<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 991 to 1005.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/iisc-students-boycott-uid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/google-move-is-not-good-for-netizens-say-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-needs-an-independent-privacy-law-says-ngo-privacy-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-april-13-2016-why-is-uidai-cracking-down-on-individuals-that-hoard-aadhaar-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-finnish-data-protection-ombudsman"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hoot-july-13-2013-chinmayi-arun-parsing-the-cyber-security-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/eight-key-privacy-events-in-india-in-the-year-2015"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/iisc-students-boycott-uid">
    <title>IISc students boycott UID, don’t want Big Brother to keep watch</title>
    <link>https://cis-india.org/news/iisc-students-boycott-uid</link>
    <description>
        &lt;b&gt;The programme doesn’t have statutory backing. It is still in parliament &lt;/b&gt;
        
&lt;p&gt;Nandan Nilekani may be Bangalore’s blue-eyed boy making waves at the national level with his Unique Identification Number (UID), but there’s one part of the city that’s not impressed: A section of students and faculty of Indian Institute of Science (IISc).&lt;/p&gt;
&lt;p&gt;While many Bangaloreans have started enrolling for UID, the students are in boycott mode and say they will never do so.&lt;/p&gt;
&lt;p&gt;Professor Shiv Sethi, astrophysics department, Raman Research Institute, said, “They (the authorities) have moved faster than us by starting the enrolment. It was during the discussion phase that we tried to impress upon them the loopholes of UID. Now that they have started the enrolment, it’s our turn to protest. We will meet and discuss with other like-minded people.”&lt;/p&gt;
&lt;p&gt;IIScians say they don’t want to be under surveillance and that they are not comfortable with giving away their personal details since studies have proved how unsafe electronic data can be. The programme has been scrapped in the UK, they said.&lt;/p&gt;
&lt;p&gt;In fact, when Nilekani visited IISc a few months back to deliver a lecture, the anti-UID group protested with placards and banners that read, ‘Beware, Big Brother is watching you’ and ‘Secure electronic archive is a myth’.&lt;/p&gt;
&lt;p&gt;And now, apart from not signing up, some students are even considering burning copies of UID forms, a la team Anna burning copies of the draft Lokpal bill.&lt;/p&gt;
&lt;p&gt;Prathamesh, a scholar, said: “UID is not going to solve problems of leakages. The government should universalise the PDS system to control misuse of subsidised foodgrain that find their way to restaurants. The project is fraught with loopholes and doesn’t have statutory backing. I will burn copies of the forms.”&lt;/p&gt;
&lt;p&gt;Prathamesh added that the UID project was the brainwave of software companies who do not have a regular stream of revenue.&lt;/p&gt;
&lt;p&gt;Even IISc alumni are putting up a fight. One of them who participated in the protest said, “I will not register. The programme does not have statutory backing. It is still in parliament. First, they said it was voluntary. Now, they are trying to link it to banks, LPG connections and other utilities.”&lt;/p&gt;
&lt;p&gt;Sethi added, “A few people have approached the court. We will decide the next course of action.”&lt;/p&gt;
&lt;p&gt;There are others who have doubts. Consumer activist Chandrasekhar of Malle-swaram feels that he needs to clarify all his doubts before enrolling. “I spoke with the officials. They told me it was voluntary. But now, it looks like they are linking it with other utilities.”&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Nishant Shah, director, research, Centre for Internet Society, said, "We need to check for three issues: data retention, data protection and data privacy. Only after these issues are resolved can we have a UID for every citizen."&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;This article by&amp;nbsp;Sameer Ranjan Bakshi was published in the Bangalore Mirror on August 23, 2011. The original story can be read &lt;a class="external-link" href="http://www.bangaloremirror.com/article/10/20110823201108230010571621d4f13b8/IISc-students-boycott-UID-don%E2%80%99t-want-Big-Brother-to-keep-watch.html"&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/iisc-students-boycott-uid'&gt;https://cis-india.org/news/iisc-students-boycott-uid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-23T08:24:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases">
    <title>Privacy and Governmental Databases</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases</link>
    <description>
        &lt;b&gt;In our research we have found that most government databases are incrementally designed in response to developments and improvements that need to be incorporated from time to time. This method of architecting a system leads to a poorly designed database with many privacy risks such as: inaccurate data, incomplete data, inappropriate disclosure of data, inappropriate access to data, and inappropriate security over data. To address these privacy concerns it is important to analyze the problem that is being addressed from the perspective of potential and planned interoperability with other government databases. Below is a list of problems and recommendations concerning privacy, concerning government databases. &lt;/b&gt;
        
&lt;h2&gt;Government Databases and recommendations for privacy practices&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Citizen-State relationships and privacy standards&lt;/strong&gt;&lt;br /&gt;Government databases foster different types of relationships between the state and its citizenry. For instance: User databases, service providing databases, and information providing databases. Each one these relationships requires a different level of privacy. Thus, it is important to identify the type of relationship that the database will foster in order to determine what type of privacy model to implement.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Specific privacy policy &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Each government database should have a specific privacy policy that are tailored to the information that they hold. Each policy should cover the following areas:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;data collection&lt;/li&gt;&lt;li&gt;digitization&lt;/li&gt;&lt;li&gt;usage&lt;/li&gt;&lt;li&gt;storage&lt;/li&gt;&lt;li&gt;security&lt;/li&gt;&lt;li&gt;disclosure&lt;/li&gt;&lt;li&gt;retrieval&lt;/li&gt;&lt;li&gt;access (inter departmental and public)&lt;/li&gt;&lt;li&gt;anonymization, obfuscation and deletion.&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Personal vs. personal sensitive and public vs. non-public data categories &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Data in government databases requires varying degrees of privacy safeguards. The division of personal information vs. non personal information etc. creates distinct&lt;/p&gt;
&lt;p&gt;categories for security levels over data and permissibility of public disclosure. Ex of personal information: Name, address, telephone number, religion. Ex of non-personal data: gender, age. This could work to avoid situations such as the census - where a person’s name, address, age, etc, were all printed for the public eye.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Standardization of Privacy Policies and Access Control &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Government databases should all be designed upon interoperable standards so that the databases can "talk" to each other. The ability to coalesce databases strengthens the potential for use and reuse by different stakeholders. Furthermore, the interoperability of systems helps to avoid the creation of silos that hold multiple copies of the same data. To protect the privacy in interoperable systems - restricted and authorized access within departments and between departments is key. The Department of Information Technology has recently published a "Government Interoperability Framework" titled "Interoperability Framework for eGovernance" This policy document is the appropriate place to articulate interoperable privacy policies that could be adopted across eGovernance projects.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Record of breach notification &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If data breach occurs in government database, the breach should be recorded and the appropriate individuals notified.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Anonymization/obfuscation and deletion policies &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Once the purpose for which the data has been collected has been served it must be anonymized/obfuscated or deleted as appropriate. All data-sets cannot be deleted as bulk aggregate data is very useful to those interested in trend analysis. Anonymizing/obfuscating the personal details of a data set ensures that privacy is protected during such trend analysis.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Accountability for accuracy of data &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Frequently data that is collected and entered into government databases is not accurate, because the departments are not collecting the data themselves. Thus, they feel no responsibility for its accuracy. If a mechanism is built into each database for identification of each data source this brings accountability for data accuracy.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Appropriate uses of government databases &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Businesses should feel automatically entitled to aggregate and consolidate public information from government databases because it is technically possible to do so. Their uses of government database must be guided by policies that define "appropriate usage."&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Access, updation and control of personal information &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Citizens must be able to access and update their information. Furthermore, they should be able to define to a certain extent access control to their information - which would automatically make them eligible or ineligible for various government services.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Bibliography &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Rezhui, Abdemounaam. Preserving Privacy in Web Services. Department of Computer Sciences, Virginia Tech.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Medjahed, Brahim. Infrastructure for E-Government Web Services. IEEE Internet Computing, Virgina Tech. January/Feburary 2003.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Mladen, Karen. A Report of Research on Privacy for Electronic Government. Privacy in Canada&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; joi.ito.com/privacyreport/Contents_Distilled/.../Canada_E_p252-314.pdf&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:41:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance">
    <title>The India Conference on Cyber Security and Cyber Governance</title>
    <link>https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance</link>
    <description>
        &lt;b&gt;Following the success of CYFY 2013 the CYFY 2014 will be held from October 15 to 17, 2014 in New Delhi. The Centre for Internet and Society is a knowledge partner for this event and Sunil Abraham is participating as a panelist in the session "Privacy is Dead". &lt;/b&gt;
        &lt;p&gt;Click to &lt;a href="https://cis-india.org/internet-governance/blog/cyfy-2014-event-programme.pdf" class="internal-link"&gt;download the event details&lt;/a&gt;. The event brochure can be &lt;a href="https://cis-india.org/internet-governance/blog/cyfy-2014-brochure.pdf" class="external-link"&gt;downloaded here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance'&gt;https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-10-13T07:10:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue">
    <title>The Gujarat High Court Judgment on the Snoopgate Issue </title>
    <link>https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Pranlal N. Soni v. State of Gujarat, C/SCA/14389/2014&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the year 2013 the media widely reported that a female civil services officer was regularly spied upon in 2009 due to her acquaintance with the then Chief Minister of Gujarat (and current Prime Minister of India) Mr. Narendra Modi. It was reported that the surveillance was being supervised by the current president of the BJP, Mr. Amit Shah at the behest of Mr. Modi. The case took another twist when the officer and her father said that they had no problems with such surveillance, and had repeatedly conveyed to various statutory authorities including the National Commission for Women, the State Commission for Women, as also before the Hon’ble Supreme Court of India, that they never felt that their privacy was being interfered with by any of the actions of the State Authorities. Infact, para 3.5 of the petition indicated that it was at the behest of the father of the female officer that the State government had carried out the surveillance on his daughter as a security measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Inspite of the repeated claims of the subject of surveillance and her father, the Gujarat Government passed a Notification under the Commissions of Inquiry Act, 1952 appointing a two member Commission of Inquiry to enquire into this incident without jeopardizing the identity or interest of the female officer. This Notification was challenged in the Gujarat High Court by the very same female officer and her father on the ground that it violated their fundamental right to life and liberty. The petitioners claimed that they had to change their residential accommodation four times in the preceding few months due to the constant media glare. The print, electronic and social media, so called social workers and other busybodies constantly intruded into the private life of the petitioners and their family members. The petitioner's email accounts were hacked and scores of indecent calls were received from all over. Under the guise of protecting the petitioner's privacy, every action undertaken by the so called custodians for and on behalf of the petitioners resulted into a breach of privacy of the petitioners, making life impossible for them on a day to day basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After hearing the arguments of the petitioners, including arguments on technical points the Court struck down the Notification issued by the State government to enquire into the issue of the alleged illegal surveillance. However the Court also briefly touched upon the issue of violation of the privacy of the female officer in this whole episode. However, instead of enquiring into whether there was any breach of privacy in the facts of the case, the Court relied upon the statement made by the female officer that whatever surveillance was done did not cause any invasion into her privacy, rather it was the unwelcome media glare that followed the revelations regarding the surveillance which had caused an invasion of her privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus we see that even though the whole snoopgate episode started out as one of “alleged” unwarranted and illegal surveillance this particular judgment is limited only to challenging the validity of the Inquiry Commission appointed by the State Government. In order to challenge the Notification in a PIL the female officer had to show that some fundamental right of hers was violated and in such circumstances privacy is the most obvious fundamental right which was violated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although this judgment talks about privacy, it does not have enough legal analysis of the right to privacy to have any significant ramifications for how privacy is interpreted in the Indian context. The only issue that could possibly be of some importance is that the we could interpret the Court’s reliance on the statement of the female officer that there was no breach of privacy rather than its own examination of facts to mean that in cases of breach of privacy, if the person whose privacy has been breached did not feel his or her privacy to have been invaded then the Courts would rely on the person’s statements rather than the facts. However this is only an interpretation from the facts and it does not seem that the Court has spent any significant amount of time to examine this issue, therefore it may not be prudent to consider this as establishing any legal principle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Note&lt;/b&gt;: The details of the case as well as the judgment can be found at &lt;a href="http://gujarathc-casestatus.nic.in/gujarathc/tabhome.jsp"&gt;http://gujarathc-casestatus.nic.in/gujarathc/tabhome.jsp&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue'&gt;https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-10-27T04:40:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/google-move-is-not-good-for-netizens-say-experts">
    <title>Google move is not good for netizens, say experts</title>
    <link>https://cis-india.org/news/google-move-is-not-good-for-netizens-say-experts</link>
    <description>
        &lt;b&gt;Google's plan to merge data across 60 of its properties, which was announced last week, has drawn criticism from experts on the Internet, who are saying that this is detrimental to privacy. Balaji Narasimhan wrote this in the Hindu Business Line. The article was published on 31 January 2012.&lt;/b&gt;
        
&lt;p&gt;"Google is doing what is good for shareholders. This is not positive for netizens,” said Mr Sunil Abraham, Executive Director, Centre for Internet and Society. “People like you and me have to either accept it or leave."&lt;/p&gt;
&lt;p&gt;But what are the alternatives? Mr Somick Goswami, Director Consulting, PwC India, didn't want to comment directly on Google, but in the larger context of data privacy, he asked, "Do users want a free Internet or control over content? There is a lot of advocacy going around it. End of the day, when using the Internet, there has to be trust."&lt;/p&gt;
&lt;p&gt;One way that Google could build trust could be by using something pertaining to loyalty, which retailers use in the real world in order to woo customers.&lt;/p&gt;
&lt;p&gt;Mr Ram Menon, Executive Vice-President and Chief Technology Officer of Tibco, said that many of his clients make offers that are in context with what users want.&lt;/p&gt;
&lt;p&gt;"For example, if you like cappuccino and this knowledge is known to a vendor, he can offer you a cappuccino when you walk past the store." He said that in such cases, there was no affront to privacy because the offer is relevant and in context. "You are a member and have opted in," he said.&lt;/p&gt;
&lt;p&gt;Perhaps, the fact that all of Google's services are free has something to do with the privacy issue, pointed out the Australian Privacy Foundation. As its site privacy.org.au noted, "The company's business model is based on advertising revenue. Users pay no fees for their use of the services."&lt;/p&gt;
&lt;p&gt;And the merger of its 60 policies apart, there is another issue worrying users — new acquisitions. As Mr Abraham pointed out, “When I was browsing Silk Smitha before YouTube was acquired by Google, I had no idea that one day this information would be known to Google."&lt;/p&gt;
&lt;p&gt;And the issue becomes more serious in the context of a growing mobile workforce. As the Australian Privacy Foundation said, "Android mobile phones effectively trap users into having a Google user account."&lt;/p&gt;
&lt;p&gt;Using Google services on a mobile – especially Google Latitude, a service that allows you to enable your friends to view your current location – allows Google to track your movements.&lt;/p&gt;
&lt;p&gt;And since Google is predominantly an advertising-driven company, it could be argued that one day they might share information about you with a third party, enabling them to market to you more effectively, though this may not necessarily be done with your explicit permission – and this means that you may get an offer for products even if you have not opted in for such a service.&lt;/p&gt;
&lt;p&gt;What can be done? Mr Abraham rued the fact that there are no specific laws to safeguard users.&lt;/p&gt;
&lt;p&gt;"India needs privacy laws. In the US, law makers will create a fuss. In India, we are at the mercy of companies."&lt;/p&gt;
&lt;p&gt;The original was published in the &lt;a class="external-link" href="http://www.thehindubusinessline.com/industry-and-economy/info-tech/article2848166.ece"&gt;Hindu Business Line&lt;/a&gt;. Sunil Abraham is quoted in this article. &lt;a class="external-link" href="http://www.thehindubusinessline.com/industry-and-economy/info-tech/article2848166.ece"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/google-move-is-not-good-for-netizens-say-experts'&gt;https://cis-india.org/news/google-move-is-not-good-for-netizens-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-03T10:03:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-needs-an-independent-privacy-law-says-ngo-privacy-india">
    <title>India needs an independent privacy law, says NGO Privacy India</title>
    <link>https://cis-india.org/news/india-needs-an-independent-privacy-law-says-ngo-privacy-india</link>
    <description>
        &lt;b&gt;India needs an independent privacy law though there are a number of provisions in existing legislations that protect a citizen's privacy, according to an NGO that is lobbying for the cause. The story was published in the Economic Times on 2 February 2012. 
&lt;/b&gt;
        
&lt;p&gt;&lt;br /&gt;Privacy India, a conglomerate of the Centre for Internet and Society (CIS) and the Society in Action Group (SAG), with support from Privacy International, conducted a study of the existing laws in India related to privacy over a period of one and a half years in various cities.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A report, which will be released soon, has documented their findings about privacy laws and issues in India and high-level conclave and a national symposium on privacy will be held in Delhi on February 3 and 4.&lt;br /&gt;&lt;br /&gt;Lawyer-activist Prashant Bhushan and NCPRI head Aruna Roy will take part in the discussions on privacy in transparency, e-governance initiatives, national security, banking and health issues.&lt;br /&gt;&lt;br /&gt;"India doesn't have a privacy law, but there are provisions for it in different laws. During the course of the research, we found that the Indian judiciary has not been very strict in overseeing the implementation of the privacy clauses in various laws," CIS member Prashant Iyengar said, while reporting some of the findings of the study.&lt;br /&gt;&lt;br /&gt;Stricter implementation of the existing laws could go a long way in curbing most privacy issues, Iyengar said.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://economictimes.indiatimes.com/news/news-by-industry/et-cetera/india-needs-an-independent-privacy-law-says-ngo-privacy-india/articleshow/11727558.cms"&gt;Published in the Economic Times on 2 February 2012&lt;/a&gt;. Prashant Iyengar is quoted in this.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-needs-an-independent-privacy-law-says-ngo-privacy-india'&gt;https://cis-india.org/news/india-needs-an-independent-privacy-law-says-ngo-privacy-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-03T11:46:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india">
    <title>Aadhaar Act and its Non-compliance with Data Protection Law in India</title>
    <link>https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india</link>
    <description>
        &lt;b&gt;This post compares the provisions of the Aadhaar Act, 2016, with India's data protection regime as articulated in the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the file: &lt;a href="https://cis-india.org/internet-governance/blog/aadhaar-act-43a-it-rules" class="internal-link"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Amidst all the hue and cry, the Aadhaar Act 2016, which was introduced with the aim of providing statutory backing to the use of Aadhaar, was passed in the Lok Sabha in its original form on March 16, 2016, after rejecting the recommendations made by Rajya Sabha &lt;a name="_ftnref1"&gt;&lt;/a&gt; . Though the Act has been vehemently opposed on several grounds, one of the concerns that has been voiced is regarding privacy and protection of the 	demographic and biometric information collected for the purpose of issuing the Aadhaar number.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In India, for the purpose of data protection, a body corporate is subject to section 43A of the Information Technology Act, 2000 ("&lt;strong&gt;IT Act&lt;/strong&gt; ") and subsequent Rules, i.e. -The Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 	2011 ("&lt;strong&gt;IT Rules&lt;/strong&gt;"). Section 43A of the IT Act, 2000 &lt;a name="_ftnref2"&gt;&lt;/a&gt; holds a body corporate, which is possessing, dealing or handling any sensitive personal data or information, and is negligent in implementing and maintaining reasonable security practices resulting in wrongful loss or wrongful gain to any person, liable to compensate the affected person and pay damages.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Rule 3 of the IT Rules enlists personal information that would amount to Sensitive personal data or information of a person and includes the biometric information. Even the Aadhaar Act states under section 30 that the biometric information collected shall be deemed as "sensitive personal data or information", which shall have the same meaning as assigned to it in clause (iii) of the Explanation to section 43A of the IT Act; this reflects that biometric data collected in the Aadhaar scheme will receive the same level of protection as is provided to other sensitive personal data under Indian law. This implies that, the agencies contracted by the UIDAI (and not the UIDAI itself) to perform functions like collection, authentication, etc. like the 	Registrars, Enrolling Agencies and Requesting Entities, which meet the criteria of being a 'body corporate' as defined in section 43A, &lt;a name="_ftnref3"&gt;&lt;/a&gt; could be held responsible under this provision, as well as the Rules, to ensure security of the data and information of Aadhaar holder and could potentially be held liable for breach of information that results in loss to an individual if it can be proven that they failed to implement reasonable 	security practices and procedures.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In light of the fact that some actors in the Aadhaar scheme could be held accountable and liable under section 43A and associated Rules, this article compares the regulations regarding data security as found in section 43A and IT Rules 2011 with the provisions of Aadhaar Act 2016, and discusses the 	implications of the differences, if any.&lt;/p&gt;
&lt;h3&gt;1. Compensation and Penalty&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 43A:&lt;/strong&gt; Section 43A of the IT Act, 2000 (Amended in 2008) provides for compensation for failure to protect data. It states that a body corporate, which is 	possessing, dealing or handling any sensitive personal data or information, and is negligent in implementing and maintaining reasonable security practices 	resulting in wrongful loss or wrongful gain to any person, is liable to compensate the affected person and pay damages not exceeding five crore rupees.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar&lt;/strong&gt; &lt;strong&gt;Act :&lt;/strong&gt; Chapter VII of the Act provides for offences and penalties, but does not talk about damages to the affected party.&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Section 37 states that intentional disclosure or dissemination of identity information, to any person not authorised under the Aadhaar Act, or in violation of any agreement entered into under the Act, will be punishable with imprisonment up to three years or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company). &lt;/li&gt;
&lt;li&gt;Section 38 prescribes penalty with imprisonment up to three years and a fine not less than ten lakh rupees in case any of the acts listed under the provision are performed without authorisation from the UIDAI. &lt;/li&gt;
&lt;li&gt;Section 39 prescribes penalty with imprisonment for a term which may extend to three years and fine which may extend to ten thousand rupees for tampering with data in Central Identities Data Repository. &lt;/li&gt;
&lt;li&gt;Section 40 holds a requesting entity liable for penalty for use of identity information in violation of Section 8 (3) with imprisonment up to three years and/or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company). &lt;/li&gt;
&lt;li&gt;Section 41 holds a requesting entity or enrolling agency liable for penalty for violation of Section 8 (3) or Section 3 (2) with imprisonment up to one year and/or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company). &lt;/li&gt;
&lt;li&gt;Section 42 provides general penalty for any offence against the Act or regulations made under it, for which no specific penalty is provided, with imprisonment up to one year and/or a fine up to twenty five thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company). &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Though the Aadhaar Act prescribes penalty in case of unauthorised access, use or any other act contravening the Regulations, it fails to guarantee protection to the information and does not provide for compensation in case of violation of the provisions.&lt;/p&gt;
&lt;h3&gt;2. Privacy Policy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 4 requires a body corporate to provide a privacy policy on their website, which is easily accessible, provides for the type and purpose of 	personal, sensitive personal information collected and used, and Reasonable security practices and procedures.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Though in practise the contracting agencies (the body corporates under the Aadhaar ecosystem) may maintain a privacy policy on their website, 	the Aadhaar Act does not require a privacy policy for the UIDAI or other actors.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Implications:&lt;/strong&gt; Because contracting agencies will be covered by the IT Rules if they are 'body corporates', the requirement to maintain a privacy policy will be applicable to them.&lt;/p&gt;
&lt;h3&gt;3. Consent&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5 requires that prior to the collection of sensitive personal data, the body corporate must obtain consent, either in writing or through fax regarding 	the purpose of usage before collection of such information.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act: &lt;/strong&gt; The Act is silent regarding consent being acquired in case of the enrolling agency or registrars. However, section 8 provides that any requesting entity 	will take consent from the individual before collecting his/her Aadhaar information for authentication purposes, though it does not specify the nature (written/through fax).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Implications:&lt;/strong&gt; If the enrolling agency is a body corporate, they will also be required to take consent prior to collecting and processing biometrics. It is possible that since the Aadhaar Act envisages a scheme which is quasi-compulsory in nature, a consent provision was deliberately left out. This 	circumstance would give the enrolling agencies an argument against taking consent, by saying that the Aadhaar Act is a specific legislation which is also later in point of time than the IT Rules, and a deliberate omission of consent coupled with the compulsory nature of the Aadhaar scheme would mean that they are not required to take consent of the individuals before enrolment.&lt;/p&gt;
&lt;h3&gt;4. Collection Limitation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules: &lt;/strong&gt; Rule 5 (2) requires that a body corporate should only collect sensitive personal data if it is connected to a lawful purpose and is considered necessary for that purpose.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Section 3(1) of the Act states that every resident shall be entitled to obtain an aadhaar number by submitting his demographic information and biometric 	information by undergoing the process of enrolment.&lt;/p&gt;
&lt;h3&gt;5. Notice&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules: &lt;/strong&gt; Rule 5(3) requires that while collecting information directly from an individual, the body corporate must provide the following information:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;The fact that information is being collected&lt;/li&gt;
&lt;li&gt;The purpose for which the information is being collected&lt;/li&gt;
&lt;li&gt;The intended recipients of the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency that is collecting the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency that will retain the information&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Section 3 of the Act states that at the time of enrolment and collection of information, the enrolling agency shall notify the individual as to how their 	information will be used; what type of entities the information will be shared with; and that they have a right to see their information and also tell them 	how they can see their information. However, the Act is silent regarding notice of name and address of the agency collecting and retaining the information.&lt;/p&gt;
&lt;h3&gt;6. Retention Limitation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5(4) requires that body corporate must retain sensitive personal data only for as long as it takes to fulfil the stated purpose or otherwise required 	under law.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; The Act is silent regarding this and does not mention the duration for which the personal information of an individual shall be retained by the 	bodies/organisations contracted by UIDAI.&lt;/p&gt;
&lt;h3&gt;7. Purpose Limitation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5(5) requires that information must be used for the purpose that it was collected for.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act&lt;a name="move447203643"&gt;&lt;/a&gt;&lt;/strong&gt; Section 57 contravenes this and states that the Act will not prevent use of Aadhaar number for other purposes under law by the State or other bodies. 	Section 8 of the Act states that for the purpose of authentication, a requesting entity is required to take consent before collection of Aadhaar 	information and use it only for authentication with the CIDR. Section 29 of the Act states that the core biometric information collected will not be shared 	with anyone for any reason, and must not be used for any purpose other than generation of Aadhaar numbers and authentication. Also, the Identity information available with a requesting entity will not be used for any purpose other than what is specified to the individual, nor will it be shared 	further without the individual's consent.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="move4472036436"&gt;&lt;/a&gt; Act will not prevent use of Aadhaar number for other purposes under law by the State or other bodies.&lt;/p&gt;
&lt;h3&gt;8. Right to Access and Correct&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules :&lt;/strong&gt; Rule 5(6) requires a body corporate to provide individuals with the ability to review the information they have provided and access and correct their 	personal or sensitive personal information.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act :&lt;/strong&gt; The Act provides under section 3 that at the time of enrolment, the individual needs to be informed about the existence of a right to access information, the procedure for making requests for such access, and details of the person or department in-charge to whom such requests can be made. Section 28 of the Act provides that every aadhaar number holder may access his identity information except core biometric information. Section 32 provides that every Aadhaar number holder may obtain his authentication record. Also, if the demographic or biometric information about any Aadhaar number holder changes, is lost or is found to be incorrect, they may request the UIDAI to make changes to their record in the CIDR.&lt;/p&gt;
&lt;h3&gt;9. Right to 'Opt Out' and Withdraw Consent&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5(7) requires that the individual must be provided with the option of 'opting out' of providing data or information sought by the body corporate. 	Also, they must have the right to withdraw consent at any point of time.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; The Aadhaar Act does not provide an opt- out provision and also does not provide an option to withdraw consent at any point of time. Section 7 of the 	Aadhaar Act actually implies that once the Central or State government makes aadhaar authentication mandatory for receiving a benefit then the individual has no other option but to apply for an Aadhaar number. The only concession that is made is that if an Aadhaar number is not assigned to an individual then s/he would be offered some alternative viable means of identification for receiving the benefit.&lt;/p&gt;
&lt;h3&gt;10. Grievance Officer&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5(9) requires that body corporate must designate a grievance officer for redressal of grievances, details of which must be posted on the body corporate's website and grievances must be addressed within a month of receipt.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act&lt;/strong&gt;: The Aadhaar Act does not provide for any such mechanism for grievance redressal by the registrars, enrolling agencies or the requesting entities. However, since the contracting agencies will also get covered by the IT Rules if they are 'body corporates', the requirement to designate a 	grievance officer would be applicable to them as well due to the IT Rules.&lt;/p&gt;
&lt;h3&gt;11. Disclosure with Consent, Prohibition on Publishing and Further Disclosure&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 6 requires that body corporate must have consent before disclosing sensitive personal data to any third person or party, except in the case with Government agencies for the purpose of verification of identity, prevention, detection, investigation, on receipt of a written request. Also, the body corporate or any person on its behalf shall not publish the sensitive personal information and the third party receiving the sensitive personal information from body corporate or any person on its behalf shall not disclose it further.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Regarding the requesting entities, the Act provides that they shall not disclose the identity information except with the prior consent of the individual 	to whom the information relates. The Act also states that the Authority shall take necessary measures to ensure confidentiality of information against 	disclosures. However, as an exception under section 33, the UIDAI may reveal identity information, authentication records or any information in the CIDR following a court order by a District Judge or higher. The Act also allows disclosure made in the interest of national security following directions by a 	Joint Secretary to the Government of India, or an officer of a higher rank, authorised for this purpose. The Act is silent on the issue of obtaining consent of the individual under these exceptions. Additionally, the Act also states that the Aadhaar number or any core biometric information collected or 	created regarding an individual under the Act shall not be published, displayed or posted publicly, except for the purposes specified by regulations.&lt;/p&gt;
&lt;h3&gt;12. Requirements for Transfer of Sensitive Personal Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules :&lt;/strong&gt; Rule 7 requires that body corporate may transfer sensitive personal data into another jurisdiction only if the country ensures the same level of protection and may be allowed only if it is necessary for the performance of the lawful contract between the body corporate or any person on its behalf and provider 	of information or where such person has consented to data transfer.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act :&lt;/strong&gt; The Act is silent regarding transfer of personal data into another jurisdiction by the any of the contracting bodies like the Registrar, Enrolling agencies or the requesting entities. However, if these agencies satisfy the requirement of being "body corporates" as defined under section 43A, then the above 	requirement regarding transfer of data to another jurisdiction under IT Rules would be applicable to them. However, considering the sensitive nature of the data involved, the lack of a prohibition of transferring data to another jurisdiction under the Aadhaar Act appears to be a serious lacuna.&lt;/p&gt;
&lt;h3&gt;13. Security of Information&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 8 requires that the body corporate must secure information in accordance with the ISO 27001 standard or any other best practices notified by Central 	Government. These practices must be audited annually or when the body corporate undertakes a significant up gradation of its process and computer resource.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Section 28 of the Act states that the UIDAI must ensure the security and confidentiality of identity information and authentication records. It also states 	that the Authority shall adopt and implement appropriate technical and organisational security measures, and ensure the same are imposed through agreements/arrangements with its agents, consultants, advisors or other persons. However, it does not mention which standards/measures have to be adopted by all the actors in Aadhaar ecosystem for ensuring the security of information, though it can be argued that if the contractors employed by the UIDAI are body corporate then the standards prescribed under the IT Rules would be applicable to them.&lt;/p&gt;
&lt;h3&gt;Implications of the Differences for Body Corporates in Aadhaar Ecosystem&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;An analysis of the Rules in comparison to the data protection measures under the Aadhaar Act shows that the requirements regarding protection of personal or sensitive personal information differ and are not completely in line with each other. &lt;a name="move446519928"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Though the Aadhaar Act takes into account the provisions regarding consent of the individual, notice, restriction on sharing, etc., the Act is silent regarding many core measures like sharing of information across jurisdictions, taking consent before collection of information, adoption of security 	measures for protection of information, etc. which a body corporate in the Aadhaar ecosystem must adopt to be in compliance with section 43A of the IT Act. It is therefore important that the bodies collecting, handling, sharing the personal information and are governed by the Aadhaar Act, must adhere to section 43A and the IT Rules 2011. However, applicability of Aadhaar Act as well as section 43A and IT Rules 2011 would lead to ambiguity regarding interpretation and implementation of the Law. The differences must be duly taken into account and more clarity is required to make all the bodies under 	this Legislation like the enrolling agencies, Registrars and the Requesting Entities accountable under the correct provisions of Law. However, having two separate legislations governing the data protection standards in the Aadhaar scheme seems to have been overlooked. A harmonized and overarching privacy legislation is critical to avoid unclarity in the applicability of data protection standards and would also address many privacy concerns associated to the scheme.&lt;/p&gt;
&lt;h3&gt;Appendix I&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Rajya Sabha had proposed five amendments to the Aadhaar Act 2016, which are as follows:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;i. Opt-out clause:&lt;/strong&gt; A provision to allow a person to "opt out" of the Aadhaar system, even if already enrolled.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;ii. Voluntary:&lt;/strong&gt; To ensure that if a person chooses not to be part of the Aadhaar system, he/she would be provided "alternate and viable" means of identification for purposes of delivery of government subsidy, benefit or service.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;iii.&lt;/strong&gt; Amendment restricting the use of Aadhaar numbers only for targeting of government benefits or service and not for any other purpose.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;iv.&lt;/strong&gt; Amendment seeking change of the term "national security" to "public emergency or in the interest of public safety" in the provision specifying situations in which disclosure of identity information of an individual to certain law enforcement agencies can be allowed.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;v. Oversight Committee:&lt;/strong&gt; The oversight committee , which would oversee the possible disclosure of information, should include either the Central Vigilance Commissioner or the Comptroller and Auditor-General.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;a href="http://indianexpress.com/article/india/india-news-india/rajya-sabha-returns-aadhar-bill-to-lok-sabha-with-oppn-amendments/"&gt; http://indianexpress.com/article/india/india-news-india/rajya-sabha-returns-aadhar-act-to-lok-sabha-with-oppn-amendments/ &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a href="http://thewire.in/2016/03/16/three-rajya-sabha-amendments-that-will-shape-the-aadhaar-debate-24993/"&gt; http://thewire.in/2016/03/16/three-rajya-sabha-amendments-that-will-shape-the-aadhaar-debate-24993/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Appendix II - Section 43A: Compensation for Failure to Protect Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation to the person so affected.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For the purposes of this section:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;"body corporate" means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;&lt;/li&gt;
&lt;li&gt;"reasonable security practices and procedures" means security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit;&lt;/li&gt;
&lt;li&gt;"sensitive personal data or information" means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.'.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;The term 'body corporate' has been defined under section 43A as "any company and includes a firm, sole proprietorship or other association of individuals &lt;em&gt;engaged in commercial or professional activities&lt;/em&gt;"&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india'&gt;https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-18T11:43:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-april-13-2016-why-is-uidai-cracking-down-on-individuals-that-hoard-aadhaar-data">
    <title>Why is the UIDAI cracking down on individuals that hoard Aadhaar data?</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-april-13-2016-why-is-uidai-cracking-down-on-individuals-that-hoard-aadhaar-data</link>
    <description>
        &lt;b&gt;Private firms' offer to print Aadhaar details on plastic card a breach of law.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Alnoor Peermohamed was published by &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/why-is-the-uidai-cracking-down-on-individuals-that-hoard-aadhaar-data-116041200400_1.html"&gt;Business Standard &lt;/a&gt;on April 13, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The billion-strong citizen identification system, Aadhaar, has given rise to businesses keen on illegal harnessing of this private data, say the authorities.&lt;br /&gt;&lt;br /&gt; Outfits are offering services to print the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;&lt;span&gt;Aadhaar &lt;/span&gt;&lt;/a&gt;details on plastic cards, something the Union information technology ministry warned against on Monday. These entities charge anywhere between Rs 50 and Rs 600, and are listed on e-commerce websites, apart from own online presence.&lt;br /&gt;&lt;br /&gt; Under the Aadhaar law, collecting and storing of the data by private companies without the user’s consent is a crime. Monday’s warning from the ministry to e-commerce marketplaces such as Amazon, Flipkart and eBay to disallow merchants from collecting and printing such details was a result of this.&lt;br /&gt;&lt;br /&gt; This newspaper could not find any listings of Aadhaar printing services on Flipkart but there was one on Amazon (taken down) and no less than five such listings on eBay.&lt;br /&gt;&lt;br /&gt; PrintMyAadhaar is one of the more well organised outfits operating in this space. “Get your E-Aadhaar printed on a PVC card for easier handling,” reads their website. Users are prompted to fill their Aadhaar details on the website, pay Rs 50 and have the card sent to their houses. PrintMyAadhaar even offers discounts for bulk orders.&lt;br /&gt;&lt;br /&gt; “Collecting such information or unauthorised printing of an Aadhaar card or aiding such persons in any manner may amount to a criminal offence, punishable with imprisonment under the Indian Penal Code and also Chapter VI of  The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016,” read the statement from the ministry.&lt;br /&gt;&lt;br /&gt; Currently, Aadhaar stores a person’s name, date of birth, sex and address, apart from their biometric data.&lt;br /&gt;&lt;br /&gt; While the biometric data isn’t available to these PDF printing shops, the rest of the information is, according to Srikanth Nadhamuni, chief executive officer of Khosla Labs and a former head of technology at the Unique Identification Authority of India. However, collecting this data poses no security risk to the Aadhaar infrastructure, he added.&lt;br /&gt;&lt;br /&gt; “Allowing somebody to accumulate large amounts of data from Aadhaar users in general is not a good practice. We should ensure that the Aadhaar details of people remain private and it should only be up to the discretion of the end-user to share this,” said Nadhamuni.&lt;br /&gt;&lt;br /&gt; Some security experts say Aadhaar does pose a security risk, as it makes available an individual's details in the public domain. Several institutions are treating Aadhaar just like any other proof of identity.&lt;br /&gt;&lt;br /&gt; “Transactions that should have been conducted using biometric authentication are being conducted just by presentation of paper documents. What is happening most commonly is that people are giving a printout or photocopy of their Aadhaar acknowledgement as their proof of identity to get a SIM card. The risk here is that somebody can get a mobile number against your name,” said Sunil Abraham, executive director of the non-profit Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt; He says the other technical issue with Aadhaar is the lack of a smart card that stores a person’s information, as in a digital signature. Due to the lack of this, people don’t know what information to keep private and what to make public. Conventional security techniques would have had a person keeping their PIN private (as with a bank account). If this personal PIN would have been saved on a smart card, which users wouldn’t have had much to worry about.&lt;br /&gt;&lt;br /&gt; “In the case of Aadhaar, the authentication factor and the identification factor are in the public domain, because many people might have your UID number and people release their biometric data everywhere. Due to this broken technological solution, we are now through policy putting band-aids, saying people should not disclose their UID number unnecessarily,” added Abraham.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-april-13-2016-why-is-uidai-cracking-down-on-individuals-that-hoard-aadhaar-data'&gt;https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-april-13-2016-why-is-uidai-cracking-down-on-individuals-that-hoard-aadhaar-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-17T16:16:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system">
    <title>The Last Chance for a Welfare State Doesn’t Rest in the Aadhaar System</title>
    <link>https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system</link>
    <description>
        &lt;b&gt;Boosting welfare is the message, which is how Aadhaar is being presented in India. The Aadhaar system as a medium, however, is one that enables tracking, surveillance, and data monetisation. This piece by Sumandro Chattapadhyay was published in The Wire on April 19, 2016.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published in and cross-posted from &lt;a href="http://thewire.in/2016/04/19/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system-30256/"&gt;The Wire&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Once upon a time, a king desired that his parrot should be taught all the ancient knowledge of the kingdom. The priests started feeding the pages of the great books to the parrot with much enthusiasm. One day, the king asked the priests if the parrot’s education has completed. The priests poked the belly of the parrot but it made no sound. Only the rustle of undigested pages inside the belly could be heard. The priests declared that the parrot is indeed a learned one now.&lt;/p&gt;
&lt;p&gt;The fate of the welfare system in our country is quite similar to this parrot from Tagore’s parable. It has been forcefully fed identification cards and other official documents (often four copies of the same) for years, and always with the same justification of making it more effective and fixing the leaks. These identification regimes are in effect killing off the welfare system. And some may say that that has been the actual plan in any case.&lt;/p&gt;
&lt;p&gt;The Aadhaar number has been recently offered as &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-project-uidai-last-chance-for-a-welfare-state/"&gt;the ‘last chance’ for the ailing welfare system&lt;/a&gt; – a last identification regime that it needs to gulp down to survive. This argument wilfully overlooks the acute problems with the Aadhaar project.&lt;/p&gt;
&lt;p&gt;Firstly, the ‘last chance’ for a welfare state in India is not provided by implementing a new and improved identification regime (Aadhaar numbers or otherwise), but by enabling citizens to effectively track, monitor, and ensure delivery of welfare, services, and benefits. This ‘opening up’ of the welfare bureaucracy has been most effectively initiated by the Right to Information Act. Instead of a centralised biometrics-linked identity verification platform, which gives the privilege of tracking and monitoring welfare flows only to a few expert groups, an effective welfare state requires the devolution of such privilege and responsibility.&lt;/p&gt;
&lt;p&gt;We should harness the tracking capabilities of electronic financial systems to disclose how money belonging to the Consolidated Fund of India travel around state agencies and departmental levels. Instead, the Aadhaar system effectively stacks up a range of entry barriers to accessing welfare – from malfunctioning biometric scanners, to connectivity problems, to the burden of keeping one’s fingerprint digitally legible under all labouring and algorithmic circumstances.&lt;/p&gt;
&lt;p&gt;Secondly, authentication of welfare recipients by Aadhaar number neither make the welfare delivery process free of techno-bureaucratic hurdles, nor does it exorcise away corruption. Anumeha Yadav has recently documented the emerging &lt;a href="http://scroll.in/article/805909/in-rajasthan-there-is-unrest-at-the-ration-shop-because-of-error-ridden-aadhaar"&gt;‘unrest at the ration shop’ across Rajasthan&lt;/a&gt;, as authentication processes face technical and connectivity delays, people get ‘locked out’ of public services for not having or having Aadhaar number with incorrect demographic details, and no mechanisms exist to provide rapid and definitive recourse.&lt;/p&gt;
&lt;p&gt;RTI activists at the &lt;a href="http://www.snsindia.org/"&gt;Satark Nagrik Sangathan&lt;/a&gt; have highlighted that the Delhi ration shops, using Aadhaar-based authentication, maintain only two columns of data to describe people who have come to the shop – those who received their ration, and those who did not (without any indication of the reason). This leads to erasure-by-design of evidence of the number of welfare-seekers who are excluded from welfare services when the Aadhaar-based authentication process fails (for valid reasons, or otherwise).&lt;/p&gt;
&lt;p&gt;Reetika Khera has made it very clear that using Aadhaar Payments Bridge to directly transfer cash to a beneficiary’s account, in the best case scenario, &lt;a href="http://www.epw.in/journal/2013/05/commentary/cost-benefit-analysis-uid.html"&gt;may only take care of one form of corruption&lt;/a&gt;: deception (a different person claiming to be the beneficiary). But it does not address the other two common forms of public corruption: collusion (government officials approving undue benefits and creating false beneficiaries) and extortion (forceful rent seeking after the cash has been transferred to the beneficiary’s account). Evidently, going after only deception does not make much sense in an environment where collusion and extortion are commonplace.&lt;/p&gt;
&lt;p&gt;Thirdly, the ‘relevant privacy question’ for Aadhaar is not limited to how UIDAI protects the data collected by it, but expands to usage of Aadhaar numbers across the public and private sectors. The privacy problem created by the Aadhaar numbers does begin but surely not end with internal data management procedures and responsibilities of the UIDAI.&lt;/p&gt;
&lt;p&gt;On one hand, the Aadhaar Bill 2016 has reduced the personal data sharing restrictions of the NIAI Bill 2010, and &lt;a href="http://scroll.in/article/806297/no-longer-a-black-box-why-does-the-revised-aadhar-bill-allow-sharing-of-identity-information"&gt;has allowed for sharing of all data except core biometrics (fingerprints and iris scan)&lt;/a&gt; with all agencies involved in authentication of a person through her/his Aadhaar number. These agencies have been asked to seek consent from the person who is being authenticated, and to inform her/him of the ways in which the provided data (by the person, and by UIDAI) will be used by the agency. In careful wording, the Bill only asks the agencies to inform the person about “alternatives to submission of identity information to the requesting entity” (Section 8.3) but not to provide any such alternatives. This facilitates and legalises a much wider collection of personal demographic data for offering of services by public agencies “or any body corporate or person” (Section 57), which is way beyond the scope of data management practices of UIDAI.&lt;/p&gt;
&lt;p&gt;On the other hand, the Aadhaar number is being seeded to all government databases – from lists of HIV patients, of rural citizens being offered 100 days of work, of students getting scholarships meant for specific social groups, of people with a bank account. Now in some sectors, such as banking, inter-agency sharing of data about clients is strictly regulated. But we increasingly have non-financial agencies playing crucial roles in the financial sector – from mobile wallets to peer-to-peer transaction to innovative credit ratings. Seeding of Aadhaar into all government and private databases would allow for easy and direct joining up of these databases by anyone who has access to them, and not at all by security agencies only.&lt;/p&gt;
&lt;p&gt;When it becomes publicly acceptable that &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-project-uidai-last-chance-for-a-welfare-state/"&gt;the &lt;em&gt;money bill route&lt;/em&gt; was a ‘remedial’ instrument to put the Rajya Sabha ‘back on track’&lt;/a&gt;, one cannot not wonder about what was being remedied by avoiding a public debate about the draft bill before it was presented in Lok Sabha. The answer is simple: &lt;em&gt;welfare is the message, surveillance is the medium&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Acceptance and adoption of all medium requires a message, a content. The users are interested in the message. The message, however, is not the business. Think of Free Basics. Facebook wants people with none or limited access to internet to enjoy parts of the internet at zero data cost. Facebook does not provide the content that the users consume on such internet. The content is created by the users themselves, and also provided by other companies. Facebook own and control the medium, and makes money out of all content, including interactions, passing through it.&lt;/p&gt;
&lt;p&gt;The UIDAI has set up a biometric data bank and related infrastructure to offer authentication-as-a-service. As the Bill clarifies, almost all agencies (public or private, national or global) can use this service to verify the identity of Indian residents. Unlike Facebook, the content of these services do not flow through the Aadhaar system. Nonetheless, Aadhaar keeps track of all ‘authentication records’, that is records of whose identity was authenticated by whom, when, and where. This database is gold (data) mine for security agencies in India, and elsewhere. Further, as more agencies use authentication based on Aadhaar numbers, it becomes easier for them to combine and compare databases with other agencies doing the same, by linking each line of transaction across databases using Aadhaar numbers.&lt;/p&gt;
&lt;p&gt;Welfare is the message that the Aadhaar system is riding on. The message is only useful for the medium as far as it ensures that the majority of the user population are subscribing to it. Once the users are enrolled, or on-boarded, the medium enables flow of all kinds of messages, and tracking and monetisation (perhaps not so much in the case of UIDAI) of all those flows. It does not matter if the Aadhaar system is being introduced to remedy the broken parliamentary process, or the broken welfare distribution system. What matters is that the UIDAI is establishing the infrastructure for a universal surveillance system in India, and without a formal acknowledgement and legal framework for the same.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system'&gt;https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-19T13:18:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies">
    <title>Surveillance Technologies </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies</link>
    <description>
        &lt;b&gt;The following post briefly looks at different surveillance technologies, and the growing use of the them in India. &lt;/b&gt;
        
&lt;h3&gt;Surveillance...&lt;/h3&gt;
&lt;p&gt;New security technologies are constantly emerging that push the edge between privacy and a reasonable level of security. Society's tolerance level is constantly being tested by governments who use surveillance and monitoring technologies to protect the nation. Governments claim that they need absolute access to citizens life. They need to monitor phones, look through emails, peer into files – in-order to maintain security and protect against terrorism. Though as a side note, in an Economic Times article published on Nov. 4&amp;nbsp;2010 it was reported that government computers were being hacked into through viruses, and top secret documents were being stolen. The irony of the story is that the viruses were introduced to the computers through porn websites visited by officials.&lt;/p&gt;
&lt;h3&gt;...In a Car? On the Street? In an Airport?&lt;/h3&gt;
&lt;p&gt;Despite the fact that governmental monitoring might make the common man uncomfortable, the reality is that governments will always win the national security vs privacy fight. The story becomes more complicated when it moves from the government directly monitoring individuals, to security agencies monitoring individuals. For instance the use of full body scanners at airports, or trucks equipped with scatter x-ray machines used to control crime in neighborhoods - is a much more heated debate. There are other ways in which to check passengers for banned items, and other ways to keep crime off the streets without mandating that individuals submit themselves to invasive scans, or scanning unaware individuals.&lt;/p&gt;
&lt;h3&gt;...In the Movie Theater????..for Marketing Purposes????&lt;/h3&gt;
&lt;p&gt;Surveillance technology has now been taken even another step further. No longer is it being just used to prevent violent crimes or terrorist attacks. Today the movie industry is using controversial anti-piracy tools to protect the films they produce. For instance the security company Aralia Systems manufacturers products such as: CCTV cameras and anti-camcorder systems that shine infrared light beams on audiences as they watch a movie. The light beams reflect off camcorders and alerts the theater that there are camcorders present. Though this practice can be seen as invasive - individuals might be opposed to being probed by light beams throughout movies, the extent of potential privacy invasion does not stop there. Aralia Systems has partnered with Machine Vision Lab and has created a system that harvests audiences emotions and movements as they watch movies. The data can then be used by market researchers to better tailor their behavioral advertising schemes. Essentially movie theater monitoring has merged surveillance technologies with behavioral marketing technologies in a twisted invasion of movie watchers personal privacy.&lt;/p&gt;
&lt;h3&gt;Is this technology in India?&lt;/h3&gt;
&lt;p&gt;Though behavioral monitoring and piracy technologies such as ones produced by Aralia Systems are not yet used in Indian movie theaters – security measures against piracy are used. Movie theaters across India are equipped with metal detectors at the door, and security personel check your handbag or back pack for camcorders. According to a Indian Express article, the organization Allegiance Against Copyright Theft believes one of the reasons monitoring technology is not yet used in theaters is because there is no present Indian legislation that penalizes recording in halls. Once legislation is passed, they speculate there will be a push to use these technologies. Even though monitoring technology is not yet used in theaters, monitoring of consumers behavior is increasing. Recently in India the WPP owned research agency IMRB International has developed an online audience measurement system that uses tailored metering technology to track the sites that users visit. The Web Audience Measurement System has launched this technology in a sample size of 21,000 Indian households, covering 90,000 individuals. IMRB has said that the meters are capable of capturing usage data from multiple computers, and that they can then use the information to market to the individual. Does it seem ironic to anyone that companies now charge for a service – movie tickets, internet services, telephone services – and make an extra profit by data mining at the expense of a persons privacy?&lt;/p&gt;
&lt;h3&gt;Sources&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;http://economictimes.indiatimes.com/news/politics/nation/Govt-depts-asked-not-to-store-sensitive-info-on-Net-connected-computers/articleshow/6874631.cms&lt;/li&gt;&lt;li&gt;http://www.research-live.com/news/technology/imrb-unveils-web-measurement-service-for-indian-market/4003941.article&lt;/li&gt;&lt;li&gt;http://blogs.computerworld.com/17276/anti_piracy_tool_will_harvest_market_your_emotions?source=rss_blogs&lt;/li&gt;&lt;li&gt;&amp;nbsp;http://www.indianexpress.com/news/antipiracy-unit-joins-hands-with-cinema-halls-to-curb-camcording/695439/2&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies'&gt;https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:40:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-finnish-data-protection-ombudsman">
    <title>Interview with Mr. Reijo Aarnio - Finnish Data Protection Ombudsman</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-finnish-data-protection-ombudsman</link>
    <description>
        &lt;b&gt;Maria Xynou recently interviewed Mr. Reijo Aarnio, the Finnish Data Protection Ombudsman, at the CIS' 5th Privacy Round Table. View this interview and gain an insight on recommendations for better data protection in India! &lt;/b&gt;
        &lt;p&gt;Mr. Reijo Aarnio - the Finnish Data Protection Ombudsman - was interviewed on the following questions:&lt;/p&gt;
&lt;p&gt;1. What activities and functions does the Finnish data commissioner's office undertake?&lt;/p&gt;
&lt;p&gt;2. What powers does the Finnish Data commissioner's office have? In your opinion, are these sufficient? Which powers have been most useful? If there is a lack, what would you feel is needed?&lt;/p&gt;
&lt;p&gt;3. How is the office of the Finnish data protection commissioner funded?&lt;/p&gt;
&lt;p&gt;4. What is the organizational structure at the Office of the Finnish Data Protection Commissioner and the responsibilities of the key executives?&lt;/p&gt;
&lt;p&gt;5. If India creates a Privacy Commissioner, what structure/framework would you suggest for the office?&lt;/p&gt;
&lt;p&gt;6. What challenges has your office faced?&lt;/p&gt;
&lt;p&gt;7. What is the most common type of privacy violation that your office is faced with?&lt;/p&gt;
&lt;p&gt;8. Does your office differ from other EU data protection commissioner offices?&lt;/p&gt;
&lt;p&gt;9. How do you think data should be regulated in India?&lt;/p&gt;
&lt;p&gt;10. Do you support the idea of co-regulation or self-regulation?&lt;/p&gt;
&lt;p&gt;11. How can India protect its citizens' data when it is stored in foreign servers?&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/zJzWD4LWLhY" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-finnish-data-protection-ombudsman'&gt;https://cis-india.org/internet-governance/blog/interview-with-finnish-data-protection-ombudsman&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-19T13:02:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hoot-july-13-2013-chinmayi-arun-parsing-the-cyber-security-policy">
    <title>Parsing the Cyber Security Policy</title>
    <link>https://cis-india.org/internet-governance/blog/the-hoot-july-13-2013-chinmayi-arun-parsing-the-cyber-security-policy</link>
    <description>
        &lt;b&gt;An effective cyber-security policy must keep up with the rapid evolution of technology, and must never become obsolete. The standard-setting and review bodies will therefore need to be very nimble, says Chinmayi Arun.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Chinmayi Arun's article was published in&lt;a class="external-link" href="http://www.thehoot.org/web/Parsing-the-cyber-security-policy/6899-1-1-19-true.html"&gt; the Hoot&lt;/a&gt; on July 13, 2013 and later cross-posted in the &lt;a class="external-link" href="http://thefsiindia.wordpress.com/2013/07/13/indias-national-cyber-security-policy-preliminary-comments/"&gt;Free Speech Initiative &lt;/a&gt;the same day.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;We  often forget how vulnerable the World Wide Web leaves us. If walls of  code prevent us from entering each other’s systems and networks, there  are those who can easily pick their way past them or disable essential  digital platforms. We are reminded of this by the doings of &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://www.thedailybeast.com/articles/2013/04/17/anonymous-next-move.html" target="_blank"&gt;&lt;span&gt;Anonymous&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which carried out a series of &lt;/span&gt;&lt;a href="http://www.pcmag.com/article2/0,2817,2404554,00.asp" target="_blank"&gt;&lt;span&gt;attacks&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, including the website &lt;span&gt;run by Computer Emergency Response Team India (CERT-In)&lt;span&gt; which is the government agency in charge of cyber-security. Even more  serious, are cyber-attacks (arguably cyber warfare) carried out by other  states, using digital weapons such as &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/" target="_blank"&gt;&lt;span&gt;Stuxnet&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, the digital worm&lt;span&gt;. More proximate and personal are perhaps the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2013-06-22/internet/40133370_1_phishing-attacks-kaspersky-lab-unsuspecting-user" target="_blank"&gt;&lt;span&gt;phishing attacks&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which are on the rise. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;We therefore run a great risk if we leave&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://abcnews.go.com/US/story?id=95993&amp;amp;page=1" target="_blank"&gt;&lt;span&gt; air-traffic control&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://www.bbc.co.uk/news/world-us-canada-22692778" target="_blank"&gt;&lt;span&gt;defense resources&lt;/span&gt;&lt;/a&gt; &lt;span&gt; or databases containing several &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://www.nytimes.com/2013/05/10/us/hackers-access-personal-data-in-washington-state.html" target="_blank"&gt;&lt;span&gt;citizens’ personal data&lt;/span&gt;&lt;/a&gt;&lt;span&gt; vulnerable. Sure, there is no doubt that efforts towards better  cyber-security are needed. A cyber-security policy is meant to address  this need, and to help manage threats to individuals, businesses and  government agencies. We need to carefully examine the government’s  efforts to handle cyber-security, how effective it is and whether its  actions do not have too many negative spillovers.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The  National Cyber-Security Policy, unveiled last week, is merely a  statement of intention in broad terms. Much of  its real impact will be  ascertainable only after the language to be used in the law is  available.&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt; Nevertheless, the scope of the policy &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://www.rediff.com/news/report/national-cyber-security-policy-fails-on-many-fronts/20130703.htm" target="_blank"&gt;&lt;span&gt;remains ambiguous&lt;/span&gt;&lt;/a&gt;&lt;span&gt; so far, leading to &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://groundreport.com/privacy-ignored-by-the-cyber-security-policy-of-india/" target="_blank"&gt;&lt;span&gt;much speculation&lt;/span&gt;&lt;/a&gt;&lt;span&gt; about the different ways in which it might be intrusive. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;br /&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;&lt;span&gt;One Size Fits All?&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The  policy covers very different kinds of entities: government agencies,  private companies or businesses, non-governmental entities and  individual users. These entities may need to be handled differently  depending on their nature. Therefore, while direct state action may be  most appropriate to secure government agencies’ networks, it may be less  appropriate in the context of purely private business. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;For  example, securing police records would involve the government directly  purchasing or developing sufficiently secure technology. However,  different private businesses and non-governmental entities may be left  to manage their own security. Depending on the size of each entity, each  may be differently placed to acquire sophisticated security systems. A  good policy would encourage innovation by those with the capacity to do  this, while ensuring that others have access to reasonably sound  technology, and that they use it. Grey-areas might emerge in contexts  where a private party is manages critical infrastructure. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;It  will also be important to distinguish between smaller and larger  organisations whilst creating obligations. Unless this distinction is  made at the implementation stage, start-up businesses and civil society  organisations may find requirements such as earmarking a budget for  cyber security implementation or appointing a Chief Information Security  Officer onerous. Additionally, the policy will need to translate into a  regulatory solution that provides under-resourced entities with ready  solutions to enable them to make their information systems secure, while  encouraging larger entities with greater purchasing power to invest in  procuring the best possible solutions. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;&lt;span&gt;Race to the Top&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Security  on the Internet works only if it stays one step ahead the people trying  to break in. An effective cyber-security policy must keep up with the  rapid evolution of technology, and must never become obsolete. The  standard-setting and review bodies will therefore need to be very  nimble.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The  policy contemplates working with industry and supporting academic  research and development to achieve this. However the actual manner in  which resources are distributed and progress is monitored may make the  crucial difference between a waste of public funds and acquisition of  capacity to achieve a reasonable degree of cyber security.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Additionally  the flow of public funds under this policy, particularly to purchase  technology, should be examined very carefully to see whether it is  justified. For example, if the government chooses to fund (even by way  of subsidy) a private company’s cyber-security research and development  rather than an equivalent public university’s endeavour, this decision  should be scrutinized to see whether it was necessary. Similarly, if  extensive public funds are spent training young people as a  capacity-building exercise, we should watch to see how many of these  people stay in India and how many leave such that other countries end up  benefiting from the Indian government’s investment in them!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;&lt;span&gt;Investigation of Security Threats&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Although  much of the policy focuses on defensive measures that can be taken  against security breaches, it is intended not only to cover  investigation subsequent to an attack but also to pinpoint ‘potential  cyber threats’ so that proactive measures may be taken. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The  policy has outlined the need for a ‘Cyber Crisis Management Plan’ to  handle incidents that impact ‘critical national processes or endanger  public safety and security of the nation’. This portion of the policy  will need to be watched closely to ensure that the language used is very  narrow and allows absolutely no scope for misinterpretation or misuse  that would affect citizens’ rights in any manner. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;This  caution will be necessary both in view of the manner in which  restraints on freedom of speech permitted in the interests of public  safety have been flagrantly abused, and because of the &lt;/span&gt;&lt;span&gt;kind of paternalistic &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="https://www.eff.org/deeplinks/2009/04/cybersecurity-act" target="_blank"&gt;&lt;span&gt;state intrusion&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt; that might be conceived to give effect to this.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Additionally,  since the policy also mentions information sharing with internal and  international security, defence, law enforcement and other such  agencies, it will also be important to find out the exact nature of  information to be shared.&lt;/span&gt;&lt;/span&gt; Of  course, how the policy will be put into place will only become clear as  the terms governing its various parts emerge. But one hopes the  necessary internal direct action to ensure the government agencies’  information networks are secure is already well underway.&lt;/div&gt;
&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;It  is also to be hoped that the government chooses to take implementation  of privacy rights at least as seriously as cyber-security. If some parts  of cyber security involve ensuring that user data is protected, the  decision about what data needs protection will be important to this  exercise. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Additionally,  although the policy discusses various enabling and standard-setting  measures, it does not discuss the punitive consequences of failure to  take reasonable steps to safeguard individuals’ personal data online.  These consequences will also presumably form a part of the privacy  policy, and should be put in place as early as possible.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hoot-july-13-2013-chinmayi-arun-parsing-the-cyber-security-policy'&gt;https://cis-india.org/internet-governance/blog/the-hoot-july-13-2013-chinmayi-arun-parsing-the-cyber-security-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-22T06:37:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology">
    <title>Snooping technology: Will CMS work in India?</title>
    <link>https://cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology</link>
    <description>
        &lt;b&gt;The Indian government plans to spend $132 million on setting up its brand new Central Monitoring System this year.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pierre Fitter's article was &lt;a class="external-link" href="http://www.firstpost.com/india/snooping-technology-will-cms-work-in-india-962545.html"&gt;published in FirstPost on July 17, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Several articles have raised valid questions about privacy violations, including &lt;a href="http://www.firstpost.com/india/indias-central-monitoring-system-security-cant-come-at-cost-of-privacy-944475.html" target="_blank"&gt;this one by Danish Raza&lt;/a&gt;. Elsewhere, &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/" rel="nofollow" target="_blank"&gt;Pranesh Prakash has raised important points&lt;/a&gt; about how CMS may actually violate several laws and at least one Supreme Court verdict.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I ask a much more basic question: will CMS work? Can it really help  security agencies eavesdrop on criminals and terrorists, despite several  known technical hurdles?&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Daniel.png" title="Daniel" height="250" width="332" alt="Daniel" class="image-inline" /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Encryption&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2008, a prominent Brazilian banker and investor named Daniel Dantas  was arrested and charged with money laundering and tax evasion along  with a former mayor of Sao Paulo. For five months, the Brazilian  National Institute of Criminology tried to read the contents of his hard  drive but failed to crack it. Dantas had encrypted his data using a  free program called &lt;a href="https://en.wikipedia.org/wiki/TrueCrypt" rel="nofollow" target="_blank"&gt;Truecrypt&lt;/a&gt;. The &lt;a href="http://www.theregister.co.uk/2010/06/28/brazil_banker_crypto_lock_out/" rel="nofollow" target="_blank"&gt;INC sent the hard drive to the FBI in the US&lt;/a&gt;,  which spent a whole year trying to crack it; it too failed. Dantas’s  use of encryption likely helped him escape the money laundering and tax  evasion charges. He was ultimately &lt;a href="http://news.bbc.co.uk/2/hi/americas/7761823.stm" rel="nofollow" target="_blank"&gt;convicted of attempting to bribe a police officer&lt;/a&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This story illustrates a fundamental loophole at the heart of CMS. A  criminal, using free and easy-to-use software, can protect his data from  even the most advanced surveillance tools available in law enforcement.  NSA whistle blower Edward Snowden himself used encrypted email to  communicate with journalists at the &lt;i&gt;Guardian&lt;/i&gt;. In an &lt;a href="http://discussion.guardian.co.uk/comment-permalink/24384968" rel="nofollow" target="_blank"&gt;online chat where he took questions from the public&lt;/a&gt;, Snowden noted that encryption was “one of the few things that you can rely on” to protect you from the &lt;a href="http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/" rel="nofollow" target="_blank"&gt;eavesdropping behemoth created of the NSA&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should hardly be surprising then, that terror groups have been  encrypting their emails and data for at least the last five years. In  fact &lt;a href="http://intelwire.egoplex.com/2008_02_02_exclusives.html" rel="nofollow" target="_blank"&gt;Al Qaeda developed its own encryption software called ‘Mujahideen Secrets’&lt;/a&gt;,  to encrypt emails, chat sessions and files. Version two of Mujahideen  Secrets even included a tool to delete files securely so that they could  not be recovered using special software if the computer was captured.  Al Qaeda’s links to several terror groups operating in India has been  widely reported in the past. It is not inconceivable that they have  shared their encryption software with their comrades-in-arms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the years it has become easier to encrypt one’s communication. &lt;a href="https://www.youtube.com/watch?v=MKehyXaY2XM" rel="nofollow" target="_blank"&gt;YouTube tutorials&lt;/a&gt; train even novice users to set up email encryption within minutes. &lt;a href="https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone&amp;amp;hl=en" rel="nofollow" target="_blank"&gt;Phone calls&lt;/a&gt;, &lt;a href="https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms&amp;amp;hl=en" rel="nofollow" target="_blank"&gt;text messages&lt;/a&gt; and &lt;a href="http://www.cypherpunks.ca/otr/" rel="nofollow" target="_blank"&gt;online chats&lt;/a&gt; can also be encrypted with free, easy-to-install apps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The biggest problem with encryption is that it is virtually impossible  to break the code in a time frame that’s useful for law-enforcement  purposes. Without getting too technical, modern encryption relies  calculating the prime factors of very, very large integers. In 2009, a  group of some of the world’s best-known mathematicians and  cryptographers reported that &lt;a href="http://security.stackexchange.com/questions/4518/how-to-estimate-the-time-needed-to-crack-rsa-encryption" rel="nofollow" target="_blank"&gt;it took them four years to factor a 768-bit integer&lt;/a&gt;. They estimated &lt;a href="https://www.digicert.com/TimeTravel/math.htm" rel="nofollow" target="_blank"&gt;it would take 1,000 times longer to factorise a 1024-bit integer&lt;/a&gt;.  GPG, which is the most widely-used email encryption software, allows  users up to 4096-bit encryption. Unless you have the password to the  encrypted files, it would take you a very long time to crack the  encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here’s an example to help you understand why encryption makes CMS  redundant. Let’s say the system intercepts an encrypted email sent by a  LeT handler in Karachi to a sleeper cell in Mumbai. The email contains  instructions to detonate a bomb in a specific market at a specific time  four days from now. Even if India’s intelligence agencies managed to  link up every computer they had available to process the encryption,  they would still not be able to crack it in time to learn the details  and stop the attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What about ‘Metadata’?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should be noted that encryption only protects the body of the email. The metadata, including the sender’s and receiver’s email addresses remain unencrypted, else the service provider would be unable to send the email to its destination. Law enforcement agencies often partner with email providers to track down the exact computer on which tell-tale emails were read.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, this method of tracing criminals has a limitation. Programs such as &lt;a href="https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29" rel="nofollow" target="_blank"&gt;TOR&lt;/a&gt; and &lt;a href="https://en.wikipedia.org/wiki/Hotspot_Shield" rel="nofollow" target="_blank"&gt;Hotspot Shield&lt;/a&gt; disguise the IP address of a user’s PC. For example, when I use TOR,  Facebook will often ask me to confirm my identity as it sees me as  logging in from an unfamiliar location. TOR has thousands of servers  around the world through which it bounces your data before sending it to  its destination.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is another limitation to using metadata. Due to obvious legal  hurdles, CMS will only be deployed to capture communication within  India. If terrorists were planning an attack from elsewhere in India’s  neighbourhood (as happened with 26/11), we would have to rely on that  country’s intelligence services for an alert. Good luck with that!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To make untraceable phone calls, terrorists have been known to use &lt;a href="https://en.wikipedia.org/wiki/Burner_phone#Privacy_rights_and_prepaid_mobile_phones" rel="nofollow" target="_blank"&gt;“burner” phones&lt;/a&gt;.  These are pre-paid phones that are easily available in the US and other  countries that do not require an ID for such mobile connections. They  can be topped up using cash, which makes their prolonged using even more  untraceable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if CMS allowed spooks to listen to these calls, it would not be  able to tell who was talking to whom. From details that emerged  following the Abbottabad operation that killed Osama bin Laden, we also  know that terrorists have been trained to &lt;a href="http://www.foxnews.com/tech/2011/05/03/bin-laden-grid-govt-help-expert-says/" rel="nofollow" target="_blank"&gt;turn off their phones and remove the battery&lt;/a&gt; to prevent being tracked even while not on a call.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;So what is CMS good for?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If terrorist communications can easily be hidden from CMS, you have  to wonder why the government is going through all the effort and expense  to set up such a system. What good can come off the mass hoovering of  data of ordinary citizens’?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine if CMS intercepted a ‘BBM chat’ between two businessmen, who  were discussing a contract that could affect the business interests of a  government MP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine the government getting access to emails exchanged between a  journalist and a source in the IAS who wants to expose a major  corruption scandal involving a cabinet minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine if the government had access to phone calls between two opposition politicians discussing election strategies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What if CMS tracks a PhD candidate who is researching Naxal terror  and has downloaded Naxal pamphlets? What if this researcher has been  able to establish contact with Naxals for an interview. Can the  government use such data to charge him with participating in a Naxal  conspiracy, even if his only intention was to research their  motivations? In a country where chief ministers label their critics as  “Naxals” for merely raising questions, are we certain we want such  unmitigated power in the government’s hands?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are all questions well worth asking, especially since the  ostensible reason for setting up the CMS—monitoring terrorists and  criminals—is a fool’s errand at best.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology'&gt;https://cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-22T07:19:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses">
    <title>Data protection experts slam state for sending mass SMSes</title>
    <link>https://cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses</link>
    <description>
        &lt;b&gt;Experts in the field of data protection, privacy law and media have criticised the West Bengal government's mass SMS sent to individuals, companies and media houses through private mobile networks last Friday. Lara Choksey reports this in an article published in the Statesman on March 25, 2012.&lt;/b&gt;
        
&lt;p&gt;The government's use of private data in order to spread political messages is ethically dubious and dangerous, say some.&amp;nbsp; The SMS indirectly refers to The Telegraph's publication of the Poonam Pandey tweet, warning against the transmission of “provocative and indecent photographs for hurting the religious sentiments of people and disrupting communal harmony.” It urges recipients to “frustrate the designs of … unscrupulous people and maintain peace and communal harmony,” and is signed by “Mamata Banerjee, Chief Minister”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Speaking to The Statesman on Saturday, Mumbai-based media lecturer Ms Geeta Seshu identified two issues with the government sending out political messages through mobile phone networks.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Firstly, from an ethical standpoint, the unchecked freedom of mobile phone companies to hand out private data is “completely wrong”, she said.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Secondly, the use of government funds for such dissemination needs to be transparent. If the state government has used public funds to distribute its message through a mobile phone network, then this information should be readily available, said Ms Seshu.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Telecom Regulation Authority of India's (Trai) unsolicited commercial communications regulations allow unsolicited advertising through mobile phone networks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Mr Apar Gupta, partner of Delhi-based law firm Advani and Co., explained, “The regulations are not wide enough to prohibit communications from a political party.” He observed, “Using SMS messages is a very efficient propaganda tool because so many people have access to mobile phones.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Mobile phone networks such as Vodafone make it clear in their privacy policies that the personal data of its customers “may be used for inclusion in any telephone or similar directory or directory enquiry service provided or operated by us or by a third party” (source Vodafone website).&lt;/p&gt;
&lt;p&gt;Any third party&amp;nbsp; ~ governmental or corporate ~ can therefore access the company's directory of private mobile numbers at the discretion of the network in question.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is not yet clear which government department coordinated the SMS, or what funds were used to cover the costs. Representatives from the ministry of information and cultural affairs were not able to shed a light on the matter. “I know that a message was sent out,” said the I &amp;amp; CA director Umapada Chatterjee, "But it was not sent from this department. I do not know that information.”&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Some commentators did not condemn the government's SMS. Delhi High Court lawyer and cyber law expert, Mr Praveen Dalal, criticised the publication of the Poonam Pandey tweet on the grounds of it violating the due diligence guidelines of the Cyber Law of India. He commented, “If casual and careless publications … continue, there would be no other option left for the government but to regulate their affairs in a more intrusive manner.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, executive director of the Centre for Internet and Society, Mr Sunil Abraham, called the state government's use of unsolicited SMS a “clear abuse of the powers afforded by elected office.” Mr Abraham explained that elected representatives would be justified in such measures, and in utilising public funds, in the event of a disaster, or when public order, public health or national security are compromised.&lt;/p&gt;
&lt;p&gt;“However in this case, the government is abusing the provisions of the law and using this incident as a pretext to threaten media professionals with surveillance and to intimidate for the purposes of reigning in free speech,” he told The Statesman. The chief minister was unavailable to make a comment on the matter.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.thestatesman.net/index.php?option=com_content&amp;amp;view=article&amp;amp;id=404338&amp;amp;catid=73"&gt;Read the original published in the Statesman&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses'&gt;https://cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-27T03:46:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/eight-key-privacy-events-in-india-in-the-year-2015">
    <title>Eight Key Privacy Events in India in the Year 2015</title>
    <link>https://cis-india.org/internet-governance/blog/eight-key-privacy-events-in-india-in-the-year-2015</link>
    <description>
        &lt;b&gt;As the year draws to a close, we are enumerating some of the key privacy related events in India that transpired in 2015. Much like the last few years, this year, too, was an eventful one in the context of privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While we did not witness, as one had hoped, any progress in the passage of a privacy law, the year saw significant developments with respect to the ongoing 	Aadhaar case. The statement by the Attorney General, India's foremost law officer, that there is a lack of clarity over whether the right to privacy is a fundamental right, and the fact the the matter is yet unresolved was a huge setback to the jurisprudence on privacy.	&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; However, the court has recognised a purpose limitation as applicable into the Aadhaar scheme, limiting 	the sharing of any information collected during the enrollment of residents in UID. A draft Encryption Policy was released and almost immediately withdrawn 	in the face of severe public backlash, and an updated Human DNA Profiling Bill was made available for comments. Prime Minister Narendra Modi's much 	publicised project "Digital India" was in news throughout the year, and it also attracted its' fair share of criticism in light of the lack of privacy 	safeguards it offered. Internationally, a lawsuit brought by Maximilian Schrems, an Austrian privacy activist, dealt a body blow to the fifteen year old 	Safe Harbour Framework in place for data transfers between EU and USA. Below, we look at what were, according to us, the eight most important privacy 	events in India, in 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;August 11, 2015 order on Aadhaar not being compulsory&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, a writ petition was filed by Judge K S Puttaswamy challenging the government's policy in its attempt to enroll all residents of India in the UID 	project and linking the Aadhaar card with various government services. A number of other petitioners who filed cases against the Aadhaar scheme have also 	been linked with this petition and the court has been hearing them together. On September 11, 2015, the Supreme Court reiterated its position in earlier orders made on September 23, 2013 and March 24, 2014 stating that the Aadhaar card shall not be made compulsory for any government services.	&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Building on its earlier position, the court passed the following orders:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) The government must give wide publicity in the media that it was not mandatory for a resident to obtain an Aadhaar card,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) The production of an Aadhaar card would not be a condition for obtaining any benefits otherwise due to a citizen,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c) Aadhaar card would not be used for any purpose other than the PDS Scheme, for distribution of foodgrains and cooking fuel such as kerosene and for the 	LPG distribution scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d) The information about an individual obtained by the UIDAI while issuing an Aadhaar card shall not be used for any other purpose, save as above, except 	as may be directed by a Court for the purpose of criminal investigation.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite this being the fifth court order given by the Supreme Court&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; stating that the Aadhaar card cannot 	be a mandatory requirement for access to government services or subsidies, repeated violations continue. One of the violations which has been widely 	reported is the continued requirement of an Aadhaar number to set up a Digital Locker account which also led to activist, Sudhir Yadav filing a petition in 	the Supreme Court.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;No Right to Privacy - Attorney General to SC&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Attorney General, Mukul Rohatgi argued before the Supreme Court in the Aadhaar case that the Constitution of India did not provide for a fundamental 	Right to Privacy.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; He referred to the body of case in the Supreme Court dealing with this issue and made a 	reference to the 1954 case, MP Sharma v. Satish Chandra&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; stating that there was "clear divergence of 	opinion" on the Right to Privacy and termed it as "a classic case of unclear position of law." He also referred to the discussion on this matter in the 	Constitutional Assembly Debates and pointed to the fact the framers of the Constitution did not intend for this to be a fundamental right. He said the 	matter needed to be referred to a nine judge Constitution bench.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; This raises serious questions over the 	jurisprudence developed by the Supreme Court on the right to privacy over the last five decades. The matter is currently pending resolution by a larger 	bench which needs to be constituted by the Chief Justice of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Shreya Singhal judgment and Section 69A, IT Act&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the much celebrated judgment, Shreya Singhal v. Union of India, in March 2015, the Supreme Court struck down Section 66A of the Information Technology 	Act, 2000 as unconstitutional and laid down guidelines for online takedowns under the Internet intermediary rules. However, significantly, the court also 	upheld Section 69A and the blocking rules under this provision. It was held to be a narrowly-drawn provision with adequate safeguards. The rules prescribe 	a procedure for blocking which involves receipt of a blocking request, examination of the request by the Committee and a review committee which performs 	oversight functions. However, commentators have pointed to the opacity of the process in the rules under this provisions. While the rules mandate that a 	hearing is given to the originator of the content, this safeguard is widely disregarded. The judgment did not discuss Section 69 of the Information 	Technology Act, 2000 which deal with decrypting of electronic communication, however, the Department of Electronic and Information Technology brought up 	this issue subsequently, through a Draft Encryption Policy, discussed below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Circulation and recall of Draft Encryption Policy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On October 19, 2015, the Department of Electronic and Information Technology (DeitY) released for public comment a draft National Encryption Policy. The draft received an immediate and severe backlash from commentators, and was withdrawn by September 22, 2015.	&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The government blamed a junior official for the poor drafting of the document and noted that it had been 	released without a review by the Telecom Minister, Ravi Shankar Prasad and other senior officials.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The 	main areas of contention were a requirement that individuals store plain text versions of all encrypted communication for a period of 90 days, to be made 	available to law enforcement agencies on demand; the government's right to prescribe key-strength, algorithms and ciphers; and only government-notified 	encryption products and vendors registered with the government being allowed to be used for encryption.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; The purport of the above was to limit the ways in which citizens could encrypt electronic communication, and to allow adequate access to law enforcement 	agencies. The requirement to keep all encrypted information in plain text format for a period of 90 days garnered particular criticism as it would allow 	for creation of a 'honeypot' of unencrypted data, which could attract theft and attacks.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; The withdrawal of the draft policy is not the final chapter in this story, as the Telecom Minister has promised that the Department will come back with a revised policy.	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; This attempt to put restrictions on use of encryption technologies is not only in line with a host of 	surveillance initiatives that have mushroomed in India in the last few years,&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; but also finds resonance with a global trend which has seen various governments and law enforcement organisations argue against encryption.	&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Privacy concerns raised about Digital India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Digital India initiative includes over thirty Mission Mode Projects in various stages of implementation.	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; All of these projects entail collection of vast quantities of personally identifiable information of 	the citizens. However, most of these initiatives do not have clearly laid down privacy policies.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; There 	is also a lack of properly articulated access control mechanisms and doubts over important issues such as data ownership owing to most projects involving public private partnership which involves private organisation collecting, processing and retaining large amounts of data.	&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; Ahead of Prime Minister Modi's visit to the US, over 100 hundred prominent US based academics released a statement raising concerns about "lack of safeguards about privacy of information, and thus its potential for abuse" in the Digital India project.	&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; It has been pointed out that the initiatives could enable a "cradle-to-grave digital identity that is unique, lifelong, and authenticable, and it plans to widely use the already mired in controversy Aadhaar program as the identification system."	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Issues with Human DNA Profiling Bill, 2015&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Human DNA Profiling Bill, 2015 envisions the creation of national and regional DNA databases comprising DNA profiles of the categories of persons 	specified in the Bill.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; The categories include offenders, suspects, missing persons, unknown deceased 	persons, volunteers and such other categories specified by the DNA Profiling Board which has oversight over these banks. The Bill grants wide discretionary powers to the Board to introduce new DNA indices and make DNA profiles available for new purposes it may deem fit.	&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt; These, and the lack of proper safeguards surrounding issues like consent, retention and collection 	pose serious privacy risks if the Bill becomes a law. Significantly, there is no element of purpose limitation in the proposed law, which would allow the 	DNA samples to be re-used for unspecified purposes.&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Impact of the Schrems ruling on India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Schrems v. Data Protection Commissioner, the Court of Justice in European Union (CJEU) annulled the Commission Decision 2000/520 according to which US 	data protection rules were deemed sufficient to satisfy EU privacy rules enabling transfers of personal data from EU to US, otherwise known as the 'Safe 	Harbour' framework. The court ruled that broad formulations of derogations on grounds of national security, public interest and law enforcement in place in 	the US goes beyond the test of proportionality and necessity under the Data Protection rules.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt; This 	judgment could also have implications for the data processing industry in India. For a few years now, a framework similar to the Safe Harbour has been 	under discussion for transfer of data between India and EU. The lack of a privacy legislation has been among the significant hurdles in arriving at a 	framework.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt; In the absence of a Safe Harbour framework, the companies in India rely on alternate 	mechanisms such as Binding Corporate Rules (BCR) or Model Contractual Clauses. These contracts impose the obligation on the data exporters and importers to 	ensure that 'adequate level of data protection' is provided. The Schrems judgement makes it clear that 'adequate level of data protection' entails a regime 	that is 'essentially equivalent' to that envisioned under Directive 95/46.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; What this means is that any 	new framework of protection between EU and other countries like US or India will necessarily have to meet this test of essential equivalence. The PRISM 	programme in the US and a host of surveillance programmes that have been initiated by the government in India in the last few years could pose problems in 	satisfying this test of essential equivalence as they do not conform to the proportionality and necessity principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt; &lt;b&gt;The definition of "unfair trade practices" in the Consumer Protection Bill, 2015&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Consumer Protection Bill, 2015, tabled in the Parliament towards the end of the monsoon session&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt; has 	introduced an expansive definition of the term "unfair trade practices." The definition as per the Bill includes the disclosure "to any other person any 	personal information given in confidence by the consumer."&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; This clause exclude from the scope of unfair 	trade practices, disclosures under provisions of any law in force or in public interest. This provision could have significant impact on the personal data 	protection law in India. Currently, the only law governing data protection law are the Reasonable security practices and procedures and sensitive personal 	data or information Rules, 2011&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt; prescribed under Section 43A of the Information Technology Act, 2000. Under these rules, sensitive personal data or information is protected in that their disclosure requires prior permission from the data subject.	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt; For other kinds of personal information not categorized as sensitive personal data or information, the only recourse of data subjects in case to claim breach of the terms of privacy policy which constitutes a lawful contract.	&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; The Consumer Protection Bill, 2015, if enacted as law, could significantly expand the scope of 	protection available to data subjects. First, unlike the Section 43A rules, the provisions of the Bill would be applicable to physical as well as 	electronic collection of personal information. Second, disclosure to a third party of personal information other than sensitive personal data or 	information could also have similar 'prior permission' criteria under the Bill, if it can be shown that the information was shared by the consumer in 	confidence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What we see above are events largely built around a few trends that we have been witnessing in the context of privacy in India, in particular and across 	the world, in general. Lack of privacy safeguards in initiatives like the Aadhaar project and Digital India is symptomatic of policies that are not 	comprehensive in their scope, and consequently fail to address key concerns. Dr Usha Ramanathan has called these policies "powerpoint based policies" which are implemented based on proposals which are superficial in their scope and do not give due regard to their impact on a host of issues.	&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt; Second, the privacy concerns posed by the draft Encryption Policy and the Human DNA Profiling Bill point to the motive of surveillance that is in line with other projects introduced with the intent to protect and preserve national security.	&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; Third, the incidents that championed the cause of privacy like the Schrems judgment have largely been 	initiated by activists and civil society actors, and have typically entailed the involvement of the judiciary, often the single recourse of actors in the 	campaign for the protection of civil rights. It must be noted that jurisprudence on the right to privacy in India has not moved beyond the guidelines set 	forth by the Supreme Court in PUCL v. Union of India.&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt; However, new mass surveillance programmes and 	massive collection of personal data by both public and private parties through various schemes mandated a re-look at the standards laid down twenty years 	ago. The privacy issue pending resolution by a larger bench in the Aadhaar case affords an opportunity to revisit those principles in light of how 	surveillance has changed in the last two decades and strengthen privacy and data protection.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Right to Privacy not a fundamental right, cannot be invoked to scrap Aadhar: Centre tells Supreme Court, available at 			&lt;a href="http://articles.economictimes.indiatimes.com/2015-07-23/news/64773078_1_fundamental-right-attorney-general-mukul-rohatgi-privacy"&gt; http://articles.economictimes.indiatimes.com/2015-07-23/news/64773078_1_fundamental-right-attorney-general-mukul-rohatgi-privacy &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; SC allows govt to link Aadhaar card with PDS and LPG subsidies, available at 			&lt;a href="http://timesofindia.indiatimes.com/india/SC-allows-govt-to-link-Aadhaar-card-with-PDS-and-LPG-subsidies/articleshow/48436223.cms"&gt; http://timesofindia.indiatimes.com/india/SC-allows-govt-to-link-Aadhaar-card-with-PDS-and-LPG-subsidies/articleshow/48436223.cms &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841"&gt;http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Five SC Orders Later, Aadhaar Requirement Continues to Haunt Many, available at 			&lt;a href="http://thewire.in/2015/09/19/five-sc-orders-later-aadhaar-requirement-continues-to-haunt-many-11065/"&gt; http://thewire.in/2015/09/19/five-sc-orders-later-aadhaar-requirement-continues-to-haunt-many-11065/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Digital Locker scheme challenged in Supreme Court, available at 			&lt;a href="http://www.moneylife.in/article/digital-locker-scheme-challenged-in-supreme-court/42607.html"&gt; http://www.moneylife.in/article/digital-locker-scheme-challenged-in-supreme-court/42607.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Privacy not a fundamental right, argues Mukul Rohatgi for Govt as Govt affidavit says otherwise, available at 			&lt;a href="http://www.legallyindia.com/Constitutional-law/privacy-not-a-fundamental-right-argues-mukul-rohatgi-for-govt-as-govt-affidavit-says-otherwise"&gt; http://www.legallyindia.com/Constitutional-law/privacy-not-a-fundamental-right-argues-mukul-rohatgi-for-govt-as-govt-affidavit-says-otherwise &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; 1954 SCR 1077.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Supra Note 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Government to withdraw draft encryption policy, available at 			&lt;a href="http://www.thehindu.com/news/national/govt-to-withdraw-draft-encryption-policy/article7677348.ece"&gt; http://www.thehindu.com/news/national/govt-to-withdraw-draft-encryption-policy/article7677348.ece &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Encryption policy poorly worded by officer: Telecom Minister Ravi Shankar Prasad, available at 			&lt;a href="http://economictimes.indiatimes.com/articleshow/49068406.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt; http://economictimes.indiatimes.com/articleshow/49068406.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Updated: India's draft encryption policy puts user privacy in danger, available at 			&lt;a href="http://www.medianama.com/2015/09/223-india-draft-encryption-policy/"&gt; http://www.medianama.com/2015/09/223-india-draft-encryption-policy/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Bhairav Acharya, The short-lived adventure of India's encryption policy, available at 			&lt;a href="http://notacoda.net/2015/10/10/the-short-lived-adventure-of-indias-encryption-policy/"&gt; http://notacoda.net/2015/10/10/the-short-lived-adventure-of-indias-encryption-policy/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Supra Note 9.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Maria Xynou, Big democracy, big surveillance: India's surveillance state, available at 			&lt;a href="https://www.opendemocracy.net/opensecurity/maria-xynou/big-democracy-big-surveillance-indias-surveillance-state"&gt; https://www.opendemocracy.net/opensecurity/maria-xynou/big-democracy-big-surveillance-indias-surveillance-state &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; China passes controversial anti-terrorism law to access encrypted user accounts, available at 			&lt;a href="http://www.theverge.com/2015/12/27/10670346/china-passes-law-to-access-encrypted-communications"&gt; http://www.theverge.com/2015/12/27/10670346/china-passes-law-to-access-encrypted-communications &lt;/a&gt; ; Police renew call against encryption technology that can help hide terrorists, available at 			&lt;a href="http://www.washingtontimes.com/news/2015/nov/16/paris-terror-attacks-renew-encryption-technology-s/?page=all"&gt; http://www.washingtontimes.com/news/2015/nov/16/paris-terror-attacks-renew-encryption-technology-s/?page=all &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://www.mmp.cips.org.in/digital-india/"&gt;http://www.mmp.cips.org.in/digital-india/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; &lt;a href="http://slides.com/cisindia/big-data-in-indian-governance-preliminary-findings#/"&gt; http://slides.com/cisindia/big-data-in-indian-governance-preliminary-findings#/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Indira Jaising, Digital India Schemes Must Be Preceded by a Data Protection and Privacy Law, available at 			&lt;a href="http://thewire.in/2015/07/04/digital-india-schemes-must-be-preceded-by-a-data-protection-and-privacy-law-5471/"&gt; http://thewire.in/2015/07/04/digital-india-schemes-must-be-preceded-by-a-data-protection-and-privacy-law-5471/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; US academics raise privacy concerns over 'Digital India' campaign, available at			&lt;a href="http://yourstory.com/2015/08/us-digital-india-campaign/"&gt;http://yourstory.com/2015/08/us-digital-india-campaign/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Lisa Hayes, Digital India's Impact on Privacy: Aadhaar numbers, biometrics, and more, available at 			&lt;a href="https://cdt.org/blog/digital-indias-impact-on-privacy-aadhaar-numbers-biometrics-and-more/"&gt; https://cdt.org/blog/digital-indias-impact-on-privacy-aadhaar-numbers-biometrics-and-more/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://www.prsindia.org/uploads/media/draft/Draft%20Human%20DNA%20Profiling%20Bill%202015.pdf"&gt; http://www.prsindia.org/uploads/media//draft/Draft%20Human%20DNA%20Profiling%20Bill%202015.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Comments on India's Human DNA Profiling Bill (June 2015 version), available at 			&lt;a href="http://www.genewatch.org/uploads/f03c6d66a9b354535738483c1c3d49e4/IndiaDNABill_FGPI_15.pdf"&gt; http://www.genewatch.org/uploads/f03c6d66a9b354535738483c1c3d49e4/IndiaDNABill_FGPI_15.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Elonnai Hickok, Vanya Rakesh and Vipul Kharbanda, CIS Comments and Recommendations to the Human DNA Profiling Bill, June 2015, available at 			&lt;a href="http://cis-india.org/internet-governance/blog/cis-comments-and-recommendations-to-human-dna-profiling-bill-2015"&gt; http://cis-india.org/internet-governance/blog/cis-comments-and-recommendations-to-human-dna-profiling-bill-2015 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-10/cp150117en.pdf"&gt; http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-10/cp150117en.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Jyoti Pandey, Contestations of Data, ECJ Safe Harbor Ruling and Lessons for India, available at 			&lt;a href="http://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india"&gt; http://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Simon Cox, Case Watch: Making Sense of the Schrems Ruling on Data Transfer, available at 			&lt;a href="https://www.opensocietyfoundations.org/voices/case-watch-making-sense-schrems-ruling-data-transfer"&gt; https://www.opensocietyfoundations.org/voices/case-watch-making-sense-schrems-ruling-data-transfer &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://www.prsindia.org/billtrack/the-consumer-protection-bill-2015-3965/"&gt; http://www.prsindia.org/billtrack/the-consumer-protection-bill-2015-3965/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Section 2(41) (I) of the Consumer Protection Bill, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://www.ijlt.in/pdffiles/IT-(Reasonable%20Security%20Practices)-Rules-2011.pdf"&gt; http://www.ijlt.in/pdffiles/IT-%28Reasonable%20Security%20Practices%29-Rules-2011.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Rule 6 of Reasonable security practices and procedures and sensitive personal data or information Rules, 2011&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Rule 4 of Reasonable security practices and procedures and sensitive personal data or information Rules, 2011&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology"&gt; http://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Supra Note 11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Chaitanya Ramachandra, PUCL V. Union of India Revisited: Why India's Sureveillance Law must be redesigned for the Digital Age, available at 			&lt;a href="http://nujslawreview.org/wp-content/uploads/2015/10/Chaitanya-Ramachandran.pdf"&gt; http://nujslawreview.org/wp-content/uploads/2015/10/Chaitanya-Ramachandran.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/eight-key-privacy-events-in-india-in-the-year-2015'&gt;https://cis-india.org/internet-governance/blog/eight-key-privacy-events-in-india-in-the-year-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T05:43:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
