<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 51 to 65.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy_encryption"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dsci-information-summit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/draft-human-dna-profiling-bill-april-2012"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/uid-reflects-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/data-retention-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/cyber-security-compilation.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/consumer-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill">
    <title>Feedback to the NIA Bill</title>
    <link>https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill</link>
    <description>
        &lt;b&gt;Malavika Jayaram and Elonnai Hickok introduce the formal submission of CIS to the proposed National Identification Authority of India (NIA) Bill, 2010, which would give every resident a unique identity. The submissions contain the detailed comments on the draft bill and the high level summary of concerns with the NIA Bill submitted to the UIDAI on 13 July, 2010.&lt;/b&gt;
        
&lt;p&gt;The UID draft bill is a proposed legislation that authorizes the creation of a centralized database of unique identification numbers that will be issued to every resident of India.&amp;nbsp; The purpose of such a database is characterized as ensuring that every resident is provided services and benefits. The UID project was first set up and introduced to the public in February 2009 by the planning committee.&amp;nbsp;&amp;nbsp;&amp;nbsp; In June 2010, a draft bill was proposed which attracted public debates and opinions for over two weeks. Currently the bill is being considered by Parliament in the winter session (July-August 2010). If the Parliament of India approves the bill, it may be enacted during Winter 2010.&lt;/p&gt;
&lt;p&gt;CIS has closely followed the UID project and reviewed the bill right from the time when it was first issued. and has worked to initiate and contribute to a public debate including attending of workshops in Delhi on 6 May, 2010 and in Bangalore on 16 May, 2010.&lt;/p&gt;
&lt;p&gt;We respect the fact that civil society has many voices. That said, in our criticisms, suggestions, and analysis of the UID draft bill, we are asking for a simple, well-defined document, the language and structure of which expressly precludes abuse of a centralized identification database. The document should provide solely for its stated purpose of enabling the provision of benefits to the poor. Along with this mandate we believe the document should give clear rights of choice, control, and privacy to the &lt;em&gt;Aadhaar&lt;/em&gt; number holder. Below is a summary of our general comments with citations to specific sections of the draft bill. A &lt;a href="https://cis-india.org/internet-governance/letter-to-uid-authority" class="internal-link" title="Feedback on the NIA Bill 2010"&gt;detailed&lt;/a&gt; section by section critique is attached along with our &lt;a href="https://cis-india.org/internet-governance/high-level-summary" class="internal-link" title="High Level Summary"&gt;high level summary&lt;/a&gt; of concerns. The compilation and synthesis of detailed critiques was done by Malavika Jayaram.&lt;/p&gt;
&lt;h2&gt;Summary of High Concerns&amp;nbsp;&lt;/h2&gt;
&lt;h3&gt;Clarity of Definition and Purpose&lt;/h3&gt;
&lt;p&gt;Most importantly we find that in order to adhere to the stated purpose of the bill there is a need to limit and better define language in the relevant sections of the bill. This includes the powers and purpose of the Authority and the overarching scheme of the bill. We are concerned that the over-breadth and generality of the language will open up the opportunity for more information to be collected than originally stated. Further, definition will act to prevent uncontrolled or unwanted change in the project’s scope, and will clearly limit the usage of the &lt;em&gt;Aadhaar&lt;/em&gt; numbers to the facilitation of the delivery of social welfare programs.&lt;br /&gt;&lt;br /&gt;For the bill to be in line with its original purpose of reaching out to the poor, we also believe the issue of fees must be addressed. We find that there is an inadequate definition in the bill of what fees shall be applied for authentication of &lt;em&gt;Aadhaar&lt;/em&gt; numbers.&amp;nbsp; Also we find that it is incompatible with the bill’s stated purpose to require an individual to pay to be authenticated. The bill should provide that no charges will be levied for authentication by registrars and other service providers for certain categories of &lt;em&gt;Aadhaar&lt;/em&gt; number holders (BPL, disabled, etc.), and that charges will be limited/capped in other cases. This will bring the bill in line with the statement in Chapter II 3 (1) “Every resident shall be entitled to obtain an &lt;em&gt;Aadhaar&lt;/em&gt; number on providing his demographic information and biometric information to the Authority in such a manner as may be specified by regulations”&amp;nbsp; and Chapter 3 (10 ) “The Authority shall take special measures to issue &lt;em&gt;Aadhaar&lt;/em&gt; numbers to women, children, senior citizens, persons with disability, migrant unskilled and unorganized workers, nomadic tribes or such other persons who do not have any permanent dwelling house and such other categories of individuals as may be specified by regulations. If a fee must be permitted, a cap/safeguard should be put in place to ensure that the fee does not become a mechanism of abuse.&lt;/p&gt;
&lt;h3&gt;Protection of the Citizen&lt;/h3&gt;
&lt;p&gt;The bill should ensure the protection of&amp;nbsp; citizens’ rights to privacy and freedom of choice. To do this it is important that the bill is voluntary, allows for the protection of anonymity, and is clear on how data will be collected, stored and deleted. Measures should be taken towards ensuring that the &lt;em&gt;Aadhaar&lt;/em&gt; number is truly voluntary. Accordingly, a prohibition against the denial of goods, services, entitlements and benefits (private or public) for lack of a UID number – provided that an individual furnishes equivalent ID is necessary.&amp;nbsp; The bill should also spell out the situations in which anonymity will be preserved and/or an &lt;em&gt;Aadhaar&lt;/em&gt; number should not be requested such as a person’s sexuality/sexual orientation and marital status/history. Furthermore, the bill should require the Authority, registrars, enrolling agencies and service providers to delete/anonymize/obfuscate transaction data according to defined principles after appropriate periods of time in order to protect the privacy of citizens.&lt;/p&gt;
&lt;h3&gt;Motivations of the UID Bill&lt;/h3&gt;
&lt;p&gt;Since the submission of the high level summary, we note that a list of 221 agencies empanelled by the UIDAI has been uploaded onto the website (by a memo dated 15 July, 2010). A swift reading reveals that most of the agencies who are going to help enroll people into the UIDAI system are not NGOs, CSOs or other welfare oriented not-for-profit entities; rather, they are largely IT companies and commercial enterprises. This begs the question as to whether the UID scheme/&lt;em&gt;Aadhaar&lt;/em&gt; is truly geared towards delivery of benefits and inclusivity of the poor and marginalized. Already concerns have been voiced that the “ecosystem” of registrars and enrolling agencies contemplated by the scheme, to the extent that it envisages a public-private partnership, could firstly, be “hijacked” or “captured” by commercial motives and result in sharing of data, security breaches, compromised identities, loss of privacy, data mining and customer profiling, and secondly, end up neglecting the very sections of society that the scheme allegedly most wants to help. The list of empanelled companies makes this even more likely and imminent a concern. Without casting aspersions on any of those entities, we would like to highlight that this sort of delegated structure raises several concerns.&lt;/p&gt;
&lt;p&gt;Additionally, we find the speed and efficiency with which the UIDAI juggernaut is signing MoUs with states, banks and government agencies on the one hand, and issuing tenders, RFPs, RFQs and otherwise seeking proposals and awarding contracts to private entities – in the absence of any Parliament-sanctioned law (the bill is still a draft, and yet to even be placed before the Parliament) to be alarming. Along with news of the increasing costs of the project and doubts about how foolproof the technology will be, it is staggering to imagine that something that raises so many concerns is being pushed through without a more serious debate. The lack of formal procedures and open debates makes one wonder how democratic the actual process is.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;To conclude, CIS believes that the UID bill threatens the rights of citizens in India, and appeals to the citizen to think critically of its implications and consequences.&lt;/p&gt;
&lt;p&gt;1. &lt;a href="https://cis-india.org/internet-governance/letter-to-uid-authority" class="internal-link" title="Feedback on the NIA Bill 2010"&gt;Detailed Summary pdf (159kb)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-summary" class="internal-link" title="High Level Summary"&gt;2. High Level Summary (77kb)&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill'&gt;https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Submissions</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:14:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf">
    <title>Export and Import of Security Technologies in India: Q&amp;A</title>
    <link>https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf'&gt;https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T02:41:05Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy_encryption">
    <title>Encryption Standards and Practices </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy_encryption</link>
    <description>
        &lt;b&gt;The below note looks at different types of encryption, varying practices of encryption in India, and the relationship between encryption, data security, and national security. &lt;/b&gt;
        
&lt;h3&gt;Introduction: Different Types of Encryption &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;When looking at the informational side of privacy, encryption is an important component to understand. Encryption in itself is a useful tool for protecting data that is highly personal in nature and is being stored, used in a transaction, or shared across multiple databases. The quality of encryption is judged by the ability to prevent an outside party from determining the original content of an encrypted message. There are many different types of encryption including:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;em&gt;Symmetric Key Encryption&lt;/em&gt;: Communicating parties share the same private key that is used to encrypt and decrypt the data. This form of encryption is the most basic, and is fast and effective, but there have been problems in the secure exchange of the unique keys between communicating parties over networks [1]. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;em&gt;Asymmetric Key Encryption:&lt;/em&gt; This system relies on the use of two keys– one public, and one private. In this system only the user knows the private key.&amp;nbsp; In order to ensure security in the system a mathematical algorithm that is easy to calculate in one direction, but nearly impossible to reverse calculate is often used.&amp;nbsp; Use of a public and a private key asymmetric avoids the problem of secure exchange that is experienced by symmetric key encryption.&amp;nbsp; The basis of the two keys should be so different, that it is possible to publicize one without the danger of being able to derive the original data. Decoding of data takes place in a two step process. The first step is to decrypt the symmetric key using the private key. The second step is to decode the data using the symmetric key and interpret the actual data[2].&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;em&gt;One-way Hash Functions:&lt;/em&gt; One-way hash functions are mathematical algorithms that transform an input message into a message of fixed length. The key to the security of hash functions is that the inverse of the hash function must be impossible to prove[3]. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;em&gt;Message Authentication Codes&lt;/em&gt;: MACs are data blocks appended to messages to protect the authentication and integrity of messages. MACs typically depend on the use of one-way hash functions[4].&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;em&gt;Random Number Generators&lt;/em&gt;: An unpredictable sequence of numbers that is produced by a mathematical algorithm[5]. &lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Encryption in India&lt;/h3&gt;
&lt;p&gt;Encryption in India is a hotly debated and very confusing subject. The government has issued one standard, but individuals and organizations follow completely different standards. According to a note issued by the Department of Telecommunications (“DOT”) in 2007, the use of bulk encryption is not permitted by Licensees, but nevertheless Licensees are still responsible for the privacy of consumers’ data (section 32.1). The same note pointed out that encryption up to 40 bit key length in the symmetric key algorithms is permitted, but any encryption higher than this may be used only with the written permission of the Licensor. Furthermore, if higher encryption is used, the decryption key must be split into two parts and deposited with the Licensor. The 40 bit key standard was previously established in 2002 in a note submitted by the DOT:“License Agreement for Provision of Internet Service (including Internet Telephony)’ issued by Department of Telecommunications”[6] Though a 40 bit standard has been established, there are many sectors that do not adhere to this rule. Below are a few sectoral examples:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;A) Banking: ‘Report on Internet Banking’ by the Reserve Bank of India 22 June 2001:&lt;/li&gt;&lt;/ul&gt;
"All transactions must be authenticated using a user ID and password. SSL/128 bit encryption must be used as the minimum level of security. As and when the regulatory framework is in place, all such transactions should be digitally certified by one of the licensed Certification Authorities.”[7]
&lt;ul&gt;&lt;li&gt;B).Trade:&amp;nbsp; The following advanced security products are advisable:&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;"Microprocessor based SMART cards, Dynamic Password (Secure ID Tokens), 64 bit/128 bit encryption"[8]&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;C).Trains: ‘Terms &amp;amp; Conditions’ for online Railway Booking 2010:&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;"Credit card details will travel on the Internet in a fully encrypted (128 bit, browser independent encryption) form. To ensure security, your card details are NOT stored in our Website.”[9]&lt;/p&gt;
&lt;p&gt;The varying level of standards poses a serious obstacle to Indian business, as foreign countries do not trust that their data will be secure in India. Also, the differing standards will pose&amp;nbsp; a compliance problem for Indian businesses attempting to launch their services on the cloud.&lt;/p&gt;
&lt;h3&gt;Data Security, Encryption, and Privacy:&lt;/h3&gt;
&lt;p&gt;To understand how encryption relates to privacy, it is important to begin by looking at data security vs. privacy.&amp;nbsp; Security and privacy have an interesting relationship, because they go hand in hand, and yet at the same time they are opposed to each other.&amp;nbsp; First, data security and privacy are not the same.&amp;nbsp; Breaches in data security occur when information is accessed without authorization. There is no loss of privacy, however, until that information is misused. Though data security is critical for protecting privacy, the principles of data security call for practices that threaten privacy principles. For example, data security focuses on data retention, logging, etc, while privacy focuses on the consent, restricted access to data, limited data retention, and anonymity[10]. If security measures are carried out without privacy interests in mind, surveillance can easily result in severe privacy violations. Thus, data security should influence and support a privacy regime but not drive it. In this context, encryption and data security will create an expectation of privacy, rather than undermine or overshadow privacy. By the same token encryption cannot be seen as the cure for privacy challenges. Encryption cannot adequately protect data, but when supported by a strong privacy and security regime – it can be very effective. It is also a good measuring rod for determining how committed a company has been to protecting a person’s privacy and ensuring the security of his or her data. In light of the symbiotic yet complicated relationship that privacy and data security have with each other, it would make sense for legislation and domestic encryption standards to be merged and addressed together. This would ensure that a) the standard is not archaic (as the current 40 bit one is); b) would take into account the threat to privacy that surveillance can impose and would address decryption when addressing encryption; and c) would anticipate the collection and cataloging of data and ensure security of the data and person as well as national security.&lt;/p&gt;
&lt;h3&gt;National Security and Encryption&lt;/h3&gt;
&lt;p&gt;Encryption is a subject that causes governments a great deal of concern. For example in order to preserve foreign policy and in national security interests, the US maintains export controls on encryption items [10]. This means that a license is required to export or re-export identified items. Though the Indian government currently does not have an analogous system, it would be prudent to consider one. Though the government is aware of the connection between encryption and national security, it seems to be addressing it by setting a low standard for the public which enables it to monitor communications etc. easily. It is important to remember though that today we live in a digital age where there are no boundaries. One cannot encrypt data at 40 bits in India and think it is safe, because that encryption can be broken everywhere else in the world. Despite the fact that there are no boundaries in the digital age, users of the internet and communication technologies are subject to different and potentially inconsistent regulatory and self-regulatory data security frameworks and consequently different encryption standards.&amp;nbsp; One way to overcome this problem could be to set in fact a global standard for encryption that would be maximal for the prevention of data leaks. For instance, there are existing algorithms that are royalty free and available to the global public such as the Advanced Encryption Standard algorithm, which is available worldwide.&amp;nbsp; The public disclosure and analysis of the algorithm bolsters the likelihood that it is genuinely secure, and its widespread use will lead to the expedited discovery of vulnerabilities and accelerated efforts to resolve potential weaknesses. Another concern that standardized encryption levels would resolve is the problem of differing export standards and export controls. As seen by the example of the US, industrialized nations often restrict the export of encryption algorithms that are of such strength that they are considered “dual use” – in other words, algorithms that are strong enough to be used for military as well as commercial purposes. Some countries require that the keys be shared, while others take a hands-off approach. In India joining a global standard or creating a national standard of maximum strength would work to address the current issue of inconsistencies among the required encryption levels.&lt;/p&gt;
&lt;h3&gt;The Relationship between the Market, the Individual, the State, and Encryption&lt;/h3&gt;
&lt;p&gt;Moving away from the technical language it is useful to break down encryption from a social science point of view. Who are the actors involved – what is their relationship with each other, and how does encryption come into the picture. When one looks at encryption it is possible to conceive of many different scenarios, each with different players. In the first scenario there is an individual and another individual. They are sending information back and forth. The third individual could be an entity, a business, or just another individual. The first two individuals want to keep their information away from this third, unknown person or entity. For that reason, the first two encrypt their communications. Encryption is a tool that has the ability to re-draw the lines between the public and private sphere by giving individuals the ability to form a very private line of communication, and thus a very private relationship in a space that is very non-private - such as the internet. In another scenario between the individuals and the markets – the market wants information about an individual to enhance its effectiveness and profits. To create trust, the market promises that information given is encrypted. Thus, the market is attempting to initiate a trusting relationship with individuals. This relationship though, is forced and false, because individuals must compromise how much information they disclose for a product or service in return.&lt;/p&gt;
&lt;p&gt;In the second scenario, there is an individual, another individual, and a Government. In this situation the two individuals again say that they want to have a private conversation in a public space, and so it is encrypted, but the Government – which is worried about national security decides that it wants to listen in on the conversation. This places a new dynamic on the relationship. No longer are the two individuals private.&amp;nbsp; Not only can the government hear their conversation, but they have no choice over whether their conversation is heard or not. This is a relationship based off of the premises of distrust&amp;nbsp; between the government and individuals. It presupposes, and is biased in assuming, that if you have done nothing wrong – you have nothing to hide.Using the same set of actors, perhaps a government requires the collection of information about its citizenry that is sensitive. To ensure the privacy of its people, the government encrypts the information, but the individual has essentially lost control over his/her information. He/she is forced to trust that the Government will not misuse the information given.&lt;/p&gt;
&lt;p&gt;In the third scenario there is a market, an, individual, and the government. The market gathers information about an individual on transactional levels, but encrypts it – because in the wrong hands – this information could be misused. The government still wants access to the information and so they demand the information. What does the market say? Does it side with the individual or the Government? If governments sanction the market, they can make it bend to their will. Thus, the government is in a position to control the market and the individual, but to what ends and for what means. In all of these situations the understood role of the market, the government, and the individual has been shifted by the ability to encrypt information.&amp;nbsp; The idea of using encryption as a means to keep information safe speaks to a new relationship that has formed between the government, the market, and the individual.&lt;/p&gt;
&lt;h3&gt;Bibliography:&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;&amp;nbsp;Burke, Jerome. McDonald, John. Architectural Support for Fast Symmetric-Key
Cryptography&lt;/li&gt;&lt;li&gt;Munro, Paul. Public Key Encrpytion. University of
Pittsburgh. 2004&lt;/li&gt;&lt;li&gt;Merkle, Ralph. One Way Hash Functions and DES. &lt;/li&gt;&lt;li&gt;Department of Commerce. Federal information Processing Standards Publication. The Keyed - Hash Message Authentication Code. http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf&lt;/li&gt;&lt;li&gt;http://www.ruskwig.com/random_encryption.htm&amp;nbsp;&lt;/li&gt;&lt;li&gt;http://www.indentvoice.com/other/ISPLicense.pdf&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Report on Internet Banking’ by The Reserve Bank of India: 22 June 2001&lt;/li&gt;&lt;li&gt;

Internet
Trading guidelines issued by Securities &amp;amp; Exchange Board of India: 31
January 2000&lt;/li&gt;&lt;li&gt;Website of IRCTC (a
public sector undertaking under the Ministry of Railways)&lt;/li&gt;&lt;li&gt;American Bar Assiociation: International Guide to Privacy.&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;Department of Commerce: Bureau of Industry and Security –
Encryption Export Controls. June 25 2010

&lt;/li&gt;&lt;/ol&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;ol&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy_encryption'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy_encryption&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-03-22T05:39:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dsci-information-summit">
    <title>DSCI Information Security Summit 2010 – A Report</title>
    <link>https://cis-india.org/internet-governance/blog/dsci-information-summit</link>
    <description>
        &lt;b&gt;On 2 and 3 December 2010, the DSCI Information Security Summit 2010 took place in the Trident Hotel, Chennai. The two day summit included a broad spectrum of speakers/panels and topics, ranging from Securing Data &amp; Systems to how to leverage the Cloud. The key speakers were Mr. Gulshan Rai, Director General, CERT-In, DIT, Mr. Rajeev Kapoor, Joint Secretary, DoPT, Govt. of India, Mr. Vakul Sharma, Advocate, Supreme Court of India and Dr. Kamlesh Bajaj, CEO, DSCI. Elonnai Hickok attended the summit.&lt;/b&gt;
        
&lt;p&gt;Day one commenced with keynote address given by Jeffery Carr, Principal, GreyLogic, US who spoke about the gravity and risk that businesses and countries are facing in the digital age. A prominent theme in every presentation throughout the day was that India is facing both serious changes and challenges in light of evolving technology and global standards.&amp;nbsp; A few specific challenges addressed were: encryption standards, the cloud, and securing business transactions. During the panel on encryption standards it was pointed out that India desperately needs a clear and comprehensive policy on encryption standards. Not only will this serve to facilitate transactions in India, but it will increase trade as foreign countries will have an enforced policy to ensure them that India is a safe destination to export to. The panel addressing the cloud focused on the challenges that businesses are facing in terms of the cloud in the Indian context. The three main challenges to the Cloud are:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;data security and privacy&lt;/li&gt;&lt;li&gt;compliance requirements&lt;/li&gt;&lt;li&gt;legal and contractual requirements&amp;nbsp; &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;It was pointed out that in particular the Indian legal environment is serving as an obstacle to businesses wishing to move to the cloud, because of policies such as 40 bit encryption, and the Indian Telecom licensing policy which do not permit data transfer outside the cloud. Discussed also were measures that organisations have adopted to address data protection challenges in the cloud including: Including security &amp;amp; privacy clauses in the contractual agreement, making the Cloud service provider liable for a data breach, and auditing the services of Cloud service providers. Further information about the Cloud in the Indian context can be found in the DSCI report on &lt;em&gt;Data Protection Challenges in Cloud Computing: An Indian Perspective&lt;/em&gt;. In the session on Securing Business Transactions, the challenge of protecting data and transactions was addressed. Many approaches were presented which explained how securing systems has moved away from using security enables software to security embedded hardware. The first day concluded with a presentation of DSCI Study Reports, including their recent study on the State of Data Security and Privacy in the Indian BPO Industry, Service Provider Assessment Framework – A Study Report, and the DSCI Security Framework.&lt;/p&gt;
&lt;p&gt;The second day included presentations and panel discussions on privacy, the economics of security, and security technologies.&amp;nbsp; The presentation on privacy presented many different viewpoints which ranged from the stance that India has been taking the right steps towards securing individuals privacy, and in contrast, that India has seen a dilution of privacy standards in the recent years. Contributing to the panel on privacy, Vakul Sharma, Supreme Court Advocate created a timeline of privacy in India, dispelling the popular belief that India does not have a history of privacy. Mr. Sharma closed his presentation with a challenge to those who believe that India does not have adequate privacy protections - to return to the clauses in the ITA, see if they are indeed being followed, and then assess if India does not have adequate privacy protection. The panel on the Economics of Security spoke about the rising costs of security in the wake of cyber crime, and the rising cost of not adequately protecting one’s business. In the session on Technology Challenges to Fight Data Breaches and Cyber Crimes a debate evoked on current measures taken by industry and government to fight cyber crime, and steps that still need to be taken. Opening the session was a presentation by Mr. West, member of the National Cyber Forensics Training and Alliance. His presentation introduced a new approach taken by the States in which key stakeholders including students and local law enforcement were engaged when tracking down cyber criminals. Mr. West demonstrated the success of the program, and explained how such an approach could be easily adapted in India. From different comments made by the panel and audience it was clear from this session that there is a need for the Indian government to be more invested in funding and supporting smaller cybercrime initiatives. Closing the day was a panel on E-Security for the next five years including the application and enforcement of DSCI’s best practices for a Security and Privacy Framework.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The event was sponsored by: Trusted Computing Group, Computer Associates, McAfee, Verizon Business, Tata Consultancy Services, Deloitte, (ISC)2, BlackBerry, ACS, CSC, Microsoft, RSA, and Intel.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dsci-information-summit'&gt;https://cis-india.org/internet-governance/blog/dsci-information-summit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:04:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights">
    <title>Draft International Principles on Communications Surveillance and Human Rights</title>
    <link>https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights</link>
    <description>
        &lt;b&gt;These principles were developed by Privacy International and the Electronic Frontier Foundation and seek to define an international standard for the surveillance of communications. The Centre for Internet and Society has been contributing feedback to the principles. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The principles are still in draft form. The most recent version can be accessed &lt;a class="external-link" href="http://necessaryandproportionate.net"&gt;here&lt;/a&gt;. &lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Our goal is that these principles will provide civil society groups, industry, and governments with a framework against which we can evaluate whether current or proposed surveillance laws and practices are consistent with human rights. We are concerned that governments are failing to develop legal frameworks to adhere to international human rights and adequately protect communications privacy, particularly in light of innovations in surveillance laws and techniques.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles are the outcome of a consultation with experts from civil society groups and industry across the world. It began with a meeting in Brussels in October 2012 to address shared concerns relating to the global expansion of government access to communications. Since the Brussels meeting we have conducted further consultations with international experts in communications surveillance law, policy and technology.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We are now launching a global consultation on these principles. Please send us comments and suggestions by January 3rd 2013, by emailing rights (at) eff (dot) org.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Preamble&lt;/b&gt;&lt;br /&gt;Privacy is a fundamental human right, and is central to the maintenance of democratic societies. It is essential to human dignity and it reinforces other rights, such as freedom of expression and association, and is recognised under international human rights law.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Activities that infringe on the right to privacy, including the surveillance of personal communications by public authorities, can only be justified where they are necessary for a legitimate aim, strictly proportionate, and prescribed by law.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before public adoption of the Internet, well-established legal principles and logistical burdens inherent in monitoring communications generally limited access to personal communications by public authorities. In recent decades, those logistical barriers to mass surveillance have decreased significantly. The explosion of digital communications content and information about communications, or “communications metadata”, the falling cost of storing and mining large sets of data, and the commitment of personal content to third party service providers make surveillance possible at an unprecedented scale.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is universally accepted that access to communications content must only occur in exceptional situations, the frequency with which public authorities are seeking access to information about an individual’s communications or use of electronic devices is rising dramatically—without adequate scrutiny. &lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; When accessed and analysed, communications metadata may create a profile of an individual's private life, including medical conditions, political and religious viewpoints, interactions and interests, disclosing even greater detail than would be discernible from the content of a communication alone. &lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Despite this, legislative and policy instruments often afford communications metadata a lower level of protection and do not place sufficient restrictions on how they can be subsequently used by agencies, including how they are data-mined, shared, and retained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is therefore necessary that governments, international organisations, civil society and private service providers articulate principles establishing the minimum necessary level of protection for digital communications and communications metadata (collectively "information") to match the goals articulated in international instruments on human rights— including a democratic society governed by the rule of law. The purpose of these principles is to:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Provide guidance for legislative changes and advancements related to communications and   communications metadata to ensure that pervasive use of modern  communications technology does not result in an erosion of privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establish appropriate      safeguards to regulate access by public authorities (government agencies,      departments, intelligence services or law enforcement agencies) to      communications and communications metadata about an individual’s use of an      electronic service or communication media. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;We call on governments to establish stronger protections as required by their constitutions and human rights obligations, or as they recognize that technological changes or other factors require increased protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles focus primarily on rights to be asserted against state surveillance activities. We note that governments are required not only to respect human rights in their own conduct, but to protect and promote the human rights of individuals in general.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; Companies are required to follow data protection rules and yet are also compelled to respond to lawful requests. Like other initiatives,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; we hope to provide some clarity by providing the below principles on how state surveillance laws must protect human rights.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Principles&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Any limitation to the right to privacy must be prescribed by law. Neither the Executive nor the Judiciary may adopt or implement a measure that interferes with the right to privacy without a previous act by the Legislature that results from a comprehensive and participatory process. Given the rate of technological change, laws enabling limitations on the right to privacy should be subject to periodic review by means of a participatory legislative or regulatory process&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legitimate Purpose&lt;/b&gt;: Laws should only allow access to communications or communications metadata by authorised public authorities for investigative purposes and in pursuit of a legitimate purpose, consistent with a free and democratic society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Laws allowing access to communications or communications metadata by authorised public authorities should limit such access to that which is strictly and demonstrably necessary, in the sense that an overwhelmingly positive justification exists, and justifiable in a democratic society in order for the authority to pursue its legitimate purposes, and which the authority would otherwise be unable to pursue. The onus of establishing this justification, in judicial as well as in legislative processes, is on the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Public authorities should restrain themselves from adopting or implementing any measure of intrusion allowing access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose that justified establishing that measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Competent Authority&lt;/b&gt;: Authorities capable of making determinations relating to communications or communications metadata must be competent and must act with independence and have adequate resources in exercising the functions assigned to them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis. Competent authorities must ensure that all formal requirements are fulfilled and must determine the validity of each specific attempt to access or receive communications or communications metadata, and that each attempt is proportionate in relation to the specific purposes of the case at hand. Communications and communications metadata are inherently sensitive and their acquisition should be regarded as highly intrusive. As such, requests should &lt;b&gt;at a minimum&lt;/b&gt; establish a) that there is a very high degree of probability that a serious crime has been or will be committed; b) and that evidence of such a crime would be found by accessing the communications or communications metadata sought; c) other less invasive investigative techniques have been exhausted; and d) that a plan to ensure that the information collected will be only that information reasonably related to the crime and that any excess information collected will be promptly destroyed or returned. Neither the scope of information types, the number or type of persons whose information is sought, the amount of data sought, the retention of that data held by the authorities, nor the level of secrecy afforded to the request should go beyond what is demonstrably necessary to achieve a specific investigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Due process requires that governments must respect and guarantee an individual’s human rights, that any interference with such rights must be authorised in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the general public.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;While criminal investigations and other considerations of public security and safety may warrant limited access to information by public authorities, the granting of such access must be subject to guarantees of procedural fairness. Every request for access should be subject to prior authorisation by a competent authority, except when there is imminent risk of danger to human life. &lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Notwithstanding the notification and transparency requirements that governments should bear, service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request. In specific cases where the public authority wishes to delay the notification of the affected user or in an emergency situation where sufficient time may not be reasonable, the authority should be obliged to demonstrate that such notification would jeopardize the course of investigation to the competent judicial authority reviewing the request. In such cases, it is the responsibility of the public authority to notify the individual affected and the service provider as soon as the risk is lifted or after the conclusion of the investigation, whichever is sooner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public. The government and service providers should provide the maximum possible transparency about the access by public authorities without imperiling ongoing investigations, and with enough information so that individuals have sufficient knowledge to fully comprehend the scope and nature of the law, and when relevant, challenge it. Service providers must also publish the procedure they apply to deal with data requests from public authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: An independent oversight mechanism should be established to ensure transparency of lawful access requests. This mechanism should have the authority to access information about public authorities' actions, including, where appropriate, access to secret or classified information, to assess whether public authorities are making legitimate use of their lawful capabilities, and to publish regular reports and data relevant to lawful access. This is in addition to any oversight already provided through another branch of government such as parliament or a judicial authority. This mechanism must provide – at a minimum – aggregate information on the number of requests, the number of requests that were rejected, and a specification of the number of requests per service provider and per type of crime. &lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: It is the responsibility of service providers to transmit and store communications and communications metadata securely and to a degree that is minimally necessary for operation. It is essential that new communications technologies incorporate security and privacy in the design phases. In order, in part, to ensure the integrity of the service providers’ systems, and in recognition of the fact that compromising security for government purposes almost always compromises security more generally, governments shall not compel service providers to build surveillance or monitoring capability into their systems. Nor shall governments require that these systems be designed to collect or retain particular information purely for law enforcement or surveillance purposes. Moreover, &lt;i&gt;a priori&lt;/i&gt; data retention or collection should never be required of service providers and orders for communications and communications metadata preservation must be decided on a case-by-case basis. Finally, present capabilities should be subject to audit by an independent public oversight body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: In response to changes in the flows of information and the technologies and services that are now used to communicate, governments may have to work across borders to fight crime. Mutual legal assistance treaties (MLATs) should ensure that, where the laws of more than one state could apply to communications and communications metadata, the higher/highest of the available standards should be applied to the data. Mutual legal assistance processes and how they are used should also be clearly documented and open to the public. The processes should distinguish between when law enforcement agencies can collaborate for purposes of intelligence as opposed to sharing actual evidence. Moreover, governments cannot use international cooperation as a means to surveil people in ways that would be unlawful under their own laws. States must verify that the data collected or supplied, and the mode of analysis under MLAT, is in fact limited to what is permitted. In the absence of an MLAT, service providers should not respond to requests of the government of a particular country requesting information of users if the requests do not include the same safeguards as providers would require from domestic authorities, and the safeguards do not match these principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: To protect individuals against unwarranted attempts to access communications and communications metadata, governments should ensure that those authorities and organisations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress. Any information obtained in a manner that is inconsistent with these principles is inadmissible as evidence in any proceeding, as is any evidence derivative of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of providing access to user data should be borne by the public authority undertaking the investigation. Financial constraints place an institutional check on the overuse of orders, but the payments should not exceed the service provider’s actual costs for reviewing and responding to orders, as such would provide a perverse financial incentive in opposition to user’s rights.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Signatories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Organisations&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Article 19 (International)&lt;/li&gt;
&lt;li&gt;Bits of Freedom (Netherlands)&lt;/li&gt;
&lt;li&gt;Center for Internet &amp;amp;      Society India (CIS India)&lt;/li&gt;
&lt;li&gt;Derechos Digitales (Chile)&lt;/li&gt;
&lt;li&gt;Electronic Frontier Foundation      (International)&lt;/li&gt;
&lt;li&gt;Privacy International      (International)&lt;/li&gt;
&lt;li&gt;Samuelson-Glushko Canadian      Internet Policy and Public Interest Clinic (Canada)&lt;/li&gt;
&lt;li&gt;Statewatch (UK)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Individuals&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Renata Avila, human rights      lawyer (Guatemala)&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Footnotes&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]For more information about the      background to these principles and the process undertaken, see      https://www.privacyinternational.org/blog/towards-international-principles-on-communications-surveillance&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]Universal Declaration of Human      Rights Article 12, United Nations Convention on Migrant Workers Article      14, UN Convention of the Protection of the Child Article 16, International      Covenant on Civil and Political Rights, International Covenant on Civil      and Political Rights Article 17; regional conventions including Article 10      of the African Charter on the Rights and Welfare of the Child, Article 11      of the American Convention on Human Rights, Article 4 of the African Union      Principles on Freedom of Expression, Article 5 of the American Declaration      of the Rights and Duties of Man, Article 21 of the Arab Charter on Human      Rights, and Article 8 of the European Convention for the Protection of      Human Rights and Fundamental Freedoms; Johannesburg Principles on National      Security, Free Expression and Access to Information, Camden Principles on      Freedom of Expression and Equality.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]Martin Scheinin, “Report of the      Special Rapporteur on the promotion and protection of human rights and      fundamental freedoms while countering terrorism,” p11, available at &lt;a href="http://www2.ohchr.org/english/issues/terrorism/rapporteur/docs/A_HRC_13_37_AEV.pdf"&gt;http://www2.ohchr.org/english/issues/terrorism/rapporteur/docs/A_HRC_13_37_AEV.pdf&lt;/a&gt;.      See also General Comments No. 27, Adopted by The Human Rights Committee      Under Article 40, Paragraph 4, Of The International Covenant On Civil And      Political Rights, CCPR/C/21/Rev.1/Add.9, November 2, 1999, available at &lt;a href="http://www.unhchr.ch/tbs/doc.nsf/0/6c76e1b8ee1710e380256824005a10a9?Opendocument"&gt;http://www.unhchr.ch/tbs/doc.nsf/0/6c76e1b8ee1710e380256824005a10a9?Opendocument&lt;/a&gt;.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]Communications metadata may      include information about our identities (subscriber information, device      information), interests, including medical conditions, political and      religious viewpoints (websites visited, books and other materials read,      watched or listened to, searches conducted, resources used), interactions      (origins and destinations of communications, people interacted with,      friends, family, acquaintances), location (places and times, proximities      to others); in sum, logs of nearly every action in modern life, our mental      states, interests, intentions, and our innermost thoughts.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]For example, in the United      Kingdom alone, there are now approximately 500,000 requests for      communications metadata every year, currently under a self-authorising      regime for law enforcement agencies, who are able to authorise their own      requests for access to information held by service providers. Meanwhile,      data provided by Google’s Transparency reports shows that requests for      user data from the U.S. alone rose from 8888 in 2010 to 12,271 in 2011.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]See as examples, a review of      Sandy Petland’s work, ‘Reality Mining’, in MIT’s Technology Review, 2008,      available at &lt;a href="http://www2.technologyreview.com/article/409598/tr10-reality-mining/"&gt;http://www2.technologyreview.com/article/409598/tr10-reality-mining/&lt;/a&gt; and also see Alberto Escudero-Pascual and Gus Hosein, ‘Questioning lawful      access to traffic data’, Communications of the ACM, Volume 47 Issue 3,      March 2004, pages 77 - 82.&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]Report of the UN Special      Rapporteur on the promotion and protection of the right to freedom of      opinion and expression, Frank La Rue, May 16 2011, available at &lt;a href="http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/a.hrc.17.27_en.pdf"&gt;http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/a.hrc.17.27_en.pdf&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]The Global Network Initiative      establishes standards to help the ICT sector protect the privacy and free      expression of their users. See &lt;a href="http://www.globalnetworkinitiative.org/"&gt;http://www.globalnetworkinitiative.org/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]As defined by international and      regional conventions mentioned above.&lt;br /&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]Where judicial review is waived      in such emergency cases, a warrant must be retroactively sought within 24      hours.&lt;br /&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]One example of such a report is      the US Wiretap report, published by the US Court service. Unfortunately      this applies only to interception of communications, and not to access to      communications metadata. See &lt;a href="http://www.uscourts.gov/Statistics/WiretapReports/WiretapReport2011.aspx"&gt;http://www.uscourts.gov/Statistics/WiretapReports/WiretapReport2011.aspx&lt;/a&gt;.      The UK Interception of Communications Commissioner publishes a report that      includes some aggregate data but it is does not provide sufficient data to      scrutinise the types of requests, the extent of each access request, the      purpose of the requests, and the scrutiny applied to them. See &lt;a href="http://www.intelligencecommissioners.com/sections.asp?sectionID=2&amp;amp;type=top"&gt;http://www.intelligencecommissioners.com/sections.asp?sectionID=2&amp;amp;type=top&lt;/a&gt;.&lt;/p&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights'&gt;https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:55:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/draft-human-dna-profiling-bill-april-2012">
    <title>Draft Human DNA Profiling Bill (April 2012): High Level Concerns</title>
    <link>https://cis-india.org/internet-governance/blog/draft-human-dna-profiling-bill-april-2012</link>
    <description>
        &lt;b&gt;In 2007 the Draft Human DNA Profiling Bill was piloted by the Centre for DNA Fingerprinting and Diagnostics, with the objective of regulating the use of DNA for forensic and other purposes. In February 2012 another draft of the Bill was leaked. The February 2012 Bill was drafted by the Department of Biotechnology. Another working draft of the Bill was created in April 2012. The most recent version of the Bill seeks to create DNA databases at the state, regional, and national level. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Each database will contain profiles of victims, offenders, suspects, missing persons and volunteers for the purpose of establishing identity in criminal and civil proceedings. The Bill also establishes a process for certifying DNA laboratories, and creating a DNA board for overseeing the carrying out of the Act. Though it is important to carefully regulate the use of DNA for criminal purposes, and such a law is needed in India, the present working draft of the Bill is lacking important safeguards and contains overreaching provisions, which could lead to violation of individual rights. The text of the 2012 draft is still being discussed and has not been finalized.  Below are high level concerns that CIS has with the April 2012 draft Human DNA Profiling Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Broad offences and instances of when DNA can be collected&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The schedule of the Bill lists applicable instances for human DNA profiling and addition to the DNA database. Under this list, the Bill lays out nine Acts, for example the Indian Penal Code and the Protection of Civil Rights Act, and states that offences under these Acts are applicable instances of human DNA profiling. This allows the scope of the database to be expansive, as any individual who has committed an offence found under any of these Acts to be placed on the DNA database, and might include offences for which DNA evidence is not useful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the schedule under section C &lt;b&gt;Civil disputes and other civil matters &lt;/b&gt;the Bill lists a number of civil disputes and civil matters for which DNA can be taken and entered onto the database. For example:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;(v) Issues relating to immigration or emigration &lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;(vi) Issues relating to establishment of individual identity &lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;(vii) Any other civil matter as may be specified by the regulations of the Board &lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In these instances no crime has been committed and there is no justification for taking the DNA of the individual without their consent. In cases of civil disputes&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recommendation:&lt;i&gt; &lt;/i&gt;&lt;/b&gt;Offences for which DNA can be collected must be criminal and must be specified individually by the Bill. When DNA is used in civil cases, the consent of the individual must be taken. In civil cases a DNA profile should not be stored on the database. DNA profiling and storage on a database should not be allowed in instances like v, vi, vii listed above.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inadequate level of authorization for sharing of information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Bill allows for the DNA Data Bank Manager to determine when it is appropriate to communicate whether the DNA profile received is already contained in the Data Bank, and any other information contained in the Data Bank in relation to the DNA profile received.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Section 35 (1): “…&lt;i&gt;shall communicate, for the purposes of the investigation or prosecution in a criminal offence, the following information to a court, tribunal, law enforcement agency, or DNA laboratory in India which the DNA Data Bank Manager considers is concerned with it, appropriate, namely (a) as to whether the DNA profile received is already contained in the Data Bank; and (b) any information, other than the DNA profile received, is contained in the Data Bank in relation to  the DNA profile received.&lt;/i&gt;”&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recommendation&lt;/b&gt;: The Data Bank Manager should not be given the power to determine appropriate instances for the communication of information. Law enforcement agencies, DNA laboratories, etc. should be required to gain prior authorization, from the DNA Board, before requesting the disclosure of information from the DNA Data Bank Manager. Upon receiving proof of authorization, the DNA databank can share the requested information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inaccurate understanding of infallibility of DNA&lt;/h3&gt;
&lt;p&gt;The preamble to the Bill inaccurately states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Dexoxyribose Nucleic Acid (DNA) analysis of body substances is a powerful technology that makes it possible to determine whether the source of origin of one body substance is identical to that of another, and further to establish the biological relationship, if any between two individuals, living or dead without any doubt.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recommendation:&lt;i&gt; &lt;/i&gt;&lt;/b&gt;The Bill should recognize that DNA evidence is not infallible. For example, false matches can occur based on the type of profiling system used, and that error can take place in the chain of custody of the DNA sample.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The “definition” of DNA profiling is too loose in the Bill. Any technology used to create DNA profiles is subject to error. The estimate of this error should be experimentally obtained, rather than being a theoretical projection.&lt;/i&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inadequate access controls&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Bill only restricts access to information on the DNA database that relates to a victim or to a person who has been excluded as a suspect in relevant investigations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Section 43: Access to the information in the National DNA Data Bank shall be restricted in the manner as may be prescribed if the information relates to a DNA profile derived from a) a victim of an offence which forms or formed the object of the relevant investigation, or b) a person who has been excluded as a suspect in the relevant investigation.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recommendation:&lt;/b&gt; Though it is important that access is restricted in these instances, access should also be restricted for: volunteers, missing persons, and victims. Broad access to every index in the database should not be permitted when a DNA sample for a crime is being searched for a match. Ideally, a crime scene index will be created, and samples will only be compared to that specific crime scene. The access procedure should be transparent with regular information published in an annual report, minutes of oversight meetings taken, etc.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Lack of standards and process for collection of DNA samples&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In three places the Bill mentions that a procedure for the collection of DNA profiles will be established, yet no process is enumerated in the actual text of the Bill.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 12 (w) “The Board will have the power to… specify by regulation, the list of applicable instances of human DNA profiling and the sources and manner of collection of samples in addition to the lists contained in the Schedule. &lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 66(d) “The Central Government will have the power to make Rules pertaining to… The list of applicable instances of human DNA profiling and the sources and manner of collection of samples in addition to the lists contained in the Schedule under clause (w) of section 12. &lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Schedule: In the title “List of applicable instances of Human DNA Profiling and Sources and Manner of Collection of Samples for DNA Profiling”. But the schedule does not detail the manner of collection of samples for DNA profiling&lt;/i&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recommendation&lt;/b&gt;: According to the Criminal Procedure Code, section 53 and 54, DNA samples can only be collected by certified medical professionals. This must be reflected by the Bill. The Bill should also state that the collection of DNA must take place in a secure location and in a secure manner. When DNA is collected, consent must be taken, unless the individual is convicted of a crime for which DNA evidence is directly relevant or the court has ordered the collection. When DNA is collected, personal identification information should not be sent with samples to laboratories, and all transfers of data (from police station to lab) must be secure. Upon collection, information regarding the collection of information and potential use and misuse of DNA information must be provided to the individual.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inadequate appeal process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The provisions in the Bill allow aggrieved individuals to bring complaints to the DNA Board. If the complaint is not addressed, the individual can take the complaint to the court. Though grievances can be taken to the Board and the court, it is not clear if the individual has the right to appeal the collection, analysis, sharing, and use of his/her DNA. The text of section 58 implies that the Board and the Central government will have the power to take action based on complaints. This power was not listed above in the sections where the powers of the board and the central government are defined, thus it is unclear what actions the Board or the Central Government would be able to take on complaint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Section 58: No court shall take cognizance of any offence punishable under this Act or any rules or regulations made thereunder save on a complaint made by the Central Government or its officer or Board or its officer or any other person authorized by them: Provided that nothing contained in this sub-section shall prevent an aggrieved person from approaching a court, if upon his application to the Central Government or the Board, no action is taken by them within a period of three months from the date of receipt of the application.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recommendation&lt;/b&gt;: Individuals should be allowed to appeal a decision to collect DNA or share a DNA profile, and take any grievance directly to the court. If the Board or the Central Government will have a role in hearing complaints, etc. These must be enumerated in the provisions of the Act.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inclusion of population testing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Though the main focus of the Bill is for the use of DNA in criminal and civil cases, the provisions of the Bill also allow for population testing and research to be done on collected samples.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Section 4: The Board shall consist of the following Members appointed from amongst persons of ability, integrity, and standing who have knowledge or experience in DNA profiling including.. (m) A population geneticist to be nominated by the President, Indian National Science Academy, Den Delhi-Member. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Section 40: Information relating to DNA profiles, DNA samples and records relating thereto shall be made available in the following instances, namely, (e) for creation and maintenance of a population statistics database that is to be used, as prescribed, or the purposes of identification research, protocol development or quality control provide that it does not contain any personally identifiable information and does not violate ethical norms. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recommendation&lt;/b&gt;: Delete these provisions. If DNA testing is going to done for population analysis purposes, regulations for this must be provided for in a separate legislation, stored in separate database, informed consent taken from each participant, and an ethics board must be established. It is not sufficient or ethical to conduct population testing only on DNA samples from victims, offenders, suspects, and volunteers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Provisions delegated to regulation that need to be incorporated into text of Bill&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Bill empowers the board to formulate regulations for, and the Central Government to make Rules to, a number of provisions that should be within the text of the Bill itself. By leaving these provisions to Regulations and Rules, the Bill is a skeleton which when enacted will only allow for DNA Labs to be certified and DNA databases to be established.  Aspects that need to be included as provisions include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Section 12: The Board shall exercise and discharge the following functions for the purposes of this Act namely &lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 12(j) – authorizing procedures for communication of DNA profile for civil proceedings and for crime investigation by law enforcement and other agencies.&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 12(p) – making specific recommendations to (ii) ensure the accuracy, security, and confidentiality of DNA information, (iii) ensure the timely removal and destruction of obsolete, expunged or inaccurate DNA information (iv) take any other necessary steps required to be taken to protect privacy.&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 12(w) – Specifying, by regulation, the list of applicable instances of human DNA profiling and the sources a manner of collection of samples in addition to the lists contained in the Schedule. &lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 12(u) – establishing procedure for cooperation in criminal investigation between various investigation agencies within the country and with international agencies.&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 12(x) – Enumerating the guidelines for storage of biological substances and their destruction. &lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Section 65(1) The Central Government may, by notification, make rules for carrying out the purposes of this Act&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 65 (c) – The officials who are authorized to receive the communication pertaining to information as to whether a person’s DNA profile is contained in the offenders’ index under sub-section (2) of section 35&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 65 (d) – The manner in which the DNA profile of a person from the offenders’ index shall be expunged under sub-section (2) of section 37&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt; Section 65 (e) – The manner in which the DNA profile of a person from the offender’s index shall be expunged under sub-section (3) of section 37 &lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 65 (h) – The manner in which access to the information in the DNA data Bank shall be restricted under section 43 &lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 65 (zg) – Authorization of other persons, if any, for collection of non-intimate forensic procedures under Part II of the Schedule. &lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Broad Language that needs to be specified or deleted&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There are a number of places in the Bill which use broad and vague language. This is problematic as it expands the potential scope of the Bill. Instances where broad language is used includes:&lt;/p&gt;
&lt;p&gt;Preamble:  &lt;i&gt;There is, thus, need to regulate the use of human DNA Profiles through an Act passed by the Parliament only for Lawful purposes of establishing identity in a criminal or civil proceeding and for other specified purposes.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 12: The Board may make regulations for (j) authorizing procedures for communications of DNA profile for civil proceedings and for crime investigation by law enforcement and other agencies. &lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 12: The Board may make regulations for (y) undertaking any other activity which in the opinion of the Board advances the purposes of this Act. &lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 12: The Board may make regulations for (z) performing such other functions as may be assigned to it by the Central Government from time to time. &lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 32: The indices maintained under sub-section (4) shall include information of data based on DNA analysis prepared by a DNA laboratory duly approved by the Board under section 15 of the Act and of records relating thereto, in accordance with the standards as may be specified by the regulations made by the Board.&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 35 (1) On receipt of a DNA profile for entry in the DNA Data Bank, the DNA Data Bank Manager shall cause it to be compared with the DNA profiles in the DNA Data Bank and shall communication, for purposes of the investigation or prosecution in a criminal offence, the following information…(a) as to whether the DNA profile received is already contained in the Data Bank and (b) any information other than the DNA profile received, is contained in the Data Bank in relation to the DNA profile received. (2) The information as to whether a person’s DNA profile is contained in the offenders’ index may be communicated to an official who is authorized to receive the same as prescribed.&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 39: All DNA profiles and DNA samples and records thereof shall be used solely for the purpose of facilitating identification of the perpetrator of a specified offence under Part I of the Schedule. Provided that such profiles or samples may be used to identify victims of accidents or disasters or missing persons or for purposes related to civil disputes and other civil matters listed in Part 1 of the Schedule for other purposes as may be specified by the regulations made by the board. &lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 40: Information relating to DNA profiles, DNA samples and records relating thereto shall be made available in the following instances, namely (g) for any other purposes, as may be prescribed. &lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Schedule, C Civil disputes and other civil matters vii) any other civil matter as may be specified y the regulations made by the Board. &lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Recommendation&lt;/b&gt;: All broad and vague language should be deleted and replaced with specific language.&lt;/p&gt;
&lt;h3&gt;Jurisdiction&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Section 1(2) It extends to the whole of India.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Section 2(f) “Crime scene index” means an index of DNA profiles derived from forensic material found (i) at any place (whether within or outside of India) where a specified offence was, or is reasonably suspected of having been, committed. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The validity of DNA profiles found outside of India is unclear as the Act only extends to the whole of India.&lt;/p&gt;
&lt;h3&gt;Inconsistent provisions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Bill contains provisions that are inconsistent including:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Preamble … from collection to reporting and also to establish a National DNA Data Bank and for matters connected therewith or incidental thereto. &lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Section 32 (1) The Central Government shall, by notification establish a National DNA Data Bank and as many Regional DNA Data Banks there under for every State or a group of States, as necessary. (2) Every State Government may, by notification establish a State DNA Data Bank which shall share the information with the National DNA Data Bank. The National DNA Data Bank shall receive DNA data from State DNA Data Banks…&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recommendation&lt;/b&gt;: The introduction to the Bill states that only a National DNA Data Bank will be established, yet in the provisions of the Bill it states that Regional and State level DNA databanks will also be established. It should be clarified in the introduction to the Bill that state level, regional level, and a national level DNA database will be created.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inadequate qualifications of DNA Data Bank Manager&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 33: “&lt;i&gt;The DNA Data Bank Manager shall be a person not below the rank of Joint Secretary to the Government of India or equivalent and he shall report to the Member –Secretary of the Board. The DNA Data Bank Manager shall be a scientist with understanding of computer applications and statistics.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recommendation&lt;/b&gt;: This is not sufficient qualifications. The DNA Data Bank Manager needs to have experience and expertise handling, working with, and managing DNA for forensic purposes.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Lack of restrictions on labs seeking certification&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to section 16(2), before withdrawing approval granted to a DNA laboratory...the Board will give time to the laboratory...for taking necessary steps to comply with such directions...and conditions.” &lt;br /&gt;&lt;b&gt;Recommendation&lt;/b&gt;: This section should specify that during the time period of gaining certification, the DNA laboratory is not allowed to process DNA.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Incomplete terms for use of DNA in courts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 45 of the Bill allows any individual undergoing a sentence of imprisonment or under sentence of death to apply to the court which convicted him for an order for DNA testing. The Bill lists seven conditions that must be met for this DNA evidence to be accepted and used in court. &lt;br /&gt;&lt;b&gt;Recommendation&lt;/b&gt;: This section speaks only to the use of DNA in courts upon request by a convicted individual. This section should lay down standards for all instances of use of DNA in courts. Included in this, the provision should clarify that when DNA is used, corroborating evidence will be required in courts, and if confirmatory samples will be taken from defendants. Individuals should also have the right to have a second sample taken and re-analyzed as a check, and individuals must have a right to obtain re-analysis of crime scene forensic evidence in the event of appeal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inadequate privacy protections&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Besides section 38 which requires that all DNA profiles, samples, and records are kept confidential, the Bill leaves all other privacy protections to be recommended by the DNA profiling Board.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Section 12(o) The Board shall exercise and discharge the following functions…“Making recommendation for provision of privacy protection laws, regulations and practices relating to access to, or use of, store DNA samples or DNA analyses with a view to ensure that such protections are sufficient.” &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recommendation&lt;/b&gt;: Basic privacy protections such as access, use, and storage of DNA samples should be written into the provisions of the Bill and not left as recommendations for the Board to make.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Missing Provisions&lt;/h2&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Notification to the individual:&lt;/b&gt; There are no provisions that ensure that notification is given to an individual if his/her information is legally accessed or shared. Notification to the individual would be appropriate in section 36, which allows for the sharing of DNA profiles with foreign states, and section 35, which allows for the sharing of information with a court, tribunal, law enforcement agency, or DNA laboratory. As part of the notification, an individual should be given the right to appeal the decision.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Consent: &lt;/b&gt;There are no provisions which speak to consent being taken from individuals whose DNA is collected. Consent must be taken from volunteers, missing persons (or their families), victims, and suspects. DNA can be taken compulsorily from offenders after they have been convicted. If an individual refuses to provide a DNA sample, a judge can override the decisions and order that a DNA sample be taken. In all cases that DNA is collected without consent, it must be clear that DNA evidence is directly relevant to the case.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Right to request deletion of DNA profile from database: &lt;/b&gt;There are no provisions which give volunteers (children volunteers when they become adults), victims, and missing persons the right to request that their profile be deleted from the DNA database. This could be provided in section 37 which speaks to the expunction of records of acquitted convicts. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Right of individuals to bring a private cause of action: &lt;/b&gt;There are no provisions which give the individual the right to bring a privacy cause of action for the unlawful storage of private information in the national, regional, or state DNA database. This is an important check against the unlawful collection, analysis, and storage of private genetic information on the database. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Right to review one's personal data: &lt;/b&gt;There are no provisions that allow an individual to review his/her information contained on the state, regional, or national database. This is an important check against the unlawful collection, analysis, and storage of private genetic information on the database. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Independence of DNA laboratories and DNA banks from the police: &lt;/b&gt;There are no provisions which ensure that DNA laboratories and DNA data banks remain independent from the police. This is an important check in ensuring against the tampering of DNA evidence. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Established profiling standard: &lt;/b&gt;The Bill does not mandate the use of one single profiling standard. This is important in order to minimize false matches occurring by chance and to ensure consistency across DNA testing and profiling. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Destruction of DNA samples: &lt;/b&gt;There are no provisions mandating that original samples of DNA be deleted. DNA samples should be destroyed once the DNA profiles needed for identification purposes have been obtained from them – allowing for sufficient time for quality assurance (six months). Furthermore, only a barcode and no identifying details should be sent to labs with samples for analysis.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/draft-human-dna-profiling-bill-april-2012'&gt;https://cis-india.org/internet-governance/blog/draft-human-dna-profiling-bill-april-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:36:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/uid-reflects-india">
    <title>Does the UID Reflect India? </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/uid-reflects-india</link>
    <description>
        &lt;b&gt;On December 17th the Campaign for No UID held a press conference and public meeting in Bangalore. Below is a summary and analysis of the events. &lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;Scientifically speaking, we are each unique.&amp;nbsp; We have unique bodies and minds, and these give rise to unique understandings,&amp;nbsp; interactions, and perceptions. Despite being unique, we can be put into different categories and classes, one of which is a culture.&amp;nbsp; A culture is defined by its values, which are reflected in its legal system. Consequently legal systems are always changing – bills are constantly being amended, passed, and retracted in order to make the governing legal structure reflect the ethos of that society. Thus, when analyzing a piece of legislation it is important to ask if that bill is meaningful in a way that&amp;nbsp;&amp;nbsp; reflects the ideas, values, attitudes, and expectations that a society has.&amp;nbsp; This is the&amp;nbsp; question that Usha Ramanathan, Mathew Thomas, and others in the Campaign for No UID have been asking about the UID project, and&amp;nbsp; urged the public to ask the same question in the press conference and public meeting held on the 17th of December. According to the Campaign for No UID, the project and Bill fail to reflect and meet the current needs that exist in India. The UID Bill, the proposed legislation for the project, authorizes the creation of a centralized database of unique identification numbers that are to be issued to every resident of India. The numbers will act as identity. Recently, the Bill was sent to the Parliamentary Standing Committee on Finance, and is scheduled to be enacted in early 2011.&amp;nbsp; The UID project is attempting to create a technological solution to the identification problem in India. It is well-known that India faces challenges in identifying its citizens and residents. Individuals either have no identification – restricting their access to society and benefits -- or, in some cases, they have multiple identities, therefore taking advantage of society at the expense of others, or a person does not have any identification – therefore escaping civil duties.&amp;nbsp; The confusing identity system that exists in India has many negative drawbacks including the facilitation of corruption, illegal immigration, and possible security threats. The UID project attempts to provide a system of identity that is based on individuals’ biometrics, and that places the whole of India on a grid through the issuance of 12 digit &lt;em&gt;Aadhaar&lt;/em&gt; numbers. The Campaign for NO UID&amp;nbsp; does not deny the need for an efficient identity system, is not against technology, and does not deny that the current identity system has problems.&amp;nbsp; Instead, it believes that the project does not adequately address the issues at hand, while at the same time creating a real prospect of harmful ramifications.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Benefits for the Poor&lt;/h3&gt;
&lt;p&gt;Though the UID project only gives identity to an individual, it has been envisioned as a means of ensuring the delivery of benefits to the poor. According to the World Bank, within India 41% of the population lives below the poverty line, and targeting the need to ensure benefits for the poor is an appropriate vision. Furthermore, as reflected in the Right to Food Act, there is a cultural understanding and expectation that the State needs to work to bring benefits to the poor. The point that Ms. Ramanathan draws attention to, though, is that the goal of bringing benefits to the poor is just a vision. The project and the Bill are not structured in a way that guarantee benefits to the poor. Instead, by trying to include the perception of this benefit, the language of the Bill has become too broad. The wide-sweeping language allows room for abuse of how information that is collected will be used.&lt;/p&gt;
&lt;h3&gt;Appropriate Methodology&lt;/h3&gt;
&lt;p&gt;Ms. Ramanathan also questions the methodology of the UID project. The collection of biometrics is not an absolute insurer of identity, in the way that DNA would be. A person’s biometrics are in fact very public. They are left on anything one touches, and can easily be reproduced for use by others. Identity theft is thus easily accomplished if biometrics are the only safeguard. Realistically, the vast majority of India’s population would not know what to do or how to seek redress if identities were stolen – indeed, many would not even be aware of the fact that their identity had been stolen. Thus, the project establishes a hierarchy of vulnerability. Those who understand and have access to technology and the legal system are better able to protect their identity (or abuse another’s), and the rest of the population&amp;nbsp; is at the mercy of the people who possess that knowledge and those connections.&lt;/p&gt;
&lt;h3&gt;Legal Questions&lt;/h3&gt;
&lt;p&gt;Ms. Ramanathan also brought up a few legal issues with the UID Bill. Most importantly she pointed out that the UID project is not legal, yet enrollment of individuals has been taking place. Not only is this action undemocratic, but it is presumptuous of the UIDAI to assume that their project will have legal validity. Another legal issue raised by Ms. Ramanathan was in concern with the compulsory nature of the &lt;em&gt;Aadhaar&lt;/em&gt; number. Legally the UID Bill does not make the &lt;em&gt;Aadhaar&lt;/em&gt; number compulsory. Instead, the project is structured in such a way that the UID number is socially compulsory.&amp;nbsp; Ms. Ramanathan argues that this is unfair of the UIDAI. If the number were to be truly voluntary, the UID would need to include clauses that prohibit the denial of goods, services, entitlements and benefits for lack of a UID number.&amp;nbsp; An individual would need to be able to access benefits with alternative forms of identification before the &lt;em&gt;Aadhaar&lt;/em&gt; number would be truly voluntary.&lt;/p&gt;
&lt;h3&gt;Does India Comprehend what the UID Could Bring?&lt;/h3&gt;
&lt;p&gt;Another fear voiced by Mrs. Ramanathan in her presentation was the level of public comprehension. Even though the project will touch the lives of every human being who comes to India, the majority of the Indian population has not thought through why they support or do not support the project, and most do not comprehend the dangerous implications of the UID project. Connections are not being made and clearly publicized about how the project could be used in the future.&amp;nbsp; For example, once everyone has a set of personal data that is uploaded on a centralized database, there is a new concern over that data. What is happening to it, who is using it, what is it being used for, who is seeing it, who is analyzing it, what happens if that data is lost? One of the serious implications of the project is&amp;nbsp; its’ threat to anonymity.&amp;nbsp; Anonymity results when the personal identity, or personally identifiable information of a person is not known.&amp;nbsp; Anonymity already exists today in Indian society by default.. This will change, though, with the UID. One’s body will become a traceable marker that will be readily identifiable to law enforcement and other agencies. By issuing numbers to each person, that will be used for every transaction – it will be possible to create a map of the population and tag information about individuals in a way that changes the relationship between the state and the people. Though it is true India could benefit from a lesser degree of anonymity. For instance corruption might be easier to control. The Bill takes no steps, though, to ensure under what conditions anonymity will be preserved. Thus, the project has the potential to be widely misused for intensive surveillance and the policing of populations – not just for illegal activity but for disfavored or unpopular activity as well.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;One way to avoid the misuse of data is through the adherence to privacy standards such as how data should be processed, transferred etc. India does not of yet have such a privacy law, and such principles are not reflected in the text of the Bill itself. The fact that the UID bill and project bring into focus principles that are not yet fully reflected in the social and legal framework of society can be problematic. On one hand this Bill can push India to adopt those principles, in which case a data protection and privacy bill must be enacted, and awareness must be raised.&amp;nbsp; On the other hand, the Bill can simply overshadow the populace, allowing significant violations of privacy and anonymity to take place with no assurance of redress.&amp;nbsp; As Ms. Ramanathan noted, even though the project is not reflective of Indian society, the way in which the project is being marketed is. The project has been tied to the image of Nandan Nilekani, and the message is clear: the project must be good. The Campaign for No UID is asking the public to look beyond the face of the project, and consider whether or not this is the India they imagine.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/uid-reflects-india'&gt;https://cis-india.org/internet-governance/blog/privacy/uid-reflects-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-22T05:45:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/data-retention-in-india">
    <title>Data Retention in India</title>
    <link>https://cis-india.org/internet-governance/blog/data-retention-in-india</link>
    <description>
        &lt;b&gt;As part of its privacy research, the Centre for Internet and Society has been researching upon data retention mandates from the Government of India and data retention practices by service providers. Globally, data retention has become a contested practice with regards to privacy, as many governments require service providers to retain more data for extensive time periods, for security purposes. Many argue that the scope of the retention is becoming disproportional to the purpose of investigating crimes. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;The Debate around Data Retention&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the EU, data retention &lt;i&gt;“refers to the storage of traffic and location data resulting from electronic communications (not data on the content of the communications)”&lt;/i&gt;.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate around data retention has many sides, and walks a fine line of balancing necessity with proportionality. For example, some argue that the actual retention of data is not harmful, and at least some data retention is necessary to assist law enforcement in investigations. Following this argument, the abuse of information is not found in the retention of data, but instead is found by who accesses the data and how it is used. Others argue that any blanket or &lt;i&gt;a priori &lt;/i&gt;data&lt;i&gt; &lt;/i&gt;retention requirements are increasingly becoming disproportional and can lead to harm and misuse. When discussing data retention it is also important to take into consideration what type of data is being collected and by what standard is access being granted. Increasingly, governments are mandating that service providers retain communication metadata for law enforcement purposes. The type of authorization required to access retained communication metadata varies from context to context. However, it is often lower than what is required for law enforcement to access the contents of communications. The retention and lower access standards to metadata is controversial because metadata can encompass a wide variety of information, including IP address, transaction records, and location information — all of which can reveal a great deal about an individual.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;Furthermore, the definition of metadata changes and evolves depending on the context and the type of information being generated by new technologies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Retention vs. Data Preservation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Countries have taken different stances on what national standards for data retention by service providers should be. For example, in 2006 the EU passed the Data Retention Directive which requires European Internet Service Providers to retain telecom and Internet traffic data from customers' communications for at least six months and upto two years. The stored data can be accessed by authorized officials for law enforcement purposes.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Despite the fact that the Directive pertains to the whole of Europe, in 2010 the German Federal Constitutional Court annulled the law that harmonized German law with the Data Retention Directive.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Other European countries that have refused to adopt the Directive include the Czech Republic and Romania.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Instead of mandating the retention of data, Germany, along with the US, mandates the 'preservation' of data. The difference being that the preservation of data takes place through a specified request by law enforcement, with an identified data set. In some cases, like the US, after submitting a request for preservation, law enforcement must obtain a court order or subpoena for further access to the preserved information.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Data Retention in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, the government has established a regime of data retention. Retention requirements for service providers are found in the ISP and UASL licenses, which are grounded in the Indian Telegraph Act, 1885.&lt;/p&gt;
&lt;h3&gt;ISP License&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the ISP License,&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; there are eight categories of records that service providers are required to retain for security purposes that pertain to customer information or transactions. In some cases the license has identified how long records must be maintained, and in other cases the license only states that the records must be made available and provided. This language implies that records will be kept.&lt;/p&gt;
&lt;p&gt;According to the ISP License, each ISP must maintain:&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;span&gt; &lt;/span&gt;
&lt;li&gt;&lt;span&gt;&lt;b&gt;&lt;span&gt;Users and Services&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;: A log of all users connected and the service they are using, which must be available in real time to the Telecom Authority. (Section 34.12).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;b&gt;&lt;span&gt;Outward Logins or Telnet&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;: A log of every outward login or telnet through an ISPs computer must be available in real time to the Telecom Authority. (Section 34.12).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Packets&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; Copies of all packets originating from the Customer Premises Equipment of the ISP must be available in real time to the Telecom Authority. (Section 34.12).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Subscribers&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; A complete list of subscribers must be made available on the ISP website with password controlled access, available to authorized Intelligence Agencies at any time. (Section 34.12).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Internet Leased Line Customers&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; A complete list of Internet leased line customers and their sub-customers consisting of the following information: name of customer, IP address allotted, bandwidth provided, address of installation, date of installation/commissioning, and contact person with phone no./email. These must be made available on a password protected website (Section 34.14).  The password and login ID must be provided to the DDG (Security), DoT HQ and concerned DDG(VTM) of DoT on a monthly basis. The information should also be accessible to authorized government agencies (Section 34.14).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Diagram Records and Reasons&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; A record of complete network diagram of set-up at each of the internet leased line customer premises along with details of connectivity must be made available at the site of the service provider. All details of other communication links (PSTN, NLD, ILD, WLL, GSM, other ISP) plus reasons for taking the links by the customer must be recorded before the activation of the link. These records must be readily available for inspection at the respective premises of all internet leased line customers (Section 34.18).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; 
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Commercial Records&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; All commercial records with regard to the communications exchanged on the network must be maintained for a year (Section 34.23).&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Location&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; The service provider should be able to provide the geographical location of any subscriber at a given point of time (Section 34.28(x).&lt;/p&gt;
&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;span&gt; &lt;/span&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Remote Activities&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; A complete audit trail of the remote access activities pertaining to the network operated in India. These must be retained for a period of six months, and must be provided on request to the licensor or any other agency authorized by the licensor (Section 34.28 (xv).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;UASL License&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the UASL License&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;, &lt;span&gt;there are twelve categories of records that ISP’s are required to retain that pertain to costumer information or transactions for security purposes. In some cases the license has identified how long records must be maintained, and in other cases the license only states that the information must be provided and made available when requested. This language implies that records will be kept. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to the license, service providers must maintain and make available: &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Numbers&lt;/span&gt;&lt;/span&gt;&lt;span&gt;: &lt;/span&gt;&lt;/b&gt;&lt;span&gt;Called/calling party mobile/PSTN numbers when required. Telephone numbers of any call-forwarding feature when required (Section 41.10).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Interception records: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;Time, date and duration of interception when required (Section 41.10).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; 
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Location:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; Location of target subscribers. For the present, cell ID should be provided for location of the target subscriber when required (Section 41.10).&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;All call records:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; All call data records handled by the system when required (Section 41.10). This includes:&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Failed call records:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; Call data records of failed call attempts when required. (Section 41.10).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Roaming subscriber records&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: Call data records of roaming subscribers when required. (Section 41.10)&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Commercial records: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;All commercial records with regards to the communications exchanged on the network must be retained for one year (Section 41.17).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Outgoing call records: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;A record of checks made on outgoing calls completed by customers who are making large outgoing calls day and night to various customers (Section 41.19(ii)).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Calling line Identification:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; A list of subscribers including address and details using calling line identification should be kept in a password protected website accessible to authorized government agencies (Section 41.19 (iv)).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; 
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Location:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; The service provider must be able to provide the geographical location of any subscriber at any point of time (Section 41.20(x)).&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Remote access activities:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;Complete audit trail of the remote access activities pertaining to the network operated in India for a period of six months (Section&lt;span&gt; &lt;/span&gt;41.20 (xv)).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;RTI Request to &lt;a href="https://cis-india.org/internet-governance/blog/bsnl-rti" class="internal-link"&gt;BSNL&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/blog/mtnl-rti-request.pdf" class="internal-link"&gt;MTNL&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On September 10,&lt;sup&gt;&lt;/sup&gt; 2012, the Centre for Internet and Society sent an RTI to MTNL and BSNL with the following questions related to the respective data retention practices: &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul type="disc"&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Does      MTNL/BSNL store the following information/data:&lt;/span&gt;&lt;/li&gt;
&lt;ul type="circle"&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Text       message detail (To and from cell numbers, timestamps)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Text       message content (The text and/or data content of the SMS or MMS)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Call       detail records (Inbound and outbound phone numbers, call duration)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Bill       copies for postpaid and recharge/top-up billing details for prepaid&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Location       data (Based on cell tower, GPS, Wi-Fi hotspots or any combination       thereof)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;If it      does store data then&lt;/span&gt;&lt;/li&gt;
&lt;ul type="circle"&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;For what       period does MTNL/BSNL store: SMS and MMS messages, cellular and mobile       data, customer data?&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;What       procedures for retention does MTNL/BSNL have for: SMS and MMS messages,       cellular and mobile data, and customer data?&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;What       procedures for deletion of: SMS and MMS messages, cellular and mobile       data, and customer data?&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;What       security procedures are in place for SMS and MMS messages, cellular and       mobile data, and customer data?&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;h3&gt;BSNL Response&lt;/h3&gt;
&lt;p&gt;BSNL replied by stating that it stores at least three types of information including:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;IP session information -      connection start end time, bytes in and out (three years offline)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;MAC address of the modem/router/device (three years offline)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Bill copies for post paid and recharge/top up billing details      for prepaid. Billing information of post paid Broadband are available in      CDR system under ITPC, prepaid voucher details (last six months).&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;MTNL Response&lt;/h3&gt;
&lt;p&gt;MTNL replied by stating that it stores at least () types of information including:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Text message details (to and from cell number, timestamps) in      the form of CDRs&lt;span&gt; &lt;/span&gt;(one year)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Call detail records including inbound and outbound phone      numbers and call duration (one year)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Bill copies from postpaid (one year) &lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Recharge details for prepaid (three months) &lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Location of the mobile number if it has used the MTNL      GSM/3GCDMA network (one year)&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;It is interesting that BSNL stores information that is beyond the required time period required in both the ISP and the UASL licenses. The responses to the RTI showed that each service provider also stores different types of information. This could or could not be the actual case, as each question could have been interpreted differently by the responding officer.&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;Conclusion &lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt; &lt;span&gt;The responses to the RTI from BSNL and MTNL are a step towards understanding data retention practices in India, but there are still many aspects about data retention in India which are unclear including:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;What constitutes a ‘commercial record’ which must be stored for one year by service providers?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;How much data is retained by service providers on an annual basis?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;What is the cost involved in retaining data? For the service provider? For the public?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;How frequently is retained information accessed by law enforcement? What percentage of the data is accessed by law enforcement?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;How many criminal and civil cases rely on retained data?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;What is the authorization process for access to retained records? Are these standards for access the same for all types of retained data?&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;Having answers to these questions would be useful for determining if the Indian data retention regime is proportional and effective. It would also be useful in determining if it would be meaningful to maintain a regime of data retention or switch over to a more targeted regime of data preservation. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;Though it can be simple to say that a regime of data preservation is the most optimal choice as it gives the individual the greatest amount of immediate privacy protection, &lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;A regime of data preservation would mean that all records would be treated like an interception, where the police or security agencies would need to prove that a crime was going to take place or is in the process of taking place and then request the ISP to begin retaining specific records. This approach to solving crime would mean that the police would never use retained data or historical data as part of an investigation – to either solve a case or to take the case to the next level.&lt;span&gt; &lt;/span&gt;If Indian law enforcement is at a point where they are able to concisely identify a threat and then begin an investigation is a hard call to make. It is also important to note that though preservation of data can reduce the risk to individual privacy as it is not possible for law enforcement to track individuals based off of their historical data and access large amounts of data about an individual, preservation does not mean that there is no possibility for abuse. Other factors such as:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Any request for preservation and access to records must be legitimate and proportional&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Accessed and preserved records must be used only for the purpose indicated &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Accessed and preserved records can only be shared with authorized authorities&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Any access to preserved records that do not pertain to an investigation must be deleted &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;These factors must be enforced through the application of penalties for abuse of the system. These factors can also be applied to not only a data preservation regime, but also a data retention regime and are focused on preventing the actual abuse of data after retained. That said, before an argument for either data retention or data preservation can be made for India it is important to understand more about data retention practices in India and use of retained data by Indian law enforcement and access controls in place. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;European Commission – Press  Release. Commission Takes Germany to Court Requesting that Fines be  Imposed. May 31st 2012. Available at:  &lt;a class="external-link" href="http://bit.ly/14qXW6o"&gt;http://bit.ly/14qXW6o&lt;/a&gt;. Last accessed:  January 21st 2013&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].Draft International Principles on Communications Surveillance and Human Rights: &lt;a class="external-link" href="http://bit.ly/UpGA3D"&gt;http://bit.ly/UpGA3D&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. European Commission – Press Release. Commission Takes Germany to Court Requesting that Fines be Imposed. May 31&lt;sup&gt;st&lt;/sup&gt; 2012. Available at:  &lt;a class="external-link" href="http://bit.ly/14qXW6o"&gt;http://bit.ly/14qXW6o&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_IP-12-530_en.htm"&gt;&lt;/a&gt;. Last accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. European Commission – Press Release. Commission Takes Germany to Court Requesting that Fines be Imposed. May 31&lt;sup&gt;st&lt;/sup&gt; 2012. Available at:  &lt;a class="external-link" href="http://bit.ly/14qXW6o"&gt;http://bit.ly/14qXW6o&lt;/a&gt;. Last accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Tiffen, S. Sweden passes controversial data retention directive. DW. March 22 2012. Available at: &lt;a class="external-link" href="http://bit.ly/WOfzaX"&gt;http://bit.ly/WOfzaX&lt;/a&gt;. Last Accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;].  Kristina, R. The European Union's Data Retention Directive and the  United State's Data Preservation Laws: Fining the Better Model. 5  Shilder J.L. Com. &amp;amp; Tech. 13 (2009) available at: &lt;a class="external-link" href="http://bit.ly/VoQxQ9"&gt;http://bit.ly/VoQxQ9&lt;/a&gt;. Last accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;].  Government of India. Ministry of Communications &amp;amp; IT Department of  Telecommunications. License Agreement for Provision of Internet  Services.&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].  Government of India. Ministry of Communications &amp;amp; IT Department of  Telecommunications. License Agreement for Provision of Unified Access  Services after Migration from CMTS. Amended December 3&lt;sup&gt;rd&lt;/sup&gt; 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/data-retention-in-india'&gt;https://cis-india.org/internet-governance/blog/data-retention-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:51:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/cyber-security-compilation.pdf">
    <title>Cybersecurity Compilation</title>
    <link>https://cis-india.org/internet-governance/files/cyber-security-compilation.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/cyber-security-compilation.pdf'&gt;https://cis-india.org/internet-governance/files/cyber-security-compilation.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-06-18T13:15:49Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/consumer-privacy">
    <title>Consumer Privacy - How to Enforce an Effective Protective Regime? </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/consumer-privacy</link>
    <description>
        &lt;b&gt;In a typical sense, when people think of themselves as consumers, they just think about what they purchase, how they purchase and how they use their purchase. But while doing this exercise we are always exchanging personally identifiable information, and thus our privacy is always at risk. In this blog post, Elonnai Hickok and Prashant Iyengar through a series of questions look through the whole concept of consumer privacy at the national and international levels. By placing a special emphasis on Indian context, this post details the potential avenues of consumer privacy in India and states the important elements that should be kept in mind when trying to find at an effective protective regime for consumer privacy.&lt;/b&gt;
        
&lt;h2&gt;&amp;nbsp;Who is a consumer?&amp;nbsp;&lt;/h2&gt;
&lt;p&gt;According to the Consumer Protection Act,1986, a consumer is a broad label for any person who buys any goods or services for consideration with the intent of using them for a non-commercial purpose. In the typical sense, when people think of themselves being a consumer, they might think about what they purchase through a physical exchange of money for goods or services, ranging from things as simple as fruit or grain to home appliances to cable television, either in a store or through an online exchange where you enter in your credit card information and receive your purchase. Certain services that consumers use may, by their very nature, put an extraordinary amount of sensitive personal information into the hands of vendors. Typical examples include hospitals, banks and telecommunications.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;What is Consumer Privacy and how may it be breached?&amp;nbsp;&lt;/h2&gt;
&lt;p&gt;Consumer privacy is concerned with the manner in which information disclosed by a consumer to a vendor is collected and used. Specific issues include: behavioral advertising, spyware, identity management, and data security/breach, Increasingly, data that is collected from consumers is stored in databanks. This is then used for both legitimate purposes (such as marketing, research etc) and illegitimate extraneous purposes (as when this data is sold in bulk to third parties). Additionally, the privacy of consumers may be compromised by actions of third parties that are facilitated by the&amp;nbsp; negligence of the vendors (as for instance hacking into databases). The following international examples illustrate the kinds of privacy threats that the collection of data from consumers may pose&lt;strong&gt;[1]&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Example 1)&lt;/em&gt; Toysmart – an online company- collected personal information from its users, promising to keep it private. In 2000, Toysmart entered bankruptcy and in an attempt to avoid losing everything tried to sell its database despite its strict privacy policy. This example illustrates how vendors may attempt to monetize the personal information of customers exceeding the terms of the contract entered into with them.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;em&gt;Example 2)&lt;/em&gt; In 2006 it was found that AOL's research site had a stored file that contained information collected from more than 600,000 users between March to May of 2006. Though the file did not indicate each user by name, it was eventually found that there was enough information to correlate specific individuals to their user number. The example of AOL’s demonstrates the danger of online privacy breaches through either oversight or negligence of the vendor in adopting adequate security measures.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Example 3)&lt;/em&gt; Similar to the previous example ChoicePoint – an all-purpose information broker, whose database contains information about nearly every adult American citizen, had its system hacked. The thieves had access to the names, addresses and social security.&lt;/p&gt;
&lt;h2&gt;How is consumer privacy protected- internationally ?&amp;nbsp;&lt;/h2&gt;
&lt;h3&gt;Broad guidelines: The OECD Privacy Guidelines &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Though not a law, the OECD Guidelines drafted in 1980 provide a useful set of ‘fair information practices’ within which privacy of consumers may be evaluated. Briefly, the eight principles declared were: 1) Collection limitation principle (there should be limits to the collection of data), 2) data quality principle (data should be accurate and relevant to the purpose collected), 3) purpose specification principle, 4) use limitation principle, 5) security safeguards principle, 6) openness principle (there should be openness about data policies and changes thereof), 7) individual participation principle (enabling the individual to find out if data is being held about him and to obtain a copy of the data and make corrections) and 8) accountability principle &lt;strong&gt;[2]&lt;/strong&gt;.&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;h3&gt;The EU Data Protection Directive (Directive 95/46/EC)&amp;nbsp;&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;This is a broad directive adopted by the European Union designed to protect the privacy&amp;nbsp; of all personal data of EU citizens collected and used for commercial purposes, specifically as it relates to processing, using, or exchanging such data. The Directive establishes a broad regulatory framework which sets limits on the collection and use of personal data, and requires each Member State to set up an independent national body responsible for the protection of data. The Directive prohibits the transfer of protected personal information outside the EU unless the receiving country applies similar legal protections. The basic guidelines of the Directive are &lt;strong&gt;[3]&lt;/strong&gt;:&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;&lt;em&gt;Notice: &lt;/em&gt;&lt;/strong&gt;Data subjects must be notified of the: identity of the collector of their personal information, the uses for which the information is being collected, how the data subjects may exercise any available choices regarding the use or disclosure of personal&amp;nbsp; information, where and to whom information may be transferred, and how data subjects may access their personal information.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Consent&lt;/strong&gt;:&lt;/em&gt; “Unambiguous consent” of a data subject is required before any personal information may be processed. Special categories such as race, religion, political of philosophical beliefs, health, union membership, sex life, and criminal history have additional processing requirements.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Consistency: &lt;/em&gt;&lt;/strong&gt;Controllers and processors may only use information in accordance with the terms of the notice given.&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Access:&lt;/em&gt;&lt;/strong&gt; Controllers must give data subjects access to personal information.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Security&lt;/em&gt;&lt;/strong&gt;:Organizations must provide adequate security, using both technical and other means to protect the confidentiality and integrity of the data.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Onward transfer&lt;/em&gt;&lt;/strong&gt;: Personal information may not be transferred to a third party unless that third party has signed a contract with the individual or organization which binds them to use the information consistently with the notice given to the data subjects.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Enforcement&lt;/em&gt;&lt;/strong&gt;: Each EU country has established a Data Protection Authority that has the power to investigate complaints, levy fines, initiate criminal actions, and demand changes in businesses information handling practices.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Specific Sectoral Legislation and privacy policies&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;
&lt;p&gt;The US takes a sectoral approach to protecting consumer privacy. Legislation that&amp;nbsp; protects consumer privacy includes: Gramm-Leach Bliley Act, Health Insurance Portability and Accountability Act, and the Children's Online Privacy Protection Act. Also, the CAN-SPAM Act bans the sending of commercial electronic messages that contain false information. The most comprehensive act for the consumer in the U.S is the Fair Credit Report Act, which was passed in 1970. Enforcement of the Act is vested in the Federal Trade Commission. The FCRA applies to how consumers information is collected and used, and applies to insurance, employment, and other non-credit consumer transactions. Under the FCRA the information that is protected is broadly defined as 1. Consumer Report- any written, oral, or other communication of any information by a consumer reporting agency bearing on a consumer' s credit worthiness, credit standing, credit capacity, character, general reputation, personal characteristics, or mode of living which is used or expected to be used or collected in whole or in part for the purpose of serving as a factor in establishing the consumers eligibility for credit, insurance, and employment purposes.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&amp;nbsp;Furthermore the FCRA:&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;(a) provides the right for consumers to ensure the accuracy of their data.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(b) includes “right to know” provisions to enable consumers to know all information in their files&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(c ) grants consumer dispute rights&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(c) limits disclosure of information&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(d) requires opt-out options&amp;nbsp;&lt;em&gt;&lt;/em&gt;&lt;strong&gt;[ibid 4]&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;Consumer Privacy in India&amp;nbsp;&lt;/h2&gt;
&lt;div&gt;
&lt;p&gt;Broadly, there are four potential avenues for the protection of consumer privacy in India.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;1.&amp;nbsp; Individual organizations may voluntarily commit to protect the information of their clients through “Privacy Policies” These become a component of the contractual commitments between the service providers and customers and are enforced through ordinary civil litigation.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;2.&amp;nbsp; Certain professions and industries have codes of privacy that they must statutorily abide by. This is true of such professions as the medical profession and the legal profession in India and the entire banking industry and the telecom industry. Rigorous privacy norms are set for each of these industries by their respective apex governing bodies. Penalties for breach include derecognition and monetary penalties.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;3. Consumer privacy may be enforced by the specialized Consumer Dispute Tribunals under the Consumer Protection Act in India.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;4. The newly amended Information Technology Act imposes an obligation on anyone controlling data to indemnify against losses caused by the leakage/improper use of that data.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;Each of these mechanisms is discussed in some details below:&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Privacy Policies:&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;
&lt;p&gt;Several Indian companies have publicly stated privacy policies that they display on their website. We have profiled the privacy policies of two such companies as a sample.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;Airtel: Defines personal information, informs users how their information will be used, describes which third parties will have access to your information, provides the ability to opt-out of commercial SMSs, provides an email address for privacy concerns.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Rediff&lt;/strong&gt;&lt;/em&gt;: Provides email for customer support, states what personal information is collected from you, what information is collected from you by cookies, what information is collected about you and stored, who will collect the information about you, how the information will be used to advertise to you and tailor to your preferences, states the rights that advertisers have to your information, disclaimer of responsibility for any other websites linked to the page, states that the information released in a chat room is considered public information, defines third party usage, defines security measures taken, lays out what choices the consumer has regarding collection and distribution of their information, contains opt-out clauses, defines personal information, defines cookies, explains that consumers have the ability to correct inaccurate information, requires youth consent &lt;strong&gt;[5]&lt;/strong&gt;.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;em&gt;Examples of Indian organizations without a privacy policy on websites&lt;/em&gt;: Canara bank, Andhra Bank, Indian railways, Air-India, BSNL, State Bank of India.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Note: &lt;/em&gt;&lt;/strong&gt;The International Guide to Privacy suggests the following be included in privacy policies: description of the personal information collected by the website and third party, description of how the information is used and list of parties with whom it may be shared, a list of the options available regarding the collection, use, sharing and distribution of the information, a description of how inaccuracies can be corrected, a list of the websites that are linked to the organization’s site and a disclaimer that the organization is not responsible for the privacy practices of other sites, a description of how the information is safeguarded (both physically and electronically) against loss, misuse, and alteration, consent for use of personal information &lt;strong&gt;[6]&lt;/strong&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;h3&gt;Professional/Industrial Regulations&amp;nbsp;&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;As mentioned above, several professional bodies have privacy guidelines which their members must abide by. &lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Advocates&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Rules of Professional Conduct have been framed under the Advocates Act and establishes a code of conduct to be followed by lawyers in order to protect the confidence, information, and data of a client. It is important to note that the obligation of confidentiality continues even after the client relationship is terminated. The Evidence Act further buttresses the confidentiality of clients by making information passed between lawyer and client subject to a special privilege &lt;strong&gt;[7]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;&amp;nbsp;Medical Practitioners &lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Similarly, in 2002, the Medical Council of India notified the Indian Medical Council (Professional conduct, Etiquette and Ethics) Regulations which contain ethical injunctions backed by disciplinary action in cases of breaches. Several of these relate to privacy, for instance : Every physician is required to maintain medical records pertaining to indoor patients for a period of 3 years from the date of commencement of the treatment &lt;strong&gt;[8]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&amp;nbsp;Article 2.2:&amp;nbsp;&lt;/em&gt; Requires physicians to maintain Confidences concerning individual or domestic life entrusted by patients to a physician. Defects in the disposition or character of patients observed during medical attendance should never be revealed unless their revelation is required by the laws of the State. The rule also requires the physician, controversially to evaluate “whether his duty to society requires him to employ knowledge, obtained through confidence as a physician, to protect a healthy person against a communicable disease to which he is about to be exposed”. In such an instance, the rules advice the physician to “act as he would wish another to act toward one of his own family in like circumstances.”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;em&gt;Article 7.14:&lt;/em&gt; Enjoins the registered medical practitioner not to disclose the secrets of a patient that have been learnt in the exercise of his / her profession except –&lt;/p&gt;
&lt;p&gt;1. in a court of law under orders of the Presiding Judge;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;2. in circumstances where there is a serious and identified risk to a specific&lt;/p&gt;
&lt;p&gt;person and / or community; and&lt;/p&gt;
&lt;p&gt;&amp;nbsp;3. notifiable diseases.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;em&gt;Article 7.17&lt;/em&gt;: Forbids a medical practitioner from publishing photographs or case reports of patients without their permission, in any medical or other journal in a manner by which their identity could be made out. If the identity is not to be disclosed, however, the consent is not needed.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Important Case Law&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;In one of the most important cases to have come up on the issue of privacy, a person sued a hospital for having disclosed his HIV status to his fiancé without his knowledge resulting in their wedding being called off. In Mr. X vs Hospital Z, the Supreme Court held that the hospital was not guilty of a violation of privacy since the disclosure was made to protect the public interest. The supreme court while affirming the duty of confidentiality owed to patients, ruled that the right to privacy was not absolute and was “subject to such action as may be lawfully taken for the prevention of crime or disorder or protection of health or morals or protection of rights and freedom of others.”&lt;strong&gt;[9]&lt;/strong&gt; This case raises certain questions which might be worthwhile to consider:&lt;/p&gt;
&lt;p&gt;1. Are there other ways in which the situation could have been handled – such as through proper counselling. Furthermore, it is important to establish what the role of a hospital is, and where their primary interest lies in protecting their patient and their patients data, and take into consideration the importance of consent in handling and disclosing personal information.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;2. The argument that there is no absolute for privacy raises questions of who is determining the limits for disclosure of the man's HIV status. If his fiancé should be informed of his results, should his workplace , community, church? Do they face the same risks as his fiancé? Who is to be the judge of this risk?&lt;/p&gt;
&lt;h3&gt;Banking and Telecom Industry&lt;/h3&gt;
&lt;p&gt;The Banking and Telecom industry each have regulatory authorities which have periodically issued guidelines seeking to protect the privacy of customers. Thus, for instance, RBI's Customer Service statement obliges bankers to maintain secrecy, and not to divulge any information to third parties. Likewise, the TRAI has issued regulations on unsolicited commercial communications and has initiated steps to monitor confidentiality measures taken by telecom operators. More details are provided in the accompanying briefs that exclusively deal with the banking and telecom industries.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Consumer Protection Act 1986:&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Consumer Protection Act which was enacted with the objective to provide for better protection of the interests of the consumer has emerged as a major source of relief to those who have suffered violations of their privacy {10}.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Important Case Laws &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;In Rajindre Nagar Post Office vs. Sh Ashok Kriplani a post master was accused of not delivering a registered letter, opening it, and then returning it in a torn condition. It was determined that the tearing of the letter without delivery to addressee was a grave “deficiency in service” on the part of the appellant. It was ruled that the right of privacy of the respondent was infringed upon by the postman. Under the Consumer Protection Act 1986, compensation of Rs. 1000 was awarded as to the mental agony, harassment, and loss arising from the charge of deficiency in service. The importance of this case lies in the willingness of the courts to treat breach of privacy as a “deficiency of service”&lt;strong&gt;[11]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In January 2007, the Delhi State Consumer Disputes Redressal Commission imposed a fine of Rs. 75 lakh on a group of defendants including Airtel, ICICI and the American Express Bank for making unsolicited calls, messages and telemarketing. Although this decision was reversed on appeal by the Delhi High Court it confirms a trend of Consumer Dispute Redressal Commissions willing to take up cudgels on behalf of consumers for violations of their privacy.&lt;/p&gt;
&lt;h3&gt;Information Technology Act 2000 (Amended 2008)&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;In 2008, the Information Technology Act was amended to include an extremely salutary relief to people when a breach of privacy is occasioned by the leakage of data from computerised databases maintained by corporates. Thus, the newly inserted Section 43A states that if a “body corporate” is possessing, dealing, or handling any “sensitive personal data or information” in a computer resource which it owns, controls, or operates, and is negligent in implementing and maintaining “reasonable security practices and procedures” and thereby causes wrongful loss or wrongful gain to any person, this body corporate will become liable to pay damages as compensation to the affected person.&lt;/p&gt;
&lt;p&gt;The Section further stipulates that the Central Government would come up with the reasonable security practices and procedures and would also define what constituted ‘personal sensitive information’.&lt;/p&gt;
&lt;p&gt;Likewise, the newly introduced Section 72A declares that if “any person including an intermediary” secures access to any personal information about another person while providing services under the terms of lawful contract, and if he, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain, discloses such information without the consent of the person concerned, or in breach of a lawful contract, he is liable to be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to five lakh rupees, or with both &lt;strong&gt;[12]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;In conclusion it is important to consider many elements when looking at an effective protective regime for consumer privacy :&lt;br /&gt;1. Is a comprehensive data protection of a sectoral approach more suited to the needs of India?&lt;/p&gt;
&lt;p&gt;2. Does India want to become compliant with international standards for data protection ?&lt;/p&gt;
&lt;p&gt;3. How will privacy policies be enforced and how will organizations be held accountable for protection of client privacy under the legislation ?&lt;/p&gt;
&lt;p&gt;4. Will consumers be notified if their information is breached? If so – what will be included in the breach notification?&lt;/p&gt;
&lt;p&gt;5. How can a legislation ensure that consumers are aware of their privacy rights?&lt;/p&gt;
&lt;p&gt;6. How can a privacy legislation address the need for different levels of protection for different types of data?&lt;/p&gt;
&lt;h3&gt;Bibliography:&lt;/h3&gt;
&lt;p class="discreet"&gt;1. Examples drawn from: Oussayef, karim. Selective Privacy: Facilitating Market Based Solutions to Data Breaches by Standardizing Internet Privacy Policies. 14 B U Journal Sci and Tech&amp;nbsp; Law. 105 2008.&lt;/p&gt;
&lt;p class="discreet"&gt;2. Organisation for Economic Co-operatioin and &lt;em&gt;Development, OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security ,&lt;/em&gt; July 25, 2002&lt;/p&gt;
&lt;p class="discreet"&gt;3. Directive 95/46/EC of European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processting of personal data and on the ree movement of data&lt;/p&gt;
&lt;p class="discreet"&gt;4. Westby Jody, International Guide to Privacy. American Bar Association. 2004 pg.34-4&lt;/p&gt;
&lt;p class="discreet"&gt;5&lt;a href="http://www.rediff.com/w3c/policy.html"&gt;http://www.rediff.com/w3c/policy.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;
6.&amp;nbsp; Westby Jody, International Guide to Privacy. American Bar Association. 2004 pg. 161-164&lt;/p&gt;
&lt;p class="discreet"&gt;7. The Advocates Act 1961&lt;a href="http://www.sharmalawco.in/Downloads/THE%20ADVOCATES%20ACT%201961.pdf"&gt;http://www.sharmalawco.in/Downloads/THE%20ADVOCATES%20ACT%201961.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;8 Indian Medical Council (Professional conduct, Etiquette and Ethics) Regulations. Published in Part III, Section 4 of the Gazette of India, dated 6th April, 2002&lt;a href="http://www.mciindia.org/rules-and-regulation/Code%20of%20Medical%20Ethics%20Regulations.pdf"&gt;http://www.mciindia.org/rules-and-regulation/Code%20of%20Medical%20Ethics%20Regulations.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p class="discreet"&gt;9. (1998) 8 SCC 296:&lt;a href="http://indiankanoon.org/doc/382721/"&gt;http://indiankanoon.org/doc/382721/&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;10. Indian Consumer Protection Act 1986&lt;a href="http://www.legalhelpindia.com/consumer-protection-act.html"&gt;http://www.legalhelpindia.com/consumer-protection-act.html&lt;/a&gt;.&lt;/p&gt;
&lt;p class="discreet"&gt;11.&lt;a href="http://164.100.72.12/ncdrcrep/judgement/80Post%20Master%20Vs%20Ashok%20Kriplani%20(JDK)%2023.03.2009.htm"&gt;http://164.100.72.12/ncdrcrep/judgement/80Post%20Master%20Vs%20Ashok%20Kriplani%20(JDK)%2023.03.2009.htm&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;12. Information Technology Act 2000: Amended 2008&lt;a href="http://www.mit.gov.in/content/information-technology-act"&gt;http://www.mit.gov.in/content/information-technology-act&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/consumer-privacy'&gt;https://cis-india.org/internet-governance/blog/privacy/consumer-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-21T10:06:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015">
    <title>Comparison of the Human DNA Profiling Bill 2012 with: CIS recommendations, Sub-Committee Recommendations, Expert Committee Recommendations, and the Human DNA Profiling Bill 2015</title>
    <link>https://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015</link>
    <description>
        &lt;b&gt;This blog a comparison of 1. The Human DNA Profiling Bill  2012  vs. the Human DNA Profiling Bill 2015, 2. CIS's main recommendations vs. the 2015 Bill 3. The Sub-Committee Recommendations vs. the 2015 Bill 4. The Expert Committee Recommendations vs. the 2015 Bill.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In 2013 the Expert Committee to discuss the draft Human DNA Profiling Bill was constituted by the Department of Biotechnology. The Expert Committee had constituted a Sub-Committee to modify the draft Bill in the light of invited comments/inputs from the members of the Committee&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These changes were then deliberated upon by the Expert Committee. The Record Notes and Meeting Minutes of the Expert Committee and Sub-Committee can be found here. The Centre for Internet and Society was a member of the Expert Committee and sat on the Sub-Committee. In addition to input in meetings, CIS submitted a number of recommendations to the Committee. The Committee has drafted a 2015 version of the Bill and the same is to be introduced to Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Below is a comparison of 1. The 2012 Bill vs. the 2015 Bill, 2. CIS's main recommendations vs. the 2015 Bill 3. The Sub-Committee Recommendations vs.  the 2015 Bill 4.  The Expert Committee Recommendations vs. the 2015 Bill.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt; Recognition that DNA evidence is not infallible.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation: &lt;/strong&gt;N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt; No change from 2012 Bill&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;Chapter I : Preliminary&lt;/strong&gt;&lt;/h2&gt;
&lt;p class="Textbody" style="text-align: justify; "&gt;Inclusion of an 'Objects Clause' that makes clear that (i) the principles of notice, confidentiality, collection limitation, personal autonomy, purpose limitation and data minimization must be adhered to at all times; (ii) DNA profiles merely estimate the identity of persons, they do not conclusively establish unique identity; (iii) all individuals have a right to privacy that must be continuously weighed against efforts to collect and retain DNA; (iv) centralized databases are inherently dangerous because of the volume of information that is at risk; (v) forensic DNA profiling is intended to have probative value; therefore, if there is any doubt regarding a DNA profile, it should not be received in evidence by a court; (vi) once adduced, the evidence created by a DNA profile is only corroborative and must be treated on par with other biometric evidence such as fingerprint measurements.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Sub Committee Recommendation:&lt;/strong&gt; The Bill will not regulate DNA research. The current draft will only regulate use of DNA for civil and criminal purposes.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Expert Committee Recommendation: &lt;/strong&gt;The Bill will not regulate DNA research. The current draft will only regulate use of DNA for civil and criminal purposes.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill: &lt;/strong&gt;No Change from the 2012 Bill&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="Standard"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter II : Definitions&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Removal of 2(1)(a) “analytical procedure”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(b) “audit”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(d) “calibration”&lt;/li&gt;
&lt;li&gt;Re-drafting of 2(1)(h) “DNA Data Bank”&lt;/li&gt;
&lt;li&gt;Re-naming of 2(1)(i) “DNA Data Bank Manager” to “National DNA Data Bank Manager”&lt;/li&gt;
&lt;li&gt;Re-drafting of 2(1)(j) “DNA laboratory”&lt;/li&gt;
&lt;li&gt;Re-drafting of 2(1)(l) “DNA Profile”&lt;/li&gt;
&lt;li&gt;Re-drafting of 2(1)(o) “forensic material”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(q) “intimate body sample”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(v) “non-intimate body sample”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(r) “intimate forensic procedure”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(w) “non-intimate forensic procedure”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(s) “known samples”&lt;/li&gt;
&lt;li&gt;Re-drafting of 2(1)(y) “offender”&lt;/li&gt;
&lt;li&gt;Removal of 2(1)(zb) “proficiency testing”&lt;/li&gt;
&lt;li&gt;Re-drafting of 2(1)(zi) “suspect”&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation&lt;/strong&gt;: N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation&lt;/strong&gt;: N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt; No change from the 2012 Bill.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter III : DNA Profiling Board&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;The board should be made up of no more than five members. The Board must contain at least one ex-Judge or senior lawyer since the Board will perform the legal function of licensing and must obey the tenets of administrative law. To further multi-stakeholder interests, the Board should have an equal representation from civil society – both institutional (e.g NHRC and the State Human Rights Commissions) and non-institutional (well-regarded and experienced civil society persons). The Board should also have privacy advocates. CIS also recommended that the functions of the board be limited to: licensing, developing standards and norms, safeguarding privacy and other rights, ensuring public transparency, promoting information and debate and a few other limited functions necessary for a regulatory authority. CIS also recommended a &lt;a href="http://cis-india.org/internet-governance/blog/dna-bill-functions.pdf"&gt;'duty to consult'&lt;/a&gt; with affected or impacted individuals, interested individuals, and the public at large.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Reduce the DNA Profiling Board (Section 4) from 16 members to 11 members and include civil society representation on the Board.&lt;/li&gt;
&lt;li&gt;Include &lt;span&gt;either&lt;/span&gt; clause 4(f) or (g) i.e. Chief Forensic Scientist, Directorate of Forensic Science, Ministry of Home Affairs, Government of India - &lt;i&gt;ex-officio Member&lt;/i&gt; or Director of a Central Forensic Science Laboratory to be nominated by Ministry of Home Affairs, Government of India- &lt;i&gt;ex-officio Member&lt;/i&gt;;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Change&lt;/span&gt; clause 4(i) i.e., &lt;strong&gt;&lt;span&gt;to replace&lt;/span&gt;&lt;/strong&gt; Chairman, National Bioethics Committee of Department of Biotechnology, Government of India- &lt;i&gt;ex-officio Member&lt;/i&gt; &lt;strong&gt;with&lt;/strong&gt; Chairman, National Human Rights Commissions or his nominee.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Delete&lt;/span&gt; Members mentioned in clause 4(l) i.e. Two molecular biologists to be nominated by the Secretary, Department of Biotechnology, Ministry of Science and Technology, Government of India- &lt;i&gt;Members&lt;/i&gt;;&lt;/li&gt;
&lt;li&gt;DPB Members with potential conflict of interest in matters under consideration should recuse themselves in deliberations in respect of such matters (Section 7), and they should be liable to be removed from the Board in case they are found to have not disclosed the nature of such interest.&lt;/li&gt;
&lt;li&gt;With regards to the establishment of the DNA Profiling Board (clause 3) the committee clarified that the DNA Board needs to be a body corporate&lt;/li&gt;
&lt;li&gt;The functions of the Board should be redrafted with fewer functions, and these should be listed in descending order of priority to sharpen this function – namely regulate process, regulate the labs, regulate databanks.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Accepted sub-committee recommendation to reduce the Board from 16 to 11 members and the detailed changes.&lt;/li&gt;
&lt;li&gt;Accepted sub-committee recommendation to include civil society on the Board.&lt;/li&gt;
&lt;li&gt;Accepted sub-committee recommendation to reduce the functions of the Board.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Addition in 2015 Bill of Section 4 (b) – &lt;i&gt;“Chairman, National Human Rights Commission or his nominee – ex-officio Member” (2015 Bill) &lt;/i&gt;&lt;strong&gt;&lt;span&gt;Note: This change represents incorporation of CIS's recommendation, sub-committee recommendation, and expert committee recommendation.&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Changing of Section 4 (h)  from: &lt;i&gt;“Director of a State Forensic Science Laboratory to be nominated by Ministry of Home Affairs, Government of India- ex-officio Member”&lt;/i&gt; (2012 Bill)  &lt;strong&gt;to&lt;/strong&gt; “&lt;i&gt;Director cum – Chief Forensic Scientist, Directorate of Forensic  Science Services, Ministry of Home Affairs, Government of India -ex-officio Member”(2015 Bill) &lt;/i&gt;&lt;strong&gt;&lt;span&gt;Note: This change represents partial incorporation of the sub-committee recommendation and expert committee recommendation.&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Changing of Section 4 (j) from: &lt;i&gt;“Director, National Accreditation Board for Testing and Calibration of Laboratories, New Delhi- ex-officio Member”; (2012 Bill)&lt;/i&gt; &lt;strong&gt;to&lt;/strong&gt; &lt;i&gt;“&lt;/i&gt;&lt;i&gt;Director of a State Forensic Science Lab to be nominated by MHA ex-officio member” (2015 Bill)&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Addition of section 11(4) and 11(5) “(4) &lt;i&gt;The Board shall, in carrying out its functions and activities, consult with all persons and groups of persons whose rights and related interests may be affected or impacted by any DNA collection, storage, or profiling activity. (5) The Board shall, while considering any matter under its purview, co-opt or include any person, group of persons, or organisation, in its meetings and activities if it is satisfied that that person, group of persons, or organisation, has a substantial interest in the matter and that it is necessary in the public interest to allow such participation.” &lt;/i&gt;&lt;strong&gt;&lt;span&gt;Note: This change represents partial incorporation of CIS's recommendation and Expert Committee recommendation.&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter IV : Approval of DNA Laboratories&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Add in section 16 1(d), the words “including audit reports”&lt;/li&gt;
&lt;li&gt;Include in section 16(1)(c) that if labs do not file their audit report on an annual basis, the lab will lose approval. If the lab loses their approval - all the materials will be shifted to another lab and the data subject will be informed.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation: &lt;/strong&gt;N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt; No change from the 2012 Bill.&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="Standard"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter V : Standards, Quality Control and Quality Assurance&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Section 19(2) DNA laboratory to be headed by person possessing a doctorate in a subject germane to molecular biology.&lt;/li&gt;
&lt;li&gt;Clauses 20 and 30 should be merged into Clause 20 to read as:&lt;/li&gt;
&lt;/ol&gt;
&lt;p class="Textbody"&gt;&lt;i&gt;“(1). The staff of every DNA laboratory shall possess such qualifications and experience commensurate with the job requirements as may be specified by the regulations.&lt;/i&gt;&lt;/p&gt;
&lt;p class="Textbody"&gt;&lt;i&gt;(2). Every DNA laboratory shall employ such qualified technical personnel as may be specified by the regulations and technical personnel shall undergo regular training in DNA related subjects in such institutions and at such intervals as may be specified by the regulations.&lt;/i&gt;&lt;/p&gt;
&lt;p class="Textbody"&gt;&lt;i&gt;(3). Head of every DNA laboratory shall ensure that laboratory personnel keep abreast of developments within the field of DNA and maintain such records on the relevant qualifications, training, skills and experience of the technical personnel employed in the laboratory as may be specified by the regulations.&lt;/i&gt;&lt;/p&gt;
&lt;p class="Textbody"&gt;&lt;i&gt;Accordingly, change the Title: “Qualification, Recruitment and Training of DNA lab personnel.”&lt;/i&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Require DNA labs to have in place an evidence control system (Clause 22) &lt;strong&gt;&lt;span&gt;Note: &lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span&gt;This existed in the DNA 2012 Bill&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Amend Clause 23(1) to read as ““Every DNA laboratory shall possess and &lt;span&gt;shall follow&lt;/span&gt; a validation process as may be specified by the regulations.”&lt;/li&gt;
&lt;li&gt;Paraphrase Clause 27 as, “Every DNA laboratory shall have audits conducted annually in accordance with the standards as may be specified by the regulations.” It was agreed that the audits of the DNA Laboratory (clause 27) do not need to be external. &lt;strong&gt;&lt;span&gt;Note: &lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span&gt;This existed in the DNA 2012 Bill.&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Bring sections 28-31 on infrastructure and training brought into Chapter V and thus new title of the chapter reads as “Standards, Quality Control and Quality Assurance Obligations of DNA Laboratory and Infrastructure and Training”.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Changing of Section 20 (2) from  &lt;i&gt;“&lt;/i&gt;&lt;i&gt;(2) Head of every DNA laboratory shall ensure that laboratory personnel keep abreast of developments within the field of DNA and maintain such records on the relevant qualifications, training, skills and experience of the technical personnel employed in the laboratory as may be specified by the regulations made by the Board.&lt;/i&gt; (2012) &lt;strong&gt;to&lt;/strong&gt; &lt;i&gt;Every DNA laboratory shall employ such qualified technical personnel as may be specified by the regulations and technical personnel shall undergo regular training in DNA related subjects in such institutions and at such intervals as may be specified by the regulations; (2015)”  and &lt;/i&gt;Addition in 2015 Bill of Section 20 (3)&lt;i&gt; - “Head of every DNA laboratory shall ensure that laboratory personnel keep abreast of developments within the field of DNA profiling and maintain such records on the relevant qualifications, training, skills and experience of the technical personnel employed in the laboratory as may be specified by the regulations” (2015) &lt;/i&gt;&lt;strong&gt;Note: This is as per the Sub-Committee's recommendation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Amending of  Clause 23(1) to read as ““Every DNA laboratory shall possess and &lt;span&gt;shall follow&lt;/span&gt; a validation process as may be specified by the regulations.” &lt;strong&gt;Note: This is as per the Sub-Committee's recommendation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Changing of section 30 from:&lt;i&gt;“Every DNA laboratory shall employ such qualified technical personnel as may be specified by the regulations made by the Board and technical personnel shall undergo regular training in DNA related subjects in such institutions and at such intervals as may be specified by the regulations made by the Board.” (2012) &lt;/i&gt;to&lt;i&gt; “Every DNA laboratory shall have installed appropriate security system and system for safety of personnel as may be specified by the regulations.”&lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;Sections 28-31 on infrastructure and training brought into Chapter V and thus new title of the chapter reads as “Standards, Quality Control and Quality Assurance Obligations of DNA Laboratory and Infrastructure and Training”.  &lt;strong&gt;Note: This is as per the Sub-Committee's recommendation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter VI : DNA Data Bank&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Removal of section 32(6) which requires the names of individuals to be connected to their profiles and recommended that DNA profiles once developed, should be anonymized and retained separate from the names of their owners.&lt;/li&gt;
&lt;li&gt;Section 34(2) to be limited to containing only an offenders' index and a crime scene index&lt;/li&gt;
&lt;li&gt;Removal of section 36 which allows for international dicslosures of DNA profiles of Indians.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Amend Clause 32(1) to reads as: “The Central Government shall, by notification, establish a National DNA Data Bank”.&lt;/li&gt;
&lt;li&gt;Anonymize the volunteer's database.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt; No change from 2012 Bill.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter VII : Confidentiality of and access to DNA profiles, samples, and records&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Re-drafting section 39 and 40 to specify that DNA can only be used for forensic purposes and specify the manner in which DNA profiles may be received in evidence.&lt;/li&gt;
&lt;li&gt;Removal of section 40&lt;/li&gt;
&lt;li&gt;Removal of section 43&lt;/li&gt;
&lt;li&gt;Re-dreaft section 45 as it sets out a post-conviction right related to criminal procedure and evidence. This would fundamentally alter the nature of India’s criminal justice system, which currently does not contain specific provisions for post-conviction testing rights. However, courts may re-try cases in certain narrow cases when fresh evidence is brought forth that has a nexus to the evidence upon which the person was convicted and if it can be proved that the fresh evidence was not earlier adduced due to bias. Any other fresh evidence that may be uncovered cannot prompt a new trial. Clause 45 is implicated by Article 20(2) of the Constitution of India and by 6 section 300 of the CrPC. The principle of autrefois acquit that informs section 300 of the CrPC specifically deals with exceptions to the rule against double jeopardy that permit re-trials. [See, for instance, Sangeeta Mahendrabhai Patel (2012) 7 SCC 721.]&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Amend Clause 40 (f) to read as  “-------to the concerned parties to the said civil dispute or civil matter, &lt;span&gt;with the concurrence of the court&lt;/span&gt; and to the concerned judicial officer or authority”.Incorporated, but is now located at section 39&lt;/li&gt;
&lt;li&gt;Include in Chapter VIII  additional Sections:   Clause 42A: “A person whose DNA profile has been created shall be given a copy of the DNA profile upon request”. &lt;span&gt;Clause 42B:&lt;/span&gt; A person whose DNA profile has been created and stored shall be given information as to who has accessed his DNA profile or DNA information.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee: &lt;/strong&gt;N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Addition of  the phrase in section 39 “&lt;span&gt;with the concurrence of the court&lt;/span&gt;”, thus the new clause reads as:  “-------to the concerned parties to the said civil dispute or civil matter, with the concurrence of the court” and to the concerned judicial officer or authority”. &lt;strong&gt;Note: This as per the recommendations of the Sub-Committee.&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter VIII : Finance, Accounts, and Audit&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation: &lt;/strong&gt;N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation: &lt;/strong&gt;N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt; No change from the 2012 Bill&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter IX : Offences and Penalties&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;The law prohibits the delegation of “essential legislative functions” [In re Delhi Laws, 1951]. The creation of criminal offences must be conducted by a statute that is enacted by Parliament, and when offences are created via delegated legislation, such as Rules, the quantum of punishment must be pre-set by the parent statute.&lt;/li&gt;
&lt;li&gt;Since the listing of offences for DNA profiling will directly affect the fundamental right of personal liberty, it is an undeniable fact that the identification of these offences should be subject to a democratic process of the legislature rather than be determined by the whims of the executive.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Ensure a minimal jail term for any offence under the Act from DNA Data Banks without authorization is a period of one month (chapter 10 (53)) &lt;strong&gt;Note: This already existed in the 2012 Bill.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Add to Section 56 the phrase “… or otherwise willfully neglects any other duty cast upon him under the provisions of this Act, shall be punishable …”.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt; No change from 2012 Bill&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation: &lt;/strong&gt;N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill: &lt;/strong&gt;No change from 2012 Bill&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Chapter X : Miscellaneous&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;span&gt;Schedule&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CIS Recommendation&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The creation of a &lt;a href="http://cis-india.org/internet-governance/blog/dna-list-of-offences.pdf"&gt;list of offenses &lt;/a&gt;under which upon arrest under which DNA samples may lawfully be collected from the arrested person without his consent including:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Any offence under the Indian Penal Code, 1860 if it is listed as a cognizable offence in Part I of the First Schedule of the Code of Criminal Procedure, 1973; [Alternatively, all cognizable offences under the Indian Penal Code may be listed here]&lt;/li&gt;
&lt;li&gt;Every offence punishable under the Immoral Traffic (Prevention) Act, 1956;&lt;/li&gt;
&lt;li&gt;Any cognizable offence under the Indian Penal Code, 1860 that is committed by a registered medical practitioner and is not saved under section 3 of the Medical Termination of Pregnancy Act, 1971; [Note that the ITP Act does not itself create or list any offences, it only saves doctors from prosecution from IPC offences if certain conditions are met]&lt;/li&gt;
&lt;li&gt;Every offence punishable under the Pre-conception and Pre-natal Diagnostic Techniques (Prohibition of Sex Selection) Act, 1994;&lt;/li&gt;
&lt;li&gt;The offence listed under sub-section (1) of section 31 of the Protection of Women from Domestic Violence Act, 2005;&lt;/li&gt;
&lt;li&gt;Every offence punishable under the Protection of Civil Rights Act, 1955;&lt;/li&gt;
&lt;li&gt;Every offence punishable under the Scheduled Castes and the Scheduled Tribes (Prevention of Atrocities) Act, 1989.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sub-Committee Recommendation:&lt;/strong&gt; N/A&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Expert Committee Recommendation:&lt;/strong&gt; Incorporation of CIS's recommendation to the schedule regarding instances of when DNA samples can be collected without consent.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2015 Bill:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Addition in 2015 of “&lt;i&gt;Part II: List of specified offences - Any offence under the Indian Penal Code, 1860 if it is listed as a cognizable offence in Part I of the First Schedule of the Code of Criminal Procedure, 1973” (2015). &lt;/i&gt;&lt;strong&gt;Note: This represents partial incorporation of CIS's recommendation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Expansion of sources of samples for DNA profiling from &lt;i&gt;-&lt;/i&gt;&lt;i&gt; “(1) Scene of occurrence or crime (2) Tissue and skeleton remains (3) Clothing and other objects (4) Already preserved body fluids and other samples” (2012) &lt;/i&gt;&lt;strong&gt;to&lt;i&gt; &lt;/i&gt;&lt;/strong&gt;&lt;i&gt;“1. Scene of occurrence, or scene of crime 2. Tissue and skeleton remains 3. Clothing and other objects 4. Already preserved body fluids and other samples 5. Medical Examination 6. Autopsy examination 7. Exhumation” (2015)” and&lt;/i&gt; Deletion of&lt;i&gt; “Manner of collection of samples for DNA: (1) Medical Examination (2) Autopsy examination (3) Exhumation “ (2012) &lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015'&gt;https://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-10T03:20:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions">
    <title>Comparison of Section 35(1) of the Draft Human DNA Profiling Bill and Section 4 of the Identification Act Revised Statute of Canada</title>
    <link>https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions</link>
    <description>
        &lt;b&gt;A comparison of section 35(1) of the Draft Human DNA Profiling Bill, section 4 of the Identification Act, Revised Statute of Canada, and a review of international best practices. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In continuance of research around the &lt;a href="https://cis-india.org/internet-governance/blog/draft-human-dna-profiling-bill-april-2012"&gt;Draft Human DNA Profiling Bill&lt;/a&gt; that has been drafted the Department of Biotechnology, this blog entry reviews best practices for the communication of DNA profiles from the DNA Bank Manager to law enforcement and the police, compares the section 35(1) of the Draft Human DNA Profiling Bill and section 4 of the Identification Act Revised Statute of Canada, and recommends a revision of the present provision in the Draft Human DNA Profiling Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Indian Provision&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;35 (1) “&lt;i&gt;On receipt of a DNA profile for entry in the DNA Data Bank, the DNA Bank Manager shall cause it to be compared with the DNA profiles in the DNA Data Bank in order to determine whether it is already contained in the DNA Data Bank and shall communicate, for the purposes of the investigation or prosecution in a criminal offence, the following information to a court, tribunal, law enforcement agency or DNA laboratory in India which the DNA Data Bank Manager considers is concerned with it, appropriate, namely – &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a) &lt;/i&gt;&lt;i&gt;As to whether the DNA profile received is already contained in the Data Bank; and &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b) &lt;/i&gt;&lt;i&gt;Any information, other than the DNA profile received, is contained in the Data Bank in relation to the DNA profile received. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) The information as to whether a person’s DNA profile is contained in the offenders’ index may be communicated to an official who is authorized to receive the same as prescribed.”&lt;/i&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Canadian Provision vs. Indian Provision&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the Draft Human DNA Profiling Bill 35(1) was adopted from the DNA Identification Act Revised Statute of Canada section 4. The provision found in the Draft Human DNA Profiling Bill is different in three ways:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The Canadian statute limits the communication of whether a DNA profile is contained in the Data Bank or not to law enforcement agencies or other DNA laboratories, where as the provision in the Draft Human DNA Profiling Bill allows the communication to law enforcement agencies, other DNA data banks, and courts and tribunals. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Canadian statute limits the comparison of any DNA profile to that as entered in the convicted offenders index or the crime scene index with those DNA profiles that are already contained in the databank, where as the Draft Human DNA Profiling Bill allows for any received profile to be compared with the other profiles in the DNA Data Bank. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Canadian statute defines four types of information that may be communicated to law enforcement or another DNA databank including: &lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;ol&gt;
&lt;li&gt;(&lt;i&gt;a&lt;/i&gt;) if the DNA profile is not       already contained in the data bank, the fact that it is not;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;(&lt;i&gt;b&lt;/i&gt;) if the DNA profile is already       contained in the data bank, the information contained in the data bank in       relation to that DNA profile;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;(&lt;i&gt;c&lt;/i&gt;) if the DNA profile is, in the       opinion of the Commissioner, similar to one that is already contained in       the data bank, the similar DNA profile; and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;(&lt;i&gt;d&lt;/i&gt;) if a law enforcement agency       or laboratory advises the Commissioner that their comparison of a DNA       profile communicated under paragraph (&lt;i&gt;c&lt;/i&gt;) with one that is       connected to the commission of a criminal offence has not excluded the       former as a possible match, the information contained in the data bank in       relation to that profile.&lt;/li&gt;
&lt;/ol&gt;&lt;/ol&gt;
&lt;p&gt;While the Draft Human DNA Profiling Bill provides for communication of only (a) and (b) by the DNA Data Bank Manager.&lt;/p&gt;
&lt;h3&gt;Concerns with 35(1) and Best Practices&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society finds 35(1) problematic because a  DNA profile is never a complete match, and is instead a scientific and statistical based probability. There are a number of steps that go into the analysis of a DNA profile. According to the US National Institute of Justice, these include: “&lt;i&gt;1) the isolation of the DNA from an evidence sample containing DNA of unknown origin, and generally at a later time, the isolation of DNA from a sample (e.g., blood) from a known individual; 2) the processing of the DNA so that test results may be obtained; 3) the determination of the DNA test results (or types), from specific regions of the DNA; and 4) the comparison and interpretation of the test results from the unknown and known samples to determine whether the known individual is not the source of the DNA or is included as a possible source of the DNA.&lt;/i&gt;”&lt;a name="fr1"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though it is common for DNA Banks to communicate responses such as “match”,  “no match”, or “partial match” or “inclusion”, “exclusion”, or “inconclusive” to inquiries received from law enforcement and other DNA Banks, this is not the case for communications to courts and tribunals. For example in England and Wales guidelines for presenting DNA evidence in court were laid out in the rule Rv. Dohemy and Adams (1997) 1 Cr. App. R. 396. Along with comprehensive guidelines on how experts should conduct themselves in court to prevent bias, the guidelines require the following information to be presented when DNA material is used as evidence in a case:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;“The scientist should adduce the evidence of the DNA comparisons between the crime stain and the defendant’s sample together with the calculations of the Random Match Probability. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Whenever DNA evidence is adduced the Crown should serve on the defence details as to how the calculations have been carried out which are sufficient to enable the defence to scrutinize the basis of the calculations. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Forensic Science Service should make available to a defence expert, if requested, the databases upon which the calculations have been made. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The expert will, on the basis of empirical statistical data, five the jury the random occurrence rations - the frequency with which the matching DNA characteristics are likely to be found in the population at large. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Provided that the expert has the necessary data, it may then be appropriate for him to indicate how many people with the matching characteristics are likely to be found in the United Kingdom...”&lt;a name="fr2"&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Given the influential weight that DNA evidence can have in a case, it is critical that the evidence is accurately presented to the court and other key stakeholders. The  Centre for Internet and Society recommends that the Bill should distinguish the DNA Bank Manager’s response to law enforcement and other DNA Laboratory’s and the DNA Bank Manger’s response to courts and tribunals as below:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Response to Law enforcement agency and DNA Laboratory:&lt;/strong&gt; The DNA Bank Manger should respond to a request from law enforcement or a DNA laboratory with either: "match" or "partial match" .&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Response to Court and tribunal:&lt;/strong&gt; When DNA evidence is used in a court of law, the Bill should provide that the presentation should include:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The random match probability: The probability that the profile is in the sample from the individual tested if the individual tested has been selected at random. &lt;/li&gt;
&lt;li&gt;The frequency with which the matching DNA characteristics are likely to be found in the population at large.&lt;/li&gt;
&lt;li&gt;The probability of contamination. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Bill should also provide for the database upon which the calculations were based to be made available when requested.  In addition, the Bill should provide for rules to be made prescribing the procedure for presentation.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1"&gt;&lt;/a&gt;]. &lt;a class="external-link" href="http://nij.gov/topics/forensics/evidence/dna/basics/Pages/analyzing.aspx"&gt;http://nij.gov/topics/forensics/evidence/dna/basics/Pages/analyzing.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://nij.gov/topics/forensics/evidence/dna/basics/Pages/analyzing.aspx"&gt;[&lt;span&gt;2&lt;/span&gt;].&lt;/a&gt; &lt;a class="external-link" href="http://www.medicalgenomics.co.uk/pdf/Barrister_vol32-2007.pdf"&gt;http://www.medicalgenomics.co.uk/pdf/Barrister_vol32-2007.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions'&gt;https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-03T08:20:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy">
    <title>CIS Welcomes 52nd Report on Cyber Crime, Cyber Security, and Right to Privacy </title>
    <link>https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy</link>
    <description>
        &lt;b&gt;The “Fifty Second Report on Cyber Crime, Cyber Security, and Right to Privacy” issued by the 2013 -2014 Standing Committee on Information Technology on February 12th 2014, highlights the urgent need for reform in India’s cyber security framework and the need for the much awaited privacy legislation to be finalized and made into a law. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a class="external-link" href="http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf"&gt;&lt;b&gt;Read the Fifty-Second Report on Cyber Crime, Cyber Security and Right to Privacy released by the Department of Electronics and Information Technology&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Report consists of questions on the state of cyber security, cyber crime, and privacy posed by the Standing Committee and briefings and evidence provided by the Department of Electronics and Information Technology (DEITY ) in reply. The Report concludes with recommendations from the Standing Committee on the way forward. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report represents an important step forward in the realm of privacy and cyber security in India as the evidence provided by DEITY  clarifies a number of aspects of India’s present and upcoming cyber security policies and practices. Furthermore, the recommendations by the Standing Committee highlight present gaps and inadequacies in India’s policies and practices and needed steps forward– particularly the need for a privacy legislation in India in the context of cyber security, increased transactions of sensitive data, and governmental projects like the Unique Identification Project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadly, the Standing Committee sought input from DEITY  on eight different aspects of cyber crime, cyber security, and privacy in India - namely:  the growing incidents of cyber crime and resulting financial loss, the challenges and constraints of cyber crime,  the role of relevant governmental organizations in India with respect to cyber security, preparedness and policy initiatives, cyber security and the right to privacy, monitoring and grievance redressal mechanism, and education and awareness initiatives. The evidence provided by DEITY  sheds light on the present mindset of the Government at this time, upcoming policies, and capacity and infrastructure gaps in India’s cyber security framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society appreciates the Report and we would like to highlight and emphasize the following aspects:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Need for a privacy legislation and inadequacy of privacy provisions in Information Technology Act&lt;/b&gt;: When asked by the Standing Committee about the right to privacy and cyber security, DEITY  highlighted the fact that the Information Technology Act contains sufficient safeguards for privacy, and added that the Department of Personnel and Training (DoPT) is in the process of developing a privacy legislation that will address the general concerns of privacy in the country, and thus the two together will be sufficient. DEITY  also noted that no study on the extent of privacy breach due to cyber crime in India has been conducted. In their recommendations, the Standing Committee noted that it was unhappy that the Government has yet to institute a legal framework on privacy, as the increased transfer of sensitive data and projects like the UID leave citizens vulnerable to privacy violations . Significantly, the Standing Committee recommended that though the DoPT is currently responsible for drafting the Privacy Bill, DEITY  should coordinate with the DoPT and become involved in the process. &lt;br /&gt;&lt;br /&gt;As recognized by the Standing Committee, the Centre for Internet and Society would like to  further emphasize the inadequacy of the provisions relating to privacy in the Information Technology Act, and the need for a privacy legislation in India.  Inadequate aspects of the provisions have been pointed out by a number of sources. For example:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;The Report of the Group of Experts on Privacy&lt;/a&gt;: Prepared by the committee chaired by Justice AP Shah &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://ec.europa.eu/justice/policies/privacy/docs/studies/final_report_india_en.pdf"&gt;First Analysis of the Personal Data Protection Law in India&lt;/a&gt;: Prepared by the University of Namur for the Commission of the European Communities Directorate General for Justice, Freedom, and Security&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011" class="external-link"&gt;Comments on the Information Technology&lt;/a&gt; (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011: Prepared by the Centre for Internet and Society and submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1964013"&gt;India’s U-Turns on Data Privacy&lt;/a&gt;: Prepared by Graham Greenleaf for the Privacy Laws &amp;amp; Business International Report, Issues 110 -114, 2011 &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Unclear Enforcement of 43A and associated rules&lt;/b&gt;: In evidence provided, DEITY, while discussing section 43A and the associated Rules, noted that the Data Security Council of India and empanelled security auditors through CERT-in are responsible for the ‘auditing of best practice’s (pg 24).  The Standing Committee did not directly respond to this comment.&lt;br /&gt;&lt;br /&gt;The Centre for Internet and Society would like to point out that DEITY did not clearly state that DSCI and the auditors through CERT-in were responsible for auditing organizational security practices for compliance with 43A. Furthermore, there is no publicly available information regarding audits ensuring compliance with 43A or information about the number of companies  that have been found to be compliant.  The Centre for Internet and Society would like to encourage that this information be made public, and compliance with 43A be enforced at the organizational level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI not in compliance with 43A and associated Rules&lt;/b&gt;:  In evidence provided, DEITY  noted that &lt;i&gt;“..Section 43A and the rules published under that Section cover the entire privacy in case of digital data. These are being followed by UIDAI also and other organisations...”&lt;/i&gt; (pg.46) In their recommendations the Standing Committee did not directly address this comment, but did emphasize the need for a privacy legislation in light of the UID scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society appreciates that the Standing Committee raised concern about the privacy implications of the UID project. We would like to highlight that the UIDAI is not a Body Corporate, and is not in compliance with 43A or the subsequent Rules in the Information Technology Act. Furthermore, the UID project involves the handling and processing of data in analogue and digital formats, and thus the privacy protections found under 43A are not sufficient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The potential harms of metadata&lt;/b&gt;: In evidence provided, the Department noted  &lt;i&gt;“...we have been assured that whatever data has been gathered by them for surveillance relates only to the metadata..but we expressed that any incursion into the content will not be tolerated and is not tolerable from the Indian stand and point of view.”&lt;/i&gt; (pg.47) The Standing Committee did not respond directly to this comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society would like to thank the Standing Committee for noting that the Government should have taken prior steps to preventing such an interception from taking place and for recommending the Department to take develop a policy to prevent future instances of interception from taking place. The Centre for Internet and Society would like to emphasize the importance and potential sensitive nature of metadata. Metadata can, and often does, disclose more about an individual or an activity than the actual content. For example, metadata can reveal identity, behaviour patterns, associations, and can enable the mapping of location and individual movement. As such, the Centre for Internet and Society would recommend that the Government of India treat access to all information generated by individual and governmental communications as sensitive and confidential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Inadequacy of the Information Technology Act&lt;/b&gt;: When asked by the Standing Committee if the Information Technology Act provided sufficient legal safeguards for cyber security and cyber crime, DEITY  highlighted the fact that the Information Technology Act 2000 addresses all aspects of cyber crime in a comprehensive manner.  DEITY  also pointed out that the National Cyber Security Policy 2013 has provisions to enable the development of a legal framework, and the Department of Personnel and Training  is in the process of drafting a privacy legislation for India that will fill any gaps that exist. In their recommendations, the Standing Committee recognized that the Information Technology Act does contain provisions that address cyber security and cyber crime, but, especially in the recent controversy over section 66A of the Act, Standing Committee emphasized the need for periodical reviews of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society appreciates the fact that the Committee recognized the need for periodical review of the Information Technology Act, particularly in light of the controversy over 66 A. The Centre for Internet and Society would like to underscore the problems associated with 66A and would like to highlight that with regards to privacy and cyber security, the IT Act is not adequate and falls short in a number of areas. Research that the Centre for Internet and Society has conducted explaining these weaknesses can be found through the below links:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Breaking Down Section 66A of the IT Act&lt;/li&gt;
&lt;li&gt;Short note on IT Amendment Act, 2008&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Implications of domestic servers&lt;/b&gt;:  In response to questions posed by the Standing Committee about security risks associated with the importation of electronics and IT products, as well as the hosting of servers outside the country, DEITY  noted the security risk of using foreign infrastructure and pointed to the hosting of servers in India as a solution to protecting the security and privacy of Indian data. The Standing Committee supported this initiative, and encouraged DEITY  to take further steps towards securing and protecting the privacy of Indian data through the hosting of servers for critical sectors within India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society appreciates the fact that the Standing Committee carefully limited the recommendation of locating servers in India to those in critical sectors, but would caution the Government of potential implications on users ability to freely access content and services, and highlight the fact that localization of servers is not a security solution in itself as a comprehensive solution and hardening of critical assets against cyber attacks is essential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Incorporation of safeguards into MOU’s for international cooperation&lt;/b&gt;: When asked about MOU’s for international cooperation that DEITY  has engaged in with other countries, DEITY  reported that currently CERT-in is entering into a number of MOU’s with other countries to facilitate cooperation for cyber security purposes. Presently there are MOUs with the US, Japan, South Korea, Mauritius, Kasakhstan, Finland, and the Canada Electronics and ICT sector. DEITY  is also seeking MOUs with Malaysia, Israel, Egypt, Canada, and Brazil. The Standing Committee supported  India entering into MOU’s for purposes of international cooperation, and encouraged DEITY  to continue entering into MOU’s to mitigate jurisdictional complications when seeking to address issues related to cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society recognizes the importance of international cooperation when handling issues related to cyber security and cyber crime. To ensure that this process is in line with human rights, the Centre for Internet and Society would encourage DEITY  to ensure that all MOU’s and/or  Mutual Legal Assistance Agreements:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Uphold the principle of dual criminality &lt;/li&gt;
&lt;li&gt;Apply the highest level of protection for individuals in the case where the laws of more than one state could apply to communications surveillance &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Are not used by any party involved to circumvent domestic legal restrictions on communications surveillance.&lt;/li&gt;
&lt;li&gt;Are clearly documented and publicly available&lt;/li&gt;
&lt;li&gt;Contain provisions guaranteeing  procedural fairness.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hactivism as a benefit to society&lt;/b&gt;: In evidence provided on page 14, DEITY, among other elements, referred to Hactivism as a societal challenge to securing cyber security and tackling cyber crime. The Standing Committee did not directly address this comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society would like to point out that hacktivism is a complex topic and consists of methods. Though some methods used by hacktivists are illegal, and some use hacktivism for censorship purposes and to target certain groups, other forms of hacktivism  can benefit society and strengthen cyber security by  finding and revealing vulnerabilities in a system, and bringing attention to illegal or violative practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This works towards ensuring that a system is adequately secure. Because of the dynamic nature of hacktivism, the Centre for Internet and Society believes that hacktivism needs to be evaluated on a case by case basis and the Government should not broadly label hacktivism as a challenge to cyber security and cyber crime.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importance of the anonymous speech: In evidence provided, DEITY noted the threat to cyber security that the anonymous nature of the internet posed. This was reiterated by the Standing Committee in their recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While recognizing the potential threat to cyber security that the anonymous nature of the internet can pose, the Centre for Internet and Society would like to highlight the importance of anonymous speech online to an individual’s right to free expression.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Recognizing the direct connection between a strong privacy framework and a strong cyber security framework, as security cannot be achieved without privacy, and recognizing the need for a privacy legislation in light of governmental projects like the UID,  the Centre for Internet and Society welcomes &lt;i&gt;the Fifty Second Report on Cyber Crime, Cyber Security, and the Right to Privacy&lt;/i&gt; and echoes the Standing Committees recommendation and emphasis on the need for a comprehensive privacy legislation to be passed in India.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. These safeguards are reflected in the principle of “safeguards for International Cooperation” found in the International Principles on the Application of Human Rights to Communications Surveillance”  &lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;https://en.necessaryandproportionate.org/text&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. For more information about hacktivism see: Activism, Hacktivism, and Cyberterrorism. The Internet as a Tool for Influencing Foreign Policy. By Dorothy E. Denning. Georgetown University. Available at: &lt;a class="external-link" href="http://www.iwar.org.uk/cyberterror/resources/denning.htm"&gt;http://www.iwar.org.uk/cyberterror/resources/denning.htm&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy'&gt;https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-24T10:49:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d">
    <title>CIS Supports the UN Resolution on “The Right to Privacy in the Digital age”.</title>
    <link>https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d</link>
    <description>
        &lt;b&gt;The United Nations adopted the resolution on the right to privacy recently. It recognised privacy as a human right, integral to the right to free expression, and also declared that mass surveillance could have negative impacts on human rights. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On &lt;a class="external-link" href="https://www.un.org/News/Press/docs/2013/gashc4094.doc.htm"&gt;November 26, 2013&lt;/a&gt;, the United Nations adopted a non-binding resolution on &lt;a href="http://www.un.org/ga/search/view_doc.asp?symbol=A/C.3/68/L.45/Rev.1"&gt;The Right to Privacy in the Digital Age&lt;/a&gt;. The resolution was drafted &lt;a href="http://news.idg.no/cw/art.cfm?id=F0537DC8-A06C-E9D5-2EBACEA94829DAC1"&gt;by Brazil and Germany&lt;/a&gt; and expressed concern over the negative impact of surveillance and interception on the exercise of human rights. The resolution was controversial as countries such as the US, the UK, and Canada opposed language that spoke to the right to &lt;a href="http://www.theguardian.com/world/2013/nov/26/un-surveillance-resolution-human-right-privacy"&gt;privacy extending equally to citizens and non-citizens of a country. &lt;/a&gt; The resolution welcomed the report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression that examined the implications of surveillance of communications on the human rights of privacy and freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The resolution made a number of important statements that India, as a member of the United Nations, and as a country in the process of implementing a number of surveillance projects, like the &lt;a href="http://www.indexoncensorship.org/2013/11/india-online-report-freedom-expression-digital-freedom-3/"&gt;Central Monitoring System&lt;/a&gt;, should take cognizance of, including in short:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy is a human right&lt;/b&gt;: Privacy is a human right according to which no one should be subjected to arbitrary or unlawful interference with his or her privacy, family, home, or correspondence. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy is integral to the right to free expression&lt;/b&gt;: an integral component in recognizing the right to freedom of expression. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Unlawful and arbitrary surveillance violates the right to privacy and freedom of expression&lt;/b&gt;: Unlawful and/or arbitrary surveillance, interception, and collection of personal data are intrusive acts that violate the right to privacy and freedom of expression. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Exceptions to privacy and freedom of expression should be in compliance with human rights law:&lt;/b&gt; Public security is a potential exception justifying collection and protection of information, but States must ensure that this is done fully in compliance with international human rights law. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Mass surveillance may have negative implications for human rights: &lt;/b&gt;Domestic and extraterritorial surveillance, interception, and the collection of personal data on a mass scale may have a negative impact on individual human rights. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Equal protection for online and offline privacy:&lt;/b&gt; The right to privacy must be equally protected online and offline.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The resolution further called upon states to:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Respect and protect the right to privacy, particularly in the context of digital communications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To ensure that relevant legislation is in compliance with international human rights law&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To review national procedures and practices around surveillance to ensure full and effective implementation of obligations under international human rights law.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To establish and maintain effective domestic oversight mechanisms around domestic surveillance capable of ensuring transparency and accountability.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The resolution finally calls upon the UN High Commissioner for Human Rights to present a report with views and recommendations on the protection and promotion of the right to privacy in the context of surveillance to the Human Rights Council at its twenty-seventh session and to the General Assembly at its sixty-ninth session and decides to examine “Human rights questions, including alternative approaches for improving the effective enjoyment of human rights and fundamental freedoms”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UN Resolution on the Right to Privacy in the Digital Age is a welcome step towards an international recognition of privacy as a human right in the context of communications and extra territorial surveillance. The Centre for Internet and Society encourages the Government of India to, as called upon in the Resolution, to review national procedures and practices around surveillance to ensure full and effective implementation of obligations under international human rights law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to the UN Resolution on “The Right to Privacy in the Digital Age”, a group of international NGO’s developed the &lt;a href="https://en.necessaryandproportionate.org/TEXT"&gt;Necessary and Proportionate principles&lt;/a&gt; that seek to form a backbone for a response to mass surveillance and provide a framework for governments to assess if domestic surveillance regimes are in compliance with international Human Rights Law. CIS has contributed to the process of developing these principles.  The principles include legality, legitimate aim, necessity, adequacy, proportionality, competent judicial authority, due process, user notification, transparency, public oversight, integrity of communications and systems, safeguards for international cooperation, and safeguards against illegitimate access.  A&lt;a href="https://en.necessaryandproportionate.org/take-action/digiges"&gt; petition&lt;/a&gt; to sign onto the principles and demand an end to mass surveillance is currently underway.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both the Government of India and public of India should take into consideration the UN Resolution and the necessary and proportionate principles to reflect on how India’s surveillance regime and practices can be brought in line with international human rights law and understand where the balance is drawn for necessary and proportionate surveillance, specific to the Indian context.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d'&gt;https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-30T07:25:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy">
    <title>CIS and International Coalition Calls upon Governments to Protect Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) along with the International Coalition has called upon governments across the globe to protect privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On September 20 in Geneva, CIS joined a huge international coalition in calling upon countries across the globe, including India to assess whether national surveillance laws and activities are in line with their international human rights obligations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has endorsed a set of international principles against unchecked surveillance. The 13 Principles set out for the first time an evaluative framework for assessing surveillance practices in the context of international human rights obligations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A group of civil society organizations officially presented the 13 Principles this past Friday in Geneva at a side event attended by Navi Pillay, the United Nations High Commissioner for Human Rights and the United Nations Special Rapporteur on Freedom of Expression and Opinion, Frank LaRue, during the 24th session of the Human Rights Council. The side event was hosted by the Permanent Missions of Austria, Germany, Liechtenstein, Norway, Switzerland and Hungary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok, Programme Manager at the Centre for Internet and Society has noted that "the 13 Principles are an important first step towards informing governments, corporates, and individuals across jurisdictions, including India, about needed safeguards for surveillance practices and related policies to ensure that they are necessary and proportionate."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Navi Pillay, the United Nations High Commissioner for Human Rights, speaking at the Human Rights Council stated in her opening statement on September 9:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"Laws and policies must be adopted to address the potential for dramatic intrusion on individuals’ privacy which have been made possible by modern communications technology."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Navi Pillay, the United Nations High Commissioner for Human Rights, speaking at the event, said that:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"technological advancements have been powerful tools for democracy by giving access to all to participate in society, but increasing use of data mining by intelligence agencies blurs lines between legitimate surveillance and arbitrary mass surveillance."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Frank La Rue, the United Nations Special Rapporteur on Freedom of Expression and Opinion &lt;a href="http://www.google.com/url?q=http%3A%2F%2Fwww.ohchr.org%2FDocuments%2FHRBodies%2FHRCouncil%2FRegularSession%2FSession23%2FA.HRC.23.40_EN.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNEwtpzwnl_1_j_UoSnoE048kX-LYA"&gt;made clear &lt;/a&gt;the case for a direct relationship between state surveillance, privacy and freedom of expression in this latest report to the Human Rights Council:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"The right to privacy is often understood as an essential requirement for the realization of the right to freedom of expression. Undue interference with individuals’ privacy can both directly and indirectly limit the free development and exchange of ideas. … An infringement upon one right can be both the cause and consequence of an infringement upon the other."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Speaking at the event, the UN Special Rapporteur remarked that:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"previously surveillance was carried out on targeted basis but the Internet has changed the context by providing the possibility for carrying out mass surveillance. This is the danger."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Representatives of the Centre for Internet and Society, &lt;a href="https://www.privacyinternational.org"&gt;Privacy International&lt;/a&gt;, the &lt;a href="https://eff.org"&gt;Electronic Frontier Foundation&lt;/a&gt;,&lt;a href="https://accessnow.org"&gt;Access&lt;/a&gt;,&lt;a href="http://www.hrw.org/"&gt;Human Rights Watch&lt;/a&gt;,&lt;a href="http://en.rsf.org/"&gt;Reporters Without Borders&lt;/a&gt;, &lt;a href="http://www.apc.org/"&gt;Association for Progressive Communications&lt;/a&gt;, and the&lt;a href="https://www.cdt.org/"&gt;Center&lt;/a&gt;&lt;a href="https://www.cdt.org/"&gt; for Democracy and Technology &lt;/a&gt;all are taking part in the event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Find out more about the Principles at &lt;a href="https://necessaryandproportionate.org"&gt;https://NecessaryandProportionate.org&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Contacts&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;NGOs currently in Geneva for the 24&lt;sup&gt;th&lt;/sup&gt; Human Rights Council:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Access&lt;/b&gt;&lt;br /&gt;Fabiola Carrion: &lt;a class="mail-link" href="mailto:fabiola@accessnow.org"&gt;fabiola@accessnow.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Association for Progressive Communication&lt;/b&gt;&lt;br /&gt;Shawna Finnegan: &lt;a href="mailto:shawna@apc.org"&gt;shawna@apc.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Center for Democracy and Technology&lt;/b&gt;&lt;br /&gt;Matthew Shears: &lt;a href="mailto:mshears@cdt.org"&gt;mshears@cdt.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Electronic Frontier Foundation&lt;/b&gt;&lt;br /&gt;Katitza Rodriguez:  &lt;a href="mailto:katitza@eff.org"&gt;katitza@eff.org&lt;/a&gt; - @txitua&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Human Rights Watch&lt;/b&gt;&lt;br /&gt;Cynthia Wong: &lt;a class="mail-link" href="mailto:wongc@hrw.org"&gt;wongc@hrw.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Privacy International&lt;/b&gt;&lt;br /&gt;Carly Nyst: &lt;a href="mailto:carly@privacy.org"&gt;carly@privacy.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporters Without Borders&lt;/b&gt;&lt;br /&gt;Lucie Morillon: &lt;a href="mailto:lucie.morillon@rsf.org"&gt;lucie.morillon@rsf.org&lt;/a&gt;&lt;br /&gt;Hélène Sackstein: &lt;a href="mailto:helsack@gmail.com"&gt;helsack@gmail.com&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Signatories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Argentina&lt;/b&gt;&lt;br /&gt;Ramiro Alvarez: &lt;a href="mailto:rugarte@adc.org.ar"&gt;rugarte@adc.org.ar&lt;/a&gt;&lt;br /&gt;Asociación por los Derechos Civiles&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Argentina&lt;/b&gt;&lt;br /&gt;Beatriz Busaniche&lt;b&gt;: &lt;/b&gt;&lt;a class="mail-link" href="mailto:bea@vialibre.org.ar"&gt;bea@vialibre.org.ar&lt;/a&gt;&lt;br /&gt;Fundación Via Libre&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Colombia&lt;/b&gt;&lt;br /&gt;Carolina Botero: &lt;a class="mail-link" href="mailto:carobotero@gmail.com"&gt;carobotero@gmail.com&lt;/a&gt;&lt;br /&gt;Fundación Karisma&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Egypt&lt;/b&gt;&lt;br /&gt;Ahmed Ezzat: &lt;a href="mailto:ahmed.ezzat@afteegypt.org"&gt;ahmed.ezzat@afteegypt.org&lt;/a&gt;&lt;br /&gt;Afteegypt&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Honduras&lt;/b&gt;&lt;br /&gt;Hedme Sierra-Castro: &lt;a href="mailto:hedme.sc@gmail.com"&gt;hedme.sc@gmail.com&lt;/a&gt;&lt;br /&gt;ACI-Participa&lt;/p&gt;
&lt;p&gt;&lt;b&gt;India&lt;/b&gt;&lt;br /&gt;Elonnai Hickok: &lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;&lt;br /&gt;Center for Internet and Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Korea&lt;/b&gt;&lt;br /&gt;Prof. Park:  &lt;a href="mailto:kyungsinpark@korea.ac.kr"&gt;kyungsinpark@korea.ac.kr&lt;/a&gt;&lt;br /&gt;Open Net Korea&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Macedonia&lt;/b&gt;&lt;br /&gt;Bardhyl Jashari: &lt;a href="mailto:info@metamorphosis.org.mk"&gt;info@metamorphosis.org.mk&lt;/a&gt;&lt;br /&gt;Metamorphosis Foundation for Internet and Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mauritania, Senegal, Tanzania&lt;/b&gt;&lt;br /&gt;Abadacar Diop: &lt;a href="mailto:jonction_jonction@yahoo.fr"&gt;jonction_jonction@yahoo.fr&lt;/a&gt;&lt;br /&gt;Jonction&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Portugal&lt;/b&gt;&lt;br /&gt;Andreia Martins&lt;b&gt;: &lt;/b&gt;&lt;a class="mail-link" href="mailto:andreia@coolpolitics.pt"&gt;andreia@coolpolitics.pt&lt;/a&gt;&lt;br /&gt;ASSOCIAÇÃO COOLPOLITICS&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Peru&lt;/b&gt;&lt;br /&gt;Miguel Morachimo: &lt;a href="mailto:morachimo@gmail.com"&gt;morachimo@gmail.com&lt;/a&gt;&lt;br /&gt;Hiperderecho&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Russia&lt;/b&gt;&lt;br /&gt;Andrei Soldatov: &lt;a href="mailto:soldatov@agentura.ru"&gt;soldatov@agentura.ru&lt;/a&gt;&lt;br /&gt;Agentura.ru&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Serbia&lt;/b&gt;&lt;br /&gt;Djordje Krivokapic: &lt;a href="mailto:krivokapic@gmail.com"&gt;krivokapic@gmail.com&lt;/a&gt;&lt;br /&gt;SHARE Foundation&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Western Balkans&lt;/b&gt;&lt;br /&gt;Valentina Pellizer: &lt;a href="mailto:valentina.pellizzer@oneworldsee.org"&gt;valentina.pellizzer@oneworldsee.org&lt;/a&gt;&lt;br /&gt;Oneworldsee&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Brasil&lt;/b&gt;&lt;br /&gt;Marcelo Saldanha: &lt;a href="mailto:instituto@bemestarbrasil.org.br"&gt;instituto@bemestarbrasil.org.br&lt;/a&gt;&lt;br /&gt;IBEBrasil&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy'&gt;https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T07:21:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
