<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 51 to 65.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-in-governance-in-india-case-studies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/telangana-today-november-8-2017-alekhya-hanumanthu-big-data-for-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/big-data-reproductive-health-india-mcts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/big-data-governance-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/benefits-harms-rights-and-regulation-survey-of-literature-on-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aadhaar-bill-2016-niai-bill-2010-text-comparison"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-in-governance-in-india-case-studies">
    <title>Big Data in Governance in India: Case Studies</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-in-governance-in-india-case-studies</link>
    <description>
        &lt;b&gt;This research seeks to understand the most effective way of researching Big Data in the Global South. Towards this goal, the research planned for the development of a Global South big data Research Network that identifies the potential opportunities and harms of big data in the Global South and possible policy solutions and interventions. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;This work has been made possible by a grant from the John D. and Catherine T. MacArthur Foundation. The conclusions, opinions, or points of view expressed in the report are those of the authors and do not necessarily represent the views of the John D. and Catherine T. MacArthur Foundation&lt;/i&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The research was for a duration of 12 months and in form of an exploratory study which sought to understand the potential opportunity and harm of big data as well as to identify best practices and relevant policy recommendations. Each case study has been chosen based on the use of big data in the area and the opportunity that is present for policy recommendation and reform. Each case study will seek to answer a similar set of questions to allow for analysis across case studies.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is Big Data&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Big data has been ascribed a number of definitions and characteristics. Any study of big data must begin with first conceptualizing defining what big data is. Over the past few years, this term has been become a buzzword, used to refer to any number of characteristics of a dataset ranging from size to rate of accumulation to the technology in use.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many commentators have critiqued the term big data as a misnomer and misleading in its emphasis on size. We have done a survey of various definitions and understandings of big data and we document the significant ones below.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Computational Challenges&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The condition of data sets being large and taxing the capacities of main memory, local disk, and remote disk have been seen as problems that big data solves. While this understanding of big data focusses only on one of its features—size, other characteristics posing a computational challenge to existing technologies have also been examined. The (US) National Institute of Science and Technology has defined big data as data which “exceed(s) the capacity or capability of current or conventional methods and systems.” &lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;These challenges are not merely a function of its size. Thomas Davenport provides a cohesive definition of big data in this context. According to him, big data is “data that is too big to fit on a single server, too unstructured to fit into a row-and-column database, or too continuously flowing to fit into a static data warehouse.” &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Characteristics&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The most popular definition of big data was put forth in a report by Meta (now Gartner) in 2001, which looks at it in terms of the three 3V’s—volume&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;, velocity and variety. It is high-volume, high-velocity and/or high-variety information assets that demand cost-effective, innovative forms of information processing that enable enhanced insight, decision making, and process automation.&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aside from volume, velocity and variety, other defining characteristics of big data articulated by different commentators are— exhaustiveness,&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; granularity (fine grained and uniquely indexical),&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;scalability,&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;veracity,&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;value&lt;a href="#fn10" name="fr10"&gt;[10] &lt;/a&gt;and variability.&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;It is highly unlikely that any data-sets satisfy all of the above characteristics. Therefore, it is important to determine what permutation and combination of these gamut of attributes lead us to classifying something as big data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Qualitative Attributes&lt;/h3&gt;
&lt;p&gt;Prof. Rob Kitchin has argued that big data is qualitatively different from traditional, small data. Small data has used sampling techniques for collection of data and has been limited in scope, temporality and size, and are “inflexible in their administration and generation.”&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this respect there are two qualitative attributes of big data which distinguish them from traditional data. First, the ability of big data technologies to accommodate unstructured and diverse datasets which hitherto were of no use to data processors is a defining feature. This allows the inclusion of many new forms of data from new and data heavy sources such as social media and digital footprints. The second attribute is the relationality of big data.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This relies on the presence of common fields across datasets which allow for conjoining of different databases. This attribute is usually a feature of not the size but the complexity of data enabling high degree of permutations and interactions within and across data sets.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Patterns and Inferences&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Instead of focussing on the ontological attributes or computational challenges of big data, Kenneth Cukier and Viktor Mayer Schöenberger define big data in terms of what it can achieve.&lt;a href="#fn14" name="fr14"&gt;[14] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They defined big data as the ability to harness information in novel ways to produce useful insights or goods and services of significant value. Building on this definition, Rohan Samarajiva has categorised big data into non-behavioral big data and behavioral big data. The latter leads to insights about human behavior.&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva believes that transaction-generated data (commercial as well as non-commercial) in a networked infrastructure is what constitutes behavioral big data. Scope of Research The initial scope arrived at for this case-study on role of big data in governance in India focussed on the UID Project, the Digital India Programme and the Smart Cities Mission. Digital India is a programme launched by the Government of India to ensure that Government services are made available to citizens electronically by improving online infrastructure and by increasing Internet connectivity or by making the country digitally empowered in the field of technology.&lt;a href="#fn16" name="fr16"&gt;[16] &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The Programme has nine components, two of which focus on e-governance schemes. &lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/big-data-compilation.pdf"&gt;Read More&lt;/a&gt; &lt;/b&gt;[PDF, 1948 Kb]&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Thomas Davenport, Big Data at Work: Dispelling the Myths, Uncovering the opportunities, Harvard Business Review Press, Boston, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. MIT Technology Review, The Big Data Conundrum: How to Define It?, available at https://www. technologyreview.com/s/519851/the-big-data-conundrum-how-to-define-it/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Supra note 1.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. What constitutes as high volume remains an unresolved matter. Intel defined Big Data volumes are emerging in organizations generating a median of 300 terabytes of data a week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. http://www.gartner.com/it-glossary/big-data/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Viktor Mayer Schöenberger and Kenneth Cukier, Big Data: A Revolution that will transform how we live, work and think” John Murray, London, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Rob Kitchin, The Data Revolution: Big Data, Open Data, Data Infrastructures and their consequences, Sage, London, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Nathan Marz and James Warren, Big Data: Principles and best practices of scalable realtime data systems, Manning Publication, New York, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Bernard Marr, Big Data: the 5 Vs everyone should know, available at https://www.linkedin. com/pulse/20140306073407-64875646-big-data-the-5-vs-everyone-must-know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Eileen McNulty, Understanding Big Data: the 7 Vs, available at http://dataconomy.com/sevenvs-big-data/.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Supra Note 7.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Danah Boyd and Kate Crawford, Critical questions for big data. Information, Communication and Society 15(5): 662–679, available at https://www.researchgate.net/publication/281748849_Critical_questions_for_big_data_Provocations_for_a_cultural_technological_and_scholarly_ phenomenon&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Supra Note 6.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Rohan Samarajiva, What is Big Data, available at http://lirneasia.net/2015/11/what-is-bigdata/.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. http://www.digitalindia.gov.in/content/about-programme&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-in-governance-in-india-case-studies'&gt;https://cis-india.org/internet-governance/blog/big-data-in-governance-in-india-case-studies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Vanya Rakesh and Vidushi Marda and Edited by Elonnai Hickok, Sumandro Chattapadhyay and Sunil Abraham</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2017-02-26T16:24:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development">
    <title>Big Data Governance Frameworks for 'Data Revolution for Sustainable Development'</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development</link>
    <description>
        &lt;b&gt;A key component of the process to achieve the Sustainable Development Goals is the call for a global 'data revolution' to better understand, monitor, and implement development interventions. Recently there has been several international proposals to use big data, along with reconfigured national statistical systems, to operationalise this 'data revolution for sustainable development.' This analysis by Meera Manoj highlights the different models of collection, management, sharing, and governance of global development data that are being discussed.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.&lt;/strong&gt; &lt;a href="#1"&gt;What are the Sustainable Development Goals?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.&lt;/strong&gt; &lt;a href="#2"&gt;The Need for a Data Revolution&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.&lt;/strong&gt; &lt;a href="#3"&gt;Big Data: Characteristics and Use for Development&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; &lt;a href="#3-1"&gt;Characteristics of Big Data&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; &lt;a href="#3-2"&gt;Using Big Data for Development&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;4.&lt;/strong&gt; &lt;a href="#4"&gt;Sustainable Development and Data Rights&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.&lt;/strong&gt; &lt;a href="#5"&gt;Governance Frameworks Proposed&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.1.&lt;/strong&gt; &lt;a href="#5-1"&gt;UN Sustainable Development Solutions Network&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.2.&lt;/strong&gt; &lt;a href="#5-2"&gt;The UN DATA Revolution Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.3.&lt;/strong&gt; &lt;a href="#5-3"&gt;Organization for Economic Co-Operation and Development&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.4.&lt;/strong&gt; &lt;a href="#5-4"&gt;The Global Partnership for Sustainable Development of Data&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.5.&lt;/strong&gt; &lt;a href="#5-5"&gt;The World Economic Forum (WEF)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.6.&lt;/strong&gt; &lt;a href="#5-6"&gt;Dr. Julia Lane - A Quadruple Data Helix&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.7.&lt;/strong&gt; &lt;a href="#5-7"&gt;Data Pop Alliance&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;6.&lt;/strong&gt; &lt;a href="#6"&gt;Conclusion&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;7.&lt;/strong&gt; &lt;a href="#7"&gt;Endnotes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;8.&lt;/strong&gt; &lt;a href="#8"&gt;Author Profile&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Speaking on Big Data, Dan Ariely commented that, "&lt;em&gt;Everyone talks about it, nobody really knows how to do it, and everyone thinks everyone else is doing it, so everyone claims they are doing it&lt;/em&gt;" &lt;strong&gt;[1]&lt;/strong&gt;. This offers a useful insight into the lack of adequate discourse on the kind of governance and accountability frameworks that are needed to facilitate the developmental, sustainable, and responsible uses of big data.&lt;/p&gt;
&lt;p&gt;In light of the recent international proposals to use big data to track the Sustainable Development Goals, this paper highlights the different models of management, sharing, and governance of data that are being discussed, and concurrently, how they conceptualise the various rights around big data and how are they to be protected.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="1"&gt;1. What are the Sustainable Development Goals?&lt;/h2&gt;
&lt;p&gt;The Sustainable Development Goals, otherwise known as the Global Goals, build on the Millennium Development Goals (MDGs). Adopted on 1 January 2016, these universally applicable 17 goals  of the 2030 Agenda for Sustainable Development, seek to end all forms of poverty, fight inequalities, tackle climate change and address a range of social needs like education, health, social protection and job opportunities over the next 15 years &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_un-sdg.png" alt="Sustainable Development Goals" /&gt;
&lt;h6&gt;Source: UN Data Revolution Group, &lt;em&gt;&lt;a href="http://www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf"&gt;A World that Counts&lt;/a&gt;&lt;/em&gt;, 2014, p.12.&lt;br /&gt;&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="2"&gt;2. The Need for a Data Revolution&lt;/h2&gt;
&lt;p&gt;An overwhelming cause of concern regarding the precursor to the SDGs, the MDGs, is the data unavailability to monitor their progress. For instance, the figure below indicates that there is no five-year period when the availability of MDG related data is more than 70% of what is required. Entire groups of people and key issues remain invisible &lt;strong&gt;[3]&lt;/strong&gt;. Lack of data is not only a problem for global statisticians, but also for people whose needs and demands remain invisible due to lack of quantitative representation of the same. For instance, the incidences of gender related crimes when not recorded could lead to a misconception on the achievement of the MDG of gender equality.&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_undrg_mdg-data.png" alt="UN Stats - Percentage of MDG data currently available for developing countries by nature of source." /&gt;
&lt;h6&gt;Source: UN, &lt;a href="http://i0.wp.com/www.un.org/sustainabledevelopment/wp-content/uploads/2015/12/english_SDG_17goals_poster_all_languages_with_UN_emblem_1.png"&gt;Sustainable Development Goals&lt;/a&gt;.&lt;br /&gt;&lt;/h6&gt;
&lt;p&gt;As the new goals (SDGs) cover a wider range of issues it is clear that a far higher level of detail is required. To this effect the High-Level Panel of Eminent Persons on the post-2015 agenda has called for a "data revolution for sustainable development" &lt;strong&gt;[4]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The world is experiencing a Data Revolution and a "data deluge." One estimate has it that 90% of the data in the world has been created in the last 2 years. As Eric Schmidt of Google in 2010 famously said, "&lt;em&gt;There were 5 exabytes of information created between the dawn of civilization through 2003, but that much information is now created every 2 days&lt;/em&gt; &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In its report &lt;em&gt;A World that Counts&lt;/em&gt;, the UN Data Revolution Group defines the data revolution as an explosion in the volume of data, the speed with which data are produced, the number of producers of data, the dissemination of data, and the range of things on which there is data, coming from new technologies such as mobile phones and the “internet of things”, and from other sources, such as qualitative data, citizen-generated data and perceptions data &lt;strong&gt;[6]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;This data revolution in the context of sustainable development has been defined by the UN Secretary General’s Independent Expert Advisory Group (IEAG) as follows:&lt;/p&gt;
&lt;blockquote&gt;[T]he integration of data coming from new technologies with traditional data in order to produce relevant high‐quality information with more details and at higher frequencies to foster and monitor sustainable development. This revolution also entails the increase in accessibility to data through much more openness and transparency, and ultimately more empowered people for better policies, better decisions and greater participation and accountability, leading to better outcomes for the people and the planet &lt;strong&gt;[7]&lt;/strong&gt;.&lt;/blockquote&gt;
&lt;p&gt;The majority of such “data coming from new technologies” is what can be called big data. It  is data being generated in real-time, in high velocity and volume, in a variety of forms and formats, and on an increasing range of phenomenon that are being mediated by digital technologies – from governance to human communication. Further, a good part of such big data is not about the content of the phenomenon concerned but about its process – for example, Call Detail Records are generated for each mobile phone call a person makes and it contains data about the process of the call (time, location, duration, recipient, etc.) but not about the content of the call. Big data about various governmental and human processes are becoming a crucial instrument for documenting and monitoring of the same.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="3"&gt;3. Big Data: Characteristics and Use for Development&lt;/h2&gt;
&lt;h3 id="3-1"&gt;3.1. Characteristics of Big Data&lt;/h3&gt;
&lt;p&gt;The simplest definition of big data is that it is a dataset of more than 1 petabyte. The US Bureau of Labour Statistics terms it to be non-sampled data, characterized by the creation of databases from electronic sources whose primary purpose is something other than statistical inference &lt;strong&gt;[8]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The characteristics which broadly distinguish Big Data are sometimes called the “3 V’s”: more volume, more variety and higher rates of velocity &lt;strong&gt;[9]&lt;/strong&gt;. Big data sources generally share some or all of these features &lt;strong&gt;[10]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Digitally generated,&lt;/li&gt;
&lt;li&gt;Passively produced,&lt;/li&gt;
&lt;li&gt;Automatically collected,&lt;/li&gt;
&lt;li&gt;Geographically or temporally trackable, and&lt;/li&gt;
&lt;li&gt;Continuously analysed.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Increasingly, Big Data is recognised as creating "new possibilities for international development" &lt;strong&gt;[11]&lt;/strong&gt;. It could provide faster, cheaper, more granular data and help meet growing and changing demands. It was claimed, for example, that "&lt;em&gt;Google knows or is in a position to know more about France than INSEE&lt;/em&gt;" &lt;strong&gt;[12]&lt;/strong&gt;, its highly resourceful national statistical agency. To illustrate, Global Pulse gives the example of a hypothetical small household facing soaring commodity prices, particularly food and fuel &lt;strong&gt;[13]&lt;/strong&gt;. They have the options of:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Getting part of their food at a nearby World Food Programme distribution centre,&lt;/li&gt;
&lt;li&gt;Reducing mobile usage,&lt;/li&gt;
&lt;li&gt;Temporarily taking their children out of school,&lt;/li&gt;
&lt;li&gt;Calling a health hotline when children show signs of malnutrition related diseases, and&lt;/li&gt;
&lt;li&gt;Venting about their frustration on social media.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Such a systemic shock of food insecurity will prompt thousands of households to react in roughly similar ways. These collective behavioural changes may show up in different digital data sources:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;WFP might record that it serves twice as many meals a day,&lt;/li&gt;
&lt;li&gt;The local mobile operator may see reduced usage,&lt;/li&gt;
&lt;li&gt;UNICEF data may indicate that school attendance has dropped,&lt;/li&gt;
&lt;li&gt;Health hotlines might see increased volumes of calls reporting malnutrition, and&lt;/li&gt;
&lt;li&gt;Tweets mentioning the difficulty to “afford food” might begin to rise.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Thus the power of real-time, digital data to predict paths for development is immense. Amassing such a large volume of data which tracks practically every aspect of social behavious can revolutionize the field of official statistics and policy making.&lt;/p&gt;
&lt;p&gt;Two points to be noted are: 1) all these data sources are not available for comparison in the real-time by default, so one task before using big data in developmental work is to make data from different sources available across agencies and make them comparable, and 2) finding repeating patterns within large data sets, sourced from varied origins, can not only allow for monitoring but also (statistically) predicting future possibilities and implications for development action.&lt;/p&gt;
&lt;h3 id="3-2"&gt;3.2. Using Big Data for Development&lt;/h3&gt;
&lt;p&gt;There are several international organizations attempting to use such data.&lt;/p&gt;
&lt;p&gt;Global Pulse, a United Nations initiative, launched by the Secretary-General in 2009, seeks to leverage innovations in digital data, rapid data collection and analysis to help decision-makers gain a real-time understanding of how crises impact vulnerable populations. To this end, Global Pulse is establishing an integrated, global network of Pulse Labs, anchored in Pulse Lab New York, to pilot the approach at country level &lt;strong&gt;[14]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The Global Working Group on Big Data for Official Statistics, created in May 2014, pursuant to Statistical Commission, makes an inventory of ongoing activities and examples regarding the use of big data, addresses concerns related to methodology, human resources, quality and confidentiality, and develops guidelines on classifying various types of big data sources &lt;strong&gt;[15]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;There have been applications even on a national and individual level. For instance, in 2013, various sources reported that the CIA had admitted to the “full monitoring of Facebook, Twitter, and other social networks” to identify links between events and sequences or paths leading to national security threats, ultimately leading to forecasting future activities and events &lt;strong&gt;[16]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In the field of conflict prevention is the emerging applications to map and analyse unstructured data generated by politically active Internet use by academics, activists, civil society organizations, and even general citizens. In reference to Iran’s post-election crisis beginning in 2009, it is possible to detect web-based usage of terms that reflect a general shift from awareness towards mobilization, and eventually action within the population &lt;strong&gt;[17]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The "Big Data, Small Credit" report proposes that financial inclusion can be promoted by allowing consumers with mobile phones to access credit formally as customers &lt;strong&gt;[18]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;At a national level, the biggest challenge for most big data projects is the limited or restricted access the government agencies have to potential big data sets owned by the private sector &lt;strong&gt;[19]&lt;/strong&gt;. The overall consensus is that Big Data to track SDGs must complement traditional data sources &lt;strong&gt;[20]&lt;/strong&gt;. This is because big data may not always be available for the entire population, or include a diverse enough sample of the population. Moreover most big data projects measure development indicators through a correlation which may not always be correct unlike official data. For instance big data might help in predicting lowered household income through reducing mobile bills while traditional data directly collects income statistics.&lt;/p&gt;
&lt;p&gt;In a survey by the Global Working Group on Big Data for Official Statistics &lt;strong&gt;[21]&lt;/strong&gt;, it was found that only a few countries have developed a long-term vision for the use of big data, while many are formulating a big data strategy.  Most countries have not yet defined business processes for integrating big data sources and results into their work and do not have a defined structure for managing big data projects.&lt;/p&gt;
&lt;p&gt;Thus there exists a need to identify a governance framework for big data for sustainable development, not only at national level, but also at the international level.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="4"&gt;4. Sustainable Development and Data Rights&lt;/h2&gt;
&lt;p&gt;Any discussion on governance frameworks would be incomplete without defining the kind of data rights they must seek to protect.&lt;/p&gt;
&lt;p&gt;In the famous parable of the six blind men and the elephant they conclude that the elephant is like a wall, snake, spear, tree, fan or rope, depending upon where they touch. Similarly Internet experiences of individual users (what they touch) often contrast drastically with different views (what they conclude) on what would constitute data rights.&lt;/p&gt;
&lt;p&gt;The IEAG in its report has identified the following set of data related rights, but has not defined any actual framework or process for ensuring them (yet) &lt;strong&gt;[22]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Right to be counted,&lt;/li&gt;
&lt;li&gt;Right to an identity,&lt;/li&gt;
&lt;li&gt;Right to privacy and to ownership of personal data,&lt;/li&gt;
&lt;li&gt;Right to due process (for example when data is used as evidence in proceedings, or in administrative decisions),&lt;/li&gt;
&lt;li&gt;Freedom of expression,&lt;/li&gt;
&lt;li&gt;Right to participation,&lt;/li&gt;
&lt;li&gt;Right to non-discrimination and equality, and&lt;/li&gt;
&lt;li&gt;Principles of consent.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Personal data is broadly defined as "&lt;em&gt;any information relating to an identified or identifiable individual&lt;/em&gt;" &lt;strong&gt;[23]&lt;/strong&gt;. Often primary data producers (users of services and devices generating data) are unaware of individual privacy infringements &lt;strong&gt;[24]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;A survey by the Global Working Group on Big Data for Official Statistics found that only a few countries have a specific privacy framework for big data, while most apply the privacy framework for traditional statistics to big data as well &lt;strong&gt;[25]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Conventionally, safeguards against the re-use of big data to protect data rights have involved the “anonymization” or “de-identification” of data, to conceal individual identities. Global Pulse, for instance, is putting forth the concept of Data Philanthropy, whereby "&lt;em&gt;corporations take the initiative to anonymize (strip out all personal information) their data sets and provide this data to social innovators to mine the data for insights, patterns and trends in real-time or near real-time&lt;/em&gt;" &lt;strong&gt;[26]&lt;/strong&gt;. There however exists a debate on whether data can actually be anonymized effectively. Several state that data can never be effectively de-anonymized due to technological challenges &lt;strong&gt;[27]&lt;/strong&gt;. For instance, when the New York City government released de-anonymised data sets of New York cab drivers were made re-identifiable by approaching a separate method. Within less than 2 hours work, researchers knew which driver drove every single trip in this entire dataset. It would be even be easy to calculate drivers’ gross income, or infer where they live &lt;strong&gt;[28]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Even the OECD opines that the current model of limiting identifiability of individuals is unsustainable. It recommends moving towards one where the focus is on transparency around how data is being used, rather than preventing specific types of use, stating that - "&lt;em&gt;research funding agencies and data protection authorities should collaborate to develop an internationally recognized framework code of conduct covering the use of new forms of personal data, particularly those generated via network communication. This framework, built on best practice procedures for consent from data subjects, data sharing and re-use, anonymization methods, etc., could be adapted as necessary for specific national circumstances&lt;/em&gt;" &lt;strong&gt;[29]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Thus, there is a push for the arguement that the historical approaches to protecting privacy and confidentiality — namely, &lt;em&gt;informed consent&lt;/em&gt; and &lt;em&gt;anonymity&lt;/em&gt; — no longer hold &lt;strong&gt;[30]&lt;/strong&gt;. Some have even suggested using big data itself to keep track of user permissions for each piece of data to act as a legal contract &lt;strong&gt;[31]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;There is an overall consensus that any legal or regulatory mechanisms set up to mobilise the 'data revolution for sustainable development' should protect the data rights of the people &lt;strong&gt;[32]&lt;/strong&gt;, without any clear agreement on what these rights may be.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="5"&gt;5. Governance Frameworks Proposed&lt;/h2&gt;
&lt;p&gt;A largely unanswered question that is posed in light of the emerging consensus on the use of Big Data for monitoring SDGs is within what sort of governance frameworks these data collection and analysis methods will operate. Methods of collection and the key actors involved in data analysis, management, storage and coordination. The role of NGOs and CSOs, if any, within these systems must be delineated. Certain key global organizations and eminent researchers have suggested the following models.&lt;/p&gt;
&lt;h3 id="5-1"&gt;5.1. UN Sustainable Development Solutions Network&lt;/h3&gt;
&lt;p&gt;In 2012, the UN Secretary-General launched the UN Sustainable Development Solutions Network (SDSN) to mobilize global scientific and technological expertise to promote practical problem solving for sustainable development, including the design and implementation of the Sustainable Development Goals (SDGs) &lt;strong&gt;[33]&lt;/strong&gt;. It has proposed the following.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Inter-Agency and Expert Group on Sustainable Development Goal Indicators (IAEGSDG) and the United Nations Statistical Commission are to establish roadmaps for strengthening specific data collection tools that enable the monitoring of SDG indicators.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Based on discussions with a large number of statistical offices, including Eurostat, BPS Indonesia, the OECD, the Philippines, the UK, and many others, 100 is recommended to be the maximum number of global indicators to analyse data for which NSOs can report and communicate effectively in a harmonized manner. This conclusion was strongly endorsed during the 46th UN Statistical Commission and the Expert Group Meeting on SDG indicators &lt;strong&gt;[34]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Specialist indicators developed by thematic communities must be used for data analysis as they include input and process metrics that are helpful complements to official indicators, which tend to be more outcome-focused. For example, the UN Inter-Agency Group on Child Mortality Estimation has developed a specialist hub responsible for analysing, checking, and improving mortality estimation. This is a leading source for child morality information for both governments and non-governmental actors &lt;strong&gt;[35]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Research arms of private companies such as Microsoft Research, IBM research, SAS, and R&amp;amp;D arms of telecom companies could directly partner with official statistical systems to share sophisticated analysing techniques &lt;strong&gt;[36]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Management&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Four levels of monitoring, national, regional, global, and thematic, should be "&lt;em&gt;organized in an integrated architecture&lt;/em&gt;" &lt;strong&gt;[37]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Countries must decide individually whether official data must be complemented with non-official indicators from big data which can add richness to the monitoring of the SDGs.&lt;/p&gt;
&lt;p&gt;Where possible, regional monitoring should build on existing regional mechanisms, such as the Regional Economic Commissions, the Africa Peer Review Mechanism, or the Asia-Pacific Forum on Sustainable Development &lt;strong&gt;[38]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;To coordinate thematic monitoring under the SDGs, each thematic initiative may have one or more lead specialist agencies or “custodians” as per the IAEG-MDG monitoring processes. Lead agencies would be responsible for convening multi-stakeholder groups, compiling detailed thematic reports, and encouraging ongoing dialogues on innovation. These thematic groups can become testing grounds in launching a data revolution for the SDGs, trialling new measurements and metrics that in time can feed into the global monitoring process with annual reports &lt;strong&gt;[39]&lt;/strong&gt;.&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_unsdsn_monitoring.png" alt="UN Sustainable Development Solutions Network - Schematic illustration with explanation of the indicators for national, regional, global, and thematic monitoring." /&gt;
&lt;h6&gt;Schematic illustration with explanation of the indicators for national, regional, global, and thematic monitoring.&lt;br /&gt;Source: UN Sustainable Development Solutions Network, &lt;em&gt;&lt;a href="http://unsdsn.org/wp-content/uploads/2015/05/150612-FINAL-SDSN-Indicator-Report1.pdf"&gt;Indicators and a Monitoring Framework for the Sustainable Development Goals: Launching a Data Revolution for the SDGs&lt;/a&gt;&lt;/em&gt;, 2015, p.3.&lt;br /&gt;&lt;/h6&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Monitoring the SDG agenda will require substantive improvements in national statistical capacity. Assessments of existing capacity to fulfil SDG monitoring expectations must be undertaken and needs be integrated into National Strategies for the Development of Statistics (NSDSs) &lt;strong&gt;[40]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A Global Partnership for Sustainable Development Data must be established and a World Forum on Sustainable Development Data be convened in 2016 to create mechanisms for ongoing collaboration and innovation.&lt;/p&gt;
&lt;p&gt;A high-level, powerful group of businesses and states must convene the various data and transparency sustainable development initiatives under one umbrella.&lt;/p&gt;
&lt;p&gt;To ensure comparability, Global Monitoring Indicators must be harmonized across countries by one lead technical or specialist agency which will additionally coordinate data standards and collection and provide technical support.&lt;/p&gt;
&lt;p&gt;The following table indicates the suggested Lead Agencies for individual SDGs &lt;strong&gt;[41]&lt;/strong&gt;.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Number&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Sustainable Development Goal&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lead Agencies&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;No Poverty&lt;/td&gt;
&lt;td&gt;World Bank, UNDP, UNSD, UNICEF, ILO, FAO, UN-Habitat, UNISDR, WHO, CRED, UNFPA, and UN Population Division&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;No Hunger&lt;/td&gt;
&lt;td&gt;FAO, WHO, UNICEF, and Internal Fertilizer Industry Associaton (IFA)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;Good Health&lt;/td&gt;
&lt;td&gt;WHO, UN Population Division, UNICEF, World Bank, GAVI, UN AIDS, and UN-Habitat&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;Quality Education&lt;/td&gt;
&lt;td&gt;UNESCO, UNICEF, and World Bank&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;Gender Equality&lt;/td&gt;
&lt;td&gt;UNICEF, UN Women, WHO, UNSD, ILO, UN Population Division, and UNFPA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;Clean Water and Sanitation&lt;/td&gt;
&lt;td&gt;WHO/UNICEF Joint Monitoring Programme (JMP), FAO, UN Water, and UNEP&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;Renewable Energy&lt;/td&gt;
&lt;td&gt;Sustainable Energy for All, IEA, WHO, World Bank, and UNFCC&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8.&lt;/td&gt;
&lt;td&gt;Good Jobs and Economic Growth&lt;/td&gt;
&lt;td&gt;IMF, World Bank, UNSD, and ILO&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.&lt;/td&gt;
&lt;td&gt;Innovation and Infrastructure&lt;/td&gt;
&lt;td&gt;World Bank, OECD, UNIDO, UNFCC, UNESCO, and ITU&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.&lt;/td&gt;
&lt;td&gt;Reduced Inequalities&lt;/td&gt;
&lt;td&gt;UNSD, World Bank, and OECD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.&lt;/td&gt;
&lt;td&gt;Sustainable Cities and Communities&lt;/td&gt;
&lt;td&gt;UN-Habitat, Global City Indicators Facility, WHO, CRED, UNISDR, FAO, and UNEP&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.&lt;/td&gt;
&lt;td&gt;Responsible Consumption&lt;/td&gt;
&lt;td&gt;EITI, UNCTAD, UN Global Compact, FAO, UNEP Ozone Secretariat, WBCSD, GRI, IIRC, and Global Compact&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.&lt;/td&gt;
&lt;td&gt;Climate Action&lt;/td&gt;
&lt;td&gt;OECD DAC, UNFCCC, and IEA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.&lt;/td&gt;
&lt;td&gt;Life below Water&lt;/td&gt;
&lt;td&gt;UNEP-WCMC, IUCN, and FMC&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.&lt;/td&gt;
&lt;td&gt;Life on Land&lt;/td&gt;
&lt;td&gt;FAO, UNEP, IUCN, and UNEP- WCMC&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.&lt;/td&gt;
&lt;td&gt;Peace and Justice&lt;/td&gt;
&lt;td&gt;UNODC, WHO, UNOCHA, UNCHR, IOM, OCHA, OECD, UN Global Compact, EITI, UNCTAD, UNICEF, UNESCO, and Transparency International&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.&lt;/td&gt;
&lt;td&gt;Partnership for the Goals&lt;/td&gt;
&lt;td&gt;BIS, IASB, IFRS, IMF, WIPO, WTO, UNSD, OECD, World Bank, OECD DAC, and SDSN&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="5-2"&gt;5.2. The UN DATA Revolution Group&lt;/h3&gt;
&lt;p&gt;The group constituted by the UN Secretary-General Ban Ki-moon in August 2014, is an Independent Expert Advisory Group with the aim of making concrete recommendations on bringing about a 'data revolution for sustainable development' &lt;strong&gt;[42]&lt;/strong&gt;. In its report, &lt;em&gt;A World that Counts&lt;/em&gt;, it makes the following recommendations &lt;strong&gt;[43]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Clear standards on data collection methods must be developed based on the UN Fundamental Principles of Official Statistics. Periodic audits must be conducted by professional and independent third parties to ensure data quality.&lt;/p&gt;
&lt;p&gt;Governments, civil society, academia and the philanthropic sector must work together strengthening statistical literacy so that all people have capacity to input into and evaluate the quality of data.&lt;/p&gt;
&lt;p&gt;Social entrepreneurs, private sector, academia, media, civil society and other individuals and institutions must be engaged globally with incentives (prizes, data challenges) to encourage data sharing.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A SDGs Analysis and Visualisation Platform is to be set up for fostering private-public partnerships and community-led peer-production efforts for data analysis.&lt;/p&gt;
&lt;p&gt;A dashboard on ”the state of the world” will engage the UN, think-tanks, academics and NGOs in analysing, and auditing data.&lt;/p&gt;
&lt;p&gt;Academics and scientists are to analyse data to provide long-term perspectives, knowledge and data resources at all levels.&lt;/p&gt;
&lt;p&gt;The “Global Forum of SDG-Data Users” will ensure feedback loops between data producers, processors and users to improve the usefulness of data and information produced.&lt;/p&gt;
&lt;p&gt;A “SDGs data lab” to support the development of a first wave of SDG indicators is to be established mobilizing key public, private and civil society data providers, academics and stakeholders working with the Sustainable Development Solutions Network.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Storage&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A “world statistics cloud” will store data and metadata produced by different institutions but according to common standards, rules and specifications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Civil society organisations must share data and processing methods with private and public counterparts on the basis of agreements. They must hold governments and companies accountable using evidence on the impact of their actions, provide feedback to data producers, develop data literacy and help communities and individuals generate and use data.&lt;/p&gt;
&lt;p&gt;NSOs are the central players of the Data Revolution. Their autonomy must be strengthened to maintain data quality.  They must abandon expensive and cumbersome production processes, incorporate new data sources like big data that is human and machine-readable, compatible with geospatial information systems and available quickly enough to ensure that the data cycle matches the decision cycle. Collaborations with the private sector can boost technical and financial investments.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Key stakeholders must create a “Global Consensus on Data”, to adopt principles concerning legal, technical, privacy, geospatial and statistical standards. Best practices related to public data such as the Open Government Partnership (OGP) and the G8 Open Data Charter are recommended foundations for such principles.&lt;/p&gt;
&lt;p&gt;A UN-led “Global Partnership for Sustainable Development Data” is proposed, to coordinate and broker key global public-private partnerships for data sharing &lt;strong&gt;[44]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;A “World Forum on Sustainable Development Data” and “Network of Data Innovation Networks” will be a converging point for the data ecosystem to share ideas and experiences for improvements, innovation and technology transfer.&lt;/p&gt;
&lt;h3 id="5-3"&gt;5.3. Organization for Economic Co-Operation and Development (OECD)&lt;/h3&gt;
&lt;p&gt;The Organisation for Economic Co-operation and Development (OECD) is an inter-governmental organization that seeks to promote policies that will improve the economic and social well-being of people globally. It has made the following proposals &lt;strong&gt;[45]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Data is to be collected from National statistical agencies, national and international researchers and international organisations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;By leveraging the expertise of telecommunications companies and software developers, for instance, national statistical systems could potentially reduce costs and improve the availability of data to monitor development goals &lt;strong&gt;[46]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;National Data Forums for Social Science Data must be created for the development of social science data for  improved coordination between social scientists, data producers (national statistical agencies, government departments, large private sector businesses and sources undertaking academic direction), and data curators.&lt;/p&gt;
&lt;p&gt;Social science research communities must contribute to national plans of action after a needs assessment &lt;strong&gt;[47]&lt;/strong&gt;. Research funding agencies must collaborate at the international level for a common system for referencing datasets in research publications &lt;strong&gt;[48]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 id="5-4"&gt;5.4. The Global Partnership for Sustainable Development of Data&lt;/h3&gt;
&lt;p&gt;The partnership is a global network of governments, NGOs, and businesses working to strengthen the inclusivity, trust, and innovation in the way that data is used to address the world’s sustainable development efforts &lt;strong&gt;[49]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There must be a common framework for information processing. At minimum, a simple lexicon must tag each datum specifying:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;What:&lt;/strong&gt; i.e. the type of information contained in the data,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Who:&lt;/strong&gt; the observer or reporter,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;How:&lt;/strong&gt; the channel through which the data was acquired,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;How much:&lt;/strong&gt; whether the data is quantitative or qualitative, and&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Where and when:&lt;/strong&gt; the spatio-temporal granularity of the data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Analysis of data involves filtering relevant information, summarising keywords and categorising into indicators. This intensive mining of socioeconomic data, known as “reality mining,” can be done by: (1) Continuous analysis of real time streaming data, (2) Digestion of semi-structured and unstructured data to determine perceptions, needs and wants. (3) Real-time correlation of streaming data with slowly accessible historical data repositories.&lt;/p&gt;
&lt;p&gt;Use of big data for developmental goals can draw upon all three techniques to various degrees depending on availability of data and the specific needs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;NSOs have a pivotal part to play in the data revolution. Countries and organizations believe that big data cannot replace traditional official statistical data as it is based more on perception than facts. To quote Winston Churchill, "&lt;em&gt;Do not trust any statistics that you did not fake yourself&lt;/em&gt;."&lt;/p&gt;
&lt;p&gt;For instance, a study found that Google Flu Trends, to detect influenza epidemics, predicted nonspecific flu-like respiratory illnesses well but not actual flu. The mismatch was due to popular misconceptions on influenza symptoms. This has important policy implications. Doctors using Google Flu Trends may overstock on flu vaccines or be overly inclined to diagnose normal respiratory illnesses as influenza &lt;strong&gt;[50]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;However Big Data if understood correctly, can inform where further targeted investigation is necessary and give immediate responses to favourably change outcomes.&lt;/p&gt;
&lt;h3 id="5-5"&gt;5.5. The World Economic Forum (WEF)&lt;/h3&gt;
&lt;p&gt;The WEF is an International Organization for Public-Private Cooperation. It engages the foremost political, business and other leaders of society to shape global, regional and industry agendas &lt;strong&gt;[51]&lt;/strong&gt;. In the report titled &lt;em&gt;Big Data, Big Impact: New Possibilities for International Development&lt;/em&gt;, it makes the following recommendations &lt;strong&gt;[52]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Data production and development actors include individuals, public sector and the private sector. Each produce different kinds of data that have unique requirements. The private sector maintains vast troves of transactional data, much of which is "data exhaust," or data created as a by-product of other transactions. The public sector maintains enormous datasets in the form of census data, health indicators, and tax and expenditure information. The following figure highlights the different kinds of data that each sector collects and what incentives they have to share the data along with requirements to maintain such data.&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_wef_01.png" alt="" /&gt;
&lt;h6&gt;World Economic Forum - Diagram on Data Commons.&lt;br /&gt;
Source: World Economic Forum, &lt;em&gt;&lt;a href="http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf"&gt;Big Data, Big Impact: New Possibilities for International Development&lt;/a&gt;&lt;/em&gt;, 2012, p.4.&lt;br /&gt;&lt;/h6&gt;
&lt;p&gt;Business models must be created to provide the appropriate incentives for private-sector actors to share data. Such models already exist in the Internet environment. For instance companies in search and social networking profit from products they offer at no charge to end users because the usage data these products generate is valuable to other ecosystem actors. Similar models could be created in garnering Big Data for SDGs. The following flowchart illustrates how different sectors must work together to incentivise data collection and sharing.&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_wef_02.png" alt="" /&gt;
&lt;h6&gt;World Economic Forum - Diagram on Global Coordination.&lt;br /&gt;
Source: World Economic Forum, &lt;em&gt;&lt;a href="http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf"&gt;Big Data, Big Impact: New Possibilities for International Development&lt;/a&gt;&lt;/em&gt;, 2012, p.7.&lt;br /&gt;&lt;/h6&gt;
&lt;h3 id="5-6"&gt;5.6. Dr. Julia Lane - A Quadruple Data Helix&lt;/h3&gt;
&lt;p&gt;Dr. Julia Lane is a Professor in the Wagner School of Public Policy at New York University; and also a Provostial Fellow in Innovation Analytics and a Professor in the Center for Urban Science and Policy &lt;strong&gt;[53]&lt;/strong&gt;. She has done extensive research on the uses of big data. In her paper titled "Big Data for Public Policy: A Quadruple Data Helix," she makes the following suggestions &lt;strong&gt;[54]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the future there will exist a model of a quadruple data helix for data collection which will have four strands — state and city agencies, universities, private data providers, and federal agencies.i&lt;/p&gt;
&lt;p&gt;A new set of institution, city/university data facilities, must be established. These institutions should form the backbone of the quadruple helix, with direct connections to the private sector and to the federal statistical agencies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is a need for graduate training for non-traditional students, who need to understand how to use data science tools as part of their regular employment. They must identify and capture the appropriate data, understand how data science models and tools can be applied, and determine how associated errors and limitations can be identified from a social science perspective.i&lt;/p&gt;
&lt;p&gt;Universities can act as a trusted independent third party to process, store, analyze, and disseminate data. ii&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Management&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The new infrastructure must ensure that data from disparate sources are collected managed and used in a manner that is informed by end users. There are many technical challenges: disparate data sets must be ingested, their provenance determined, and metadata documented. Researchers must be able to query data sets to know what data are available and how they can be used. And if data sets are to be joined, they must be joined in a scientific manner, which means that workflows need to be traced and managed in such a way that the research can be replicated.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The role of State and City agencies is to address immediate policy issues, rather than to build long-term data infrastructures as their mandate is to work with city data than the full spectrum of available data.&lt;/p&gt;
&lt;h3 id="5-7"&gt;5.7. Data-Pop Alliance&lt;/h3&gt;
&lt;p&gt;Data-Pop Alliance is a global coalition on Big Data and development created by the Harvard Humanitarian Initiative, MIT Media Lab, and Overseas Development Institute that brings together researchers, experts, practitioners, and activists to promote a people-centred big data revolution through collaborative research, capacity building, and community engagement &lt;strong&gt;[55]&lt;/strong&gt;. It makes the following suggestions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The idea of &lt;em&gt;shared responsibility&lt;/em&gt; between the public and private sector is a proposed operational principles to create a deliberative space. Mechanisms and legal frameworks must be devised for private companies to share their big data under formalized and stable arrangements instead of being compelled by ad hoc requests from researchers and policymakers.&lt;/p&gt;
&lt;p&gt;The media too, could avoid publishing statistical data collected by unexplained methodologies by employing "statistical editors" and disseminate verified information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For official statistics, engaging with Big Data is not a technical consideration but a political obligation. In a two tier system of official and non-official statistics, the public and investors tend to distrust official figures. For instance, the results of the 2010 census in the UK are being disputed on the basis of sewage data.&lt;/p&gt;
&lt;p&gt;It is imperative for NSOs to retain, or regain, their primary role as the legitimate custodian of knowledge and creator of a deliberative public space to democratically drive human development &lt;strong&gt;[56]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="6"&gt;6. Conclusion&lt;/h2&gt;
&lt;p&gt;The Big data frameworks provide some useful insights on monitoring mechanisms though some questions remain unanswered in each model. Key actors that have been proposed include city and state agencies like NSOs, private companies, social scientists, private individuals and international research agencies. Data analysis can be through public-private collaborations, data philanthropy, and using indicators by thematic communities.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There appears consensus across models that collection must be effected through public private partnerships while providing incentives.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;While several methods of analysis have been proposed by the Global Partnership it is unclear on who will be conducting the analysis. The UNSDSN has suggested that it be conducted by academics and scientists with Julia Lane stating it must be through public private partnerships which appear more feasible and transparent.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;All frameworks agree on the pivotal role of NSOs and acknowledge them as the key players and coordinators at the national level. They must be strengthened financially, technologically and politically. Most frameworks seek to empower national agencies which will coordinate collaborations with the private sector through incentives while protecting personal data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Several international fora have been proposed to enable coordination while there is consensus that the NSOs. A Global Partnership for Sustainable Development Data, a Global Consensus on Data and a World Forum on Sustainable Development Data have been suggested. UN organizations appear to be suggesting more responsibility for those in the UN framework with UNSDSN giving an extensive list of lead agencies (UNDP, UN Women, Who etc) while the WEF emphasises on the private sector, Data Pop Alliance on NSOs, and Prof. Lane on State and City agencies.&lt;/p&gt;
&lt;p&gt;On an international level countries can opt to join international organization that are being setup for the purpose. It remains to be seen whether all countries globally can achieve such a feat in a coordinated manner without infringing on data rights when unanswerable to any set international organization. The burden appears to fall on civil society and market forces within the private sector to regulate this process. For instance when a private sector company starts providing large un-anonymized data sets for government use, the privacy concerns of civil society that result in them opting for the company’s competitor’s more privacy friendly products will result in a regulation through market forces. However these forces may have disparate strengths in different contexts and countries depending on market practices and information asymmetry resulting in the lack of a uniform accountability mechanism.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="7"&gt;7. Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; Dan Ariely, Facebook, January 06, 2013, &lt;a href="https://www.facebook.com/dan.ariely/posts/904383595868"&gt;https://www.facebook.com/dan.ariely/posts/904383595868&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; United Nations Organizations,&amp;nbsp;'Sustainable Development Goals'&amp;nbsp;(United Nations Sustainable Development,&amp;nbsp;26 September 2015), &lt;a href="http://www.un.org/sustainabledevelopment/sustainable-development-goals/"&gt;http://www.un.org/sustainabledevelopment/sustainable-development-goals/&lt;/a&gt;,&amp;nbsp;accessed 6 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; Data Revolution Group,&amp;nbsp;'A World that Counts: Mobilising the Data Revolution for Sustainable Development'&amp;nbsp;(November 2014), &lt;a href="http://www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf"&gt;http://www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf&lt;/a&gt;,&amp;nbsp;accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; High level panel on the post-2015 development agenda ,&amp;nbsp;'A New Global Partnership: Eradicate Poverty and Transform Economies through Sustainable Development'(Post2015hlp,0rg,&amp;nbsp;July 2012),&amp;nbsp;&lt;a href="http://www.post2015hlp.org/"&gt;http://www.post2015hlp.org/&lt;/a&gt;,&amp;nbsp;accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; Gary King,&amp;nbsp;'Ensuring the Data-Rich Future of the Social Sciences' [2011] 3(2) Science,&amp;nbsp;&lt;a href="http://gking.harvard.edu/files/datarich.pdf"&gt;http://gking.harvard.edu/files/datarich.pdf&lt;/a&gt;,&amp;nbsp;accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; Michael Horrigan,&amp;nbsp;'Big Data: A Perspective from the BLS'&amp;nbsp;(Amstatorg,&amp;nbsp;1 January 2013) &lt;a href="http://magazine.amstat.org/blog/2013/01/01/sci-policy-jan2013/"&gt;http://magazine.amstat.org/blog/2013/01/01/sci-policy-jan2013/&lt;/a&gt;,&amp;nbsp;accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; UN Global Pulse,&amp;nbsp;'Big Data for Development: Challenges &amp;amp; Opportunities'&amp;nbsp;(6 May 2012) &lt;a href="http://www.unglobalpulse.org/sites/default/files/BigDataforDevelopment-UNGlobalPulseJune2012.pdf"&gt;http://www.unglobalpulse.org/sites/default/files/BigDataforDevelopment-UNGlobalPulseJune2012.pdf&lt;/a&gt;,&amp;nbsp;accessed 5 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; Emmanuel Letouzé and Johannes Jütting, 'Official Statistics, Big Data and Human Development: Towards a New Conceptual and Operational Approach' (2014) 12(3), Data-Pop Alliance White papers Series, &lt;a href="https://www.odi.org/sites/odi.org.uk/files/odi-assets/events-documents/5161.pdf"&gt;https://www.odi.org/sites/odi.org.uk/files/odi-assets/events-documents/5161.pdf&lt;/a&gt;, accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; See &lt;strong&gt;[9]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; See &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[13]&lt;/strong&gt; See &lt;strong&gt;[9]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[14]&lt;/strong&gt; UN Global Pulse, 'About: United Nations Global Pulse' (2016) &lt;a href="http://www.unglobalpulse.org/about-new"&gt;http://www.unglobalpulse.org/about-new&lt;/a&gt;, accessed 7 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[15]&lt;/strong&gt; UN Stats, 'Global Working Group' (2014) &lt;a href="http://unstats.un.org/unsd/bigdata/"&gt;http://unstats.un.org/unsd/bigdata/&lt;/a&gt;, accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[16]&lt;/strong&gt; New York City Press Release, ‘Mayor Bloomberg, Police Commissioner Kelly and Microsoft Unveil New, State-of-the-Art Law Enforcement Technology that Aggregates and Analyzes Existing Public Safety Data in Real Time to Provide a Comprehensive View of Potential Threats and Criminal Activity’ (New York City, 8 August 2012), &lt;a href="http://www1.nyc.gov/office-of-the-mayor/news/291-12/mayor-bloomberg-police-commissioner-kelly-microsoft-new-state-of-the-art-law"&gt;http://www1.nyc.gov/office-of-the-mayor/news/291-12/mayor-bloomberg-police-commissioner-kelly-microsoft-new-state-of-the-art-law&lt;/a&gt;, accessed 2 July 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[17]&lt;/strong&gt; Francesco Mancini,&amp;nbsp;'New Technology and the Prevention of Violence and Conflict'&amp;nbsp;(Reliefwebint,&amp;nbsp;April 2013),&amp;nbsp;&lt;a href="http://reliefweb.int/sites/reliefweb.int/files/resources/ipi-e-pub-nw-technology-conflict-prevention-advance.pdf"&gt;http://reliefweb.int/sites/reliefweb.int/files/resources/ipi-e-pub-nw-technology-conflict-prevention-advance.pdf&lt;/a&gt;,&amp;nbsp;accessed 2 July 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[18]&lt;/strong&gt; Arjuna Costa, Anamitra Deb, and Michael Kubzansky, 'Big Data, Small Credit: The Digital Revolution and Its Impact on Emerging Market Consumers,'&amp;nbsp;(Omidyar,&amp;nbsp;3 March 2013) &lt;a href="https://www.omidyar.com/sites/default/files/file_archive/insights/Big%20Data,%20Small%20Credit%20Report%202015/BDSC_Digital%20Final_RV.pdf"&gt;https://www.omidyar.com/sites/default/files/file_archive/insights/Big%20Data,%20Small%20Credit%20Report%202015/BDSC_Digital%20Final_RV.pdf&lt;/a&gt;,&amp;nbsp;accessed 2 July 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[19]&lt;/strong&gt; United Nations Economic and Social Council, 'Report of the Global Working Group on Big Data for Official Statistics' (UN Stats, 3 March 2015), &lt;a href="http://unstats.un.org/unsd/statcom/doc15/2015-4-BigData-E.pdf"&gt;http://unstats.un.org/unsd/statcom/doc15/2015-4-BigData-E.pdf&lt;/a&gt;, accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[20]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[21]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[22]&lt;/strong&gt; See &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[23]&lt;/strong&gt; OECD, 'OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data' (23 September 1980), &lt;a href="http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm"&gt;http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm&lt;/a&gt;, accessed 29 May 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[24]&lt;/strong&gt; Amir Efrati, ''Like' Button Follows Web Users' (WSJ, 18 May 2011) &lt;a href="http://www.wsj.com/articles/SB10001424052748704281504576329441432995616"&gt;http://www.wsj.com/articles/SB10001424052748704281504576329441432995616&lt;/a&gt;, accessed 23 May 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[25]&lt;/strong&gt; See &lt;strong&gt;[15]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[26]&lt;/strong&gt; Robert Kirkpatrick,&amp;nbsp;'Data Philanthropy: Public and Private Sector Data Sharing for Global Resilience' (UN Global Pulse, 16 September 2011), &lt;a href="http://www.unglobalpulse.org/blog/data-philanthropy-public-private-sector-data-sharing-global-resilience"&gt;http://www.unglobalpulse.org/blog/data-philanthropy-public-private-sector-data-sharing-global-resilience&lt;/a&gt;,&amp;nbsp;accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[27]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[28]&lt;/strong&gt; Arvind Narayanan,&amp;nbsp;'No silver bullet: De-identification still doesn't work' (1 April 2016),&amp;nbsp;&lt;a href="http://randomwalker.info/publications/no-silver-bullet-de-identification.pdf"&gt;http://randomwalker.info/publications/no-silver-bullet-de-identification.pdf&lt;/a&gt;,&amp;nbsp;accessed 3 July 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[29]&lt;/strong&gt; OECD Global Science Forum,&amp;nbsp;'New Data for Understanding the Human Condition: International Perspectives,'&amp;nbsp;(February 2013)&amp;nbsp;&lt;a href="http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf"&gt;http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf&lt;/a&gt;,&amp;nbsp;accessed 2 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[30]&lt;/strong&gt; S. Barocas,&amp;nbsp;'The Limits of Anonymity and Consent in the Big Data Age,'&amp;nbsp;in&amp;nbsp;&lt;em&gt;Privacy, Big Data, and the public good: Frameworks for Engagement&lt;/em&gt;&amp;nbsp;(Cambridge University Press, 2014).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[31]&lt;/strong&gt; A. Pentland,&amp;nbsp;'Institutional Controls: The New Deal on Data,'&amp;nbsp; in &lt;em&gt;Privacy, Big Data, and the public good: Frameworks for Engagement&lt;/em&gt; (Cambridge University Press, 2014).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[32]&lt;/strong&gt; See &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[33]&lt;/strong&gt; UN Sustainable Development Solutions Network,&amp;nbsp;'About Us: Vision and Organization'&amp;nbsp;(2012)&amp;nbsp;&lt;a href="http://unsdsn.org/about-us/vision-and-organization/"&gt;http://unsdsn.org/about-us/vision-and-organization/&lt;/a&gt;,&amp;nbsp;accessed 2 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[34]&lt;/strong&gt; UN Sustainable Development Solutions Network,&amp;nbsp;'Indicators and a Monitoring Framework for the Sustainable Development Goals: Launching a data revolution for the SDGs' (12 June 2015) &lt;a href="http://unsdsn.org/wp-content/uploads/2015/05/150612-FINAL-SDSN-Indicator-Report1.pdf"&gt;http://unsdsn.org/wp-content/uploads/2015/05/150612-FINAL-SDSN-Indicator-Report1.pdf&lt;/a&gt;, accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[35]&lt;/strong&gt; UNICEF,&amp;nbsp;'CME Info - Child Mortality Estimates' (2014) &lt;a href="http://www.childmortality.org/"&gt;http://www.childmortality.org/&lt;/a&gt;, accessed 1 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[36]&lt;/strong&gt; See &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[37]&lt;/strong&gt; UNESCO,&amp;nbsp;'Technical report by the Bureau of the United Nations Statistical Commission (UNSC) on the process of the development of an indicator framework for the goals and targets of the post-2015 development agenda' (6 March 2015)&amp;nbsp;&lt;a href="http://www.uis.unesco.org/ScienceTechnology/Documents/unsc-post-2015-draft-indicators.pdf"&gt;http://www.uis.unesco.org/ScienceTechnology/Documents/unsc-post-2015-draft-indicators.pdf&lt;/a&gt;, accessed 3 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[38]&lt;/strong&gt; UN, 'The Road to Dignity by 2030: Ending Poverty, Transforming All Lives and Protecting the Planet '&amp;nbsp;(4 December 2014) &lt;a href="http://www.un.org/disabilities/documents/reports/SG_Synthesis_Report_Road_to_Dignity_by_2030.pdf"&gt;http://www.un.org/disabilities/documents/reports/SG_Synthesis_Report_Road_to_Dignity_by_2030.pdf&lt;/a&gt;,&amp;nbsp;accessed 7 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[39]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[40]&lt;/strong&gt; UN Sustainable Development Solutions Network,&amp;nbsp;'Data for Development: An Action Plan to Finance the Data Revolution for Sustainable Development'&amp;nbsp;(10 July 2015)&amp;nbsp;&lt;a href="http://unsdsn.org/wp-content/uploads/2015/04/Data-For-Development-An-Action-Plan-July-2015.pdf"&gt;http://unsdsn.org/wp-content/uploads/2015/04/Data-For-Development-An-Action-Plan-July-2015.pdf&lt;/a&gt;,&amp;nbsp;accessed 3 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[41]&lt;/strong&gt; See &lt;strong&gt;[34]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[42]&lt;/strong&gt; UN Data Revolution Group,&amp;nbsp;'About the Independent Expert Advisory Group'&amp;nbsp;(6 November 2014) &lt;a href="http://www.undatarevolution.org/about-ieag/"&gt;http://www.undatarevolution.org/about-ieag/&lt;/a&gt;, accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[43]&lt;/strong&gt; See &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[44]&lt;/strong&gt; The Partnership has already been established, and it is developing a further framework.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[45]&lt;/strong&gt; Organisation for Economic Co-Operation and Development),&amp;nbsp;'The Organisation for Economic Co-operation and Development (OECD): About' (2016) &lt;a href="http://www.oecd.org/about/"&gt;http://www.oecd.org/about/&lt;/a&gt;, accessed 2 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[46]&lt;/strong&gt; Organisation for Economic Co-Operation and Development,&amp;nbsp;'Strengthening National Statistical Systems to Monitor Global Goals' (2015) &lt;a href="http://www.oecd.org/dac/POST-2015%20P21.pdf"&gt;http://www.oecd.org/dac/POST-2015%20P21.pdf&lt;/a&gt;, accessed 1 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[47]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[48]&lt;/strong&gt; OECD Global Science Forum,&amp;nbsp;'New Data for Understanding the Human Condition: International Perspectives'&amp;nbsp;(February 2013)&amp;nbsp;&lt;a href="http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf"&gt;http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf&lt;/a&gt;,&amp;nbsp;accessed 2 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[49]&lt;/strong&gt; The Global Partnership On Sustainable Development Data,&amp;nbsp;'Who We Are: The Data Ecosystem and the Global Partnership'&amp;nbsp;(2016) &lt;a href="http://www.data4sdgs.org/who-we-are/"&gt;http://www.data4sdgs.org/who-we-are/&lt;/a&gt;,&amp;nbsp;accessed 5 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[50]&lt;/strong&gt; World Economic Forum,&amp;nbsp;'Big Data, Big Impact: New Possibilities for International Development'&amp;nbsp;(22 January 2012) &lt;a href="http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf"&gt;http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf&lt;/a&gt;,&amp;nbsp;accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[51]&lt;/strong&gt; World Economic Forum,&amp;nbsp;'Our Mission: The World Economic Forum'&amp;nbsp;(12 January 2016) &lt;a href="https://www.weforum.org/about/world-economic-forum/"&gt;https://www.weforum.org/about/world-economic-forum/&lt;/a&gt;,&amp;nbsp;accessed 7 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[52]&lt;/strong&gt; See &lt;strong&gt;[50]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[53]&lt;/strong&gt; Julia Lane, Homepage, &lt;a href="http://www.julialane.org/"&gt;http://www.julialane.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[54]&lt;/strong&gt; Julia Lane,&amp;nbsp;'Big Data for Public Policy: The Quadruple Helix'&amp;nbsp;(2016)&amp;nbsp;8(1)&amp;nbsp;&lt;em&gt;Journal of Policy Analysis and Management&lt;/em&gt;,&amp;nbsp;&lt;a href="http://onlinelibrary.wiley.com/doi/10.1002/pam.21921/abstract"&gt;DOI:10.1002/pam.21921&lt;/a&gt;,&amp;nbsp;accessed 1 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[55]&lt;/strong&gt; Data-Pop Alliance,&amp;nbsp;'Data-Pop Alliance: Our Mission'&amp;nbsp;(May 2014) &lt;a href="http://datapopalliance.org/"&gt;http://datapopalliance.org/&lt;/a&gt;,&amp;nbsp;accessed 1 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[56]&lt;/strong&gt; See &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="8"&gt;8. Author Profile&lt;/h2&gt;
&lt;p&gt;Meera Manoj is a law student at the Gujarat National Law University, Gandhinagar and has completed her first year. She is passionate about civil rights, feminism, economics in law and anything involving paneer. She aspires to travel the world and build up a vast library, with unparalleled sections on International Law and Archie comics.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development'&gt;https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Meera Manoj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>Sustainable Development Goals</dc:subject>
    

   <dc:date>2016-07-05T13:13:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/telangana-today-november-8-2017-alekhya-hanumanthu-big-data-for-governance">
    <title>Big Data for governance</title>
    <link>https://cis-india.org/internet-governance/news/telangana-today-november-8-2017-alekhya-hanumanthu-big-data-for-governance</link>
    <description>
        &lt;b&gt;Recent times have witnessed an explosion of data as users started leaving a huge data footprint everywhere they go. Interestingly, this period has seen a phenomenal increase in computing power couple by a drop in costs of storage.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Alekhya Hanumanthu was published in &lt;a class="external-link" href="https://telanganatoday.com/big-data-governance"&gt;Telangana Today&lt;/a&gt; on November 4, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;India is now sitting on the data so generated and subjecting it to data analytics for uses in various sectors like insurance, education, healthcare, governance, so on and so forth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Centre for Internet and Society (CIS), in 2015, the Government of Narendra Modi launched Digital India Programme to ensure availability of government services to citizens electronically by improving online infrastructure and Internet connectivity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amongst other things, e-Governance and e-Kranti intend to reform  governance through technology and enable electronic delivery of  services. Needless to say, it will involve large scale digitisation,  electronic collection of data from residents and processing. The Big  data so created will help policy making evolve into a data backed,  action oriented initiative with accountability asserted where it is due.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Let’s take a look at some Big Data based initiatives underway according to analyticsindiamag:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Project insight:&lt;/b&gt; Undertaken up by Indian tax  agencies, Project Insight is an advanced analytical tool that is a  comprehensive platform that encourages compliance of tax while at the  same time it prevents non-compliance. Significantly, it will be used to  detect fraud, support investigations and provide insights for policy  making. For instance, it will detect the social media activity of a  person to glean their spending and check if it is commensurate with the  tax they have paid during that year. Needless to say, this will also  unearth sources of black money.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Economic Development Board in Andhra:&lt;/b&gt; CORE-CM Office  Realtime Executive Dashboard is an integrated dashboard established to  monitor category-wise key performance indicators of various  departments/schemes in real time. Users can check key performance  indicators of various departments, schemes, initiatives, programmes,  etc. With a panoply of services information ranging from Women and Child  Welfare to Street lights monitoring, it has become an exemplary role  model of governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Geo-tagging of assets under Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA):&lt;/b&gt; Under the guidance of Narendra Modi, online monitoring of assets to  check leakages Ministry of Rural development was started. To achieve  this, they were tied up with ISRO and National Informatics Centre to geo  tag MGNREGA assets. According to India Today, the assets created range  from plantations, rural infrastructure, water harvesting structures,  flood control measures such as check dams etc. To do this, a junior  engineer takes a photo of an asset and uploads it on the Bhuvan web  portal run by ISRO’s National Remote Sensing Centre via a mobile app.  Once a photo is uploaded, time and location gets encrypted  automatically. Thus, the Government hopes to hold an ironclad control of  the resources thus disseminated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CAG’s centre for Data Management and Analytics:&lt;/b&gt; According to Comptroller and Auditor General of India, The CAG’s Centre  for Data Management and Analytics (CDMA) is going to play a catalytic  role to synthesise and integrate relevant data into auditing process.  According to an announcement on National Informatics Centre (NIC), it  aims to build up capacity in the Indian Audit and Accounts Department in  Big Data Analytics to explore the data rich environment at the Union  and State levels. What’s more, this initiative of CAG of India, puts it  amongst the pioneers in institutionalising data analytics in government  audit in the international community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Task Force to spruce up Employment Data:&lt;/b&gt; The data  provided by Labour Bureau is limited and not timely enough for  policymakers to assess the need for job creation. To address this gap,  the Government has set up a committee tasked to fill the employment data  gap and ensure the timely availability of reliable information  regarding job creation. Thus the top line of Government has a direct  view of where the employment gaps are so that it can facilitate creation  of appropriate jobs.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What’s the big picture?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Policy making and governance by Indian government have traditionally  been rife with red tape, bureaucracy and corruption. Lack of  accountability on part of Government workforce not only impacted the  quantity and quality of work delivered but also invited corrupt  practices and leakages. So, Big data is a welcome change in direction.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/telangana-today-november-8-2017-alekhya-hanumanthu-big-data-for-governance'&gt;https://cis-india.org/internet-governance/news/telangana-today-november-8-2017-alekhya-hanumanthu-big-data-for-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2017-11-08T01:42:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011">
    <title>Big Data and the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011</link>
    <description>
        &lt;b&gt;Experts and regulators across jurisdictions are examining the impact of Big Data practices on traditional data protection standards and principles. This will be a useful and pertinent exercise for India to undertake as the government and the private and public sectors begin to incorporate and rely on the use of Big Data in decision making processes and organizational operations.This blog provides an initial evaluation of how Big Data could impact India's current data protection standards.&lt;/b&gt;
        &lt;p&gt;Experts and regulators across the globe are examining the impact of Big Data practices on traditional data protection standards and principles. This will be a useful and pertinent exercise for India to undertake as the government and the private and public sectors begin to incorporate and rely on the use of Big Data in decision making processes and organizational operations.&lt;/p&gt;
&lt;p&gt;Below is an initial evaluation of how Big Data could impact India's current data protection standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India currently does not have comprehensive privacy legislation - but the Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules 2011 formed under section 43A of the Information Technology Act 2000&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; define a data protection framework for the processing of digital data by Body Corporate. Big Data practices will impact a number of the provisions found in the Rules:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Scope of Rules: &lt;/b&gt;Currently the Rules apply to Body Corporate and digital data. As per the IT Act, Body Corporate is defined as &lt;i&gt;"Any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities."&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The present scope of the Rules excludes from its purview a number of actors that do or could have access to Big Data or use Big Data practices. The Rules would not apply to government bodies or individuals collecting and using Big Data. Yet, with technologies such as IoT and the rise of Smart Cities across India – a range of government, public, and private organizations and actors could have access to Big Data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Definition of personal and sensitive personal data: &lt;/b&gt;Rule 2(i) defines personal information as &lt;i&gt;"information that relates to a natural person which either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person."&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Rule 3 defines sensitive personal information as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Password,&lt;/li&gt;
&lt;li&gt;Financial information,&lt;/li&gt;
&lt;li&gt;Physical/physiological/mental health condition,&lt;/li&gt;
&lt;li&gt;Sexual orientation,&lt;/li&gt;
&lt;li&gt;Medical records and history,&lt;/li&gt;
&lt;li&gt;Biometric information&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The present definition of personal data hinges on the factor of identification (data that is capable of identifying a person). Yet this definition does not encompass information that is associated to an already identified individual - such as habits, location, or activity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The definition of personal data also addresses only the identification of 'such person' and does not address data that is related to a particular person but that also reveals identifying information about another person - either directly - or when combined with other data points.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By listing specific categories of sensitive personal information, the Rules do not account for additional types of sensitive personal information that might be generated or correlated through the use of Big Data analytics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, the definitions of sensitive personal information or personal information do not address how personal or sensitive personal information - when anonymized or aggregated – should be treated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Consent&lt;/b&gt;: Rule 5(1) requires that Body Corporate must, prior to collection, obtain consent in writing through letter or fax or email from the provider of sensitive personal data regarding the use of that data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a context where services are delivered with little or no human interaction, data is collected through sensors, data is collected on a real time and regular basis, and data is used and re-used for multiple and differing purposes - it is not practical, and often not possible, for consent to be obtained through writing, letter, fax, or email for each instance of data collection and for each use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notice of Collection: &lt;/b&gt;Rule 5(3) requires Body Corporate to provide the individual with a notice during collection of information that details the fact that information is being collected, the purpose for which the information is being collected, the intended recipients of the information, the name and address of the agency that is collecting the information and the agency that will retain the information. Furthermore body corporate should not retain information for longer than is required to meet lawful purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this provision acts as an important element of transparency, in the context of Big Data, communicating the purpose for which data is collected, the intended recipients of the information, the name and address of the agency that is collecting the information and the agency that will retain the information could prove to be difficult to communicate as they are likely to encompass numerous agencies and change depending upon the analysis being done.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access and correction&lt;/b&gt;: Rule 5(6) provides individuals with the ability to access sensitive personal information held by the body corporate and correct any inaccurate information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision would be difficult to implement effectively in the context of Big Data as vast amounts of data are being generated and collected on an ongoing and real time basis and often without the knowledge of the individual.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Purpose Limitation:&lt;/b&gt; Rule 5(5) requires that body corporate should use information only of the purpose which it has been collected.&lt;/p&gt;
&lt;p&gt;In the context of Big Data this provision would overlook the re-use of data that is inherent in such practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security:&lt;/b&gt; Rule 8 states that any Body Corporate or person on its behalf will be understood to have complied with reasonable security practices and procedures if they have implemented such practices and have in place codes that address managerial, technical, operational and physical security control measures. These codes could follow the IS/ISO/IEC 27001 standard or another government approved and audited standard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision importantly requires that data controllers collecting and processing data have in place strong security practices. In the context of Big Data – the security of devices that might be generating or collecting data and algorithms processing and analysing data is critical. Once generated, it might be challenging to ensure the data is being transferred to or being analysed by organisations that comply with such security practices as listed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Breach&lt;/b&gt; : Rule 8 requires that if a data breach occurs, Body Corporate would have to be able to demonstrate that they have implemented their documented information security codes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this provision holds a company accountable for the implementation of security practices, it does not address how a company should be held accountable for a large scale data breach as in the context of Big Data the scope and impact of a data breach is on a much larger scale.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Opt in and out and ability to withdraw consent&lt;/b&gt; : Rule 5(7) requires Body Corporate or any person on its behalf, prior to the collection of information - including sensitive personal information - must give the individual the option of not providing information and must give the individual the option of withdrawing consent. Such withdrawal must be sent in writing to the body corporate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The feasibility of such a provision in the context of Big Data is unclear, especially in light of the fact that Big Data practices draw upon large amounts of data, generated often in real time, and from a variety of sources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure of Information&lt;/b&gt;: Rule 6 maintains that disclosure of sensitive personal data can only take place with permission from the provider of such information or as agreed to through a lawful contract.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision addresses disclosure and does not take into account the “sharing” of information that is enabled through networked devices, as well as the increasing practice of companies to share anonymized or aggregated data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy Policy&lt;/b&gt; : Rule 4 requires that body corporate have in place a privacy policy on their website that provides clear and accessible statements of its practices and policies, type of personal or sensitive personal information that is being collected, purpose of the collection, usage of the information, disclosure of the information, and the reasonable security practices and procedures that have been put in place to secure the information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the context of Big Data where data from a variety of sources is being collected, used, and re-used it is important for policies to 'follow data' and appear in a contextualized manner. The current requirement of having Body Corporate post a single overarching privacy policy on its website could prove to be inadequate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Remedy&lt;/b&gt; : Section 43A of the Act holds that if a body corporate is negligent in implementing and maintain reasonable security practices and procedures which results in wrongful loss or wrongful gain to any person, the body corporate can be held liable to pay compensation to the affected person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision will provide limited remedy for an affected individual in the context of Big Data. Though important to help prevent data breaches resulting from negligent data practices, implementation of reasonable security practices and procedures cannot be the only hinging point for determining liability of a Body Corporate for violations and many of the harms possible through Big Data are not in the form of wrongful loss or wrongful gain to another person. Indeed many harms possible through Big Data are non-economic in nature – including physical invasion of privacy, and discriminatory practices that can arise from decisions based on Big Data analytics. Nor does the provision address the potential for future damage that can result from a 'Big Data data breach'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The safeguards noted in the above section are not the only legal provisions that speak to privacy in India. There are over fifty sectoral legislation that have provisions addressing privacy - for example provisions addressing confidentiality of health and banking information. The government of India is also in the process of drafting a privacy legislation. In 2012 the Report of the Group of Experts on Privacy provided recommendations for a privacy framework in India. The Report envisioned a framework of co-regulation - with sector level self regulatory organization developing privacy codes (that are not lower than the defined national privacy principles) and that are enforced by a privacy commissioner.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Perhaps this method would be optimal for the regulation of Big Data- allowing for the needed flexibility and specificity in standards and device development. Though the Report notes that individuals can seek remedy from the court and the Privacy Commissioner can issue fines for a violation, the development of privacy legislation in India has yet to clearly integrate the importance of due process and remedy. With the onset of Big Data - this will become more important than ever.&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The use and generation of Big Data in India is growing. Plans such as free wifi zones in cities&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;, city wide CCTV networks with facial recognition capabilities&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;, and the implementation of an identity/authentication platform for public and private services&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;, are indicators towards a move of data generation that is networked and centralized, and where the line between public and private is blurred through the vast amount of data that is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such developments and innovations what is privacy and what role does privacy play? Is it the archaic inhibitor - limiting the sharing and use of data for new and innovative purposes? Will it be defined purely by legislative norms or through device/platform design as well? Is it a notion that makes consumers think twice about using a product or service or is it a practice that enables consumer and citizen uptake and trust and allows for the growth and adoption of these services?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How privacy will be regulated and how it will be perceived is still evolving across jurisdictions, technologies, and cultures - but it is clear that privacy is not being and cannot be overlooked. Governments across the world are reforming and considering current and future privacy regulation targeted towards life in a quantified society. As the Indian government begins to roll out initiatives that create a "Digital India" indeed a "quantified India", taking privacy into consideration could facilitate the uptake, expansion, and success of these practices and services. As the Indian government pursues the opportunities possible through Big Data it will be useful to review existing privacy protections and deliberate on if, and in what form, future protections for privacy and other rights will be needed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt;Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules 2011). Available at: http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt;Group of Experts on Privacy. (2012). &lt;i&gt;Report of the Group of Experts on Privacy.&lt;/i&gt; New Delhi: Planning Commission, Government of India. Retrieved May 20, 2015, from http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; NDTV. “Free Public Wi-Fi Facility in Delhi to Have Daily Data Limit. NDTV, May 25&lt;sup&gt;th&lt;/sup&gt; 2015, Available at: &lt;a href="http://gadgets.ndtv.com/internet/news/free-public-wi-fi-facility-in-delhi-to-have-daily-data-limit-695857"&gt;http://gadgets.ndtv.com/internet/news/free-public-wi-fi-facility-in-delhi-to-have-daily-data-limit-695857&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt;FindBiometrics Global Identity Management. “Surat Police Get NEC Facial Recognition CCTV System”. July 21&lt;sup&gt;st&lt;/sup&gt; 2015. Available at: http://findbiometrics.com/surat-police-nec-facial-recognition-27214/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt;UIDAI Official Website. Available at: https://uidai.gov.in/&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011'&gt;https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-11T07:01:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/big-data-reproductive-health-india-mcts">
    <title>Big Data and Reproductive Health in India: A Case Study of the Mother and Child Tracking System</title>
    <link>https://cis-india.org/raw/big-data-reproductive-health-india-mcts</link>
    <description>
        &lt;b&gt;In this case study undertaken as part of the Big Data for Development (BD4D) network, Ambika Tandon evaluates the Mother and Child Tracking System (MCTS) as data-driven initiative in reproductive health at the national level in India. The study also assesses the potential of MCTS to contribute towards the big data landscape on reproductive health in the country, as the Indian state’s imagination of health informatics moves towards big data.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Case study: &lt;a href="https://github.com/cis-india/website/raw/master/bd4d/CIS_CaseStudy_AT_BigDataReproductiveHealthMCTS.pdf" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;The reproductive health information ecosystem in India comprises of a range of different databases across state and national levels. These collect data through a combination of manual and digital tools. Two national-level databases have been launched by the Ministry of Health and Family Welfare - the Health Management Information System (HMIS) in 2008, and the MCTS in 2009. 4 The MCTS focuses on collecting data on maternal and child health. It was instituted due to reported gaps in the HMIS, which records monthly data across health programmes including reproductive health. There are several other state-level initiatives on reproductive health data that have either been subsumed into, or run in
parallel with, the MCTS.&lt;/p&gt;
&lt;p&gt;With this case study, we aim to evaluate the MCTS as data-driven initiative in reproductive health at the national level. It will also assess its potential to contribute towards the big data landscape on reproductive health in the country, as the Indian state’s imagination of health informatics moves towards big data. The methodology for the case study involved a desk-based review of existing literature on the use of health information systems globally, as well as analysis of government reports, journal articles, media coverage, policy documents, and other material on the MCTS.&lt;/p&gt;
&lt;p&gt;The first section of this report details the theoretical framing of the case study, drawing on the feminist critique of reproductive data systems. The second section maps the current landscape of reproductive health data produced by the state in India, with a focus on data flows, and barriers to data collection and analysis at the local and national level. The case of abortion data is used to further the argument of flawed data collection systems at the
national level. Section three briefly discusses the state’s imagination of reproductive health policy and the role of data systems through a discussion on the National Health Policy, 2017 and the National Health Stack, 2018. Finally, we make some policy recommendations and identify directions for future research, taking into account the ongoing shift towards big data globally to democratise reproductive healthcare.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/big-data-reproductive-health-india-mcts'&gt;https://cis-india.org/raw/big-data-reproductive-health-india-mcts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ambika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Reproductive and Child Health</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>BD4D</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-12-06T04:57:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world">
    <title>Big Data and Positive Social Change in the Developing World: A White Paper for Practitioners and Researchers</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world</link>
    <description>
        &lt;b&gt;I was a part of a working group writing a white paper on big data and social change, over the last six months. This white paper was produced by a group of activists, researchers and data experts who met at the Rockefeller Foundation’s Bellagio Centre to discuss the question of whether, and how, big data is becoming a resource for positive social change in low- and middle-income countries (LMICs).&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Bellagio Big Data Workshop Participants. (2014). “Big data and positive social change in the developing world: A white paper for practitioners and researchers.” Oxford: Oxford Internet Institute. Available online: &lt;a class="external-link" href="http://ssrn.com/abstract=2491555"&gt;http://ssrn.com/abstract=2491555&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Our working definition of big data includes, but is not limited to, sources such as social media, mobile phone use, digitally mediated transactions, the online news media, and administrative records. It can be categorised as data that is provided explicitly (e.g. social media feedback); data that is observed (e.g. mobile phone call records); and data that is inferred and derived by algorithms (for example social network structure or inflation rates). We defined four main areas where big data has potential for those interested in promoting positive social change: advocating and facilitating; describing and predicting; facilitating information exchange and promoting accountability and transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of &lt;span class="ff5"&gt;advocating and facilitating&lt;/span&gt;,&lt;span class="_0 _"&gt; &lt;/span&gt; we discussed ways in which volunteered data may &lt;span class="_0 _"&gt; &lt;/span&gt;help organisations to open up new public spa&lt;span class="_0 _"&gt;&lt;/span&gt;ces for discussion and awareness&lt;span class="_0 _"&gt;&lt;/span&gt;-building; how both aggregating data and working across different databa&lt;span class="_0 _"&gt;&lt;/span&gt;ses can be tools for building awa&lt;span class="_0 _"&gt;&lt;/span&gt;reness, and howthe digital data commons can also configure new&lt;span class="_0 _"&gt;&lt;/span&gt;&lt;span class="ff5"&gt; &lt;/span&gt;communities and actions&lt;span class="_0 _"&gt;&lt;/span&gt; (sometimes serendipitously) through data science and aggregation. Finally, we also&lt;span class="_0 _"&gt;&lt;/span&gt; looked at the problem of overexposure and ho&lt;span class="_0 _"&gt;&lt;/span&gt;wactivists and organisations can&lt;span class="_0 _"&gt;&lt;/span&gt; protect themselves and hide their digital footprin&lt;span class="_0 _"&gt;&lt;/span&gt;ts. The challenges w&lt;span class="ls2"&gt;e&lt;/span&gt; identified in this area were how to interpret data&lt;span class="_0 _"&gt;&lt;/span&gt; correctly when supplementary information may b&lt;span class="_0 _"&gt;&lt;/span&gt;e lacking; organisational capacity constraints aro&lt;span class="_0 _"&gt;&lt;/span&gt;und processing and storing data,&lt;span class="_0 _"&gt;&lt;/span&gt; and issues around data dissemination, i.e. the pos&lt;span class="_0 _"&gt;&lt;/span&gt;sible negative consequences of inadvertently ide&lt;span class="_0 _"&gt;&lt;/span&gt;ntifying groups or individuals&lt;span class="_0 _"&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Next, we looked at the way big data can help describe and predict, functions which are particularly important in the academic, development and humanitarian areas of work where researchers can combine data into new dynamic, high-resolution datasets to detect new correlations and surface new questions. With data such as mobile phone data and Twitter analytics, understanding the data’s comprehensiveness, meaning and bias are the main challenges, accompanied by the problem of developing new and more comprehensive ethical systems to protect data subjects where data is observed rather than volunteered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next group of activities discussed was facilitating information exchange. We looked at mobile-based information services, where it is possible for a platform created around a particular aim (e.g. agricultural knowledge-building) to incorporate multiple feedback loops which feed into both research and action. The pitfalls include the technical challenge of developing a platform which is lean yet multifaceted in terms of its uses, and particularly making it reliably available to low-income users. This kind of platform, addressed by big data analytics, also offers new insights through data discovery and allows the provider to steer service provision according to users’ revealed needs and priorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our last category for big data use was accountability and transparency, where organisations are using crowdsourcing methods to aggregate and analyse information in real time to establish new spaces for critical discussion, awareness and action. Flows of digital information can be managed to prioritise participation and feedback, provide a safe space to engage with policy decisions and expose abuse. The main challenges are how to keep sensitive information (and informants) safe while also exposing data and making authorities accountable; how to make the work sustainable without selling data, and how to establish feedback loops so that users remain involved in the work beyond an initial posting. In the crowdsourcing context, new challenges are also arising in terms of how to verify and moderate real-time flows of information, and how to make this process itself transparent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, we also discussed the relationship between big and open data. Open data can be seen as a system of governance and a knowledge commons, whereas big data does not by its nature involve the idea of the commons, so we leaned toward the term ‘opening data’, i.e. processes which could apply to commercially generated as much as public-sector datasets. It is also important to understand where to prioritise opening, and where this may exclude people who are not using the ‘right’ technologies: for example, analogue methods (e.g. nailing a local authority budget to a town hall door every month) may be more open than ‘open’ digital data that’s available online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our discussion surfaced many questions to do with representation and meaning: must datasets be interpreted by people with local knowledge? For researchers to get access to data that is fully representative, do we need a data commons? How are data proprietors engaging with the power dynamics and inequalities in the research field, and how can civil society engage with the private sector on its own terms if data access is skewed towards elites? We also looked at issues of privacy and risk: do we need a contextual risk perspective rather than a single set of standards? What is the role of local knowledge in protecting data subjects, and what kinds of institutions and practices are necessary? We concluded that there is a case to be made for building a data commons for private/public data, and for setting up new and more appropriate ethical guidelines to deal with big data, since aggregating, linking and merging data present new kinds of privacy risk. In particular, organisations advocating for opening datasets must admit the limitations of anonymisation, which is currently being ascribed more power to protect data subjects than it merits in the era of big data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our analysis makes a strong case that it is time for civil society groups in particular to become part of the conversation about the power of data. These groups are the connectors between individuals and governments, corporations and governance institutions, and have the potential to promote big data analysis that is locally driven and rooted. Civil society groups are also crucially important but currently underrepresented in debates about privacy and the rights of technology users, and civil society as a whole has a responsibility for building critical awareness of the ways big data is being used to sort, categorise and intervene in LMICs by corporations, governments and other actors. Big data is shaping up to be one of the key battlefields of our era, incorporating many of the issues civil society activists worldwide have been working on for decades. We hope that this paper can inform organisations and&lt;br /&gt;individuals as to where their particular interests may gain traction in the debate, and what their contribution may look like.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/big-data-and-positive-social-change.pdf"&gt;Click to download the full white paper here&lt;/a&gt;&lt;/b&gt;. (PDF, 1.95 Mb)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world'&gt;https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-10-01T03:52:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/big-data-governance-india">
    <title>Big Data and Governance in India</title>
    <link>https://cis-india.org/internet-governance/events/big-data-governance-india</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) is happy to invite you to a discussion on the role of Big Data in governance in India with a focus on Digital India, UID Scheme and Smart Cities Mission in India on January 23, 2016 at CIS office in Bangalore from 11 a.m. to 4 p.m.&lt;/b&gt;
        &lt;h3&gt;&lt;a href="https://cis-india.org/internet-governance/blog/background-note-big-data" class="internal-link"&gt;Background Note&lt;/a&gt;&lt;/h3&gt;
&lt;hr /&gt;
&lt;p&gt;The roundtable discussion intends to delve deeper into various issues around the role of big data in Government schemes and projects like the Digital India, the UID Scheme and the 100 Smart Cities Mission. Some of the topics would include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use/Assumptions about use of Big Data.&lt;/li&gt;
&lt;li&gt;The public dialogue in the context of Big Data, rights, and governance.&lt;/li&gt;
&lt;li&gt;Status and Role of India's data protection standards impacted by Big Data.&lt;/li&gt;
&lt;li&gt;Legal hurdles posed by Big Data.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We look forward to making this a forum for knowledge exchange and a learning opportunity for our friends and colleagues attending the discussion.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contact:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Vanya Rakesh vanya@cis-india.org +919586572707&lt;/li&gt;
&lt;li&gt;Amber Sinha amber@cis-india.org +919620180343&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Introduction&lt;br /&gt;11:00 am - 11.30 am&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Introduction about “Big Data in the Global South: Mitigating Harms” and “Big Data in Indian Governance”.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Digital India&lt;br /&gt;11.30 am - 1:00 pm&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Discussion&lt;br /&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Schemes under Digital India and how Big Data pertains to them&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Scale and nature of data being collected&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Actors involved&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Research Methodology and coding&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;“Cradle to grave” identity&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Need for privacy legislation/data protection policies&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:00 pm- 2:00 pm &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Big Data and Smart Cities&lt;br /&gt;2:00 pm - 3:30pm &lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Discussion&lt;br /&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Use/Assumptions about use of Big Data in Smart cities.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Organisations/companies driving the use of Big Data in Governance in India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The public dialogue around the scheme in the context of big data, rights, and governance&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Impact of Big Data on India's Data Protection Standards &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Impact of Big Data on other legislation/policy besides privacy . What type of 'legal hurdles' could Big Data pose?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Need for creating regulatory/legal framework&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:30pm-4:00pm&lt;/td&gt;
&lt;td&gt;Tea/Coffee&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h2&gt;Detailed Agenda&lt;/h2&gt;
&lt;h3&gt;Digital India&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Scope of schemes under Digital India and how Big Data pertains to them&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What are the ways in which Big Data is defined?&lt;/li&gt;
&lt;li&gt;What aspects of Digital India initiatives pertain to Big Data?&lt;/li&gt;
&lt;li&gt;What could be the harms/benefits of Big Data for Digital India?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Scale and nature of data being collected&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What do the schemes intend to quantify?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Actors involved&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What kinds of issue arise in PPP model?&lt;/li&gt;
&lt;li&gt;Questions about ownership of data, access-control and security&lt;/li&gt;
&lt;li&gt;Application of Section 43A rules to private parties involved&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Research Methodology and coding&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What the relevant questions that need to be asked in mapping each scheme?&lt;/li&gt;
&lt;li&gt;How do we view e-governance initiatives vis-a-vis privacy principles?&lt;/li&gt;
&lt;li&gt;What are the rights of citizens, and how are they impacted?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;“Cradle to grave” identity&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What does ‘cradle to grave’ digital identity mean?&lt;/li&gt;
&lt;li&gt;What is the impact of using the Aadhaar number?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Need for privacy legislation/data protection policies&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What aspects of the right to privacy pertain to the schemes?&lt;/li&gt;
&lt;li&gt;Extending the Section 43A rules to government agencies&lt;/li&gt;
&lt;li&gt;Justice Shah committee’s nine privacy principles.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Big Data and Smart Cities&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Use/Assumptions about use of Big Data in Smart cities&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What can be termed as big data in the context of smart cities.&lt;/li&gt;
&lt;li&gt;What would be the role of big data.&lt;/li&gt;
&lt;li&gt;Where do we see use/potential use of big data in the smart cities.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;What bodies/companies are driving the use of Big Data in Governance in India? &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identifying actors involved.&lt;/li&gt;
&lt;li&gt;Defining the role of: Government bodies, Private companies like IT Companies, consultants, etc.  in use of big data. Clarity on ownership, storage, use, re-use, deletion of data. Question of accountability in case of breach/misuse.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;What has been the public dialogue around a scheme in the context of big data, rights, and governance? &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Weighing promises of big data.&lt;/li&gt;
&lt;li&gt;Weighing challenges of big data.&lt;/li&gt;
&lt;li&gt;Concerns around big data- data security, privacy, digital resilience of infrastructure, risks of identity management, Circumvention of democracy, social exclusion, right to equality, right to access, etc.&lt;/li&gt;
&lt;li&gt;Issue of governance and implementation: role of SPVs.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;How are India's data protection standards impacted by Big Data? &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Need for developing standards.&lt;/li&gt;
&lt;li&gt;Drawing from existing international standards.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Are there other legislation/policy besides privacy impacted by Big Data? what type of 'legal hurdles' could Big Data pose?&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal landscaping: impact on current laws/policies/provisions.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Need for creating regulatory/legal framework?&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/big-data-governance-india'&gt;https://cis-india.org/internet-governance/events/big-data-governance-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Smart Cities</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2016-01-17T01:57:45Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/benefits-harms-rights-and-regulation-survey-of-literature-on-big-data">
    <title>Benefits, Harms, Rights and Regulation: A Survey of Literature on Big Data</title>
    <link>https://cis-india.org/internet-governance/blog/benefits-harms-rights-and-regulation-survey-of-literature-on-big-data</link>
    <description>
        &lt;b&gt;This survey draws upon a range of literature including news articles, academic articles, and presentations and seeks to disaggregate the potential benefits and harms of big data, organising them into several broad categories that reflect the existing scholarly literature. The survey also recognises the non-technical big data regulatory options which are in place as well as those which have been proposed by various governments, civil society groups and academics.&lt;/b&gt;
        &lt;p&gt;The survey was edited by Sunil Abraham, Elonnai Hickok and Leilah Elmokadem&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2011, it was estimated that the quantity of data produced globally surpassed 1.8 zettabyte.By 2013 it had increased to 4 zettabytes. With the nascent development of the so-called ‘Internet of Things’ gathering pace, these trends are likely to continue. This expansion in the volume, velocity, and variety of data available, together with the development of innovative forms of statistical analytics, is generally referred to as “Big Data”; though there is no single agreed upon definition of the term. Although still in its initial stages, big data promises to provide new insights and solutions across a wide range of sectors, many of which would have been unimaginable even a decade ago.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite enormous optimism about the scope and variety of big data’s potential applications, many remain concerned about its widespread adoption, with some scholars suggesting it could generate as many harms as benefits. Most notably are the concerns about the inevitable threats to privacy associated with the generation, collection and use of large quantities of data. Concerns have also been raised regarding, for example, the lack of transparency around the design of algorithms used to process the data, over-reliance on big data analytics as opposed to traditional forms of analysis and the creation of new digital divides. The existing literature on big data is vast. However, many of the benefits and harms identified by researchers tend to focus on sector specific applications of Big Data analytics, such as predictive policing, or targeted marketing. Whilst these examples can be useful in demonstrating the diversity of big data’s possible applications, they do not offer a holistic perspective of the broader impacts of Big Data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/benefits-harms-rights-and-regulation-a-survey-of-literature-on-big-data"&gt;Click to read the full survey here&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/benefits-harms-rights-and-regulation-survey-of-literature-on-big-data'&gt;https://cis-india.org/internet-governance/blog/benefits-harms-rights-and-regulation-survey-of-literature-on-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Vanya Rakesh, Vidushi Marda and Geethanjali Jujjavarapu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2017-03-23T02:17:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data">
    <title>Benefits and Harms of "Big Data"</title>
    <link>https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data</link>
    <description>
        &lt;b&gt;Today the quantity of data being generated is expanding at an exponential rate. From smartphones and televisions, trains and airplanes, sensor-equipped buildings and even the infrastructures of our cities, data now streams constantly from almost every sector and function of daily life.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2011 it was 	estimated that the quantity of data produced globally would surpass 1.8 zettabyte&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;. By 2013 that had grown 	to 4 zettabytes&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;, and with the nascent development of the so-called 'Internet of Things' gathering pace, 	these trends are likely to continue. This expansion in the volume, velocity, and variety of data available&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; , together with the development of innovative forms of statistical analytics, is generally referred to as "Big Data"; though there is no single agreed upon 	definition of the term. Although still in its initial stages, Big Data promises to provide new insights and solutions across a wide range of sectors, many 	of which would have been unimaginable even 10 years ago.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite enormous optimism about the scope and variety of Big Data's potential applications however, many remain concerned about its widespread adoption, 	with some scholars suggesting it could generate as many harms as benefits&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;. Most notably these have included concerns about the inevitable threats to privacy associated with the generation, collection and use of large quantities of data	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;. However, concerns have also been raised regarding, for example, the lack of transparency around the 	design of algorithms used to process the data, over-reliance on Big Data analytics as opposed to traditional forms of analysis and the creation of new 	digital divides to just name a few.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The existing literature on Big Data is vast, however many of the benefits and harms identified by researchers tend to relate to sector specific 	applications of Big Data analytics, such as predictive policing, or targeted marketing. Whilst these examples can be useful in demonstrating the diversity 	of Big Data's possible applications, it can nevertheless be difficult to gain an overall perspective of the broader impacts of Big Data as a whole. As such 	this article will seek to disaggregate the potential benefits and harms of Big Data, organising them into several broad categories, which are reflective of 	the existing scholarly literature.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;What are the potential benefits of Big Data?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;From politicians to business leaders, recent years have seen Big Data confidently proclaimed as a potential solution to a diverse range of problems from, 	world hunger and diseases, to government budget deficits and corruption. But if we look beyond the hyperbole and headlines, what do we really know about 	the advantages of Big Data? Given the current buzz surrounding it, the existing literature on Big Data is perhaps unsurprisingly vast, providing 	innumerable examples of the potential applications of Big Data from agriculture to policing. However, rather than try (and fail) to list the many possible 	applications of Big Data analytics across all sectors and industries, for the purposes of this article we have instead attempted to distil the various 	advantages of Big Data discussed within literature into the following five broad categories; Decision-Making, Efficiency &amp;amp; Productivity, Research &amp;amp; 	Development, Personalisation and Transparency, each of which will be discussed separately below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Decision-Making &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whilst data analytics have always been used to improve the quality and efficiency of decision-making processes, the advent of Big Data means that the areas 	of our lives in which data driven decision- making plays a role is expanding dramatically; as businesses and governments become better able to exploit new 	data flows. Furthermore, the real-time and predictive nature of decision-making made possible by Big Data, are increasingly allowing these decisions to be 	automated. As a result, Big Data is providing governments and business with unprecedented opportunities to create new insights and solutions; becoming more 	responsive to new opportunities and better able to act quickly - and in some cases preemptively - to deal with emerging threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This ability of Big Data to speed up and improve decision-making processes can be applied across all sectors from transport to healthcare and is often 	cited within the literature as one of the key advantages of Big Data. Joh, for example, highlights the increased use of data driven predictive analysis by 	police forces to help them to forecast the times and geographical locations in which crimes are most likely to occur. This allows the force to redistribute their officers and resources according to anticipated need, and in certain cities has been highly effective in reducing crime rates	&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;. Raghupathi meanwhile cites the case of healthcare, where predictive modelling driven by big data is 	being used to proactively identify patients who could benefit from preventative care or lifestyle changes&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One area in particular where the decision-making capabilities of Big Data are having a significant impact is in the field of risk management	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;. For instance, Big Data can allow companies to map their entire data landscape to help detect sensitive 	information, such as 16 digit numbers - potentially credit card data - which are not being stored according to regulatory requirements and intervene 	accordingly. Similarly, detailed analysis of data held about suppliers and customers can help companies to identify those in financial trouble, allowing 	them to act quickly to minimize their exposure to any potential default&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Efficiency and Productivity &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an era when many governments and businesses are facing enormous pressures on their budgets, the desire to reduce waste and inefficiency has never been 	greater. By providing the information and analysis needed for organisations to better manage and coordinate their operations, Big Data can help to alleviate such problems, leading to the better utilization of scarce resources and a more productive workforce	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the literature such efficiency savings are most commonly discussed in relation to reductions in energy consumption	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;. For example, a report published by Cisco notes how the city of Olso has managed to reduce the energy 	consumption of street-lighting by 62 percent through the use of smart solutions driven by Big Data&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;. 	Increasingly, however, statistical models generated by Big Data analytics are also being utilized to identify potential efficiencies in sourcing, 	scheduling and routing in a wide range of sectors from agriculture to transport. For example, Newell observes how many local governments are generating 	large databases of scanned license plates through the use of automated license plate recognition systems (ALPR), which government agencies can then use to 	help improve local traffic management and ease congestion&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commonly these efficiency savings are only made possible by the often counter-intuitive insights generated by the Big Data models. For example, whilst a 	human analyst planning a truck route would always tend to avoid 'drive-bys' - bypassing one stop to reach a third before doubling back - Big Data insights 	can sometimes show such routes to be more efficient. In such cases efficiency saving of this kind would in all likelihood have gone unrecognised by a human 	analyst, not trained to look for such patterns&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Research, Development, and Innovation&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps one of the most intriguing benefits of Big Data is its potential use in the research and development of new products and services. As is 	highlighted throughout the literature, Big Data can help businesses to gain an understanding of how others perceive their products or identify customer 	demand and adapt their marketing or indeed the design of their products accordingly&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;. Analysis of social 	media data, for instance, can provide valuable insights into customers' sentiments towards existing products as well as discover demands for new products 	and services, allowing businesses to respond more quickly to changes in customer behaviour&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to market research, Big Data can also be used during the design and development stage of new products; for example by helping to test thousands 	of different variations of computer-aided designs in an expedient and cost-effective manner. In doing so, business and designers are able to better assess 	how minor changes to a products design may affect its cost and performance, thereby improving the cost-effectiveness of the production process and 	increasing profitability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Personalisation&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many consumers, perhaps the most familiar application of Big Data is its ability to help tailor products and services to meet their individual 	preferences. This phenomena is most immediately noticeable on many online services such as Netflix; where data about users activities and preferences is 	collated and analysed to provide a personalised service, for example by suggesting films or television shows the user may enjoy based upon their previous 	viewing history&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;. By enabling companies to generate in-depth profiles of their customers, Big Data 	allows businesses to move past the 'one size fits all' approach to product and services design and instead quickly and cost-effectively adapt their 	services to better meet customer demand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to service personalisation, similar profiling techniques are increasingly being utilized in sectors such as healthcare. Here data about a 	patient's medical history, lifestyle, and even their gene expression patterns are collated, generating a detailed medical profile which can then be used to 	tailor treatments to meet their specific needs&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;. Targeted care of this sort can not only help to reduce 	costs for example by helping to avoid over-prescriptions, but may also help to improve the effectiveness of treatments and so ultimately their outcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Transparency &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If 'knowledge is power', then, - so say Big Data enthusiasts - advances in data analytics and the quantity of data available can give consumers and 	citizens the knowledge to hold governments and businesses to account, as well as make more informed choices about the products and services they use. 	Nevertheless, data (even lots of it) does not necessarily equal knowledge. In order for citizens and consumers to be able to fully utilize the vast 	quantities of data available to them, they must first have some way to make sense of it. For some, Big Data analytics provides just such a solution, 	allowing users to easily search, compare and analyze available data, thereby helping to challenge existing information asymmetries and make business and 	government more transparent&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the private sector, Big Data enthusiasts have claimed that Big Data holds the potential to ensure complete transparency of supply chains, enabling concerned consumers to trace the source of their products, for example to ensure that they have been sourced ethically	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;. Furthermore, Big Data is now making accessible information which was previously unavailable to 	average consumers and challenging companies whose business models rely on the maintenance of information asymmetries.The real-estate industry, for example, 	relies heavily upon its ability to acquire and control proprietary information, such as transaction data as a competitive asset. In recent years, however, 	many online services have allowed consumers to effectively bypass agents, by providing alternative sources of real-estate data and enabling prospective 	buyers and sellers to communicate directly with each other&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;. Therefore, providing consumers with access 	to large quantities of actionable data . Big Data can help to eliminate established information asymmetries, allowing them to make better and more informed 	decisions about the products they buy and the services they enlist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This potential to harness the power of Big Data to improve transparency and accountability can also be seen in the public sector, with many scholars 	suggesting that greater access to government data could help to stem corruption and make politics more accountable. This view was recently endorsed by the 	UN who highlighted the potential uses of Big Data to improve policymaking and accountability in a report published by the Independent Expert Advisory Group 	on the "Data Revolution for Sustainable Development". In the report experts emphasize the potential of what they term the 'data revolution', to help 	achieve sustainable development goals by for example helping civil society groups and individuals to 'develop data literacy and help communities and individuals to generate and use data, to ensure accountability and make better decisions for themselves'	&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;What are the potential harms of Big Data?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Whilst it is often easy to be seduced by the utopian visions of Big Data evangelists, in order to ensure that Big Data can deliver the types of 	far-reaching benefits its proponents promise, it is vital that we are also sensitive to its potential harms. Within the existing literature, discussions 	about the potential harms of Big Data are perhaps understandably dominated by concerns about privacy. Yet as Big Data has begun to play an increasingly 	central role in our daily lives, a broad range of new threats have begun to emerge including issues related to security and scientific epistemology, as 	well as problems of marginalisation, discrimination and transparency; each of which will be discussed separately below.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;By far the biggest concern raised by researchers in relation to Big Data is its risk to privacy. Given that by its very nature Big Data requires extensive 	and unprecedented access to large quantities of data; it is hardly surprising that many of the benefits outlined above in one way or another exist in tension with considerations of privacy. Although many scholars have called for a broader debate on the effects of Big Data on ethical best practice	&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, a comprehensive exploration into the complex debates surrounding the ethical 	implications of Big Data go far beyond the scope of this article. Instead we will simply attempt to highlight some of the major areas of concern expressed 	in the literature, including its effects on established principles of privacy and the implication of Big Data on the suitability of existing regulatory 	frameworks governing privacy and data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Re-identification&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditionally many Big Data enthusiasts have used de-identification - the process of anonymising data by removing personally identifiable information (PII) 	- as a way of justifying mass collection and use of personal data. By claiming that such measures are sufficient to ensure the privacy of users, data 	brokers, companies and governments have sought to deflect concerns about the privacy implications of Big Data, and suggest that it can be compliant with 	existing regulatory and legal frameworks on data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, many scholars remain concerned about the limits of anonymisation. As Tene and Polonetsky observe 'Once data-such as a clickstream or a cookie 	number-are linked to an identified individual, they become difficult to disentangle'&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;. They cite the 	example of University of Texas researchers Narayanan and Shmatikov, who were able to successfully re-identify anonymised Netflix user data by cross 	referencing it with data stored in a publicly accessible online database. As Narayanan and Shmatikov themselves explained, 'once any piece of data has been linked to a person's real identity, any association between this data and a virtual identity breaks anonymity of the latter'	&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;. The quantity and variety of datasets which Big Data analytics has made associable with individuals is 	therefore expanding the scope of the types of data that can be considered PII, as well as undermining claims that de-identification alone is sufficient to 	ensure privacy for users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Privacy Frameworks Obsolete?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent decades privacy and data protection frameworks based upon a number of so-called 'privacy principles' have formed the basis of most attempts to 	encourage greater consideration of privacy issues online&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;. For many however, the emergence of Big Data 	has raised question about the extent to which these 'principles of privacy' are workable in an era of ubiquitous data collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Collection Limitation and Data Minimization&lt;/i&gt; : Big Data by its very nature requires the collection and processing of very large and very diverse data sets. Unlike other forms scientific research and 	analysis which utilize various sampling techniques to identify and target the types of data most useful to the research questions, Big Data instead seeks 	to gather as much data as possible, in order to achieve full resolution of the phenomenon being studied, a task made much easier in recent years as a 	result of the proliferation of internet enabled devices and the growth of the Internet of Things. This goal of attaining comprehensive coverage exists in 	tension however with the key privacy principles of collection limitation and data minimization which seek to limit both the quantity and variety of data 	collected about an individual to the absolute minimum&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Purpose Limitation:&lt;/i&gt; Since the utility of a given dataset is often not easily identifiable at the time of collection, datasets are increasingly being processed several times 	for a variety of different purposes. Such practices have significant implications for the principle of purpose limitation, which aims to ensure that organizations are open about their reasons for collecting data, and that they use and process the data for no other purpose than those initially specified	&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Notice and Consent: &lt;/i&gt; The principles of notice and consent have formed the cornerstones of attempts to protect privacy for decades. Nevertheless in an era of ubiquitous data 	collection, the notion that an individual must be required to provide their explicit consent to allow for the collection and processing of their data seems 	increasingly antiquated, a relic of an age when it was possible to keep track of your personal data relationships and transactions. Today as data streams 	become more complex, some have begun to question suitability of consent as a mechanism to protect privacy. In particular commentators have noted how given 	the complexity of data flows in the digital ecosystem most individuals are not well placed to make truly informed decisions about the management of their 	data&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;. In one study, researchers demonstrated how by creating the perceptions of control, users were more likely to share their personal information, regardless of whether or not the users had actually gained control	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;. As such, for many, the garnering of consent is increasingly becoming a symbolic box-ticking exercise which achieves little more than to irritate and inconvenience customers whilst providing a burden for companies and a hindrance to growth and innovation	&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Access and Correction:&lt;/i&gt; The principle of 'access and correction' refers to the rights of individuals to obtain personal information being held about them as well as the right to 	erase, rectify, complete or otherwise amend that data. Aside from the well documented problems with privacy self-management, for many the real-time nature 	of data generation and analysis in an era of Big Data poses a number of structural challenges to this principle of privacy. As x comments, 'a good amount 	of data is not pre-processed in a similar fashion as traditional data warehouses. This creates a number of potential compliance problems such as difficulty 	erasing, retrieving or correcting data. A typical big data system is not built for interactivity, but for batch processing. This also makes the application 	of changes on a (presumably) static data set difficult'&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Opt In-Out:&lt;/i&gt; The notion that the provision of data should be a matter of personal choice on the part of the individual and that the individual can, if they chose decide 	to 'opt-out' of data collection, for example by ceasing use of a particular service, is an important component of privacy and data protection frameworks. 	The proliferation of internet-enabled devices, their integration into the built environment and the real-time nature of data collection and analysis 	however are beginning to undermine this concept. For many critics of Big Data the ubiquity of data collection points as well as the compulsory provision of 	data as a prerequisite for the access and use of many key online services is making opting-out of data collection not only impractical but in some cases 	impossible. &lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. "Chilling Effects"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many scholars the normalization of large scale data collection is steadily producing a widespread perception of ubiquitous surveillance amongst users. 	Drawing upon Foucault's analysis of Jeremy Bentham's panopticon and the disciplinary effects of surveillance, they argue that this perception of permanent visibility can cause users to sub-consciously 'discipline' and self- regulate of their own behavior, fearful of being targeted or identified as 'abnormal'	&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;. As a result, the pervasive nature of Big Data risks generating a 'chilling effect' on user behavior 	and free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the notion of "chilling effects" is quite prevalent throughout the academic literature on surveillance and security, the difficulty of quantifying 	the perception and effects of surveillance on online behavior and practices means that there have only been a limited number of empirical studies of this 	phenomena, and none directly related to the chilling effects of Big Data. One study, conducted by researchers at MIT however, sought to assess the impact 	of Edward Snowden's revelations about NSA surveillance programs on Google search trends. Nearly 6,000 participants were asked to individually rate certain 	keywords for their perceived degree of privacy sensitivity along multiple dimensions. Using Google's own publicly available search data, the researchers 	then analyzed search patterns for these terms before and after the Snowden revelations. In doing so they were able to demonstrate a reduction of around 	2.2% in searchers for those terms deemed to be most sensitive in nature. According to the researchers themselves, the results 'suggest that there is a 	chilling effect on search behaviour from government surveillance on the Internet'&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt;. Although this study focussed on the effects on government surveillance, for many privacy advocates the growing pervasiveness of Big Data risks generating similar results.	&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Dignitary Harms of Predictive Decision-Making&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to its potentially chilling effects on free speech, the automated nature of Big Data analytics also possess the potential to inflict so-called 'dignitary harms' on individuals, by revealing insights about themselves that they would have preferred to keep private	&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an infamous example, following a shopping trip to the retail chain Target, a young girl began to receive mail at her father's house advertising products 	for babies including, diapers, clothing, and cribs. In response, her father complained to the management of the company, incensed by what he perceived to 	be the company's attempts to "encourage" pregnancy in teens. A few days later however, the father was forced to contact the store again to apologies, after 	his daughter had confessed to him that she was indeed pregnant. It was later revealed that Target regularly analyzed the sale of key products such as 	supplements or unscented lotions in order to generate "pregnancy prediction" scores, which could be used to assess the likelihood that a customer was 	pregnant and to therefore target them with relevant offers&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt;. Such cases, though anecdotal illustrate how 	Big Data if not adopted sensitively can lead to potential embarrassing information about users being made public.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Security&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In relation to cybersecurity Big Data can be viewed to a certain extent as a double-edged sword. On the one hand, the unique capabilities of Big Data 	analytics can provide organizations with new and innovative methods of enhancing their cybersecurity systems. On the other however, the sheer quantity and 	diversity of data emanating from a variety of sources creates its own security risks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. "Honey-Pot"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The larger the quantities of confidential information stored by companies on their databases the more attractive those databases may appear to potential 	hackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Data Redundancy and Dispersion&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Inherent to Big Data systems is the duplication of data to many locations in order to optimize query processing. Data is dispersed across a wide range of 	data repositories in different servers, in different parts of the world. As a result it may be difficult for organizations to accurately locate and secure 	all items of personal information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Epistemological and Methodological Implications&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2008 Chris Anderson infamously proclaimed the 'end of theory'. Writing for Wired Magazine, Anderson predicted that the coming age of Big Data would create a 'deluge of data' so large that the scientific methods of hypothesis, sampling and testing would be rendered 'obsolete'	&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt;. 'There is now a better way' Anderson insisted, 'Petabytes allow us to say: "Correlation is enough." 	We can stop looking for models. We can analyze the data without hypotheses about what it might show. We can throw the numbers into the biggest computing 	clusters the world has ever seen and let statistical algorithms find patterns where science cannot'&lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In spite of these bold claims however, many theorists remain skeptical of Big Data's methodological benefits and have expressed concern about its potential 	implications for conventional scientific epistemologies. For them the increased prominence of Big Data analytics in science does not signal a paradigmatic 	transition to a more enlightened data-driven age, but a hollowing out of the scientific method and an abandonment of casual knowledge in favor of shallow 	correlative analysis&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;7. &lt;/i&gt; Obfuscation &lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although Big Data analytics can be utilized to study almost any phenomena where enough data exists, many theorists have warned that simply because Big Data 	analytics &lt;i&gt;can&lt;/i&gt; be used does not necessarily mean that they &lt;i&gt;should&lt;/i&gt; be used&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;. Bigger is 	not always better and indeed the sheer quantity of data made available to users may in fact act to obscure certain insights. Whereas traditional scientific 	methods use sampling techniques to identify the most important and relevant data, Big Data by contrast encourages the collection and use of as much data as 	possible, in an attempt to attain full resolution of the phenomena being studied. However, not all data is equally useful and simply inputting as much data 	as possible into an algorithm is unlikely to produce accurate results and may instead obscure key insights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, whilst the promise of automation is central to a large part of Big Data's appeal, researchers observe that most Big Data analysis still requires an 	element of human judgement to filter out the 'good' data from the 'bad', and to decide what aspects of the data are relevant to the research objectives. As 	Boyd and Crawford observe, 'in the case of social media data, there is a 'data cleaning' process: making decisions about what attributes and variables will 	be counted, and which will be ignored. This process is inherently subjective"&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google's Flu Trend project provides an illustrative example of how Big Data's tendency to try to maximise data inputs can produce misleading results. 	Designed to accurately track flu outbreaks based upon data collected from Google searches, the project was initially proclaimed to be a great success. 	Gradually however it became apparent that the results being produced were not reflective of the reality on the ground. Later it was discovered that the 	algorithms used by the project to interpret search terms were insufficiently accurate to filter out anomalies in searches, such as those related to the 	2009 H1N1 flu pandemic. As such, despite the great promise of Big Data, scholars insist it remains critical to be mindful of its limitations, remain selective about the types of data included in the analysis and exercise caution and intuition whenever interpreting its results	&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. "Apophenia"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In complete contrast to the problem of obfuscation, Boyd and Crawford observe how Big Data may also lead to the practice of 'apophenia', a phenomena whereby analysts interpret patterns where none exist, 'simply because enormous quantities of data can offer connections that radiate in all directions"	&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. David Leinweber for example demonstrated that data mining techniques could show strong but ultimately spurious correlations between changes in the S&amp;amp;P 500 stock index and butter production in Bangladesh	&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;. Such spurious correlation between disparate and unconnected phenomena are a common feature of Big 	Data analytics and risks leading to unfounded conclusions being draw from the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although Leinweber's primary focus of analysis was the use of Data-Mining technologies, his observations are equally applicable to Big Data. Indeed the 	tendency amongst Big Data analysts to marginalise the types of domain specific expertise capable of differentiating between relevant and irrelevant 	correlations in favour of algorithmic automation can in many ways be seen to exacerbate many of the problems Leinweber identified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;9. &lt;/i&gt; From Causation to Correlation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Closely related to the problem of Aphonenia is the concern that Big Data's emphasis on correlative analysis risks leading to an abandonment of the pursuit 	of causal knowledge in favour of shallow descriptive accounts of scientific phenomena&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many, Big Data enthusiasts 'correlation is enough', producing inherently meaningful results interpretable by anyone without the need for pre-existing 	theory or hypothesis. Whilst proponents of Big Data claim that such an approach allows them to produce objective knowledge, by cleansing the data of any 	kind of philosophical or ideological commitment, for others by neglecting the knowledge of domain experts, Big Data risks generating a shallow type of 	analysis, since it fails to adequately embed observations within a pre-existing body of knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This commitment to an empiricist epistemology and methodological monism is particularly problematic in the context of studies of human behaviour, where 	actions cannot be calculated and anticipated using quantifiable data alone. In such instances, a certain degree of qualitative analysis of social, 	historical and cultural variables may be required in order to make the data meaningful by embedding it within a broader body of knowledge. The abstract and 	intangible nature of these variables requires a great deal of expert knowledge and interpretive skill to comprehend. It is therefore vital that the 	knowledge of domain specific experts is properly utilized to help 'evaluate the inputs, guide the process, and evaluate the end products within the context 	of value and validity'&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As such, although Big Data can provide unrivalled accounts of "what" people do, it fundamentally fails to deliver robust explanations of "why" people do 	it. This problem is especially critical in the case of public policy-making since without any indication of the motivations of individuals, policy-makers 	can have no basis upon which to intervene to incentivise more positive outcomes.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Digital Divides and Marginalisation&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Today data is a highly valuable commodity. The market for data in and of itself has been steadily growing in recent years with the business models of many 	online services now formulated around the strategy of harvesting data from users&lt;a href="#_ftn49" name="_ftnref49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. 	As with the commodification of anything however, inequalities can easily emerge between the haves and have not's. Whilst the quantity of data currently 	generated on a daily basis is many times greater than at any other point in human history, the vast majority of this data is owned and tightly controlled 	by a very small number of technology companies and data brokers. Although in some instances limited access to data may be granted to university researchers 	or to those willing and able to pay a fee, in many cases data remains jealously guarded by data brokers, who view it as an important competitive asset. As 	a result these data brokers and companies risk becoming the gatekeepers of the Big Data revolution, adjudicating not only over who can benefit from Big 	Data, but also in what context and under what terms. For many such inconsistencies and inequalities in access to data raises serious doubts about just how 	widely distributed the benefits of Big Data will be. Others go even further claiming that far from helping to alleviate inequalities, the advent of Big Data risks exacerbating already significant digital divides that exist as well as creating new ones	&lt;a href="#_ftn50" name="_ftnref50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10. Anti-Competitive Practices&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result of the reluctance of large companies to share their data, there increasingly exists a divide in access between small start-ups companies and 	their larger and more established competitors. Thus, new entrants to the marketplace may be at a competitive disadvantage in relation to large and well 	established enterprises, being as they are unable to harness the analytical power of the vast quantities of data available to large companies by virtue of 	their privileged market position. Since the performance of many online services are today often intimately connected with the collation and use of users 	data, some researchers have suggested that this inequity in access to data could lead to a reduction in competition in the online marketplace, and 	ultimately therefore to less innovation and choice for consumers&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result researchers including Nathan Newman of New York University have called for a reassessment and reorientation of anti-trust investigations and 	regulatory approaches more generally to 'to focus on how control of personal data by corporations can entrench monopoly power and harm consumer welfare in 	an economy shaped increasingly by the power of "big data"'&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;. Similarly a report produced by the European 	Data Protection Supervisor concluded that, 'The scope for abuse of market dominance and harm to the consumer through refusal of access to personal information and opaque or misleading privacy policies may justify a new concept of consumer harm for competition enforcement in digital economy'	&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. Research&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From a research perspective barriers to access to data caused by proprietary control of datasets are problematic, since certain types of research could 	become restricted to those privileged enough to be granted access to data. Meanwhile those denied access are left not only incapable of conducting similar 	research projects, but also unable to test, verify or reproduce the findings of those who do. The existence of such gatekeepers may also lead to reluctance 	on the part of researchers to undertake research critical of the companies, upon whom they rely for access, leading to a chilling effect on the types of 	research conducted&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. Inequality&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whilst bold claims are regularly made about the potential of Big Data to deliver economic development and generate new innovations, some critics of remain concerned about how equally the benefits of Big Data will be distributed and the effects this could have on already established digital divides	&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, whilst the power of Big Data is already being utilized effectively by most economically developed nations, the same cannot necessarily be said for 	many developing countries. A combination of lower levels of connectivity, poor information infrastructure, underinvestment in information technologies and 	a lack of skills and trained personnel make it far more difficult for the developing world to fully reap the rewards of Big Data. As a consequence the Big 	Data revolution risks deepening global economic inequality as developing countries find themselves unable to compete with data rich nations whose 	governments can more easily exploit the vast quantities of information generated by their technically literate and connected citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Likewise, to the extent that the Big Data analytics is playing a greater role in public policy-making, the capacity of individuals to generate large 	quantities of data, could potentially impact upon the extent to which they can provide inputs into the policy-making process. In a country such as India 	for example, where there exist high levels of inequality in access to information and communication technologies and the internet, there remain large 	discrepancies in the quantities of data produced by individuals. As a result there is a risk that those who lack access to the means of producing data will be disenfranchised, as policy-making processes become configured to accommodate the needs and interests of a privilege minority	&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Discrimination&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;13. Injudicious or Discriminatory Outcomes&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Big Data presents the opportunity for governments, businesses and individuals to make better, more informed decisions at a much faster pace. Whilst this 	can evidently provide innumerable opportunities to increase efficiency and mitigate risk, by removing human intervention and oversight from the 	decision-making process Big Data analysts run the risk of becoming blind to unfair or injudicious results generated by skewed or discriminatory programming 	of the algorithms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There currently exists a large number of automated decision-making algorithms in operation across a broad range of sectors including most notably perhaps 	those used to asses an individual's suitability for insurance or credit. In either of these cases faults in the programming or discriminatory assessment 	criteria can have potentially damaging implications for the individual, who may as a result be unable to attain credit or insurance. This concern with the 	potentially discriminatory aspects of Big Data is prevalent throughout the literature and real life examples have been identified by researchers in a large 	number of major sectors in which Big Data is currently being used&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yu for instance, cites the case of the insurance company Progressive, which required its customers to install 'Snapsnot' - a small monitoring device - into 	their cars in order to receive their best rates. The device tracked and reported the customers driving habits, and offered discounts to those drivers who 	drove infrequently, broke smoothly, and avoided driving at night - behaviors that correlate with a lower risk of future accidents. Although this form of 	price differentiation provided incentives for customers to drive more carefully, it also had the unintended consequence of unfairly penalizing late-night 	shift workers. As Yu observes, 'for late night shift-workers, who are disproportionately poorer and from minority groups, this differential pricing 	provides no benefit at all. It categorizes them as similar to late-night party-goers, forcing them to carry more of the cost of the intoxicated and other 	irresponsible driving that happens disproportionately at night'&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another example, it is noted how Big Data is increasingly being used to evaluate applicants for entry-level service jobs. One method of evaluating 	applicants is by the length of their commute - the rationale being that employees with shorter commutes are statistically more likely to remain in the job 	longer. However, since most service jobs are typically located in town centers and since poorer neighborhoods tend to be those on the outskirts of town, 	such criteria can have the effect of unfairly disadvantaging those living in economically deprived areas. Consequently such metrics of evaluation can 	therefore also unintentionally act to reinforce existing social inequalities by making it more difficult for economically disadvantaged communities to work 	their way out of poverty&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. Lack of Algorithmic Transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If data is indeed the 'oil of the 21&lt;sup&gt;st&lt;/sup&gt; century'&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt; then algorithms are very much the engines 	which are driving innovation and economic development. For many companies the quality of their algorithms is often a crucial factor in providing them with 	a market advantage over their competitor. Given their importance, the secrets behind the programming of algorithms are often closely guarded by companies, 	and are typically classified as trade secrets and as such are protected by intellectual property rights. Whilst companies may claim that such secrecy is 	necessary to encourage market competition and innovation, many scholars are becoming increasingly concerned about the lack of transparency surrounding the 	design of these most crucial tools.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In particular there is a growing sentiment common amongst many researchers that there currently exists a chronic lack of accountability and transparency in terms of how Big Data algorithms are programmed and what criteria are used to determine outcomes	&lt;a href="#_ftn61" name="_ftnref61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. As Frank Pasquale observed,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;'&lt;/i&gt; &lt;i&gt; hidden algorithms can make (or ruin) reputations, decide the destiny of entrepreneurs, or even devastate an entire economy. Shrouded in secrecy and 		complexity, decisions at major Silicon Valley and Wall Street firms were long assumed to be neutral and technical. But leaks, whistleblowers, and legal 		disputes have shed new light on automated judgment. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by 		legal and real secrecy'&lt;a href="#_ftn62" name="_ftnref62"&gt;&lt;b&gt;[62]&lt;/b&gt;&lt;/a&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As such, without increased transparency in algorithmic design, instances of Big Data discrimination may go unnoticed as analyst are unable to access the 	information necessary to identify them.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Today Big Data presents us with as many challenges as it does benefits. Whilst Big Data analytics can offer incredible opportunities to reduce 	inefficiency, improve decision-making, and increase transparency, concerns remain about the effects of these new technologies on issues such as privacy, 	equality and discrimination. Although the tensions between the competing demands of Big Data advocates and their critics may appear irreconcilable; only by 	highlighting these points of contestation can we hope to begin to ask the types of important and difficult questions necessary to do so, including; how can 	we reconcile Big Data's need for massive inputs of personal information with core principles of privacy such as data minimization and collection 	limitation? What processes and procedures need to be put in place during the design and implementation of Big Data models and algorithms to provide 	sufficient transparency and accountability so as to avoid instances of discrimination? What measures can be used to help close digital divides and ensure 	that the benefits of Big Data are shared equitably? Questions such as these are today only just beginning to be addressed; each however, will require 	careful consideration and reasoned debate, if Big Data is to deliver on its promises and truly fulfil its 'revolutionary' potential.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Gantz, J., &amp;amp;Reinsel, D. Extracting Value from Chaos, &lt;i&gt;IDC, &lt;/i&gt;(2011), available at: 			&lt;a href="http://www.emc.com/collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf"&gt; http://www.emc.com/collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Meeker, M. &amp;amp; Yu, L. Internet Trends, &lt;i&gt;Kleiner Perkins Caulfield Byers,&lt;/i&gt; (2013),			&lt;a href="http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013"&gt;http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Douglas, L&lt;i&gt;. &lt;/i&gt; &lt;a href="http://blogs.gartner.com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf"&gt; &lt;i&gt;"3D Data Management: Controlling Data Volume, Velocity and Variety"&lt;/i&gt; &lt;/a&gt; &lt;i&gt; . Gartner, &lt;/i&gt; (2001)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt;Vol 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;, 			Tene, O., &amp;amp;Polonetsky, J. Big Data for All: Privacy and User Control in the Age of Analytics&lt;i&gt;, 11 Nw. J. Tech. &amp;amp;Intell. Prop. 239&lt;/i&gt; (2013)			&lt;a href="http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1"&gt;http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Ibid.,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Joh. E, 'Policing by Numbers: Big Data and the Fourth Amendment', &lt;i&gt;Washington Law Review, Vol. 85: 35, &lt;/i&gt;(2014) 			&lt;a href="https://digital.law.washington.edu/dspace-law/bitstream/handle/1773.1/1319/89WLR0035.pdf?sequence=1"&gt; https://digital.law.washington.edu/dspace-law/bitstream/handle/1773.1/1319/89WLR0035.pdf?sequence=1 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Raghupathi, W., &amp;amp;Raghupathi, V. &lt;a href="http://www.hissjournal.com/content/2/1/3"&gt;Big data analytics in healthcare: promise and potential&lt;/a&gt;.			&lt;i&gt;Health Information Science and Systems&lt;/i&gt;, (2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Anderson, R., &amp;amp; Roberts, D. 'Big Data: Strategic Risks and Opportunities, &lt;i&gt;Crowe Horwarth Global Risk Consulting Limited&lt;/i&gt;, (2012) 			&lt;a href="https://www.crowehorwath.net/uploadedfiles/crowe-horwath-global/tabbed_content/big%20data%20strategic%20risks%20and%20opportunities%20white%20paper_risk13905.pdf"&gt; https://www.crowehorwath.net/uploadedfiles/crowe-horwath-global/tabbed_content/big%20data%20strategic%20risks%20and%20opportunities%20white%20paper_risk13905.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Kshetri. N, 'The Emerging role of Big Data in Key development issues: Opportunities, challenges, and concerns'. &lt;i&gt;Big Data &amp;amp; Society&lt;/i&gt; (2014)&lt;a href="http://bds.sagepub.com/content/1/2/2053951714564227.abstract"&gt;http://bds.sagepub.com/content/1/2/2053951714564227.abstract&lt;/a&gt;,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Tene, O., &amp;amp;Polonetsky, J. Big Data for All: Privacy and User Control in the Age of Analytics&lt;i&gt;, 11 Nw. J. Tech. &amp;amp;Intell. Prop. 239&lt;/i&gt; (2013)			&lt;a href="http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1"&gt;http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Cisco, 'IoE-Driven Smart Street Lighting Project Allows Oslo to Reduce Costs, Save Energy, Provide Better Service', Cisco, (2014) Available at: 			&lt;a href="http://www.cisco.com/c/dam/m/en_us/ioe/public_sector/pdfs/jurisdictions/Oslo_Jurisdiction_Profile_051214REV.pdf"&gt; http://www.cisco.com/c/dam/m/en_us/ioe/public_sector/pdfs/jurisdictions/Oslo_Jurisdiction_Profile_051214REV.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Newell, B, C. Local Law Enforcement Jumps on the Big Data Bandwagon: Automated License Plate Recognition Systems, Information Privacy, and Access to Government Information. &lt;i&gt;University of Washington - the Information School&lt;/i&gt;, (2013)			&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2341182"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2341182&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Morris, D. Big data could improve supply chain efficiency-if companies would let it&lt;i&gt;, Fortune, August 5 &lt;/i&gt;2015, 			http://fortune.com/2015/08/05/big-data-supply-chain/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Tucker, Darren S., &amp;amp; Wellford, Hill B., Big Mistakes Regarding Big Data, Antitrust Source, American Bar Association, (2014). Available at SSRN: 			http://ssrn.com/abstract=2549044&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Davenport, T., Barth., Bean, R. How is Big Data Different, &lt;i&gt;MITSloan Management Review, Fall &lt;/i&gt;(2012), Available at,			&lt;a href="http://sloanreview.mit.edu/article/how-big-data-is-different/"&gt;http://sloanreview.mit.edu/article/how-big-data-is-different/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Tucker, Darren S., &amp;amp; Wellford, Hill B., Big Mistakes Regarding Big Data, Antitrust Source, American Bar Association, (2014). Available at SSRN: 			http://ssrn.com/abstract=2549044&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Raghupathi, W., &amp;amp;Raghupathi, V. &lt;a href="http://www.hissjournal.com/content/2/1/3"&gt;Big data analytics in healthcare: promise and potential&lt;/a&gt;.			&lt;i&gt;Health Information Science and Systems&lt;/i&gt;, (2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Brown, B., Chui, M., Manyika, J. 'Are you Ready for the Era of Big Data?', &lt;i&gt;McKinsey Quarterly,&lt;/i&gt; (2011), Available at, 			&lt;a href="http://www.t-systems.com/solutions/download-mckinsey-quarterly-/1148544_1/blobBinary/Study-McKinsey-Big-data.pdf"&gt; http://www.t-systems.com/solutions/download-mckinsey-quarterly-/1148544_1/blobBinary/Study-McKinsey-Big-data.pdf &lt;/a&gt; ; Benady, D., 'Radical transparency will be unlocked by technology and big data', &lt;i&gt;Guardian &lt;/i&gt;(2014) Available at: 			&lt;a href="http://www.theguardian.com/sustainable-business/radical-transparency-unlocked-technology-big-data"&gt; http://www.theguardian.com/sustainable-business/radical-transparency-unlocked-technology-big-data &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; United Nations, A World That Counts: Mobilising the Data Revolution for Sustainable Development, 			&lt;i&gt; Report prepared at the request of the United Nations Secretary-General,by the Independent Expert Advisory Group on a Data Revolutionfor 				Sustainable Development. &lt;/i&gt; (2014), pg. 18, see also, Hilbert, M. Big Data for Development: From Information- to Knowledge Societies (2013). Available at SSRN:			&lt;a href="http://ssrn.com/abstract=2205145"&gt;http://ssrn.com/abstract=2205145&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Greenleaf, G. Abandon All Hope? &lt;i&gt;Foreword for Issue 37(2) of the UNSW Law Journal on 'Communications Surveillance, Big Data, and the Law'&lt;/i&gt; ,(2014) &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2490425"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2490425##&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt; Vol. 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Tene, O., &amp;amp;Polonetsky, J. Big Data for All: Privacy and User Control in the Age of Analytics, 11 Nw. J. Tech. &amp;amp;Intell. Prop. 239 (2013)			&lt;a href="http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1"&gt;http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Narayanan and Shmatikov quoted in Ibid.,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; OECD, Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, The Organization for Economic Co-Operation and Development, 			(1999); The European Parliament and the Council of the European Union, EU Data Protection Directive, "Directive 95/46/EC of the European Parliament 			and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of 			such data," (1995)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Barocas, S., &amp;amp;Selbst, A, D., Big Data's Disparate Impact,&lt;i&gt;California Law Review, Vol. 104, &lt;/i&gt;(2015). Available at SSRN:			&lt;a href="http://ssrn.com/abstract=2477899" target="_blank"&gt;http://ssrn.com/abstract=2477899&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Article 29 Working Group., Opinion 03/2013 on purpose limitation, &lt;i&gt;Article 29 Data Protection Working Party, &lt;/i&gt;(2013) available at: 			&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf"&gt; http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; Solove, D, J. Privacy Self-Management and the Consent Dilemma, 126 Harv. L. Rev. 1880 (2013), Available at: 			&lt;a href="http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications"&gt; http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Brandimarte, L., Acquisti, A., &amp;amp; Loewenstein, G., Misplaced Confidences:&lt;/p&gt;
&lt;p&gt;Privacy and the Control Paradox,			&lt;i&gt;Ninth Annual Workshop on the Economics of Information Security (WEIS) June 7-8 2010, Harvard University, Cambridge, MA, &lt;/i&gt;(2010), available 			at: 			&lt;a href="https://fpf.org/wp-content/uploads/2010/07/Misplaced-Confidences-acquisti-FPF.pdf"&gt; https://fpf.org/wp-content/uploads/2010/07/Misplaced-Confidences-acquisti-FPF.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Solove, D, J., Privacy Self-Management and the Consent Dilemma, &lt;i&gt;126 Harv. L. Rev. 1880&lt;/i&gt; (2013), Available at: 			http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Yu, W, E., Data., Privacy and Big Data-Compliance Issues and Considerations, &lt;i&gt;ISACA Journal, Vol. 3 2014 &lt;/i&gt;(2014), available at: 			&lt;a href="http://www.isaca.org/Journal/archives/2014/Volume-3/Pages/Data-Privacy-and-Big-Data-Compliance-Issues-and-Considerations.aspx"&gt; http://www.isaca.org/Journal/archives/2014/Volume-3/Pages/Data-Privacy-and-Big-Data-Compliance-Issues-and-Considerations.aspx &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Ramirez, E., Brill, J., Ohlhausen, M., Wright, J., &amp;amp; McSweeny, T., Data Brokers: A Call for Transparency and Accountability,			&lt;i&gt;Federal Trade Commission&lt;/i&gt; (2014) 			https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Michel Foucault, Discipline and Punish: The Birth of the Prison. Translated by Alan Sheridan, &lt;i&gt;London: Allen Lane, Penguin,&lt;/i&gt; (1977)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Marthews, A., &amp;amp; Tucker, C., Government Surveillance and Internet Search Behavior (2015), available at SSRN: http://ssrn.com/abstract=2412564&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon', Information, 			Communication &amp;amp; Society, Vol. 15, Issue 5, (2012)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; Hirsch, D., That's Unfair! Or is it? Big Data, Discrimination and the FTC's Unfairness Authority, &lt;i&gt;Kentucky Law Journal, Vol. 103&lt;/i&gt;, 			available at: 			&lt;a href="http://www.kentuckylawjournal.org/wp-content/uploads/2015/02/103KyLJ345.pdf"&gt; http://www.kentuckylawjournal.org/wp-content/uploads/2015/02/103KyLJ345.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Hill, K., How Target Figured Out A Teen Girl Was Pregnant Before Her Father 			Didhttp://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Anderson, C (2008) "The End of Theory: The Data Deluge Makes the Scientific Method Obsolete", WIRED, June 23 2008, www.wired.com/2008/06/pb-theory/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; Ibid.,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Kitchen, R (2014) Big Data, new epistemologies and paradigm shifts, Big Data &amp;amp; Society, April-June 2014: 1-12&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Boyd D and Crawford K (2012) Critical questions for big data. Information, Communication and Society 15(5): 662-679&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; Lazer, D., Kennedy, R., King, G., &amp;amp;Vespignani, A. " 			&lt;a href="http://gking.harvard.edu/publications/parable-Google-Flu%c2%a0Traps-Big-Data-Analysis"&gt; The Parable of Google Flu: Traps in Big Data Analysis &lt;/a&gt; ." &lt;i&gt;Science 343&lt;/i&gt; (2014): 1203-1205. Copy at &lt;a href="http://j.mp/1ii4ETo"&gt;http://j.mp/1ii4ETo&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt;Vol 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Leinweber, D. (2007) 'Stupid data miner tricks: overfitting the S&amp;amp;P 500', The Journal of Investing, vol. 16, no. 1, pp. 15-22.			&lt;a href="http://m.shookrun.com/documents/stupidmining.pdf"&gt;http://m.shookrun.com/documents/stupidmining.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; Boyd D and Crawford K (2012) Critical questions for big data. Information, Communication and Society 15(5): 662-679&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; McCue, C., Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, &lt;i&gt;Butterworth-Heinemann,&lt;/i&gt; (2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; De Zwart, M. J., Humphreys, S., &amp;amp; Van Dissel, B. Surveillance, big data and democracy: lessons for Australia from the US and UK.			&lt;i&gt;Http://www.unswlawjournal.unsw.edu.au/issue/volume-37-No-2&lt;/i&gt;. (2014) Retrieved from 			https://digital.library.adelaide.edu.au/dspace/handle/2440/90048&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt;Vol 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;; 			Newman, N., Search, Antitrust and the Economics of the Control of User Data, &lt;i&gt;31 YALE J. ON REG. 401 &lt;/i&gt;(2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; Newman, N., The Cost of Lost Privacy: Search, Antitrust and the Economics of the Control of User Data (2013). Available at SSRN: 			http://ssrn.com/abstract=2265026, Newman, N. ,Search, Antitrust and the Economics of the Control of User Data, &lt;i&gt;31 YALE J. ON REG. 401&lt;/i&gt; (2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; Ibid.,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; European Data Protection Supervisor, Privacy and competitiveness in the age of big data:&lt;/p&gt;
&lt;p&gt;The interplay between data protection, competition law and consumer protection in the Digital Economy, (2014), available at: 			&lt;a href="https://secure.edps.europa.eu/EDPSWEB/webdav/shared/Documents/Consultation/Opinions/2014/14-03-26_competitition_law_big_data_EN.pdf"&gt; https://secure.edps.europa.eu/EDPSWEB/webdav/shared/Documents/Consultation/Opinions/2014/14-03-26_competitition_law_big_data_EN.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt;Vol 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; Schradie, J., Big Data Not Big Enough? How the Digital Divide Leaves People Out, MediaShift, 31 July 2013, (2013), available at: 			&lt;a href="http://mediashift.org/2013/07/big-data-not-big-enough-how-digital-divide-leaves-people-out/"&gt; http://mediashift.org/2013/07/big-data-not-big-enough-how-digital-divide-leaves-people-out/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; Crawford, K., The Hidden Biases in Big Data, &lt;i&gt;Harvard Business Review, 1 April 2013 &lt;/i&gt;(2013), available at:			&lt;a href="https://hbr.org/2013/04/the-hidden-biases-in-big-data"&gt;https://hbr.org/2013/04/the-hidden-biases-in-big-data&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; Robinson, D., Yu, H., Civil Rights, Big Data, and Our Algorithmic Future, (2014)			&lt;a href="http://bigdata.fairness.io/introduction/"&gt;http://bigdata.fairness.io/introduction/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; Rotellla, P., Is Data The New Oil? Forbes, 2 April 2012, (2012), available at: 			&lt;a href="http://www.forbes.com/sites/perryrotella/2012/04/02/is-data-the-new-oil/"&gt; http://www.forbes.com/sites/perryrotella/2012/04/02/is-data-the-new-oil/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; Barocas, S., &amp;amp;Selbst, A, D., Big Data's Disparate Impact,&lt;i&gt;California Law Review, Vol. 104, &lt;/i&gt;(2015). Available at SSRN:			&lt;a href="http://ssrn.com/abstract=2477899" target="_blank"&gt;http://ssrn.com/abstract=2477899&lt;/a&gt;; Kshetri. N, 'The Emerging role of Big Data in Key development issues: Opportunities, challenges, and concerns'. &lt;i&gt;Big Data &amp;amp; Society&lt;/i&gt;(2014)			&lt;a href="http://bds.sagepub.com/content/1/2/2053951714564227.abstract"&gt;http://bds.sagepub.com/content/1/2/2053951714564227.abstract&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; Pasquale, F., The Black Box Society: The Secret Algorithms That Control Money and Information, Harvard University Press , (2015)&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data'&gt;https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Scott Mason</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2015-12-30T02:48:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles">
    <title>Analysis of Aadhaar Act in the Context of A.P. Shah Committee Principles</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles</link>
    <description>
        &lt;b&gt;Whilst there are a number of controversies relating to the Aadhaar Act including the fact that it was introduced in a manner so as to circumvent the majority of the opposition in the upper house of the Parliament and that it was rushed through the Lok Sabha in a mere eight days, in this paper we shall discuss the substantial aspects of the Act in relation to privacy concerns which have been raised by a number of experts. In October 2012, the Group of Experts on Privacy constituted by the Planning Commission under the chairmanship of Justice AP Shah Committee submitted its report which listed nine principles of privacy which all legislations, especially those dealing with personal should adhere to. In this paper, we shall discuss how the Aadhaar Act fares vis-à-vis these nine principles.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 (the “Aadhaar Act”) was introduced in the Lok Sabha (lower house of the Parliament) by Minister of Finance, Mr. Arun Jaitley, in on March 3, 2016, and was passed by the Lok Sabha on March 11, 2016. It was sent back by the Rajya Sabha with suggestions but the Lok Sabha rejected those suggestions, which means that the Act is now deemed to have been passed by both houses as it was originally introduced as a Money Bill. Whilst there are a number of controversies relating to the Aadhaar Act including the fact that it was introduced in a manner so as to circumvent the majority of the opposition in the upper house of the Parliament and that it was rushed through the Lok Sabha in a mere eight days, in this paper we shall discuss the substantial aspects of the Act in relation to privacy concerns which have been raised by a number of experts. In October 2012, the Group of Experts on Privacy constituted by the Planning Commission under the chairmanship of Justice AP Shah Committee submitted its report which listed nine principles of privacy which all legislations, especially those dealing with personal should adhere to. In this paper, we shall discuss how the Aadhaar Act fares vis-à-vis these nine principles.&lt;/p&gt;
&lt;p&gt;In order for the reader to better understand the frame of reference on which we shall analyse the Aadhaar Act, the nine principles contained in the report of the Group of Experts on Privacy are explained in brief below:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Principle 1: Notice&lt;/strong&gt; - Does the legislation/regulation require that entities governed by the Act give simple to understand notice of its information practices to all individuals, in clear and concise language, before any personal information is collected from them.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 2: Choice and Consent&lt;/strong&gt; - Does the legislation/regulation require that entities governed under the Act provide the individual with the option to opt in/opt out of providing their personal information.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 3: Collection Limitation&lt;/strong&gt; - Does the legislation/regulation require that entities governed under the Act collect personal information from individuals only as is necessary for a purpose identified.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 4: Purpose Limitation&lt;/strong&gt; - Does the legislation/regulation require that personal data collected and processed by entities governed by the Act be adequate and relevant to the purposes for which they are processed.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 5: Access and Correction&lt;/strong&gt; - Does the legislation/regulation allow individuals: access to personal information about them held by an entity governed by the Act; the ability to seek correction, amendments, or deletion of such information where it is inaccurate, etc.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 6: Disclosure&lt;/strong&gt; - Does the legislation ensure that information is only disclosed to third parties after notice and informed consent is obtained. Is disclosure allowed for law enforcement purposes done in accordance with laws in force.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 7: Security&lt;/strong&gt; - Does the legislation/regulation ensure that information that is collected and processed under that Act, is done so in a manner that protects against loss, unauthorized access, destruction, etc.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 8: Openness&lt;/strong&gt; - Does the legislation/regulation require that any entity processing data take all necessary steps to implement practices, procedures, policies and systems in a manner proportional to the scale, scope, and sensitivity to the data that is collected and processed and is this information made available to all individuals in an intelligible form, using clear and plain language?&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 9: Accountability&lt;/strong&gt; - Does the legislation/regulation provide for measures that ensure compliance of the privacy principles? This would include measures such as mechanisms to implement privacy policies; including tools, training, and education; and external and internal audits.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Analysis of the Aadhaar Act&lt;/h2&gt;
&lt;p&gt;The Aadhaar Act has been brought about to give legislative backing to the most ambitious individual identity programme in the world which aims to provide a unique identity number to the entire population of India. The rationale behind this scheme is to correctly identify the beneficiaries of government schemes and subsidies so that leakages in government subsidies may be reduced. In furtherance of this rationale the Aadhaar Act gives the Unique Identification Authority of India (“UIDAI”) the power to enroll individuals by collecting their demographic and biometric information and issuing an Aadhaar number to them. Below is an analysis of the Act based on the privacy principles enumerated I the A.P. Shah Committee Report.&lt;/p&gt;
&lt;h3&gt;Collection Limitation&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Collection of Biometric and Demographic Information:&lt;/strong&gt; The Aadhaar Act entitles every “resident”
&lt;strong&gt;[1]&lt;/strong&gt; to obtain an Aadhaar number by submitting his/her biometric (photograph, finger print, Iris scan) and demographic information (name, date of birth, address &lt;strong&gt;[2]&lt;/strong&gt;) &lt;strong&gt;[3]&lt;/strong&gt;. It must be noted that the Act leaves scope for further information to be included in the collection process if so specified by regulations. It must be noted that although the Act specifically provides what information can be collected, it does not specifically prohibit the collection of further information. This becomes relevant because it makes it possible for enrolling agencies to collect extra information relating to individuals without any legal implications of such act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Authentication Records:&lt;/strong&gt; The UIDAI is mandated to maintain authentication records for a period which is yet to be specified (and shall be specified in the regulations) but it cannot collect or keep any information regarding the purpose for which the authentication request was made &lt;strong&gt;[4]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Unauthorized Collection:&lt;/strong&gt; Any person who in not authorized to collect information under the Act, and pretends that he is authorized to do so, shall be punishable with imprisonment for a term which may extend to three years or with a fine which may extend to Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/- &lt;strong&gt;[5]&lt;/strong&gt;. It must be noted that the section, as it is currently worded seems to criminalize the act of impersonation of authorized individuals and the actual collection of information is not required to complete this offence. It is not clear if this section will apply if a person who is authorized to collect information under the Act in general, collects some information that he/she is not authorized to collect.&lt;/p&gt;
&lt;h3&gt;Notice&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Notice during Collection:&lt;/strong&gt; The Aadhaar Act requires that the agencies enrolling people for distribution of Aadhaar numbers should give people notice regarding: (a) the manner in which the information shall be used; (b) the nature of recipients with whom the information is intended to be shared during authentication; and (c) the existence of a right to access information, the procedure for making requests for such access, and details of the person or department in-charge to whom such requests can be made &lt;strong&gt;[6]&lt;/strong&gt;. A failure to comply with this requirement will make the agency liable for imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/- &lt;strong&gt;[7]&lt;/strong&gt;. It must be noted that the Act leaves the manner of giving such notice in the realm of regulations and does not specify how this notice is to be provided, which leaves important specifics to the realm of the executive.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Notice during Authentication:&lt;/strong&gt; The Aadhaar Act requires that authenticating agencies shall give information to the individuals whose information is to be authenticated regarding (a) the nature of information that may be shared upon authentication; (b) the uses to which the information received during authentication may be put by the requesting entity; and (c) alternatives to submission of identity information to the requesting entity &lt;strong&gt;[8]&lt;/strong&gt;. A failure to comply with this requirement will make the agency liable for imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/- &lt;strong&gt;[9]&lt;/strong&gt;. Just as in the case of notice during collection, the manner in which the notice is required to be given is left to regulations leaving an unclear picture as to how comprehensive, accessible, and frequent this notice must be.&lt;/p&gt;
&lt;h3&gt;Access and Correction&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Updating Information:&lt;/strong&gt; The Aadhaar Act give the UIDAI the power to require residents to update their demographic and biometric information from time to time so as to maintain its accuracy &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Access to Information:&lt;/strong&gt; The Aadhaar Act provides that Aadhaar number holders may request the UIDAI to provide access to their identity information expect their core biometric information &lt;strong&gt;[11]&lt;/strong&gt;. It is not clear why access to the core biometric information &lt;strong&gt;[12]&lt;/strong&gt; is not provided to an individual. Further, since section 6 seems to place the responsibility of updation and accuracy of biometric information on the individual, it is not clear how a person is supposed to know that the biometric information contained in the database has changed if he/she does not have access to the same. It may also be noted that the Aadhaar Act provides only for a request to the UIDAI for access to the information and does not make access to the information a right of the individual, this would mean that it would be entirely upon the discretion of the UIDAI to refuse to grant access to the information once a request has been made.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Alteration of Information:&lt;/strong&gt; The Aadhaar Act gives individuals the right to request the UIDAI to alter their demographic if the same is incorrect or has changed and biometric information if it is lost or has changed. Upon receipt of such a request, if the UIDAI is satisfied, then it may make the necessary alteration and inform the individual accordingly. The Act also provides that no identity information in the Central database shall be altered except as provided in the regulations &lt;strong&gt;[13]&lt;/strong&gt;. This section provides for alteration of identity information but only in the circumstances given in the section, for example demographic information cannot be changed if it has been lost, similarly biometric information cannot be changed if it is inaccurate. Further, the section does not give a right to the individual to get the information altered but only entitles him/her to request the UIDAI to make a change and the final decision is left to the “satisfaction” of the UIDAI.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Access to Authentication Record:&lt;/strong&gt; Every individual is given the right to obtain his/her authentication record in a manner to be specified by regulations. [14]&lt;/p&gt;
&lt;h3&gt;Disclosure&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Sharing during Authentication:&lt;/strong&gt; The UIDAI is entitled to reply to any authentication query with a positive, negative or any other response which may be appropriate and may share identity information except core biometric information with the requesting entity &lt;strong&gt;[15]&lt;/strong&gt;. The language in this provision is ambiguous and it is unclear what 'identity information' may be shared and why it would be necessary to share such information as Aadhaar is meant to be  only a means of authentication so as to remove duplication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Potential Disclosure during Maintenance of CIDR:&lt;/strong&gt; The UIDAI has been given the power to appoint any one or more entities to establish and maintain the Central Identities Data Repository (CIDR) &lt;strong&gt;[16]&lt;/strong&gt;. If a private entity is involved in the maintenance and establishment of the CIDR it can be presumed that there is the possibilty that they would, to some degree, have access to the information stored in the CIDR, yet there are no clear standards in the Act regarding this potential access. And the process for appointing such entities. The fact that the UIDAI has been given the freedom to appoint an outside entity to maintain a sensitive asset such as the CIDR raises security concerns.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Restriction on Sharing Information:&lt;/strong&gt; The Aadhaar Act creates a blanket prohibition on the usage of core biometric information for any purpose other than generation of Aadhaar numbers and also prohibits its sharing for any reason whatsoever &lt;strong&gt;[17]&lt;/strong&gt;. Other identity information is allowed to be shared in the manner specified under the Act or as may be specified in the regulations &lt;strong&gt;[18]&lt;/strong&gt;. The Act further provides that the requesting entities shall not disclose the identity information except with the prior consent of the individual to whom the information relates &lt;strong&gt;[19]&lt;/strong&gt;. There is also a prohibition on publicly displaying Aadhaar number or core biometric information except as specified by regulations &lt;strong&gt;[20]&lt;/strong&gt;. Officers or the UIDAI or the employees of the agencies employed to maintain the CIDR are prohibited from revealing the information stored in the CIDR or authentication record to anyone &lt;strong&gt;[21]&lt;/strong&gt;. It is not clear why an exception has been carved out and what circumstances would require publicly displaying Aadhaar numbers and core biometric information, especially since the reasons for which such important information may be displayed has been left up to regulations which have relatively less oversight. The section also provides the requesting entities with an option to further disclose information if they take consent of the individuals. This may lead to a situation where a requesting entity, perhaps the of an essential service, may take the consent of the individual to disclose his/her information in a standard form contract, without the option of saying no to such a request. It may lead to situations where the option is between giving consent to disclosure or denial or service altogether. For this reason it is necessary that there should be an opt in and opt out provision wherever a requesting entity has the power to ask for disclosure of information, so that people are not coerced into giving consent.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Disclosure in Specific Cases:&lt;/strong&gt; The prohibition on disclosure of information (except for core biometric information) does not apply in case of any disclosure made pursuant to an order of a court not below that of a District Judge &lt;strong&gt;[22]&lt;/strong&gt;. There is another exception to the prohibition on disclosure of information (including core biometric information) in the interest of national security if so directed by an officer not below the rank of a Joint Secretary to the Government of India specially authorised in this behalf by an order of the Central Government. Before any such direction can take effect, it will be reviewed by an oversight committee consisting of the Cabinet Secretary and the Secretaries to the Government of India in the Department of Legal Affairs and the Department of Electronics and Information Technology. Any such direction shall be valid for a period of three months and may be extended by another three months after the review by the Oversight Committee &lt;strong&gt;[23]&lt;/strong&gt;. Although this provision has been criticized, and rightly so, for the lack of accountability since the entire process is being handled within the executive and there is no independent oversight, however it must be mentioned that the level of oversight provided here is similar to that provided to interception requests, which involve a much graver if not the same level of invasion of privacy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Penalty for Disclosure:&lt;/strong&gt; Any person who intentionally and in an unauthorized manner discloses, transmits, copies or otherwise disseminates any identity information collected in the course of enrolment or authentication shall be punishable with imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/ &lt;strong&gt;[24]&lt;/strong&gt;. Further any person who intentionally and in an unathorised manner, accesses information in the CIDR &lt;strong&gt;[25]&lt;/strong&gt;, downloads, copies or extracts any data from the CIDR &lt;strong&gt;[26]&lt;/strong&gt;, or reveals or shares or distributes any identity information, shall be punishable with imprisonment of upto 3 years and a fine of not less than Rs. 10,00,000/-.&lt;/p&gt;
&lt;h3&gt;Consent&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Consent for Authentication:&lt;/strong&gt; A requesting entity has to take the consent of the individual before collecting his/her identity information for the purposes of authentication and also has to inform the individual of the alternatives to submission of the identity information &lt;strong&gt;[27]&lt;/strong&gt;. Although this provision requires entities to take consent from the individuals before collecting information for authentication, however how useful this requirement of consent would be, still remains to be seen. There may be instances where a requesting entity may take the consent of the individual in a standard form contract, without the individual realizing what he/she is consenting to.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The Aadhaar Act provides no requirement or standard for the form of consent that must be taken during enrollment. This is significant as it is the point at which individuals are providing raw biometric material and during previous enrollment, has been a point of weakness as the consent taken is an enabler to function creep as it allows the UIDAI to share information with engaged in delivery of welfare services &lt;strong&gt;[28]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Purpose&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Use of Information:&lt;/strong&gt; The authenticating entities are allowed to use the identity information only for the purpose of submission to the CIDR for authentication &lt;strong&gt;[29]&lt;/strong&gt;. Further, the Act specifies that identity information available with a requesting entity shall not be used for any purpose other than that specified to the individual at the time of submitting the information for authentication &lt;strong&gt;[30]&lt;/strong&gt;. The Act also provides that any authentication entity which uses the information for any purpose not already specified will be liable to punishment of imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/ &lt;strong&gt;[31]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Security&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Security and Confidentiality of Information:&lt;/strong&gt; It is the responsibility of the UIDAI to ensure the security and confidentiality of the identity and authentication information and it is required to take all necessary action to ensure that the information in the CIDR is protected against unauthorized access, use or disclosure and against accidental or intentional destruction, loss or damage &lt;strong&gt;[32]&lt;/strong&gt;. The UIDAI is required to adopt and implement appropriate technical and organisational security measures and also ensure that its contractors do the same &lt;strong&gt;[33]&lt;/strong&gt;. It is also required to ensure that the agreements entered into with its contractors impose the same conditions as are imposed on the UIDAI under the Act and that they shall act only upon the instructions of the UIDAI &lt;strong&gt;[34]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Biometric Information to be Electronic Record:&lt;/strong&gt; The biometric information collected by the UIDAI has been deemed to be an “electronic record” as well as “sensitive personal data or information”, which would mean that in addition to the provisions of the Aadhaar Act, the provisions contained in the Information Technology Act, 2000 will also apply to such information &lt;strong&gt;[35]&lt;/strong&gt;. It must be noted that while the Act lays down the principle that UIDAI is required to ensure the saecurity of the information, it does not  lay down any guidelines as to the minimum security standards to be implemented by the Authority. However, through this section the legislature has linked the security standards contained in the IT Act to the information contained in this Act. While this is a clean way of dealing with the issue, some people may argue that the extremely sensitive nature of the information contained in the CIDR requires the standards for security to be much stricter than those provided in the IT Act. However, a perusal of Rule 8 of the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 shows that the Rules themselves provide that the standard of security must be commensurate with the information assets being protected. It would thus seem that the Act provides enough room to protect such important information, but perhaps leaves too much room for interpretation for such an important issue.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Penalty for Unauthorised Access:&lt;/strong&gt; Apart from the security provisions included in the legislation, the Aadhaar Act also provides for punishment of imprisonment of upto 3 years and a fine which shall not be less than Rs. 10,00,000/-, in case of the following offences:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;introduction of any virus or other computer contaminant in the CIDR &lt;strong&gt;[36]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;causing damage to the data in the CIDR &lt;strong&gt;[37]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;disruption of access to the CIDR &lt;strong&gt;[38]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;denial of access to any person who is authorised to access the CIDR &lt;strong&gt;[39]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;destruction, deletion or alteration of any information stored in any removable storage media or in the CIDR or diminishing its value or utility or affecting it injuriously by any means &lt;strong&gt;[40]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;stealing, concealing, destroying or altering any computer source code used by the Authority with an intention to cause damage &lt;strong&gt;[41]&lt;/strong&gt;.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Further, unauthorized usage or tampering with the data in the CIDR or in any removable storage medium with the intent of modifying information relating to Aadhaar number holder or discovering any information thereof, is also punishable with imprisonment for a term which may extend to 3 years and also a fine which may extend to Rs. 10,000/- &lt;strong&gt;[42]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Accountability&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Inspections and Audits:&lt;/strong&gt; One of the functions listed in the powers and functions of the UIDAI is the power to call for information and records, conduct inspections, inquiries and audit of the operations of the CIDR, Registrars, enrolling agencies and other agencies appointed under the Aadhaar Act &lt;strong&gt;[43]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Grievance Redressal:&lt;/strong&gt; Another function of the UIDAI is to set up facilitation centres and grievance redressal mechanisms for redressal of grievances of individuals, Registrars, enrolling agencies and other service providers &lt;strong&gt;[44]&lt;/strong&gt;. It must be said here that considering the importance that the government has given to and intends to give to Aadhaar in the future, an essential task such as grievance redressal should not be left entirely to the discretion of the UIDAI and some grievance redressal mechanism should be incorporated into the Act itself.&lt;/p&gt;
&lt;h3&gt;Openness&lt;/h3&gt;
&lt;p&gt;There does not seem to be any provision in the Aadhaar Act which requires the UIDAI to make its privacy policies and procedure available to the public in general even though the UIDAI has the responsibility to maintain the security and confidentiality of the information.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; A resident is defined as any person who has resided in India for a period of atleasy 182 days in the previous 12 months.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; It has been specified that demographic information will not include race, religion, caste, tribe, ethnicity, language, records of entitlement, income or medical history.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; Section 3(1) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Section 32(1) and 32(3) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; Section 36 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; Section 3(2) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; Section 41 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; Section 8(3) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; Section 41 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; Section 6 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; Section 28, &lt;em&gt;proviso&lt;/em&gt; of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; Core biometric information is defined as fingerprints, iris scan or other biological attributes which may be specified by regulations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[13]&lt;/strong&gt; Section 31 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[14]&lt;/strong&gt; Section 32(2) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[15]&lt;/strong&gt; Section 8(4) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[16]&lt;/strong&gt; Section 10 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[17]&lt;/strong&gt; Section 29(1) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[18]&lt;/strong&gt; Section 29(2) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[19]&lt;/strong&gt; Section 29(3)(b) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[20]&lt;/strong&gt; Section 29(4) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[21]&lt;/strong&gt; Section 28(5) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[22]&lt;/strong&gt; Section 33(1) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[23]&lt;/strong&gt; Section 33(2) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[24]&lt;/strong&gt; Section 37 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[25]&lt;/strong&gt; Section 38(a) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[26]&lt;/strong&gt; Section 38(b) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[27]&lt;/strong&gt; Section 8(2)(a) and (c) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[28]&lt;/strong&gt; For example, see: &lt;a href="http://www.karnataka.gov.in/aadhaar/Downloads/Application%20form%20-%20English.pdf"&gt;http://www.karnataka.gov.in/aadhaar/Downloads    /Application%20form%20-%20English.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[29]&lt;/strong&gt; Section 8(2)(b) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[30]&lt;/strong&gt; Section 29(3)(a) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[31]&lt;/strong&gt; Section 37 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[32]&lt;/strong&gt; Section 28(1), (2) and (3) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[33]&lt;/strong&gt; Section 28(4)(a) and (b) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[34]&lt;/strong&gt; Section 28(4)(c) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[35]&lt;/strong&gt; Section 30 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[36]&lt;/strong&gt; Section 38(c) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[37]&lt;/strong&gt; Section 38(d) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[38]&lt;/strong&gt; Section 38(e) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[39]&lt;/strong&gt; Section 38(f) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[40]&lt;/strong&gt; Section 38(h) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[41]&lt;/strong&gt; Section 38(i) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[42]&lt;/strong&gt; Section 39 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[43]&lt;/strong&gt; Section 23(2)(l) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[44]&lt;/strong&gt; Section 23(2)(s) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles'&gt;https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-03-17T19:43:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy">
    <title>An Urgent Need for the Right to Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy</link>
    <description>
        &lt;b&gt;Along with a group of individuals and organisations from academia and civil society, we have drafted and are signatories to an open letter addressed to the Union government and urging the same to "urgently take steps to uphold the constitutional basis to the right to privacy and fulfil it’s constitutional and international obligations." Here we publish the text of the open letter. Please follow the link below to support it by joining the signatories.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://goo.gl/forms/hw4huFcc4b" target="_blank"&gt;Read and sign the open letter.&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Text of the Open Letter&lt;/h2&gt;
&lt;p&gt;As our everyday lives are conducted increasingly through electronic communications the necessity for privacy protections has also increased. While several countries across the globe have recognised this by furthering the right to privacy of their citizens the Union Government has adopted a regressive attitude towards this core civil liberty. We urge the Union Government to take urgent measures to safeguard the right to privacy in India.&lt;/p&gt;
&lt;p&gt;Our concerns are based on a continuing pattern of disregard for the right to privacy by several governments in the past. This trend has increased as can be plainly viewed from the following developments.&lt;/p&gt;
&lt;p&gt;In 2015, the Attorney General in the case of *K.S. Puttaswamy v. Union of India*, argued before the Hon’ble Supreme Court that there is no right to privacy under the Constitution of India. The Hon'ble Court was persuaded to re-examine the basis of the right to privacy upsetting 45 years of judicial precedent. This has thrown the constitutional right to privacy in doubt and the several judgements that have been given under it. This includes the 1997 PUCL Telephone Tapping judgement as well. We urge the Union Government to take whatever steps are necessary and urge the Supreme Court to hold that a right to privacy exists under the Constitution of India.&lt;/p&gt;
&lt;p&gt;Recently Mr. Arun Jaitley, Minister for Finance introduced the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. This bill was passed on March 11, 2016 in the middle of budget discussion on a short notice as a money bill in the Lok Sabha when only 73 of 545 members were present. Its timing and introduction as a money bill prevents necessary scrutiny given the large privacy risks that arise under it. This version of the bill was never put up for public consultation and is being rushed through without adequate discussion. Even substantively it fails to give accountable privacy safeguards while making Aadhaar mandatory for availing any government subsidy, benefit, or service.&lt;/p&gt;
&lt;p&gt;We urge the Union Government to urgently take steps to uphold the constitutional basis to the right to privacy and fulfil it’s constitutional and international obligations. We encourage the Government to have extensive public discussions on the Aadhaar Bill before notifying it. We further call upon them to constitute a drafting committee with members of civil society to draft a comprehensive statute as suggested by the Justice A.P. Shah Committee Report of 2012.&lt;/p&gt;
&lt;p&gt;Signatories:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Amber Sinha, the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Japreet Grewal, the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Joshita Pai, Centre for Communication Governance, National Law University&lt;/li&gt;
&lt;li&gt;Raman Jit Singh Chima, Access Now&lt;/li&gt;
&lt;li&gt;Sarvjeet Singh, Centre for Communication Governance, National Law University&lt;/li&gt;
&lt;li&gt;Sumandro Chattapadhyay, the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Sunil Abraham, the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Vanya Rakesh, the Centre for Internet and Society&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy'&gt;https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-03-17T07:40:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india">
    <title>Adoption of Standards in Smart Cities - Way Forward for India</title>
    <link>https://cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india</link>
    <description>
        &lt;b&gt;With a paradigm shift towards the concept of “Smart Cities’ globally, as well as India, such cities have been defined by several international standardization bodies and countries, however, there is no uniform definition adopted globally. The glue that allows infrastructures to link and operate efficiently is standards as they make technologies interoperable and efficient.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities.pdf" class="internal-link"&gt;Click here to download the full file&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Globally, the pace of urbanization is increasing exponentially. The world’s urban population is projected to rise from 3.6 billion to 6.3 billion between 2011 and 2050. A solution for the same has been development of sustainable cities by improving efficiency and integrating infrastructure and services &lt;strong&gt;[1]&lt;/strong&gt;. It has been estimated that during the next 20 years, 30 Indians will leave rural India for urban areas every minute, necessitating smart and sustainable cities to accommodate them &lt;strong&gt;[2]&lt;/strong&gt;. The Smart Cities Mission of the Ministry of Urban Development was announced in the year 2014, followed by selection of 100 cities in the year 2015 and 20 of them being selected for the first Phase of the project in the year 2016. The Mission &lt;strong&gt;[3]&lt;/strong&gt; lists the “core infrastructural elements” that a smart city would incorporate like adequate water supply, assured electricity, sanitation, efficient public transport, affordable housing (especially for the poor), robust IT connectivity and digitisation, e-governance and citizen participation, sustainable environment, safety and security for citizens, health and education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With a paradigm shift towards the concept of “Smart Cities’ globally, as well as India, such cities have been defined by several international standardization bodies and countries, however, there is no uniform definition adopted globally. The envisioned modern and smart city promises delivery of high quality services to the citizens and will harness data capture and communication management technologies. The performance of such cities would be monitored on the basis of physical as well as the social structure comprising of smart approaches and solution to utilities and transport.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The glue that allows infrastructures to link and operate efficiently is standards as they make technologies interoperable and efficient. Interoperability is essential and to ensure smart integration of various systems in a smart city, internationally agreed standards that include technical specifications and classifications must be adhered to. Development of international standards ensure seamless interaction between components from different suppliers and technologies &lt;strong&gt;[4]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Standardized indicators within standards benefit smart cities in the following ways:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Effective governance and efficient delivery of services.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;International and Local targets, benchmarking and planning.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Informed decision making and policy formulation.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Leverage for funding and recognition in international entities.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Transparency and open data for investment attractiveness.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;A reliable foundation for use of big data and the information explosion to assist cities in building core knowledge for city decision-making, and enable comparative insight.&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The adoption of standards for smart cities has been advocated across the world as they are perceived to be an effective tool to foster development of the cities. The Director of the ITU Telecommunication Standardization Bureau Chaesub Lee is of the view that “Smart cities will employ an abundance of technologies in the family of the Internet of Things (IoT) and standards will assist the harmonized implementation of IoT data and applications , contributing to effective horizontal integration of a city’s subsystems” &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Smart Cities standards in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;National Association of Software and Services Companies (NASSCOM) partnered with Accenture &lt;strong&gt;[6]&lt;/strong&gt; to prepare a report called ‘Integrated ICT and Geospatial Technologies Framework for 100 Smart Cities Mission’ &lt;strong&gt;[7]&lt;/strong&gt; to explore the role of ICT in developing smart cities &lt;strong&gt;[8]&lt;/strong&gt;, after the announcement of the Mission by Indian Government. The report, released in May 2015, lists down 55 global standards, keeping in view several city sub-systems like urban planning, transport, governance, energy, climate and pollution management, etc which could be applicable to the smart cities in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though NASSCOM is working closely with the Ministry of Urban Development to create a sustainable model for smart cities &lt;strong&gt;[9]&lt;/strong&gt;, due to lack of regulatory standards for smart cities, the Bureau of Indian Standards (BIS) in India has undertaken the task to formulate standardised guidelines for central and state authorities in planning, design and construction of smart cities by setting up a technical committee under the Civil engineering department of the Bureau. However, adoption of the standards by implementing agencies would be voluntary and intends to complement internationally available documents in this area &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Developing national standards in line with these international standards would enable interoperability (i.e. devices and systems working together) and provide a roadmap to address key issues like data protection, privacy and other inherent risks in the digital delivery and use of public services in the envisioned smart cities, which call for comprehensive data management standards in India to instill public confidence and trust &lt;strong&gt;[11]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Key International Smart Cities Standards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Following are the key internationally accepted and recognized Smart Cities standards developed by leading organisations and the national standardization bodies of several countries that India could adopt or develop national standards in line with these.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;The International Organization for Standardization (ISO) - Smart Cities Standards&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;ISO is an instrumental body advocating and developing for smart cities to safeguard rights of the people against a liveable and sustainable environment. The ISO Smart Cities Strategic Advisory Group uses the following working definition: A ‘Smart City’ is one that dramatically increases the pace at which it improves its social, economic and environmental (sustainability) outcomes, responding to challenges such as climate change, rapid population growth, and political and economic instability by fundamentally improving how it engages society, how it applies collaborative leadership methods, how it works across disciplines and city systems, and how it uses data information and modern technologies in order to transform services and quality of life for those in and involved with the city (residents, businesses, visitors), now and for the foreseeable future, without unfair disadvantage of others or degradation of the natural environment. [For details see ISO/TMB Smart Cities Strategic Advisory Group Final Report, September 2015 ( ISO Definition, June 2015)].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ISO Technical Committee 268 works on standardization in the field of Sustainable Development in Communities &lt;strong&gt;[12]&lt;/strong&gt; to encourage the development and implementation of holistic, cross-sector and area-based approaches to sustainable development in communities. The Committee comprises of 3 Working Groups &lt;strong&gt;[13]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Working Group 1: System Management ISO 37101- This standard sets requirements, guidance and supporting techniques for sustainable development in communities. It is designed to help all kinds of communities manage their sustainability, smartness and resilience to improve the contribution of communities to sustainable development and assess their performance in this area &lt;strong&gt;[14]&lt;/strong&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Working Group  2 : City Indicators- The key Smart Cities Standards developed by ISO TC 268 WG 2 (City Indicators) are:&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style="text-align: justify; "&gt;ISO 37120 Sustainable Development of Communities — Indicators for City Services and Quality of Life&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;One of the key standards and an important step in this regard was ISO 37120:2014 under the ISO’s Technical Committee 268 (See Working on Standardization in the field of Sustainable Development in Communities) providing clearly defined city performance indicators (divided into core and supporting indicators) as a benchmark for city services and quality of life, along with a standard approach for measuring each for city leaders and citizens &lt;strong&gt;[15]&lt;/strong&gt;. The standard is global in scope and can help cities prioritize city budgets, improve operational transparency, support open data and applications &lt;strong&gt;[16]&lt;/strong&gt;. It follows the principles &lt;strong&gt;[17]&lt;/strong&gt; set out and can be used in conjunction with ISO 37101.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ISO 37120 was the first ISO Standard on Global City Indicators published in the year 2014, developed on the basis of a set of indicators developed and extensively tested by the Global City Indicators Facility (a project by University of Toronto) and its 250+ member cities globally. GCIF is committed to build standardized city indicators for performance management including a database of comparable statistics that allow cities to track their effectiveness on everything from planning and economic growth to transportation, safety and education &lt;strong&gt;[18]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The World Council on City Data (WCCD) &lt;strong&gt;[19]&lt;/strong&gt; - a sister organization of the GCI/GCIF - was established in the year 2014 to operationalize ISO 37120 across cities globally. The standards encompasses 100 indicators developed around 17 themes to support city services and quality of life, and is accessible through the WCCD Open City Data Portal which allows for cutting-edge visualizations and comparisons. Indian cities are not yet listed with WCCD &lt;strong&gt;[20]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The indicators are listed under the following heads &lt;strong&gt;[21]&lt;/strong&gt;:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Economy&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Education&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Environment&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Energy&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Finance&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Fire and Emergency Responses&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Governance&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Health&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Safety&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Shelter&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Recreation&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Solid Waste&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Telecommunication and innovation&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Transportation&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Urban Planning&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Waste water&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Water and Sanitation&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This International Standard is applicable to any city, municipality or local government that undertakes to measure its performance in a comparable and verifiable manner, irrespective of size and location or level of development. City indicators have the potential to be used as critical tools for city managers, politicians, researchers, business leaders, planners, designers and other professionals &lt;strong&gt;[22]&lt;/strong&gt;. The WCCD forum highlights need for cities to have a set of globally standardized indicators to &lt;strong&gt;[23]&lt;/strong&gt;:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Manage and make informed decisions through data analysis&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Benchmark and target&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Leverage Funding with senior levels of government&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Plan and establish new frameworks for sustainable urban development&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Evaluate the impact of infrastructure projects on the overall performance of a city.&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 style="text-align: justify; "&gt;ISO/DTR 37121- Inventory and Review of Existing Indicators on Sustainable Development and Resilience in Cities&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The second standard under ISO TC 268 WG 2 is ISO 37121, which defines additional indicators related to sustainable development and resilience in cities. Some of the indicators include: Smart Cities, Smart Grid, Economic Resilience, Green Buildings, Political Resilience, Protection of biodiversity, etc. The complete list can be viewed on the Resilient Cities website &lt;strong&gt;[24]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Working Group 3:&lt;/strong&gt; Terminology - There are no publicly available documents so far, giving details about the status of the activities of this group. The ISO Technical Committee 268 also includes Sub Committee 1 (Smart Community Infrastructure) &lt;strong&gt;[25]&lt;/strong&gt;, comprising of the following Working Groups: 1) WG 1 Infrastructure metrics, and 2) WG 2 Smart Community Infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key Smart Cities Standards developed by ISO under this are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;ISO 37151:2015 Smart community infrastructures — Principles and Requirements for Performance Metrics&lt;/strong&gt;&lt;br /&gt;In the year 2015, a new ISO technical specification for smart cities- 37151:2015 for Principles and requirements for performance metrics was released.  The purpose of standardization in the field of smart community infrastructures such as energy, water, transportation, waste, information and communications technology (ICT), etc. is to promote the international trade of community infrastructure products and services and improve sustainability in communities by establishing harmonized product standards &lt;strong&gt;[26]&lt;/strong&gt;. The metrics in this standard will support city and community managers in planning and measuring performance, and also compare and select procurement proposals for products and services geared at improving community infrastructures &lt;strong&gt;[27]&lt;/strong&gt;. &lt;br /&gt;This Technical Specification gives principles and specifies requirements for the definition,identification, optimization, and harmonization of community infrastructure performance metrics, and gives recommendations for analysis, regarding interoperability, safety, security of community infrastructures &lt;strong&gt;[28]&lt;/strong&gt;. This new Technical Specification supports the use of the ISO 37120 &lt;strong&gt;[29]&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;ISO/TR 37150:2014 Smart Community Infrastructures - Review of Existing Activities Relevant to Metrics&lt;br /&gt;&lt;/strong&gt;This standard addresses community infrastructures such as energy, water, transportation, waste and information and communications technology (ICT). Smart community infrastructures take into consideration environmental impact, economic efficiency and quality of life by using information and communications technology (ICT) and renewable energies to achieve integrated management and optimized control of infrastructures. Integrating smart community infrastructures for a community helps improve the lifestyles of its citizens by, for example: reducing costs, increasing mobility and accessibility, and reducing environmental pollutants.&lt;br /&gt;ISO/TR 37150 reviews relevant metrics for smart community infrastructures and provides stakeholders with a better understanding of the smart community infrastructures available around the world to help promote international trade of community infrastructure products and give information about leading-edge technologies to improve sustainability in communities &lt;strong&gt;[30]&lt;/strong&gt;. This standard, along with the above mentioned standards &lt;strong&gt;[31]&lt;/strong&gt; supports the multi-billion dollar smart cities technology industry.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Several other ISO Working Groups developing standards applicable to smart and sustainable cities have been listed in our website &lt;strong&gt;[32]&lt;/strong&gt;.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;The International Telecommunications Union (ITU)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The ITU is another global body working on development of standards regarding smart cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A study group was formed in the year 2015 to tackle standardization requirements for the Internet of Things, with an initial focus on IoT applications in smart cities to address urban development challenges &lt;strong&gt;[33]&lt;/strong&gt;, to enable the coordinated development of IoT technologies, including machine-to-machine communications and ubiquitous sensor networks. The group is titled “ITU-T Study Group 20: IoT and its applications, including smart cities and communities”, established to develop standards that leverage IoT technologies to address urban-development challenges and the mechanisms for the interoperability of IoT applications and datasets employed by various vertically oriented industry sectors &lt;strong&gt;[34]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITU-T also concluded a focused study group looking at smart sustainable cities in May 2015, acting as an open platform for smart city stakeholders to exchange knowledge in the interests of identifying the standardized frameworks needed to support the integration of ICT services in smart cities. Its parent group is ITU-T Study Group 5, which has  agreed on the following definition of a Smart Sustainable City:&lt;br /&gt;"A smart sustainable city is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation and services, and competitiveness, while ensuring that it meets the needs of present and future generations with respect to economic, social, environmental as well as cultural aspects".&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;UK - British Standards Institution&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Apart from the global standards setting organisations, many countries have been looking at developing standards to address the growth of smart cities across the globe. In the UK, the British Standards Institution (BSI) has been commissioned by the UK Department of Business, Innovation and Skills (BIS) to conceive a Smart Cities Standards Strategy to identify vectors of smart city development where standards are needed. The standards would be developed through a consensus-driven process under the BSI to ensure good practise is shared between all the actors. The BIS launched the City's Standards Institute to bring together cities and key industry leaders and innovators to work together in identifying the challenges facing cities, providing solutions to common problems and defining the future of smart city standards &lt;strong&gt;[35]&lt;/strong&gt;.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;PAS 181&lt;/strong&gt; &lt;em&gt;&lt;strong&gt;Smart city framework- Guide to establishing strategies for smart cities and communities&lt;/strong&gt;&lt;/em&gt; establishes a good practice framework for city leaders to develop, agree and deliver smart city strategies that can help transform their city’s ability to meet challenges faced in the future and meet the goals. The smart city framework (SCF) does not intend to describe a one-size-fits-all model for the future of UK cities but focuses on the enabling processes by which the innovative use of technology and data, together with organizational change, can help deliver the diverse visions for future UK cities in more efficient, effective and sustainable ways &lt;strong&gt;[36]&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;PD 8101&lt;/strong&gt; &lt;em&gt;&lt;strong&gt;Smart cities- Guide to the role of the planning and development process&lt;/strong&gt;&lt;/em&gt;&lt;em&gt; &lt;/em&gt;gives guidance regarding planning for new development for smart city plans and&lt;em&gt; &lt;/em&gt;provides an overview of the key issues to be considered and prioritized. The document is for use by local authority planning and regeneration officers to identify good practice in a UK context, and what tools they could use to implement this good practice. This aims to enable new developments to be built in a way that will support smart city aspirations at minimal cost &lt;strong&gt;[37]&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;PAS 182&lt;em&gt; Smart city concept model. Guide to establishing a model for data&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;establishes an interoperability framework and data-sharing between agencies for smart cities for the following purposes:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;To have a city where information can be shared and understood between organizations and people at each level&lt;/li&gt;
&lt;li&gt;The derivation of data in each layer can be linked back to data in the previous layer &lt;/li&gt;
&lt;li&gt;The impact of a decision can be observed back in operational data. The smart city concept model (SCCM) provides a framework that can normalize and classify information from many sources so that data sets can be discovered and combined to gain a better picture of the needs and behaviours of a city’s citizens (residents and businesses) to help identify issues and devise solutions. PAS 182 is aimed at organizations that provide services to communities in cities, and manage the resulting data, as well as decision-makers and policy developers in cities &lt;strong&gt;[38]&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt; &lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;PAS 180 Smart cities &lt;em&gt;Vocabulary&lt;/em&gt;&lt;/strong&gt; helps build a strong foundation for future standardization and good practices by providing an industry-agreed understanding of smart city terms and definitions to be used in the UK. It provides a working definition of a Smart City- “Smart Cities” is a term denoting the effective integration of physical, digital and human systems in the built environment to deliver a sustainable, prosperous and inclusive future for its citizens &lt;strong&gt;[39]&lt;/strong&gt;. This aims to help improve communication and understanding of smart cities by providing a common language for developers, designers, manufacturers and clients. The standard also defines smart city concepts across different infrastructure and systems’ elements used across all service delivery channels and is intended for city authorities and planners, buyers of smart city services and solutions &lt;strong&gt;[40]&lt;/strong&gt;, as well as product and service providers.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Endnotes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iec.ch/whitepaper/pdf/iecWP-smartcities-LR-en.pdf"&gt;http://www.iec.ch/whitepaper/pdf/iecWP-smartcities-LR-en.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.ibm.com/smarterplanet/in/en/sustainable_cities/ideas/"&gt;http://www.ibm.com/smarterplanet/in/en/sustainable_cities/ideas/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.thehindubusinessline.com/economy/smart-cities-mission-welcome-to-tomorrows-world/article8163690.ece"&gt;http://www.thehindubusinessline.com/economy/smart-cities-mission-welcome-to-tomorrows-world/article8163690.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iec.ch/whitepaper/pdf/iecWP-smartcities-LR-en.pdf"&gt;http://www.iec.ch/whitepaper/pdf/iecWP-smartcities-LR-en.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/news.htm?refid=Ref2042"&gt;http://www.iso.org/iso/news.htm?refid=Ref2042&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.livemint.com/Companies/5Twmf8dUutLsJceegZ7I9K/Nasscom-partners-Accenture-to-form-ICT-framework-for-smart-c.html"&gt;http://www.livemint.com/Companies/5Twmf8dUutLsJceegZ7I9K/Nasscom-partners-Accenture-to-form-ICT-framework-for-smart-c.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.nasscom.in/integrated-ict-and-geospatial-technologies-framework-100-smart-cities-mission"&gt;http://www.nasscom.in/integrated-ict-and-geospatial-technologies-framework-100-smart-cities-mission&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.cxotoday.com/story/nasscom-creates-framework-for-smart-cities-project/"&gt;http://www.cxotoday.com/story/nasscom-creates-framework-for-smart-cities-project/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.livemint.com/Companies/5Twmf8dUutLsJceegZ7I9K/Nasscom-partners-Accenture-to-form-ICT-framework-for-smart-c.html"&gt;http://www.livemint.com/Companies/5Twmf8dUutLsJceegZ7I9K/Nasscom-partners-Accenture-to-form-ICT-framework-for-smart-c.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/in-a-first-bis-to-come-up-with-standards-for-smart-cities-115060400931_1.html"&gt;http://www.business-standard.com/article/economy-policy/in-a-first-bis-to-come-up-with-standards-for-smart-cities-115060400931_1.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[11]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.longfinance.net/groups7/viewdiscussion/72-financing-financing-tomorrow-s-cities-how-standards-can-support-the-development-of-smart-cities.html?groupid=3"&gt;http://www.longfinance.net/groups7/viewdiscussion/72-financing-financing-tomorrow-s-cities-how-standards-can-support-the-development-of-smart-cities.html?groupid=3&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[12]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/iso_technical_committee?commid=656906"&gt;http://www.iso.org/iso/iso_technical_committee?commid=656906&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[13]&lt;/strong&gt; See: &lt;a class="external-link" href="http://cityminded.org/wp-content/uploads/2014/11/Patricia_McCarney_PDF.pdf"&gt;http://cityminded.org/wp-content/uploads/2014/11/Patricia_McCarney_PDF.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[14]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/news.htm?refid=Ref1877"&gt;http://www.iso.org/iso/news.htm?refid=Ref1877&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[15]&lt;/strong&gt; See: &lt;a class="external-link" href="http://smartcitiescouncil.com/article/new-iso-standard-gives-cities-common-performance-yardstick"&gt;http://smartcitiescouncil.com/article/new-iso-standard-gives-cities-common-performance-yardstick&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[16]&lt;/strong&gt; See: &lt;a class="external-link" href="http://smartcitiescouncil.com/article/dissecting-iso-37120-why-new-smart-city-standard-good-news-cities"&gt;http://smartcitiescouncil.com/article/dissecting-iso-37120-why-new-smart-city-standard-good-news-cities&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[17]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/catalogue_detail?csnumber=62436"&gt;http://www.iso.org/iso/catalogue_detail?csnumber=62436&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[18]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.cityindicators.org/"&gt;http://www.cityindicators.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[19]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.dataforcities.org/"&gt;http://www.dataforcities.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[20]&lt;/strong&gt; See: &lt;a class="external-link" href="http://news.dataforcities.org/2015/12/world-council-on-city-data-and-hatch.html"&gt;http://news.dataforcities.org/2015/12/world-council-on-city-data-and-hatch.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[21]&lt;/strong&gt; See: &lt;a class="external-link" href="http://news.dataforcities.org/2015/12/world-council-on-city-data-and-hatch.html"&gt;http://news.dataforcities.org/2015/12/world-council-on-city-data-and-hatch.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[22]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/37120_briefing_note.pdf"&gt;http://www.iso.org/iso/37120_briefing_note.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[23]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.dataforcities.org/wccd/"&gt;http://www.dataforcities.org/wccd/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[24]&lt;/strong&gt; See: &lt;a class="external-link" href="http://resilient-cities.iclei.org/fileadmin/sites/resilient-cities/files/Webinar_Series/HERNANDEZ_-_ICLEI_Resilient_Cities_Webinar__FINAL_.pdf"&gt;http://resilient-cities.iclei.org/fileadmin/sites/resilient-cities/files/Webinar_Series/HERNANDEZ_-_ICLEI_Resilient_Cities_Webinar__FINAL_.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[25]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/iso_technical_committee?commid=656967"&gt;http://www.iso.org/iso/iso_technical_committee?commid=656967&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[26]&lt;/strong&gt; See: &lt;a class="external-link" href="https://www.iso.org/obp/ui/#iso:std:iso:ts:37151:ed-1:v1:en"&gt;https://www.iso.org/obp/ui/#iso:std:iso:ts:37151:ed-1:v1:en&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[27]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/home/news_index/news_archive/news.htm?refid=Ref2001&amp;amp;utm_medium=email&amp;amp;utm_campaign=ISO+Newsletter+November&amp;amp;utm_content=ISO+Newsletter+November+CID_4182720c31ca2e71fa93d7c1f1e66e2f&amp;amp;utm_source=Email%20marketing%20software&amp;amp;utm_term=Read%20more"&gt;http://www.iso.org/iso/home/news_index/news_archive/news.htm?refid=Ref2001&amp;amp;utm_medium=email&amp;amp;utm_campaign=ISO+Newsletter+November&amp;amp;utm_content=ISO+Newsletter+November+CID_4182720c31ca2e71fa93d7c1f1e66e2f&amp;amp;utm_source=Email%20marketing%20software&amp;amp;utm_term=Read%20more&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[28]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/37120_briefing_note.pdf"&gt;http://www.iso.org/iso/37120_briefing_note.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[29]&lt;/strong&gt; See: &lt;a class="external-link" href="http://standardsforum.com/isots-37151-smart-cities-metrics/"&gt;http://standardsforum.com/isots-37151-smart-cities-metrics/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[30]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/executive_summary_iso_37150.pdf"&gt;http://www.iso.org/iso/executive_summary_iso_37150.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[31]&lt;/strong&gt; See: &lt;a class="external-link" href="http://standardsforum.com/isots-37151-smart-cities-metrics/"&gt;http://standardsforum.com/isots-37151-smart-cities-metrics/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[32]&lt;/strong&gt; See: &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/database-on-big-data-and-smart-cities-international-standards"&gt;http://cis-india.org/internet-governance/blog/database-on-big-data-and-smart-cities-international-standards&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[33]&lt;/strong&gt; See: &lt;a class="external-link" href="http://smartcitiescouncil.com/article/itu-takes-internet-things-standards-smart-cities"&gt;http://smartcitiescouncil.com/article/itu-takes-internet-things-standards-smart-cities&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[34]&lt;/strong&gt; See: &lt;a class="external-link" href="https://www.itu.int/net/pressoffice/press_releases/2015/22.aspx"&gt;https://www.itu.int/net/pressoffice/press_releases/2015/22.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[35]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/"&gt;http://www.bsigroup.com/en-GB/smart-cities/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[36]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-181-smart-cities-framework/"&gt;http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-181-smart-cities-framework/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[37]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8101-smart-cities-planning-guidelines/"&gt;http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8101-smart-cities-planning-guidelines/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[38]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-182-smart-cities-data-concept-model/"&gt;http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-182-smart-cities-data-concept-model/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[39]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/smart_cities_report-jtc1.pdf"&gt;http://www.iso.org/iso/smart_cities_report-jtc1.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[40]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-180-smart-cities-terminology/"&gt;http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-180-smart-cities-terminology/&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india'&gt;https://cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Smart Cities</dc:subject>
    

   <dc:date>2016-04-11T03:04:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles">
    <title>Aadhaar Bill 2016 Evaluated against the National Privacy Principles</title>
    <link>https://cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles</link>
    <description>
        &lt;b&gt;In this infographic, we evaluate the privacy provisions of the Aadhaar Bill 2016 against the national privacy principles developed by the Group of Experts on Privacy led by the Former Chief Justice A.P. Shah in 2012. The infographic is based on Vipul Kharbanda’s article 'Analysis of Aadhaar Act in the Context of A.P. Shah Committee Principles,' and is designed by Pooja Saxena, with inputs from Amber Sinha.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the infographic: &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Vs-Privacy-Principles_v.1.0.pdf"&gt;PDF&lt;/a&gt; and &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Vs-Privacy-Principles_v.1.0.png"&gt;PNG&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;License:&lt;/strong&gt; It is shared under Creative Commons &lt;a href="https://creativecommons.org/licenses/by/4.0/"&gt;Attribution 4.0 International&lt;/a&gt; License.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Vs-Privacy-Principles_v.1.0.png" alt="Aadhaar Bill 2016 Evaluated against the National Privacy Principles" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles'&gt;https://cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pooja Saxena and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Infographic</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-03-21T08:38:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aadhaar-bill-2016-niai-bill-2010-text-comparison">
    <title>Aadhaar Bill 2016 &amp; NIAI Bill 2010 - Comparing the Texts</title>
    <link>https://cis-india.org/internet-governance/blog/aadhaar-bill-2016-niai-bill-2010-text-comparison</link>
    <description>
        &lt;b&gt;This is a quick comparison of the texts of the Aadhaar Bill 2016 and the National Identification Authority of India Bill 2010. The new sections in the former are highlighed, and the deleted sections (that were part of the latter) are struck out.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="http://cis-india.github.io/aadhaar-bill-2016/" frameborder="0" height="500px" width="100%"&gt; &lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Source: &lt;a href="http://cis-india.github.io/aadhaar-bill-2016/"&gt;http://cis-india.github.io/aadhaar-bill-2016/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aadhaar-bill-2016-niai-bill-2010-text-comparison'&gt;https://cis-india.org/internet-governance/blog/aadhaar-bill-2016-niai-bill-2010-text-comparison&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-09T11:25:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things">
    <title>A Review of the Policy Debate around Big Data and Internet of Things</title>
    <link>https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things</link>
    <description>
        &lt;b&gt;This blog post seeks to review and understand how regulators and experts across jurisdictions are reacting to Big Data and Internet of Things (IoT) from a policy perspective.&lt;/b&gt;
        &lt;h3&gt;Defining and Connecting Big Data and Internet of Things&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Internet of Things is a term that refers to networked objects and systems that can connect to the internet and can transmit and receive data. Characteristics of IoT include the gathering of information through sensors, the automation of functions, and analysis of collected data.[1] For IoT devices, because of the &lt;i&gt;velocity&lt;/i&gt; at which data is generated, the &lt;i&gt;volume&lt;/i&gt; of data that is generated, and the &lt;i&gt;variety&lt;/i&gt; of data generated by different sources [2] - IoT devices can be understood as generating Big Data and/or relying on Big Data analytics. In this way IoT devices and Big Data are intrinsically interconnected.&lt;/p&gt;
&lt;h3&gt;General Implications of Big Data and Internet of Things&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Big Data paradigms are being adopted across countries, governments, and business sectors because of the potential insights and change that it can bring. From improving an organizations business model, facilitating urban development, allowing for targeted and individualized services, and enabling the prediction of certain events or actions - the application of Big Data has been recognized as having the potential to bring about dramatic and large scale changes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, experts have identified risks to the individual that can be associated with the generation, analysis, and use of Big Data. In May 2014, the White House of the United States completed a ninety day study of how big data will change everyday life. The Report highlights the potential of Big Data as well as identifying a number of concerns associated with Big Data. For example: the selling of personal data, identification or re-identification of individuals, profiling of individuals, creation and exacerbation of information asymmetries, unfair, discriminating, biased, and incorrect decisions based on Big Data analytics, and lack of or misinformed user consent.[3] Errors in Big Data analytics that experts have identified include statistical fallacies, human bias, translation errors, and data errors.[4] Experts have also discussed fundamental changes that Big Data can bring about. For example, Danah Boyd and Kate Crawford in the article &lt;i&gt;"Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon"&lt;/i&gt; propose that Big Data can change the definition of knowledge and shape the reality it measures.[5] Similarly, a BSC/Oxford Internet Institute conference report titled " &lt;i&gt;The Societal Impact of the Internet of Things&lt;/i&gt;" points out that often users of Big Data assume that information and conclusions based on digital data is reliable and in turn replace other forms of information with digital data.[6]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns that have been voiced by the Article 29 Working Party and others specifically about IoT devices have included insufficient security features built into devices such as encryption, the reliance of the devices on wireless communications, data loss from infection by malware or hacking, unauthorized access and use of personal data, function creep resulting from multiple IoT devices being used together, and unlawful surveillance.[7]&lt;/p&gt;
&lt;h3&gt;Regulation of Big Data and Internet of Things&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The regulation of Big Data and IoT is currently being debated in contexts such as the US and the EU. Academics, civil society, and regulators are exploring questions around the adequacy of present regulation and overseeing frameworks to address changes brought about Big Data, and if not - what forms of or changes in regulation are needed? For example, Kate Crawford and Jason Shultz in the article &lt;i&gt;"Big Data and Due Process: Towards a Framework to Redress Predictive Privacy Harms"&lt;/i&gt;stress the importance of bringing in 'data due process rights' i.e ensuring fairness in the analytics of Big Data and how personal information is used.[8] While Solon Barocas and Andrew Selbst in the article &lt;i&gt;"Big Data's Disparate Impact"&lt;/i&gt; explore if present anti-discrimination legislation and jurisprudence in the US is adequate to protect against discrimination arising from Big Data practices - specifically data mining.[9]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Impact of Big Data and IoT on Data Protection Principles&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the context of data protection, various government bodies, including the Article 29 Data Protection Working Party set up under the Directive 95/46/EC of the European Parliament, the Council of Europe, the European Commission, and the Federal Trade Commission, as well as experts and academics in the field, have called out at least ten different data protection principles and concepts that Big Data impacts:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Collection Limitation:&lt;/strong&gt; As a result of the generation of Big Data as enabled by networked devices, increased capabilities to analyze Big Data, and the prevalent use of networked systems - the principle of collection limitation is changing.[10]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Consent: &lt;/strong&gt;As a result of the use of data from a wide variety of sources and the re-use of data which is inherent in Big Data practices - notions of informed consent (initial and secondary) are changing.[11]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Minimization:&lt;/strong&gt; As a result of Big Data practices inherently utilizing all data possible - the principle of data minimization is changing/obsolete.[12]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Notice:&lt;/strong&gt; As a result of Big Data practices relying on vast amounts of data from numerous sources and the re-use of that data - the principle of notice is changing.[13]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Purpose Limitation:&lt;/strong&gt; As a result of Big Data practices re-using data for multiple purposes - the principle of purpose limitation is changing/obsolete.[14]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Necessity: &lt;/strong&gt;As a result of Big Data practices re-using data, the new use or re-analysis of data may not be pertinent to the purpose that was initially specified- thus the principle of necessity is changing.[15]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Access and Correction:&lt;/strong&gt; As a result of Big Data being generated (and sometimes published) at scale and in real time - the principle of user access and correction is changing.[16]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Opt In and Opt Out Choices: &lt;/strong&gt;Particularly in the context of smart cities and IoT which collect data on a real time basis, often without the knowledge of the individual, and for the provision of a service - it may not be easy or possible for individuals to opt in or out of the collection of their data.[17]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;PI:&lt;/strong&gt; As a result of Big Data analytics using and analyzing a wide variety of data, new or unexpected forms of personal data may be generated - thus challenging and evolving beyond traditional or specified definitions of personal information.[18]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Controller:&lt;/strong&gt; In the context of IoT, given the multitude of actors that can collect, use and process data generated by networked devices, the traditional understanding of what and who is a data controller is changing.[19]&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Possible Technical and Policy Solutions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a Report titled "&lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World&lt;/i&gt;" by the Federal Trade Commission in the United States it was noted that though IoT changes the application and understanding of certain privacy principles, it does not necessarily make them obsolete.[20] Indeed many possible solutions that have been suggested to address the challenges posed by IoT and Big Data are technical interventions at the device level rather than fundamental policy changes. For example it has been proposed that IoT devices can be programmed to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Automatically delete data after a specified period of time [21] (addressing concerns of data retention)&lt;/li&gt;
&lt;li&gt;Ensure that personal data is not fed into centralized databases on an automatic basis [22] (addressing concerns of transfer and sharing without consent, function creep, and data breach)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Offer consumers combined choices for consent rather than requiring a one time blanket consent at the time of initiating a service or taking fresh consent for every change that takes place while a consumer is using a service. [23] (addressing concerns of informed and meaningful consent)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Categorize and tag data with accepted uses and programme automated processes to flag when data is misused. [24] (addressing concerns of misuse of data)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Apply 'sticky policies' - policies that are attached to data and define appropriate uses of the data as it 'changes hands' [25] (addressing concerns of user control of data)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Allow for features to only be turned on with consent from the user [26] (addressing concerns of informed consent and collection without the consent or knowledge of the user)&lt;/li&gt;
&lt;li&gt;Automatically convert raw personal data to aggregated data [27] (addressing concerns of misuse of personal data and function creep)&lt;/li&gt;
&lt;li&gt;Offer users the option to delete or turn off sensors [28] (addressing concerns of user choice, control, and consent)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Such solutions place the designers and manufacturers of IoT devices in a critical role. Yet some, such as Kate Crawford and Jason Shultz are not entirely optimistic about the possibility of effective technological solutions - noting in the context of automated decision making that it is difficult to build in privacy protections as it is unclear when an algorithm will predict personal information about an individual.[29]&lt;/p&gt;
&lt;p&gt;Experts have also suggested that more emphasis should be placed on the principles and practices of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Transparency,&lt;/li&gt;
&lt;li&gt; Access and correction,&lt;/li&gt;
&lt;li&gt;Use/misuse&lt;/li&gt;
&lt;li&gt;Breach notification&lt;/li&gt;
&lt;li&gt;Remedy&lt;/li&gt;
&lt;li&gt;Ability to withdraw consent&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Others have recommended that certain privacy principles need to be adapted to the Big Data/IoT context. For example, the Article 29 Working Party has clarified that in the context of IoT, consent mechanisms need to include the types of data collected, the frequency of data collection, as well as conditions for data collection.[30] While the Federal Trade Commission has warned that adopting a pure "use" based model has its limitations as it requires a clear (and potentially changing) definition of what use is acceptable and what use is not acceptable, and it does not address concerns around the collection of sensitive personal information.[31] In addition to the above, the European Commission has stressed that the right of deletion, the right to be forgotten, and data portability also need to be foundations of IoT systems and devices.[32]&lt;/p&gt;
&lt;h3&gt;Possible Regulatory Frameworks&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To the question - are current regulatory frameworks adequate and is additional legislation needed, the FTC has recommended that though a specific IoT legislation may not be necessary, a horizontal privacy legislation would be useful as sectoral legislation does not always account for the use, sharing, and reuse of data across sectors. The FTC also highlighted the usefulness of privacy impact assessments and self regulatory steps to ensure privacy.[33] The European Commission on the other hand has concluded that to ensure enforcement of any standard or protocol - hard legal instruments are necessary.[34] As mentioned earlier, Kate Crawford and Jason Shultz have argued that privacy regulation needs to move away from principles on collection, specific use, disclosure, notice etc. and focus on elements of due process around the use of Big Data - as they say "procedural data due process". Such due process should be based on values instead of defined procedures and should include at the minimum notice, hearing before an independent arbitrator, and the right to review. Crawford and Shultz more broadly note that there are conceptual differences between privacy law and big data that pose as serious challenges i.e privacy law is based on causality while big data is a tool of correlation. This difference raises questions about how effective regulation that identifies certain types of information and then seeks to control the use, collection, and disclosure of such information will be in the context of Big Data – something that is varied and dynamic. According to Crawford and Shultz many regulatory frameworks will struggle with this difference – including the FTC's Fair Information Privacy Principles and the EU regulation including the EU's right to be forgotten.[35] The European Data Protection Supervisor on the other hand looks at Big Data as spanning the policy areas of data protection, competition, and consumer protection – particularly in the context of 'free' services. The Supervisor argues that these three areas need to come together to develop ways in which the challenges of Big Data can be addressed. For example, remedy could take the form of data portability – ensuring users the ability to move their data to other service providers empowering individuals and promoting competitive market structures or adopting a 'compare and forget' approach to data retention of customer data. The Supervisor also stresses the need to promote and treat privacy as a competitive advantage, thus placing importance on consumer choice, consent, and transparency.[36] The European Data Protection reform has been under discussion and it is predicted to be enacted by the end of 2015. The reform will apply across European States and all companies operating in Europe. The reform proposes heavier penalties for data breaches, seeks to provide users with more control of their data.[37] Additionally, Europe is considering bringing digital platforms under the Network and Information Security Directive – thus treating companies like Google and Facebook as well as cloud providers and service providers as a critical sector. Such a move would require companies to adopt stronger security practices and report breaches to authorities.[38]&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A review of the different opinions and reactions from experts and policy makers demonstrates the ways in which Big Data and IoT are changing traditional forms of protection that governments and societies have developed to protect personal data as it increases in value and importance. While some policy makers believe that big data needs strong legislative regulation and others believe that softer forms of regulation such as self or co-regulation are more appropriate, what is clear is that Big Data is either creating a regulatory dilemma– with policy makers searching for ways to control the unpredictable nature of big data through policy and technology through the merging of policy areas, the honing of existing policy mechanisms, or the broadening of existing policy mechanisms - while others are ignoring the change that Big Data brings with it and are forging ahead with its use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Answering the 'how do we regulate Big Data” question requires &lt;strong&gt;re-conceptualization of data ownership and realities&lt;/strong&gt;. Governments need to first recognize the criticality of their data and the data of their citizens/residents, as well as the contribution to a country's economy and security that this data plays. With the technologies available now, and in the pipeline, data can be used or misused in ways that will have vast repercussions for individuals, society, and a nation. All data, but especially data directly or indirectly related to citizens and residents of a country, needs to be looked upon as owned by the citizens and the nation. In this way, data should be seen as a part of &lt;strong&gt;critical&lt;/strong&gt; &lt;strong&gt;national infrastructure of a nation, &lt;/strong&gt;and accorded the security, protections, and legal backing thereof to &lt;strong&gt;prevent the misuse of the resource by the private or public sectors, local or foreign governments&lt;/strong&gt;. This could allow for local data warehousing and bring physical and access security of data warehouses on par with other critical national infrastructure. Recognizing data as a critical resource answers in part the concern that experts have raised – that Big Data practices make it impossible for data to be categorized as personal and thus afforded specified forms of protection due to the unpredictable nature of big data. Instead – all data is now recognized as critical.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to being able to generate personal data from anonymized or non-identifiable data, big data also challenges traditional divisions of public vs. private data. Indeed Big Data analytics can take many public data points and derive a private conclusion. The use of Big Data analytics on public data also raises questions of consent. For example, though a license plate is public information – should a company be allowed to harvest license plate numbers, combine this with location, and sell this information to different interested actors? This is currently happening in the United States.[39] Lastly, Big Data raises questions of ownership. A solution to the uncertainty of public vs. private data and associated consent and ownership could be the creation a &lt;strong&gt;National Data Archive&lt;/strong&gt; with such data. The archive could function with representation from the government, public and private companies, and civil society on the board. In such a framework, for example, companies like Airtel would provide mobile services, but the CDRs and customer data collected by the company would belong to the National Data Archive and be available to Airtel and all other companies within a certain scope for use. This 'open data' approach could enable innovation through the use of data but within the ambit of national security and concerns of citizens – a framework that could instill trust in consumers and citizens. Only when backed with strong security requirements, enforcement mechanisms and a proactive, responsive and responsible framework can governments begin to think about ways in which Big Data can be harnessed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[1] BCS - The Chartered Institute for IT. (2013). The Societal Impact of the Internet of Things. Retrieved May 17, 2015, from http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;[2] Sicular, S. (2013, March 27). Gartner’s Big Data Definition Consists of Three Parts, Not to Be Confused with Three “V”s. Retrieved May 20, 2015, from http://www.forbes.com/sites/gartnergroup/2013/03/27/gartners-big-data-definition-consists-of-three-parts-not-to-be-confused-with-three-vs/&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[3] Executive Office of the President. “Big Data: Seizing Opportunities, Preserving Values”. May 2014. Available at: &lt;a href="https://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_5.1.14_final_print.pdf"&gt;https://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_5.1.14_final_print.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[4] Moses, B., Lyria, &amp;amp; Chan, J. (2014). Using Big Data for Legal and Law Enforcement Decisions: Testing the New Tools (SSRN Scholarly Paper No. ID 2513564). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2513564&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[5] Danah Boyd, Kate Crawford. &lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;CRITICAL QUESTIONS FOR BIG DATA&lt;/a&gt;. In&lt;a href="http://www.tandfonline.com/toc/rics20/15/5"&gt;formation, Communication &amp;amp; Society &lt;/a&gt; Vol. 15, Iss. 5, 2012. Available at: &lt;a href="http://www.tandfonline.com/doi/full/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/full/10.1080/1369118X.2012.678878&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[6]  The Chartered Institute for IT, Oxford Internet Institute, University of Oxford. “The Societal Impact of the Internet of Things” February 2013. Available at: &lt;a href="http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf"&gt;http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[7] ARTICLE 29 Data Protection Working Party. (2014). &lt;i&gt;Opinion 8/2014 on the on Recent Developments on the Internet of Things.&lt;/i&gt; European Commission. Retrieved May 20, 2015, from http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[8] Crawford, K., &amp;amp; Schultz, J. (2013). Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms (SSRN Scholarly Paper No. ID 2325784). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2325784&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[9] Barocas, S., &amp;amp; Selbst, A. D. (2015). Big Data’s Disparate Impact (SSRN Scholarly Paper No. ID 2477899). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2477899&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[10] Barocas, S., &amp;amp; Selbst, A. D. (2015). Big Data’s Disparate Impact (SSRN Scholarly Paper No. ID 2477899). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2477899&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[11] Article 29 Data Protection Working Party. “Opinion 8/2014 on the on Recent Developments on the Internet of Things”. September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;h&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;ttp://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[12] Tene, O., &amp;amp; Polonetsky, J. (2013). Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of Technology and Intellectual Property, 11(5), 239.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[13]  Omer Tene and Jules Polonetsky, &lt;i&gt;Big Data for All: Privacy and User Control in the Age of Analytics&lt;/i&gt;, 11 Nw. J. Tech. &amp;amp; Intell. Prop. 239 (2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[14] Article 29 Data Protection Working Party. “Opinion 8/2014 on the on Recent Developments on the Internet of Things”. September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;h&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;ttp://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[15] Information Commissioner's Office. (2014). Big Data and Data Protection. Infomation Commissioner's Office. Retrieved May 20, 2015, from https://ico.org.uk/media/for-organisations/documents/1541/big-data-and-data-protection.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[16] Article 29 Data Protection Working Party. “Opinion 8/2014 on the on Recent Developments on the Internet of Things”. September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;h&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;ttp://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[17] The Chartered Institute for IT and Oxford Internet Institute, University of Oxford. “The Societal Impact of the Internet of Things”. February 14&lt;sup&gt;th&lt;/sup&gt; 2013. Available at: &lt;a href="http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf"&gt;http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[18] Kate Crawford and Jason Shultz, “Big Data and Due Process: Towards a Framework to Redress Predictive Privacy Harms”. Boston College Law Review, Volume 55, Issue 1, Article 4. January 1st 2014. Available at: &lt;a href="http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr"&gt;http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr&lt;/a&gt;. Accessed: July 2nd 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[19] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16th 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2nd 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[20] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[21] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[22] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[23] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[24] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[25] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[26] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[27] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[28] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[29]  Kate Crawford and Jason Shultz, “Big Data and Due Process: Towards a Framework to Redress Predictive Privacy Harms”. Boston College Law Review, Volume 55, Issue 1, Article 4. January 1st 2014. Available at: &lt;a href="http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr"&gt;http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr&lt;/a&gt;. Accessed: July 2nd 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[30]  Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[31] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commission. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[32] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[33] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commission. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[34] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[35] Kate Crawford and Jason Shultz, “Big Data and Due Process: Towards a Framework to Redress Predictive Privacy Harms”. Boston College Law Review, Volume 55, Issue 1, Article 4. January 1&lt;sup&gt;st&lt;/sup&gt; 2014. Available at: &lt;a href="http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr"&gt;http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[36] European Data Protection Supervisor. Preliminary Opinion of the European Data Protection Supervisor, Privacy and competitiveness in the age of big data: the interplay between data protection, competition law and consumer protection in the Digital Economy. March 2014. Available at: https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Consultation/Opinions/2014/14-03-26_competitition_law_big_data_EN.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[37] SC Magazine. Harmonised EU data protection and fines by the end of the year. June 25&lt;sup&gt;th&lt;/sup&gt; 2015. Available at: &lt;a href="http://www.scmagazineuk.com/harmonised-eu-data-protection-and-fines-by-the-end-of-the-year/article/422740/"&gt;http://www.scmagazineuk.com/harmonised-eu-data-protection-and-fines-by-the-end-of-the-year/article/422740/&lt;/a&gt;. Accessed: August 8&lt;sup&gt;th&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[38] Tom Jowitt, “Digital Platforms to be Included in EU Cybersecurity Law”. TechWeek Europe. August 7&lt;sup&gt;th&lt;/sup&gt; 2015. Available at: http://www.techweekeurope.co.uk/e-regulation/digital-platforms-eu-cybersecuity-law-174415&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[39] Adam Tanner. Data Brokers are now Selling Your Car's Location for $10 Online. July 10&lt;sup&gt;th&lt;/sup&gt; 2013. Available at: http://www.forbes.com/sites/adamtanner/2013/07/10/data-broker-offers-new-service-showing-where-they-have-spotted-your-car/&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things'&gt;https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2015-08-17T08:36:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
