link>https://cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india</link>
    <description>
        &lt;b&gt;In the context of several ongoing threads of debates and policy discussions, we are initiating this effort to crowdsource incidents of violation of digital/online/telephonic privacy of persons and organisations in India. The full list of submitted incidents is publicly shared, under Creative Commons Attributions-ShareAlike 4.0 International license. Please contribute and share with your friends and colleagues.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Report an incident: &lt;a href="http://goo.gl/forms/8Xcf0zcWZW"&gt;http://goo.gl/forms/8Xcf0zcWZW&lt;/a&gt;&lt;/h3&gt;
&lt;h3&gt;Collected incidents: &lt;a href="http://bit.ly/privacy-violation-india"&gt;http://bit.ly/privacy-violation-india&lt;/a&gt; (CC BY-SA 4.0)&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You are welcome to cross-post this to your website or other online forum. Please provide attribution, and link back to this page. For any clarification, write to Sumandro Chattapadhyay, Research Director, CIS, at sumandro[at]cis-india[dot]org.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india'&gt;https://cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-16T10:49:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/navigating-the-digitalisation-of-finance">
    <title>Navigating the Digitalisation of Finance:  User experiences of risks and harms </title>
    <link>https://cis-india.org/raw/navigating-the-digitalisation-of-finance</link>
    <description>
        &lt;b&gt;Our study unpacks the experiences of marginalised users navigating the digitalisation of finance. Through a survey of 3,784 users, 18 interviews and 7 focus group discussions, our study’s findings highlight user experiences of risks and harms while accessing digital financial services, unpacking experiences specifically of persons with disabilities, transgender persons, gender and sexual minorities, elderly persons, women, regional language-first users, and persons facing digital and economic vulnerabilities.
&lt;/b&gt;
        
&lt;p&gt;Read the &lt;a href="https://cis-india.org/CIS_Navigating-the-digitalisation-of-finance" class="external-link"&gt;full report here&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The last couple of decades have seen significant changes in the financial ecosystem in India, both within the fintech sector and with respect to digital financial inclusion. The rapid growth in the reach of banking services to previously unbanked citizens through the Pradhan Mantri Jan Dhan Yojana has been followed by digitalisation in financial and public services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, a commensurate increase in digital and financial literacy has not followed, and rates of access to digital devices and the internet are still growing for many user groups, like rural women and regional language speakers. From the proliferation of fraudulent schemes and cybercrime to regulatory loopholes and inadequate consumer protections, the landscape of online financial services in India presents numerous risks. Factors such as weak cybersecurity measures, data breaches, lack of awareness among users, and the absence of comprehensive regulations create a fertile ground for financial scams. Simultaneously, rapid digitalisation of financial services, especially post demonetisation and the COVID-19 pandemic, has also brought to the fore concerns around omissions and exclusion of sections of users from databases, and a steep learning curve in adapting to this new digital ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These combined factors open up users to a range of potential financial risks and harms, with differential impact on specific marginalised and vulnerable groups. With this understanding, we use the term digital financial harms to refer to adverse financial outcomes and other related detrimental consequences in the use of digital financial services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Through this study, we aim to situate these experiences in a continuum of harms within a rapidly digitalising financial ecosystem. By exploring questions of access, accessibility and language we hope to bring aspects of cybersecurity, digital and financial literacy and design justice into conversation with each other. While some research has aimed to understand technology-facilitated gender based violence, financial fraud, misinformation, and other forms of digital risks in siloes, the correlations between these risks online remain severely understudied. In this report, we focus on the experiences of groups long marginalised within the financial system, to recommend that their needs are centred in shaping digital financial services.&lt;/p&gt;
&lt;p&gt;Key questions guiding our research were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;How were digital financial risks understood and experienced by users of digital financial services across groups? What factors have amplified risks for marginalised and at-risk user groups?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;What potential vulnerabilities, risks and harms have emerged relating to digital financial services around device and internet access, accessibility, challenges with use, exclusions from digitalised social protection, and forms of social engineering and digital financial fraud?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;How accessible were digital financial service providers’ and governments’ reporting and grievance redressal systems?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;What role should fintech platforms, social media platforms, banking and financial institutions, government, and regulatory bodies play in reducing digital financial risks across the ecosystem?&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;This was a mixed methods study, consisting of a review of available literature in the field, followed by quantitative and qualitative data collection through surveys and in-depth interviews. The report highlights the experiences of persons with disabilities, gender minorities, the elderly, low income users, and regional language first users; to better understand how discrimination, exclusion or slow redressal processes may increase their risk or cause disproportionate harm when using digital financial services. It discusses users’ experiences of fraud in the context of an evolving regulatory ecosystem, as well as practical challenges users face with redressal systems.&lt;/p&gt;
&lt;p&gt;Key findings include:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Access to digital financial services, still requires improving      access and accessibility of physical and phygital banking services, and      good internet connectivity.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Even among mobile phone owners, many users still rely on shared      devices, particularly among women and persons with disabilities.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;There is a high need for support in utilising net banking services,      with 60% of surveyed netbanking users mentioning that they sought help to      conduct online banking transactions. Migrating to digital financial      services is not a purely digital journey for users who are still building      comfort with digital interfaces, or those whose languages are      deprioritised in the development of digital financial platforms.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Age, gender, and income were significant factors in the access to      the internet, and adoption of digital financial services. For instance,      women and transgender persons over 45 years were less likely to have a      Unified Payments Interface (UPI) account. Women, transgender persons, and      disabled users of UPI were also more likely to be infrequent users      compared to the rest of the sample.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Over reliance on digital platforms for the administration of direct      benefit transfer programmes results in challenges and risks of exclusions      for beneficiaries.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;While awareness of common forms of fraud is high, awareness of      security protocols, Know Your Customer (KYC) requirements and markers of      trustworthy banking and non-banking institutions is low.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Irrespective of the amount of money lost during frauds, it caused      significant financial and emotional burden, especially for low-income      persons.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;In the absence of monitoring frameworks, bad actors within the      financial system are able to exploit vulnerabilities like the dependence      of account holders on banking correspondents.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Gender and sexual minorities, and women face disproportionate      impacts of harm in the event of financial loss, including the consequences      of image-based sexual abuse, victim blaming, domestic violence and limits      on financial independence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ineffective grievance redressal for cybercrimes is a major      deterrent to reporting.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Digitalisation and the use of assistive technology have allowed      some persons with visual impairments to gain relative levels of      independence in managing their own finances and conducting transactions.      However, implementation of accessibility policies and features remains      uneven, and is marred by the continued exclusion and discrimination within      traditional banking services.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;Based on these findings, this report offers a set of recommendations addressed to stakeholders within the financial ecosystem such as banking and other financial institutions, regulatory bodies, fintech companies, cybersecurity professionals, as well as social media platforms and civil society organisations working on digital inclusion, safety and literacy. The recommendations offer nuanced perspectives on how digital financial harms can be prevented and mitigated based on our interactions with various stakeholders during the research process.&lt;/p&gt;
&lt;p&gt;Key recommendations emerging from the study are:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Create meaningful connectivity and access to digital platforms by      improving public infrastructure and addressing the challenges associated      with shared devices and mediated use.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Improve platform design to engender trust; increase accessibility      and usability through assessment and better implementation of available      technologies, regular design audits and facilitate availability in Indian      languages.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Building awareness and capacity across user and stakeholder groups      through customised and inclusive programming, working in partnership with      communities.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Centre consumer protection in regulatory interventions and      approaches to law enforcement, by implementing robust time-sensitive      reporting and redressal mechanisms, placing accountability on financial      institutions, and monitoring and curbing fraudulent activity.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Encourage transparent governance and public oversight by measuring      and evaluating digital public infrastructures to maximise their public      value.&lt;/li&gt;&lt;/ol&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;h1&gt;Contributors&lt;/h1&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research design and/or report writing:&lt;/strong&gt; Amrita Sengupta, Chiara Furtado, Garima Agrawal, Nishkala Sekhar, Puthiya Purayil Sneha, and Vipul Kharbanda&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research advice and/or review:&lt;/strong&gt; Antara Rai Chowdhury, Janaki Srinivasan, Nayantara Sarma, Palak Gadhiya, Pallavi Bedi, Sameet Panda, Semanti Chakladar, Shashidhar K J, Shweta Mohandas, and Taranga Sriraman&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research and/or data analysis support:&lt;/strong&gt; Chetna V M, Pallavi Krishnappa, and Yesha Tshering Paul&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Data analysis:&lt;/strong&gt; Chiara Furtado, Garima Agrawal, and Nishkala Sekhar&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research tool translation:&lt;/strong&gt;&amp;nbsp;  Aravind R (Kannada), Balaji J (Tamil), Bhaskar Bhuyan (Assamese), Nettime Sujata (Bangla), and Suresh Khole (Marathi)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research tool pilots:&lt;/strong&gt; Raveenaben (Megha Cooperative, SEWA), Sunaben (Megha Cooperative, SEWA), and Raja Mouli N&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Data collection (survey):&lt;/strong&gt; D-Cor Consulting&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Data collection (focus group discussions):&lt;/strong&gt; D-Cor Consulting; Jnana Prabodhini, Pune; Transgender Rights Association, Chennai; and Subodh Kulkarni&lt;/p&gt;
&lt;p&gt;This work is shared under the &lt;a href="https://creativecommons.org/licenses/by-sa/4.0/"&gt;Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0)&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/navigating-the-digitalisation-of-finance'&gt;https://cis-india.org/raw/navigating-the-digitalisation-of-finance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amrita Sengupta, Chiara Furtado, Garima Agrawal, Nishkala Sekhar, Puthiya Purayil Sneha, and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Financial Platforms</dc:subject>
    
    
        <dc:subject>Digital Financial Harms</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Digital Financial Services</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2025-04-10T05:49:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety">
    <title>IFAT and ITF - Protecting Workers in the Digital Platform Economy: Investigating Ola and Uber Drivers’ Occupational Health and Safety</title>
    <link>https://cis-india.org/raw/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety</link>
    <description>
        &lt;b&gt;Between July to November 2019, Indian Federation of App-based Transport Workers (IFAT) and International Transport Workers’ Federation (ITF), New Delhi office, conducted 2,128 surveys across 6 major cities: Bengaluru, Chennai, Delhi NCR, Hyderabad, Jaipur, and Lucknow, to determine the occupational health and safety of app-based transport workers. CIS is proud to publish the study report and the press release. Akash Sheshadri, Ambika Tandon, and Aayush Rathi of CIS supported post-production of this report.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;h4&gt;Report: &lt;a href="https://cis-india.org/raw/files/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety-report/" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Press Release: &lt;a href="https://cis-india.org/raw/files/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety-press-release" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Press Release, August 25, 2020&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;Between July to November 2019, IFAT and ITF conducted 2,128 surveys across 6 major cities: Bengaluru, Chennai, Delhi NCR, Hyderabad, Jaipur, and Lucknow, to determine the occupational health and safety of app-based transport workers.&lt;/p&gt;
&lt;p&gt;Some of the most startling findings from the survey are below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;There is a complete absence of social security and protection—a glaring 95.3% claimed to have no form of insurance, accidental, health or medical. This reflects the inability of workers to invest in their own health. This partly is a result of declining wages—after paying off their EMIs, penalties and commission to the companies and having less than Rs. 20,000 left at the end of the month.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Only 0.15% of the respondents reported to have access to accidental insurance, which is the bare minimum companies like Ola and Uber should have provided to their drivers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Uber and Ola provide no assistance with regard to harassment and violence while drivers are on the road. Ola or Uber for the most part do not intervene if there is any intimidation from traffic police or local authorities, incidents of road rage, violent attack by customers or criminal elements that endanger drivers’ lives, accidents while driving etc.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On average drivers spend close to 16-20 hours in their cars in a day. 39.8% of the respondents spent close to 20 hours in their vehicle in a day, and 72.8% of the respondents from Bengaluru, Chennai and Hyderabad drive for close to 20 hours a day. Due to long hours, 89.8% of the respondents claim they get less than 6 hours of sleep.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Health issues arising directly as a result of conditions of work is affecting the day-to-day lives of workers. Backache, constipation, liver issues, waist pain and neck pain are the top five health ailments that app-based transport workers suffer from due to their work. 60.7% respondents identified backache as a major health issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;App-based drivers/driver partners work in a very toxic and isolated work environment. Drivers can’t exit their current occupational status even if they want to because they are shackled in debts and outstanding EMIs. As a result, they race every day to complete targets so that they may earn just enough to pay these liabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The work these drivers are engaged in cannot be considered to be within the ambit of decent work and in reality, is representative of modern slavery. The algorithm of the companies they work for, pits them against their peers in order to maximize profit, while at the same time denying them social security or protection and essentially refusing to acknowledge them as employees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Drivers working in various cities and working for different app-based platforms have complained about the lack of transparency in how these app-based companies determine fares, promotional cost, surge pricing, incentives, penalties and bonuses. There is little to no information on how rides are being fixed or are being allocated. There also isn't any effective grievance redressal mechanism to resolve any of the issues faced by workers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The apathy of the state and the exploitation by app-based companies have brought the transport and delivery workers in a precipitous position across the globe. This is underlined and explained by the absence and lack of any social security or protection for the workforce, there are some other issues that the workforce is battling during the Covid-19 pandemic.&lt;/p&gt;
&lt;p&gt;Hear our voices and address our demands.&lt;/p&gt;
&lt;p&gt;- &lt;em&gt;Shaik Salauddin&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;National General Secretary, Indian Federation of App-based Transport Workers (IFAT)&lt;br /&gt; Phone: +91 96424 24799&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Indian Federation of App-based Transport Workers&lt;/strong&gt;&lt;br /&gt; Facebook: &lt;a href="https://www.facebook.com/connectifat/" target="_blank"&gt;connectifat&lt;/a&gt;&lt;br /&gt; Twitter: &lt;a href="https://twitter.com/connect_ifat" target="_blank"&gt;@connect_ifat&lt;/a&gt;&lt;br /&gt; YouTube: &lt;a href="https://www.youtube.com/channel/UCA1AxGq0Fb_A_O_Ey44eiPg" target="_blank"&gt;Indian Federation of App-based Transport Workers&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety'&gt;https://cis-india.org/raw/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Indian Federation of App-based Transport Workers (IFAT) and International Transport Workers’ Federation (ITF), New  Delhi office</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Platform-Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2021-06-29T06:53:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/ifat-itf-locking-down-the-impact-of-covid-19">
    <title>IFAT and ITF - Locking Down the Impact of Covid-19</title>
    <link>https://cis-india.org/raw/ifat-itf-locking-down-the-impact-of-covid-19</link>
    <description>
        &lt;b&gt;This report, by Indian Federation of App-based Transport Workers (IFAT) and International Transport Workers’ Federation (ITF), New Delhi office, explores the responses to the outbreak of Covid-19 by digital platform based companies, trade unions, and governments to help out workers for digital platform based companies hereafter app based workers during the lockdown. The research work in this article is a characterization of the struggles of app based workers during the global pandemic and how it has affected and changed the world of work for them. The surveys were conducted amongst the workforce working for app based companies like Ola, Uber, Swiggy, Zomato etc. This study is partially supported by CIS as part of the Feminist Internet Research Network led by the Association for Progressive Communications.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;h4&gt;Report: &lt;a href="https://cis-india.org/raw/files/ifat-itf-locking-down-the-impact-of-covid-19-report/" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Press Release: &lt;a href="https://cis-india.org/raw/files/ifat-itf-locking-down-the-impact-of-covid-19-press-release/" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Press Release, 17 September, 2020&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;Between March and June 2020, IFAT and ITF conducted 4 surveys with transport and delivery workers to assess (i) their income levels during the Covid-19 pandemic, (ii) the burden of loan repayment during these months, (iii) the relief provided to them by companies, and (iv) the access to welfare schemes offered by state and central governments.&lt;/p&gt;
&lt;p&gt;The first survey, on income levels and loans administered in March 2020, had 5964 respondents, across 55 cities, in 16 states. The second and third surveys conducted in April 2020, on financial relief from companies and governments, had 1630 respondents, across 59 cities, in 16 states. The fourth survey was conducted in June 2020 to assess income levels as the economies were slowing opening up. Some of the most startling findings from the 4 surveys are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The average monthly EMI of the respondents in March 2020 was between Rs. 10,000 - 20,000. 51% of the respondents had taken vehicle loans from 19 national public sector banks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;30.3% of the respondents worked between 40-50 hours a week, in the week prior to the first national lockdown. Despite high hours of work, the average income of the drivers for the week commencing April 15, 2020 was less than Rs. 2500. 57% of respondents earned between 0 to Rs. 2250.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;89.8% of workers did not receive any ration or food assistance, and 84.5% did not receive any financial assistance from either companies or governments.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Where companies had announced financial assistance programmes, including through donations collected by customers, there was no transparency in disbursement of funds. Other reasons for exclusion included administrative red tape (such as the requirement to produce bills that are GST compliant), and absence of clear criteria for eligibility, leading to random disbursement, among others.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Ola announced waiving off the rental amount for leased vehicles, and asked drivers to return such vehicles. However, there was no announcement of a plan to repossess vehicles once there was an easing of the lockdown, causing great anxiety among workers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;After the easing of the national lockdown, 69.7% of respondents indicated that they had no earnings, while 20% earned between Rs.500 to 1500.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;2716 respondents from 19 states across gig platforms articulated their support for a peaceful demonstration against company practices.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Mandatory installation of Aarogya Setu by workers raised concerns of privacy, as this would allow companies to surveil workers and collect data on their movements after work hours.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;IFAT organised several meetings and protests after each survey, to bring attention to the vulnerable conditions of workers. At these gatherings, workers raised the following key demands:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Companies must reduce commission rates to 5%, to allow workers to get back on their feet, and compensate for losses over the past few months;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Adequate protective equipment and health insurance cover to all drivers must be provided;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;There must be increased transparency in disbursement process of funds, and in the criteria for selection of beneficiaries;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Compounded interest must be waived on EMIs for the 3 months of moratorium on loan repayment.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Hear our voices and address our demands.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;em&gt;Shaik Salauddin&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;National General Secretary, Indian Federation of App-based Transport Workers (IFAT)&lt;/p&gt;
&lt;p&gt;Phone: +91 96424 24799&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Indian Federation of App-based Transport Workers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Facebook: &lt;a href="https://www.facebook.com/watch/connectifat/" target="_blank"&gt;www.facebook.com/watch/connectifat/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Twitter: &lt;a href="https://www.twitter.com/connect_ifat" target="_blank"&gt;www.twitter.com/connect_ifat&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;YouTube: &lt;a href="https://www.youtube.com/channel/UCA1AxGq0Fb_A_O_Ey44eiPg" target="_blank"&gt;www.youtube.com/channel/UCA1AxGq0Fb_A_O_Ey44eiPg&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/ifat-itf-locking-down-the-impact-of-covid-19'&gt;https://cis-india.org/raw/ifat-itf-locking-down-the-impact-of-covid-19&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Indian Federation of App-based Transport Workers (IFAT) and International Transport Workers’ Federation (ITF), New Delhi office</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Platform-Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2021-06-29T07:27:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/apc-april-23-2017-sunil-abraham-and-vidushi-marda-economic-social-and-cultural-rights-in-india">
    <title>Economic, Social and Cultural Rights in India: Opportunities for Advocacy in Intellectual Property</title>
    <link>https://cis-india.org/openness/apc-april-23-2017-sunil-abraham-and-vidushi-marda-economic-social-and-cultural-rights-in-india</link>
    <description>
        &lt;b&gt;Centre for Internet &amp; Society worked on a three part case study. The first case study on digital protection of traditional knowledge was published by GIS Watch in December 2016. The other two case studies along with the synthesis overview has also been published.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The rights established in the International Covenant on Economic, Social and Cultural Rights (ICESCR) are socioeconomic rights and are easily mapped onto rights to education, work, science and culture. These rights, however, are not as easily mapped onto intellectual property rights. This three-part case study contemplates the ICESCR through aspects of intellectual property in India, namely, mobile patents, free and open source software (FOSS), and India’s Traditional Knowledge Digital Library. Through these, it demonstrates the potential of these technologies in realising ESCRs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A distinguishing factor of the ICESCR is the emphasis on the progressive realisation of rights within the Covenant, which indicates the necessity of parties to take steps for the realisation of ESCRs to the best of their ability given the resources available, with a view to fully realising these rights in the long term. This is particularly relevant in India, where the large population and scarcity of resources require gradual realisation and sustained planning. This case study advocates for the progressive realisation of the rights outlined below, and sheds light on the current state of progress in India, as well as providing an overview of the framework within which these rights will be realised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although these three case studies focus on distinct areas – mobile patents, FOSS and open standards, and traditional knowledge – they can also be understood as tied together through the central theme of a mobile phone. The first case study on mobile patents deals with the hardware of the phone, the second deals with the software in discussing open software and standards, and the third case study on traditional knowledge focuses on the person holding the phone who consumes information-embedded products such as traditional foods and medicines.&lt;/p&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india"&gt;Synthesis Overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india-opportunities-for-advocacy-in-intellectual-property-rights-access-to-mobile-technology"&gt;Access to Mobile Technology&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india-opportunities-for-advocacy-in-intellectual-property-rights-the-traditional-knowledge-digital-library"&gt;Traditional Knowledge Digital Library&lt;/a&gt;&lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india-foss/"&gt;&lt;span class="external-link"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india-foss/"&gt;FOSS and Open Standards&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;br /&gt;The report on digital protection of traditional knowledge was &lt;a class="external-link" href="https://www.giswatch.org/sites/default/files/Giswatch2016_web.pdf"&gt;published by GIS Watch&lt;/a&gt; earlier and the rest of the reports have been published by the &lt;a class="external-link" href="https://www.apc.org/en/pubs/economic-social-and-cultural-rights-india-opportun"&gt;Association for Progressive Communications&lt;/a&gt;&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/apc-april-23-2017-sunil-abraham-and-vidushi-marda-economic-social-and-cultural-rights-in-india'&gt;https://cis-india.org/openness/apc-april-23-2017-sunil-abraham-and-vidushi-marda-economic-social-and-cultural-rights-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sunil Abraham and Vidushi Marda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>FOSS</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2017-04-23T05:22:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality">
    <title>CIS's Position on Net Neutrality</title>
    <link>https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality</link>
    <description>
        &lt;b&gt;As researchers committed to the principle of pluralism we rarely produce institutional positions. This is also because we tend to update our positions based on research outputs. But the lack of clarity around our position on network neutrality has led some stakeholders to believe that we are advocating for forbearance. Nothing can be farther from the truth. Please see below for the current articulation of our common institutional position.&lt;/b&gt;
        &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;Net Neutrality violations can potentially have multiple categories of harms —&lt;strong&gt; competition harms, free speech harms, privacy harms, innovation and ‘generativity’ harms, harms to consumer choice and user freedoms, and diversity harms&lt;/strong&gt; thanks to unjust discrimination and gatekeeping by Internet service providers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Net Neutrality violations (including some those forms of zero-rating that violate net neutrality) can also have different kinds benefits — enabling the &lt;strong&gt;right to freedom of expression&lt;/strong&gt;, and the &lt;strong&gt;freedom of association&lt;/strong&gt;, especially when access to communication and publishing technologies is increased; &lt;strong&gt;increased competition&lt;/strong&gt; [by enabling product differentiation, can potentially allow small ISPs compete against market incumbents]; &lt;strong&gt;increased access&lt;/strong&gt; [usually to a subset of the Internet] by those without any access because they cannot afford it, increased access [usually to a subset of the Internet] by those who don't see any value in the Internet, &lt;strong&gt;reduced payments&lt;/strong&gt; by those who already have access to the Internet especially if their usage is dominated by certain services and destinations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Given the magnitude and variety of potential harms, &lt;strong&gt;complete forbearance from all regulation is not an option&lt;/strong&gt; for regulators nor is self-regulation sufficient to address all the harms emerging from Net Neutrality violations, since incumbent telecom companies cannot be trusted to effectively self-regulate. Therefore, &lt;strong&gt;CIS calls for the immediate formulation of Net Neutrality regulation&lt;/strong&gt; by the telecom regulator [TRAI] and the notification thereof by the government [Department of Telecom of the Ministry of Information and Communication Technology]. CIS also calls for the eventual enactment of statutory law on Net Neutrality.&amp;nbsp; All such policy must be developed in a transparent fashion after proper consultation with all relevant stakeholders, and after giving citizens an opportunity to comment on draft regulations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Even though some of these harms may be large, CIS believes that a government cannot apply the precautionary principle in the case of Net Neutrality violations. &lt;strong&gt;Banning technical innovations and business model innovations is not an appropriate policy option. &lt;/strong&gt;The regulation must toe a careful line &lt;strong&gt;to solve the optimization problem: &lt;/strong&gt;refraining from over-regulation of ISPs and harming innovation at the carrier level (and benefits of net neutrality violations mentioned above) while preventing ISPs from harming innovation and user choice.&amp;nbsp; ISPs must be regulated to limit harms from unjust discrimination towards consumers as well as to limit harms from unjust discrimination towards the services they carry on their networks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Based on regulatory theory, we believe that a regulatory framework that is technologically neutral, that factors in differences in technological context, as well as market realities and existing regulation, and which is able to respond to new evidence is what is ideal.&lt;br /&gt;&lt;br /&gt;This means that we need a framework that has some bright-line rules based, but which allows for flexibility in determining the scope of exceptions and in the application of the rules.&amp;nbsp; Candidate principles to be embodied in the regulation include: &lt;strong&gt;transparency, non-exclusivity, limiting unjust discrimination&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;harms emerging from walled gardens can be mitigated in a number of ways&lt;/strong&gt;.&amp;nbsp; &lt;strong&gt;On zero-rating the form of regulation must depend on the specific model and the potential harms that result from that model. &lt;/strong&gt;Zero-rating can be: paid for by the end consumer or subsidized by ISPs or subsidized by content providers or subsidized by government or a combination of these; deal-based or criteria-based or government-imposed; ISP-imposed or offered by the ISP and chosen by consumers; Transparent and understood by consumers vs. non-transparent; based on content-type or agnostic to content-type; service-specific or service-class/protocol-specific or service-agnostic; available on one ISP or on all ISPs.&amp;nbsp; Zero-rating by a small ISP with 2% penetration will not have the same harms as zero-rating by the largest incumbent ISP.&amp;nbsp; For service-agnostic / content-type agnostic zero-rating, which Mozilla terms ‘&lt;strong&gt;equal rating&lt;/strong&gt;’, CIS advocates for&lt;strong&gt; no regulation.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;CIS believes that &lt;strong&gt;Net Neutrality regulation for mobile and fixed-line access must be different&lt;/strong&gt; recognizing the fundamental differences in technologies.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;On specialized services CIS believes that there should be logical separation&lt;/strong&gt; and that all details of such specialized services and their impact on the Internet must be made transparent to consumers both individual and institutional, the general public and to the regulator.&amp;nbsp; Further, such services should be available to the user only upon request, and not without their active choice, with the requirement that the service cannot be reasonably provided with ‘best efforts’ delivery guarantee that is available over the Internet, and hence requires discriminatory treatment, or that the discriminatory treatment does not unduly harm the provision of the rest of the Internet to other customers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On incentives for telecom operators, CIS believes that the government should consider different models such as waiving contribution to the Universal Service Obligation Fund for prepaid consumers, and freeing up additional spectrum for telecom use without royalty using a shared spectrum paradigm, as well as freeing up more spectrum for use without a licence.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On reasonable network management CIS still does not have a common institutional position.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality'&gt;https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-09T13:06:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ai-for-healthcare-understanding-data-supply-chain-and-auditability-in-india">
    <title> AI for Healthcare: Understanding Data Supply Chain and Auditability in India </title>
    <link>https://cis-india.org/internet-governance/blog/ai-for-healthcare-understanding-data-supply-chain-and-auditability-in-india</link>
    <description>
        &lt;b&gt;This report aims to understand the prevalence and use of AI auditing practices in the healthcare sector. By mapping the data supply chain underlying AI technologies, the study aims to unpack i) how AI systems are developed and deployed to achieve healthcare outcomes and, ii) how AI audits are perceived and implemented by key stakeholders in the healthcare ecosystem. &lt;/b&gt;
        
&lt;p dir="ltr"&gt;Read our full report &lt;a href="https://cis-india.org/internet-governance/blog/ai-for-healthcare-understanding-data-supply-chain-and-auditability-in-india-pdf" class="internal-link" title="AI for Healthcare: Understanding Data Supply Chain and Auditability in India PDF"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr"&gt;The use of artificial intelligence (AI) technologies constitutes a significant development in the Indian healthcare sector, with industry and government actors showing keen interest in designing and deploying these technologies. Even as key stakeholders explore ways to incorporate AI systems into their products and workflows, a growing debate on the accessibility, success, and potential harms of these technologies continues, along with several concerns over their large-scale adoption. A recurring question in India and the world over is whether these technologies serve a wider interest in public health. For example, the discourse on ethical and responsible AI in the context of emerging technologies and their impact on marginalised populations, climate change, and labour practices has been especially contentious.&lt;/p&gt;
&lt;p dir="ltr"&gt;For the purposes of this study, we define AI in healthcare as the use of artificial intelligence and related technologies to support healthcare research and delivery. The use cases include assisted imaging and diagnosis, disease prediction, robotic surgery, automated patient monitoring, medical chatbots, hospital management, drug discovery, and epidemiology. The emergence of AI auditing mechanisms is an essential development in this context, with several stakeholders ranging from big-tech to smaller startups adopting various checks and balances while developing and deploying their products. While auditing as a practice is neither uniform nor widespread within healthcare or other sectors in India, it is one of the few available mechanisms that can act as guardrails in using AI systems.&lt;/p&gt;
&lt;p id="docs-internal-guid-874e64d9-7fff-d16c-ed57-d245c7214bec" dir="ltr"&gt;Our primary research questions are as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;What is the current data supply chain infrastructure for organisations operating in the healthcare ecosystem in India?&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;What auditing practices, if any, are being followed by technology companies and healthcare institutions?&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;What best practices can organisations based in India adopt to improve AI auditability?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p id="docs-internal-guid-28d92dc2-7fff-c54b-addb-63beee845252" dir="ltr"&gt;This was a mixed methods study, comprising a review of available literature in the field, followed by quantitative and qualitative data collection through surveys and in-depth interviews. The findings from the study offer essential insights into the current use of AI in the healthcare sector, the operationalisation of the data supply chain, and policies and practices related to health data sourcing, collection, management, and use. It also discusses ethical and practical challenges related to privacy, data protection and informed consent, and the emerging role of auditing and other related practices in the field. Some of the key learnings related to the data supply chain and auditing include:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Technology companies, medical institutions, and medical practitioners rely on an equal mix of proprietary and open sources of health data and there is significant reliance&amp;nbsp; on datasets from the Global North.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Data quality checks are extant, but they are seen as an additional burden; with the removal of personally identifiable information being a priority during processing.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Collaboration between medical practitioners and AI developers remains limited, and feedback between users and developers of these technologies is limited.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;There is a heavy reliance on external vendors to develop AI models, with many models replicated from existing systems in the Global North.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Healthcare professionals are hesitant to integrate AI systems into their workflows, with a significant gap stemming from a lack of training and infrastructure to integrate these systems successfully.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The understanding and application of audits are not uniform across the sector, with many stakeholders prioritising more mainstream and intersectional concepts such as data privacy and security in their scope.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;Based on these findings, this report offers a set of recommendations addressed to different stakeholders such as healthcare professionals and institutions, AI developers, technology companies, startups, academia, and civil society groups working in health and social welfare. These include:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Improve data management across the AI data supply chain&lt;span class="Apple-tab-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Adopt standardised data-sharing policies&lt;/em&gt;. This would entail building a standardised policy that adopts an intersectional approach to include all stakeholders and areas where data is collected to ensure their participation in the process. This would also require robust feedback loops and better collaboration between the users, developers, and implementers of the policy (medical professionals and institutions), and technologists working in AI and healthcare. &lt;span class="Apple-tab-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Emphasise not just data quantity but also data quality&lt;/em&gt;. Given that the limited quantity and quality of Indian healthcare datasets present significant challenges, institutions engaged in data collection must consider their interoperability to make them available to diverse stakeholders and ensure their security. This would include recruiting additional support staff for digitisation to ensure accuracy and safety and maintain data quality.&lt;span class="Apple-tab-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Streamline AI auditing as a form of governance&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Standardise the practice of AI auditing&lt;/em&gt;. A certain level of standardisation in AI auditing would contribute to the growth and contextualisation of these practices in the Indian healthcare sector. Similarly, it would also aid in decision-making among implementing institutions.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Build organisational knowledge and inter-stakeholder collaboration&lt;/em&gt;. It is imperative to build knowledge and capacity among technical experts, healthcare professionals, and auditors on the technical details of the underlying architecture and socioeconomic realities of public health. Hence, collaboration and feedback are essential to enhance model development and AI auditing.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Prioritise transparency and public accountability in auditing standards&lt;/em&gt;. Given that most healthcare institutions procure externally developed AI systems, some form of internal or external AI audit would contribute to better public accountability and transparency of these technologies.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Centre public good in India’s AI industrial policy&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Adopt focused and transparent approaches to investing in and financing AI projects&lt;/em&gt;. An equitable distribution of AI spending and associated benefits is essential to guarantee that these investments and their applications extend beyond private healthcare, and that implementation approaches prioritise the public good. This would involve investing in entire AI life cycles instead of merely focusing on development and promoting transparent public–private partnerships.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Strengthen regulatory checks and balances for AI governance.&lt;/em&gt;&lt;br /&gt;While an overarching law to regulate AI technologies may still be under debate, existing regulations may be amended to bring AI within their ambit. Furthermore, all regulations must be informed by stakeholder consultations to guarantee that the process is transparent, addresses the rights and concerns of all the parties involved, and prioritises the public good.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ai-for-healthcare-understanding-data-supply-chain-and-auditability-in-india'&gt;https://cis-india.org/internet-governance/blog/ai-for-healthcare-understanding-data-supply-chain-and-auditability-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amrita Sengupta (PI), Shweta Mohandas (Co-PI), (In alphabetical order) Abhineet Nayyar, Chetna VM, Puthiya Purayil Sneha, Yatharth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Health Tech</dc:subject>
    
    
        <dc:subject>RAW Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2024-11-30T08:17:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-in-healthcare-policy-guide">
    <title>Privacy in Healthcare: Policy Guide</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-in-healthcare-policy-guide</link>
    <description>
        &lt;b&gt;The Health Policy Guide seeks to understand what are the legal regulations governing data flow in the health sector — particularly hospitals, and how are these regulations implemented. Towards this objective, the research reviews data practices in a variety of public and private hospitals and diagnostics labs. The research is based on legislation, case law, publicly available documents, and anonymous interviews.&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-healthcare.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt; (320 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;To this date, there exists no universally acceptable definition of the right to privacy. It is a continuously evolving concept whose nature and extent is     largely context driven. There are numerous aspects to the right to privacy, each different from the other in terms of the circumstance in which it is     invoked. Bodily privacy however, is to date, the most guarded facet of this vastly expansive right. The privacy over one’s own body including the organs,     genetic material and biological functions that make up one’s health is an inherent right that does not; as in the case of other forms of privacy such as     communication or transactional privacy, emanate from the State. It is a right that has its foundations in the Natural Law conceptions of The Right to Life,     which although regulated by the State can at no point be taken away by it except under extreme circumstances of a superseding Right to Life of a larger     number of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The deliberation leading to the construction of a universally applicable Right to Privacy has up until now however only been in terms of its interpretation     as an extension of the Fundamental Right to Life and Liberty as guaranteed under Article 21 as well as the freedom of expression and movement under     Articles 19(1)(a) and (b) of the Constitution of India. While this may be a valid interpretation, it narrows the ambit of the right as one that can only be     exercised against the State. The Right to privacy however has much larger implications in spheres that are often removed from the State. There is thus an     impending need to create an efficient and durable structure of Law and policy that regulates the protection of privacy in Institutions that may not always     be agents of the State.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is in this regard that the following analysis studies the existing conceptions of privacy in the Healthcare sector. It aims to study the existing     mechanisms of privacy protection and their pragmatic application in everyday practices. Further, it determines definitive policy gaps in the existing     framework and endeavors to provide effective recommendations to not only redress these shortcomings but also create a system that is efficient in its     fulfillment of the larger objective of the actualization of the Right to Privacy at an individual, state and institutional level.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Purpose&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The purpose of this research study is to formulate a comprehensive guide that maps the synthesis, structure and implementation of privacy regulations     within the healthcare sector in India. It traces the domestic legislation pertaining to various aspects of the healthcare sector and the specific     provisions of the law that facilitate the protection of the privacy of individuals who furnish their personal information as well as genetic material to     institutions of healthcare, either for the purpose of seeking treatment or to contribute to research studies. It is however imperative that the nature and     extent of the information collected be restricted through the establishment of requisite safeguards at an institutional level that percolate down to     everyday practices of data collection, handling and storage within healthcare institutions. The study thus aims to collate the existing systems of privacy     protection in the form of laws, regulations and guidelines and compare these with actual practices in government and private hospitals and diagnostic     laboratories to determine whether these laws are in fact effective in meeting the required standards of privacy protection. Further, the study also broadly     looks at International practices of privacy protection and offers recommendations to better the existing mechanisms of delimiting unnecessary intrusions on     the privacy of patients.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Importance&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Indian Healthcare sector although at par with international standards in its methods of diagnosis, treatment and the use of contemporary technology, is     still nascent in the nature and extent of its interaction with the Law. There are a number of aspects of healthcare that lie on the somewhat blurred line     between the interest of the public and the sole right of the individual seeking treatment. One such aspect is the slowly evolving right to privacy. The     numerous facets of this right have come to the fore largely through unique case laws that are reflective of a dynamic social structure, one that seeks to     reconcile the socio economic rights that once governed society with individual interests that it has slowly come to realize. The right of an individual to     disclose the nature of his disease, the liberty of a woman not to be compelled to undergo a blood test, the bodily autonomy to decide to bear children or     not, the decisional privacy with regards to the termination of a pregnancy and the custodial rights of two individuals to their child are certain     contentious aspects of healthcare that have constructed the porous interface between the right to privacy and the need for medical treatment. It is in this     context that this study aims to delve into the existing basic structure of domestic legislation, case laws and regulations and their subsequent application     in order to determine important gaps in the formulation of Law and Policy. The study thus aims to draw relevant conclusions to fill these gaps through     recommendations sourced from international best practice in order to construct a broad framework upon which one can base future policy considerations and     amendments to the existing law.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Methodology&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This research study was undertaken in two major parts. The first part assesses domestic legislation and its efficacy in the current context. This is done     through the determination of relevant provisions within the Act that are in consonance with the broader privacy principles as highlighted in the A.P Shah     Committee report on Privacy Protection&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;. This part of the research paper is based on secondary sources,     both in terms of books as well as online resources. The second part of the paper analyses the actual practices with regard to the assimilation,     organization, use and storage of personal data as practiced in Government and Private hospitals and Diagnostic laboratories. Three Private hospitals, a     prominent Government hospital and a Diagnostic laboratory were taken into consideration for this study. The information was provided by the concerned     personnel at the medical records department of these institutions of healthcare through a survey conducted on the condition of anonymity. The information     provided was analyzed and collated in accordance with the compliance of the practices of these institutions with the Principles of privacy envisioned in     the Report of the Group of Experts on Privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Embodiment of Privacy Regulation within Domestic Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This section of the study analyses the viability of an approach that takes into account the efficacy of domestic legislation in regulating practices     pertaining to the privacy of individuals in the healthcare sector. This approach perceives the letter and spirit of the law as the foundational structure     upon which internal practices, self regulation and the effective implementation of policy considerations that aim to create an atmosphere of effective     privacy regulation take shape, within institutions that offer healthcare services. To this effect, domestic legislationthat provides for the protection of     a patient’s privacy has been examined. The law has been further studied with respect to its tendency to percolate into the everyday practices, regulations     and guidelines that private and government hospitals adhere to. The extent of its permeation into actual practice; in light of its efficacy in fulfilling     the perambulatory objectives of ensuring safe and unobtrusive practices,within the construct of which a patient is allowed to recover and seek treatment,     has also been examined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The term ‘&lt;b&gt;Privacy’&lt;/b&gt; is used in a multitude of domestic legislations primarily in the    &lt;b&gt;context of the foundation of the fiduciary relationship between a doctor and a patient.&lt;/b&gt;This fiduciary relationship emanates from a     reasonable expectation of mutual trust between the doctor and his patients and is established through the Indian Medical Council Act of 1952, specifically     section 20(A) of the Act which lays down the code of ethics which a doctor must adhere to at all times. Privacy within the healthcare sector includes a number of aspects including but not limited to &lt;b&gt;informational privacy&lt;/b&gt; (e.g., confidentiality, anonymity, secrecy and data security);    &lt;b&gt;physical privacy&lt;/b&gt; (e.g., modesty and bodily integrity); &lt;b&gt;associational privacy&lt;/b&gt; (e.g. intimate sharing of death, illness and recovery); &lt;b&gt;proprietary privacy&lt;/b&gt; (e.g., self-ownership and control over personal identifiers, genetic data, and body tissues); and    &lt;b&gt;decisional privacy&lt;/b&gt; (e.g., autonomy and choice in medical decision-making).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy Violations stem from policy and information gaps: &lt;/b&gt; Violations in the healthcare sector that stem from policy formulation as well and implementation gaps&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; include the disclosure of personal health information to third parties without consent, inadequate notification to a patient of a data breach, unlimited or     unnecessary collection of personal health data, collection of personal health data that is not accurate or relevant, the purpose of collecting data is not     specified, refusal to provide medical records upon request by client, provision of personal health data to public health, research, and commercial uses     without de-identification of data and improper security standards, storage and disposal. The disclosure of personal health information has the potential to     be embarrassing, stigmatizing or discriminatory.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; Furthermore, various goods such as employment, life, and medical insurance, could be placed at risk &lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;if the flow of medical information were not restricted.    &lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Disclosure of personal health information is permitted and does not amount to a violation of privacy in the following situations: 1) during referral, 2)     when demanded by the court or by the police on a written requisition, 3) when demanded by insurance companies as provided by the Insurance Act when the     patient has relinquished his rights on taking the insurance, and 4) when required for specific provisions of workmen's compensation cases, consumer protection cases, or for income tax authorities,&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; 5) disease registration, 6) communicable disease investigations, 7) vaccination studies, or 8) drug adverse event reporting.    &lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following domestic legislations have been studied and relevant provisions of the Act have been accentuated in order to analyse their compliance with     the basic principles of privacy as laid out in the A.P Shah Committee report on Privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mental Health Act, 1987&lt;/b&gt;&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;br /&gt;The Provisions under the Act pertaining to the protection of privacy of the patient have been examined. The principles embodied within the Act include     aspects of the Law that determine the nature and extent of oversight exercised by the relevant authorities over the collection of information, the     limitation on the collection of data and the restrictions on the disclosure of the data collected. The principle of oversight is embodied under the     legislation within the provisions that allow for the inspection of records in psychiatric hospitals and nursing homes only by officers authorized by the     State Government.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The limitation on the Collection of information is imposed by the     Inspection of living conditionsby a psychiatrist and two social workers are on a monthly basis. This would include analyzing the living condition of every patient and the administrative processes of the psychiatric hospital and/or psychiatric nursing home.    &lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Additionally, Visitors must maintain a book regarding their observations and     remarks.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Medical certificates may be issued by a doctor, containing information regarding the nature and degree of the mental disorder as reasons for the detention of a person in a psychiatric hospital or psychiatric nursing home.    &lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Lastly, the disclosure of personal records of any facility under this Act by     inspecting officers is prohibited&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pre-Conception and Pre-Natal Diagnostic Techniques (Prohibition of Sex Selection) Act, 1994&lt;/b&gt; &lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;br /&gt;The Act was instituted in light of a prevalent public interest consideration of preventing female foeticide. However, it is imperative that the provision     of the Act remain just shy of unnecessarily intrusive techniques and do not violate the basic human requirement of privacy in an inherently personal     sphere. The procedure that a mother has to follow in order to avail of pre-natal diagnostic testing is mandatory consent of age, abortion history and family history. These conditions require a woman to reveal sensitive information concerning family history of mental retardation or physical deformities.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; A&lt;b&gt;special concern for privacy and confidentiality should be exercised with regards to disclosure of genetic information.&lt;/b&gt; &lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Medical Termination of Pregnancy Act, 1971&lt;/b&gt; &lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;br /&gt;Although, the right to an abortion is afforded to a woman within the construct of her inherent right to bodily privacy, decisional privacy (for e.g.,     autonomy and choice in medical decision-making) is not afforded to patients and their families with regards to determining the sex of the baby. The     sections of the Act that have been examined lay down the provisions available within the Act to facilitate the protection of a woman’s right to privacy     during the possible termination of a pregnancy. These include the principles pertaining to the choice and consent of the patient to undergo the procedure,     a limit on the amount of information that can be collected from the patient, the prevention of disclosure of sensitive information and the security     measures in place to prevent the unauthorized access to this information. The Medical Termination of Pregnancy Regulations, 2003 supplement the Act and provide relevant restrictions within every day practices of data collection use and storage in order to protect the privacy of patients. The Act mandates    &lt;i&gt;Written Consent &lt;/i&gt;of the patient in order to facilitate an abortion .Consent implies that the patient is aware of all her options, has been     counselled about the procedure, the risks and post-abortion care.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;. The Act prohibits the disclosure of matters relating to treatment for termination of pregnancy to anyone other than the Chief Medical Officer of the State.    &lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;The Register of women who have terminated their pregnancy, as maintained by the hospital, must be     destroyed on the expiry of a period of five years from the date of the last entry.&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; The Act also emphasizes upon the security of information collected. The medical practitioner assigns a serial number for the woman terminating her pregnancy.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;Additionally, the admission register is stored in safe custody of the head of the hospital.    &lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Medical Council (Professional conduct, Etiquette and Ethics) Regulations, 2002 (Code of Ethics Regulations, 2002)&lt;/b&gt;&lt;br /&gt;The Medical Council of India (&lt;b&gt;MCI&lt;/b&gt;) Code of Ethics Regulations&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; sets the professional standards for medical practice. These provisions regulate the nature and extent of doctor patient confidentiality. It also     establishes universally recognized norms pertaining to consent to a particular medical procedure and sets the institutionally acceptable limit for     intrusive procedure or gathering excessively personal information when it is not mandatorily required for the said procedure. The provisions addressed     under these regulations pertain to the Security of the information collected by medical practitioners and the nature of doctor patient confidentiality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Physicians are obliged to protect the confidentiality of patients&lt;sup&gt; 5&lt;/sup&gt;during all stages of the procedure and with regard to all aspects of the information provided by the patient to the doctor, includinginformation relating to their personal and domestic lives.    &lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;The only exception to this mandate of confidentiality is if the law requires     the revelation of certain information, or if there is a serious and identifiable risk to a specific person and / or community ofa notifiable disease.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Ethical Guidelines for Biomedical Research on Human Subjects&lt;/b&gt; &lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;br /&gt;The provisions for the regulation of privacy pertaining to biomedical research include aspects of consent as well as a limitation on the information that     may be collected and its subsequent use. The provisions of this act aim to regulate the protection of privacy during clinical trials and during other     methods of research. The principal of informed consent is an integral part of this set of guidelines. ThePrivacy related information included in the     participant/ patient information sheet includes: the choice to prevent the use of their biological sample, the extent to which confidentiality of records     could be maintained and the consequences of breach of confidentiality, possible current and future uses of the biological material and of the data to be     generated from the research and if the material is likely to be used for secondary purposes or would be shared with others, the risk of discovery of     biologically sensitive information and publications, including photographs and pedigree charts.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; The Guidelines require special concern for privacy and confidentiality when conducting genetic family studies.    &lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;The protection of privacy and maintenance of confidentiality, specifically surrounding the identity and records, is maintained whenusing the information or genetic material provided by participants for research purposes.    &lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;The Guidelines require investigators to maintain confidentiality of     epidemiological data due to the particular concern that some population based data may also have implications on issues like national security or public     safety.&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;All documentation and communication of the Institutional Ethics Committee (IEC) must be dated,     filed and preserved according to the written procedures.Data of individual participants can be disclosed in a court of law under the orders of the     presiding judge, if there is a threat to a person’s life, communication to the drug registration authority regarding cases of severe adverse reaction and     communication to the health authority if there is risk to public health.&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Insurance Regulatory and Development Authority (Third Party Administrators) Health Services Regulations, 2001&lt;br /&gt;&lt;/b&gt;The provisions of the Act that have been addressed within the scope of the study regulate the practices of third party administrators within the healthcare     sector so as to ensure their compliance with the basic principles of privacy.An exception to the maintenance and confidentiality of information     confidentiality clause in the code of conduct, requires TPAs to provide relevant information to any Court of Law/Tribunal, the Government, or the Authority     in the case of any investigation carried out or proposed to be carried out by the Authority against the insurance company, TPA or any other person or for any other reason.&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt;In July 2010, the IRDA notified the&lt;b&gt;Insurance Regulatory and Development &lt;/b&gt;Authority&lt;b&gt; (Sharing of Database for Distribution of Insurance Products) Regulations&lt;/b&gt; &lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;&lt;b&gt;. These regulations restrict referral companies from &lt;/b&gt;providing details of their     customers without their prior consent.&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;TPAs must maintain the confidentiality of the data collected by     it in the course of its agreement and maintain proper records of all transactions carried out by it on behalf of an insurance company and are also required     to refrain from trading information and the records of its business&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;.TPA’s must keep records for a     period of not less than three years.&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IDRA Guidelines on Outsourcing of Activities by Insurance Companies&lt;/b&gt; &lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt;&lt;br /&gt;These guidelines require the insurer to take appropriate steps that require third party service providers protect confidential information of both the     Insurer and its clients from intentional or inadvertent disclosure to unauthorized persons.&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Exceptions to the Protection of Privacy&lt;/b&gt;&lt;br /&gt;The legal provisions with regard to privacy, confidentiality and secrecy are often superseded by Public Interest Considerations. The right to privacy,     although recognized in the course of Indian jurisprudence and embodied within domestic legislation is often overruled prima facie when faced with     situations or instances that involve a larger interest of a greater number of people. This policy is in keeping with India’s policy goals as a social     welfare state to aid in the effectuation of its utilitarian ideals. This does not allow individual interest to at any point surpass the interest of the     masses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Epidemic Diseases Act, 1897&lt;/b&gt; &lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt;&lt;br /&gt;Implicit within this formulation of this Act is the assumption that in the case of infectious diseases, the right to privacy, of infected individuals must     give way to the overriding interest of protecting public health.&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt; This can be ascertained not only from     the black letter of the Law but also from its spirit. Thus, in the absolute positivist as well as a more liberal interpretation, at the crux of the legislation lies the undeniable fundamental covenant of the preservation of public health, even at the cost of the privacy of a select few individuals    &lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Policy and Regulations&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Policy for Persons with Disabilities, 2006&lt;/b&gt;&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt;&lt;br /&gt;The following provisions of the Act provide for the incorporation of privacy considerations in prevalent practices with regard to persons with     disabilities. The National Sample Survey Organization collects the &lt;b&gt;following information on persons with disabilities:&lt;/b&gt; the socio- economic     and cultural context, cause of disabilities, early childhood education methodologies and all matters connected with disabilities, at least once in five years.&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;This data is collected by non-medical investigators.    &lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt;There is thus an inherent limit on the information collected. Additionally, this information is used     only for the purpose for which it has been collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Special Employment Exchange, as established under The Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act,     1995 Act, collects and furnishes information in registers, regarding provisions for employment. &lt;b&gt;Access to such data is limited to&lt;/b&gt; any     person who is authorized by the Special Employment Exchange as well as persons authorized by general or special order by the Government, to access, inspect, question and copy any relevant record, document or information in the possession of any establishment.    &lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt; When conducting research on persons with disabilities consent is required from the individual or their     family members or caregivers.&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;HIV Interventions&lt;/b&gt;&lt;br /&gt;In 1992, the Government of India instituted the National AIDS Control Organization (NACO) for the prevention and control of AIDS. NACO aims to control the     spread of HIV in India through the implementation of Targeted Interventions (TIs) for most at risk populations (MARPs) primarily, sex workers, men having     sex with men and people who inject drugs.&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;The Targeted Interventions (TIs) system of testing under this     organization has however raised numerous concerns about relevant policy gaps in the maintenance of the confidentiality and privacy of persons living with     HIV/ AIDS. The shortcomings in the existing policy framework include: The Lack of a limitation and subsequent confidentiality in the amount of Information     collected. Project staff inTIsrecordthe name, address and other contact information of MARPs and share this data with Technical Support Unit and State AIDS     Control Societies.&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt; Proof of address and identity documents are required to get enrolled in government     ART programs.&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;Peer-educators operate under a system known as line-listing, used to make referrals and conduct follow-ups. Peer-educators have to follow-up with those who have not gone at regular intervals for testing.    &lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt; This practice can result in peer-educators noticing and concluding that the names missing are those     who have tested positive. &lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt; Although voluntary in nature, the policy encourage the fulfillment of     fulfilling of numerical targets, and in doing so supports unethical ways of testing.&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The right to privacy is an essential requirement for persons living with HIV/AIDS due to the potential stigmatizing and discriminatory impact of the     revelation of this sensitive information, in any form.&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt; The lack of privacy rights often fuels the     spread of the disease and exacerbates its impact on high risk communities of individuals. Fears emanating from a privacy breach or a disclosure of data     often deter people from getting tested and seeking medical care. The impact of such disclosure of sensitive information including the revelation of tests     results to individuals other than the person being tested include low self esteem, fear of loss of support from family/peers, loss of earnings especially for female and transgender sex workers, fear of incrimination for illicit sex/drug use and the insensitivity of counselors.    &lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;HIV positive individualslive in constant fear of their positive status being leaked. They also shy away     from treatment as they fear people might see them taking their medicines and thereby guess their status. Thus breaches in confidentiality and policy gaps in privacy regulation, especially with respect to diseases such as HIV also prevents people from seeking out treatment.    &lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Case Law&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The following cases have been used to deliberate upon important points of contention within the ambit of the implementation and impact of Privacy     Regulationsin the healthcare sector. This includes the nature and extent of privacy enjoyed by the patient and instances where in the privacy of the     patient can be compromised in light of public interest considerations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Surupsingh Hrya Naik vs. State of Maharashtra&lt;/i&gt; ,&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt; (2007)&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;The decision in this case held that The RTI Act 2005 would supersede The Medical Council Code of Ethics. The health records of an                         individual in judicial custody should be made available under the Act and can only be denied in exceptional cases, for valid reasons.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Since the Code of Ethics Regulations are only delegated legislation, it was held in the case of &lt;i&gt;Mr. SurupsinghHrya Naik v.State Of Maharashtra&lt;/i&gt;&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt; that these would not prevail over the Right to Information Act, 2005 (&lt;b&gt;RTI Act&lt;/b&gt;) unless the information sought falls under the exceptions contained in Section 8 of the RTI Act. This case dealt with the important point of contention of     whether making the health records public under the RTI Act would constitute a violation of the right to privacy. These health records were required to     determine why the convict in question was allowed to stay in a hospital as opposed to prison. In this context the Bombay High Court held thatThe Right to     Information Act supersedes the regulation that mandate the confidentiality od a person, or in this case a convict’s medical records. It was held that the     medical records of a a person sentenced or convicted or remanded to police or judicial custody, if during that period such person is admitted in hospital     and nursing home, should be made available to the person asking the information provided such hospital nursing home is maintained by the State or Public     Authority or any other Public Body. It is only in rare and in exceptional cases and for good and valid reasons recorded in writing can the information may     be denied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Radiological &amp;amp; Imaging Association v. Union of India&lt;/i&gt; ,&lt;a href="#_ftn57" name="_ftnref57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (2011)&lt;br /&gt;On 14 January 2011 a circular was issued by the Collector and District Magistrate, Kolhapur requiring the Radiologists and Sonologists to submit an on-line     form “F” under the PNDT Rules. This was challenged by the Radiological and Imaging Association, &lt;i&gt;inter alia&lt;/i&gt;, on the ground that it violates the     privacy of their patients. Deciding the above issue the Bombay High Court held that .The images stored in the silent observer are not transmitted on-line     to any server and thus remain embedded in the ultra-sound machine. Further, the silent observer is to be opened only on request of the Collector/ the civil     surgeonin the presence of the concerned radiologist/sonologist/doctor incharge of the Ultra-sound Clinic. In light of these considerations and the fact     that the `F' form submitted on-line is submitted only to the Collector and District Magistrate is no violation of the doctor's duty of confidentiality or     the patient's right to privacy. It was further observed that The contours of the right to privacy must be circumscribed by the compelling public interest     flowing through each and every provision of the PC&amp;amp;PNDT Act, when read in the background of the following figures of declining sex ratio in the last     five decades.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;The use of a Silent Observer system on a sonograph has requisite safeguards and doesn’t violate privacy rights. The declining sex ratio                         of the country was considered a compelling public Interest that could supersede the right to privacy.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Smt. Selvi and Ors. v.State of Karnataka &lt;/i&gt;(2010)&lt;br /&gt;The Supreme Court held that involuntary subjection of a person to narco analysis, polygraph test and brain-mapping violates the ‘right against self-incrimination' which finds its place in Article 20(3)&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt; of the Constitution.    &lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt; The court also found that narco analysis violated individuals’ right to privacy by intruding into a     “subject’s mental privacy,” denying an opportunity to choose whether to speak or remain silent, and physically restraining a subject to the location of the     tests and amounted to cruel, inhuman or degrading treatment.&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;The Supreme Court found that Narco-analysis violated an individuals’ right to privacy by intruding into a “subject’s mental privacy,”                         denying an opportunity to choose whether to speak or remain silent.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Neera Mathur v. Life Insurance Corporation &lt;/i&gt;(LIC),&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt; (1991)&lt;br /&gt;In this casethe plaintiff contested a wrongful termination after she availed of maternity leave. LIC required women applicants to furnish personal details     like their menstrual cycles, conceptions, pregnancies, etc. at the time of appointment. Such a requirement was held to go against the modesty and self     respect of women. The Court held that termination was only because of disclosures in application, which was held to be intrusive, embarrassing and     humiliating. LIC was directed to delete such questions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court did not refer to the term privacy however it used the term personal details as well as modesty and self respect, but did not specifically link     them to the right to life or any other fundamental right. These terms (modesty and self respect) are usually not connected to privacy but although they may     be the harm which comes from an intrusion of one’s privacy.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;The Supreme Court held that Questions related to an individual’s reproductive issues are personal details and should not be asked in                         the service application forms.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Ms. X vs. Mr. Z &amp;amp;Anr&lt;/i&gt; ,&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt; (2001)&lt;br /&gt;In this case, the Delhi High Court held that an aborted foetus was not a part of the body of a woman and allowed the DNA test of the aborted foetus at the     instance of the husband. The application for a DNA test of the foetus was contested by the wife on the ground of “Right to Privacy”.7In this regard the     court held that The Supreme Court had previously decided that a party may be directed to provide blood as a DNA sample but cannot be compelled to do so.     The Court may only draw an adverse interference against such party who refuses to follow the direction of the Court in this respect.The position of the     court in this case was that the claim that the preservation of a foetus in the laboratory of the All India Institute of Medical Science, violates the     petitioner’s right to privacy, cannot be entertained as the foetus had been voluntarily discharges from her body previously, with her consent. The foetus,     that she herself has dischargedis claimed to be subjected to DNA test. Thus, in light of the particular facts and the context of the case, it was held that     petitioner does not have any right of privacy.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;A woman’s right to privacy does not extend to a foetus, which is no longer a part of her body. The right to privacy may arise from a                         contract as well as a specific relationship, including a marital relationship. The principle in this case has been laid down in broad                         enough terms that it may be applied to other body parts which have been disassociated from the body of the individual.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;It is important to note here that the fact that the Court is relying upon the principles laid down in the case of &lt;i&gt;R. Rajagopal &lt;/i&gt;seems to suggest that the Court is treating organic tissue preserved in a public hospital in the same manner as it would treat a public document, insofar     as the exception to the right to privacy is concerned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;B.K Parthasarthi vs. Government of Andhra Pradesh&lt;/i&gt; ,&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt; (1999)&lt;br /&gt;In this case, the Andhra Pradesh High Court was to decide the validity of a provision in the Andhra Pradesh Panchayat Raj Act, 1994 which stipulated that     any person having more than two children should be disqualified from contesting elections. This clause was challenged on a number of grounds including the     ground that it violated the right to privacy. The Court, in deciding upon the right to privacy and the right to reproductive autonomy, held thatThe     impugned provision, i.eSection 19(3) of the said Act does not compel directly anyone to stop procreation, but only disqualifies any person who is otherwise     eligible to seek election to various public offices coming within the ambit of the Andhra Pradesh Panchayat Raj Act, 1994 or declares such persons who have     already been holding such offices to be disqualified from continuing in such offices if they procreate more than two children.Therefore, the submission     made on behalf of the petitioners 'right to privacy' is infringed, is untenable and must be rejected.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. X v. Hospital Z, Supreme Court of India&lt;/i&gt; ,&lt;a href="#_ftn64" name="_ftnref64"&gt;[64]&lt;/a&gt; (1998 and 2002)&lt;br /&gt;The petitioner was engaged to be married and thereafter during tests for some other illness in the hospital it was found that the petitioner was HIV     positive. This information was released by the doctor to the petitioner’s family and through them to the family of the girl to whom the petitioner was     engaged, all without the consent of the petitioner. The Court held that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Right to privacy is not treated as absolute and is subject to such action as may be lawfully taken for the prevention of crime or disorder or     protection of health or morals or protection of rights and freedoms of others.”&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;Right to privacy and is subject to such action as may be lawfully taken for the prevention of crime or disorder or protection of health                         or morals or protection of rights and freedoms of others.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This decision of this case could be interpreted to extend the principle, of disclosure to the person at risk, to other communicable and life threatening     diseases as well. However, a positivist interpretation would render these principle applicable to only to HIV+ cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;M. Vijaya v. Chairman and Managing Director, Singareni Collieries Co. Ltd.&lt;/i&gt; &lt;a href="#_ftn65" name="_ftnref65"&gt;[65]&lt;/a&gt; (2001)&lt;br /&gt;The petitioner alleged that she had contracted the HIV virus due to the negligence of the authorities of Maternity and Family Welfare Hospital,     Godavarikhani, a hospital under the control of Singareni Collieries Company Ltd., (SCCL), in conducting relevant precautionary blood tests before     transfusion of blood of her brother (donor) into her body when she was operated for hysterectomy (Chronic Cervicitis) at the hospital. The petition was     initially filed as a Public Interest Litigation,which the court duly expanded in order to address the problem of the lack of adequate precautionary     measures in hospitals, thereby also dealing with issues of medical confidentiality and privacy of HIV patients. The court thus deliberated upon the     conflict between the right to privacy of an HIV infected person and the duty of the state to prevent further transmission and held:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the interests of the general public, it is necessary for the State to identify HIV positive cases and any action taken in that regard cannot be termed     as unconstitutional. As under Article 47 of the Constitution, the State was under an obligation to take all steps for the improvement of the public health.     A law designed to achieve this object, if fair and reasonable, in our opinion, will not be in breach of Article 21 of the Constitution of India&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;The right of reproductive autonomy is a component of the right to privacy .A provision disqualifying a person from standing for                         elections due to the number of children had, does not violate the right to privacy as the object of the legislation is not to violate                         the autonomy of an individual but to mitigate the population growth in the country. Measures to control population growth shall be                         considered legal unless they impermissibly violate a fundamental right.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;However, another aspect of the matter is whether compelling a person to take HIV test amounts to denying the right to privacy? The Court analyzed the     existing domestic legislation to arrive at the conclusion that there is no general law that can compel a person to undergo an HIV-AIDS test. However,     specific provisions under the Prison Laws&lt;a href="#_ftn66" name="_ftnref66"&gt;[66]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;provide that as soon as a prisoner is admitted to prison, he is required to be examined medically and the record of prisoner's health is to be maintained     in a register. Further, Under the ITP Act, the sex workers can also be compelled to undergo HIV/ AIDS test.&lt;a href="#_ftn67" name="_ftnref67"&gt;[67]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, under Sections 269 and 270 of the Indian Penal Code, 1860, a person can be punished for negligent act of spreading infectious diseases.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;The right to privacy of a person suspected to be HIV+ would be subordinate to the power and duty of the state to identify HIV+ patients                         in order to protect public interest and improve public health. However any law designed to achieve this object must be fair and                         reasonable. In a conflict between the individual’s privacy right and the public’s right in dealing with the cases of HIV-AIDS, the                         Roman Law principle 'SalusPopuliestSuprema' (regard for the public wealth is the highest law) applies when there is a necessity.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;After mapping legislation that permit the invasion of bodily privacy, the Court concluded that they are not comprehensive enough to enable the State to     collect information regarding patients of HIV/AIDS and devise appropriate strategies and therefore the State should draft a new legislation in this regard.     Further the Court gave certain directions to the state regarding how to handle the epidemic of HIV/AIDS and one of those directions was that the “Identity     of patients who come for treatment of HIV+/AIDS should not be disclosed so that other patients will also come forward for taking treatment.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Sharda v. Dharmpal&lt;/i&gt; ,&lt;a href="#_ftn68" name="_ftnref68"&gt;[68]&lt;/a&gt; (2003)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The basic question in this case was whether a party to a divorce proceeding can be compelled to a medical examination. The wife in the divorce proceeding     refused to submit herself to medical examination to determine whether she was of unsound mind on the ground that such an act would violate her right to     personal liberty. Discussing the balance between protecting the right to privacy and other principles that may be involved in matrimonial cases such as the     ‘best interest of the child’ in case child custody is also in issue, the Court held:&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;If the best interest of a child is in issue in the case then the patient’s right to privacy and confidentiality would get limited. The                         right to privacy of an individual would be subordinate to the power of a court to arrive at a conclusion in a matrimonial dispute and                         the right of a party to protect his/her rights in a Court of law would trump the right to privacy of the other.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;"Privacy" is defined as "the state of being free from intrusion or disturbance in one's private life or affairs". However, the right to privacy in India,     is only conferred through an extensive interpretation of Article 21 and cannot therefore in any circumstance be considered an absolute right. Mental health     treatment involves disclosure of one's most private feelings However, like any other privilege the psychotherapist-patient privilege is not absolute and     may only be recognized if the benefit to society outweighs the costs of keeping the information private. Thus if a child's best interest is jeopardized by     maintaining confidentiality the privilege may be limited.” Thus, the power of a court to direct medical examination of a party to a matrimonial litigation     in a case of this nature cannot beheld to violate the petitioner’s right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Regulation of Privacy in Government and Private Hospitals and Diagnostic Laborataries&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A. Field Study&lt;/b&gt;&lt;br /&gt;The Hospitals that have been chosen for the analysis of the efficacy of these legislations include prominent Government Hospitals, Private Hospitals and     Diagnostic Centers. These Institutes were chosen because of their widely accredited status as centers of medical research and cutting edge treatment. They     have also had a long standing reputation due to their staff of experienced and skilled on call doctors and surgeons. The Private Hospitals chosen had     patient welfare centers that addressed the concerns of patients including questions and doubts relating to but not limited to confidentiality and consent.     The Government hospitals had a public relations office that addressed the concerns of discharged patients. They also provided counseling services to     patients to aid them in addressing concerns relate to the treatment that they might want to be kept confidential. Diagnostic laboratories also have an HR     department that addresses similar concerns. The laboratory also has a patient welfare manager who addresses the concerns and queries of the patient prior     to and during the procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following section describes the practices promulgated by Government and Private Hospitals, as well as Diagnostic Laboratories in their endeavor to     comply with the basic principles of privacy as laid down in the A.P Shah Committee report on Privacy.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(i) Notice&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Through an analysis of the information provided by Government and Private hospitals and diagnostic laboratories, relevant conclusions were drawn with     regard to the nature, process and method in which the patient information is recorded. Through interviews of various medical personnel including     administrative staff in the patient welfare and medical records departments we observed an environment of openness and accountability within the structure     of the patient registration system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Government Hospitals, the patient is notified of all types of information that is collected, in terms of both personal information as well as medical     history. The Patient admission as well as the patient consent form is filled out by the patient or the attending relative accompanying the patient and     assistance for the same is provided by the attending staff members, who explain the required details that need to be filled in a language that the patient     is able to understand. The patient is notified of the purpose for which such information is collected and the procedure that he/ she might have to undergo     depending on his injury or illness. The patient is not however, notified of the method in which he/she may correct or withdraw the information that is     provided. There is no protocol provided for the correction or withdrawal of information, once provided. The patient is, at all times notified of the extent     and nature of doctor patient confidentiality including the fact that his/her personal information would not be shared even with his/her immediate relatives     , insurance companies, consulting doctors who are not directly involved with his/her treatment or any unauthorized third party without requisite consent     from the patient. The patient is informed of the fact that in some cases the medical records of the patient will have to be shared with consulting doctors     and that all the patient’s medical records would be provided to insurance companies, but this will only be done with the consent of the patient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The same system of transparency and accountability transcends across private hospitals and diagnostic laboratories as well. In private hospitals, the     patient is informed of all the information that is collected and the purpose for which such information may be collected. Diagnostic laboratories have     specific patient consent forms for specific types of procedures which the patient will have to fill out depending on the required tests. These forms     contain provisions with regard to the confidential nature of all the information provided. This information can only be accessed by the patient and the     consulting doctor with the consent of the patient. Both private hospitals and diagnostic laboratories have a specific protocol and procedure in place to     correct or withdraw information that has been provided. In order to do so the patient would have to contact the medical records department with requisite     proof of the correct information. Private hospitals inform patients of the nature and extent of doctor patient confidentiality at every stage of the     registration process. Some private hospitals contain patient safety brochures which inform patients about the nature and extent of consent and     confidentiality, even with regard to consulting doctors and insurance agencies. If the patient does not want certain information revealed to insurance     agencies the hospital will retain such records and refraining from providing them to third party insurance agencies. Thus, all information provided by the     patient remains confidential at the behest of the patient.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(ii) Choice and Consent&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Choice and consent are two integral aspects of the regulation of privacy within the healthcare sector. Government and Private hospitals as well as     diagnostic laboratories have specific protocols in place to ensure that the consent of the patient is taken at every stage of the procedure. The consent of     the patient can also be withdrawn just prior to the procedure even if this consent has already been given by the patient in writing, previously. The choice     of the patient is also given ample importance at all stages of the procedure. The patient can refuse to provide any information that may not mandatorily     required for the treatment provided basic information regarding his identity and contact information in case of emergency correspondence has been given.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(iii) Collection Limitation&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The information collected from the patient in both government and private hospitals is used solely for the purpose that the patient has been informed of.     In case this information is used for purposes other than for the purpose that the patient has been informed of, the patient is informed of this new purpose     as well. Patient records in both Government and Private hospitals are stored in the Medical Records Department as hard copies and in some cases as scanned     soft copies of the hard copy as well. These Medical Records are all stored within the facility. The duration for which the records are stored range from a     minimum of two years to a maximum of ten years in most private hospitals. Some private hospitals store these records for life. Government hospitals store     these records for a term of thirty years only as hard copies after which the records are discarded. Private hospitals make medical records accessible to     any medical personnel who may ask for it provided the requisite proof of identity and reasons for accessing the same are provided, along with an attested     letter of authorization of the doctor who is currently involved or had been involved in the treatment of the patient. Government hospitals however do not     let any medical personnel access these records except for the doctor involved in the treatment of that particular patient. Both private and government     hospitals are required to share the medical records of the patient with the insurance companies. Government Hospitals only share patient records with     nationalized insurance agencies such as The Life Insurance Corporation of India (LIC) but not with private insurance agencies. The insurance claims forms     that are required prior to providing medical records to the insurance companies mandatorily require the signature of the patient. The patient is thus     informed that his records will be shared with the insurance agencies and his signature is a proof of his implied consent to the sharing of these records     with the company with which he has filed a health insurance claim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diagnostic laboratories collect patient information solely for the purpose of the particular test that they have been asked to conduct by the treating or     consulting doctor. Genetic samples (Blood, Semen, Urine etc) are collected at one time and the various tests required are conducted on these samples. In     case of any additional testing that is required to be conducted on these samples, the patient is informed. Additional testing is conducted only in critical     cases and in cases where the referral doctor requests for the same to be conducted on the collected samples. In critical cases, where immediate testing is     required and the patient is unreachable, the testing is conducted without informing the patient. The patient is mandatorily informed after the test that     such additional testing was conducted. The patient sample is stored for one week within the same facility. The Patient records are digitized. They can only     be accessed by the patient, who is provided with a particular username and password using which he can access only his records. The information is stored     for a minimum of two years. This information can be made available to a medical personnel only if such medical personnel has the required lab no, the     patients name, and reason for which it needs to be accessed. He thus requires the permission of the authorities at the facility as well as the permission     and consent of the patient to access such records. The Medical test records of a patient are kept completely confidential. Even insurance companies cannot     access such records unless they are provided to the company by the patient himself. In critical cases however, the patient information and tests results     are shared with the treating or referral doctor without the consent of the patient.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(iv) Purpose Limitation&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;In Government and Private Hospitals, the information is only used for the purpose for which it is collected. There is thus a direct and relevant connection     between the information collected and the purpose for which it used. Additional information is collected to gauge the medical history of the patient that     may be relevant to the disease that has to be treated. The information is never deleted after it has been used for the purpose for which it had been     collected. The Medical Records of the patient are kept for extended periods in hard copy as well as soft copy versions. There is a provision for informing     the patient in case the information is used for any purpose other than the purpose for which it was collected. Consent of the patient is taken at all     stages of collecting and utilizing the information provided by him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diagnostic Laboratories have a database of all the information collected which is saved in the server. The information is mandatorily deleted after it has     been used for the purpose for which it was collected after a period of two years. In case the information is used for any purpose other than the purpose     for which it was collected, for example, in critical cases where additional tests have to be conducted the patient is\ always informed of the same.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(v) Access and Correction&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;In private hospitals, the patient is allowed to access his own records during his stay at the hospital. He is given a copy of his file upon his discharge     from the hospital in the form of a discharge summary. However, if he needs to access the original records at a later stage, he can do so by filing a     request for the same at the Medical Records Department of the hospital. A patient can make amendments or corrections to his records by providing requisite     proof to substantiate the amended information. The patient however at no stage can confirm if the hospital is holding or processing personal information     about him or her with the exception of the provisions provided for the amendment or correction to the information held.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Medical records of a patient in a government hospital are completely sealed. A patient has no access to his own records. Only the concerned doctor who     was treating the patient during his stay at the hospital can access the records of the patient. This doctor has to be necessarily associated with the     hospital and had to have been directly involved in the patient’s treatment in order to access the records. The patient is allowed to amend information in     his medical records but only generic information such as the spelling of his name, his address, telephone number etc. The patient is at no point allowed to     access his own records and therefore cannot confirm if the hospital is holding or processing any information about him/her. The patient is only provided     with a discharge summary that includes his personal information, the details of his disease and the treatment provided in simple language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diagnostic laboratories have an online database of patient records. The patient is given a username and a password and can access the information at any     point. The patient may also amend or correct any information provided by contacting the Medical records department for the same. The patient can at any     time view the status of his record and confirm if it is being held or processed by the hospital. A copy of such information can be obtained by the patient     at any time.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(vi) Disclosure of Information&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Private Hospitals are extremely cautious with regard to the disclosure of patient information. Medical records of patients cannot be accessed by anyone     except the doctor treating that particular patient or consulting on the case. The patient is informed whenever his records are disclosed even to doctors.     Usually, even immediate relatives of the patient cannot access the patient’s records without the consent of the patient except in cases where the condition     of the patient is critical. The patient is always informed about the type and extent of information that may be disclosed whenever it is disclosed. No     information of the patient is made available publicly at any stage. The patient can refuse to consent to sharing of information collected from him/her with     non-authorized agencies. However, in no circumstance is the information collected from him/her shared with non authorized agencies. Some private hospitals     also provide the patient with patient’s safety brochures highlighting the extent of doctor patient confidentiality, the patient’s rights including the     right to withdraw consent at any stage and refuse access of records by unauthorized agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In government hospitals, the medical records of the patient can only be disclosed to authorized agencies with the prior approval of patient. The patient is     made aware of the type and extent of information that is collected from him/her and is mandatorily shared with authorized bodies such as insurance agencies     or the treating doctor. No information of the patient is made publicly available. In cases where the information is shared with insurance agencies or any     such authorized body the patient gives an undertaking via a letter of his consent to such disclosure. The insurance companies only use medical records for     verification purposes and have to do so at the facility. They cannot take any original documents or make copies of the records without the consent of the     patient as provided in the undertaking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diagnostic Laboratories provide information regarding the patient’s medical records only to the concerned or referred doctor. The patient is always     informed of any instance where his information may be disclosed and the consent of the patient is always taken for the same. No information is made     available publicly or shared with unauthorized agencies at any stage. Information regarding the patient’s medical records is not even shared with insurance     companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government and Private Hospitals provide medical records of patients to the police only when a summons for the same has been issued by a judge. Diagnostic     laboratories however do not provide information regarding a patient’s records at any stage to any law enforcement agencies unless there is summons from a     judge specifying exactly the nature and extent of information required.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patients are not made aware of laws which may govern the disclosure of information in private and government hospitals as well as in diagnostic     laboratories. The patient is merely informed that the information provided by him to the medical personnel will remain confidential.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(vii) Security&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The security measures that are put in place to ensure the safety of the collected information is not adequately specified in the forms or during the     collection of information from the patient in Government or Private Hospitals. Diagnostic laboratories however do provide the patient with information     regarding the security measures put in place to ensure the confidentiality of the information.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(viii) Openness&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The information made available to the patient at government and private hospital and diagnostic laboratories is easily intelligible. At every stage of the     procedure the explicit consent of the patient is obtained. In government and private hospitals the signature of the patient is obtained on consent forms at     every stage of the procedure and the nature and extent of the procedure is explained to the patient in a language that he understands and is comfortable     speaking. The information provided is detailed and is provided in simplistic terms so that the patient does at all stages understand the nature of any     procedure he is consenting to undergo.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(ix) Accountability&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Private hospitals and Diagnostic laboratories have internal and external audit mechanisms in place to check the efficacy of privacy measures. They both     have grievance redress mechanisms in the form of patient welfare cells and complaint cells. There is an assigned officer in place to take patient feedback     and address and manage the privacy concerns of the patient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government hospitals do not have an internal or external audit mechanism in place to check the efficacy of privacy measures. There is however a grievance     redressal mechanism in government hospitals in the form of a Public Relations Office that addresses the concerns, complaints, feedback and suggestions of     the patients. There is an officer in charge of addressing and managing the privacy concerns of patients. This officer also offers counseling to the     patients in case of privacy concerns regarding sensitive information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;International Best Practices and Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A. European Union&lt;br /&gt;&lt;/b&gt;An official EU data protection regulation &lt;a href="#_ftn69" name="_ftnref69"&gt;[69]&lt;/a&gt;was issued in January 2012. A key objective of this was to     introduce a uniform policy directive across all member states. The regulation, once implemented was to be applicable in all member states and left no room     for alteration or amendments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulation calls for &lt;b&gt;Privacy Impact Assessments&lt;/b&gt;&lt;a href="#_ftn70" name="_ftnref70"&gt;[70]&lt;/a&gt;when there are specific risks to     privacy which would include profiling, sensitive data related to health, genetic material or biometric information. This is an important step towards     evaluating the nature and extent of privacy regulation required for various procedures and would be effective in the creation of a systematic structure for     the implementation of these regulations. The regulation also established the need for explicit consent for sensitive personal data. The basis for this is     an inherent imbalance in the positions of the data subject and the data controller, or in simpler terms the patient and the hospital or the life sciences     company conducting the research. Thus, implied consent is not enough &lt;a href="#_ftn71" name="_ftnref71"&gt;[71]&lt;/a&gt;and a need arises to proceed with     the testing only when there is &lt;b&gt;explicit informed consent.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Embedded within the regulation is the &lt;b&gt;right to be forgotten &lt;/b&gt;&lt;a href="#_ftn72" name="_ftnref72"&gt;[72]&lt;/a&gt;wherein patients can     request for their data to be deleted after they have been discharged or the clinical trial has been concluded. In the Indian scenario, patient information     is kept for extended periods of time. This can be subject to unauthorized access and misuse. The deletion of patient information once it has been used for     the purpose for which it was collected is thus imperative towards the creation of an environment of privacy protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 81 of the regulation specifies that health data may be processed only for three major processes&lt;a href="#_ftn73" name="_ftnref73"&gt;[73]&lt;/a&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) In cases of Preventative or occupational medicine, medical diagnosis, the care, treatment or management of healthcare services, and in cases where the     data is processed by the healthcare professionals, the data is subject to the obligation of professional secrecy;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) Considerations of public interest bearing a direct nexus to public health, for example, the protection of legitimate cross border threats to health or     ensuring a high standard of quality and safety for medicinal products or services;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c) Or other reasons of public interest such as social protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An added concern is the nature and extent of consent. The consent obtained during a clinical trial may not always be sufficient to cover additional     research even in instances of data being coded adequately. Thus, it may not be possible to anticipate additional research while carrying out initial     research. Article 83&lt;a href="#_ftn74" name="_ftnref74"&gt;[74]&lt;/a&gt; of the regulation prohibits the use of data collected for an additional purpose,     other that the purpose for which it was collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lastly, the regulation covers data that may be transferred outside the EEA, unless there is an additional level of data protection. If a court located     outside the EU makes a request for the disclosure of personal data, prior authorization must be obtained from the local data protection authority before     such transfer is made. It is imperative that this be implemented within Indian legislation as currently there is no mechanism to regulate the cross border     transfer of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;B. The United States of America&lt;br /&gt;&lt;/b&gt;The Health Maintenance Organizations Act, 1973 &lt;a href="#_ftn75" name="_ftnref75"&gt;[75]&lt;/a&gt;was enacted with a view to keep up with the rapid     development in the Information Technology sector. The digitization of personal information led to new forms of threats with regard to the privacy of a     patient. In the face of this threat, the overarching goal of providing effective and yet unobtrusive healthcare still remains paramount.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To this effect, several important federal regulations have been implemented. These include the Privacy and Security Ruled under the Health Insurance Portability and Accountability Act (HIPAA) 1996&lt;a href="#_ftn76" name="_ftnref76"&gt;[76]&lt;/a&gt; and the State Alliance for eHealth (2007)    &lt;a href="#_ftn77" name="_ftnref77"&gt;[77]&lt;/a&gt;.The HIPAA privacy rules addressed the use and subsequent disclosure of a patient's personal     information under various healthcare plans, medical providers, and clearinghouses. These insurance agencies were the primary agents involved in obtaining a     patients information for purposes such as treatment, payment, managing healthcare operations, medical research and subcontracting. Under the HIPAA it is     required of insurance agencies to ensure the implementation of various administrative safeguards such as policies, guidelines, regulations or rules to     monitor and control inter as well as intra organizational access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the HIPAA, approximately 60 laws related to privacy in the healthcare sector have been enacted in more than 34 states. These legislations have     been instrumental in creating awareness about privacy requirements in the healthcare sector and improving the efficiency of data collection and transfer.     Similar legislative initiative is required in the Indian context to aid in the creation of a regulated and secure atmosphere pertaining to the protection     of privacy within the healthcare sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;C. Australia&lt;br /&gt;&lt;/b&gt;Australia has a comprehensive law that deals with sectoral regulations of the right to privacy.An amendment to the Privacy Act1988    &lt;a href="#_ftn78" name="_ftnref78"&gt;[78]&lt;/a&gt;applies to all healthcare providers and was made applicable from 21st December 2001.The privacy Act     includes the followingpractices:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. A stringent requirement for informed consent prior to the collection of health related information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. A provision regarding the information that needs to be provided to individuals before information is collected from them&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. The considerations that have to be taken into account before the transfer of information to third parties such as insurance agencies, including the     specific instances wherein this information can be passed on&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. The details that must be included in the Privacy policy of the healthcare service providers' Privacy Policy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e. The securing and storing of information; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;f. Providing individuals with a right to access their health records.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These provisions are in keeping with the 13 National Privacy &lt;a href="#_ftn79" name="_ftnref79"&gt;[79]&lt;/a&gt;Principles that represent the minimum     standards of privacy regulation with respect to the handling of personal information in the healthcare sector.These guidelines are advisory in nature and     have been issued by the Privacy Commissioner in exercise of his power under Section 27(1)(e) &lt;a href="#_ftn80" name="_ftnref80"&gt;[80]&lt;/a&gt;of the     Privacy Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Act also embodiessimilar privacy principles which include a collection limitation, a definitive use and purpose for the information collected, a     specific set of circumstance and an established protocol for the disclosure of information to third parties including the nature and extent of such     disclosure, maintenance accuracy ofthe data collected, requisite security measures to ensure the data collected is at all times protected, a sense of     transparency,accountability and openness in the administrative functioning of thehealthcare provider and accessibility of the patient to his ownrecords for     the purpose of viewing, corroboration or correction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the Act includes the system of identifiers which includes a number assigned by the organization to an individual to identify the purpose of     that person's data for the operation of the organization. Further, the Act provides for anonymity wherein individuals have the optionnot to identify     themselves while entering into transactions with an organization. The Act also provides for restrictions on the transfer of personal data outside Australia     and establishes conclusive and stringent barriers to the extent of collection of personal and sensitive data.These principles although vaguely similar to     those highlighted in the A.P. Shah Committee report can be usedto streamline the regulations pertaining to privacy in the healthcare sector and make them     more efficient.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Key Recommendations&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is Imperative that Privacy concerns relating to the transnational flow of Private data be addressed in the most efficient way possible. This would     involve international cooperation and collaboration to address privacy concerns including clear provisions and the development of coherent minimum     standards pertaining to international data transfer agreements. This exchange of ideas and multilateral deliberation would result in creating more     efficient methods of applying the provisions of privacy legislation even within domestic jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a universal need for the development of a foundational structure for the physical collection, use and storage of human biological specimens (in     contrast to the personalinformation that may be derived from those specimens) as these are extremely important aspects of biomedical research and clinical     trials. The need for Privacy Impact Assessments would also arise in the context of clinical trials, research studies and the gathering of biomedical data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, there also arises the need for patients to be allowed to request for the deletion of their personal information once it has served the purpose for     which it was obtained. The keeping of records for extended periods of time by hospitals and laboratories is unnecessary and can often result in the     unauthorized access to and subsequent misuse of such data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a definitive need to ensure the incorporation of safeguards to regulate the protection of patient’s data once accessed by third parties, such as     insurance companies. In the Indian Context as well as insurance agencies often have unrestricted access to a patient's medical records however there is a     definitive lack of sufficient safeguards to ensure that this information is not released to or access by unauthorized persons either within these insurance     agencies or outsourced consultants&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system of identifiers which allocate specific numbers to an individual’s data which can only be accessed using that specific number or series of     numbers can be incorporated into the Indian system as well and can simplify the administrative process thus increasing its efficacy. This would afford     individuals the privilege of anonymity while entering into transactions with specific healthcare institutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An important means of responding to public concerns over potential unauthorized use ofpersonal information gathered for research, could be through the issuing of Certificates of confidentiality as issued in the United States to protectsensitive information on research participants from forced disclosure.    &lt;a href="#_ftn81" name="_ftnref81"&gt;[81]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, it is imperative that frequent discussions, deliberations, conferences and roundtables take place involving multiple stakeholders form the     healthcare sector, insurance companies, patient’s rights advocacy groups and the government. This would aid in evolving a comprehensive policy that would     aid in the protection of privacy in the healthcare sector in an efficient and collusive manner.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Right to Privacy has been embodied in a multitude of domestic legislations pertaining to the healthcare sector. The privacy principles envisioned in     the A.P Shah Committee report have also been incorporated into the everyday practices of healthcare institutions to the greatest possible extent. There are     however significant gaps in the policy formulation that essentially do not account for the data once it has been collected or its subsequent transfer.     There is thus an imminent need for institutional collaboration in order to redress these gaps. Recommendations for the same have been made in the report.     However, for an effective framework to be laid down there is still a need for the State to play an active role in enabling the engagement between different     institutions both in the private and public domain across a multitude of sectors including insurance companies, online servers that are used to harbour a     data base of patient records and civil action groups that demand patient privacy while at the same time seek to access records under the Right to     Information Act. The collaborative efforts of these multiple stakeholders will ensure the creation of a strong foundational framework upon which the Right     to Privacy can be efficiently constructed.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; . Report of the group of experts on Privacy chaired by Justice A.P Shah &amp;lt;http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&amp;gt;             [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; . Nissenbaum, H. (2004). Privacy as Contextual Integrity. &lt;i&gt;Washington Law Review&lt;/i&gt;, &lt;i&gt;79&lt;/i&gt;(1), 101-139.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; . &lt;i&gt;Ibid.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; . Thomas, J. (2009). Medical Records and Issues in Negligence,            &lt;i&gt;Indian Journal of Urology : IJU : Journal of the Urological Society of India&lt;/i&gt;, &lt;i&gt;25&lt;/i&gt;(3), 384-388. doi:10.4103/0970-1591.56208.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;i&gt;. Ibid &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; . Plaza, J., &amp;amp;Fischbach, R. (n.d.). Current Issues in Research Ethics : Privacy and Confidentiality. Retrieved December 5, 2011, from             http://ccnmtl.columbia.edu/projects/cire/pac/foundation/index.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; . &lt;i&gt;Ibid.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; . The Mental Health Act, 1987 &amp;lt;https://sadm.maharashtra.gov.in/sadm/GRs/Mental%20health%20act.pdf&amp;gt; [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; . The Mental Health Act, 1987, s. 13(1).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; .The Mental Health Act, 1987, s. 38.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; .The Mental Health Act, 1987, s. 40.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; .The Mental Health Act, 1987, s. 21(2).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; .The Mental Health Act, 1987, s. 13(1), &lt;i&gt;Proviso&lt;/i&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; . Also see the: Pre-Conception and and Pre-Natal Diagnostic Techniques (Prohibition of Sex Selection) Rules, 1996.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; . Pre-Conception and Pre-Natal Diagnostic Techniques (Prohibition of Sex Selection) Act, 1994, s. 4(3).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; . Pre-Conception and Pre-Natal Diagnostic Techniques (Prohibition of Sex Selection) Act, 1994, s. 4(2). Pre-natal diagnostic techniques shall be             conducted for the purposes of detection of: chromosomal abnormalities, genetic metabolic diseases, haemoglobinopathies, sex-linked genetic             diseases, congenital anomalies any other abnormalities or diseases as may be specified by the Central Supervisory Board.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; .Medical Termination of Pregnancy Amendment Act, 2002, Notification on Medical Termination of Pregnancy (Amendment) Act, Medical Termination of             Pregnancy Regulations, 2003 and Medical Termination of Pregnancy Rules, 2003.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; .Medical Termination of Pregnancy Act, 1971 (Amended in 2002), s. 2(4) and 4, and Medical Termination of Pregnancy Rules, 2003, Rule 8&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; .Medical Termination of Pregnancy Regulations, 2003, Regulation 4(5).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; .Medical Termination of Pregnancy Regulations, 2003, Regulation 5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; .Medical Termination of Pregnancy Regulations, 2003, Regulation 4(2).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; .Medical Termination of Pregnancy Regulations, 2003, Regulations 4(2) and 4(4).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; &lt;i&gt;. Code of Ethics Regulations, 2002&lt;/i&gt; available at&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.mciindia.org/RulesandRegulations/CodeofMedicalEthicsRegulations2002.aspx"&gt; http://www.mciindia.org/RulesandRegulations/CodeofMedicalEthicsRegulations2002.aspx &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; . &lt;i&gt;Code of Ethics Regulations,&lt;/i&gt; 2002 Chapter 2, Section 2.2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; .&lt;i&gt;Ethical Guidelines for Biomedical Research&lt;/i&gt;&lt;i&gt; on &lt;/i&gt;&lt;i&gt;Human Subjects&lt;/i&gt;. (2006) Indian &lt;i&gt;Council&lt;/i&gt; of Medical Research New             Delhi.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; . Informed Consent Process, &lt;i&gt;Ethical Guidelines for Biomedical Research&lt;/i&gt;on&lt;i&gt;Human Subjects (2006)&lt;/i&gt;&lt;i&gt;.&lt;/i&gt; Indian &lt;i&gt;Council&lt;/i&gt; of Medical Research New Delhi.P. 21.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; . Statement of Specific Principles for Human Genetics Research, &lt;i&gt;Ethical Guidelines for Biomedical Research&lt;/i&gt;on&lt;i&gt;Human Subjects (2000)&lt;/i&gt; &lt;i&gt;.&lt;/i&gt; Indian &lt;i&gt;Council&lt;/i&gt; of Medical Research New Delhi.P. 62.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; . General Ethical I&lt;i&gt;ssues. Ethical Guidelines for Biomedical Research&lt;/i&gt;on&lt;i&gt;Human Subjects (2006)&lt;/i&gt;&lt;i&gt;.&lt;/i&gt; Indian &lt;i&gt;Council&lt;/i&gt; of             Medical Research New Delhi.P. 29.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; . Statement of Specific Principles for Epidemiological Studies, &lt;i&gt;Ethical Guidelines for Biomedical Research&lt;/i&gt;on&lt;i&gt;Human Subjects (2000)&lt;/i&gt; &lt;i&gt;.&lt;/i&gt; Indian &lt;i&gt;Council&lt;/i&gt; of Medical Research New Delhi P. 56.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; . Statement of General Principles, Principle IV and Essential Information on Confidentiality for Prospective Research Participants,            &lt;i&gt;Ethical Guidelines for Biomedical Research&lt;/i&gt;on&lt;i&gt;Human Subjects (2006)&lt;/i&gt;&lt;i&gt;.&lt;/i&gt; Indian &lt;i&gt;Council&lt;/i&gt; of Medical Research New             Delhi.P. 29.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; . The IRDA (Third Party Administrators - Health Services) Regulations 2001, (2001), Chapter 5. Section 2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; . The IRDA (Sharing Of Database for Distribution of Insurance Products) Regulations 2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; . The IRDA (Sharing Of Database For Distribution Of Insurance Products) Regulations 2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; . The IRDA (Sharing Of Database For Distribution Of Insurance Products) Regulations 2010&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; . List of TPAs Updated as on 19th December, 2011, Insurance Regulatory and Development Authority (2011),             http://www.irda.gov.in/ADMINCMS/cms/NormalData_Layout.aspx?page=PageNo646 (last visited Dec 19, 2011).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; . The IRDA, Guideline on Outsourcing of Activities by Insurance Companies, (2011).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; . The IRDA, Guideline on Outsourcing of Activities by Insurance Companies, (2011), Section 9.11. P. 8. &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; .&lt;i&gt;The Epidemic Diseases Act&lt;/i&gt;, 1897.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; .&lt;i&gt;The Epidemic Diseases Act&lt;/i&gt;, 1897. s. 2.1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; .&lt;i&gt;The Epidemic Diseases Act&lt;/i&gt;, 1897, s. 2.2(b).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; . The National Policy for Persons with Disabilities, 2006, Persons with Disabilities (Equal Opportunities, Protection of Rights and Full             Participation) Act, 1995, Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Rules, 1996.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; . Research, National Policy for Persons with Disabilities, 1993.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; . Survey of Disabled Persons in India. (December 2003) National Sample Survey Organization. Ministry of Statistics and Programme Implementation.             Government of India.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; .Persons With Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act. 1995, Section 35.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt;. Research. National Policy for Persons with Disabilities, 2003.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt;. http://www.lawyerscollective.org/files/Anti%20rights%20practices%20in%20Targetted%20Interventions.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt;. http://www.lawyerscollective.org/files/Anti%20rights%20practices%20in%20Targetted%20Interventions.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt;. Aneka, Karnataka Sexual Minorities Forum. (2011)“Chasing Numbers, Betraying People: Relooking at HIV Services in Karnataka”, p.22.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt;. Aneka, Karnataka Sexual Minorities Forum. (2011)“Chasing Numbers, Betraying People: Relooking at HIV Services in Karnataka”, p.16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt;. Aneka, Karnataka Sexual Minorities Forum. (2011)“Chasing Numbers, Betraying People: Relooking at HIV Services in Karnataka”, p.16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt;. Aneka, Karnataka Sexual Minorities Forum. (2011)“Chasing Numbers, Betraying People: Relooking at HIV Services in Karnataka”, p.14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt;. http://www.hivaidsonline.in/index.php/HIV-Human-Rights/legal-issues-that-arise-in-the-hiv-context.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt;. Chakrapani et al, (2008) ‘HIV Testing Barriers and Facilitators among Populations at-risk in Chennai, India’, INP, p 12.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt;. Aneka, Karnataka Sexual Minorities Forum. (2011)“Chasing Numbers, Betraying People: Relooking at HIV Services in Karnataka”, p.24.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; .&lt;a href="http://www.indiankanoon.org/doc/570038/"&gt;http://www.indiankanoon.org/doc/570038/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; .&lt;a href="http://www.indiankanoon.org/doc/570038/"&gt;http://www.indiankanoon.org/doc/570038/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; .&lt;a href="http://www.indiankanoon.org/doc/680703/"&gt;http://www.indiankanoon.org/doc/680703/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; . No person accused of any offence shall be compelled to be a witness against himself’, (the 'right to silence').&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; . http://indiankanoon.org/doc/338008/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; . http://www.hrdc.net/sahrdc/hrfeatures/HRF205.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; . AIR 1992 SC 392.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; . 96 (2002) DLT 354.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; .AIR 2000 A.P 156.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; .&lt;a href="http://indiankanoon.org/doc/382721/"&gt;http://indiankanoon.org/doc/382721/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; .&lt;a href="http://indiankanoon.org/doc/859256/"&gt;http://indiankanoon.org/doc/859256/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; .See Sections 24, 37, 38 and 39 of The Prisons Act, 1894 (Central Act 9 of 1894) Rules 583 to 653 (Chapter XXXV) and Rules 1007 to 1014 (Chapter             LVII) of Andhra Pradesh Prisons Rules, 1979&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; .Section 10-A,17(4) ,19(2) Immoral Traffic (Prevention) Act 1956&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; .&lt;a href="http://www.indiankanoon.org/doc/1309207/"&gt;http://www.indiankanoon.org/doc/1309207/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; . http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; . Article 33, Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL&lt;/p&gt;
&lt;p&gt;on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection             Regulation) &amp;lt; http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf&amp;gt; [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May, 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; .Article 4 (Definition of “Data Subject’s Consent”), Article 7, Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL&lt;/p&gt;
&lt;p&gt;on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection             Regulation) &amp;lt; http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf&amp;gt; [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May, 2014].&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; . Article 17, “Safeguarding Privacy in a Connected World – A European Data Protection Framework for the 21st&lt;/p&gt;
&lt;p&gt;Century” COM(2012) 9 final. Based on, Article 12(b), EU Directive 95/46/EC – The Data Protection Directive at             &amp;lt;http://www.dataprotection.ie/docs/EU-Directive-95-46-EC-Chapter-2/93.htm&amp;gt; [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May, 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; . Article 81, Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL&lt;/p&gt;
&lt;p&gt;on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection             Regulation) &amp;lt; http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf&amp;gt; [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May, 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; .Article 83, Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL&lt;/p&gt;
&lt;p&gt;on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection             Regulation) &amp;lt; http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf&amp;gt; [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May, 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; . Health Maintainence and Organization Act 1973, Notes and Brief Reports available at http://www.ssa.gov/policy/docs/ssb/v37n3/v37n3p35.pdf             [Accessed on 14th May 2014].&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; . Health Insurance Portability and Accountability Act, 1996 available at             http://www.hhs.gov/ocr/privacy/hipaa/administrative/statute/hipaastatutepdf.pdf [Accessed on 14th May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; . Illinois Alliance for Health Innovation plan available at http://www2.illinois.gov/gov/healthcarereform/Documents/Alliance/Alliance%20011614.pdf             [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; . The Privacy Act 1988 available at http://www.comlaw.gov.au/Series/C2004A03712 [Accessed on 14th May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; . Schedule 1, Privacy Act 1988 [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; .Section 27(e), Privacy Act 1988 [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; . Guidance on Certificates of Confidentiality, Office of Human Research Protections, U.S Department of Health and Human Services available at             http://www.hhs.gov/ohrp/policy/certconf.pdf [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May, 2014].&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-in-healthcare-policy-guide'&gt;https://cis-india.org/internet-governance/blog/privacy-in-healthcare-policy-guide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tanvi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-31T15:18:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
