<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 91 to 105.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/pdf-gendered-future-of-work"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/digital-id-india-case-study"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/governing-id-principles-for-evalution"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/divergence-between-the-gdpr-and-pdp-bill-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/cis-general-comments-to-the-pdp-bill-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/annotated-ver-pdp-bill-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/cis-comments-pdp-bill-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/gen-comments-pdp-bill-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/how-the-data-protection-bill-regulates-social-media-platforms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/announcing-selected-researchers-welfare-gender-and-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/pdf-gendered-future-of-work">
    <title>PDF Gendered Future of Work</title>
    <link>https://cis-india.org/internet-governance/pdf-gendered-future-of-work</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/pdf-gendered-future-of-work'&gt;https://cis-india.org/internet-governance/pdf-gendered-future-of-work&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-03-05T19:48:35Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work">
    <title>PDF Final draft Gender and the future of work</title>
    <link>https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work'&gt;https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-03-05T08:44:57Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/digital-id-india-case-study">
    <title>Digital ID India Case Study</title>
    <link>https://cis-india.org/internet-governance/digital-id-india-case-study</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/digital-id-india-case-study'&gt;https://cis-india.org/internet-governance/digital-id-india-case-study&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-03-02T11:30:30Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity">
    <title>Governing ID: A Framework for Evaluation of Digital Identity</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;As governments across the globe implement new and foundational 
digital identification systems (Digital ID), or modernize existing ID 
programs, there is an urgent need for more research and discussion about
 appropriate uses of Digital ID systems. This significant momentum for 
creating Digital ID has been accompanied with concerns about privacy, 
surveillance and exclusion harms of state-issued Digital IDs in several 
parts of the world, resulting in campaigns and litigations in countries,
 such as UK, India, Kenya, and Jamaica. Given the sweeping range of 
considerations required to evaluate Digital ID projects, it is necessary
 to formulate evaluation frameworks that can be used for this purpose.&lt;/p&gt;
&lt;p&gt;This work began with the question of what the appropriate uses
 of Digital ID can be, but through the research process, it became clear
 that the question of use cannot be divorced from the fundamental 
attributes of Digital ID systems and their governance structures. This 
framework provides tests, which can be used to evaluate the governance 
of Digital ID across jurisdictions, as well as determine whether a 
particular use of Digital ID is legitimate. Through three kinds of 
checks — Rule of Law tests, Rights based tests, and Risks based tests — 
this scheme is a ready guide for evaluation of Digital ID.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/image-governing-id-principles-for-evalution/" alt="null" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;View the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-02.html"&gt;framework&lt;/a&gt; or download as&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/governing-id-principles-for-evalution" class="internal-link" title="Governing ID: Principles for Evalution"&gt;PDF&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity'&gt;https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vrinda Bhandari, Shruti Trikanad, and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T13:22:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/governing-id-principles-for-evalution">
    <title>Governing ID: Principles for Evalution</title>
    <link>https://cis-india.org/internet-governance/governing-id-principles-for-evalution</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/governing-id-principles-for-evalution'&gt;https://cis-india.org/internet-governance/governing-id-principles-for-evalution&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-03-02T08:20:55Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework">
    <title>Governing ID: Introducing our Evaluation Framework</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;div class="content"&gt;
&lt;p&gt;With the rise of national digital identity systems (Digital ID) across the world, there is a growing need to examine their impact on human rights. In several instances, national Digital ID programmes started with a specific scope of use, but have since been deployed for different applications, and in different sectors. This raises the question of how to determine appropriate and inappropriate uses of Digital ID. In April 2019, our research began with this question, but it quickly became clear that a determination of the legitimacy of uses hinged on the fundamental attributes and governing structure of the Digital ID system itself. Our evaluation framework is intended as a series of questions against which Digital ID may be tested. We hope that these questions will inform the trade-offs that must be made while building and assessing identity programmes, to ensure that human rights are adequately protected.&lt;/p&gt;
&lt;h4&gt;Rule of Law Tests&lt;/h4&gt;
&lt;p&gt;Foundational Digital ID must only be implemented along with a 
legitimate regulatory framework that governs all aspects of Digital ID, 
including its aims and purposes, the actors who have access to it, etc. 
In the absence of this framework, there is nothing that precludes 
Digital IDs from being leveraged by public and private actors for 
purposes outside the intended scope of the programme. Our rule of law 
principles mandate that the governing law should be enacted by the 
legislature, be devoid of excessive delegation, be clear and accessible 
to the public, and be precise and limiting in its scope for discretion. 
These principles are substantiated by the criticism that the Kenyan 
Digital ID, the Huduma Namba, was met with when it was legalized through
 a Miscellaneous Amendment Act, meant only for small or negligible 
amendments and typically passed without any deliberation. These set of 
tests respond to the haste with which Digital ID has been implemented, 
often in the absence of an enabling law which adequately addresses its 
potential harms.&lt;/p&gt;
&lt;h4&gt;Rights based Tests&lt;/h4&gt;
&lt;p&gt;Digital ID, because of its collection of personal data and 
determination of eligibility and rights of users, intrinsically involves
 restrictions on certain fundamental rights. The use of Digital ID for 
essential functions of the State, including delivery of benefits and 
welfare, and maintenance of civil and sectoral records, enhance the 
impact of these restrictions. Accordingly, the entire identity 
framework, including its architecture, uses, actors, and regulators, 
must be evaluated at every stage against the rights it is potentially 
violating. Only then will we be able to determine if such violation is 
necessary and proportionate to the benefits it offers. In Jamaica, the 
National Identification and Registration Act, which mandated citizens’ 
biometric enrolment at the risk of criminal sanctions, was held to be a 
disproportionate violation of privacy, and therefore unconstitutional.&lt;/p&gt;
&lt;h4&gt;Risk based Tests&lt;/h4&gt;
&lt;p&gt;Even with a valid rule of law framework that seeks to protect 
rights, the design and use of Digital ID must be based on an analysis of
 the risks that the system introduces. This could take the form of 
choosing between a centralized and federated data-storage framework, 
based on the effects of potential failure or breach, or of restricting 
the uses of the Digital ID to limit the actors that will benefit from 
breaching it. Aside from the design of the system, the regulatory 
framework that governs it should also be tailored to the potential risks
 of its use. The primary rationale behind a risk assessment for an 
identity framework is that it should be tested not merely against 
universal metrics of legality and proportionality, but also against an 
examination of the risks and harms it poses. Implicit in a risk based 
assessment is also the requirement of implementing a responsive 
mitigation strategy to the risks identified, both while creating and 
governing the identity programme.&lt;/p&gt;
&lt;p&gt;Digital ID programmes create an inherent power imbalance 
between the State and its residents because of the personal data they 
collect and the consequent determination of significant rights, 
potentially creating risks of surveillance, exclusion, and 
discrimination. The accountability and efficiency gains they promise 
must not lead to hasty or inadequate implementation.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework'&gt;https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T08:03:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/divergence-between-the-gdpr-and-pdp-bill-2019">
    <title>Divergence between the GDPR and PDP Bill 2019</title>
    <link>https://cis-india.org/internet-governance/divergence-between-the-gdpr-and-pdp-bill-2019</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/divergence-between-the-gdpr-and-pdp-bill-2019'&gt;https://cis-india.org/internet-governance/divergence-between-the-gdpr-and-pdp-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pallavi</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-02-21T13:05:08Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/cis-general-comments-to-the-pdp-bill-2019">
    <title>CIS' General Comments to the PDP Bill 2019</title>
    <link>https://cis-india.org/accessibility/blog/cis-general-comments-to-the-pdp-bill-2019</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/cis-general-comments-to-the-pdp-bill-2019'&gt;https://cis-india.org/accessibility/blog/cis-general-comments-to-the-pdp-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pallavi</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-02-21T10:10:54Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/annotated-ver-pdp-bill-2019">
    <title>Annotated ver PDP Bill 2019</title>
    <link>https://cis-india.org/accessibility/blog/annotated-ver-pdp-bill-2019</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/annotated-ver-pdp-bill-2019'&gt;https://cis-india.org/accessibility/blog/annotated-ver-pdp-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pallavi</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-02-21T10:08:41Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/cis-comments-pdp-bill-2019">
    <title>CIS Comments PDP Bill 2019</title>
    <link>https://cis-india.org/accessibility/blog/cis-comments-pdp-bill-2019</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/cis-comments-pdp-bill-2019'&gt;https://cis-india.org/accessibility/blog/cis-comments-pdp-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pallavi</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-02-21T10:02:22Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/gen-comments-pdp-bill-2019">
    <title>Gen Comments PDP Bill 2019</title>
    <link>https://cis-india.org/accessibility/blog/gen-comments-pdp-bill-2019</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/gen-comments-pdp-bill-2019'&gt;https://cis-india.org/accessibility/blog/gen-comments-pdp-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pallavi</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-02-21T10:00:16Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/how-the-data-protection-bill-regulates-social-media-platforms">
    <title>How the Data Protection Bill Regulates Social Media Platforms</title>
    <link>https://cis-india.org/internet-governance/blog/how-the-data-protection-bill-regulates-social-media-platforms</link>
    <description>
        &lt;b&gt;The Bill gives the Centre the power to designate certain social media intermediaries as significant data fiduciaries.&lt;/b&gt;
        
&lt;p&gt;This opinion piece by Tanaya Rajwade and Gurshabad Grover was published in &lt;a class="external-link" href="https://thewire.in/tech/indias-privacy-bill-regulates-social-media-platforms"&gt;the Wire&lt;/a&gt; on 17 February 2020. The authors would like to thank Arindrajit Basu and Pallavi Bedi for their comments and suggestions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The &lt;a href="https://www.medianama.com/wp-content/uploads/Personal-Data-Protection-Bill-2019.pdf"&gt;Personal Data Protection Bill&lt;/a&gt; was tabled in the Lok Sabha in December following much anticipation and debate&lt;/p&gt;
&lt;p&gt;The tabled Bill significantly differs from the one proposed by the &lt;a href="http://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill%2C2018_0.pdf"&gt;Justice Srikrishna Committee&lt;/a&gt;,
 especially when it comes to provisions relating to governmental access 
to citizens’ data, with (retd) Justice Srikrishna going so far as to &lt;a href="https://economictimes.indiatimes.com/news/economy/policy/personal-data-protection-bill-can-turn-india-into-orwellian-state-justice-bn-srikrishna/articleshow/72483355.cms"&gt;call it&lt;/a&gt; ‘dangerous’ and capable of creating ‘an Orwellian state’.&lt;/p&gt;
&lt;p&gt;What has gone under the radar, 
perhaps, amidst this is the implications of the ‘social media 
intermediary’ construct that the Bill introduces, and the proposal to 
require certain social media platforms to provide users the option to 
voluntarily verify their accounts.&lt;/p&gt;
&lt;p&gt;Section 26 defines ‘social media 
intermediary’ as a service that facilitates online interaction between 
two or more ‘users’ and allows users to disseminate media. While 
e-commerce, internet service providers, search engines, and email 
services are explicitly excluded from the definition, this term is broad
 enough to cover messaging services like WhatsApp, Telegram and Signal.&lt;/p&gt;
&lt;p&gt;The Bill further provides for certain social media intermediaries to be designated as ‘significant data fiduciaries.’&lt;/p&gt;
&lt;p&gt;Apart from the generic obligations 
that the Bill proposes for significant data fiduciaries, Section 28(3) 
requires these designated entities to provide users with an account 
verification mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scope and permissibility&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Clearly, the intended effect of the 
provisions is outside the ambit of what we generally understand by ‘data
 protection.’ Perhaps the drafters also recognised this, and therefore 
awkwardly included ‘laying down norms for social media intermediaries’ 
in the preamble.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The fundamental issue here is that 
the obligation conflicts with a core tenet of similar legislation 
globally that has been emphasised in the Bill as well: &lt;a href="https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/principles/data-minimisation/"&gt;data minimisation&lt;/a&gt;,
 i.e. the principle that organisations should not collect more 
information than needed to fulfill their purpose. The verification 
requirement&amp;nbsp; is essentially a State diktat coercing social media 
companies into collecting more information about their users than is 
necessary.&lt;/p&gt;
&lt;p&gt;Another way to look at the provision 
is as a move to indirectly expand the amount of information available to
 the government. Interestingly, the intention behind Section 28(3) is 
not mentioned in the Bill or its Statement of Objects and Reasons. The 
legitimate aim required to justify privacy infringements by the State as
 laid down in &lt;em&gt;Puttaswamy v. Union of India&lt;/em&gt; has not been sufficiently clarified in the case of this provision.&lt;/p&gt;
&lt;p&gt;Therefore, this provision could very well flounder on being subjected to constitutional scrutiny.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Excessive delegation: Is the devil in the detail?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Another striking feature of the 
provisions is that several important decisions are left to the 
executive. The Bill gives the Centre the power to designate certain 
social media intermediaries as ‘significant data fiduciaries’ if they 
have with users higher than notified thresholds, whose ‘actions have, or
 are likely to have a significant impact on electoral democracy, 
security of the State, public order or the sovereignty and integrity of 
India’.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We can contrast this with the fact 
that the general power to classify entities as significant data 
fiduciaries lies with the Data Protection Authority (DPA). However, when
 it comes to social media intermediaries, the DPA is reduced to a paper 
tiger, with only consultation (and not even concurrence) being sought 
from the DPA.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This concentration of power in the 
hands of the government should be viewed in conjunction with the obvious
 conflict of interest created by the Bill: the government would be 
incentivised to designate platforms which attract dissenting speech, 
thereby increasing their obligations and concomitant costs.&lt;/p&gt;
&lt;p&gt;The classification criterion is also 
problematic as ‘significant impact on electoral democracy’ is a 
subjective standard. Such powers could be a case of excessive delegation
 to the executive, possibly having an arbitrary impact on all growing 
social media platforms. Given this ambiguity, social media platforms may
 be incentivised to err on the side of caution and to apply &lt;a href="https://www.theguardian.com/technology/2019/sep/25/revealed-how-tiktok-censors-videos-that-do-not-please-beijing"&gt;harsher content moderation practices&lt;/a&gt; to police dissenting speech.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;‘Voluntary’ verification of users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Bill requires intermediaries to 
extend to users the option to verify their accounts, and verified 
accounts are to be provided a mark that shall be visible to all users. 
The manner in which platforms are supposed to facilitate this 
verification is yet another critical matter that is left to delegated 
legislation. If the &lt;a href="https://qz.com/india/1351263/supreme-court-verdict-how-indias-aadhaar-id-became-mandatory/"&gt;history of Aadhaar&lt;/a&gt; is any indication, such&amp;nbsp; delegation may result in rules that compromise the stated ‘voluntary’ nature of the provision.&lt;/p&gt;
&lt;p&gt;Even if left truly voluntary, this 
obligation may have an adverse impact on the exercise of freedom of 
expression online. Almost all leading social media platforms rely on 
user insights to drive personalised advertisement services that generate
 most of their revenue. These platforms have normalised private-actor 
surveillance of human behaviour, and seek to collect as much information
 as possible about users and non-users alike.&lt;/p&gt;
&lt;p&gt;For instance, despite criticism, 
Facebook has a ‘real name’ policy, going as far as collecting 
information from users’ friends and third-parties to verify the ‘real’ 
identities of its users. Therefore, platforms like Facebook may 
incentivise the verification of accounts by increasing the visibility 
and reach of content created by ‘verified’ accounts, thereby eroding the
 legitimacy of pseudonymous expression.&lt;/p&gt;
&lt;p&gt;The proposal is in sharp contrast with EU’s General Data Protection Regulation, which has led to &lt;a href="https://www.thesun.co.uk/tech/5565946/facebook-real-name-policy-illegal/"&gt;rulings&lt;/a&gt; in &lt;a href="https://www.telecompaper.com/news/berlin-court-rules-against-facebooks-privacy-settings-terms-and-conditions--1324120"&gt;Germany&lt;/a&gt;
 that Facebook’s ‘real name’ policy violates the law. The primary 
motivation of data protection legislation is to limit the personal and 
social harms that arise out of such indiscriminate collection of 
information. Unfortunately, instead of mitigating these, the Bill may 
very well end up entrenching these harms.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Legitimising surveillance&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is also relevant to note that the &lt;a href="https://meity.gov.in/comments-invited-draft-intermediary-rules"&gt;intermediary guidelines&lt;/a&gt;
 proposed by the MeitY were criticised for placing onerous requirements 
on ‘intermediaries’, a term in the Information Technology (IT) Act that 
remains a Procrustean bed for almost all internet services. Since the IT
 Act does not provide a separate definition of ‘social media 
intermediary’ and only defines an ‘intermediary’, the inclusion of the 
provision in the Bill may be a more &lt;a href="https://www.medianama.com/2020/01/223-supreme-court-to-madras-hc-transfer-all-files-in-whatsapp-traceability-case/"&gt;convenient&lt;/a&gt;, albeit misplaced, effort to classify intermediaries and subsequently carve out specific obligations.&lt;/p&gt;
&lt;p&gt;However, as we point out, this 
classification is outside the scope of the PDP Bill and would be better 
suited in the IT Act. The proposed provisions&amp;nbsp; lack a clear and 
legitimate aim that is sought to be achieved from user account 
verification, and an excessive delegation of powers to the executive.&lt;/p&gt;
&lt;p&gt;The provisions also need to be looked
 at in conjunction with Section 35 of the Bill, which empowers the 
Central government to exempt any government agency from obligations 
relating to processing of personal data in the interest of security of 
the State where necessary.&lt;/p&gt;
&lt;p&gt; This provision marks a significant 
dilution of the Bill proposed by the Srikrishna Committee, which clearly
 incorporated the Supreme Court’s ruling in &lt;em&gt;Puttaswamy v. Union of India&lt;/em&gt;:
 any invasion into privacy by the government must be authorised by law, 
be necessary for a legitimate state purpose and be proportional to the 
said goal. If the Bill is passed in its current form, exempted law 
enforcement and intelligence agencies would be able to demand data from 
social media intermediaries, including information on the ‘real 
identity’ of users, with little safeguards.&lt;/p&gt;
&lt;p&gt;Unfortunately, it seems that several 
provisions of the Bill, including the schema relating to social media 
platforms, seek to legitimise disproportionate forms of state 
surveillance rather than curbing the power of the government to invade 
citizens’ privacy.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Tanaya Rajwade and Gurshabad Grover are researchers at the Centre for Internet and Society (CIS). Views are the authors’ alone. &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Disclosure: The CIS is a recipient of research grants from Facebook.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/how-the-data-protection-bill-regulates-social-media-platforms'&gt;https://cis-india.org/internet-governance/blog/how-the-data-protection-bill-regulates-social-media-platforms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Tanaya Rajwade and Gurshabad Grover</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-02-19T11:53:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/announcing-selected-researchers-welfare-gender-and-surveillance">
    <title>Announcing Selected Researchers: Welfare, Gender, and Surveillance </title>
    <link>https://cis-india.org/raw/announcing-selected-researchers-welfare-gender-and-surveillance</link>
    <description>
        &lt;b&gt;We published a Call for Researchers on January 10, 2020, to invite applications from researchers interested in writing a narrative essay that interrogates the modes of surveillance that people of LGBTHIAQ+ and gender non-conforming identities and sexual orientations are put under as they seek sexual and reproductive health (SRH) services in India.  We received 29 applications from over 10 locations in India in response to the call, and are truly overwhelmed by and grateful for this interest and support. We eventually selected applications by 3 researchers that we felt aligned best with the specific objectives of the project. Please find below brief profile notes of the selected researchers.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Call for Researchers: &lt;a href="https://cis-india.org/jobs/researchers-welfare-gender-surveillance-call" target="_blank"&gt;URL&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2&gt;Kaushal Bodwal&lt;/h2&gt;
&lt;p&gt;Kaushal is persuing his MPhil in Sociology at Delhi School of Economics, University of Delhi. He completed his Master's in Sociology at Centre for the Study of Social Systems, Jawaharlal Nehru University after getting a BSc honors degree in Biomedical Sciences from Delhi University. He is one of the founding members of Hasratein: a queer collective, New Delhi. He has been an active spokesperson for Queer and Trans Rights in India and have been on a number of panel discussion on Trans Act 2019 in various campuses. He has also delivered a lecture series on Colonialism and Medicine in Ambedkar University, Kashmiri Gate, Delhi. His areas of interest are Sociology of medicine, gender and medicine, sexuality, religion and biomedical science, intersex studies.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://kafila.online/2019/08/27/queerness-as-disease-a-continuing-narrative-in-21st-century-india-kaushal-bodwal/" target="_blank"&gt;Queerness as disease – a continuing narrative in 21st century India&lt;/a&gt;, Kafila, 27 August 2019&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.firstpost.com/india/what-it-means-to-be-a-queer-and-live-under-regime-bent-on-remaking-india-on-terms-of-their-tradition-writes-queer-scholar-trolled-by-right-wing-7915391.html" target="_blank"&gt;What it means to be queer under a regime bent on remaking India on its own ideological terms&lt;/a&gt;, Firstpost, 17 January 2020&lt;/p&gt;
&lt;h2&gt;Rosamma Thomas&lt;/h2&gt;
&lt;p&gt;Rosamma has worked both as a reporter and as an editor of news reports with newspapers. She currently writes reports for NGOs while also undertaking freelance reporting assignments. She is based in Pune.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://iced.cag.gov.in/wp-content/uploads/2016-17/NTP%2007/article.pdf " target="_blank"&gt;India's mining state steps up fight to rein in killer silicosis&lt;/a&gt;, The Times of India, 29 June 2016&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.newsclick.in/doctor-may-have-found-early-marker-silicosis-who-will-fund-him" target="_blank"&gt;Doctor may have found early marker for silicosis, but who will fund him?&lt;/a&gt;, Newsclick, 18 July 2019&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.newsclick.in/Asbestos-Poisoning-Raghunath-Manwar-Fight-Safer-Work-Conditions" target="_blank"&gt;Asbestos poisoning: Raghunath Manwar’s fight for safer work conditions&lt;/a&gt;, Newsclick, 9 January 2020&lt;/p&gt;
&lt;h2&gt;Shreya Ila Anasuya&lt;/h2&gt;
&lt;p&gt;Shreya is a writer, editor, journalist and performance artist currently based in Calcutta. Her fiction explores the places where myth, memory, history and the performing arts meet. As a journalist, her work explores gender, sexuality, politics, culture and history. She has been published in &lt;em&gt;The Wire&lt;/em&gt;, &lt;em&gt;Caravan&lt;/em&gt;, &lt;em&gt;Scroll&lt;/em&gt;, &lt;em&gt;Mint Lounge&lt;/em&gt;, &lt;em&gt;Deep Dives&lt;/em&gt;, &lt;em&gt;GenderIT&lt;/em&gt;, &lt;em&gt;Helter Skelter&lt;/em&gt;, and many more. She is the editor of the digital publication &lt;a href="https://medium.com/skin-stories" target="_blank"&gt;&lt;em&gt;Skin Stories&lt;/em&gt;&lt;/a&gt;, housed at the non-profit Point of View. She is the writer and narrator of ‘Gul - a story in text, song and dance’ which has been performed in several cities in India. She was a Felix Scholar at SOAS, University of London, from where she has an MA in Anthropology. For a full portfolio, please click &lt;a href="http://porterfolio.net/dervishdancing" target="_blank"&gt;here&lt;/a&gt; or visit her &lt;a href="https://www.shreyailaanasuya.com/" target="_blank"&gt;website&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;This project is led by Ambika Tandon, Aayush Rathi, and Sumandro Chattapadhyay at the Centre for Internet and Society, and is supported by a grant from Privacy International.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/announcing-selected-researchers-welfare-gender-and-surveillance'&gt;https://cis-india.org/raw/announcing-selected-researchers-welfare-gender-and-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Gender, Welfare, and Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2020-02-13T15:04:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019">
    <title> Comments to the Personal Data Protection Bill 2019</title>
    <link>https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019</link>
    <description>
        &lt;b&gt;The Personal Data Protection Bill, 2019 was introduced in the Lok Sabha on December 11, 2019. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Please view our general comments below, or download as PDF &lt;a href="https://cis-india.org/accessibility/blog/cis-general-comments-to-the-pdp-bill-2019" class="internal-link" title="CIS' General Comments to the PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Our comments and recommendations can be downloaded as PDF &lt;a href="https://cis-india.org/accessibility/blog/cis-comments-pdp-bill-2019" class="internal-link" title="CIS Comments PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;We have also prepared an annotated version of the Bill, where our detailed comments and recommendations can be viewed alongside the Bill, available as PDF &lt;a href="https://cis-india.org/accessibility/blog/annotated-ver-pdp-bill-2019" class="internal-link" title="Annotated ver PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2&gt;General Comments&lt;/h2&gt;
&lt;h3&gt;1. Executive notification cannot abrogate fundamental rights &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;In 2017, the Supreme Court in K.S. Puttaswamy v Union of India [1] held the right to privacy to be a fundamental right. While this right is subject to reasonable restrictions, the restrictions have to meet a three fold requirement, namely (i) existence of a law; (ii) legitimate state aim; (iii) proportionality.Under the 2018 Bill, the exemption to government agencies for processing of personal data from the provisions of the Bill in the ‘interest of the security of the State’ [2] was subject to a law being passed by Parliament. However, under Clause 35 of the present Bill, the Central Government is merely required to pass a written order exempting the government agency from the provisions of the Bill.Any restriction on the right to privacy will have to comply with the conditions prescribed in Puttaswamy I. An executive order issued by the central government authorising any agency of the government to process personal data does not satisfy the first requirement laid down by the Supreme Court in Puttaswamy I — as it is not a law passed by Parliament. The Supreme Court while deciding upon the validity of Aadhar in K.S. Puttaswamy v Union of India [3] noted that “an executive notification does not satisfy the requirement of a valid law contemplated under Puttaswamy. A valid law in this case would mean a law passed by Parliament, which is just, fair and reasonable. Any encroachment upon the fundamental right cannot be sustained by an executive notification.”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;2. Exemptions under Clause 35 do not comply with the legitimacy and proportionality test&lt;/h3&gt;
&lt;p&gt;The lead judgement in Puttaswamy I while formulating the three fold test held that the restraint on privacy emanate from the procedural and content based mandate of Article 21 [4]. The Supreme Court in Maneka Gandhi v Union India [5] had clearly established that “mere prescription of some kind of procedure cannot ever meet the mandate of Article 21. The procedure prescribed by law has to be fair, just and reasonable, not fanciful,  oppressive and arbitrary” [6]. The existence of a law is the first requirement; the second requirement is that of ‘legitimate state aim’. As per the lead judgement this requirement ensures that “the nature and content of the law which imposes the restriction falls within the zone of reasonableness mandated by Article 14, which is  a guarantee against arbitrary state action” [7]. It is established that for a provision which confers upon the executive or administrative authority discretionary powers to be regarded as non-arbitrary, the provision should lay down clear and specific guidelines for the executive to exercise  the power [8]. The third test to be complied with is that the restriction should be ‘proportionate,’ i.e. the means that are adopted by the legislature are proportional to the object and needs sought to be fulfilled by the law. The Supreme Court in Modern Dental College &amp;amp; Research Centre v State of Madhya Pradesh [9] specified the components of proportionality standards —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;A measure restricting a right must have a legitimate goal;&lt;/li&gt;
&lt;li&gt;It must be a suitable means of furthering this goal;&lt;/li&gt;
&lt;li&gt;There must not be any less restrictive, but equally effective alternative; and&lt;/li&gt;
&lt;li&gt;The measure must not have any disproportionate impact on the right holder&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Clause 35 provides extensive grounds for the Central Government to exempt any agency from the requirements of the bill but does not specify the procedure to be followed by the agency while processing personal data under this provision. It merely states that the ‘procedure, safeguards and oversight mechanism to be followed’ will be prescribed in  the rules.The wide powers conferred on the central government without clearly specifying the procedure may be contrary to the three fold test laid down in Puttaswamy I, as it is difficult to ascertain whether a legitimate or proportionate objective is being fulfilled [10].&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;3. Limited powers of Data Protection Authority in comparison with the Central Government&lt;/h3&gt;
&lt;p&gt;In comparison with the last version of the Personal Data Protection Bill, 2018 prepared by the Committee of Experts led by Justice Srikrishna, we witness an abrogation of powers of the Data Protection Authority (Authority), to be created, in this Bill. The powers and functions that were originally intended to be performed by the Authority have now been allocated to the Central Government. For example:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;In the 2018 Bill, the Authority had the power to notify further categories of sensitive personal data. Under the present Bill, the Central Government in consultation with the sectoral regulators has been conferred the power to do so.&lt;/li&gt;
&lt;li&gt;Under the 2018 Bill, the Authority had the sole power to determine and notify significant data fiduciaries, however, under the present Bill, the Central Government has in consultation with the Authority been given the power to notify social media intermediaries as significant data fiduciaries.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;In order to govern data protection effectively, there is a need for a responsive market regulator with a strong mandate and resources. The political nature of the personal data also requires that the governance of data, particularly the rule-making and adjudicatory functions performed by the Authority are independent of the Executive.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;4. No clarity on data sandbox&lt;/h3&gt;
&lt;p&gt;The Bill contemplates a sandbox for “ innovation in artificial intelligence, machine-learning or any other emerging technology in public interest.” A Data Sandbox is a non-operational environment where the analyst can model and manipulate data inside the data management system. Data sandboxes have been envisioned as a secure area where only a copy of the company’s or participant companies’ data is located [11]. In essence, it refers to the scalable and creation platform which can be used to explore an enterprise’s information sets. On the other hand, regulatory sandboxes are controlled environments where firms can introduce innovations to a limited customer base within a relaxed regulatory framework, after which they may be allowed entry into the larger market after meeting certain conditions. This purportedly encourages innovation through the lowering of entry barriers by protecting newer entrants from unnecessary and burdensome regulation. Regulatory sandboxes can be interpreted as a form of responsive regulation by governments that seek to encourage innovation – they allow selected companies to experiment with solutions within an environment that is relatively free of most of the cumbersome regulations that they would ordinarily be subject to, while still subject to some appropriate safeguards and regulatory requirements. Sandboxes are regulatory tools which may be used to permit companies to innovate in the absence of heavy regulatory burdens. However, these ordinarily refer to burdens related to high barriers to entry (such as capital requirements for financial  and banking companies), or regulatory costs. In this Bill, however, the relaxing of data protection provisions for data fiduciaries would lead to restrictions of the privacy of individuals. Limitations to a fundamental rights on grounds of ‘fostering innovation’ is not a constitutional tenable position, and contradict the primary objectives of a data protection law.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;5. The primacy of ‘harm’ in the Bill ought to be reconsidered&lt;/h3&gt;
&lt;p&gt;While a harms based approach is necessary for data protection frameworks, such approaches should be restricted to the positive obligations, penal provisions and responsive regulation of the Authority. The Bill does not provide any guidance on either the interpretation of the term ‘harm,’ [12] or on the various activities covered within the definition of the term. Terms such as ‘loss of reputation or humiliation’ ‘any discriminatory treatment’ are a subjective standard and are open to varied interpretations. This ambiguity in the definition will make it difficult for the data principal to demonstrate harm and for the DPA to take necessary action as several provisions are based upon harm being caused or likely to be caused.Some of the significant provisions where ‘harm’ is a precondition for the provision to come into effect are —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Clause 25: Data Fiduciary is required to notify the Authority about the breach of personal data processed by the data fiduciary, if such breach is likely to cause harm to any data principal. The Authority after taking into account the severity of the harm that may be caused to the data principal will determine whether the data principal should be notified about the breach.&lt;/li&gt;
&lt;li&gt;Clause 32 (2): A data principal can file a complaint with the data fiduciary for a contravention of any of the provisions of the Act, which has caused or is likely to cause ‘harm’ to the data principal.&lt;/li&gt;&lt;li&gt;Clause 64 (1): A data principal who has suffered harm as a result of any violation of the provision of the Act by a data fiduciary, has the right to seek compensation from the data fiduciary.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Clause 16 (5): The guardian data fiduciary is barred from profiling, tracking or undertaking targeted advertising directed at children and undertaking any other processing of personal data that can cause significant harm to the child.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;6. Non personal data should be outside the scope of this Bill&lt;/h3&gt;
&lt;p&gt;Clause 91 (1) states that the Act does not prevent the Central Government from framing a policy for the digital economy, in so far as such policy does not govern personal data. The Central Government can, in consultation with the Authority, direct any data fiduciary  to provide any anonymised personal data or other non-personal data to enable better targeting of delivery of services or formulation of evidence based policies in any manner as may be prescribed.It is concerning that the data protection bill has specifically carved out an exception for the Central Government to frame policies for the digital economy and seems to indicate that the government plans to freely use any and all anonymized and/or non-personal data that rests with any data fiduciary that falls under the ambit of the bill to support the digital economy including for its growth, security, integrity, and prevention of misuse. It is unclear how the government, in practice, will be able to compel organizations to share this data. Further, there is a lack of clarity on the contours of the definition of non-personal data and the Bill does not define the term. It is also unclear whether the Central Government can compel the data fiduciary to transfer/share all forms of non-personal data and the rights and obligations of the data fiduciaries and data principals over such forms of data. Anonymised data refers to data which has ‘ irreversibly’ been converted into a form in which the data principal cannot be identified. However, as several instances have shown ‘ irreversible’ anonymisation is not possible. In the United States, the home addresses of taxi drivers were uncovered and in Australia individual health records were mined from anonymised medical bills [13]. In September 2019, the Ministry of Electronics and Information Technology, constituted an expert committee under the chairmanship of Kris Gopalkrishnan to study various issues relating to non-personal data and to deliberate over a data governance framework for the regulation of such data.The provision should be deleted and the scope of the bill should be limited to protection of personal data and to provide a framework for the protection of individual privacy. Until the report of the expert committee is published, the Central Government should not frame any law/regulation on the access and monetisation of non-personal/ anonymised data nor can they create a blanket provision allowing them to request such data from any data fiduciary that falls within the ambit of the bill. If the government wishes to use data resting with a data fiduciary; it must do so on a case to case basis and under formal and legal agreements with each data fiduciary.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;7. Steps towards greater decentralisation of power&lt;/h3&gt;
&lt;p&gt;We propose the following steps towards greater decentralisation of powers and devolved jurisdiction —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Creation of State Data Protection Authorities: A single centralised body may not be the appropriate form of such a regulator. We propose that on the lines of central and state commissions under the Right to Information Act, 2005, state data protection authorities are set up which are in a position to respond to local complaints and exercise jurisdiction over entities within their territorial jurisdictions.&lt;/li&gt;
&lt;li&gt;More involvement of industry bodies and civil society actors: In order to lessen the burden on the data protection authorities it is necessary that there is active engagement with industry bodies, sectoral regulators and civil society bodies engaged in privacy research. Currently, the Bill provides for involvement of industry or trade association, association representing the interests of data principals, sectoral regulator or statutory Authority, or an departments or ministries of the Central or State Government in the formulation of codes of practice. However, it would be useful to also have a more active participation of industry associations and civil society bodies in activities such as promoting  awareness among data fiduciaries of their obligations under this Act, promoting measures and undertaking research for innovation in the field of protection of personal data.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;8. The Authority must be empowered to exercise responsive regulation&lt;/h3&gt;
&lt;p&gt;In a country like India, the challenge is to move rapidly from a state of little or no data protection law, and consequently an abysmal state of data privacy practices to a strong data protection regulation and a powerful regulator capable of enabling a state of robust data privacy practices. This requires a system of supportive mechanisms to the stakeholders in the data ecosystem, as well as systemic measures which enable the proactive detection of breaches. Further, keeping in mind the limited regulatory capacity in India, there is a need for the Authority to make use of different kinds of inexpensive and innovative strategies.We recommend the following additional powers for the Authority to be clearly spelt out in the Bill —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Informal Guidance: It would be useful for the Authority to set up a mechanism on the lines of the Security and Exchange Board of India (SEBI)’s Informal Guidance Scheme, which enables regulated entities to approach the Authority for non-binding advice on the position of law. Given that this is the first omnibus data protection law in India, and there is very little jurisprudence on the subject from India, it would be extremely useful for regulated entities to get guidance from  the regulator.&lt;/li&gt;
&lt;li&gt;Power to name and shame: When a DPA makes public the names of organisations that have seriously contravened data protection legislation, this is a practice known as “naming and shaming.”  The UK ICO and other DPAs recognise the power of publicity, as evidenced by their willingness to co-operate  with the media. The ICO does not simply post monetary penalty notices (MPNs or fines) on its websites for journalists to find, but frequently issues press releases, briefs journalists and uses social media. The ICO’s publicity statement on communicating enforcement activities states that the “ICO aims to get media coverage for  enforcement activities.”&lt;/li&gt;
&lt;li&gt;Undertakings: The UK ICO has also leveraged the threats of fines into an alternative enforcement mechanism seeking contractual undertakings from data controllers to take certain remedial steps. Undertakings have significant advantages for the regulator. Since an undertaking is a more “co-operative”solution, it is less likely that a data controller will change it. An undertaking is simpler and easier to put in place. Furthermore, the Authority can put an undertaking in place quickly as opposed to legal proceedings which are longer.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;9. No clear roadmap for the implementation of the Bill&lt;/h3&gt;
&lt;p&gt;The 2018 Bill had specified a roadmap for the different provisions of the Bill to come into effect from the date of the Act being notified [14]. It specifically stated the time period within which the Authority had to be established and the subsequent rules and regulations notified.The present Bill does not specify any such blueprint; it does not provide any details on either when the Bill will be notified or the time period within within which the Authority shall be established and specific rules and regulations notified. Considering that 25 provisions have been deferred to rules that have to be framed by the Central Government and a further 19 provisions have been deferred to the regulations to be notified by the Authority the absence and/or delayed notification of such rules and regulations will impact the effective functioning of the Bill.The absence of any sunrise or sunset provision may disincentivise political or industrial will to support or enforce the provisions of the Bill. An example of such a lack of political will was the establishment of the Cyber Appellate Tribunal. The tribunal was established in 2006 to redress cyber fraud. However, it was virtually a defunct body from 2011 onwards when the last chairperson retired. It was eventually merged with the Telecom Dispute Settlement and Appellate Tribunal in 2017.We recommend that Bill clearly lays out a time period for the implementation of the different provisions of the Bill, especially a time frame for the establishment of the Authority. This is important to give full and effective effect to the right of privacy of the &lt;br /&gt;individual. It is also important to ensure that individuals have an effective mechanism  to enforce the right and seek recourse in case of any breach of obligations by the  data fiduciaries.For offences, we suggest a system of mail boxing where provisions and punishments are enforced in a staggered manner, for a period till the fiduciaries are aligned with the provisions of the Act. The Authority must ensure that data principals and fiduciaries have sufficient awareness of the provisions of this Bill before bringing the provisions for punishment are brought into force. This will allow the data fiduciaries to align their practices with the provisions of this new legislation and the Authority will also have time to define and determine certain provisions that the Bill has left the Authority to define. Additionally enforcing penalties for offences initially must be in a staggered process, combined with provisions such as warnings, in order to allow first time and mistaken offenders from paying a high price. This will relieve the fear of smaller companies and startups who might fear processing data for the fear of paying penalties for offences.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;10. Lack of interoperability&lt;/h3&gt;
&lt;p&gt;In its current form, a number of the provisions in the Bill will make it difficult for India’s framework to be interoperable with other frameworks globally and in the region. For example, differences between the draft Bill and the GDPR can be found in the grounds for processing,&amp;nbsp; data localization frameworks, the framework for cross border transfers, definitions of sensitive personal data, inclusion of&amp;nbsp; the undefined category of ‘critical&amp;nbsp; data’, and the roles of the authority and the central government.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;11. Legal Uncertainty&lt;/h3&gt;
&lt;p&gt;In its current structure, there are a number of provisions in the Bill that, when implemented, run the risk of creating an environment of legal uncertainty. These include: lack of definition of critical data, lack of clarity in the interpretation of the terms ‘harm’ and ‘significant harm’, ability of the government to define further categories of sensitive personal data,&amp;nbsp; inclusion of requirements for ‘social media intermediaries’, inclusion of ‘non-personal data’, framing of the requirements for data transfers, bar on processing of certain forms of biometric data as defined by the Central Government, the functioning between a consent manager and another data fiduciary, the inclusion of an AI sandbox and the definition of state. To ensure the greatest amount of protection of individual privacy rights and the protection of personal data while also enabling innovation, it is important that any data protection framework is structured and drafted in a way to provide as much legal certainty as possible.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Endnotes&lt;/h3&gt;
&lt;p&gt;1. (2017) 10 SCC 641 (“Puttaswamy I”).&lt;/p&gt;
&lt;p&gt;2. Clause 42(1) of the 2018 Bill states that “Processing of personal data in the interests of the security of the State shall not be permitted unless it is authorised pursuant to a law, and is in accordance with the procedure established by such law, made by Parliament and is necessary for, and proportionate to such interests being achieved.”&lt;/p&gt;
&lt;p&gt;3. (2019) 1 SCC 1 (“Puttaswamy II”)&lt;/p&gt;
&lt;p&gt;4. Puttaswamy I, supra, para 180.&lt;/p&gt;
&lt;p&gt;5. (1978) 1 SCC 248.&lt;/p&gt;
&lt;p&gt;6. Ibid para 48.&lt;/p&gt;
&lt;p&gt;7. Puttaswamy I supra para 180.&lt;/p&gt;
&lt;p&gt;8. State of W.B. v. Anwar Ali Sarkar, 1952 SCR 284; Satwant Singh Sawhney v A.P.O AIR 1967 SC1836.&lt;/p&gt;
&lt;p&gt;9. (2016)7 SCC 353.&lt;/p&gt;
&lt;p&gt;10. Dvara Research “Initial Comments of Dvara Research dated 16 January 2020 on the Personal Data Protection Bill, 2019 introduced in Lok Sabha on 11 December 2019”, January 2020, https://www.dvara.com/blog/2020/01/17/our-initial-comments-on-the-personal-data-protection-bill-2019/ (“Dvara Research”).&lt;/p&gt;
&lt;p&gt;11. “A Data Sandbox for Your Company”, Terrific Data, last accessed on January 31, 2019, http://terrificdata.com/2016/12/02/3221/.&lt;/p&gt;
&lt;p&gt;12. Clause 3(20) — “harm” includes (i) bodily or mental injury; (ii) loss, distortion or theft of identity; (ii) financial loss or loss of property; (iv) loss of reputation or humiliation; (v) loss of employment; (vi) any discriminatory treatment; (vii) any subjection to blackmail or extortion; (viii) any denial or withdrawal of service,benefit or good resulting from an evaluative decision about the data principal; (ix) any restriction placed or suffered directly or indirectly on speech, movement or any other action arising out of a fear of being observed or surveilled; or (x) any observation or surveillance that is not reasonably expected by the data principal.&lt;/p&gt;
&lt;p&gt;13. Alex Hern “Anonymised data can never be totally anonymous, says study”, July 23, 2019 https://www.theguardian.com/technology/2019/jul/23/anonymised-data-never-be-anonymous-enough-study-finds.&lt;/p&gt;
&lt;p&gt;14. Clause 97 of the 2018 Bill states“(1) For the purposes of this Chapter, the term ‘notified date’ refers to the date notified by the Central Government under sub-section (3) of section 1. (2)The notified date shall be any date within twelve months from the date of enactment of this Act. (3)The following provisions shall come into force on the notified date-(a) Chapter X; (b) Section 107; and (c) Section 108. (4)The Central Government shall, no later than three months from the notified date establish the Authority. (5)The Authority shall, no later than twelve months from the notified date notify the grounds of processing of personal data in respect of the activities listed in sub-section (2) of section 17. (6)The Authority shall no, later than twelve months from the date notified date issue codes of practice on the following matters-(a) notice under section 8; (b) data quality under section 9; (c) storage limitation under section 10; (d) processing of personal data under Chapter III; (e) processing of sensitive personal data under Chapter IV; (f ) security safeguards under section 31; (g) research purposes under section 45; (h) exercise of data principal rights under Chapter VI; (i) methods of de-identification and anonymisation; (j) transparency and accountability measures under Chapter VII. (7)Section 40 shall come into force on such date as is notified by the Central Government for the purpose of that section.(8)The remaining provision of the Act shall come into force eighteen months from the notified date.”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019'&gt;https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Elonnai Hickok, Pallavi Bedi, Shweta Mohandas, Tanaya Rajwade</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2020-02-21T10:13:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019">
    <title>Comments to The PDP Bill 2019</title>
    <link>https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019'&gt;https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>akash</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-02-12T11:52:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
