<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 31 to 45.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-concerns-in-whole-body-imaging-a-few-questions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-banking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-dalwai-presentation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-driven-developments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/intermediary-liability-resources"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-concerns-in-whole-body-imaging-a-few-questions">
    <title>Privacy Concerns in Whole Body Imaging: A Few Questions</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-concerns-in-whole-body-imaging-a-few-questions</link>
    <description>
        &lt;b&gt;Security versus Privacy...it is a question that the world is facing today when it comes to using the Whole Body Imaging technology to screen a traveller visually in airports and other places. By giving real life examples from different parts of the world Elonnai Hickok points out that even if the Government of India eventually decides to advocate the tight security measures with some restrictions then such measures need to balanced against concerns raised for personal freedom. She further argues that privacy is not just data protection but something which must be viewed holistically and contextually when assessing new policies.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;What is Whole Body Imaging? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Whole Body Imaging is an umbrella term that includes various technologies that can produce images of the body without the cover of clothing. The purpose of WBI technology is to screen travellers visually in order to detect weapons, explosives and other threat items more thoroughly, without the cover of clothing. Examples include: Ultrasonic Imaging Technology, Superconducting Quantum Interference Device, T-ray Technology, Millimeter Wave Technology, MM-wave Technology, and X-ray Scanning Systems. The two main types of scanners used for security screening are: Millimeter Wave and Backscatter machines. The Millimeter Wave machines send radio waves over a person and produce a three-dimensional image by measuring the energy reflected back. Backscatter machines use low-level x-rays to create a two-dimensional image of the body. The machines show what a physical pat-down would potentially reveal as well, but what a metal detector would not find – for example, they will detect items such as chemical explosives and non-metallic weapons.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;How are These Technologies Being Used - Two News Items to Ponder: &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;News Item One&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In 2009-2010 a Nigerian attempted to blow up a Detroit-bound aircraft in the United States. In response to this attempt, in addition to the heightened security concerns in light of 9/11, the United States has pushed for the greater use of full-body scanners among other initiatives. The hope is that the scanners will bring a heightened level of security and stop potential attacks from occurring in the future.&lt;/p&gt;
&lt;p&gt;Also, in response to the attempted attack on the U.S, the Mumbai Terrorist attacks, and many other incidents, India has likewise considered the implementation of full-body scanners in airports. According to an article published on 2 January 2010 in The Times of India, soon after the incident in the United States, the Indian Intelligence Bureau submitted a comprehensive airport review that spoke about the need for full-body scanners. On 6 July 2010, the Times of India issued a story on how full-body scanners will not be used at the two Dubai airports. The story went on to explain in detail how the airports in Dubai have decided against the use of full-body scanners as a security measure, because they ‘contradict’ Islam, and because the government respects the privacy of individuals and their personal freedom. The head of the Dubai police department was quoted as saying “The scanners will be replaced with other inspection systems that reserve travelers' privacy.” At airports that utilize the scanners, not everyone is required to go through a full-body scanner at the security checkpoint (I myself have never been in one), but instead the authority will randomly select persons to be scanned. An individual has the option to opt out of the scan, but if they choose to do so, they must undergo a thorough body pat-down search. During the scan, the officer zoomed over parts of the image for a better look, if any portion of the image appears suspicious. Once a scan is completed, the passenger waits while the scan is sent to and reviewed by another officer elsewhere. The officers are connected by wireless headsets. If no problems are found, the image is supposed to be erased. If a problem is found, the officer tells the checkpoint agent where the problem is, and the image is retained until the issue is resolved, and then it is erased. The wireless transmission of the image by a computer to another officer for analysis is a built-in safeguard, because the agent who sees the image never sees the passenger and the officer who sees the passenger never sees the image.&lt;/p&gt;
&lt;p&gt;Despite this, the machines are controversial because they generate images of a passengers' entire body, which raises concerns as to the possible privacy violations that could occur. Besides the physical invasion that the scanners pose, privacy concerns have centered on the fact that the actual implementation of the procedures for retention and deletion of images is unclear.&amp;nbsp; For instance, in Florida, images from a scanner at a courthouse were found to have been leaked and circulated. In 2008, the US Department of Homeland Security did a report on the privacy of whole-body imaging and its compliance with the Fair Information Practice Principles. Among other safeguards, the report concluded that the image does not provide enough details for personal identification, the image is not retained, and the machine could in fact work to protect the privacy of an individual by sparing the person the indignity of a pat-down.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;News Item Two&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In October this year, Fox News came out with a story that told how the use of x-ray scanners, similar to the ones used in airports, are now being placed in vans that can see into the inside of the vehicles around them. The vans are used to detect car bombs, drugs, radioactivity and people hiding. The vans have been used at major crowd events like the Super Bowl. According to the Department of Homeland Security, the vans have led to the seizure of 89,000 pounds of narcotics and $4 million worth of currency. In vans the technology used is the backscatter x-ray machine. The cars are more controversial than the scanners at airports, because it is not possible to obtain consent from the target vehicle, and a person in a car does not have the option to opt out for a thorough car search. Furthermore, images are not sent to another authority to be analyzed, but are instead analyzed by the authority in the car.&amp;nbsp; Reactions to the vans have been mixed. Some worry about the invasion to privacy that the vans pose, the lack of consent that an individual gives to having his car scanned, and the fact that these scans are conducted without a warrant. Others believe that the security the vans can provide far outweighs the threats to privacy. In airports, if evidence is found against a person, it is clear that airport authorities have the right to stop the individual and proceed further. This right is given by an individual‘s having chosen to do business at the airport, but a person who is traveling on a public street or highway has not chosen to do business there. It is much more difficult to conclude that by driving on a road an individual has agreed to the possible scanning of his/her car.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Questions at the Heart of the WBI Debate: &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Whole Body Imaging raises both simple and difficult questions about the dilemma of security vs. privacy, and privacy as a right vs. privacy as protection. If privacy is seen as a constitutional right, as it is in the European Union under the Convention on Human Rights, then Whole Body Imaging raises questions about the human body — its legal and moral status, its value, its meaning, and the dignity that is supposed to be upheld by the virtue of an individual’s privacy being a right. If Whole Body Imaging threatens the dignity of an individual, is it correct to permit the procedure at airports and allow vans with x-ray machines to roam the streets? This question segues into a deeper question about security over privacy. The security appeal of WBI technology is its pro-active ability to provide intelligence information about potential threats before anything actually happens. Does the security that these machines bring trump the right to privacy that they could be violating?&amp;nbsp; Isn’t this particularly true given that airport scanning is of only a randomly-selected portion of travelers?&amp;nbsp; Is the loss of privacy that occurs proportional to the need and the means met? What is the purpose of security in these contexts?&amp;nbsp; All privacy legislation must work to strike a balance between security and privacy. Typically, in terms of governments and security, restrictions are placed on the amount of unregulated monitoring that governments can do through judicial oversight. Warrantless monitoring is typically permitted only in the case of declared national emergencies. Should WBI technology be subject to the same restrictions as, say, wiretapping? or would this defeat the purpose of the technology, given that the purpose is to prevent an event that could lead into a declared national emergency.&amp;nbsp; Furthermore, how can legislation and policy, which has traditionally been crafted to be reactive in nature, adequately respond to the pro-active nature of the technology and its attempt to stop a crime before it happens?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How Have Other Countries Responded to Whole Body Imaging and How Should India Respond? &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Countries around the world have responded differently to the use of whole body imaging. In the EU, full-body scanners are used only in the UK, and their use there is being protested, with the Human Rights Charter being used to argue that full-body imaging lowers human dignity and violates a person’s right to privacy. In EU countries such as Germany, there has been a strong backlash against full-body image scanners by calling them ‘Naked Scanners’. Nonetheless, according to an ABC report, in 2009 the Netherlands announced that scanners would be used for all flights heading from Amsterdam's airport to the United States.&lt;/p&gt;
&lt;p&gt;In the US, where scanners are being used, EPIC is suing the TSA on the grounds that the TSA should have enacted formal regulations to govern their use.&amp;nbsp; It argues that the body scanners violate the Fourth Amendment, which prohibits unreasonable searches and seizures. Canada has purchased 44 new imaging scanners but has suggested using image algorithms to protect the individuals’ privacy even further.&amp;nbsp; A Nigerian leader also pledged to use full-body scanners.&lt;/p&gt;
&lt;p&gt;Though India has not implemented the use of WBI technology, it has considered doing so twice, in 2008 and again in 2010. Legally, India would have to wrestle with the same questions of security vs. privacy that the world is facing.&amp;nbsp; From the government’s demand for the Blackberry encryption keys and the loose clauses in the ITA and Telegraph Act that permit wiretapping and monitoring by the government, it would appear that the Government of India would advocate the tight security measures with few restrictions, and would welcome the potential that monitoring has to stop terror from occurring. But this would have to be balanced against the concerns raised by the police officers’ observation in the Times of India that the use of scanners, was “against Islam, and an invasion of personal freedom.”&amp;nbsp; It is not clear which value would be given priority.&lt;/p&gt;
&lt;p&gt;The variation in responses and the uneven uptake of the technology around the world shows how controversial the debate between security and privacy is, and how culture, context, and perception of privacy all contribute to an individual’s, a nation’s, and a country’s willingness or unwillingness to embrace new technology. The nature of the debate shows that privacy is not an issue only of data protection, that it is much more than just a sum of numbers.&amp;nbsp; Instead, privacy is something that must be viewed holistically and contextually, and that must be a factor when assessing new policies.&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-concerns-in-whole-body-imaging-a-few-questions'&gt;https://cis-india.org/internet-governance/blog/privacy-concerns-in-whole-body-imaging-a-few-questions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-21T10:09:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications">
    <title>Privacy and Telecommunications: Do We Have the Safeguards? </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications</link>
    <description>
        &lt;b&gt;All of you often come across unsolicited and annoying telemarketing calls/ SMS's, prank calls,  pestering calls for payment, etc. Do we have any safeguards against them? This blog post takes a look at the various rules and regulations under Indian law to guard our privacy and confidentiality.&lt;/b&gt;
        
&lt;h2&gt;1 Introduction&amp;nbsp; &lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;With a subscriber base that stands at just over 700 million (TRAI, August 2010) the telecom industry has enjoyed spectacular success at absorbing Indians into its fold. Tele-density which, even as recently as in 2002 was stagnant in the low single-digits, today stands at a proud 59%. However far one could go today, it would seem one would never be too distant from a mobile phone.&lt;/p&gt;
&lt;p&gt;While this extensive penetration has heralded an era of unprecedented access – truly a ‘communications revolution’ whose full effects it may still be too early to grasp – it has also led to the exposure of individuals to risks on a magnitude never before witnessed. Firstly, in the ordinary course of their business, telecom companies accumulate vast volumes of personal information about their customers including photocopies of identity documents, biographical information etc, which could potentially be misused;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Secondly, the fact that a vast amount of our communication now occurs with the involvement of electronic media has rendered us more susceptible to invasive surveillance - whether lawful or not;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Thirdly, much of our communication is now not merely ephemeral, but is stored in digital form for indefinite periods in corporate ‘data centers’.;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Lastly, owning a mobile phone not only enables us to communicate with our business partners and loved ones, but also forces us to engage with an incessant stream of ‘noise’ – telemarketing calls and SMSes, prank/hoax calls, calls pestering us for the payment of bills and offensive/threatening calls.&lt;/p&gt;
&lt;p&gt;This note examines the kinds of safeguards that currently exist under Indian law to protect the privacy of telecom users. Broadly there are three streams of such protection&lt;/p&gt;
&lt;p&gt;1) The Telegraph Act and Rules, which contains provisions that prohibit and penalize unlawful interception of communication. Furthermore, licenses issued to telecom service providers (TSPs) under this Act require TSPs to take measures to safeguard the privacy of their customers and confidentiality of communications.&lt;/p&gt;
&lt;p&gt;2) The Telecom Regulatory Authority of India has issued various guidelines to TSPs many of which pertain to privacy.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;3) The Consumer Protection Act provides customers with an avenue of redress in case of violation of their privacy. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;The first two are described in greater detail in the paragraphs that follow. This is followed by a brief analysis of certain international norms&lt;/p&gt;
&lt;h2&gt;2 Indian Regulatory Regime&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;2.1 The Indian Telegraph Act and Rules&lt;/h3&gt;
&lt;p&gt;First enacted in 1885, the Telegraph Act remains today on the statute books as the umbrella legislation governing most forms of electronic communications in India including telephones, faxes, the internet etc. The Act contains several provisions which regulate and prohibit the unauthorized interception or tampering with messages sent over ‘telegraphs’i. The following sections apply:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;1) Section 5 empowers the Government to take possession of licensed telegraphs and to order interception of messages in cases of ‘public emergency’ or ‘in the interest of the public safety’. Interception may only be carried out pursuant to a written order by an officer specifically empowered for this purpose by the State/Central Government. &amp;nbsp;The officer must be satisfied that “it is necessary or expedient so to do in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of an offence”ii&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;2) Section 23 imposes a fine of Rs. 500 on anyone who enters a telegraph office without proper authorization.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;3) Section 24 makes it a criminal offence for a person to enter a telegraph office “with the intent of unlawfully learning the contents of any message”. Such a person may be punished with imprisonment for a term of up to a year.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;4) Section 25 further imposes a criminal penalty on anyone who damages or tampers with any telegraph with the intent to prevent the transmission of messages or to acquaint himself with the contents of any message or to commit mischief. Punishment in this case could extend to 3 years imprisonment or a fine or both.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;5) Section 26 makes it an offence for a Telegraph Officer to alter, unlawfully disclose or acquaint himself with the content of any message. This is also punishable with up to 3 years imprisonment or a fine or both.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;6) Section 30 criminalizes the fraudulent retention or willful detention of a message which is intended for someone else. Punishment extends to 2 years imprisonment or fine or both.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;2.2 License Agreements&lt;/h3&gt;
&lt;p&gt;Although the statute itself governs the actions of telecom operators in a general way, more detailed guidelines regulating their behavior are contained in the terms of the licenses issued to the telecoms which permit them to conduct businessiii. Frequently, these licenses contain clauses requiring telecom operators to safeguard the privacy of their consumers. A few examples include:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;1) Clause 21 of the National Long Distance Licenseiv comprehensively covers various aspects of privacy including&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;a. Licensees to be responsible for the protection of privacy of communication, and to ensure that unauthorised interception of message does not take place.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;b. Licensees to take all necessary steps to safeguard the privacy and confidentiality of any information about a third party and their &amp;nbsp;business to whom they provide service and from whom they have acquired such information by virtue of those service and shall use their best endeavors to secure that :&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;i. No person acting on behalf of the Licensees or &amp;nbsp;the Licensees themselves divulge or uses any such information except as may be necessary in the course of providing such service to the Third Party; and&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;ii. No such person seeks such information other than is necessary for the purpose of providing service to the Third Party.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;c. The above safeguard however does not apply where&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;i. The information relates to a specific party and that party has consented in writing to such information being divulged or used, and such information is divulged or used in accordance with the terms of that consent; or&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;ii. &amp;nbsp;The information is already open to the &amp;nbsp;public and otherwise known.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;d. The Licensees shall take necessary steps to ensure that the they and any person(s) acting on their behalf observe confidentiality of customer information.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;2) Clause 39.2 of the Unified Access Service License and clause 42.2 of the Cellular Mobile Telephone Service licence enjoin the licensee to take all necessary steps to safeguard the privacy and confidentiality of any information about a third party, and its business to whom it provides the service. The Licensee is required to use its best endeavors to secure that no person acting on behalf of the licensee or the licensee divulges or uses any such information - except as may be necessary in the course of providing such service to the third party.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;3) The Internet Services License Agreement (which authorizes ISPs to function in India) similarly contains provisions touching on privacy:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;a) Part VI of the License Agreement gives the Government the right to inspect/monitor the TSPs systems. The TSP is responsible for making facilities available for such interception.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;b) Clause 32 under Part VI contains provisions mandating the confidentiality of information. &lt;/em&gt;These provisions are identical to those described in Clause 21 of the NLD License agreement (see above).&lt;/p&gt;
&lt;p&gt;&lt;em&gt;c) Clause 33.4 makes it the responsibility of the TSP to trace nuisance, obnoxious or malicious calls, messages or communications transported through its equipment.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;d) Clause 34.8 requires ISPs to maintain a log of all users connected and the service they are using (mail, telnet, http etc.). The ISPs must also log every outward login or telnet through their computers. T&lt;/em&gt;hese logs, as well as copies of all the packets originating from the Customer Premises Equipment (CPE) of the ISP, must be available in REAL TIME to Telecom Authority. The Clause forbids logins where the identity of the logged-in user is not known.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;e) Clause 34.12 and 34.13 requires the Licensee to make available a list of all subscribers to its services on a password protected website for easy access by Government authorities.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;f) Clause 34.16 requires the Licensee to activate services only after verifying the bonafides of the subscribers and collecting supporting documentation. There is no regulation governing how long this information is to be retained.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;g) Clause 34.22 makes it mandatory for the Licensee to make available “details of the subscribers using the service” to the Government or its representatives “at any prescribed instant”.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;h) Clause 34.23 mandates that the Licensee maintain “all commercial records with regard to the communications exchanged on the network” for a period of “at least one year for scrutiny by the Licensor for security reasons and may be destroyed thereafter unless directed otherwise by the licensor”.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;i) Clause 34.28 (viii) forbids the licensee from transferring the following information to any person/place outside India:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;j) Any accounting information relating to subscriber (except for international roaming/billing) (&lt;/em&gt;Note: it does not restrict a statutorily required disclosure of financial nature)&lt;em&gt; ; and&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;k) User information (except pertaining to foreign subscribers using Indian Operator’s network while roaming).&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;l) Clause 34.28(ix) and (x) require the TSP to provide traceable identity of their subscribers and on request by the Government must be able to provide the geographical location of any subscriber at any given time.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;m) Clause 34.28(xix) stipulates that “in order to maintain the privacy of voice and data, monitoring shall only be upon authorisation by the Union Home Secretary or Home Secretaries of the States/Union Territories”.&lt;/em&gt; &amp;nbsp;(It is unclear whether this is to operate as an overriding provision governing all other clauses as well)&lt;/p&gt;
&lt;h3&gt;2.3 TRAI Regulations and Directions&lt;/h3&gt;
&lt;p&gt;The Telecom Regulatory Authority of India was established by statute in 1997 to safeguard interests of consumers while simultaneously nurturing conditions for growth of telecommunications in the country. The Authority has issued several regulations on various subjects which are binding on TSPs. &amp;nbsp;The following regulations touch on the subject of privacy:&lt;/p&gt;
&lt;h3&gt;2.4 Unsolicited Commercial Communications Regulation&lt;/h3&gt;
&lt;p&gt;In 2007, the Authority introduced the Telecom Unsolicited Commercial Communications Regulations which were aimed at creating a mechanism for registering requests of subscribers who did not wish to receive unsolicited commercial communications.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;* The regulations define “unsolicited commercial communication” as any message, through telecommunications service, which is &amp;nbsp;transmitted for the purpose of informing &amp;nbsp;about, or soliciting or promoting any commercial transaction in relation to goods, &amp;nbsp;investments or services &amp;nbsp;which a subscriber opts not to receive,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;* The following categories of message are excluded&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(i) &amp;nbsp;any message under a specific &amp;nbsp;contract between the parties to &amp;nbsp;such contract; or &amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(ii) &amp;nbsp;any messages relating to charities, national campaigns or natural &amp;nbsp;calamities transmitted on the directions of the Government or &amp;nbsp;agencies authorized by it for the said purpose;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(iii) &amp;nbsp;any message transmitted, on the directions of the Government or any &amp;nbsp;authority or agency authorized by it, in the interest of the sovereignty &amp;nbsp;and integrity of India, the security of the State, friendly relations with &amp;nbsp;foreign States, public order, decency or morality;&lt;/p&gt;
&lt;p&gt;* The regulations specified a procedure for initiation of complaints by consumers and for their adjudication and disposal.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;* Telemarketers who initiate unsolicited commercial communication with a person who has opted not to receive such communications face a fine of Rs. 500 per call/SMS as well as disconnection of their telephone services.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;* The regulations require the TSPs to maintain confidentiality of all information submitted by the subscribers for the purposes of the ‘Do not Call Registry’.&lt;/p&gt;
&lt;h3&gt;2.5 Privacy and Confidentiality Direction&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;In February 2010, the TRAI issued a direction seeking to implement the privacy and confidentiality related clauses in the service providers’ licenses (see previous sections). Accordingly by this direction, the TRAI ordered all service providers to “put in place an appropriate mechanisms, so as to prevent the breach of confidentiality on information belonging to the subscribers and privacy of communication”. All service providers were required by this regulation to submit a report to the TRAI giving details of measures so adopted.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;3 International Norms&lt;/h2&gt;
&lt;h3&gt;3.1 Telecommunications in the EU&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;In 2006, the European Union adopted Directive 2006/24/EC which mandated member states to store citizens' telecommunications data for six to 24 months stipulating a maximum time period. The directive permits police and security agencies to request access to details such as IP address and time of use of every email, phone call and text message sent or received. A request to access the information would only be granted through a court order. In 2002 the Directive adopted the Privacy and Electronic Communications Directive. The ECD regulates the electronic communications sector and &amp;nbsp;addresses &amp;nbsp;issues such as: the retention of data, the sending of unsolicited e-mail, the use of cookies and the inclusion of personal data in public directories.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Art 10(1) of the German Constitution holds “The secrecy of letters, as well as of the post and telecommunications, is inviolable”. However, in 1968 an amendment was introduced which permitted (1) &amp;nbsp;surveillance to occur without the affected person ever being informed of it; and (2) surveillance without judicial review, but through “a review of the&lt;/p&gt;
&lt;p&gt;case by bodies and auxiliary bodies appointed by Parliament.”These measures could only be invoked in order to protect “the free democratic basic order or the existence or security of the Federation or a state.”&lt;/p&gt;
&lt;h3&gt;3.2 Telecommunication in the United States&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;In the United States telecommunications are regulated by the Federal Communications Commission. Specifically the FCC regulates how telecommunications carriers and providers of cable television use customer personal information, cable subscriber information, and telemarketing and junk fax activities. Every company that participates in telemarketing must comply with the FCC's &amp;nbsp;rules. The main legislation used to regulate telecommunication carriers is the Federal Communication Act. The Act applies to how carriers may use and disclose “Customer Proprietary Network Information” which includes billing information, type of telecommunications service used, and the types of calls customers tend to make. The Act further requires that carriers must provide customer notice and the opportunity to opt out of marketing. The FCC does though &amp;nbsp;provide, what is known as a “total service approach”, exception to these rules - that allows carriers to use CPNI to market to existing customers. Also, &amp;nbsp;under the Act, &amp;nbsp;cable providers are required to provide to their subscribers detailed notice about the collection and use of information, and gather consent before collecting, distributing, or disclosing information. Additionally, customers are granted &amp;nbsp;access to their information, and information must be destroyed after it has served the purpose for which it is collected. &amp;nbsp;The Act further requires that carriers must provide customer notice and the &amp;nbsp;opportunity to opt out of marketing.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Telephone Consumer Protection Act applies to U.S companies that tele-market to consumers for commercial purposes. The rules require that phone calls are not permitted before 8:00 am or after 9:00 pm, the company must keep an internal record of consumer who ask not to be called again, and the company must refrain from sending commercial faxes without the recipient's consent. Telephone monitoring and recording are regulated in each state. Many states follow a system known as “one-party consent”, which permits a party to record &amp;nbsp;a telephone conversation without the other party's consent. Only eleven states require consent of all parties before a telephone conversation is recorded (ibid Westby, International Guide to Privacy, 2004).&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;4 Discussion&lt;/h2&gt;
&lt;p&gt;The Indian Constitution does not, as in certain other countries (Eg. Germany), contain express language upholding the right to privacy in telecommunications. This absence has not however hindered the Supreme Court from reading in the right to privacy into the Fundamental Right to Life. Various judicial decisions as well as statutes affirm this right to privacy in telecommunications. In conclusion, we would like to provide a quick FAQ on privacy in telecommunications that draws on the foregoing analysis of Indian Law.v&amp;nbsp;&lt;/p&gt;
&lt;p&gt;(1) To what extent is there legal protection for customer information (such as one’s name, address, telephone number, or non-dynamic IP address);&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As mentioned above, it is fairly easy for enforcement agencies to obtain this data. ISPs are required to make available much of this data on a website for the government to access at all times. Such access may be gained without judicial scrutiny and without even any showing of suspicion.&lt;/p&gt;
&lt;p&gt;(2) The extent of legal protection for connection data (such as the telephone numbers called; time and length of connection; one’s dynamic IP address) and the content of telecommunications&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Targeted surveillance or wiretapping is only possible following the procedure laid out in the Telegraph Rules which specify the manner in which such an order may be made, the review procedure and the maximum permissible duration of surveillance.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(3) the legal requirements placed on telecommunications providers for data retention or data erasure;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The ISP License agreement requires the ISP to maintain “all commercial records with regard to the communications exchanged on the network” for a period of “at least one year for scrutiny. No definition is provided of what these commercial records would include or exclude. There is no information on the extent to which ISPs in India currently comply with this requirement and whether they follow any data erasure procedures.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Questions:&amp;nbsp;&lt;/h2&gt;
&lt;p&gt;Will a privacy legislation address data retention for the Telecom &amp;nbsp;sector?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Will a privacy legislation regulate the monitoring and tapping of phones?&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;End Notes&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;i‘Telegraph’ is defined widely in the Act to include any “apparatus used or capable of use for transmission or reception of signs, signals, writing, images and sounds or intelligence of any nature” thus covering most known mediums of communication.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;ii&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; In 1997, the Supreme Court of India held in PUCL v. Union of India that the interception of communications under this section was unlawful unless carried out according to procedure established by law. Since no Rules had been prescribed by the Government specifying the procedure to be followed, the Supreme Court framed guidelines to be followed before tapping of telephonic conversation. These guidelines have been substantially incorporated into the Indian Telegraph Rules in 2007. Rule 419A stipulates the authorities from whom permission must be obtained for tapping, the manner in which such permission is to be granted and the safeguards to be observed while tapping communication. The Rule stipulates that any order permitting tapping of communication would lapse (unless renewed) in two months. In no case would tapping be permissible beyond 180 days. The Rule further requires all records of tapping to be destroyed after a period of two months from the lapse of the period of interception.&lt;/p&gt;
&lt;p&gt;iii&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; Section 4 of the Telegraph Act forbids the establishment of any telegraph service (including, as mentioned earlier, all telephony, internet etc) without obtaining a license from the Central Government.&lt;/p&gt;
&lt;p&gt;iv&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; Issued to TSPs who offer long distance telephony in India&lt;/p&gt;
&lt;p&gt;v&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; These questions drawn from a template provided in Schwartz, Paul M. “German and U.S. Telecommunications Privacy Law: Legal Regulation of Domestic Law Enforcement Surveillance.” Hastings Law Journal 54 (August 25, 2003): 751.&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-03-21T10:06:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases">
    <title>Privacy and Governmental Databases</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases</link>
    <description>
        &lt;b&gt;In our research we have found that most government databases are incrementally designed in response to developments and improvements that need to be incorporated from time to time. This method of architecting a system leads to a poorly designed database with many privacy risks such as: inaccurate data, incomplete data, inappropriate disclosure of data, inappropriate access to data, and inappropriate security over data. To address these privacy concerns it is important to analyze the problem that is being addressed from the perspective of potential and planned interoperability with other government databases. Below is a list of problems and recommendations concerning privacy, concerning government databases. &lt;/b&gt;
        
&lt;h2&gt;Government Databases and recommendations for privacy practices&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Citizen-State relationships and privacy standards&lt;/strong&gt;&lt;br /&gt;Government databases foster different types of relationships between the state and its citizenry. For instance: User databases, service providing databases, and information providing databases. Each one these relationships requires a different level of privacy. Thus, it is important to identify the type of relationship that the database will foster in order to determine what type of privacy model to implement.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Specific privacy policy &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Each government database should have a specific privacy policy that are tailored to the information that they hold. Each policy should cover the following areas:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;data collection&lt;/li&gt;&lt;li&gt;digitization&lt;/li&gt;&lt;li&gt;usage&lt;/li&gt;&lt;li&gt;storage&lt;/li&gt;&lt;li&gt;security&lt;/li&gt;&lt;li&gt;disclosure&lt;/li&gt;&lt;li&gt;retrieval&lt;/li&gt;&lt;li&gt;access (inter departmental and public)&lt;/li&gt;&lt;li&gt;anonymization, obfuscation and deletion.&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Personal vs. personal sensitive and public vs. non-public data categories &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Data in government databases requires varying degrees of privacy safeguards. The division of personal information vs. non personal information etc. creates distinct&lt;/p&gt;
&lt;p&gt;categories for security levels over data and permissibility of public disclosure. Ex of personal information: Name, address, telephone number, religion. Ex of non-personal data: gender, age. This could work to avoid situations such as the census - where a person’s name, address, age, etc, were all printed for the public eye.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Standardization of Privacy Policies and Access Control &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Government databases should all be designed upon interoperable standards so that the databases can "talk" to each other. The ability to coalesce databases strengthens the potential for use and reuse by different stakeholders. Furthermore, the interoperability of systems helps to avoid the creation of silos that hold multiple copies of the same data. To protect the privacy in interoperable systems - restricted and authorized access within departments and between departments is key. The Department of Information Technology has recently published a "Government Interoperability Framework" titled "Interoperability Framework for eGovernance" This policy document is the appropriate place to articulate interoperable privacy policies that could be adopted across eGovernance projects.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Record of breach notification &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If data breach occurs in government database, the breach should be recorded and the appropriate individuals notified.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Anonymization/obfuscation and deletion policies &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Once the purpose for which the data has been collected has been served it must be anonymized/obfuscated or deleted as appropriate. All data-sets cannot be deleted as bulk aggregate data is very useful to those interested in trend analysis. Anonymizing/obfuscating the personal details of a data set ensures that privacy is protected during such trend analysis.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Accountability for accuracy of data &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Frequently data that is collected and entered into government databases is not accurate, because the departments are not collecting the data themselves. Thus, they feel no responsibility for its accuracy. If a mechanism is built into each database for identification of each data source this brings accountability for data accuracy.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Appropriate uses of government databases &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Businesses should feel automatically entitled to aggregate and consolidate public information from government databases because it is technically possible to do so. Their uses of government database must be guided by policies that define "appropriate usage."&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Access, updation and control of personal information &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Citizens must be able to access and update their information. Furthermore, they should be able to define to a certain extent access control to their information - which would automatically make them eligible or ineligible for various government services.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Bibliography &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Rezhui, Abdemounaam. Preserving Privacy in Web Services. Department of Computer Sciences, Virginia Tech.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Medjahed, Brahim. Infrastructure for E-Government Web Services. IEEE Internet Computing, Virgina Tech. January/Feburary 2003.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Mladen, Karen. A Report of Research on Privacy for Electronic Government. Privacy in Canada&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; joi.ito.com/privacyreport/Contents_Distilled/.../Canada_E_p252-314.pdf&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:41:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-banking">
    <title>Privacy and Banking: Do Indian Banking Standards Provide Enough Privacy Protection? </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-banking</link>
    <description>
        &lt;b&gt;Banking is one of the most risky sectors as far as privacy is concerned due to the highly sensitive and personal nature of information which is often exchanged, recorded and retained. Although India has RBI guidelines and legislations to protect data, this blog post looks at the extent of those protections, and what are the areas that still need to be addressed.&lt;/b&gt;
        
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;1.&amp;nbsp;Introduction&lt;/h2&gt;
&lt;p&gt;Banking is one of the most at risk sectors for privacy violations due to the sensitive, and highly personal nature of information that is exchanged, recorded, and retained. Individuals must trust banks with personal identifying information, their financial records, the access information to their accounts, &amp;nbsp;and their credit history. Thus, privacy violations are not taken lightly and heavily impact the individual whose privacy was violated. Ways in which a violation of privacy can take place in the banking sector include: sharing personal information with third parties without consent &amp;nbsp;for marketing purposes, stolen or lost banking number or card, sharing personal information or allowing access to third parties without informed consent, inadequate notification &amp;nbsp;to an individual concerning what will be done with their data, collecting more personal data than is necessary, refusal to provide financial records upon request by client, incorrectly recording personal information, and loss of &amp;nbsp;a clients personal data due to improper security measures.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;2. Examples of privacy violations in the banking sector:&amp;nbsp;&lt;/h2&gt;
&lt;p&gt;There have been many instances in which one of the above violations has occurred. The examples below demonstrate that &amp;nbsp;a privacy violation of any nature is never as simple as “the disclosure of personal data” or “unauthorized access”. Each violation has a unique context that raises important questions that must be answered when forming a privacy legislation, while at the same time demonstrating the need for a certain level of privacy protection to be applied across the board in the financial sector.&lt;/p&gt;
&lt;h3&gt;2.1&amp;nbsp;Bank of America:&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;An example of very common privacy violation by Bank of America was reported by the Utility Consumers' Action Network. In the case Bank of America was charged for selling the personal information (social security numbers, bank account numbers etc) of 35 million customers to marketers and third parties without informing individuals. Bank of America is now settling for $14 million, and agreeing to change its privacy polices, its Web site, and its privacy procedures. Perhaps the most alarming element to this story is that Bank of America violated its own privacy policy &lt;strong&gt;[1]&lt;/strong&gt;.&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;This example &amp;nbsp;raises the question of who should be regulating the banking sector? &amp;nbsp;If the banking sector should be subject to audits more frequently or more stringently? Under what circumstances should data transfer be permitted ie can financial institutions disclose encrypted account numbers to non-affiliated third parties as long as the access code is not provided? The example also demonstrates:&lt;/p&gt;
&lt;div&gt;
&lt;ul style="list-style-type: square;"&gt;&lt;li&gt;
&lt;p&gt;The need for &amp;nbsp;a customers &amp;nbsp;personal data to be &amp;nbsp;distinguished between public and non-public information.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;The need for &amp;nbsp;opt out options for customers, so they can choose if &amp;nbsp;personal information is shared with non-affiliated third parties.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;The need for restrictions on &amp;nbsp;re-disclosure and re-use of transferred or disclosed data&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;2.2 Punjab National Bank&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;In &amp;nbsp;2008 &amp;nbsp;in the case of the Punjab National Bank vs. Rupa Mahajan Pahwa a bank was charged of issuing a duplicate passbook of a joint saving bank account of a husband and wife being maintained with “operational instructions” of either or survivor, to an unauthorized person. The bank was held accountable for the disclosed information, and was charged a fine with the instructions to look into the conduct of the officials who were supplying information to the unauthorized individual. The fact that a bank employee permitted an unauthorized person access to personal information raises the question of whether a privacy legislation should require that employees in the financial sector go through training on privacy procedures &lt;strong&gt;[2]&lt;/strong&gt;.&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;This example further demonstrates the need for:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Specific guidelines to the instances in which each type of information can be disclosed.&lt;/li&gt;&lt;li&gt;Appropriate notice &amp;nbsp;should be given to costumers for the disclosure of personal information. Notices of disclosure should include: initial privacy notices of the financial institutions policies and practices with respect to the disclosure and protection of personal information, annual notices. If there are exceptions to be made, these should be clearly established.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;2.3&amp;nbsp;Canara Bank&lt;/h3&gt;
&lt;p&gt;In the case of &amp;nbsp;Canara Bank vs. DistRegistrar and Collector &amp;nbsp;the district Registrar, &amp;nbsp;entered onto Canara's banks premise and inspected its books and documents. After inspecting the documents they found an error, and seized the material. The bank argued that though the Registrar could inspect the documents, they did not have the authority to seize the documents without notice to the persons affected. The ruling of the case held that the exclusion of illegitimate intrusions into privacy depends on the nature of the right being asserted, and the way in which it is brought into play&lt;strong&gt;[3]&lt;/strong&gt;. This case demonstrates &amp;nbsp;that context is a crucial element of protecting privacy and defining the right to privacy, and &amp;nbsp;raises the question of how a privacy legislation should define context for the financial sector.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;3. What are the current privacy standards for the banking sector in India?&amp;nbsp;&lt;/h2&gt;
&lt;p&gt;Below are questions pertaining to privacy concerns and the corresponding regulations that exist in the banking sector. &amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul style="list-style-type: square;"&gt;&lt;li&gt;
&lt;p&gt;What are the rules and restrictions placed on banks that relate to confidentiality and secrecy?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;What are the exceptions to the obligations of secrecy?&lt;/p&gt;
&lt;h3&gt;3.1.&lt;span class="Apple-tab-span"&gt;&amp;nbsp;&lt;/span&gt;Customary/Statutory Banking Law&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;Both in banking customs as well as statutes, there is a standardized, recognized obligation of secrecy. The wording in the following section is reproduced identically in many banking related acts including: SBI Act, 1955 – Section 44, SBI (Acquisition and Transfer of Undertakings) 1980 – Section 13, Credit Information Companies Act 2005 -section 29, and The Public Financial Institutions Act, 1983 -section 3. The section is applicable to the respective Bank as a whole and its directors, local boards, auditors, advisers, officers or other employees of the State Bank, and creditors are required in addition to affirm an oath of secrecy as provided&lt;strong&gt; [4]&lt;/strong&gt;.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;&lt;em&gt;&amp;nbsp;Section 44. Obligation as to fidelity and secrecy:&amp;nbsp;&lt;/em&gt;Obligation as to fidelity and secrecy.(1) The State Bank shall observe, except as otherwise required by law, the practices and usages customary among bankers, and, in particular, it shall not divulge any information relating to or to the affairs of its constituents except in circumstances in which it is, in accordance with the law or practice and usage customary among bankers, necessary or appropriate for the State Bank to divulge such information.&amp;nbsp;(2) Every director, member of a Local Board or of a Local Committee, auditor, adviser, officer or other employee of the State Bank shall, before entering upon his duties, make a declaration of fidelity and secrecy as in the form set out in the Second Schedule.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;In Shankarlal Agarwalla v. State Bank of India, AIR 1987 Cal 29, a customer owned 261 bank currency notes of Rs. l.000/-each. Following the demonitisation of high value currency notes in 1978, he tendered these notes to the bank along with the requisite declaration and instricted the bank to credit his Current Account with the amount. The bank made declaration made by the customer available to the Income-tax Department who issued a notice under Sec. 226(3) of the Income-tax Act, attaching the said sum. Later the sum was released. The Calcutta High Court observed that among the duties of the banker towards the customer was the duty of secrecy. Such duty is a legal one arising out of the contract and was not merely a moral one. Breach of it could, therefore, give a claim for nominal damages or for substantial damages if injury is resulted from the breach. It was, however, not an absolute duty. but was a qualified one subject to certain exceptions. The instances being (l)the duty to obey an order under the Bankers' Books Evidence Act. (2) cases where a higher duty than the private duty is involved, as where danger to the State or public duty may supersede the duty of the agent to his principal, (3) of a bank issuing a writ claiming payment of an overdraft, stating on the face the amount of overdraft, and (4) the familiar case where the customer authorises a reference to his banker. The learned Judge further observed that the State Bank of India was directed by the Reserve Bank of India and the Ministry of Finance to furnish all particulars regarding deposit of bank notes to the Income-tax Department as soon as such notices were received. This instance had, therefore, come within the exceptions.&amp;nbsp;The recent Payment and Settlement Systems Act , 2007 imposes privacy obligations on those who manage online payment and settlement systems such as RTGS/NEFT etc. Section 22 &amp;nbsp;of the Act enjoins “system provider” not to disclose the existence or contents of any document or part of any information given to him by a system participant, except where disclosure is:&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;(a) required under the provisions of this Act&amp;nbsp;&lt;/p&gt;
&lt;p&gt;(b) made with the express or implied consent of the system participant concerned&amp;nbsp;&lt;/p&gt;
&lt;p&gt;(c) in obedience to the orders passed by a court of competent jurisdiction&amp;nbsp;&lt;/p&gt;
&lt;p&gt;(d) in obedience of a statutory authority in exercise of the powers conferred by a statute.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;3.2&amp;nbsp;Reserve Bank of India regulations&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;The Reserve Bank of India has periodically issued guidelines, regulations and circulars which require banks to maintain the confidentiality and privacy of customers.&amp;nbsp;Thus, the Master Circular on Credit Card Operations of banks issued by the RBI in July 2010 contains an elaborate set of provisions on “Right to Privacy” and “Customer Confidentiality” under a section titled ‘Protection of Customer Rights’. The provisions inter alia, forbid the banks from making unsolicited calls, delivering unsolicited credit cards and from disclosing customer information to any third party without specific consent.&amp;nbsp;Similarly, the Master Circular on Customer Service in banks issued in 2009 contains a detailed clause on Customer Confidentiality Obligations. The clause reaffirms the customary banking obligation of secrecy and extends it by forbidding the usage of customer information for “cross-selling purposes”. It imposes a restriction on data collection by requiring Banks to “ensure that information sought from the customer is relevant to the perceived risk, is not intrusive, and is in conformity with the guidelines issued in this regard”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In 2006, the Reserve Bank of India along with several banks of the Indian Banks Association (IBA) established a body called the Banking Codes and Standards Board of India to evolve a set of voluntary norms which banks would enforce on their own. A number of guidelines and notices have been produced by the BCSBI including the “Code of Bank's Commitment to Customers” which most banks in India adhere to. Enforcement is through a seriece of internal Grievance redressal mechanisms within each bank including a designated “Code Compliance Officer” and an Ombudsman.&lt;/p&gt;
&lt;p&gt;Though these guidelines do provide differing and useful degrees of security and privacy, the lack of legislative oversight and enforcement allows the standards to be applied per institution and &amp;nbsp;per-contract and enforcement is not guaranteed through parliamentary sanctions.&lt;/p&gt;
&lt;h3&gt;3.3&lt;span class="Apple-style-span"&gt;&lt;strong&gt;&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;What legislation applies to data protection in the banking sector?&lt;/h3&gt;
&lt;p&gt;Banks are governed by the Information Technology Act 2000 as amended in 2008. The latter amendments contain provisions that enjoin inter alia, banks to adopt reasonable security practices with respect to their databases. Customers of banks can, under the IT Act, obtain compensatory relief for losses arising out of data leakages as well as unauthorised disclosure of information by the banks for gain.&lt;/p&gt;
&lt;h2&gt;4.&amp;nbsp;International Regulation of Privacy in Banks:&amp;nbsp;&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;The EU:&amp;nbsp;&lt;/em&gt;The EU Data Protection Directive is a broad directive adopted by the European Union designed to protect the privacy&amp;nbsp; of all personal data of EU citizens collected and used for commercial purposes,specifically&amp;nbsp; as it relates to processing, using, or exchanging such data &lt;strong&gt;[5]&lt;/strong&gt;&lt;span class="Apple-style-span"&gt;.&lt;/span&gt; The Directive establishes a broad regulatory framework which sets limits on the collection and use of personal data, and requires each Member State to set up an independent national body responsible for the protection of data. The Directive prohibits the transfer of protected personal information outside the EU unless the receiving country applies similar legal protections. For example in the UK the financial sector is regulated by the Banking Act of 2009&lt;span class="Apple-style-span"&gt;,&amp;nbsp;&lt;/span&gt;but financial data, along with other data is monitored by the UK data regulator.&lt;/p&gt;
&lt;p class="MsoBodyText"&gt;&amp;nbsp;&lt;em&gt;The US:&amp;nbsp;&lt;/em&gt;Though the United States has many acts regulating the financial sector, the main legislation though is the Gramm-Leach-Bliley Act&lt;strong&gt; [6]&lt;/strong&gt;. The&amp;nbsp; GLBA imposes obligations and restrictions on financial institutions. The act defines:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;The entities covered in the act&lt;/li&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;Classifications of data and restrictions based on type of data&lt;/li&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;Acceptable and non-acceptable forms of disclosure&lt;/li&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;Opt out requirements protocols and procedures&lt;/li&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;Notice requirements&lt;/li&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;Acceptable and non-acceptable marketing activities&lt;/li&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;Measures that should be taken to safeguard information&lt;/li&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;Methods of enforcement.&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;&amp;nbsp;Questions to&amp;nbsp; Consider:&lt;/h2&gt;
&lt;ul&gt;&lt;li&gt;Should financial information be separated into categories based on level of privacy risk?&lt;/li&gt;&lt;li&gt;Should financial information be treated to a greater&amp;nbsp; level of security?&lt;/li&gt;&lt;li&gt;Should organizations who commit data breaches in the financial sector receive more severe sanctions?&lt;/li&gt;&lt;li&gt;Should a privacy legislation create a standardized privacy policy for the financial sector?&lt;/li&gt;&lt;li&gt;Should a privacy legislation require specific internal and external audits and monitoring of the financial sector?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;p class="MsoBodyText"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Bibliography&lt;/h2&gt;
&lt;p class="MsoBodyText"&gt;1.&amp;nbsp;&lt;a href="http://www.ucan.org/money_privacy/banking_finance_credit_cards/ucan_wins_lawsuit_against_bank_of_america_concerning_poor_privacy_practices"&gt;http://www.ucan.org/money_privacy/banking_finance_credit_cards/ucan_wins_lawsuit_against_bank_of_america_concerning_poor_privacy_practices&lt;/a&gt;&lt;/p&gt;
&lt;p class="MsoBodyText"&gt;2.&lt;a href="http://164.100.72.12/ncdrcrep/judgement/80PNB%20VS.%20RUPA%20MAHAJAN.htm"&gt;http://164.100.72.12/ncdrcrep/judgement/80PNB%20VS.%20RUPA%20MAHAJAN.htm&lt;/a&gt;&lt;/p&gt;
&lt;p class="MsoBodyText"&gt;3.(2005) 1 SCC 496: AIR 2005 SC 186&lt;/p&gt;
&lt;p class="MsoBodyText"&gt;4.&amp;nbsp;&lt;span class="Apple-style-span"&gt;One of the landmark cases on banking customs related to secrecy is the Court of Appeal case of&amp;nbsp; Tournier v. National Provincial and Union Bank of England decided in 1924. The court upheld the general duty of secrecy arising out of a contract between the banker and the customer and held that the breach of it may give rise to a claim for substantial damages if injury has resulted from the breach. It is, however, not an absolute duty but qualified and is subject to certain reasonable exceptions. These exceptions have been incorporated into Indian law (see the Shankarlal Agarwalla case below)&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoBodyText"&gt;&lt;span class="Apple-style-span"&gt;5.&lt;/span&gt;Westby, Jody. International Guide to Privacy: American Bar Associaton 2004 pg.89-102&lt;/p&gt;
&lt;p class="MsoBodyText"&gt;6.Westby, Jody. International Guide to Privacy: American Bar Associaton 2004 pg.18&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-banking'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-banking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-03-21T10:07:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-dalwai-presentation">
    <title>Presentation of the UID project by Ashok Dalwai – A Report</title>
    <link>https://cis-india.org/internet-governance/blog/uid-dalwai-presentation</link>
    <description>
        &lt;b&gt;On Tuesday, 7 September 2010, Ashok Dalwai, the Deputy Director General of the Unique Identification of India (UIDAI), gave a lecture at the Indian Institute for Science in Bangalore. Representing the UID Authority, his presentation explained the vision of the project and focused on the challenges involved in demographic and biometric identification, the technology adopted, and the enrolment process. Elonnai Hickok gives a report of his presentation in this blog post.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-dalwai-presentation'&gt;https://cis-india.org/internet-governance/blog/uid-dalwai-presentation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:09:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance">
    <title>Policy Brief: Oversight Mechanisms for Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/oversight-mechanisms-for-surveillance" class="internal-link"&gt;&lt;b&gt;Download the PDF &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Across jurisdictions, the need for effective and relevant oversight mechanisms (coupled with legislative safeguards) for state surveillance has been highlighted by civil society, academia, citizens and other key stakeholders.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;A key part of oversight of state surveillance is accountability of intelligence agencies. This has been recognized at the international level. Indeed, the Organization for Economic Co-operation and Development, The United Nations, the Organization for Security and Cooperation in Europe, the Parliamentary Assembly of the Council of Europe, and the Inter-Parliamentary Union have all recognized that intelligence agencies need to be subject to democratic accountability.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;Since 2013, the need for oversight has received particular attention in light of the information disclosed through the 'Snowden Revelations'. &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Some countries such as the US, Canada, and the UK have regulatory  mechanisms for the oversight of state surveillance and the intelligence  community, while many other countries – India included - have piecemeal  oversight mechanisms in place. The existence of regulatory mechanisms  for state surveillance does not necessarily equate to effective  oversight – and piecemeal mechanisms – depending on how they are  implemented, could be more effective than comprehensive mechanisms. This  policy brief seeks to explore the purpose of oversight mechanisms for  state surveillance, different forms of mechanisms, and what makes a  mechanism effective and comprehensive. The brief also reviews different  oversight mechanisms from the US, UK, and Canada and provides  recommendations for ways in which India can strengthen its present  oversight mechanisms for state surveillance and the intelligence  community.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is the purpose and what are the different components of an oversight mechanism for State Surveillance?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The International Principles on the Application of Human Rights to Communication Surveillance, developed through a global consultation with civil society groups, industry, and international experts recommends that public oversight mechanisms for state surveillance should be established to ensure transparency and accountability of Communications Surveillance. To achieve this, mechanisms should have the authority to:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Access all potentially relevant information about State actions, including, where appropriate, access to secret or classified information;&lt;/li&gt;
&lt;li&gt;Assess whether the State is making legitimate use of its lawful capabilities;&lt;/li&gt;
&lt;li&gt;Evaluate whether the State has been comprehensively and accurately publishing information about the use and scope of Communications Surveillance techniques and powers in accordance with its Transparency obligations publish periodic reports and other information relevant to Communications Surveillance;&lt;/li&gt;
&lt;li&gt;Make public determinations as to the lawfulness of those actions, including the extent to which they comply with these Principles&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;What can inform oversight mechanisms for state surveillance?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The development of effective oversight mechanisms for state surveillance can be informed by a number of factors including:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Rapidly changing technology – how can mechanisms adapt, account for, and evaluate perpetually changing intelligence capabilities?&lt;/li&gt;
&lt;li&gt;Expanding surveillance powers – how can mechanisms evaluate and rationalize the use of expanding agency powers?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Tensions around secrecy, national interest, and individual rights – how can mechanisms respect, recognize, and uphold multiple competing interests and needs including an agency's need for secrecy, the government's need to protect national security, and the citizens need to have their constitutional and fundamental rights upheld?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The structure, purpose, and goals of specific intelligence agencies and circumstances– how can mechanisms be sensitive and attuned to the structure, purpose, and functions of differing intelligence agencies and circumstances? &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;These factors lead to further questions around:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;The purpose of an oversight mechanism: Is an oversight mechanism meant to ensure effectiveness of an agency? Perform general reviews of agency performance? Supervise the actions of an agency? Hold an agency accountable for misconduct?&lt;/li&gt;
&lt;li&gt;The structure of an oversight mechanism: Is it internal? External? A combination of both? How many oversight mechanisms that agencies should be held accountable to?&lt;/li&gt;
&lt;li&gt;The functions of an oversight mechanism: Is an oversight mechanism meant to inspect? Evaluate? Investigate? Report?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The powers of an oversight mechanism: The extent of access that an oversight mechanism needs and should have to the internal workings of security agencies and law enforcement to carry out due diligence? The extent of legal backing that an oversight mechanism should have to hold agencies legally accountable.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;What oversight mechanisms for State Surveillance exist in India?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In India the oversight 'ecosystem' for state surveillance is comprised of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Review committee&lt;/b&gt;: Under the Indian Telegraph Act 1885 and the Rules issued thereunder (Rule 419A), a Central Review Committee that consists of the Cabinet Secretary, Secretary of Legal Affairs to the Government of India, Secretary of Department of Telecommunications to the Government of India is responsible for meeting on a bi-monthly basis and reviewing the legality of interception directions. The review committee has the power to revoke the directions and order the destruction of intercepted material.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; This review committee is also responsible for evaluating interception, monitoring, and decryption orders issued under section 69 of the Information Technology Act 2000.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; and orders for the monitoring and collection of traffic data under section 69B of the Information Technology Act 2000.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Authorizing Authorities&lt;/b&gt;: The Secretary in the Ministry of Home Affairs of the Central Government is responsible for authorizing requests for the interception, monitoring, and decryption of communications issued by central agencies.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; The Secretary in charge of the Home Department is responsible for authorizing requests for the interception, monitoring, and decryption of communications from state level agencies and law enforcement.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; The Secretary to the Government of India in the Department of Information Technology under the Ministry of Communications and Information Technology is responsible for authorizing requests for the monitoring and collection of traffic data.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; Any officer not below the rank of Joint Secretary to the Government of India, who has been authorised by the Union Home Secretary or the State Home Secretary in this behalf, may authorize the interception of communications in case of an emergency.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; A Commissioner of Police, District Superintendent of Police or Magistrate may issue requests for stored data to any postal or telegraph authority.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Administrative authorities&lt;/b&gt;: India does not have an oversight mechanism for intelligence agencies, but agencies do report to different authorities. For example: The Intelligence Bureau reports to the Home Minister, the Research and Anaylsis Wing is under the Cabinet Secretariat and reports to the Prime Minister, the Joint Intelligence Committee (JIC), National Technical Research Organisation (NTRO) and Aviation Research Centre (ARC) report to the National Security Adviser; and the National Security Council Secretariat under the NSA which serves the National Security Council.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;It is important to note that though India has a Right to Information Act, but most of the security agencies are exempt from the purview of the Act&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; as is disclosure of any information that falls under the purview of the Official Secrets Act 1923.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; [Note: There is no point in listing out all the exceptions given in section 8 and other sections as well. I think the point is sufficiently made when we say that security agencies are exempt from the purview of the Act.] The Official Secrets Act does not provide a definition of an 'official secret' and instead protects information: pertaining to national Security, defence of the country, affecting friendly relations with foreign states, etc.&lt;a href="#fn16" name="fr16"&gt;[16] &lt;/a&gt;Information in India is designated as classified in accordance to the Manual of Departmental Security Instruction which is circulated by the Ministry of Home Affairs. According to the Public Records Rules 1997, “classified records" means the files relating to the public records classified as top-secret, confidential and restricted in accordance with the procedure laid down in the Manual of Departmental Security Instruction circulated by the Ministry of Home affairs from time to time;”&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;Bi-annually officers evaluate and de-classify classified information and share the same with the national archives.&lt;a href="#fn18" name="fr18"&gt;[18] &lt;/a&gt;In response to questions raised in the Lok Sabha on the 5th of May 2015 regarding if the Official Secrets Act, 1923 will be reviewed, the number of classified files stored with the Government under the Act, and if the Government has any plans to declassify some of the files – the Ministry of Home Affairs clarified that a committee consisting of Secretaries of the Ministry of Home Affairs, the Department of Personnel and Training, and the Department of Legal Affairs has been established to examine the provisions of the Official Secrets Act, 1923 particularly in light of the Right to Information Act, 2005. The Ministry of Home Affairs also clarified that the classification and declassification of files is done by each Government Department as per the Manual of Departmental Security Instructions, 1994 and thus there is no 'central database of the total number of classified files'.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How can India's oversight mechanism for state surveillance be clarified?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Though these mechanisms establish a basic framework for an oversight mechanism for state surveillance in India, there are aspects of this framework that could be clarified and there are ways in which the framework could be strengthened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aspects of the present review committee that could be clarified:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Powers of the review committee: Beyond having the authority to declare that orders for interception, monitoring, decryption, and collection of traffic data are not within the scope of the law and order for destruction of any collected information – what powers does the review committee have? Does the committee have the power to compel agencies to produce additional or supporting evidence? Does the committee have the power to compel information from the authorizing authority?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Obligations of the review committee: The review committee is required to 'record its findings' as to whether the interception orders issued are in accordance with the law. Is there a standard set of questions/information that must be addressed by the committee when reviewing an order? Does the committee only review the content of the order or do they also review the implementation of the order? Beyond recording its findings, are there any additional reporting obligations that the review committee must fulfill?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accountability of the review committee: Does the review committee answer to a higher authority? Do they have to submit their findings to other branches of the government – such as Parliament? Is there a mechanism to ensure that the review committee does indeed meet every two months and review all orders issued under the relevant sections of the Indian Telegraph Act 1885 and the Information Technology Act 2008?&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;Proposed oversight mechanisms in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Oversight mechanisms can help with avoiding breaches of national security by ensuring efficiency and effectiveness in the functioning of security agencies. The need for the oversight of state surveillance is not new in India. In 1999 the Union Government constituted a Committee with the mandate of reviewing the events leading up to Pakistani aggression in Kargil and to recommend measures towards ensuring national security. Though the Kargil Committee was addressing surveillance from the perspective of  gathering information on external forces, there are parellels in the lessons learned for state surveillance. Among other findings, in their Report the Committee found a number of limitations in the system for collection, reporting, collation, and assessment of intelligence. The Committee also found that there was a lack of oversight for the intelligence community in India – resulting in no mechanisms for tasking the agencies, monitoring their performance and overall functioning, and evaluating the quality of the work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Committee also noted that such a mechanism is a standard feature in jurisdictions across the world. The Committee emphasized this need from an economic perspective – that without oversight – the Government and the nation has no way of evaluating whether or not they are receiving value for their money. The Committee recommended a review of the intelligence system with the objective of solving such deficiencies.&lt;a href="#fn20" name="fr20"&gt;[20] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2000 a Group of Ministers was established to review the security and intelligence apparatus of the country. In their report issued to the Prime Minister, the Group of Ministers recommended the establishment of an Intelligence Coordination Group for the purpose of providing oversight of intelligence agencies at the Central level. Specifically the Intelligence Coordination Group would be responsible for:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Allocation of resources to the intelligence agencies&lt;/li&gt;
&lt;li&gt;Consideration of annual reviews on the quality of inputs&lt;/li&gt;
&lt;li&gt;Approve the annual tasking for intelligence collection&lt;/li&gt;
&lt;li&gt;Oversee the functions of intelligence agencies&lt;/li&gt;
&lt;li&gt;Examine national estimates and forecasts&lt;a href="#fn21" name="fr21"&gt;[21] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Past critiques of the Indian surveillance regime have included the fact that intelligence agencies do not come under the purview of any overseeing mechanism including Parliament, the Right to Information Act 2005, or the General Comptroller of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, Manish Tewari, who at the time was a Member of Parliament from Ludhiana, introduced the Private Member's Bill - “The Intelligence Services (Powers and Regulation) Bill” proposed stand alone statutory regulation of intelligence agencies. In doing so it sought to establish an oversight mechanism for intelligence agencies within and outside of India. The Bill was never introduced into Parliament.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt; Broadly, the Bill sought to establish: a National Intelligence and Security Oversight Committee which would oversee the functionings of intelligence agencies and would submit an annual report to the Prime Minister, a National Intelligence Tribunal for the purpose of investigating complaints against intelligence agencies, an Intelligence Ombudsman for overseeing and ensuring the efficient functioning of agencies, and a legislative framework regulating intelligence agencies.&lt;a href="#fn23" name="fr23"&gt;[23] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Proposed policy in India has also explored the possibility of coupling surveillance regulation and oversight with private regulation and oversight. In 2011 the Right to Privacy Bill was drafted by the Department of Personnel and Training. The Bill proposed to establish a “Central Communication Interception Review Committee” for the purposes of reviewing orders for interception issued under the Telegraph Act. The Bill also sought to establish an authorization process for surveillance undertaken by following a person, through CCTV's, or other electronic means.&lt;a href="#fn24" name="fr24"&gt;[24] &lt;/a&gt;In contrast, the 2012 Report of the Group of Experts on Privacy, which provided recommendations for a privacy framework for India, recommended that the Privacy Commissioner should exercise broad oversight functions with respect to interception/access, audio &amp;amp; video recordings, the use of personal identifiers, and the use of bodily or genetic material.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A 2012 report by the Institute for Defence Studies and Analyses titled “A Case for Intelligence Reforms in India” highlights at least four 'gaps' in intelligence that have resulted in breaches of national security including: zero intelligence, inadequate intelligence, inaccurate intelligence, and excessive intelligence – particularly in light of additional technical inputs and open source inputs.&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; In some cases, an oversight mechanism could help in remediating some of these gaps. Returning to the 2012 IDSA Report, the Report recommends the following steps towards an oversight mechanism for Indian intelligence:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Establishing an Intelligence Coordination Group (ICG) that will exercise oversight functions for the intelligence community at the Central level. This could include overseeing functions of the agencies, quality of work, and finances. &lt;/li&gt;
&lt;li&gt;Enacting legislation defining the mandates, functions, and duties of intelligence agencies.&lt;/li&gt;
&lt;li&gt;Holding intelligence agencies accountable to the Comptroller &amp;amp; Auditor General to ensure financial accountability. &lt;/li&gt;
&lt;li&gt;Establishing a Minister for National Security &amp;amp; Intelligence for exercising administrative authority over intelligence agencies. &lt;/li&gt;
&lt;li&gt;Establishing a Parliamentary Accountability Committee for oversight of intelligence agencies through parliament. &lt;/li&gt;
&lt;li&gt;Defining the extent to which intelligence agencies can be held accountable to reply to requests pertaining to violations of privacy and other human rights issued under the Right to Information Act.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Highlighting the importance of accountable surveillance frameworks, in 2015 the external affairs ministry director general of India Santosh Jha stated at the UN General Assembly that the global community needs to "to create frameworks so that Internet surveillance practices motivated by security concerns are conducted within a truly transparent and accountable framework.”&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;In what ways can India's mechanisms for state surveillance be strengthened?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Building upon the recommendations from the Kargil Committee, the Report from the Group of Ministers, the Report of the Group of Experts on Privacy, the Draft Privacy Bill 2011, and the IDSA report, ways in which the framework for oversight of state surveillance in India could be strengthened include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Oversight to enhance public understanding, debate, accountability, and democratic governance: State surveillance is unique in that it is enabled with the objective of protecting a nations security. Yet, to do so it requires citizens of a nation to trust the actions taken by intelligence agencies and to allow for possible access into their personal lives and possible activities that might infringe on their constitutional rights (such as freedom of expression) for a larger outcome of security. Because of this, oversight mechanisms for state surveillance must balance securing national security while submitting itself to some form of accountability to the public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Independence of oversight mechanisms: Given the Indian context, it is particularly important that an oversight mechanism for surveillance powers and the intelligence community is capable of addressing and being independent from political interference. Indeed, the majority of cases regarding illegal interceptions that have reached the public sphere pertain to the surveillance of political figures and political turf wars.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;Furthermore, though the current Review Committee established in the Indian Telegraph Act does not have a member from the Ministry of Home Affairs (the Ministry responsible for authorizing interception requests), it is unclear how independent this committee is from the authorizing Ministry. To ensure non-biased oversight, it is important that oversight mechanisms are independent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Legislative regulation of intelligence agencies: Currently, intelligence agencies are provided surveillance powers through the Information Technology Act and the Telegraph Act, but beyond the National Intelligence Agency Act which establishes the National Intelligence Agency, there is no legal mechanism creating, regulating and overseeing intelligence agencies using these powers. In the 'surveillance ecosystem' this creates a policy vacuum, where an agency is enabled through law with a surveillance power and provided a procedure to follow, but is not held legally accountable for the effective, ethical, and legal use of the power. To ensure legal accountability of the use of surveillance techniques, it is important that intelligence are created through legislation that includes oversight provisions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Comprehensive oversight of all intrusive measures: Currently the Review Committee established under the Telegraph Act is responsible for the evaluation of orders for the interception, monitoring, decryption, and collection of traffic data. The Review Committee is not responsible for reviewing the implementation or effectiveness of such orders and is not responsible for reviewing orders for access to stored information or other forms of electronic surveillance. This situation is a result of 1. Present oversight mechanisms not having comprehensive mandates 2. Different laws in India enabling different levels of access and not providing a harmonized oversight mechanism and 3.Indian law not formally addressing and regulating emerging surveillance technologies and techniques. To ensure effectiveness, it is important for oversight mechanisms to be comprehensive in mandate and scope.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establishment of a tribunal or redress mechanism: India currently does not have a specified means for individuals to seek redress for unlawful surveillance or surveillance that they feel has violated their rights. Thus, individuals must take any complaint to the courts. The downsides of such a system include the fact that the judiciary might not be able to make determinations regarding the violation, the court system in India is overwhelmed and thus due process is slow, and given the sensitive nature of the topic – courts might not have the ability to immediately access relevant documentation. To ensure redress, it is important that a tribunal or a redress mechanism with appropriate powers is established to address complaints or violations pertaining to surveillance.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Annual reporting by security agencies, law enforcement, and service providers: Information regarding orders for surveillance and the implementation of the same is not disclosed by the government or by service providers in India.&lt;a href="#fn29" name="fr29"&gt;[29] &lt;/a&gt; Indeed, service providers by law are required to maintain the confidentiality of orders for the interception, monitoring, or decryption of communications and monitoring or collection of traffic data. At the minimum, an oversight mechanism should receive annual reports from security agencies, law enforcement, and service providers with respect to the surveillance undertaken. Edited versions of these Reports could be shared with Parliament and the public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Consistent and mandatory reviews of relevant legislation: Though committees have been established to review various legislation and policy pertaining to state surveillance, the time frame for these reviews is not clearly defined by law. These reviews should take place on a consistent and publicly stated time frame. Furthermore, legislation enabling surveillance in India do not require review and assessment for relevance, adequacy, necessity, and proportionality after a certain period of time. Mandating that legislation regulating surveillance is subject to review on a consistent is important in ensuring that the provisions are relevant, proportionate, adequate, and necessary. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency of classification and declassification process and centralization of de-classified records: Currently, the Ministry of Home Affairs establishes the process that government departments must follow for classifying and de-classifying information. This process is not publicly available and de-classified information is stored only with the respective department. For transparency purposes, it is important that the process for classification of records be made public and the practice of classification of information  take place in exceptional cases. Furthermore, de-classified records should be stored centrally and made easily accessible to the public. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Executive and administrative orders regarding establishing of agencies and surveillance projects should be in the public domain: Intelligence agencies and surveillance projects in India are typically enabled through executive orders. For example, NATGRID was established via an executive order, but this order is not publicly available. As a form of transparency and accountability to the public, it is important that if executive orders establish an agency or  a surveillance project, these are made available to the public to the extent possible.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Oversight of surveillance should incorporate privacy and cyber/national security: Increasingly issues of surveillance, privacy, and cyber security are interlinked. Any move to establish an oversight mechanism for surveillance and the intelligence committee must incorporate and take into consideration privacy and cyber security. This could mean that an oversight mechanism for surveillance in India works closely with CERT-IN and a potential privacy commissioner or that the oversight mechanism contains internal expertise in these areas to ensure that they are adequately considered. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Oversight by design: Just like the concept of privacy by design promotes the ideal that principles of privacy are built into devices, processes, services, organizations, and regulation from the outset – oversight mechanisms for state surveillance should also be built in from the outset of surveillance projects and enabling legislation. In the past, this has not been the practice in India– the National Intelligence Grid was an intelligence system that sought to link twenty one databases together – making such information easily and readily accessible to security agencies – but the oversight of such a system was never defined.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt; Similarly, the Centralized Monitoring System was conceptualized to automate and internalize the process of intercepting communications by allowing security agencies to intercept communications directly and bypass the service provider.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; Despite amending the Telecom Licenses to provide for the technical components of this project, oversight of the project or of security agencies directly accessing information has yet to be defined.&lt;a href="#fn32" name="fr32"&gt;[32] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Examples of oversight mechanisms for State Surveillance: US, UK, Canada and United States&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;United States&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the United States the oversight 'ecosystem' for state surveillance is made up of:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Foreign Intelligence Surveillance Court&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The U.S Foreign Intelligence Surveillance Court (FISA) is the predominant oversight mechanism for state surveillance and oversees and authorizes the actions of the Federal Bureau of Investigation and the National Security Agency.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; The court was established by the enactment of the Foreign Intelligence Surveillance Act 1978 and is governed by Rules of Procedure, the current Rules being formulated in 2010.&lt;a href="#fn34" name="fr34"&gt;[34] &lt;/a&gt;The Court is empowered to ensure compliance with the orders that it issues and the government is obligated to inform the Court if orders are breached.&lt;a href="#fn35" name="fr35"&gt;[35] &lt;/a&gt;FISA allows for individuals who receive an order from the Court to challenge the same,&lt;a href="#fn36" name="fr36"&gt;[36] &lt;/a&gt;and public filings are available on the Court's website.&lt;a href="#fn37" name="fr37"&gt;[37] &lt;/a&gt;Additionally, organizations, including the American Civil Liberties Union&lt;a href="#fn38" name="fr38"&gt;[38] &lt;/a&gt;and the Electronic Frontier Foundation, have filed motions with the Court for release of records. &lt;a href="#fn39" name="fr39"&gt;[39] &lt;/a&gt;Similarly, Google has approached the Court for the ability to publish aggregate information regarding FISA orders that the company recieves.&lt;a href="#fn40" name="fr40"&gt;[40] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Government Accountability Office &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The U.S Government Accountability Office (GAO) is an independent office that works for Congress and conducts audits, investigates, provides recommendations, and issues legal decisions and opinions with regard to federal government spending of taxpayer's money by the government and associated agencies including the Defence Department, the FBI, and Homeland Security.&lt;a href="#fn41" name="fr41"&gt;[41] &lt;/a&gt;The head of the GAO is the Comptroller General of the United States and is appointed by the President. The GAO will initiate an investigation if requested by congressional committees or subcommittees or if required under public law or committee reports. The GOA has reviewed topics relating to Homeland Security, Information Security, Justice and Law Enforcement, National Defense, and Telecommunications.&lt;a href="#fn42" name="fr42"&gt;[42] &lt;/a&gt;For example, in June 2015 the GOA completed an investigation and report on 'Foreign Terrorist Organization Process and U.S Agency Enforcement Actions” &lt;a href="#fn43" name="fr43"&gt;[43] &lt;/a&gt;and an investigation on “Cyber Security: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies”.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The U.S. Senate Select Committee on Intelligence is a standing committee of the U.S Senate with the mandate to review intelligence activities and programs and ensure that these are inline with the Constitution and other relevant laws. The Committee is also responsible for submitting to Senate appropriate proposals for legislation, and for reporting to Senate on intelligence activities and programs.&lt;a href="#fn45" name="fr45"&gt;[45] &lt;/a&gt;The House Permanent Select Committee holds similar jurisdiction. The House Permanent Select Committee is committed to secrecy and cannot disclose classified information excepted authorized to do so. Such an obligation does not exist for the Senate Select Committee on Intelligence and the committee can disclose classified information publicly on its own.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and Civil Liberties Oversight Board&lt;/b&gt; (PCLOB)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy and Civil Liberties Oversight Board was established by the Implementing Recommendations of the 9/11 Commission Act of 2007 and is located within the executive branch.&lt;a href="#fn47" name="fr47"&gt;[47] &lt;/a&gt;The objective of the PCLOB is to ensure that the Federal Government's actions to combat terrorism are balanced against privacy and civil liberties. Towards this, the Board has the mandate to review and analyse ant-terrorism measures the executive takes and ensure that such actions are balanced with privacy and civil liberties, and to ensure that privacy and civil liberties are liberties are adequately considered in the development and implementation of anti-terrorism laws, regulations and policies.&lt;a href="#fn48" name="fr48"&gt;[48] &lt;/a&gt;The Board is responsible for developing principles to guide why, whether, when, and how the United States conducts surveillance for authorized purposes. Additionally, officers of eight federal agencies must submit reports to the PCLOB regarding the reviews that they have undertaken, the number and content of the complaints, and a summary of how each complaint was handled. In order to fulfill its mandate, the Board is authorized to access all relevant records, reports, audits, reviews, documents, papers, recommendations, and classified information. The Board may also interview and take statements from necessary personnel. The Board may request the Attorney General to subpoena on the Board's behalf individuals outside of the executive branch.&lt;a href="#fn49" name="fr49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To the extent possible, the Reports of the Board are made public. Examples of recommendations that the Board has made in the 2015 Report include: End the NSA”s bulk telephone records program, add additional privacy safeguards to the bulk telephone records program, enable the FISC to hear independent views on novel and significant matters, expand opportunities for appellate review of FISC decisions, take advantage of existing opportunities for outside legal and technical input in FISC matters, publicly release new and past FISC and DISCR decisions that involve novel legal, technical, or compliance questions, publicly report on the operation of the FISC Special Advocate Program, Permit Companies to Disclose Information about their receipt of FISA production orders and disclose more detailed statistics on surveillance, inform the PCLOB of FISA activities and provide relevant congressional reports and FISC decisions, begin to develop principles for transparency, disclose the scope of surveillance authorities affecting US Citizens.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Wiretap Report &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Wiretap Report is an annual compilation of information provided by federal and state officials regarding applications for interception orders of wire, oral, or electronic communications, data address offenses under investigation, types and locations of interception devices, and costs and duration of authorized intercepts.&lt;a href="#fn51" name="fr51"&gt;[51] &lt;/a&gt;When submitting information for the report a judge will include the name and jurisdiction of the prosecuting official who applied for the order, the criminal offense under investigation, the type of intercept device used, the physical location of the device, and the duration of the intercept. Prosecutors provide information related to the cost of the intercept, the number of days the intercept device was in operation, the number of persons whose communications were intercepted, the number of intercepts, and the number of incriminating intercepts recorded. Results of the interception orders such as arrest, trials, convictions, and the number of motions to suppress evidence are also noted in the prosecutor reports. The Report is submitted to Congress and is legally required under Title III of the Omnibus Crime Control and Safe Streets Act of 1968. The report is issued by the Administrative Office of the United States Courts.&lt;a href="#fn52" name="fr52"&gt;[52] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;United Kingdom&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Intelligence and Security Committee (ISC) of Parliament &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intelligence Security Committee was established by the Intelligence Services Act 1994. Members are appointed by the Prime Minster and the Committee reports directly to the same. Additionally, the Committee submits annual reports to Parliament. Towards this, the Committee can take evidence from cabinet ministers, senior officials, and from the public.&lt;a href="#fn53" name="fr53"&gt;[53] &lt;/a&gt;The most recent report of the Committee is the 2015 “Report on Privacy and Security”.&lt;a href="#fn54" name="fr54"&gt;[54] &lt;/a&gt;Members of the Committee are subject to the Official Secrets Act 1989 and have access to classified material when carrying out investigations.&lt;a href="#fn55" name="fr55"&gt;[55]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Joint Intelligence Committee (JIC)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This Joint Intelligence Committee is located in the Cabinet office and is broadly responsible for overseeing national intelligence organizations and providing advice to the Cabinet on issues related to security, defense, and foreign affairs. The JIC is overseen by the Intelligence and Security Committee.&lt;a href="#fn56" name="fr56"&gt;[56]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Interception of Communications Commissioner &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Interception of Communications Commissioner is appointed by the Prime Minster under the Regulation of Investigatory Powers Act 2000 for the purpose of reviewing surveillance conducted by intelligence agencies, police forces, and other public authorities.  Specifically, the Commissioner inspects the interception of communications, the acquisition and disclosure of communications data, the interception of communications in prisons, and the unintentional electronic interception.&lt;a href="#fn57" name="fr57"&gt;[57] &lt;/a&gt;The Commissioner submits an annual report to the Prime Minister. The Reports of the Commissioner are publicly available.&lt;a href="#fn58" name="fr58"&gt;[58]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Intelligence Services Commissioner &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intelligence Services Commissioner is an independent body appointed by the Prime Minister that is legally empowered through the Regulation of Investigatory Powers Act (RIPA) 2000. The Commissioner provides independent oversight on the use of surveillance by UK intelligence services.&lt;a href="#fn59" name="fr59"&gt;[59] &lt;/a&gt;Specifically, the Commissioner is responsible for reviewing authorized interception orders and the actions and performance of the intelligence services.&lt;a href="#fn60" name="fr60"&gt;[60]&lt;/a&gt; The Commissioner is also responsible for providing assistance to the Investigatory Powers Tribunal, submitting annual reports to the Prime Minister on the discharge of its functions, and advising the Home Office on the need of extending the Terrorism Prevention and Investigation Measures regime.&lt;a href="#fn61" name="fr61"&gt;[61] &lt;/a&gt;Towards these the Commissioner conducts in-depth audits on the orders for interception to ensure that the surveillance is within the scope of the law, that the surveillance was necessary for a legally established reason, that the surveillance was proportionate, that the information accessed was justified by the privacy invaded, and that the surveillance authorized by the appropriate official. The Commissioner also conducts 'site visits' to ensure that orders are being implemented as per the law.&lt;a href="#fn62" name="fr62"&gt;[62] &lt;/a&gt;As a note, the Intelligence Services Commissioner does not undertake any subject that is related to the Interception of Communications Commissioner. The Commissioner has access to any information that he feels is necessary to carry out his investigations. The Reports of the Intelligence Service Commissioner are publicly available.&lt;a href="#fn63" name="fr63"&gt;[63] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Investigatory Powers Tribunal &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Investigatory Powers Tribunal is a court which investigates complaints of unlawful surveillance by public authorities or intelligence/law enforcement agencies.&lt;a href="#fn64" name="fr64"&gt;[64]&lt;/a&gt; The Tribunal was established under the Regulation of Investigatory Powers Act 2000 and has a range of oversight functions to ensure that public authorities act and agencies are in compliance with the Human Rights Act 1998.&lt;a href="#fn65" name="fr65"&gt;[65]&lt;/a&gt; The Tribunal specifically is an avenue of redress for anyone who believes that they have been a victim of unlawful surveillance under RIPA or wider human rights infringements under the Human Rights Act 1998.  The Tribunal can provide seven possible outcomes for any application including 'found in favor of complainant, no determination in favour of complainant, frivolous or vexatious, out of time, out of jurisdiction, withdrawn, or no valid complaint.&lt;a href="#fn66" name="fr66"&gt;[66] &lt;/a&gt;The Tribunal has the authority to receive and consider evidence in any form, even if inadmissible in an ordinary court.&lt;a href="#fn67" name="fr67"&gt;[67]&lt;/a&gt; Where possible, cases are available on the Tribunal's website.  Decisions by the Tribunal cannot be appealed, but can be challenged in the European Court of Human Rights.&lt;a href="#fn68" name="fr68"&gt;[68] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Canada&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In Canada the oversight 'ecosystem' for state surveillance includes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security Intelligence Review Committee &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Security Intelligence Review Committee is an independent body that is accountable to the Parliament of Canada and reports on the Canadian Security Intelligence Service.&lt;a href="#fn69" name="fr69"&gt;[69]&lt;/a&gt; Members of the Security Intelligence Review Committee are appointed by the Prime Minister of Canada. The committee conducts reviews on a pro-active basis and investigates complaints. Committee members have access to classified information to conduct reviews. The Committee submits an annual report to Parliament and an edited version is publicly available. The 2014 Report was titled “Lifting the Shroud of Secrecy”&lt;a href="#fn70" name="fr70"&gt;[70] &lt;/a&gt;and includes reviews of the CSIS's activities, reports on complaints and subsequent investigations, and provides recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Office of the Communications Security Establishment Commissioner &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Communications Security Commissioner conducts independent reviews of Communications Security Establishment (CSE) activities to evaluate if they are within the scope of Canadian law.&lt;a href="#fn71" name="fr71"&gt;[71] &lt;/a&gt;The Commissioner submits a report to Parliament on an annual basis and has a number of powers including the power to subpoena documents and personnel.&lt;a href="#fn72" name="fr72"&gt;[72]&lt;/a&gt; If the Commissioner believes that the CSE has not complied with the law – it must report this to the Attorney General of Canada and to the Minister of National Defence. The Commissioner may also receive information from persons bound to secrecy if they deem it to be in the public interest to disclose such information.&lt;a href="#fn73" name="fr73"&gt;[73] &lt;/a&gt;The Commissioner is also responsible for verifying that the CSE does not surveil Canadians and for promoting measures to protect the privacy of Canadians.&lt;a href="#fn74" name="fr74"&gt;[74] &lt;/a&gt;When conducting a review, the Commissioner has the ability to examine records, receive briefings, interview relevant personnel, assess the veracity of information, listen to intercepted voice recordings, observe CSE operators and analysts to verify their work, examine CSI electronic tools, systems and databases to ensure compliance with the law.&lt;a href="#fn75" name="fr75"&gt;[75] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Office of the Privacy Commissioner&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Office of the Privacy Commissioner of Canada (OPC) oversees the implementation of and compliance with the Privacy Act and the Personal information and Electronic Documents Act.&lt;a href="#fn76" name="fr76"&gt;[76] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The OPC is an independent body that has the authority to investigate complaints regarding the handling of personal information by government and private companies, but can only comment on the activities of security and intelligence agencies. For example, in 2014 the OPC issued the report “Checks and Controls: Reinforcing Privacy Protection and Oversight for the Canadian Intelligence Community in an Era of Cyber Surveillance”&lt;a href="#fn77" name="fr77"&gt;[77]&lt;/a&gt; The OPC can also provide testimony to Parliament and other government bodies.&lt;a href="#fn78" name="fr78"&gt;[78] &lt;/a&gt;For example, the OPC has made appearances before the Senate Standing Committee of National Security and Defense on Bill C-51.&lt;a href="#fn79" name="fr79"&gt;[79]&lt;/a&gt; The OPC cannot conduct joint audits or investigations with other bodies.&lt;a href="#fn80" name="fr80"&gt;[80]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Annual Interception Reports&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Criminal Code of Canada, regional governments must issue annual interception reports. The reports must include number of individuals affected by interceptions, average duration of the interception, type of crimes investigated, numbers of cases brought to court, and number of individuals notified that interception had taken place.&lt;a href="#fn81" name="fr81"&gt;[81] &lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The presence of multiple and robust oversight mechanisms for state surveillance does not necessarily correlate to effective oversight. The oversight mechanisms in the UK, Canada, and the U.S have been criticised. For example, Canada . For example, the Canadian regime has been characterized as becoming weaker it has removed one of its key over sight mechanisms – the Inspector General of the Canadian Security Intelligence Service which was responsible for certifying that the Service was in compliance with law.&lt;a href="#fn82" name="fr82"&gt;[82] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other weaknesses in the Canadian regime that have been highlighted include the fact that different oversight bodies do not have the authority to share information with each other, and transparency reports do not include many new forms of surveillance.&lt;a href="#fn83" name="fr83"&gt;[83]&lt;/a&gt; Oversight mechanisms in the U.S on the other hand have been criticized as being opaque&lt;a href="#fn84" name="fr84"&gt;[84] &lt;/a&gt;or as lacking the needed political support to be effective.&lt;a href="#fn85" name="fr85"&gt;[85]&lt;/a&gt; The UK oversight mechanism has been criticized for not having judicial authorization of surveillance requests, have opaque laws, and for not having a strong right of redress for affected individuals.&lt;a href="#fn86" name="fr86"&gt;[86] &lt;/a&gt;These critiques demonstrate that there are a number of factors that must come together for an oversight mechanism to be effective. Public transparency and accountability to decision making bodies such as Parliament or Congress can ensure effectiveness of oversight mechanisms, and are steps towards providing the public with means to debate in an informed manner issues related to state surveillance and allows different bodies within the government the ability to hold the state accountable for its actions.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;.[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. For example, “Public Oversight” is one of the thirteen Necessary and  Proportionate principles on state communications surveillance developed  by civil society and academia globally, that should be incorporated by  states into communication surveillance regimes. The principles can be  accessed here: https://en.necessaryandproportionate.org/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Hans Born and Ian Leigh, “Making Intelligence Accountable. Legal Standards and Best Practice for Oversight of Intelligence Agencies.” Pg. 13. 2005. Available at: http://www.prsindia.org/theprsblog/wp-content/uploads/2010/07/making-intelligence.pdf. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. For example, this point was made in the context of the UK. For more  information see: Nick Clegg, 'Edward Snowden's revelations made it  clear: security oversight must be fit for the internet age,”. The  Guardian. March 3rd 2014. Available at: &lt;a href="http://www.theguardian.com/commentisfree/2014/mar/03/nick-clegg-snowden-security-oversight-internet-age"&gt;http://www.theguardian.com/commentisfree/2014/mar/03/nick-clegg-snowden-security-oversight-internet-age&lt;/a&gt;. Accessed: July 27, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. International Principles on the Application of Human Rights to  Communications Surveillance. Available at:  https://en.necessaryandproportionate.org/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Sub Rules (16) and (17) of Rule 419A, Indian Telegraph Rules, 1951.  Available at:http://www.dot.gov.in/sites/default/files/march2007.pdf  Note: This review committee is responsible for overseeing interception  orders issued under the Indian Telegraph Act and the Information  Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Information Technology Procedure and Safeguards for Interception,  Monitoring, and Decryption of Information Rules 2009. Definition q.  Available at: &lt;a href="http://dispur.nic.in/itact/it-procedure-interception-monitoring-decryption-rules-2009.pdf"&gt;http://dispur.nic.in/itact/it-procedure-interception-monitoring-decryption-rules-2009.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Information Technology (Procedure and safeguard for Monitoring and  Collecting Traffic Data or Information Rules, 2009). Definition (n).  Available at: &lt;a href="http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. This authority is responsible for authorizing interception requests  issued under the Indian Telegraph Act and the Information Technology  Act. Section 2, Indian Telegraph Act 1885 and Section 4, Information  Technology Procedure and Safeguards for Interception, Monitoring, and  Decryption of Information) Rules, 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. This authority is responsible for authorizing interception requests  issued under the Indian Telegraph Act and the Information Technology  Act. Section 2, Indian Telegraph Act 1885 and Section 4, Information  Technology Procedure and Safeguards for Interception, Monitoring, and  Decryption of Information) Rules, 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;].  Definition (d) and section 3 of the Information Technology (Procedure  and safeguard for Monitoring and Collecting Traffic Data or Information  Rules, 2009). Available at: &lt;a href="http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Rule 1, of the 419A Rules, Indian Telegraph Act 1885. Available  at:http://www.dot.gov.in/sites/default/files/march2007.pdf This  authority is responsible for authorizing interception requests issued  under the Indian Telegraph Act and the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Section 92, CrPc. Available at: http://www.icf.indianrailways.gov.in/uploads/files/CrPC.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Press Information Bureau GOI. Reconstitution of Cabinet Committees. June 19th 2014. Available at: &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=105747"&gt;http://pib.nic.in/newsite/PrintRelease.aspx?relid=105747&lt;/a&gt;. Accessed August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Press Information Bureau, Government of India. Home minister proposes  radical restructuring of security architecture. Available at: &lt;a href="http://www.pib.nic.in/newsite/erelease.aspx?relid=56395"&gt;http://www.pib.nic.in/newsite/erelease.aspx?relid=56395&lt;/a&gt;. Accessed August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Section 24 read with Schedule II of the Right to Information Act 2005. Available at: http://rti.gov.in/rti-act.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Section 8 of the Right to Information Act 2005. Available at: http://rti.gov.in/rti-act.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Abhimanyu Ghosh. “Open Government and the Right to Information”. Legal Services India. Available at: &lt;a href="http://www.legalservicesindia.com/articles/og.htm"&gt;http://www.legalservicesindia.com/articles/og.htm&lt;/a&gt;. Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Public Record Rules 1997. Section 2. Definition c. Available at: &lt;a href="http://nationalarchives.nic.in/writereaddata/html_en_files/html/public_records97.html"&gt;http://nationalarchives.nic.in/writereaddata/html_en_files/html/public_records97.html&lt;/a&gt;. Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Times of India. Classified information is reviewed after 25-30 years. April 13th 2015. Available at: &lt;a href="http://timesofindia.indiatimes.com/india/Classified-information-is-reviewed-after-25-30-years/articleshow/46901878.cms"&gt;http://timesofindia.indiatimes.com/india/Classified-information-is-reviewed-after-25-30-years/articleshow/46901878.cms&lt;/a&gt;. Accessed: August 8, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Government of India. Ministry of Home Affairs. Lok Sabha Starred Question No 557. Available at: &lt;a href="http://mha1.nic.in/par2013/par2015-pdfs/ls-050515/557.pdf"&gt;http://mha1.nic.in/par2013/par2015-pdfs/ls-050515/557.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. The Kargil Committee report Executive Summanry. Available at: http://fas.org/news/india/2000/25indi1.htm. Accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. PIB Releases. Group of Ministers Report on Reforming the National Security System”. Available at: &lt;a href="http://pib.nic.in/archieve/lreleng/lyr2001/rmay2001/23052001/r2305200110.html"&gt;http://pib.nic.in/archieve/lreleng/lyr2001/rmay2001/23052001/r2305200110.html&lt;/a&gt;. Last accessed: August 6, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. The Observer Research Foundation. “Manish Tewari introduces Bill on  Intelligence Agencies Reform. August 5th 2011. Available at: &lt;a href="http://www.observerindia.com/cms/sites/orfonline/modules/report/ReportDetail.html?cmaid=25156&amp;amp;mmacmaid=20327"&gt;http://www.observerindia.com/cms/sites/orfonline/modules/report/ReportDetail.html?cmaid=25156&amp;amp;mmacmaid=20327&lt;/a&gt;. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. The Intelligence Services (Powers and Regulation) Bill, 2011. Available at: &lt;a href="http://www.observerindia.com/cms/export/orfonline/documents/Int_Bill.pdf"&gt;http://www.observerindia.com/cms/export/orfonline/documents/Int_Bill.pdf&lt;/a&gt;. Accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. The Privacy Bill 2011. Available at: https://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;].  The Report of Group of Experts on Privacy. Available at: http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. Institute for Defence Studies and Analyses. “A Case for Intelligence Reforms in India”. Available at: &lt;a href="http://www.idsa.in/book/AcaseforIntelligenceReformsinIndia.html"&gt;http://www.idsa.in/book/AcaseforIntelligenceReformsinIndia.html&lt;/a&gt;. Accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. India Calls for Transparency in internet Surveillance. NDTV. July 3rd 2015. Available at: &lt;a href="http://gadgets.ndtv.com/internet/news/india-calls-for-transparency-in-internet-surveillance-710945"&gt;http://gadgets.ndtv.com/internet/news/india-calls-for-transparency-in-internet-surveillance-710945&lt;/a&gt;. Accessed: July 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Lovisha Aggarwal. “Analysis of News Items and Cases on Surveillance and  Digital Evidence in India”. Available at:  http://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Rule 25 (4) of the Information Technology (Procedures and Safeguards for  the Interception, Monitoring, and Decryption of Information Rules)  2011. Available at:  http://dispur.nic.in/itact/it-procedure-interception-monitoring-decryption-rules-2009.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Ministry of Home Affairs, GOI. National Intelligence Grid. Available at: &lt;a href="http://www.davp.nic.in/WriteReadData/ADS/eng_19138_1_1314b.pdf"&gt;http://www.davp.nic.in/WriteReadData/ADS/eng_19138_1_1314b.pdf&lt;/a&gt;. Last accessed: August 6, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. Press Information Bureau, Government of India. Centralised System to Monitor Communications Rajya Sabha. Available at: &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=54679"&gt;http://pib.nic.in/newsite/erelease.aspx?relid=54679&lt;/a&gt;. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. Department of Telecommunications. Amendemnt to the UAS License agreement  regarding Central Monitoring System. June 2013. Available at:  http://cis-india.org/internet-governance/blog/uas-license-agreement-amendment&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court. July 29th 2013. Available at: &lt;a href="http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf"&gt;http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf&lt;/a&gt;. Last accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court. Rules of Procedure 2010. Available at: http://www.fisc.uscourts.gov/sites/default/files/FISC%20Rules%20of%20Procedure.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. United States Foreign Intelligence Court. Honorable Patrick J. Leahy. 2013. Available at: http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court. July 29th 2013. Available at: &lt;a href="http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf"&gt;http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf&lt;/a&gt;. Last accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Public Filings – U.S Foreign Intelligence Surveillance Court. Available at: http://www.fisc.uscourts.gov/public-filings&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. ACLU. FISC Public Access Motion – ACLU Motion for Release of Court Records Interpreting Section 215 of the Patriot Act. Available at: https://www.aclu.org/legal-document/fisc-public-access-motion-aclu-motion-release-court-records-interpreting-section-215&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court Washington DC. In Re motion for consent to disclosure of court records or, in the alternative a determination of the effect of the Court's rules on statutory access rights. Available at: https://www.eff.org/files/filenode/misc-13-01-opinion-order.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Google  Official Blog. Shedding some light on Foreign Intelligence Surveillance Act (FISA) requests. February 3rd 2014. Available at: http://googleblog.blogspot.in/2014/02/shedding-some-light-on-foreign.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. U.S Government Accountability Office. Available at: http://www.gao.gov/key_issues/overview#t=1. Last accessed: August 8, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Report to Congressional Requesters. Combating Terrorism: Foreign Terrorist Organization Designation Proces and U.S Agency Enforcement Actions. Available at: http://www.gao.gov/assets/680/671028.pdf. Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. United States Government Accountability Office. Cybersecurity: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies. Available: http://www.gao.gov/assets/680/670935.pdf. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Committee Legislation. Available at: http://ballotpedia.org/United_States_Senate_Committee_on_Intelligence_(Select)#Committee_legislation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Congressional Research Service. Congressional Oversight of Intelligence: Current Structure and Alternatives. May 14th 2012. Available at: https://fas.org/sgp/crs/intel/RL32525.pdf. Last Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn47"&gt;47&lt;/a&gt;]. The Privacy and Civil Liberties Oversight Board: About the Board. Available at: https://www.pclob.gov/aboutus.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. The Privacy and Civil Liberties Oversight Board: About the Board. Available at: https://www.pclob.gov/aboutus.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Congressional Research Service. Congressional Oversight of Intelligence: Current Structure and Alternatives. May 14th 2012. Available at: https://fas.org/sgp/crs/intel/RL32525.pdf. Last Accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. United States Courts. Wiretap Reports. Available at: http://www.uscourts.gov/statistics-reports/analysisreports/wiretap-reports&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr51" name="fn51"&gt;51&lt;/a&gt;]. United States Courts. Wiretap Reports. Available at: http://www.uscourts.gov/statisticsreports/&lt;br /&gt;analysis-reports/wiretap-reports/faqs-wiretap-reports#faq-What-information-does-the-AO-receive-from-prosecutors?. Last Accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr52" name="fn52"&gt;52&lt;/a&gt;]. Intelligence and Security Committee of Parliament. Transcripts and Public Evidence. Available at: http://isc.independent.gov.uk/public-evidence. Last accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr53" name="fn53"&gt;53&lt;/a&gt;]. Intelligence and Security Committee of Parliament. Special Reports. Available at http://isc.independent.gov.uk/committee-reports/special-reports. Last accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr54" name="fn54"&gt;54&lt;/a&gt;]. Hugh Segal. The U.K. has legislative oversight of surveillance. Why not Canada. The Globe and Mail. June 12th 2013. Available at: http://www.theglobeandmail.com/globe-debate/uk-haslegislative-oversight-of-surveillance-why-not-canada/article12489071/. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr55" name="fn55"&gt;55&lt;/a&gt;]. The Joint Intelligence Committee home page. For more information see: https://www.gov.uk/government/organisations/national-security/groups/joint-intelligence-committee&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr56" name="fn56"&gt;56&lt;/a&gt;]. Interception of Communications Commissioner's Office. RIPA. Available at: http://www.iocco-uk.info/sections.asp?sectionID=2&amp;amp;type=top. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr57" name="fn57"&gt;57&lt;/a&gt;]. Interception of Communications Commissioner's Office. Reports. Available at: http://www.iocco-uk.info/sections.asp?sectionID=1&amp;amp;type=top. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr58" name="fn58"&gt;58&lt;/a&gt;]. The Intelligence Services Commissioner's Office Homepage. For more information see: http://intelligencecommissioner.com/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr59" name="fn59"&gt;59&lt;/a&gt;]. The Intelligence Services Commissioner's Office – The Commissioner's Statutory Functions. Available at: http://intelligencecommissioner.com/content.asp?id=4&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr60" name="fn60"&gt;60&lt;/a&gt;]. The Intelligence Services Commissioner's Office – The Commissioner's Statutory Functions. Available at: http://intelligencecommissioner.com/content.asp?id=4&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr61" name="fn61"&gt;61&lt;/a&gt;]. The Intelligence Services Commissioner's Office. What we do. Available at: http://intelligencecommissioner.com/content.asp?id=5. Last Accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr62" name="fn62"&gt;62&lt;/a&gt;]. The Intelligence Services Commissioner's Office. Intelligence Services Commissioner's Annual Reports. Available at: http://intelligencecommissioner.com/content.asp?id=19. Last&lt;br /&gt;accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr63" name="fn63"&gt;63&lt;/a&gt;]. The Investigatory Powers Tribunal Homepage. Available at: http://www.ipt-uk.com/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr64" name="fn64"&gt;64&lt;/a&gt;]. The Investigatory Powers Tribunal – Functions – Key role. Available at: http://www.ipt-uk.com/section.aspx?pageid=1&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr65" name="fn65"&gt;65&lt;/a&gt;]. Investigatory Powers Tribunal. Functions – Decisions available to the Tribunal. Available at: http://www.ipt-uk.com/section.aspx?pageid=4. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr66" name="fn66"&gt;66&lt;/a&gt;]. Investigator Powers Tribunal. Operation - Available at: http://www.ipt-uk.com/section.aspx?pageid=7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr67" name="fn67"&gt;67&lt;/a&gt;]. Investigatory Powers Tribunal. Operation- Differences to the ordinary court system. Available at: http://www.ipt-uk.com/section.aspx?pageid=7. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr68" name="fn68"&gt;68&lt;/a&gt;]. Security Intelligence Review Committee – Homepage. Available at: http://www.sirc-csars.gc.ca/index-eng.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr69" name="fn69"&gt;69&lt;/a&gt;]. SIRC Annual Report 2013-2014: Lifting the Shroud of Secrecy. Available at: http://www.sirccsars. gc.ca/anrran/2013-2014/index-eng.html. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr70" name="fn70"&gt;70&lt;/a&gt;]. The Office of the Communications Security Establishment – Homepage. Available at: http://www.ocsecbccst.gc.ca/index_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr71" name="fn71"&gt;71&lt;/a&gt;]. The Office of the Communications Security Establishment – Homepage. Available at: http://www.ocsecbccst.gc.ca/index_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr72" name="fn72"&gt;72&lt;/a&gt;]. The Office of the Communications Security Establishment – Mandate. Available at: http://www.ocsecbccst.gc.ca/mandate/index_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr73" name="fn73"&gt;73&lt;/a&gt;]. The Office of the Communications Security Establishment – Functions. Available at: http://www.ocsecbccst.gc.ca/functions/review_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr74" name="fn74"&gt;74&lt;/a&gt;]. The Office of the Communications Security Establishment – Functions. Available at: http://www.ocsecbccst.gc.ca/functions/review_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr75" name="fn75"&gt;75&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Homepage. Available at: https://www.priv.gc.ca/index_e.ASP&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr76" name="fn76"&gt;76&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Reports and Publications. Special Report to Parliament “Checks and Controls: Reinforcing Privacy Protection and Oversight for the Canadian Intelligence Community in an Era of Cyber-Surveillance. January 28th 2014. Available at: https://www.priv.gc.ca/information/srrs/201314/sr_cic_e.asp&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr77" name="fn77"&gt;77&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Available at: https://www.priv.gc.ca/index_e.asp. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr78" name="fn78"&gt;78&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Appearance before the Senate Standing Commitee National Security and Defence on Bill C-51, the Anti-Terrorism Act, 2015. Available at: https://www.priv.gc.ca/parl/2015/parl_20150423_e.asp. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr79" name="fn79"&gt;79&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Special Report to Parliament. January 8th 2014. Available at: https://www.priv.gc.ca/information/sr-rs/201314/sr_cic_e.asp. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr80" name="fn80"&gt;80&lt;/a&gt;]. Telecom Transparency Project. The Governance of Telecommunications Surveillance: How Opaque and Unaccountable Practices and Policies Threaten Canadians. Available at: http://www.telecomtransparency.org/wp-content/uploads/2015/05/Governance-of-Telecommunications-Surveillance-Final.pdf. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr81" name="fn81"&gt;81&lt;/a&gt;]. Patrick Baud. The Elimination of the Inspector General of the Canadian Security Intelligence Serive. May 2013. Ryerson University. Available at; http://www.academia.edu/4731993/The_Elimination_of_the_Inspector_General_of_the_Canadian_Security_Intelligence_Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr82" name="fn82"&gt;82&lt;/a&gt;]. Telecom Transparency Project. The Governance of Telecommunications Surveillance: How Opaque and Unaccountable Practices and Policies Threaten Canadians. Available at: http://www.telecomtransparency.org/wp-content/uploads/2015/05/Governance-of-Telecommunications-Surveillance-Final.pdf. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr83" name="fn83"&gt;83&lt;/a&gt;]. Glenn Greenwald. Fisa court oversight: a look inside a secret and empty process. The Guardian. June 19th 2013. Available at: http://www.theguardian.com/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy, Nadia Kayyali. Privacy and Civil Liberties Oversight Board to NSA: Why is Bulk Collection of Telelphone Records Still Happening? February 2105. Available at :https://www.eff.org/deeplinks/2015/02/privacy-and-civil-liberties-oversight-board-nsa-whybulk-collection-telephone. Last accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr84" name="fn84"&gt;84&lt;/a&gt;]. Scott Shance. The Troubled Life of the Privacy and Civil Liberties Oversight Board. August 9th 2012. The Caucus. Available at: http://thecaucus.blogs.nytimes.com/2012/08/09/thetroubled-life-of-the-privacy-and-civil-liberties-oversight-board/?_r=0. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr85" name="fn85"&gt;85&lt;/a&gt;]. The Open Rights Group. Don't Spy on Us. Reforming Surveillance in the UK. September 2014. Available at: https://www.openrightsgroup.org/assets/files/pdfs/reports/DSOU_Reforming_surveillance_old.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr86" name="fn86"&gt;86&lt;/a&gt;].&lt;/p&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance'&gt;https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-11-24T06:09:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee">
    <title>Open Letter to Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee  </title>
    <link>https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee</link>
    <description>
        &lt;b&gt;An open letter was sent to the Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee on the proposed EU Regulation. The letter was apart of an initiative that Privacy International and a number of other NGO's are undertaking.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;Dear Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee&lt;/b&gt;,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On behalf of The Centre for Internet and Society, Bangalore, India,  we are writing to express our support of the European Commission’s proposed General Data Protection Regulation (COM (2012) 11).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legal framework established under the 1995 Data Protection Directive (95/46/EC) in Europe has positively influenced many existing privacy regimes worldwide, serving as a model legal framework in jurisdictions that are in the process of developing privacy regimes, including India. The positive impact of the Data Protection Directive shows the potential of the Regulation to become a global model for the protection of personal data. The Regulation seeks to address new scenarios that have arisen in the context of rapidly changing technologies and practices, increasing its potential for positively influencing privacy rights for individuals globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is currently in the process of considering the enactment of privacy legislation, in part with the aim of ensuring adequate safeguards to enable and enhance information flows into India from countries around the world, including Europe. At the same time, India is seeking  Data Secure Status from the EU, on the basis of its current regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that the EU framework for data protection has a major influence on the current and emerging privacy regime in India. India is only one country of many that are in the beginning stages of developing a comprehensive privacy regime. Thus, we ask that you keep in mind how the Regulation will impact the rights of individual in countries outside of Europe, particularly in countries that are in the process of developing privacy regimes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We ask that you take into consideration the four following points that we believe need to be addressed in the Regulation to help ensure adequate protection of the rights of individuals in the European Union and around the world.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Strengthen the principle of purpose limitation: &lt;/b&gt;The Regulation should incorporate a strong purpose limitation principle that strictly limits present and future uses of personal data to the purposes for which it was originally collected. Currently, Article 6(4) allows for the further processing of data when the processing is &lt;i&gt;“not compatible with the one for which the personal data have been collected”. &lt;/i&gt;Though the provision establishes legal requirements, one of which must be before information can be used for a further purpose, this is has proven insufficient in the existing Directive. The current provision in the Regulation dilutes the principle of purpose limitation as well as weakening an individual’s ability to make informed decisions about their personal data.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Define principles for interpretation of broad terms: &lt;/b&gt;The Regulation should create principles for interpreting broad terms such as “legitimate interest” and “public interest”. These vague terms are used throughout the Regulation, and create the potential for loopholes or abuse. Because these terms can be interpreted in many different ways, it is important to create a set of principles to guide their interpretation  by data protection authorities and courts to avoid inconsistent application and enforcement of the Regulation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Clarify the scope of the Regulation:&lt;/b&gt; The Regulation should clearly describe the jurisdictional scope and reach of its provisions. Currently Article 3(1) states that the Regulation will apply to the processing of data “in the context of the activities of an establishment of a controller or a processor in the Union”.  The flow of information on the online environment coupled with trends such as cloud computing, outsourcing, and cross border business creates a scenario where defining what constitutes “context of the activities of an establishment”, is difficult and could lead to situations where personal data is not protected, as the collection, use, or storage of it does not necessarily fall within the “context of the activities”. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Address access by foreign alliance bodies&lt;/b&gt;: In light of growing demands by law enforcement for access, use, and transfer of personal information for investigative purposes across jurisdictions– the Regulation should define the circumstances in which personal data protected by its provisions can be accessed and used by foreign intelligence bodies, and the procedure by which to do so. The Regulation should address challenges such as access by foreign intelligence bodies to data stored on the cloud and data that has passed through/is stored on foreign networks/servers. &lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee'&gt;https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-23T05:00:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation">
    <title>Open Letter to "Not" Recognize India as Data Secure Nation till Enactment of Privacy Legislation</title>
    <link>https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation</link>
    <description>
        &lt;b&gt;India shouldn't be granted the status of "data secure nation" by Europe until it enacts a suitable privacy legislation, points out the Centre for Internet and Society in this open letter.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This letter is with regards to both the request from the Confederation of Indian Industry that the EU recognize India as a data secure nation made on April 29th 2013, &lt;a href="https://cis-india.org/accessibility/blog/#fn1" name="fr1"&gt;[1]&lt;/a&gt; and the threat from India to stall  negotiations on the Free Trade Agreement with the EU unless recognized  as data secure nation made on May 9th 2013.&lt;a href="https://cis-india.org/accessibility/blog/#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On behalf of the Centre for Internet and Society, we request that you  urge the European Parliament and the EU ambassador to India to reject  the request, and to not recognize India as a data secure nation until a  privacy legislation has been enacted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society believes that if Europe were to  grant India status as a data secure nation based only on the protections  found in the “Information Technology (Reasonable Security Practices and  Procedures and Sensitive Personal Data or Information) Rules 2011”, not  only will India be protected through inadequate standards, but the government will not have an incentive to enact a legislation that  recognizes privacy as a comprehensive and fundamental human right. Since 2010 India has been in the process of realizing a privacy  legislation.  In 2011 the “Draft Privacy Bill 2011” was leaked.&lt;a href="https://cis-india.org/accessibility/blog/#fn3" name="fr3"&gt;[3]&lt;/a&gt; In   2012 the “Report of the Group of Experts on Privacy” was released. The  Report recommends a comprehensive right to privacy for India, nine  national privacy principles, and a privacy framework of co-regulation  for India to adopt. &lt;a href="https://cis-india.org/accessibility/blog/#fn4" name="fr4"&gt;[4]&lt;/a&gt; In 2013 the need for a stand alone privacy  legislation was highlighted by the Law Minister.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; The Centre for Internet and Society has recently drafted the “Privacy  Protection Bill 2013” - a citizen's version of a possible privacy  legislation for India.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Currently, we are hosting a series of six  “Privacy Roundtables” across India in collaboration with FICCI and DSCI  from April 2013 - August 2013.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; The purpose of the roundtables is to  gain public feedback to the text of the “Privacy Protection Bill 2013”,  and other possible frameworks for privacy in India. The discussions and  recommendations from the meeting will be published into a compilation  and presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Center for Internet and Society will also be submitting the  “Privacy Protection Bill 2013” and the public feedback to the Department  of Personnel and Training (DoPT) with the hope of contributing to and  informing a privacy legislation in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been researching privacy since  2010 and was a member of the committee which compiled the “Report of the  Group of Experts on Privacy”. We have also submitted comments on the  “Information Technology (Reasonable Security Practices and Procedures  and Sensitive Personal Data or Information) Rules 2011” to the Committee  on Subordinate Legislation  of the 15th Lok Sabha.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We hope that you will consider our request and urge the European  Parliament and the EU ambassador to India to not recognize India as a  data secure nation until a privacy legislation has been enacted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. CII asks EU to accept India as 'Data Secure' nation: &lt;a class="external-link" href="http://bit.ly/15Z77dH"&gt;http://bit.ly/15Z77dH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. India threatens to stall trade talks with EU: &lt;a class="external-link" href="http://bit.ly/1716aF1"&gt;http://bit.ly/1716aF1&lt;/a&gt;&lt;a class="moz-txt-link-freetext" href="http://www.business-standard.com/article/economy-policy/india-threatens-to-stall-trade-talks-with-eu-113050900020_1.html"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. New privacy Bill: Data Protection Authority, jail term for  offence: &lt;a class="external-link" href="http://bit.ly/emqkkH"&gt;http://bit.ly/emqkkH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The Report of the Group of Experts on Privacy &lt;a class="external-link" href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Law Minister Seeks stand along privacy legislation, writes PM: &lt;a class="external-link" href="http://bit.ly/16hewWs"&gt;http://bit.ly/16hewWs&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. The Privacy Protection Bill 2013 drafted by CIS: &lt;a class="external-link" href="http://bit.ly/10eum5d"&gt;http://bit.ly/10eum5d&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Privacy Roundtable: &lt;a class="external-link" href="http://bit.ly/12HYoj5"&gt;http://bit.ly/12HYoj5&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data Information) Rules, 2011: &lt;a class="external-link" href="http://bit.ly/Z2FjX6"&gt;http://bit.ly/Z2FjX6&lt;/a&gt;&lt;/p&gt;
&lt;div id="_mcePaste"&gt;﻿&lt;b&gt;Note: CIS sent the letters to Data Protection Commissioners across Europe.&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation'&gt;https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:07:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance">
    <title>More than a Hundred Global Groups Make a Principled Stand against Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance</link>
    <description>
        &lt;b&gt;For some time now there has been a need to update understandings of existing human rights law to reflect modern surveillance technologies and techniques.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Nothing could demonstrate the urgency of this situation more than the &lt;a href="https://www.privacyinternational.org/blog/looking-at-prism-nsas-mass-surveillance-program"&gt;recent&lt;/a&gt; &lt;a href="https://www.eff.org/deeplinks/2013/06/spy-without-borders"&gt;revelations&lt;/a&gt; confirming the mass surveillance of innocent individuals around the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To move toward that goal, today we’re pleased to announce the formal launch of the &lt;a href="https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf" class="internal-link"&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt;. The principles articulate what international human rights law – which binds every country across the globe – require of governments in the digital age. They speak to a growing global consensus that modern surveillance has gone too far and needs to be restrained. They also give benchmarks that people around the world can use to evaluate and push for changes in their own legal systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The product of over a year of consultation among civil society, privacy and technology experts, including the Centre for Internet and Society (read &lt;a href="https://www.privacyinternational.org/blog/towards-international-principles-on-communications-surveillance"&gt;here&lt;/a&gt;, &lt;a href="https://www.eff.org/deeplinks/2012/12/tackling-state-surveillance-and-human-rights-protecting-universal-freedoms"&gt;here&lt;/a&gt;, &lt;a href="https://www.eff.org/issues/surveillance-human-rights"&gt;here&lt;/a&gt; and &lt;a href="https://www.privacyinternational.org/blog/pi-is-pleased-to-announce-a-public-consultation-on-the-international-principles-on"&gt;here&lt;/a&gt;), the principles have already been co-signed by over hundred organisations from around the world. The process was led by &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt;, &lt;a href="https://accessnow.org/"&gt;Access&lt;/a&gt;, and the &lt;a href="https://eff.org/"&gt;Electronic Frontier Foundation&lt;/a&gt;. The process was led by &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt;, &lt;a href="https://accessnow.org/"&gt;Access&lt;/a&gt;, and the &lt;a href="https://eff.org/"&gt;Electronic Frontier Foundation&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The release of the principles comes on the heels of a &lt;a href="https://www.privacyinternational.org/blog/un-report-the-link-between-state-surveillance-and-freedom-of-expression"&gt;landmark&lt;/a&gt; &lt;a href="https://www.eff.org/deeplinks/2013/06/internet-and-surveillance-UN-makes-the-connection"&gt;report&lt;/a&gt; from the United Nations Special Rapporteur on the right to Freedom of Opinion and Expression, which details the widespread use of state surveillance of communications, stating that such surveillance severely undermines citizens’ ability to enjoy a private life, freely express themselves and enjoy their other fundamental human rights. And recently, the UN High Commissioner for Human Rights, Nivay Pillay, &lt;a href="http://www.ohchr.org/EN/NewsEvents/Pages/Media.aspx?IsMediaPage=true&amp;amp;LangID=E"&gt;emphasised the importance&lt;/a&gt; of applying human right standards and democratic safeguards to surveillance and law enforcement activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While concerns about national security and criminal activity may justify the exceptional and narrowly-tailored use of surveillance programmes, surveillance without adequate safeguards to protect the right to privacy actually risk impacting negatively on the enjoyment of human rights and fundamental freedoms," Pillay said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principles, summarised below, can be found in full at &lt;a class="external-link" href="http://necessaryandproportionate.org"&gt;necessaryandproportionate.org&lt;/a&gt;. Over the next year and beyond, groups around the world will be using them to advocate for changes in how present laws are interpreted and how new laws are crafted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We encourage privacy advocates, rights organisations, scholars from legal and academic communities, and other members of civil society to support the principles by adding their signature.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To sign, please send an email to &lt;a class="mail-link" href="mailto:rights@eff.org"&gt;rights@eff.org&lt;/a&gt;, or visit &lt;a class="external-link" href="https://www.necessaryandproportionate.org/about"&gt;https://www.necessaryandproportionate.org/about&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Summary of the 13 principles&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Legality: Any limitation on the right to privacy must be prescribed by law.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Legitimate Aim: Laws should only permit communications surveillance by specified State authorities to achieve a legitimate aim that corresponds to a predominantly important legal interest that is necessary in a democratic society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Necessity: Laws permitting communications surveillance by the State must limit surveillance to that which is strictly and demonstrably necessary to achieve a legitimate aim.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Adequacy: Any instance of communications surveillance authorised by law must be appropriate to fulfill the specific legitimate aim identified.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proportionality: Decisions about communications surveillance must be made by weighing the benefit sought to be achieved against the harm that would be caused to users’ rights and to other competing interests.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Competent judicial authority: Determinations related to communications surveillance must be made by a competent judicial authority that is impartial and independent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Due process: States must respect and guarantee individuals' human rights by ensuring that lawful procedures that govern any interference with human rights are properly enumerated in law, consistently practiced, and available to the general public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;User notification: Individuals should be notified of a decision authorising communications surveillance with enough time and information to enable them to appeal the decision, and should have access to the materials presented in support of the application for authorisation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency: States should be transparent about the use and scope of communications surveillance techniques and powers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Public oversight: States should establish independent oversight mechanisms to ensure transparency and accountability of communications surveillance.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Integrity of communications and systems: States should not compel service providers, or hardware or software vendors to build surveillance or monitoring capabilities into their systems, or to collect or retain information.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Safeguards for international cooperation: Mutual Legal Assistance Treaties (MLATs) entered into by States should ensure that, where the laws of more than one State could apply to communications surveillance, the available standard with the higher level of protection for users should apply.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Safeguards against illegitimate access: States should enact legislation criminalising illegal communications surveillance by public and private actors.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance'&gt;https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-31T14:26:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011">
    <title>Leaked Privacy Bill: 2014 vs. 2011</title>
    <link>https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has recently received a leaked version of the draft Privacy Bill 2014 that the Department of Personnel and Training, Government of India has drafted.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;After obtaining a copy of the leaked Privacy Bill 2014, we have  replaced the blog "An Analysis of the New Draft Privacy Bill" which was  based off of a report from the Economic Times, with this blog post&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This represents the third leak of potential privacy legislation for India that we know of, with publicly available versions having leaked in &lt;a href="http://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf"&gt;April 2011&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;September 2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When compared to the September 2011 Privacy Bill, the text of the 2014 Bill includes a number of changes, additions, and deletions.  Below is an outline of significant changes from the &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;September 2011 Privacy Bill&lt;/a&gt; to the 2014 Privacy Bill:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Scope:&lt;/b&gt; The 2014 Bill extends the right to Privacy to all residents of India. This is in contrast to the 2011 Bill, which extended the Right to Privacy to citizens of India.  The 2014 Bill furthermore recognizes the Right to Privacy as a part of Article 21 of the Indian Constitution and extends to the whole of India, whereas the 2011 Bill did not explicitly recognize the Right to Privacy as being a part of Article 21, and excluded Jammu and Kashmir from its purview.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Definitions:&lt;/span&gt;&lt;/b&gt;&lt;span&gt; The 2014 Bill includes a number of new definitions, redefines existing terms, and deletes others.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms that have been added in the 2014 Bill and the definitions&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Personal identifier&lt;/i&gt;:&lt;/b&gt; Any unique alphanumeric sequence of members, letters, and symbols that specifically identifies an individual with a database or a data set.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Legitimate purpose&lt;/i&gt;:&lt;/b&gt; A purpose covered under this Act or any other law for the time being in force, which is certain, unambiguous, and limited in scope for collection of any personal data from a data subject.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Competent authority&lt;/i&gt;&lt;/b&gt; : The authority which is authorized to sanction interception or surveillance, as the case may be, under this Act or rules made there under or any other law for the time being in force.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Notification&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: &lt;/i&gt;Notification issued under this Act and published in the Official Gazette&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Control&lt;/i&gt; :&lt;/b&gt; And all other cognate forms of expressions thereof, means, in relation to personal data, the collection or processing of personal data and shall include the ability to determine the purposes for and the manner in which any personal data is to be collected or processed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;i&gt;Telecommunications system&lt;/i&gt;:&lt;/b&gt; Any system used for transmission or reception of any communication by wire, radio, visual or other electromagnetic means but shall not include broadcasting services.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Privacy standards&lt;/i&gt;:&lt;/b&gt; The privacy standards or protocols or codes of practice.  developed by industry associations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms that have been re-defined in the 2014 Bill from the 2011 Bill and the 2014 Bill definitions&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Communication data:&lt;/i&gt;&lt;/b&gt;The data held or obtained by a telecommunications service provider in relation to a data subject including the data usage of the telecommunications &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Data subject&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;: Any living individual, whose personal data is controlled by any person&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Interception&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: &lt;/i&gt;In relation to any communication in the course of its transmission through a telecommunication system, any action that results in some or all of the contents of that communication being made available, while being transmitted, to a person other than the sender or the intended recipient of the communication. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Person&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: A&lt;/i&gt;ny natural or legal person and shall include a body corporate, partnership, society, trust, association of persons, Government company, government department, urban  local body, or any other officer, agency or instrumentality of the state. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Sensitive personal data&lt;/i&gt;:&lt;/b&gt; Personal data relating to: (a) physical and mental health including medical history, (b) biometric, bodily or genetic information, (c) criminal convictions (d) password, (e) banking credit and financial data (f) narco analysis or polygraph test data, (g) sexual orientation.  Provided that any information that is freely available or accessible in public domain or to be furnished under the Right to Information Act 2005 or any other law for time being in force shall not be regarded as sensitive personal data for the purposes of this Act.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Individual:&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;a resident of Indian &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Covert surveillance&lt;/i&gt;:&lt;/b&gt; covert Surveillance" means obtaining private information about an individual and his private affairs without his knowledge and includes: (i) directed surveillance which is undertaken for the purposes of specific investigation or specific operation in such a manner as is likely to result in the obtaining of private information about a person whether or not that person was specifically identified in relation to the investigation or operation; (ii) intrusive surveillance which is carried out by an individual or a surveillance device  in relation to anything taking place on a residential premise or in any private vehicle. It also covers use of any device outside the premises or a vehicle wherein it can give information of the same quality and detail as if the device were in the premises or vehicle; (iii) covert human intelligence service which is information obtained by a person who establishes or maintains a personal or other relationship with an individual for the covert purpose of using such a relationship to obtain or to provide access to any personal information about that individual&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Re-identify&lt;/i&gt;&lt;/b&gt;: means the recovery of data from an anonymised data, capable of identifying a data subject whose personal data has been anonymised;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Process&lt;/i&gt;:&lt;/b&gt; “process" and all other cognate forms of expressions thereof, means any operation or set of operations, whether carried out through automatic means or not by any person or organization, that relates to:(a) collation, storage, disclosure, transfer, updating, modification, alteration or use of personal data; or (b) the merging, linking, blocking, degradation or anonymisation of personal data;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Direct marketing&lt;/i&gt;&lt;/b&gt;: Direct Marketing means sending of a commercial communication to any individual &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Data controller&lt;/i&gt;&lt;/b&gt;:  any person who controls, at any point in time, the personal data of a data subject but shall not include any person who merely provides infrastructure for the transfer or storage of personal data to it data controller;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt; Government&lt;/i&gt;&lt;/b&gt;: the Central Government or as the case may be, the State Government and includes the Union territory Administration, local authority or any agency and instrumentality of the Government;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Terms that have been removed from the 2014 Bill that were in the 2011 Bill and the 2011 definition:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Consent: Includes implied consent&lt;/li&gt;
&lt;li&gt;Maintain: Includes maintain, collect, use, or disseminate.&lt;/li&gt;
&lt;li&gt;Data processor: In relation to personal data means any person (other than the employee of the data controller), who processes the data on behalf of the data controller. &lt;/li&gt;
&lt;li&gt;Local authority: A municipal committee, district board, body of port commissioners, council, board or other authority legally entitled to, or entrusted by the Government with, the control or management of a municipal or local fund. &lt;/li&gt;
&lt;li&gt;Prescribed: Prescribed by rules made under this Act.&lt;/li&gt;
&lt;li&gt;Surveillance: Surveillance undertaken through installation and use of CCTVs and other system which capture images to identify or monitor individuals (this was removed from the larger definition of surveillance.)&lt;/li&gt;
&lt;li&gt;DNA: Cell in the body of an individual, whether collected from a cheek, cell, blood cell, skin cell or other tissue, which allows for identification of such individual when compared with other individual. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Terms that have remained broadly (with some modification) the same between the 2014 Bill and 2011 Bill (as per the 2014 Bill definition):&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Authority: The Data Protection Authority of India &lt;/li&gt;
&lt;li&gt;Appellate tribunal: the Cyber Appellate Tribunal established under Sub-Section (1) of section n48 of the Information Technology Act, 2000.&lt;/li&gt;
&lt;li&gt;Personal data: Any data which relates to a data subject, if that data subject can be identified from that data, either directly or indirectly, in conjunction with other data that the data controller has or is likely to have and includes any expression of opinion about such data subject. &lt;/li&gt;
&lt;li&gt;Member: Member of the Authority &lt;/li&gt;
&lt;li&gt;Disclose: and all other cognate forms of expression thereof, means disclosure, dissemination, broadcast, communication, distribution, transmission, or make available in any manner whatsoever, of personal data. &lt;/li&gt;
&lt;li&gt;Anonymised: The deletion of all data that identifies the data subject or can be used to identify the data subject by linking such data to any other data of the data subject, by the data controller. &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Exceptions to the Right to Privacy&lt;/b&gt;: According to the 2011 Bill, the exceptions to the Right to Privacy included: &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Sovereignty, integrity and security of India, strategic, scientific or economic interest of the state &lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any offence &lt;/li&gt;
&lt;li&gt;Prevention of public disorder or the detection of crime&lt;/li&gt;
&lt;li&gt;Protection of rights and freedoms of others &lt;/li&gt;
&lt;li&gt;In the interest of friendly relations with foreign state&lt;/li&gt;
&lt;li&gt;Any other purpose specifically mentioned in the Act. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill reflects almost all of the exceptions defined in the 2011 Bill, but removes ‘detection of crime’ from the list of exceptions. The 2014 Bill also qualifies that the application of each exception must be adequate, relevant, and not excessive to the objective it aims to achieve and must be imposed on the manner prescribed – whereas the 2011 Bill stated only that the application of exceptions to the Right to Privacy cannot be disproportionate to the purpose sought to be achieved.&lt;/p&gt;
&lt;p id="content" style="text-align: justify; "&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Acts not to be considered deprivations of privacy:  The 2011 Bill lists five instances that  will not be considered a deprivation of privacy  - namely&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;For journalistic purposes unless it is proven that there is a reasonable expectation of privacy, &lt;/li&gt;
&lt;li&gt;Processing data for personal or household purposes,&lt;/li&gt;
&lt;li&gt;Installation of surveillance equipment for the security of private premises, &lt;/li&gt;
&lt;li&gt;Disclosure of information via the Right to Information Act 2005,&lt;/li&gt;
&lt;li&gt;And any other activity exempted under the Act.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 limits these instances to:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The processing of data purely for personal or household purposes, &lt;/li&gt;
&lt;li&gt;Disclosure of information under the Right to Information Act 2005,&lt;/li&gt;
&lt;li&gt;And any other action specifically exempted under the Act.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Privacy Principles:  Unlike the 2011 Bill, the 2014 Bill defines nine specific privacy principles: notice, choice and consent, collection limitation, purposes limitation, access and correction, disclosure of information, security, openness, and accountability. The Privacy Principles will apply to all existing and evolving practices. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Provisions for Personal Data: Both the 2011 Bill and the 2014 Bill have provisions that apply to the processing of personal and sensitive personal data. The 2011 Bill includes provisions addressing the:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Collection of personal data, &lt;/li&gt;
&lt;li&gt;Processing of personal data, &lt;/li&gt;
&lt;li&gt;Data quality, &lt;/li&gt;
&lt;li&gt;Provisions relating to sensitive personal data, &lt;/li&gt;
&lt;li&gt;Retention of personal data,&lt;/li&gt;
&lt;li&gt;Sharing (disclosure) of personal data, &lt;/li&gt;
&lt;li&gt;Security of personal data, &lt;/li&gt;
&lt;li&gt;Notification of breach of security, &lt;/li&gt;
&lt;li&gt;Access to personal data by data subject,&lt;/li&gt;
&lt;li&gt;Updation of personal data by data subject&lt;/li&gt;
&lt;li&gt;Mandatory processing of data,&lt;/li&gt;
&lt;li&gt;Trans border flows of personal data.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Of these, the 2014 Bill broadly (though not verbatim) reflects the 2011 Bill provisions relating to the:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Collection of personal data,&lt;/li&gt;
&lt;li&gt;Processing of personal data, &lt;/li&gt;
&lt;li&gt;Access to personal data,&lt;/li&gt;
&lt;li&gt;Updating personal data&lt;/li&gt;
&lt;li&gt;Retention of personal data&lt;/li&gt;
&lt;li&gt;Data quality, &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill has further includes provisions addressing:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Openness and accountability, &lt;/li&gt;
&lt;li&gt;Choice, &lt;/li&gt;
&lt;li&gt;Consent,&lt;/li&gt;
&lt;li&gt;Exceptions for personal identifiers. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill has made changes to the provisions addressing:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Provisions relating to sensitive personal data, &lt;/li&gt;
&lt;li&gt;Sharing (disclosure of personal data), &lt;/li&gt;
&lt;li&gt;Notification of breach of security, &lt;/li&gt;
&lt;li&gt;Mandatory processing of data &lt;/li&gt;
&lt;li&gt;Security of personal data&lt;/li&gt;
&lt;li&gt;Trans border flows of personal data. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The changes that have been made have been mapped out below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Provisions Relating to Sensitive Personal Data:&lt;/b&gt; The 2011Bill and 2014 Bill both require authorization by the Authority for the collection and processing of sensitive personal data. At the same time, both Bills include a list of circumstances under which authorization for the collection and processing of sensitive personal data is not required. On the whole, this list is the same between the 2011 Bill and 2014 Bill, but the 2014 Bill adds the following circumstances on which authorization is not needed for the collection and processing of sensitive personal data:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;For purposes related to the insurance policy of the individual if the data relates to the physical or mental health or medical history of the individual and is collected and processed by an insurance company.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collected or processed by the Government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill also allows the Authority to specify additional regulations for sensitive personal data, and requires that any additional transaction sought to be performed with the sensitive personal information requires fresh consent to first be obtained. The 2014 Bill carves out another exception for Government agencies, allowing disclosure of sensitive personal data without consent to Government agencies mandated under law for the purposes of verification of identity, or for prevention, detection, investigation including cyber incidents, prosecution, and punishment of offences.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notification of Breach of Security&lt;/b&gt;: The provisions relating to the notification of breach of security in the 2014 Bill differ from the 2011 Bill. Specifically, the 2014 Bill removes the requirement that data controllers must publish information about a data breach in two national news papers. Thus, in the 2014 Bill, data controllers must only inform the data protection authority and affected individuals of the breach. &lt;br /&gt;&lt;b&gt;&lt;br /&gt;Notice&lt;/b&gt;: The 2014 Bill changes the structure of the notice mechanism – where in the 2011 Bill, prior to the processing of data, data controllers had to take all reasonable steps to ensure that the data subject was aware of the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The documented purposes for which such personal data is being collected&lt;/li&gt;
&lt;li&gt;Whether providing of personal data by the data subject is voluntary or mandatory under law or in order to avail of any product or service&lt;/li&gt;
&lt;li&gt;The consequences of the failure to provide the personal data &lt;/li&gt;
&lt;li&gt;The recipient or category of recipients of the personal data &lt;/li&gt;
&lt;li&gt;The name and address of the data controller and all persons who are or will be processing information on behalf of the data controller &lt;/li&gt;
&lt;li&gt;If such personal data is intended to be transferred out of the country, details of such transfer. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;In contrast the 2014 Bill provides that before personal data is collected, the data controller must give notice of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;What data is being collected and&lt;/li&gt;
&lt;li&gt;The legitimate purpose for the collection.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;If the purpose for which the data was collected has changed the data controller will then be obligated to provide the data subject with notice of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The use to which the personal data will be put&lt;/li&gt;
&lt;li&gt;Whether or not the personal data will be disclosed to a third party and if so the identity of such person &lt;/li&gt;
&lt;li&gt;If the personal data being collected is intended to be transferred outside India  and the reasons for doing so, how the transfer helps in achieving the legitimate purpose and whether the country to which such data is transferred has suitable legislation to provide for adequate protection and privacy of the data. &lt;/li&gt;
&lt;li&gt;The security and safeguards established by the data controller in relation to the personal data &lt;/li&gt;
&lt;li&gt;The processes available to a data subject to access and correct  his personal data&lt;/li&gt;
&lt;li&gt;The recourse open to a data subject, if he has any complaints in respect of collection or processing of the personal data and the procedure relating thereto&lt;/li&gt;
&lt;li&gt;The name, address, and contact particulars of the data controller and all persons who will be processing the personal data on behalf of the data controller. &lt;/li&gt;
&lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure of personal data&lt;/b&gt;: Though titled as ‘sharing of personal data’ both the 2011 Bill and 2014 Bill require consent for the disclosure of personal information, but list exceptional circumstances on which consent is not needed. In the 2011 bill, the relevant provision permits disclosure of personal data without consent only if (i) the sharing was a part of the documented purpose, (ii) the sharing is for any purpose relating to the exceptions to the right to privacy or (iii) the Data Protection Authority has authorized the sharing.  In contrast, the 2014 Bill permits disclosure of personal data without consent if (i) such disclosure is part of the legitimate purpose (ii) such disclosure is for achieving any of the objectives of section 5 (iii) the Authority has by order authorized such disclosure (iv) the disclosure is required under any law for the time being in force (v) the disclosure is made to the Government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.  As a safeguard, the 2014 Bill requires that any person to whom  personal information is disclosed, whether a resident or not, must adhere to all provisions of the Act. Furthermore, the disclosure of personal data must be limited to the extent which is necessary to achieve the purpose for which the disclosure is sought and no person can make public any personal data that is in its control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transborder flow of information&lt;/b&gt;: Though both the 2011 Bill and the 2014 Bill require any country that data is transferred to must have equivalent or stronger data protection standards in place, the 2014 Bill carves out an exception for law enforcement and intelligence agencies and the transfer of any personal data outside the territory of India, in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mandatory Processing of Data&lt;/b&gt;: Both the 2011 Bill and 2014 Bill have provisions that address the mandatory processing of data. These provisions are similar, but the 2014 Bill includes a requirement that data controllers must anonymize personal data that is collected without prior consent from the data subject within a reasonable time frame after collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security of Personal Data:&lt;/b&gt; The provision relating to the security of personal information in the 2014 Bill has been changed from the 2011 Bill by expanding the list and type of breaches that must be prevented, but removing requirements that data controllers must ensure all contractual arrangements with data processors specifically ensure that the data is maintained with the same level of  security.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Conditions on which provisions do not apply:&lt;/b&gt; Both the 2011Bill and 2014 Bill define conditions on which the provisions of updating personal data, access, notification of breach of security, retention of personal data, data quality, consent, choice, notice, and right to privacy  will not apply to personal data.  Though the 2011 Bill and 2014 Bill reflect the same conditions, the 2014 Bill  carves out an exception for Government Intelligence Agencies  - stating that the provisions of  updating personal data, access to data by the data subject, notification about breach of security, retention of personal data, data quality, processing of personal data, consent, choice, notice, collection from an individual will not apply to data collected or processed in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy Officers&lt;/b&gt;: Unlike the 2011 Bill, the 2014 Bill defines the role of the privacy officer that must be established by every data controller for the purpose of overseeing the security of personal data and implementation of the provisions of the Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Power of Authority to Exempt: &lt;/b&gt; Both the 2011 Bill and 2014 Bill contain provisions that enable the Authority to waive the applicability of specific provisions of the Act. The circumstances on which this can be done are based on the exceptions to the Right to Privacy in both the 2011 and 2014 Bill. To this extent, the 2014 Bill differs slightly from the 2011 Bill, by removing the power of the Authority to exempt for the ‘detection of crime’ and ‘any other legitimate purpose mentioned in this Act’ .&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Data Protection Authority:&lt;/b&gt; The 2011 Bill and 2014 Bill both establish Data Protection Authorities, but the 2014 Bill further clarifies certain aspects of the functioning of the Authority and expands the functions and the powers of the Authority.  For example, new functions of the Authority include:&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Auditing any or all personal data controlled by the data controller to assess whether it is being maintained in accordance with the Act, &lt;/li&gt;
&lt;li&gt; Suggesting international instruments relevant to the administration of the Act,&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Encouraging industry associations to evolve privacy standards for self regulations, adjudicating on disputes arising between data controllers or between individuals and data controllers.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill also expands the powers of the Data Protection Authority – importantly giving him the power to receive, investigate complaints about alleged violations of privacy and issue appropriate orders or directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, the 2014 Bill carves out an exception for Government Intelligence Agencies and Law Enforcement agencies – preventing the Authority from conducting investigations, issuing appropriate orders or directions, and adjudicating complaints in respect to actions taken by the Government Intelligences Agencies and Law Enforcement,  if for the objectives of  (a) sovereignty, integrity or security of India; or(b) strategic, scientific or economic interest of India; or(c) preventing incitement to the commission of any offence, or (d) prevention of public disorder, or(e) the investigation of any crime; or (f) protection of rights and freedoms of others; or (g) friendly relations with foreign states; or (h) any other legitimate purpose mentioned in this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This power is instead vested with a court of competent jurisdiction.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The National Data Controller Registry&lt;/b&gt;: The 2014 Bill removes the National Data Controller Registry and requirements for data controllers to register themselves and oversight of the Registry by the Data Protection Authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Direct Marketing: &lt;/b&gt;Both the 2011 and 2014 Bills contain provisions regulating the use of personal information for direct marketing purposes. Though the provisions are broadly the same, the 2011 Bill envisions that no person will undertake direct marketing unless he/she is registered in the ‘National Data Registry’  and one of the stated purposes is direct marketing. As the 2014 Bill removes the National Data Registry, the 2014 Bill now requires that any person undertaking direct marketing must have on record where he/she has obtained personal data from.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Interception of Communications&lt;/b&gt;: Though maintaining some of the safeguards defined in the 2011 Bill for interception,  2014 Bill changes  the interception regime envisioned in the 2011 Bill by carving out a wide exception for organizations monitoring the electronic mail of employees,  removing provisions requiring the interception take place only for the minimum period of time required for achieving the purposes, and removing provisions excluding the use of intercepted communications as evidence in a court of law. Similar to the 2011 Bill, the 2014 Bill specifies that the principles of notice, choice and consent, access and correction, and openness will not apply to the interception of communications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Video Recording Equipment in public places&lt;/b&gt;: Unlike the 2011 Bill, which addressed only the use of CCTV’s, the 2014 Bill addresses the installation and use of video recording equipment in public places. Though both the 2011 Bill and 2014 Bill both prevent the use of recording equipment and CCTVs for the purpose of identifying an individual, monitoring his personal particulars, or revealing personal, or otherwise adversely affecting his right to privacy - the 2014 Bill requires that the use of recording equipment must be in accordance with procedures, for a legitimate purpose, and proportionate to the objective for which the equipment was installed. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The 2014 Bill makes a broad exception to these safeguards for law enforcement agencies and government intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific, or economic interest of India.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy Standards and Self Regulation&lt;/b&gt;: The 2014 Bill establishes a specific mechanism of self regulation where industry associations will develop privacy standards and adhere to them.  For this purpose, an industry ombudsman should be appointed. The standards must be in conformity with the National Privacy Principles and the provisions of the Privacy Bill. The developed standards will be submitted to the Authority and the Authority may frame regulations based on the standards. If an industry association has not developed privacy standards, the Authority may frame regulations for a specific sector.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Settlement of Disputes and Appellate Tribunal:&lt;/b&gt; The 2014 Bill makes significant change to the process for settling disputes from the 2011 Bill. In the 2014 Bill an Alternative Dispute Mechanism is established where disputes between individuals and data controllers are first addressed by the Privacy Officer of each Data Controller or the industry level Ombudsman. If individuals are not satisfied with the decision of the Ombudsman they may take the complaint to the Authority. Individuals can also take the complaint directly to the Authority if they wish.  If an individual is aggrieved with the decision of the Authority, by a privacy officer or ombudsman through the Alternative Dispute Resolution mechanism, or by the adjudicating officer of the Authority, they may approach the Appellate Tribunal. Any order from the Appellate Tribunal can be appealed at a high court. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In the 2011 Bill disputes between the data controller and an individual can be taken directly to the Appellate Tribunal and orders from the Authority can be appealed at the Tribunal. There is not further path for appeal to an order of the tribunal.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Offences and Penalties:&lt;/b&gt; The 2014 Bill changes the structure of the offences and penalties section by breaking the two into separate sections - one addressing offences and one addressing penalties while the 2011 Bill addressed offences and penalties in the same section. &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Offences&lt;/b&gt;: The 2014 Bill penalizes every offence with imprisonment and a fine and empowers a police officer not below the rank of Deputy Superintendent of Police to investigate any offence, limits the courts ability to take cognizance of an offence to only those brought by the Authority, requires that the Court be no lower than a Chief Metropolitan Magistrate or a Chief Judicial Magistrate, and permits courts to compound offences. The 2014 Bill further specifies that any offence that is punishable with three years in prison and above is cognizable, and offences punishable with three years in prison are bailable. . Under the 2014 Bill offences are defined as:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Unauthorized interception of communications &lt;/li&gt;
&lt;li&gt;Disclosure of intercepted communications &lt;/li&gt;
&lt;li&gt;Undertaking unauthorized Covert Surveillance &lt;/li&gt;
&lt;li&gt;Unauthorized use of disclosure of communication data &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The offences defined under the Act are reflected in the 2011 Bill, but the time in prison and fine is higher in the 2014 Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Penalties&lt;/b&gt;: The 2014 Bill provides a list of penalties including:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Penalty for obtaining personal data on false pretext&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Penalty for violation of conditions of license pertaining to maintenance of secrecy and confidentiality by telecommunications service providers &lt;/li&gt;
&lt;li&gt;Penalty for disclosure of other personal information &lt;/li&gt;
&lt;li&gt;Penalties for contravention of directions of the Authority &lt;/li&gt;
&lt;li&gt;Penalties for data theft &lt;/li&gt;
&lt;li&gt;Penalties for unauthorised collection, processing, and disclosure of personal data&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Penalties for unauthorized use of personal data for direction marketing. These penalties reflect the penalties in the 2011 bill, but prescribe higher fines&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adjudicating Officer&lt;/b&gt;: Unlike the 2011 Bill that did not have in place an adjudicating officer, the 2014 Bill specifies that the Chairperson of the Authority will appoint a Member of the Authority not  below the Rank of Director of the Government of India to be an adjudicating officer. The adjudicating officer will have the power to impose a penalty and will have the same powers as vested in a civil court under the Code of Civil Procedure. Every proceeding before the adjudicating officer will be considered a judicial processing. When adjudicating the officer must take into consideration the amount of disproportionate gain or unfair advantage, the amount of loss caused, the respective nature of the default&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil Remedies and compensation&lt;/b&gt;: Both the 2011 and 2014 Bill contain provisions that permit an individual to pursue a civil remedy, but the 2014 Bill limits these instances to - if loss or damage has been suffered or an adverse determination is made about an individual due to negligence on complying with the Act, and provides for the possibility that the contravening parties will have to provide a public notice of the offense. &lt;br /&gt;&lt;br /&gt;The 2014 Bill removes provisions specifying that individuals that have suffered loss due to a contravention by the data controller of the Act are entitled to compensation.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Exceptions for intelligence agencies&lt;/b&gt;:  Unlike the 2011 Bill, the 2014 Bill includes an exception for Government Intelligence Agencies and Law Enforcement Agencies – stating that the Authority will not have the power to conduct investigations, issue appropriate orders and directions or otherwise adjudicate complaints in respect of action taken by the Government intelligence agencies and Law  Enforcement agencies for achieving any of the objectives that reflect the defined exceptions to privacy.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society welcomes many of the changes that are reflected in the Privacy Bill 2014, but are cautious about the wide exceptions that have been carved out for law enforcement and intelligence agencies in the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the Report of Group of Expert s on Privacy was developed for the purpose of informing a privacy framework for India. As such the Centre for Internet and Society will be analyzing in upcoming posts the draft Privacy Bill 2014 and the recommendations in the Report of the Group of Experts on Privacy.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011'&gt;https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-01T10:52:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough">
    <title>Is Data Protection Enough? </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough</link>
    <description>
        &lt;b&gt;The following note looks briefly at different sides of the privacy debate, and asks the question whether a Data Protection law is enough privacy protection for India.&lt;/b&gt;
        
&lt;p&gt;In a recent article, Rahul Matthan explained how many threats to personal privacy come from a lack of data protection laws – particularly in the context of the UID – and he thus urges&amp;nbsp;India&amp;nbsp;to pass a law that is focused on data protection. He said, “We don’t question this lack of personal space.&amp;nbsp;&amp;nbsp;It is part of the compromise we make when we choose to live in&amp;nbsp;India.”&amp;nbsp;&amp;nbsp;Though his argument has a surface appeal, there are also many cases emerging in the news today that suggest that&amp;nbsp;India&amp;nbsp;is concerned with a much broader scope of privacy than just data protection. In the DNA, a news article covered a recent court decision that concluded that watching pornography at home is not an obscenity and does not qualify as a public exhibition, even when there are visitors to the home. In that case, police arrested persons who hosted a party under section 292 (obscenity) of the Indian Penal Code for watching pornography and housing strippers. The judge ruled that the activities that were taking place were done in private and thus did not amount to an offense under section 292. This is an important decision about the protections of spatial privacy being afforded to individuals. The bungalow was considered a private space, and the computer a private possession. In other words,&amp;nbsp;India&amp;nbsp;does have a greater understanding of privacy and the need for its protection, and it extends beyond data protection. In another news item, the Hindu reported that 5,000 to 6,000 phones are tapped on average daily. The article speculated that this number could increase in response to the 2G scam and other scams that are coming out. The type of privacy violation that wiretapping poses is likewise not a question of data protection, but of how a nation guards against an unwanted invasion of personal space and when security takes precedence over privacy. Are Indian citizens willing to subject themselves to phone taps to try to eliminate – or at least minimize – the number of scams that are occurring?&amp;nbsp;&amp;nbsp;In yet another news item, it was reported that in the North, councils are attempting to ban the sale of cell phones to unmarried women to help prevent unsolicited affairs with members from different castes. This again raises questions not of data protection or informational privacy, but of personal privacy. How will phone companies know that a woman is married? Will parents suddenly begin regulating their daughters’ phones? Does an existing legislation afford protection to women in this situation? Though data protection is a component of&amp;nbsp;&amp;nbsp;privacy, it is only one component. There are many definitions of privacy, and privacy in itself is somewhat of a difficult word to define, but&amp;nbsp;India&amp;nbsp;should recognize that there are privacy protections and privacy debates that extend beyond data protection.&amp;nbsp;&amp;nbsp;It is too easy to characterize&amp;nbsp;India&amp;nbsp;as large and communal and overlook these important questions.&lt;/p&gt;
&lt;p&gt;Returning to Rahul Matthan’s article,&amp;nbsp; Matthan says, “The vast majority of our country that remains under-served by the government will gladly exchange personal privacy for better public service.”&amp;nbsp;&amp;nbsp;I was particularly intrigued by this statement, because it suggests that privacy is an expendable right, and that government service cannot improve without privacy compromises. The logical extension of this concept is that privacy is not a fundamental right but only a consumer issue, and that policymakers can always trade off privacy in exchange for better public benefits, for better security, and for cheaper products. A legal system needs to address the case at hand, but it needs to be mindful of the larger consequences as well. There is no doubt that the UID project demands a data protection law, but India is facing questions of privacy that extend beyond data protection, and the steps that are being taken to answer those questions need to be applauded and brought into the current debate.&amp;nbsp;&amp;nbsp;If we legislate away rights, we must do so by weighing the cost and finding it acceptable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.thehindu.com/news/national/article905944.ece"&gt;http://www.thehindu.com/news/national/article905944.ece&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://is.gd/hJWD8 http://is.gd/hJWSX"&gt;http://is.gd/hJWD8 http://is.gd/hJWSX&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://news.yahoo.com/s/afp//lifestyleindiatelecommarriage"&gt;http://news.yahoo.com/s/afp//lifestyleindiatelecommarriage&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Matthan, Rahul. The Mint:Technology. Nov. 24 2010&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough'&gt;https://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:28:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-driven-developments">
    <title>Internet-driven Developments — Structural Changes and Tipping Points </title>
    <link>https://cis-india.org/internet-governance/blog/internet-driven-developments</link>
    <description>
        &lt;b&gt;A symposium on Internet Driven Developments: Structural Changes and Tipping Points was held in Cambridge, Massachusetts at Harvard University from December 6 to 8, 2012. The symposium was sponsored by the Ford Foundation and the MacArthur Foundation and was hosted by the Berkman Center for Internet &amp; Society. In this blog post, I summarize the discussions that took place over the two days and add my own personal reflections on the issues.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The symposium served as an inaugural event for the &lt;i&gt;Global Network of Interdisciplinary Centers&lt;/i&gt;, which currently includes as its members:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Berkman Center for Internet and Society at Harvard University&lt;/li&gt;
&lt;li&gt;The Alexander von Humboldt Institute for Internet &amp;amp; Society&lt;/li&gt;
&lt;li&gt;The Centre for Internet and Society, Bangalore &lt;/li&gt;
&lt;li&gt;The Center for Technology &amp;amp; Society at the Fundacao Getulio Vargas Law School, Keio University&lt;/li&gt;
&lt;li&gt;The MIT Media Lab and its Center for Civic Media&lt;/li&gt;
&lt;li&gt;The NEXA Center for Internet &amp;amp; Society at Politicnico di Torino. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Individuals and researchers from the Centers focused on understanding the effects of internet and society. The participants were brought together to explore the past, present, and future tipping points of the internet, to identify knowledge gaps, and to find areas of collaboration and future action between institutes and individuals. Specifically, the symposium set out to examine fundamental questions about the internet, identify structural changes that are occurring because of the internet, and the forces that are catalyzing these changes. Questions asked and discussed included:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What forces are changing production and service models? &lt;/li&gt;
&lt;li&gt;What forces are influencing entrepreneurship and innovation? and &lt;/li&gt;
&lt;li&gt;What forces are changing political participation?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Production and Service Models&lt;/h2&gt;
&lt;h3&gt;Discussion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When participants discussed the changes that are happening to production and service models, concepts such as big data, algorithms, peer based models of production, and intermediaries were identified as actors and tools that are driving change in production and service models in the context of the internet. For example, big data and algorithms are being used to alter the nature, scope, and reach of business by allowing for the personalization and customization of services. To this end, many organizations have incorporated customer participation into business models, and provide platforms for feedback and input. The personalization of services has placed greater emphasis on the voice of the customer, allowing customers to guide and influence business by voicing preferences, satisfaction levels, etc. In this way, consumers can determine what type of service they want, and can also make political statements through their choices and feedback. In the process, however, such platforms generate and depend on large amounts of data and thus raise concerns about privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge gaps that were identified during the conversation included how to predict what would make a participatory platform and peer based model successful, and how these platforms can be effectively researched. When looking at big data, a knowledge gap that was identified included how to ensure that data are collected ethically and accurately, as well as the related question: once large data sets are collected, how can the data be analyzed and used in a meaningful way?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was also discussion about the increasingly critical and powerful role that intermediaries serve within the scope of the internet as they act as the platform provider and regulator for internet content. Intermediaries both allow for content to be posted on the internet, and determine what information is accessed through the filtering of web searches.  Increasingly, governments are seeking to regulate intermediaries and create strict rules of compliance with governmental mandates. At the same time governments are placing the responsibility and liability of regulating what content is posted on internet on intermediaries, essentially placing them in the role of an adjudicator. This is one example of how the relationship between the private sector, the government, and the individual is changing, because it is only recently that private intermediaries have been held responsible first to governments, and only secondarily to customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge gaps identified in the discussion on intermediaries included understanding and researching how intermediaries decide to filter content found through searches. On what basis is each filter done? Are there actors influencing this process? And what are the economics behind the process?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Personal Thoughts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When reflecting on how the internet is changing and influencing the production of goods and services, I personally would add to the points discussed in the meeting the fact that the internet has also impacted the job economy.  Reports show that jobs in the extraction and manufacturing sector are decreasing, as the internet has created a mandatory new tech oriented skill set that often outweighs the need for other skill sets.  This change is far reaching as the job economy influences what skills students choose to learn, why and for what purposes individuals migrate across borders for employment, and in what industries governments invest money towards domestic development. In addition to changing the nature of skills in demand, the nature of the services themselves is changing. Though services are becoming more personalized and tailored to the individual, this personalization is automated, and replacing the ‘human touch’ that was once prized in business. Whether customers care if the service they are given is generated by an algorithm or delivered by an individual may depend on a person’s preference, but the European Union has seen this shift as being significant enough to address automated decision making in Article 15 of the EU directive, which provides individuals the right to not be subject to a decision which legally impacts him/her which is based only on automated processing of data. This directive encompasses decisions such as evaluation of a person’s performance at work, creditworthiness, reliability, conduct, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The internet has also increased the cost of small mistakes made by businesses, as any mistake will now potentially impact millions of customers. The impact of any mistake makes risk management much more important and difficult, as businesses must seek to anticipate and mitigate any and all mistakes. The internet has also created a new level of dependency on the network, as businesses shift all of their services and functions over to the internet. Thus, if the network goes down, businesses will lose revenue and customers. This level of dependency on the network that exists today is different from past reliance’s on technology — in the sense that in the past there was not one single type of technology that would be essential for many businesses to run. The closest analogue was transportation: if trucks, trains, or ships were unavailable, multiple industries would be impacted. The difference is that those who relied on rail could shift temporarily to ships or trucks. Those relying on the network have no alternatives. Furthermore, past technologies were constantly evolving in the resources they depended on — from coal to gas, etc, but for the internet, it seems that the resource is not evolving, so much as expanding as increased bandwidth and connectivity are the solution to allowing technological evolution and innovation through the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As discussed above, intermediaries are becoming key and powerful players, but they also seem to be increasingly placed between a rock and a hard place, as governments around the world are asking national and multinational intermediaries to filter content that violates national laws in one context, but not another context. Furthermore, intermediaries are increasingly being asked to comply with law enforcement requests for access to data that is often not within the jurisdiction of the requesting country. The difficult position intermediaries are placed in demonstrates how the architecture of the internet is borderless but the regulation and use of the internet is still tied to borders and jurisdiction.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Entrepreneurship and Innovation&lt;/h2&gt;
&lt;h3&gt;Discussion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When discussing entrepreneurship and innovation it was pointed out by participants that grey markets and market failures are important indicators for possibilities of new business models and forms of innovation. Because of that, it is important to study what has failed and why when identifying new possibilities and trends. The importance of policies and laws that allow for innovation and entrepreneurship was also highlighted.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Personal Thoughts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When thinking about entrepreneurship and innovation on the internet and forces driving them, it seems clear that tethering, conglomerating, and organizing information from multiple sources is one direction that innovation is headed. Services are coming out that have the ability to search the internet based on individual preferences and provide more accurate data quickly. This removes the need for individuals to search the internet at length to find the information or products they want. Along the same lines, it seems that there is a greater trend towards personalization. Services are finding new and innovative ways to bring individuals customized products. Another trend is the digitization of all services — from moving libraries online, to bookstores online, to grocery stores online. Lastly, there is a constant demand for new applications to be developed. These can range from applications enabling communication through social networking, to applications that act as personal financial consultants, to applications that act as personal trainers. The ability for concepts, trends, etc to go viral on the internet has also added another dimension to entrepreneurship and innovation as any individual can potentially become successful by something going viral. The ability for something to go viral on the internet does not just impact entrepreneurship and innovation, but also impacts political participation and production and service models.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Political Participation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Discussions also centered on how political participation is changing as the internet is being used as a new platform for participation. For example, it is now possible for individuals to leverage their voice and message to local and global communities. Furthermore, this message can be communicated on a seemingly personal scale. Individuals from one community are able to connect to communities from another location — both local and abroad, and to work together to catalyze change. Messages and communications can be spread easily to millions of people and can go viral.  This ability has changed and created new public spheres, where anyone can contribute to a dialogue from anywhere.  Empowerment is shifting as well, because the internet allows for new power structures to be created by any actor who knows how to leverage the network. These factors allow for more voices to be heard and for greater citizen participation. The role of the youth in political movements was also emphasized in the discussions. On the other hand governments have responded by more heavily regulating speech and content on the internet when dissenting voices and campaigns are seen as a threat. It was also brought out that though emerging forms of online political participation have been heralded by many for achievements such as facilitating democracy, transparency, and bringing a voice to the silenced — many have warned that analysis of these political forms of participation overlook individual contributions and time. Other critiques that were discussed included the fact that digital revolutions also exclude individuals who do not have access to the internet or to platforms/applications and overlook actions and movements that take place offline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge gaps that were identified included understanding the basics of the change that is happening in political participation through the internet. For example, it is unclear who the actors are that determine the conditions and scope for these changes, and like participatory forms of business, what enables and mobilizes change. Furthermore, it is unclear who specifically benefits from these changes and how, and who participates in the changes — and in what capacity. Additionally, much of the change has been quantified in the dialogue of the ‘global’ — global voices, global movements — but that dialogue ignores the local.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Personal Thoughts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In addition to the discussions on political participation, I believe the internet has created the possibility for ‘social governance’. To address situations in which there is no particular law against an action, but individuals come together and speak out against actions that they see on the internet that they believe should be stopped or changed. Depending on the extent individuals choose to enforce these decisions, this can be potentially dangerous as individuals are essentially rewriting laws and social norms without subjecting them to the crucible of consensus decision-making or review. In addition, forms of political participation are not changing just in terms of how the individual engages politically with states and governments, but also in the ways that politicians are engaging with citizens. For example, politicians are using Facebook and Twitter as means to communicate and gather feedback from supporters. Politicians are also using technology to reach more individuals with their messages — from experimenting with 3D holograms, to web casting, to using technology like CCTV cameras to prove transparency. The impact of this could be interesting, as technology is becoming a mediating tool that works in both directions between citizens and governments. Is this changing the traditional understandings of the State and the relationship between the State and the citizen?&lt;/p&gt;
&lt;h2&gt;Conclusion and ways forward&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussions also pulled out dichotomies that apply to the internet and illustrate tensions arising from different forces. These dichotomies can be shaped by individuals and actors attempting to regulate the internet, as for example with new models of regulation vs. old models of regulation,  private vs. public, local vs. global,  owned vs. unowned, and zoned vs. unzoned. These dichotomies can be shaped by how the internet is used. For example, fair vs. unfair, just vs. unjust, represented vs. silenced, and uniform vs. diverse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Common questions being asked and areas for potential research that came out of these discussions included information communication and media, how to address different and at times contradictory policies and levels of development in different countries, and what is the impact of big data on different sectors and industries like e-health and journalism? What is the importance of ICT in creating economic progress? How is the Internet changing the nature of democracy?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When discussing ways forward and areas for future collaboration it was brought out that exploring ways to leverage open data, ways to effectively use and build off of perspectives and experiences from other contexts and cultures, and ways to share resources across borders including funding, human presence, and expertise were important questions to answer. Common challenges that were identified by participants ranged from cyber security and the rise of state and non-state actors in cyber warfare, finding adequate funding to support research, sustaining international collaborations, ensuring that research is meaningful and can translate into useful resources for policy and law makers, and ensuring that projects are designed with a long-term objective and vision in mind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions, presentations, and contributions by participants during the two day symposium were interesting and important as they demonstrated just how multi-faced the internet is, and how it is never one dimensional. How the internet is researched, how it is used, and how it is regulated will be constantly changing. Whether this change is a step forward, or a re-invention of what has already been done, is up to all who use the internet including the individual, the corporation, the researcher, the policy maker, and the government.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-driven-developments'&gt;https://cis-india.org/internet-governance/blog/internet-driven-developments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-28T15:34:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india">
    <title>Internet Privacy in India</title>
    <link>https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india</link>
    <description>
        &lt;b&gt;Internet privacy encompasses a wide range of issues and topics. It can be understood as privacy rights that an individual has online with respect to their data, and violations of the same that take place online. Given the dynamic nature of the online sphere, privacy concerns and issues are rapidly changing. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;The Changing Nature of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For example – the way in which the internet allows data to be produced, collected, combined, shared, stored, and analyzed is constantly changing and re-defining  personal data and what type of protections personal data deserves and can be given. For example, seemingly harmless data such IP address, key words used in searches, websites visited, can now be combined and analysed to identify individuals and learn personal information about an individual.  From information shared on social media sites, to cookies collecting user browser history, to individuals transacting online, to mobile phones registering location data – information about an individual is generated through each use of the internet. In some cases the individual is aware that they are generating information and that it is being collected, but in many cases, the individual is unaware of the information trail that they are leaving online, do not know who is accessing the information, and do not have control over how their information is being handled, and for what purposes it is being used. For example, law enforcement routinely troll social media sites for information that might be useful in an investigation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Blurry Line between the Public and Private Sphere&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The above example also highlights how the “sphere” of information on the internet is unclear i.e. is information posted on social media public information – free for use by any individual or entity including law enforcement, employees, data mining companies etc. or is information posted on social media – private, and thus requires authorization for further use. For example, in India, in 2013 the Mumbai police established a “social media lab” for the purposes of monitoring and tracking user behavior and activities.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Authorization is not required for the lab to monitor individuals and their behavior, and individuals are not made aware of the same, as the project claims to analyze only publicly available information. Similar dilemmas have been dealt with by other countries. For example, in the U.S, individuals have contested the use of their tweets without permission,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; while courts in the US have ruled that tweets, private and public, can be obtained by law enforcement with only a subpoena, as technically the information has been shared with another entity, and is therefore no longer private.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;Indian Courts have yet to deal directly with the question of social media content being public or private information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Complication of Jurisdiction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The borderless nature of information flows over the Internet complicates online privacy, as individual's data is subjected to different levels of protection depending on which jurisdiction it is residing in. Thus, for example an Indian using Gmail, will be subject to the laws of the United States. On one hand this could be seen as a positive, if one country has stronger privacy protections than another, but could also be damaging to privacy in the reverse situation – where one company has lower privacy standards and safeguards. In addition to the dilemma of different levels of protection being provided over data as it flows through different jurisdictions, access by law enforcement to data stored in a different jurisdiction, or data from one country accessible to law enforcement because it is being processed in their jurisdiction, are two other complications that arise.  These complications cannot be emphasized more than with the case of the NSA Leaks. Because Indian data was residing in US servers, the US government could access and use the data with no obligation to the individual.&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;In response to the NSA leaks, the government of India has stated that all facts need to be known before any action is taken, while citizens initially sought to hold the companies who disclosed the data to US security agencies such as Google, Facebook etc. accountable.&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite this, because the companies were acting within the legal limits of the United States where they were incorporated, they could not be held liable. In response to the dilemma, many actors in India, including government and industry are asking for the establishment of 'domestic servers'. For example, Dr. Kamlesh Bajaj, CEO of Data Security Council of India was quoted in Forbes magazine promoting the establishment of India centric social media platforms.&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;Similarly, after the PRISM scandal became public, the National Security Advisor requested the Telecom Department to only route traffic data through Indian servers.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In these contexts, the internet is a driving force behind a growing privacy debate and awareness in India.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Current  Policy for Internet Privacy in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, India's most comprehensive legal provisions that speak to privacy on the internet can be found in the Information Technology Act (ITA) 2000.  The ITA contains a number of provisions that can, in some cases, safeguard online privacy, or in other cases, dilute online privacy. Provisions that clearly protect user privacy include: penalizing child pornography,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;penalizing, hacking and fraud&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;and defining data protection standards for body corporate.&lt;a href="#fn10" name="fr10"&gt;[10] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provisions that serve to dilute user privacy speak to access by law enforcement to user's personal information stored by body corporate&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; collection and monitoring of internet traffic data&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;and real time monitoring, interception, and decryption of online communications.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; Additionally, legislative gaps in the ITA serve to weaken the privacy of online users. For example, the ITA does not address questions and circumstances like the evidentiary status of social media content in India, merging and sharing of data across databases, whether individuals can transmit images of their own “private areas” across the internet, if users have the right to be notified of the presence of cookies and do-not track options, the use of electronic personal identifiers across data bases, and if individuals have the right to request service providers to take down and delete their personal content.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Online Data Protection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since 2010, there has been an increasing recognition by both the government and the public that India needs privacy legislation, specifically one that addresses the collection, processing, and use of personal data. The push for adequate data protection standards in India has come both from industry and industrial bodies like DSCI – who regard strong data protection standards as an integral part of business, and from the public, who has voiced increasing concerns that governmental projects, such as the UID, involved with collecting, processing, and using personal data are presently not adequately regulated and are collecting and processing data in such a way that abuses individual privacy.  As mentioned above, India's most comprehensive data protection standards are found in the ITA and are known as  the Information Technology “Reasonable security practices and procedures and sensitive personal data or information” Rules 2011.&lt;a href="#fn14" name="fr14"&gt;[14] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Rules seek to provide rights to the individual with regards to their information and obligate body corporate to take steps towards protecting the privacy of consumer's information. Among other things, the Rules define “sensitive personal information' and require  that any corporate body must publish an online privacy policy, provide individuals with the right to access and correct their information, obtain consent before disclosing sensitive personal information ' except in the case of law enforcement, provide individuals the ability to withdraw consent, establish a grievance officer, require companies to ensure equivalent levels of protection when transferring information, and put in place reasonable security practices. Though the Rules are the strongest form of data protection in India, they have not been recognized by the European Union as meeting the EU standards of “data secure”&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;and many gaps still exist. For example, the Rules apply only to:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Body corporate and not to the government&lt;/li&gt;
&lt;li&gt;Electronically generated and transmitted information &lt;/li&gt;
&lt;li&gt;A limited scope of sensitive personal information.&lt;/li&gt;
&lt;li&gt;A body corporate when a contractual agreement is not already in place.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;These gaps leave a number of bodies unregulated and types of information unprotected, and limits the scope of the Rules.  It is also unclear to what extent companies are adhering to these Rules, and if they are applying the Rules only to the use of their website or if they are also applying the Rules to their core business practices.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Cafés&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2011 the Guidelines for Cyber Café Rules were notified under the Information Technology Act. These Rules, among other things, require Cyber Café’s to retain the following details for every user for a period of one year: details of identification, name, address, contact number, gender, date, computer terminal identification, log in time, and log out time. These details must be submitted to the same agency as directed, on a monthly basis.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Cyber Cafes must also retain the history of websites accessed and logs of proxy servers installed at the cyber café for a period of one year.&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;Furthermore, Cyber Café’s must ensure that the partitions between cubicles do not exceed four and half feet in height from floor level.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; Lastly, the cyber café owner is required to provide every related document, register, and information to any officer authorized by the registration agency on demand.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;In effect, the identification and retention requirements of these rules both impact privacy and freedom of expression, as cyber cafes users cannot use the facility anonymously and all their information, including browser history, is stored on an a-priori basis. The disclosure provisions in these rules also impact privacy and demonstrate a dilution of access standards for law enforcement to users internet communications as the provision does not define:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;An authorization process by which the registration agency follows to authorize individuals to conduct inspections.&lt;/li&gt;
&lt;li&gt;Circumstances on which inspection of a Cyber Café by an authorized officer is necessary and permissible.&lt;/li&gt;
&lt;li&gt;The process for which information can be requested, and instead vaguely requires cyber café owners to disclose information “on demand”.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Online Surveillance and Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ITA also allows for the interference of user privacy online by defining broad standards of access to law enforcement and security agencies, and providing the government with the power to determine what tools individuals can use to protect their privacy. This is most clearly demonstrated by provisions that permit the interception, monitoring, and decryption of digital communications&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; provide for the collection and monitoring of traffic data&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; and allow the government to set the national encryption standard.&lt;a href="#fn22" name="fr22"&gt;[22] &lt;/a&gt;In particular, the structure of these provisions and the lack of safeguards incorporated, serve as a dilution to user privacy. For example, though these provisions create a framework for interception they are missing a number of internationally recognized safeguards and practices, such as notice to the individual, judicial oversight, and transparency requirements. Furthermore, the provisions place extensive security and technical obligations on the service provider – as they are required to extend all facilities necessary to security agencies for interception and decryption, and hold the service provider liable for imprisonment up to seven years for non-compliance. This creates an environment where it is unlikely that the service provider would challenge any request for access or interception from law enforcement. Interception is also regulated through provisions and rules under the Indian Telegraph Act 1885 and subsequent ISP and UAS licenses.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Scope of Surveillance and Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The extent to which the Government of India lawfully intercepts communications is not entirely clear, but in 2011 news items quoted that in the month of July  8,736 phones and e-mail accounts were under lawful surveillance.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this number is representative of authorized interception, there have been a number of instances of unauthorized interceptions that have taken place as well. For example, in 2013 it was found that in Himachel Pradesh 1371 phones were tapped based on verbal approval, while the Home Ministry had only authorized interception of 170.&lt;a href="#fn24" name="fr24"&gt;[24] &lt;/a&gt;This demonstrates that there are instances of when existing safeguards for interception and surveillance are undermined and highlights the challenge of enforcement for even existing safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Demonstrating the tensions between right to privacy and governmental access to communications, and at the same time highlighting the issue of jurisdiction was the standoff between RIM/BlackBerry and the Indian Government. For several years, the Indian Government has requested that RIM provide access to the company’s communication traffic, both BIS and BES, as Indian security agencies have been unable to decrypt the data. Solutions that the Indian Government has proposed include: RIM providing the decryption keys to the government, RIM establishing a local server, local ISPs and telcos developing an indigenous monitoring solution. In 2012, RIM finally established a server in Mumbai and in 2013 provided a lawful interception solution that satisfied the Indian Government.&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The implementation of the Central Monitoring System by the Indian Government is another example of the Government seeking greater access to communications. The system will allow security agencies to bypass service providers and directly intercept communications. It is unclear if the system will provide for the interception of only telephonic communications or if it will also allow for the interception of digital communications and internet traffic. It is also unclear what checks and balances exist in the system. By removing the service provider from the equation the government is not only taking away a potential check, as service providers can resist unauthorized requests, but it is also taking away the possibility for companies to be transparent about the interception requests that they comply with.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Future frameworks for privacy in India: The Report of the Group of Experts on Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In October 2012 the Report of the Group of Experts on Privacy was published by a committee of experts chaired by Justice A.P. Shah.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;The report creates a set of recommendations for a privacy framework and legislation in India. Most importantly, the Report recognizes privacy as a fundamental right and defines nine National Privacy Principles that would apply to all data controllers both in the private sector and the public sector. This would work to ensure that businesses and governments are held accountable to protecting privacy and that legislation and practices found across sectors, states/governments, organizations, and governmental bodies are harmonized. The privacy principles are in line with global standards including the EU, OECD, and APEC principles on privacy, and include: notice, choice &amp;amp; consent, collection limitation, purpose limitation, access and correction, accountability, openness, disclosure of information, security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report also envisions a system of co-regulation, in which the National Privacy Principles will be binding for every data controller, but Self Regulatory Organizations at the industry level will have the option of developing principles for that specific sector. The principles developed by industry must be approved by the privacy commissioner and be in compliance with the National Privacy Principles. In addition to defining principles, the Report recommends the establishment of a privacy commissioner for overseeing the implementation of the right to privacy in India and specifies that aggrieved individuals can seek redress either through issuing a complaint the privacy commissioner or going before a court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nine national privacy principles include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notice: Principle 1: Notice&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall give simple to understand notice of its information practices to all  individuals, in clear and concise language, before any personal information is collected from them. Such notices should include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;During Collection &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What personal information is being collected; &lt;/li&gt;
&lt;li&gt;Purposes for which personal information is being collected; &lt;/li&gt;
&lt;li&gt;Uses of collected personal information; &lt;/li&gt;
&lt;li&gt;Whether or not personal information may be disclosed to third persons; &lt;/li&gt;
&lt;li&gt;Security safeguards established by the data controller in relation to the personal information; &lt;/li&gt;
&lt;li&gt;Processes available to data subjects to access and correct their own personal information; &lt;/li&gt;
&lt;li&gt;Contact details of the privacy officers and SRO ombudsmen for filing complaints. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Notices&lt;/b&gt;&lt;br /&gt;Data breaches must be notified to affected individuals and the commissioner when applicable. Individuals must be notified of any legal access to their personal information after the purposes of the access have been met. Service providers would have to explain how the information would be used and if it may be disclosed to third persons such as advertisers, processing  Individuals must be notified of changes in the data controller’s privacy policy. Any other information deemed necessary by the appropriate authority in the interest of the privacy of data subjects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: A telecom service provider must make available to individuals a privacy policy before any personal information is collected by the company. The notice must include all categories of information as identified in the principle of notice. For example, the service provider must identify the types of personal information that will be collected from the individual from the initial start of the service and during the course of the consumer using the service. For a telecom service provider this could range from name and address to location data.  The notice must identify if information will be disclosed to third parties such as advertisers, processers, or other telecom companies. If a data breach that was the responsibility of the company takes place, the company must notify all affected customers. If individuals have their personal data accessed or intercepted by Indian law enforcement or for other legal purposes, they have the right to be notified of the access after the case or other purpose for the data has been met.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 2: Choice and Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall give individuals choices (opt-in/opt-out) with regard to providing their personal information, and take individual consent only after providing notice of its information practices. Only after consent has been taken will the data controller collect, process, use, or disclose such information to third parties, except in the case of authorized agencies. When provision of information is mandated by law, it should be in compliance with all other National Privacy Principles. Information collected on a mandatory basis should be anonymized within a reasonable timeframe if published in public databases. As long as the additional transactions are performed within the purpose limitation, fresh consent will not be required. The data subject shall, at any time while availing the services or otherwise, also have an option to withdraw his/her consent given earlier to the data controller. In such cases the data controller shall have the option not to provide goods or services for which the said information was sought if such information is necessary for providing the goods or services. In exceptional cases, where it is not possible to provide the service with choice and consent, then choice and consent should not be required.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of implementation&lt;/b&gt;: If an individual is signing up to a service, a company can only begin collecting, processing, using and disclosing their data after consent has been taken. If the provision of information is mandated by law, as is the case for the census, this information must be anonymized after a certain amount of time if it is published in public databases. If there is a case where consent is not possible, such as in a medical emergency, consent before processing information, does not need to be taken.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 3: Collection Limitation&lt;/h3&gt;
&lt;p&gt;A data controller shall only collect personal information from data subjects as is necessary for the purposes identified for such collection, regarding which notice has been provided and consent of the individual taken. Such collection shall be through lawful and fair means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a bank is collecting information to open an account for a potential customer, they must collect only that information which is absolutely necessary for the purpose of opening the account, after they have taken the consent of the individual.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 4: Purpose Limitation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Personal data collected and processed by data controllers should be adequate and relevant to the purposes for which they are processed. A data controller shall collect, process, disclose, make available, or otherwise use personal information only for the purposes as stated in the notice after taking consent of individuals. If there is a change of purpose, this must be notified to the individual. After personal information has been used in accordance with the identified purpose it should be destroyed as per the identified procedures. Data retention mandates by the government should be in compliance with the National Privacy Principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a bank is collecting information from a customer for opening a bank account, the bank can only use that information for the purpose of opening the account and any other reasons consented to. After a bank has used the information to open an account, it must be destroyed. If the information is retained by the bank, it must be done so with consent, for a specific purpose, with the ability of the individual to access and correct the stored information, and in a secure fashion.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 5: Access and Correction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Individuals shall have access to personal information about them held by a data controller; shall be able to seek correction, amendments, or deletion such information where it is inaccurate; be able to confirm that a data controller holds or is processing information about them; be able to obtain from the data controller a copy of the personal data. Access and correction to personal information may not be given by the data controller if it is not, despite best efforts, possible to do so without affecting the privacy rights of another person, unless that person has explicitly consented to disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: An individual who has opened a bank account, has the right to access the information that was initially provided and subsequently generated. If there is a mistake, the individual has the right to correct the mistake. If the individual requests information related to him that is stored on a family member from the bank, the bank cannot disclose this information without explicit consent from the family member as it would impact the privacy of another.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 6: Disclosure of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall only disclose personal information to third parties after providing notice and seeking informed consent from the individual for such disclosure. Third parties are bound to adhere to relevant and applicable privacy principles. Disclosure for law enforcement purposes must be in accordance with the laws in force. Data controllers shall not publish or in any other way make public personal information, including personal sensitive information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a website, like a social media site, collects information about how a consumer uses its website, this information cannot be sold or shared with other websites or partners, unless notice of such sharing has been given to the individual and consent has been taken from the individual. If websites provide information to law enforcement, this must be done in accordance with laws in force, and cannot be done through informal means. The social media site would be prohibited from publishing, sharing, or making public the personal information in any way without obtaining informed consent.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 7: Security&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall secure personal information that they have either collected or have in their custody, by reasonable security safeguards against loss, unauthorised access, destruction, use, processing, storage, modification, deanonymization, unauthorized disclosure [either accidental or incidental] or other reasonably foreseeable risks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a company is a telecommunication company, it must have security measures in place to protect customers communications data from loss, unauthorized access, destruction, use, processing, storage, modification, denanonmyization, unauthorized disclosure, or other forseeable risk. This could include encrypting communications data, having in place strong access controls, and establishing clear chain of custody for the handling and processing communications data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 8: Openness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall take all necessary steps to implement practices, procedures, policies and systems in a manner proportional to the scale, scope, and sensitivity to the data they collect, in order to ensure compliance with the privacy principles, information regarding which shall be made in an intelligible form, using clear and plain language, available to all individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a hospital is collecting and processing personal information of, for example, 1,000 patients, their policies and practices must reflect and be applicable to the amount, sensitivity, and nature of information that they are collecting. The policies about the same must be made available to all individuals – this includes individuals of different intelligence, skill, and developmental levels.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 9: Accountability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The data controller shall be accountable for complying with measures which give effect to the privacy principles. Such measures should include mechanisms to implement privacy policies; including tools, training, and education; external and internal audits, and requiring organizations or overseeing bodies extend all necessary support to the Privacy Commissioner and comply with the specific and general orders of the Privacy Commissioner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: To ensure that a hospital is in compliance with the national privacy principles, it must undertake activities like running trainings and providing educational information to employees on how to handle patient related information, conducting audits, and establishing an officer or body for overseeing the implementation of privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Public Discourses on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, there have been a number of important discourses related to privacy around various projects and topics. These discourses have been driving public awareness about privacy in India, and represent an important indication of public perception of privacy and privacy concerns.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Unique Identification Project&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of these discourses is a public dialogue and debate on the Unique Identification Project. Since 2009 the Government of India has been rolling out an identity scheme known as UID or Aadhaar.  The scheme is applicable to all residents in India, and seeks to provide individuals with an identity based on their fingerprints, iris scans, and photograph. The project has been heavily supported by some, and at the same time, heavily critiqued by others. Of those critiquing the project, which included a Parliamentary Standing Committee on Finance,&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;privacy has been a driving force behind the concerns about the project. Arguing that not only does the UID Bill not have sufficient privacy safeguards in its provisions&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;but the design of the project and the technology of the project places individual privacy at risk. For example,  the project relies on centralized storage of biometrics collected under the scheme; it does not account for or address how transaction data that is generated each time an individual identifies himself/herself with the UID will be stored, processed, and shared; and does not provide adequate security measures to protect sensitive information like biometrics.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Human DNA Profiling Bill&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2006 the Department of Biotechnology piloted a draft human DNA Profiling Bill with the objective of creating DNA databases at the national and regional levels, and enabling the creation and storage of DNA profiles for forensic purposes. Since 2006 there have been two more drafts of the bill released to the public, and an expert committee has been created to finalize the text of the bill. Individuals, including the Centre for Internet and Society, publicly raising concern about the bill, cite a lack of privacy safeguards in the provisions, and expansive circumstances and reasons that the bill permits the creation and storage of DNA profiles.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For many years there has been running public discourse about the surveillance that the Indian government has been undertaking. This discourse is growing and is now being linked to privacy and the need for India to enact a privacy legislation. As discussed above, the current surveillance regime is lacking on many fronts, while at the same time the government continues to seek greater interception powers and more access to larger sets of information in more granularity. Projects like the Central Monitoring System, NATGRID, and Lawful Interception Solutions have caused individuals to question the government on the proportionality of State surveillance and ask for a comprehensive privacy legislation that also regulates surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for strong and enforceable surveillance provisions is not unique to India, and in 2013 the International Principles on the Application of Human Rights to the Surveillance of Communications were drafted. The principles lay out standards that ensure that surveillance is in compliance with international human rights law and serve as safeguards that countries can incorporate into their regimes to ensure the same. The principles include: legality, legitimate aim, necessity, adequacy, proportionality, competent judicial authority, due process, user notification, transparency, public oversight, integrity of communications and systems, safeguards for international cooperation, safeguards against illegitimate access. Along with defining safeguards, the principles highlight the challenge of rapidly changing technology and how it is constantly changing how information can be surveilled by governments and what information surveilled by governments, and how information can be combined and analysed to draw conclusions about individuals.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A Privacy Legislation for India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since 2010, there has been a strong public discourse around the need for a privacy legislation in India. In November 2010, a “Privacy Approach” paper was released to the public which envisioned the creation of a data protection legislation. In 2011, the Department of Personnel and Training released a draft privacy bill that defined a privacy regime that encompassed data protection, surveillance, and mass marketing, and recognized privacy as a fundamental right.&lt;a href="#fn31" name="fr31"&gt;[31] &lt;/a&gt;In 2012 the Report of the Group of Experts on Privacy, as discussed above, was published.&lt;a href="#fn32" name="fr32"&gt;[32] &lt;/a&gt;Presently, the Department of Personnel and Training is drafting the text of the Governments Privacy Bill.  In 2013, the Centre for Internet and Society drafted the Citizen’s Privacy Protection Bill – a citizen’s version of a privacy legislation for India.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; From April 2013 – October 2013, the Centre for Internet and Society, in collaboration with the Federation of Indian Chambers of Commerce and Industry and the Data Security Council of India, held a series of seven Privacy Roundtables across India.  The objective of the Roundtables was to gain public feedback to a privacy framework in India. Topics discussed during the meetings included, how to define sensitive personal information vs. Personal information, if co-regulation should be a model adopted as a regulatory framework, and what should be the legal exceptions to the right to privacy.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Clearly, privacy is an emerging and increasingly important field in India’s internet society. As companies collect greater amounts of information from and about online users, and as the government continues to seek greater access and surveillance capabilities, it is critical that India prioritizes privacy and puts in place strong safeguards to protect the privacy of both Indians and foreigners whose data resides temporarily or permanently in India.  The first step towards this is the enactment of a comprehensive privacy legislation recognizing privacy as a fundamental right. The Report of the Group of Experts on Privacy and the government considering a draft privacy bill are all steps in the right direction.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. http://www.zdnet.com/in/india-sets-up-social-media-monitoring-lab-7000012758/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. http://www.techdirt.com/articles/20130203/18510621869/investigative-journalist-claims-her-public-tweets-arent-publishable-threatens-to-sue-blogger-who-does-exactly-that.shtml&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. http://www.bbc.co.uk/news/technology-24744695&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. http://www.thehindu.com/news/national/sc-to-hear-pil-on-us-surveillance-of-internet-data/article4829549.ece&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. http://forbesindia.com/article/checkin/indias-internet-privacy-woes/35971/1&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. http://www.thehindubusinessline.com/industry-and-economy/info-tech/route-domestic-net-traffic-via-india-servers-nsa-tells-operators/article5022791.ece&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. ITA section 67&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. ITA section 43, 66, and 66F&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Information Technology (Reasonable security practices and procedures and Sensitive personal data or information) Rules, 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Information Technology (Reasonable security practices and procedures and Sensitive personal data or information) Rules, 2011.  section 6(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Information Technology (Procedure and Safeguards for monitoring and collection of Traffic Data or other information) Rules 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn1"&gt;13&lt;/a&gt;]. Information Technology (Procedure and Safeguards for intercepting, monitoring, and decryption) Rules 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Ibid footnote 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Business Standard. Data secure status for India is vital: Sharma on the FTA with EU. September 3rd 2013. Available at: http://www.business-standard.com/article/economy-policy/data-secure-status-for-india-is-vital-sharma-on-fta-with-eu-113090300889_1.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Guidelines for Cyber Cafe Rules 5(2) &amp;amp; 5(3). Available at: http://deity.gov.in/sites/upload_files/dit/files/GSR315E_10511(1).pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Guidelines for Cyber Cafe Rules 5(4)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Guidelines for Cyber Cafe Rules 5(6)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Guidelines for Cyber Café Rules 5(6)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Guidelines for Cyber Café Rules 7(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Ibid footnote 9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Ibid footnote 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. ITA section 84A&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Jain, B. 8,736 phone and e-mail accounts tapped by different government agencies in July. September 17th 2011. Available at: http://articles.economictimes.indiatimes.com/2011-09-17/news/30169231_1_phone-tap-e-mail-accounts-indian-telegraph-act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. The Economic Times. Action to be taken in ‘phone tapping’ during BJP rule: Virbhadra Singh. March 6th 2013. Available at: http://articles.economictimes.indiatimes.com/2013-03-06/news/37500338_1_illegal-phone-virbhadra-singh-previous-bjp-regime&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Chaudhary, A. BlackBerry’s Tussle with Indian Govt. Finally Ends; BB Provides Interception System. http://www.medianama.com/2013/07/223-blackberrys-tussle-with-indian-govt-finally-ends-bb-provides-interception-system/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Report of the Group of Experts on Privacy. Available at: http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. http://164.100.47.134/lsscommittee/Finance/42%20Report.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. http://www.indianexpress.com/news/uid-bill-skips-vital-privacy-issues/688614/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. http://www.epw.in/authors/elonnai-hickok&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. http://ccis.nic.in/WriteReadData/CircularPortal/D2/D02rti/aproach_paper.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. http://www.iltb.net/2011/06/analysis-of-the-privacy-bill-2011/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. http://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. http://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india'&gt;https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Access</dc:subject>
    

   <dc:date>2014-01-08T13:51:06Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/intermediary-liability-resources">
    <title>Intermediary Liability Resources</title>
    <link>https://cis-india.org/internet-governance/blog/intermediary-liability-resources</link>
    <description>
        &lt;b&gt;We bring you a list of intermediary resources as part of research on internet governance. This blog post will be updated on an ongoing basis.&lt;/b&gt;
        &lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Shielding the Messengers: Protecting Platforms for Expression and Innovation. &lt;/b&gt;The Centre for Democracy and Technology. December 2012, available at: &lt;a href="https://www.cdt.org/files/pdfs/CDT-Intermediary-Liability-2012.pdf"&gt;https://www.cdt.org/files/pdfs/CDT-Intermediary-Liability-2012.pdf&lt;/a&gt;: This paper analyses the impact that intermediary liability regimes have on freedom of expression, privacy, and innovation. In doing so, the paper highlights different models of intermediary liability regimes, reviews different technological means of restricting access to content, and provides recommendations for intermediary liability regimes and provides alternative ways of addressing illegal content online.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Internet Intermediaries: Dilemma of Liability:&lt;/b&gt; Article 19. 2013, available at: &lt;a href="http://www.article19.org/data/files/Intermediaries_ENGLISH.pdf"&gt;http://www.article19.org/data/files/Intermediaries_ENGLISH.pdf:&lt;/a&gt;This Policy Document reviews different components of intermediary liability and highlights the challenges and risks that current models of liability have to online freedom of expression. Relying on international standards for freedom of expression and comparative law,  the document includes recommendations and alternative models that provide stronger protection for freedom of expression. The key recommendation in the document include: web hosting providers or hosts should be immune from liability to third party content if they have not modified  the content, privatised enforcement should not be a model and removal orders should come only from courts or adjudicatory bodies, the model of notice to notice should replace notice and takedown regimes, in cases of alleged serious criminality clear conditions should be in place and defined.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Comparative Analysis of the National Approaches to the Liability of Internet Intermediaries:&lt;/b&gt; Prepared by Daniel Seng for WIPO, available at http://www.wipo.int/export/sites/www/copyright/en/doc/liability_of_internet_intermediaries.pdf:This Report reviews the intermediary liability regimes and associated laws in place across fifteen different contexts with a focus on civil copyright liability for internet intermediaries. The Report seeks to find similarities and differences across the regimes studied and highlight  principles and components in different that can be used in international treaties and instruments, upcoming policies, and court decisions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Freedom of Expression, Indirect Censorship, &amp;amp; Liability for Internet Intermediaries.&lt;/b&gt; The Electronic Frontier Foundation. February 2011, available at: &lt;a href="http://infojustice.org/download/tpp/tpp-civil-society/EFF%20presentation%20ISPs%20and%20Freedom%20of%20Expression.pdf"&gt;http://infojustice.org/download/tpp/tpp-civil-society/EFF%20presentation%20ISPs%20and%20Freedom%20of%20Expression.pdf&lt;/a&gt;:This presentation was created for the Trans-Pacific Partnership Stakeholder Forum in Chile and highlights that for freedom of expression to be protected, clear legal protections for internet intermediaries are needed and advocates for a regime that provides blanket immunity to intermediaries or is based on judicial takedown notices.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Study on the Liability of Internet Intermediaries. Contracted by the European Commission.&lt;/b&gt; 2007, available at: &lt;a href="http://ec.europa.eu/internal_market/e-commerce/docs/study/liability/final_report_en.pdf"&gt;http://ec.europa.eu/internal_market/e-commerce/docs/study/liability/final_report_en.pdf&lt;/a&gt;. This Report provides insight on the application of the intermediary liability sections of the EU e-commerce directive  and studies the impact of the regulations under the Directive on the functioning of intermediary information society services. To achieve this objective, the study identifies relavant case law across member states, calls out and evaluates developing trends across Member States, and draws conclusions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Internet Intermediary Liability: Identifying Best Practices for Africa.&lt;/b&gt; Nicolo Zingales for the Association for Progressive Communications,  available at: &lt;a href="https://www.apc.org/en/system/files/APCInternetIntermediaryLiability_BestPracticesAfrica_20131125.pdf"&gt;https://www.apc.org/en/system/files/APCInternetIntermediaryLiability_BestPracticesAfrica_20131125.pdf&lt;/a&gt;: This background paper seeks to identify challenges and opportunities in addressing intermediary liability for countries in the African Union and recommend safeguards that can be included in emerging intermediary liability regimes in the context of human rights. The paper also reviews different models of intermediary liability and discusses the limitations, scope, and modes of operation of each model. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Liability of Internet Intermediaries in Nigeria, Kenya, South Africa, and Uganda&lt;/b&gt;: An uncertain terrain. Association for Progressive Communications. October 2012, available at: &lt;a href="http://www.academia.edu/2484536/The_liability_of_internet_intermediaries_in_Nigeria_Kenya_South_Africa_and_Uganda_An_uncertain_terrain"&gt;http://www.academia.edu/2484536/The_liability_of_internet_intermediaries_in_Nigeria_Kenya_South_Africa_and_Uganda_An_uncertain_terrain&lt;/a&gt;:This Report reviews intermediary liability in Nigeria, Kenya, South Africa and Uganda – providing background to the political context, relevant legislation, and present challenges . In doing so, the Report provides insight into how intermediary liability has changed in recent years in these contexts and explores past and present debates on intermediary liability. The Report concludes with recommendations for stakeholders affected by intermediary liability. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Fragmentation of intermediary liability in the UK&lt;/b&gt;. Daithi Mac Sithigh. 2013, available at: &lt;a href="http://jiplp.oxfordjournals.org/content/8/7/521.full.pdf?keytype=ref&amp;amp;ijkey=zuL8aFSzKJqkozT"&gt;http://jiplp.oxfordjournals.org/content/8/7/521.full.pdf?keytype=ref&amp;amp;ijkey=zuL8aFSzKJqkozT&lt;/a&gt;. This article looks at the application of the Electronic Commerce Directive across Europe and argues that it is being intermixed and subsequently replaced with provisions from national legislation  and provisions of law from area specific legislation. Thus, the article argues that systems for intermediary liability are diving into multiple systems – for example for content related to copyright intermediaries are being placed with new responsibilities while for content related to defamation, there is a reducing in the liability that intermediaries are held to. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Regimes of Legal Liability for Online Intermediaries: an Overview&lt;/b&gt;. OECD, available at:  &lt;a href="http://www.oecd.org/sti/ieconomy/45509050.pdf"&gt;http://www.oecd.org/sti/ieconomy/45509050.pdf&lt;/a&gt;. This article provides an overview of different intermediary liability regimes  including EU and US. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; Closing the Gap: Indian Online Intermediaries and a Liability System Not Yet Fit for Purpose&lt;/b&gt;. GNI. 2014, available at: &lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/Closing%20the%20Gap%20-%20Copenhagen%20Economics_March%202014_0.pdf"&gt;http://www.globalnetworkinitiative.org/sites/default/files/Closing%20the%20Gap%20-%20Copenhagen%20Economics_March%202014_0.pdf&lt;/a&gt;.  This Report argues that the provisions of the Information Technology Act 2000 are not adequate to deal with ICT innovations , and argues that the current liability regime in India is hurting the Indian internet economy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Intermediary Liability in India&lt;/b&gt;. Centre for Internet and Society. 2011, available at: &lt;a href="https://cis-india.org/internet-governance/intermediary-liability-in-india.pdf"&gt;http://cis-india.org/internet-governance/intermediary-liability-in-india.pdf&lt;/a&gt;. This report reviews and ‘tests’  the effect of the Indian intermediary liability on freedom of expression. The report concludes that the present regime in India has a chilling effect on free expression and offers recommendations on how the Indian regime can be amended to protect this right. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Liability of Internet Service providers and the exercise of the freedom of expression in Latin America have been explored in detail through the course of this research paper by Claudio Ruiz Gallardo and J. Carlos Lara Galvez. The paper explores the efficacy and the implementation of proposals to put digital communication channels under the oversight of certain State sponsored institutions in varying degrees. The potential consequence of legal intervention in media and digital platforms, on the development of individual rights and freedoms has been addressed through the course of this study. The paper tries to arrive at relevant conclusions with respect to the enforcement of penalties that seek to redress the liability of communication intermediaries and the mechanism that may be used to oversee the balance between the interests at stake as well as take comparative experiences into account. The paper also analyses the liability of technical facilitators of communications while at the same time attempting to define a threshold beyond which the interference into the working of these intermediaries may constitute an offence of the infringement of the privacy of users. Ultimately, it aims to derive a balance between the necessity for intervention, the right of the users who communicate via the internet and interests of the economic actors who may be responsible for the service: &lt;a class="external-link" href="http://www.palermo.edu/cele/pdf/english/Internet-Free-of-Censorship/02-Liability_Internet_Service_Providers_exercise_freedom_expression_Latin_America_Ruiz_Gallardo_Lara_Galvez.pdf"&gt;http://www.palermo.edu/cele/pdf/english/Internet-Free-of-Censorship/02-Liability_Internet_Service_Providers_exercise_freedom_expression_Latin_America_Ruiz_Gallardo_Lara_Galvez.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="https://crm.apc.org/civicrm/mailing/view?reset=1&amp;amp;id=191"&gt;Click to read the newsletter&lt;/a&gt; from the Association of Progressive Communications. The summaries for the reports can be found below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet Intermediaries: The Dilemma of Liability in Africa. APC News, May 2014, available at: &lt;a href="http://www.apc.org/en/node/19279/"&gt;http://www.apc.org/en/node/19279/&lt;/a&gt;. This report summarizes the challenges facing internet content regulators in Africa, and the effects of these regulations on the state of the internet in Africa. Many African countries do not protect intermediaries from potential liability, so some intermediaries are too afraid to transmit or host content on the internet in those countries. The report calls for a universal rights protection for internet intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;APC’s Frequently Asked Questions on Internet Intermediary Liability:  APC, May 2014, available at: &lt;a href="http://www.apc.org/en/node/19291/"&gt;http://www.apc.org/en/node/19291/&lt;/a&gt;. This report addresses common questions pertaining to internet intermediaries, which are entities which provide services that enable people to use the internet, from network providers to search engines to comments sections on blogs. Specifically, the report outlines different models of intermediary liability, defining two main models. The “Generalist” model intermediary liability is judged according to the general rules of civil and criminal law, while the “Safe Harbour” model protects intermediaries with a legal safe zone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New Developments in South Africa: APC News, May 2014, available at: &lt;a href="http://www.apc.org/en/news/intermediary-liability-new-developments-south-afri"&gt;http://www.apc.org/en/news/intermediary-liability-new-developments-south-afri&lt;/a&gt;. This interview with researchers Alex Comninos and Andrew Rens goes into detail about the challenges of intermediary in South Africa. The researchers discuss the balance that needs to be struck between insulating intermediaries from a fear of liability and protecting women’s rights in an environment that is having trouble dealing with violence against women. They also discuss South Africa’s three strikes policy for those who pirate material.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Preventing Hate Speech Online In Kenya: APCNews, May 2014, available at: &lt;a href="http://www.apc.org/en/news/intermediary-liability-preventing-hate-speech-onli"&gt;http://www.apc.org/en/news/intermediary-liability-preventing-hate-speech-onli&lt;/a&gt;. This interview with Grace Githaiga investigates the uncertain fate of internet intermediaries under Kenya’s new regime. The new government has mandated everyone to register their SIM cards, and indicated that it was monitoring text messages and flagging those that were deemed risky. This has led to a reduction in the amount of hate speech via text messages. Many intermediaries, such as newspaper comments sections, have established rules on how readers should post on their platforms. Githaiga goes on to discuss the issue of surveillance and the lack of a data protection law in Kenya, which she sees as the most pressing internet issue in Kenya.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New Laws in Uganda Make Internet Providers More Vulnerable to Liability and State Intervention: APCNews, May 2014, available at: &lt;a href="http://www.apc.org/en/news/new-laws-uganda-make-internet-providers-more-vulne"&gt;http://www.apc.org/en/news/new-laws-uganda-make-internet-providers-more-vulne&lt;/a&gt;. In an interview, Lilian Nalwoga discusses Uganda’s recent anti-pornography law that can send intermediaries to prison. The Anti-Pornography Act of 2014 criminalizes any sort of association with any form of pornography, and targets ISPs, content providers, and developers, making them liable for content that goes through their systems. This makes being an intermediary extremely risky in Uganda. The other issue with the law is a vague definition of pornography. Nalwoga also explains the Anti-Homosexuality Act of 2014 bans any promotion or recognition of homosexual relations, and the monitoring technology the government is using to enforce these laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New Laws Affecting Intermediary Liability in Nigeria: APCNews, May 2014, available at: &lt;a href="http://www.apc.org/en/news/new-laws-affecting-intermediary-liability-nigeria"&gt;http://www.apc.org/en/news/new-laws-affecting-intermediary-liability-nigeria&lt;/a&gt;. Gbenga Sesan, executive director of Paradigm Initiative Nigeria, expounds on the latest trends in Nigerian intermediary liability. The Nigerian Communications Commission has a new law that mandates ISPs store users data for at least here years, and wants to make content hosts responsible for what users do on their networks. Additionally, in Nigeria, internet users register with their real name and prove that you are the person who is registration. Sesan goes on to discuss the lack of safe harbor provisions for intermediaries and the remaining freedom of anonymity on social networks in Nigeria.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet Policies That Affect Africans: APC News, May 2014, available at: &lt;a href="http://www.apc.org/en/news/intermediary-liability-internet-policies-affect-af"&gt;http://www.apc.org/en/news/intermediary-liability-internet-policies-affect-af&lt;/a&gt;. The Associsation for Progressive Communcations interviews researcher Nicolo Zingales about the trend among African governments establishing further regulations to control the flow of information on the internet and hold intermediaries liable for content they circulate. Zingales criticizes intermediary liability for “creating a system of adverse incentives for free speech.” He goes on to offer examples of intermediaries and explain the concept of “safe harbor” legislative frameworks. Asked to identify best and worst practices in Africa, he highlights South Africa’s safe harbor as a good practice, and mentions the registration of users via ID cards as a worst practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Towards Internet Intermediary Responsibility: Carly Nyst, November 2013, available at: &lt;a href="http://www.genderit.org/feminist-talk/towards-internet-intermediary-responsibility"&gt;http://www.genderit.org/feminist-talk/towards-internet-intermediary-responsibility&lt;/a&gt;. Nyst argues for a middle ground between competing goals in internet regulation in Africa. Achieving one goal, of protecting free speech through internet intermediaries seems at odds with the goal of protecting women’s rights and limiting hate speech, because one demands intermediaries be protected in a legal safe harbor and the other requires intermediaries be vigilant and police their content. Nyst’s solution is not intermediary liability but &lt;i&gt;responsibility&lt;/i&gt;, a role defined by empowerment, and establishing an intermediary responsibility to promote positive gender attitudes.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/intermediary-liability-resources'&gt;https://cis-india.org/internet-governance/blog/intermediary-liability-resources&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-03T06:45:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf">
    <title>Indian Law and the Necessary Proportionate Principles</title>
    <link>https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf'&gt;https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T02:15:32Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
