<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/regulating-bitcoin-in-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/rbi-consultation-paper-on-p2p-lending"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/summary-of-the-public-consultation-by-vigyan-foundation-oxfam-india-and-g-b-pant-institute-allahabad"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/transparency-in-surveillance"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/right-to-privacy-in-peril"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/dna-database-for-missing-persons-and-unidentified-dead-bodies"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/the-aadhaar-case"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law">
    <title>European E-Evidence Proposal and Indian Law</title>
    <link>http://editors.cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law</link>
    <description>
        &lt;b&gt;In April of 2018, the European Union issued the proposal for a new regime dealing with cross border sharing of data and information by issuing two draft instruments, an E-evidence Regulation (“Regulation”) and an E-evidence Directive (“Directive”), (together the “E-evidence Proposal”). The Regulation is a direction to states to put in place the proper legislative and regulatory machinery for the implementation of this regime while the Directive requires the states to enact laws governing service providers so that they would comply with the proposed regime.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The main feature of the E-evidence Proposal is twofold: (i) establishment of a legal regime whereunder competent authorities can issue European Production Orders (&lt;b&gt;EPOs&lt;/b&gt;) and European Preservation Orders (&lt;b&gt;EPROs&lt;/b&gt;) to entities in any other EU member country (together the “&lt;b&gt;Data Orders&lt;/b&gt;”); and (ii) an obligation on service providers offering services in any of the EU member countries to designate legal representatives who will be responsible for receiving the Data Orders, irrespective of whether such entity has an actual physical establishment in any EU member country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this article we will briefly discuss the framework that has been proposed under the two instruments and then discuss how service providers based in India whose services are also available in Europe would be affected by these proposals. The authors would like to make it clear that this article is not intended to be an analysis of the E-evidence Proposal and therefore shall not attempt to bring out the shortcomings of the proposed European regime, except insofar as such shortcomings may affect the service providers located in India being discussed in the second part of the article.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Part I - E-evidence Directive and Regulation &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The E-evidence Proposal introduces the concept of binding EPOs and EPROs. Both Data Orders need to be issued or validated by a judicial authority in the issuing EU member country. A Data Order can be issued to seek preservation or production of data that is stored by a service provider located in another jurisdiction and that is necessary as evidence in criminal investigations or a criminal proceeding. Such Data Orders may only be issued if a similar measure is available for the same criminal offence in a comparable domestic situation in the issuing country. Both Data Orders can be served on entities offering services such as electronic communication services, social networks, online marketplaces, other hosting service providers and providers of internet infrastructure such as IP address and domain name registries. Thus companies such as Big Rock (domain name registry), Ferns n Petals (online marketplace providing services in Europe), Hike (social networking and chatting), etc. or any website which has a subscription based model and allows access to subscribers in Europe would potentially be covered by the E-evidence Proposal. The EPRO, similarly to the EPO, is addressed to the legal representative outside of the issuing country’s jurisdiction to preserve the data in view of a subsequent request to produce such data, which request may be issued through MLA channels in case of third countries or via a European Investigation Order (EIO) between EU member countries. Unlike surveillance measures or data retention obligations set out by law, which are not provided for by this proposal, the EPRO is an order issued or validated by a judicial authority in a concrete criminal proceeding after an individual evaluation of the proportionality and necessity in every single case.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Like the EPO, it refers to the specific known or unknown perpetrators of a criminal offence that has already taken place. The EPRO only allows preserving data that is already stored at the time of receipt of the order, not the access to data at a future point in time after the receipt of the EPRO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While EPOs to produce subscriber data&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and access data&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; can be issued for any criminal offence an EPO for content data&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and transactional data&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; may only be issued by a judge, a court or an investigating judge competent in the case. In case the EPO is issued by any other authority (which is competent to issue such an order in the issuing country), such an EPO has to be validated by a judge, a court or an investigating judge. In case of an EPO for subscriber data and access data, the EPO may also be validated by a prosecutor in the issuing country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To reduce obstacles to the enforcement of the EPOs, the Directive makes it mandatory for service providers to designate a legal representative in the European Union to receive, comply with and enforce Data Orders. The obligation of designating a legal representative for all service providers that are operating in the European Union would ensure that there is always a clear addressee of orders aiming at gathering evidence in criminal proceedings. This would in turn make it easier for service providers to comply with those orders, as the legal representative would be responsible for receiving, complying with and enforcing those orders on behalf of the service provider.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Grounds on which EPOs can be issued&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The grounds on which Data Orders may be issued are contained in Articles 5 and 6 of the Regulation which makes it very clear that a Data Order may only be issued in a case if it is necessary and proportionate for the purposes of a criminal proceeding. The Regulation further specifies that an EPO may only be issued by a member country if a similar domestic order could be issued by the issuing state in a comparable situation. By using this device of linking the grounds to domestic law, the Regulation tries to skirt around the thorny issue of when and on what basis an EPO may be issued. The Regulation also assigns greater weight (in terms of privacy) to transactional and content data as opposed to subscriber and access data and subjects the production and preservation of the former to stricter requirements. Therefore while Data Orders for access and subscriber data may be issued for any criminal offence, orders for transactional and content data can only be issued in case of criminal offences providing for a maximum punishment of atleast 3 years and above. In addition to that EPOs for producing transactional or content data can also be issued for offences specifically listed in Article 5(4) of the Regulation. These offences have been specifically provided for since evidence for such cases would typically be available mostly only in electronic form. This is the justification for the application of the Regulation also in cases where the maximum custodial sentence is less than three years, otherwise it would become extremely difficult to secure convictions in those offences.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Regulation also requires the issuing authority to take into account potential immunities and privileges under the law of the member country in which the service provider is being served the EPO, as well as any impact the EPO may have on fundamental interests of that member country such as national security and defence. The aim of this provision is to ensure that such immunities and privileges which protect the data sought are respected, in particular where they provide for a higher protection than the law of the issuing member country. In such situations the issuing authority “has to seek clarification before issuing the European Production Order, including by consulting the competent authorities of the Member State concerned, either directly or via Eurojust or the European Judicial Network.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Grounds to Challenge EPOs&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Service Providers have been given the option to object to Data Orders on certain limited grounds specified in the Regulation such as, if it was not issued by a proper issuing authority, if the provider cannot comply because of a &lt;i&gt;de facto&lt;/i&gt; impossibility or &lt;i&gt;force majeure&lt;/i&gt;, if the data requested is not stored with the service provider or pertains to a person who is not the customer of the service provider.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In all such cases the service provider has to inform the issuing authority of the reasons for the inability to provide the information in the specified form. Further, in the event that the service provider refuses to provide the information on the grounds that it is apparent that the EPO “manifestly violates” the Charter of Fundamental Rights of the European Union or is “manifestly abusive”, the service provider shall send the information in specified Form to the competent authority in the member state in which the Order has been received. The competent authority shall then seek clarification from the issuing authority through Eurojust or via the European Judicial Network.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the issuing authority is not satisfied by the reasons given and the service provider still refuses to provide the information requested, the issuing authority may transfer the EPO Certificate along with the reasons given by the service provider for non compliance, to the enforcing authority in the addressee country. The enforcing authority shall then proceed to enforce the Order, unless it considers that the data concerned is protected by an immunity or privilege under its national law or its disclosure may impact its fundamental interests such as national security and defence; or the data cannot be provided due to one of the following reasons:&lt;/p&gt;
&lt;p&gt;(a) the European Production Order has not been issued or validated by an issuing authority as provided for in Article 4;&lt;/p&gt;
&lt;p&gt;(b) the European Production Order has not been issued for an offence provided for by Article 5(4);&lt;/p&gt;
&lt;p&gt;(c) the addressee could not comply with the EPOC because of de facto impossibility or force majeure, or because the EPOC contains manifest errors;&lt;/p&gt;
&lt;p&gt;(d) the European Production Order does not concern data stored by or on behalf of the service provider at the time of receipt of EPOC;&lt;/p&gt;
&lt;p&gt;(e) the service is not covered by this Regulation;&lt;/p&gt;
&lt;p&gt;(f) based on the sole information contained in the EPOC, it is apparent that it manifestly violates the Charter or that it is manifestly abusive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the above mechanism the service provider may refuse to comply with an EPO on the ground that disclosure would force it to violate a third-country law that either protects “the fundamental rights of the individuals concerned” or “the fundamental interests of the third country related to national security or defence.” Where a provider raises such a challenge, issuing authorities can request a review of the order by a court in the member country. If the court concludes that a conflict as claimed by the service provider exists, the court shall notify authorities in the third-party country and if that third-party country objects to execution of the EPO, the court must set it aside.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A service provider may also refuse to comply with an order because it would force the service provider to violate a third-country law that protects interests &lt;i&gt;other than&lt;/i&gt; fundamental rights or national security and defense. In such cases, the Regulation provides that the same procedure be followed as in case of law protecting fundamental rights or national security and defense, except that in this case the court, rather than notifying the foreign authorities, shall itself conduct a detailed analysis of the facts and circumstances to decide whether to enforce the order.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Service Provider “Offering Services in the Union”&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As is clear from the discussion above, the proposed regime puts an obligation on service providers offering services in the Union to designate a legal representative in the European Union, whether the service provider is physically located in the European Union or not. This appears to be a fairly onerous obligation for small technology companies which may involve a significant cost to appoint and maintain a legal representative in the European Union, especially if the service provider is not located in the EU. Therefore the question arises as to which service providers would be covered by this obligation and the answer to that question lies in the definitions of the terms “service provider” and “offering services in the Union”.&lt;/p&gt;
&lt;p&gt;The term service provider has been defined in Article 2(2) of the Directive as follows:&lt;/p&gt;
&lt;p&gt;“‘service provider’ means any natural or legal person that provides one or more of the following categories of services:&lt;/p&gt;
&lt;p&gt;(a) electronic communications service as defined in Article 2(4) of [Directive establishing the European Electronic Communications Code];&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) information society services as defined in point (b) of Article 1(1) of Directive (EU) 2015/1535 of the European Parliament and of the Council&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; for which the storage of data is a defining component of the service provided to the user, including social networks, online marketplaces facilitating transactions between their users, and other hosting service providers;&lt;/p&gt;
&lt;p&gt;(c) internet domain name and IP numbering services such as IP address providers, domain name registries, domain name registrars and related privacy and proxy services;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus broadly speaking the service providers covered by the Regulation would include providers of electronic communication services, social networks, online marketplaces, other hosting service providers and providers of internet infrastructure such as IP address and domain name registries, or on their legal representatives where they exist. An important qualification that has been added in the definition is that it covers only those services where “storage of data is a defining component of the service”. Therefore, services for which the storage of data is not a defining component are not covered by the proposal. The Regulation also recognizes that most services delivered by providers involve some kind of storage of data, especially where they are delivered online at a distance; and therefore it specifically provides that services for which the storage of data is not a &lt;i&gt;main characteristic&lt;/i&gt; and is thus only of an ancillary nature would not be covered, including legal, architectural, engineering and accounting services provided online at a distance.&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This does not mean that all such service providers offering the type of services in which data storage is the main characteristic, in the EU, would be covered by the Directive. The term “offering services in the Union” has been defined in Article 2(3) of the Directive as follows:&lt;/p&gt;
&lt;p&gt;“‘offering services in the Union’ means:&lt;/p&gt;
&lt;p&gt;(a) enabling legal or natural persons in one or more Member State(s) to use the services listed under (3) above; and&lt;/p&gt;
&lt;p&gt;(b) having a substantial connection to the Member State(s) referred to in point (a);”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (b) of the definition is the main qualifying factor which would ensure that only those entities whose offering of services has a “substantial connection” which the member countries of the EU would be covered by the Directive. The Regulation recognizes that mere accessibility of the service (which could also be achieved through mere accessibility of the service provider’s or an intermediary’s website in the EU) should not be a sufficient condition for the application of such an onerous condition and therefore the concept of a “substantial connection” was inserted to ascertain a sufficient relationship between the provider and the territory where it is offering its services. In the absence of a permanent establishment in an EU member country, such a “substantial connection” may be said to exist if there are a significant number of users in one or more EU member countries, or the “targeting of activities” towards one or more EU member countries. The “targeting of activities” may be determined based on various circumstances, such as the use of a language or a currency generally used in an EU member country, the availability of an app in the relevant national app store, providing local advertising or advertising in the language used in an EU member country, making use of any information originating from persons in EU member countries in the course of its activities, or from the handling of customer relations such as by providing customer service in the language generally used in EU member countries. A substantial connection can also be assumed where a service provider directs its activities towards one or more EU member countries as set out in Article 17(1)(c) of Regulation 1215/2012 on jurisdiction and the recognition and enforcement of judgments in civil and commercial matters.&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Part II - EU Directive and Service Providers located in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this part of the article we will discuss how companies based in India and running websites providing any “service” such as social networking, subscription based video streaming, etc. such as Hike or AltBalaji, Hotstar, etc. and how such companies would be affected by the E-evidence Proposal. At first glance a website providing a video streaming service may not appear to be covered by the E-evidence Proposal since one would assume that there may not be any storage of data. But if it is a service which allows users to open personal accounts (with personal and possibly financial details such as in the case of TVF, AltBalaji or Hotstar) and uses their online behaviour to push relevant material and advertisements to their accounts, whether that would make the storage of data a defining component of the website’s services as contemplated under the proposal is a question that may not be easy to answer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if it is assumed that the services of an Indian company can be classified as information society services for which the storage of data is a defining component, that by itself would not be sufficient to make the E-evidence Proposal applicable to it. The services of an Indian company would still need to have a “substantial connection” with an EU member country. As discussed above, this substantial connection may be said to exist based on the existence of (i) a significant number of users in one or more EU member countries, or (ii) the “targeting of activities” towards one or more EU member countries. The determination of whether a service provider is targeting its services towards an EU member country is to be made based on a number of factors listed above and is a subjective determination with certain guiding factors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There does not seem to be clarity however on what would constitute a significant number of users and whether this determination is to be based upon the total number of users in an EU member country as a proportion of the population of the country or is it to be considered as a proportion of the total number of customers the service provider has worldwide. To explain this further let us assume that an Indian company such as Hotstar has a total user base of 100 million customers.&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; If there is a situation where 10 million of these 100 million subscribers are located in countries other than India, out of which there are about 40 thousand customers in France and another 40 thousand in Malta; then it would lead to some interesting analysis. Now 40 thousand customers in a customer base of 100 million is 0.04% of the total customer base of the service provider which generally speaking would not constitute a “significant number”. However if we reckon the 40 thousand customers from the point of view of the total population of the country of Malta, which is approximately 4.75 Lakh,&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; it would mean approx. 8.4% of the total population of Malta. It is unlikely that any service affecting almost a tenth of the population of the entire country can be labeled as not having a significant number of users in Malta. If the same math is done on the population of a country such as France, which has a population of approx. 67.3 million,&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; then the figure would be 0.05% of the total population; would that constitute a significant number as per the E-evidence Proposal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issues discussed above are very important for any service provider, specially a small or medium sized company since the determination of whether the E-evidence Proposal applies to them or not, apart from any potential legal implications, imposes a direct economic cost for designating a legal representative in an EU member country. Keeping in mind this economic burden and how it might affect the budget of smaller companies, the Explanatory Memorandum to the Regulation clarifies that this legal representative could be a third party, which could be shared between several service providers, and further the legal representative may accumulate different functions (e.g. the General Data Protection Regulation or e-Privacy representatives in addition to the legal representative provided for by the E-evidence Directive).&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case all the above issues are determined to be in favour of the E-evidence Directive being applicable to an Indian company and the company designates a legal representative in an EU member country, then it remains to be seen how Indian laws relating to data protection would interact with the obligations of the Indian company under the E-evidence Directive. As per Rule 6 of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (“&lt;b&gt;SPDI Rules&lt;/b&gt;”) service providers are not allowed to disclose sensitive personal data or information except with the prior permission of the except disclosure to mandated government agencies. The Rule provides that “the information shall be shared, without obtaining prior consent from provider of information, with &lt;i&gt;Government agencies mandated under the law&lt;/i&gt; to obtain information including sensitive personal data or information for the purpose of verification of identity, or for prevention, detection, investigation including cyber incidents, prosecution, and punishment of offences….”. Although the term “government agency mandated under law” has not been defined in the SPDI Rules, the term “law” has been defined in the Information Technology Act, 2000 (“&lt;b&gt;IT Act&lt;/b&gt;”) as under:&lt;/p&gt;
&lt;p&gt;“’law’ includes any Act of Parliament or of a State Legislature, Ordinances promulgated by the President or a Governor, as the case may be. Regulations made by the President under article 240, Bills enacted as President's Act under sub-clause (a) of clause (1) of article 357 of the Constitution and includes rules, regulations, byelaws and orders issued or made thereunder;”&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the SPDI Rules are issued under the IT Act, therefore the term “law” referred as used in the would have to be read as defined in the IT Act (unless court holds to the contrary). This would mean that Rule 6 of the SPDI Rules only recognises government agencies mandated under Indian law and therefore information cannot be disclosed to agencies not recognised by Indian law. In such a scenario an Indian company may not have any option except to raise an objection and challenge an EPO issued to it on the grounds provided in Article 16 of the Regulation, which process itself could mean a significant expenditure on the part of such a company.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The framework sought to be established by the European Union through the E-evidence Proposal seeks to establish a regime different from those favoured by countries such as the United States which favours Mutual Agreements with (presumably) key nations or the push for data localisation being favoured by countries such as India, to streamline the process of access to digital data. Since the regime put forth by the EU is still only at the proposal stage, there may yet be changes which could clarify the regime significantly. However, as things stand Indian companies may be affected by the E-evidence Proposal in the following ways:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Companies offering services outside India may inadvertently trigger obligations under the E-evidence Proposal if their services have a substantial connection with any of the member states of the European Union;&lt;/li&gt;
&lt;li&gt;Indian companies offering services overseas will have to make an internal determination as to whether the E-evidence Proposal applies to them or not;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In case of Indian companies which come under the E-evidence Proposal, they would be obligated to designate a legal representative in an EU member state for receiving and executing Data Orders as per the E-evidence Proposal.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If a legal representative is designated by the Indian company they may have to incur significant costs on maintaining a legal representative especially in a situation where they have to object to the implementation of an EPO. The company would also have to coordinate with the legal representative to adequately put forth their (Indian law related) concerns before the competent authority so that they are not forced to fall foul of their legal obligations in either jurisdiction. It is also unclear the extent to which appointed legal representatives from Indian companies could challenge or push back against requests received.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Disclaimer&lt;/span&gt;: The author of this Article is an Indian trained lawyer and not an expert on European law. The author would like to apologise for any incorrect analysis of European law that may have crept into this article despite best efforts.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Explanatory Memorandum to the Proposal for Regulation of the European Parliament and of the Council on European Production and Preservation Orders for Electronic Evidence in Criminal Matters, Pg. 4, available at &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0225&amp;amp;from=EN"&gt;https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0225&amp;amp;from=EN&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Subscriber data means data which is used to identify the user and has been defined in Article 2 (7) as follows:&lt;/p&gt;
&lt;p&gt;“‘subscriber data’ means any data pertaining to:&lt;/p&gt;
&lt;p&gt;(a) the identity of a subscriber or customer such as the provided name, date of birth, postal or geographic address, billing and payment data, telephone, or email;&lt;/p&gt;
&lt;p&gt;(b) the type of service and its duration including technical data and data identifying related technical measures or interfaces used by or provided to the subscriber or customer, and data related to the validation of the use of service, excluding passwords or other authentication means used in lieu of a password that are provided by a user, or created at the request of a user;”&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The term access data has been defined in Article 2(8) as follows:&lt;/p&gt;
&lt;p&gt;“‘access data’ means data related to the commencement and termination of a user access session to a service, which is strictly necessary for the sole purpose of identifying the user of the service, such as the date and time of use, or the log-in to and log-off from the service, together with the IP address allocated by the internet access service provider to the user of a service, data identifying the interface used and the user ID. This includes electronic communications metadata as defined in point (g) of Article 4(3) of Regulation concerning the respect for private life and the protection of personal data in electronic communications;”&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The term content data has been defined in Article 2 (10) as follows:&lt;/p&gt;
&lt;p&gt;“‘content data’ means any stored data in a digital format such as text, voice, videos, images, and sound other than subscriber, access or transactional data;”&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The term transactional data has been defined in Article 2(9) as follows:&lt;/p&gt;
&lt;p&gt;“‘transactional data’ means data related to the provision of a service offered by a service provider that serves to provide context or additional information about such service and is generated or processed by an information system of the service provider, such as the source and destination of a message or another type of interaction, data on the location of the device, date, time, duration, size, route, format, the protocol used and the type of compression, unless such data constitues access data. This includes electronic communications metadata as defined in point (g) of Article 4(3) of [Regulation concerning the respect for private life and the protection of personal data in electronic communications];”&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Explanatory Memorandum to the Proposal for Regulation of the European Parliament and of the Council on European Production and Preservation Orders for Electronic Evidence in Criminal Matters, Pg. 17, available at &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0225&amp;amp;from=EN"&gt;https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0225&amp;amp;from=EN&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Articles 9(4) and 10(5) of the Regulation.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 10(5) of the Regulation.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 15 of the Regulation.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 16 of the Regulation. Also see &lt;a href="https://www.insideprivacy.com/uncategorized/eu-releases-e-evidence-proposal-for-cross-border-data-access/"&gt;https://www.insideprivacy.com/uncategorized/eu-releases-e-evidence-proposal-for-cross-border-data-access/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 2(4) of the Directive establishing European Electronic Communications Code provides as under:&lt;/p&gt;
&lt;p&gt;‘electronic communications service’ means a service normally provided for remuneration  via electronic communications networks,  which encompasses 'internet access service' as defined in Article 2(2) of Regulation (EU) 2015/2120; and/or 'interpersonal communications service'; and/or services consisting wholly or mainly in the conveyance of signals such as transmission services  used for the provision of machine-to-machine services and for broadcasting, but excludes services providing, or exercising editorial control over, content transmitted using electronic communications networks and services;”&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Information Society Services have been defined in the Directive specified as “any Information Society service, that is to say, any service normally provided for remuneration, at a distance, by electronic means and at the individual request of a recipient of services.”&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Proposal for a Directive of the European Parliament and of the Council Laying Down Harmonised Rules on the Appointment of Legal Representatives for the Purpose of Gathering Evidence in Criminal Proceedings, Pg 8, available at &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0226&amp;amp;from=EN"&gt;https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0226&amp;amp;from=EN&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Proposal for a Directive of the European Parliament and of the Council Laying Down Harmonised Rules on the Appointment of Legal Representatives for the Purpose of Gathering Evidence in Criminal Proceedings, Pg 9, available at &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0226&amp;amp;from=EN"&gt;https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0226&amp;amp;from=EN&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Hotstar already has an active customer base of 75 million, as of December, 2017; &lt;a href="https://telecom.economictimes.indiatimes.com/news/netflix-restricted-to-premium-subscribers-hotstar-leads-indian-ott-content-market/62351500"&gt;https://telecom.economictimes.indiatimes.com/news/netflix-restricted-to-premium-subscribers-hotstar-leads-indian-ott-content-market/62351500&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://en.wikipedia.org/wiki/Malta"&gt;https://en.wikipedia.org/wiki/Malta&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://en.wikipedia.org/wiki/France"&gt;https://en.wikipedia.org/wiki/France&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Proposal for a Directive of the European Parliament and of the Council Laying Down Harmonised Rules on the Appointment of Legal Representatives for the Purpose of Gathering Evidence in Criminal Proceedings, Pg 5, available at &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0226&amp;amp;from=EN"&gt;https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0226&amp;amp;from=EN&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 2(y) of the Information Technology Act, 2000.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law'&gt;http://editors.cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-23T16:45:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act">
    <title>Budapest Convention and the Information Technology Act</title>
    <link>http://editors.cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act</link>
    <description>
        &lt;b&gt;The Convention on Cybercrime adopted in Budapest (“Convention”) is the fist and one of the most important multilateral treaties addressing the issue of internet and computer crimes.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;br /&gt;It was drafted by the Council of Europe along with Canada, Japan, South Africa and the United States of America.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; The importance of the Convention is also indicated by the fact that adherence to it (whether by outright adoption or by otherwise making domestic laws in compliance with it) is one of the conditions mentioned in the Clarifying Lawful Overseas Use of Data Act passed in the USA (CLOUD Act) whereby a process has been established to enable security agencies of in India and the United States to directly access data stored in each other’s territories. Our analysis of the CLOUD Act vis-à-vis India can be found &lt;a href="https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india"&gt;here&lt;/a&gt;. It is in continuation of that analysis that we have undertaken here a detailed comparison of the Information Technology Act, 2000 (“&lt;b&gt;IT Act&lt;/b&gt;”) and how it stacks up against the provisions of Chapter I and Chapter II of the Convention.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before we get into a comparison of the Convention with the IT Act, we must point out the distinction between the two legal instruments, for the benefit of readers from a non legal background. An international instrument such as the Convention on Cybercrime (generally speaking) is essentially a promise made by the States which are a party to that instrument, that they will change or modify their local laws to get them in line with the requirements or principles laid out in said instrument. In case the signatory State does not make such amendments to its local laws, (usually) the citizens of that State cannot enforce any rights that they may have been granted under such an international instrument. The situation is the same with the Convention on Cybercrime, unless the signatory State amends its local laws to bring them in line with the provisions of the Convention, there cannot be any enforcement of the provisions of the Convention within that State.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; This however is not the case for India and the IT Act since India is not a signatory to the Convention on Cybercrime and therefore is not obligated to amend its local laws to bring them in line with the Convention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although India and the Council of Europe cooperated to amend the IT Act through major amendments brought about vide the Information Technology (Amendment) Act, 2008, India still has not become a signatory to the Convention on Cybercrime. The reasons for this appear to be unclear and it has been suggested that these reasons may range from the fact that India was not involved in the original drafting, to issues of sovereignty regarding the provisions for international cooperation and extradition.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 2 – Illegal access&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the access to the whole or any part of a computer system without right. A Party may require that the offence be committed by infringing security measures, with the intent of obtaining computer data or other dishonest intent, or in relation to a computer system that is connected to another computer system.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Section 43&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) accesses or secures access to such computer, computer system or computer network or computer resource&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 66&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two &lt;b&gt;three &lt;/b&gt;years or with fine which may extend to five lakh rupees or with both.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention gives States the right to further qualify the offence of “illegal access” or “hacking” by adding elements such as infringing security measures, special intent to obtain computer data, other dishonest intent that justifies criminal culpability, or the requirement that the offence is committed in relation to a computer system that is connected remotely to another computer system.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, Indian law deals with the distinction by making the act of unathorised access without dishonest or fraudulent intent a civil offence, where the offender is liable to pay compensation. If the same act is done with dishonest and fraudulent intent, it is treated as a criminal offence punishable with fine and imprisonment which may extend to 3 years.&lt;/p&gt;
&lt;p&gt;It must be noted that this provision was included in the Act only through the Amendment of 2008 and was not present in the Information Technology Act, 2000 in its original iteration.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 3 – Illegal Interception&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the interception without right, made by technical means, of non-public transmissions of computer data to, from or within a computer system, including electromagnetic emissions from a computer system carrying such computer data. A Party may require that the offence be committed with dishonest intent, or in relation to a computer system that is connected to another computer system.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Although the Information Technology Act, 2000 does not specifically criminalise the interception of communications by a private person. It is possible that under the provisions of Rule 43(a) the act of accessing a “computer network” could be interpreted as including unauthorised interception within its ambit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other way in which illegal interception may be considered to be illegal is through a combined reading of Sections 69 (Interception) and 45 (Residuary Penalty) with Rule 3 of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 which prohibits interception, monitoring and decryption of information under section 69(2) of the IT Act except in a manner as provided by the Rules. However, it must be noted that section 69(2) only talks about interception by the government and Rule 3 only provides for procedural safeguards for such an interception. It could therefore be argued that the prohibition under Rule 3 is only applicable to the government and not to private individuals since section 62, the provision under which Rule 3 has been issued, itself is not applicable to private individuals.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 4 – Data interference&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the damaging, deletion, deterioration, alteration or suppression of computer data without right.&lt;/p&gt;
&lt;p&gt;2 A Party may reserve the right to require that the conduct described in paragraph 1 result in serious harm.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 43&lt;/p&gt;
&lt;p&gt;If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -&lt;/p&gt;
&lt;p&gt;(d) damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network;&lt;/p&gt;
&lt;p&gt;(i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means;&lt;/p&gt;
&lt;p&gt;(j) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage,&lt;/p&gt;
&lt;p&gt;he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected. (change vide ITAA 2008)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 66&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two &lt;b&gt;three &lt;/b&gt;years or with fine which may extend to five lakh rupees or with both.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Damage, deletion, diminishing in value and alteration of data is considered a crime as per Section 66 read with section 43 of the IT Act if done with fraudulent or dishonest intention. &lt;b&gt;While the Convention only requires such acts to be crimes if committed intentionally, however the Information Technology Act requires that such intention be either dishonest or fraudulent only then such an act will be a criminal offence, otherwise it will only incur civil consequences requiring the perpetrator to pay damages by way of compensation.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be noted that the optional requirement of such an act causing serious harm has not been adopted by Indian law, i.e. the act of such damage, deletion, etc. by itself is enough to constitute the offence, and there is no requirement of such an act causing serious harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the Explanatory Report to the Convention on Cybercrime, “&lt;b&gt;Suppressing&lt;/b&gt; of computer data means any action that prevents or terminates the availability of the data to the person who has access to the computer or the data carrier on which it was stored.” Strictly speaking the act of suppression of data in another system is not covered by the language of section 43, but looking at the tenor of the section it is likely that if a court is faced with a situation of intentional/malicious denial of access to data, the court could expand the scope of the term “damage” as contained in sub-section (d) to include such malicious acts.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 5 – System interference&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, &lt;b&gt;when committed intentionally, the serious hindering without right of the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data&lt;/b&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Section 43&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) disrupts or causes disruption of any computer, computer system or computer network;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Explanation &lt;/b&gt;- for the purposes of this section -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) "Computer Contaminant" means any set of computer instructions that are designed -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) by any means to usurp the normal operation of the computer, computer system, or computer network;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) "Computer Virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 66&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two &lt;b&gt;three &lt;/b&gt;years or with fine which may extend to five lakh rupees or with both.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The offence of causing hindrance to the functioning of a computer system with fraudulent or dishonest intention is an offence under the IT Act.  &lt;b&gt;While the Convention only requires such acts to be crimes if committed intentionally, however the IT Act requires that such intention be either dishonest or fraudulent only then such an act will be a criminal offence, otherwise it will only incur civil consequences requiring the perpetrator to pay damages by way of compensation.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT Act does not require such disruption to be caused in any particular manner as is required under the Convention, although the acts of introducing computer viruses as well as damaging or deleting data themselves have been classified as offences under the IT Act.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 6 – Misuse of devices&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a the production, sale, procurement for use, import, distribution or otherwise making available of:&lt;/p&gt;
&lt;p&gt;i a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offences established in accordance with Articles 2 through 5;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii a computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed, with intent that it be used for the purpose of committing any of the offences established in Articles 2 through 5; and&lt;/p&gt;
&lt;p&gt;b the possession of an item referred to in paragraphs a.i or ii above, with intent that it be used for the purpose of committing any of the offences established in Articles 2 through 5. A Party may require by law that a number of such items be possessed before criminal liability attaches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 This article shall not be interpreted as imposing criminal liability where the production, sale, procurement for use, import, distribution or otherwise making available or possession referred to in paragraph 1 of this article is not for the purpose of committing an offence established in accordance with Articles 2 through 5 of this Convention, such as for the authorised testing or protection of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 Each Party may reserve the right not to apply paragraph 1 of this article, provided that the reservation does not concern the sale, distribution or otherwise making available of the items referred to in paragraph 1 a.ii of this article.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision establishes as a separate and independent criminal offence the intentional commission of specific illegal acts regarding certain devices or access data to be misused for the purpose of committing offences against the confidentiality, the integrity and availability of computer systems or data. While the IT Act does not by itself makes the production, sale, procurement for use, import, distribution of devices designed to be adopted for such purposes, sub-section (g) of section 43 along with section 120A of the Indian Penal Code, 1860 which deals with “conspiracy” could perhaps be used to bring such acts within the scope of the penal statutes.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 7 – Computer related forgery&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right, the input, alteration, deletion, or suppression of computer data, resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible. A Party may require an intent to defraud, or similar dishonest intent, before criminal liability attaches.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The acts of deletion, alteration and suppression of data by itself is a crime as discussed above, there is no specific offence for doing such acts for the purpose of forgery. However this does not mean that the crime of online forgery is not punishable in India at all, such crimes would be dealt with under the relevant provisions of the Indian Penal Code, 1860 (Chapter 18) read with section 4 of the IT Act.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 8 – Computer-related fraud&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right, the causing of a loss of property to another person by:&lt;/p&gt;
&lt;p&gt;a any input, alteration, deletion or suppression of computer data,&lt;/p&gt;
&lt;p&gt;b any interference with the functioning of a computer system,&lt;/p&gt;
&lt;p&gt;with fraudulent or dishonest intent of procuring, without right, an economic benefit for oneself or for another person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Just as in the case of forgery, there is no specific provision in the IT Act whereby online fraud would be considered as a crime, however specific acts such as charging services availed of by one person to another (section 43(h), identity theft (section 66C), cheating by impersonation (section 66D) have been listed as criminal offences. Further, as with forgery, fraudulent acts to procure economic benefits would also get covered by the provisions of the Indian Penal Code that deal with cheating.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 9 – Offences related to child pornography&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right, the following conduct:&lt;/p&gt;
&lt;p&gt;a producing child pornography &lt;b&gt;for the purpose of its distribution &lt;/b&gt;through a computer system;&lt;/p&gt;
&lt;p&gt;b offering or making available child pornography through a computer system;&lt;/p&gt;
&lt;p&gt;c distributing or transmitting child pornography through a computer system;&lt;/p&gt;
&lt;p&gt;d procuring child pornography through a computer system for oneself or for another person;&lt;/p&gt;
&lt;p&gt;e possessing child pornography in a computer system or on a computer-data storage medium.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 For the purpose of paragraph 1 above, the term "child pornography" shall include pornographic material that visually depicts:&lt;/p&gt;
&lt;p&gt;a a minor engaged in sexually explicit conduct;&lt;/p&gt;
&lt;p&gt;b a person appearing to be a minor engaged in sexually explicit conduct;&lt;/p&gt;
&lt;p&gt;c realistic images representing a minor engaged in sexually explicit conduct.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 For the purpose of paragraph 2 above, the term "minor" shall include all persons under 18 years of age. A Party may, however, require a lower age-limit, which shall be not less than 16 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4 Each Party may reserve the right not to apply, in whole or in part, paragraphs 1, subparagraphs d and e, and 2, sub-paragraphs b and c.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;67 B Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Whoever,-&lt;/p&gt;
&lt;p&gt;(a) publishes or transmits or causes to be published or transmitted material in any electronic form which depicts children engaged in sexually explicit act or conduct or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) creates text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting children in obscene or indecent or sexually explicit manner or&lt;/p&gt;
&lt;p&gt;(c) cultivates, entices or induces children to online relationship with one or more children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource or&lt;/p&gt;
&lt;p&gt;(d) facilitates abusing children online or&lt;/p&gt;
&lt;p&gt;(e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with a fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper writing, drawing, painting, representation or figure is in the interest of science, literature, art or learning or other objects of general concern; or&lt;/p&gt;
&lt;p&gt;(ii) which is kept or used for bonafide heritage or religious purposes&lt;/p&gt;
&lt;p&gt;Explanation: For the purposes of this section, "children" means a person who has not completed the age of 18 years.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The publishing, transmission, creation, collection, seeking, browsing, etc. of child pornography is an offence under Indian law punishable with imprisonment for upto 5 years for a first offence and upto 7 years for a subsequent offence, along with fine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is important to note that bona fide depictions for the public good, such as for publication in pamphlets, reading or educational material are specifically excluded from the rigours of the section, Similarly material kept for heritage or religious purposes is also exempted under this section. Such exceptions are in line with the intent of the Convention, since the Explanatory statement itself states that “The term "pornographic material" in paragraph 2 is governed by national standards pertaining to the classification of materials as obscene, inconsistent with public morals or similarly corrupt. Therefore, material having an artistic, medical, scientific or similar merit may be considered not to be pornographic.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 10 – Offences related to infringements of copyright and related rights&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law the infringement of copyright, as defined under the law of that Party, pursuant to the obligations it has undertaken under the Paris Act of 24 July 1971 revising the Bern Convention for the Protection of Literary and Artistic Works, the Agreement on Trade-Related Aspects of Intellectual Property Rights and the WIPO Copyright Treaty, with the exception of any moral rights conferred by such conventions, where such acts are committed wilfully, on a commercial scale and by means of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law the infringement of related rights, as define under the law of that Party, pursuant to the obligations it has undertaken under the International Convention for the Protection of Performers, Producers of Phonograms and Broadcasting Organisations (Rome Convention), the Agreement on Trade-Related Aspects of Intellectual Property Rights and the WIPO Performances and Phonograms Treaty, with the exception of any moral rights conferred by such conventions, where such acts are committed wilfully, on a commercial scale and by means of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 A Party may reserve the right not to impose criminal liability under paragraphs 1 and 2 of this article in limited circumstances, provided that other effective remedies are available and that such reservation does not derogate from the Party’s international obligations set forth in the international instruments referred to in paragraphs 1 and 2 of this article.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;81 Act to have Overriding effect &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that nothing contained in this Act shall restrict any person from exercising any right conferred under the Copyright Act, 1957 or the Patents Act, 1970&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The use of the term "pursuant to the obligations it has undertaken" in both paragraphs makes it clear that a Contracting Party to the Convention is not bound to apply agreements cited (TRIPS, WIPO, etc.) to which it is not a Party; moreover, if a Party has made a reservation or declaration permitted under one of the agreements, that reservation may limit the extent of its obligation under the present Convention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT Act does not try to intervene in the existing copyright regime of India and creates a special exemption for the Copyright Act and the Patents Act in the clause which provides this Act overriding effect. India’s obligations under the various treaties and conventions on intellectual property rights are enshrined in these legislations.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 11 – Attempt and aiding or abetting&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, aiding or abetting the commission of any of the offences established in accordance with Articles 2 through 10 of the present Convention with intent that such offence be committed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, an attempt to commit any of the offences established in accordance with Articles 3 through 5, 7, 8, and 9.1.a and c of this Convention.&lt;/p&gt;
&lt;p&gt;3 Each Party may reserve the right not to apply, in whole or in part, paragraph 2 of this article.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;84 B Punishment for abetment of offences &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whoever abets any offence shall, if the act abetted is committed in consequence of the abetment, and no express provision is made by this Act for the punishment of such abetment, be punished with the punishment provided for the offence under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Explanation: An Act or offence is said to be committed in consequence of abetment, when it is committed in consequence of the instigation, or in pursuance of the conspiracy, or with the aid which constitutes the abetment.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;84 C Punishment for attempt to commit offences &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whoever attempts to commit an offence punishable by this Act or causes such an offence to be committed, and in such an attempt does any act towards the commission of the offence, shall, where no express provision is made for the punishment of such attempt, be punished with imprisonment of any description provided for the offence, for a term which may extend to one-half of the longest term of imprisonment provided for that offence, or with such fine as is provided for the offence or with both.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;As can be seen, both attempts as well as abetment of criminal offences under the IT Act have also been criminalised.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 12 – Corporate liability&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to ensure that legal persons can be held liable for a criminal offence established in accordance with this Convention, committed for their benefit by any natural person, acting either individually or as part of an organ of the legal person, who has a leading position within it, based on:&lt;/p&gt;
&lt;p&gt;a a power of representation of the legal person;&lt;/p&gt;
&lt;p&gt;b an authority to take decisions on behalf of the legal person;&lt;/p&gt;
&lt;p&gt;c an authority to exercise control within the legal person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 In addition to the cases already provided for in paragraph 1 of this article, each Party shall take the measures necessary to ensure that a legal person can be held liable where the lack of supervision or control by a natural person referred to in paragraph 1 has made possible the commission of a criminal offence established in accordance with this Convention for the benefit of that legal person by a natural person acting under its authority.&lt;/p&gt;
&lt;p&gt;3 Subject to the legal principles of the Party, the liability of a legal person may be criminal, civil or administrative.&lt;/p&gt;
&lt;p&gt;4 Such liability shall be without prejudice to the criminal liability of the natural persons who have committed the offence.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;85 Offences by Companies. &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Where a person committing a contravention of any of the provisions of this Act or of any rule, direction or order made there under is a Company, every person who, at the time the contravention was committed, was in charge of, and was responsible to, the company for the conduct of business of the company as well as the company, shall be guilty of the contravention and shall be liable to be proceeded against and punished accordingly:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Provided &lt;/b&gt;that nothing contained in this sub-section shall render any such person liable to punishment if he proves that the contravention took place without his knowledge or that he exercised all due diligence to prevent such contravention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Notwithstanding anything contained in sub-section (1), where a contravention of any of the provisions of this Act or of any rule, direction or order made there under has been committed by a company and it is proved that the contravention has taken place with the consent or connivance of, or is attributable to any neglect on the part of, any director, manager, secretary or other officer of the company, such director, manager, secretary or other officer shall also be deemed to be guilty of the contravention and shall be liable to be proceeded against and punished accordingly.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Explanation&lt;/b&gt;-&lt;/p&gt;
&lt;p&gt;For the purposes of this section&lt;/p&gt;
&lt;p&gt;(i) "Company" means any Body Corporate and includes a Firm or other Association of individuals; and&lt;/p&gt;
&lt;p&gt;(ii) "Director", in relation to a firm, means a partner in the firm.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The liability of a company or other body corporate has been laid out in the IT Act in a manner similar to the Budapest Convention. While, the test to determine the relationship between the legal entity and the natural person who has committed the act on behalf of the legal entity is a little more detailed&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; in the Convention, the substance of the test is laid out in the IT Act as “a person who is in charge of, and was responsible to, the company”.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 14&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish the powers and procedures provided for in this section for the purpose of specific criminal investigations or proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Except as specifically provided otherwise in Article 21, each Party shall apply the powers and procedures referred to in paragraph 1 of this article to:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a the criminal offences established in accordance with Articles 2 through 11 of this Convention;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b other criminal offences committed by means of a computer system; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c the collection of evidence in electronic form of a criminal offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 a Each Party may reserve the right to apply the measures referred to in Article 20 only to offences or categories of offences specified in the reservation, provided that the range of such offences or categories of offences is not more restricted than the range of offences to which it applies the measures referred to in Article 21. Each Party shall consider restricting such a reservation to enable the broadest application of the measure referred to in Article 20.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b Where a Party, due to limitations in its legislation in force at the time of the adoption of the present Convention, is not able to apply the measures referred to in Articles 20 and 21 to communications being transmitted within a computer system of a service provider, which system:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i is being operated for the benefit of a closed group of users, and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii does not employ public communications networks and is not connected with another computer system, whether public or private, that Party may reserve the right not to apply these measures to such communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall consider restricting such a reservation to enable the broadest application of the measures referred to in Articles 20 and 21.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This is a provision of a general nature that need not have any equivalence in domestic law. The provision clarifies that all the powers and procedures provided for in this section (Articles 14 to 21) are for the purpose of “specific criminal investigations or proceedings”.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 15 – Conditions and safeguards&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall ensure that the establishment, implementation and application of the powers and procedures provided for in this Section are subject to conditions and safeguards provided for under its domestic law, which shall provide for the adequate protection of human rights and liberties, including rights arising pursuant to obligations it has undertaken under the 1950 Council of Europe Convention for the Protection of Human Rights and Fundamental Freedoms, the 1966 United Nations International Covenant on Civil and Political Rights, and other applicable international human rights instruments, and which shall incorporate the principle of proportionality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Such conditions and safeguards shall, as appropriate in view of the nature of the procedure or power concerned, &lt;i&gt;inter alia&lt;/i&gt;, include judicial or other independent supervision, grounds justifying application, and limitation of the scope and the duration of such power or procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 To the extent that it is consistent with the public interest, in particular the sound administration of justice, each Party shall consider the impact of the powers and procedures in this section upon the rights, responsibilities and legitimate interests of third parties.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This again is a provision of a general nature which need not have a corresponding clause in the domestic law. India is a signatory to a number of international human rights conventions and treaties, it has acceded to the International Covenant on Civil and Political Rights (ICCPR), 1966, International Covenant on Economic, Social and Cultural Rights (ICESCR), 1966, ratified the International Convention on the Elimination of All Forms of Racial Discrimination (ICERD), 1965, with certain reservations, signed the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW), 1979 with certain reservations, Convention on the Rights of the Child (CRC), 1989 and signed the Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (CAT), 1984. Further the right to life guaranteed under Article 21 of the Constitution takes within its fold a number of human rights such as the right to privacy. Freedom of expression, right to fair trial, freedom of assembly, right against arbitrary arrest and detention are all fundamental rights guaranteed under the Constitution of India, 1950.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, India has enacted the Protection of Human Rights Act, 1993 for the constitution of a National Human Rights Commission, State Human Rights Commission in States and Human Rights Courts for better protection of “human rights” and for matters connected therewith or incidental thereto. Thus, there does exist a statutory mechanism for the enforcement of human rights&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; under Indian law. It must be noted that the definition of human rights also incorporates rights embodied in International Covenants and are enforceable by Courts in India.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 16 – Expedited preservation of stored computer data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to enable its competent authorities to order or similarly obtain the expeditious preservation of specified computer data, including traffic data, that has been stored by means of a computer system, in particular where there are grounds to believe that the computer data is particularly vulnerable to loss or modification.&lt;/p&gt;
&lt;p&gt;2 Where a Party gives effect to paragraph 1 above by means of an order to a person to preserve specified stored computer data in the person’s possession or control, the Party shall adopt such legislative and other measures as may be necessary to oblige that person to preserve and maintain the integrity of that computer data for a period of time as long as necessary, up to a maximum of ninety days, to enable the competent authorities to seek its disclosure. A Party may provide for such an order to be subsequently renewed.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such legislative and other measures as may be necessary to oblige the custodian or other person who is to preserve the computer data to keep confidential the undertaking of such procedures for the period of time provided for by its domestic law.&lt;/p&gt;
&lt;p&gt;4 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Article 17 – Expedited preservation and partial disclosure of traffic data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt, in respect of traffic data that is to be preserved under Article 16, such legislative and other measures as may be necessary to:&lt;/p&gt;
&lt;p&gt;a ensure that such expeditious preservation of traffic data is available regardless of whether one or more service providers were involved in the transmission of that communication; and&lt;/p&gt;
&lt;p&gt;b ensure the expeditious disclosure to the Party’s competent authority, or a person designated by that authority, of a sufficient amount of traffic data to enable the Party to identify the service providers and the path through which the communication was transmitted.&lt;/p&gt;
&lt;p&gt;2 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;29 Access to computers and data. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(1) Without prejudice to the provisions of sub-section (1) of section 69, the Controller or any person authorized by him shall, if he has reasonable cause to suspect that any contravention of the provisions of this chapter made there under has been committed, have access to any computer system, any apparatus, data or any other material connected with such system, for the purpose of searching or causing a search to be made for obtaining any information or data contained in or available to such computer system. (Amended vide ITAA 2008)&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;(2) For the purposes of sub-section (1), the Controller or any person authorized by him may, by order, direct any person in charge of, or otherwise concerned with the operation of the computer system, data apparatus or material, to provide him with such reasonable technical and other assistant as he may consider necessary.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;67 C&lt;/b&gt; &lt;b&gt;Preservation and Retention of information by intermediaries &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;Rule 3(7) of the Information Technology (Intermediary Guidelines) Rules, 2011&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3(7) - When required by lawful order, the intermediary shall provide information &lt;b&gt;or any such assistance&lt;/b&gt; to Government Agencies who are lawfully authorised for investigative, protective, cyber security activity. The information or any such assistance shall be provided for the purpose of verification of identity, or for prevention, detection, investigation, prosecution, cyber security incidents and punishment of offences under any law for the time being in force, on a request in writing staling clearly the purpose of seeking such information or any such assistance.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;It must be noted that Article 16 and Article 17 refer only to data preservation and not data retention. “Data preservation” means to keep data, which already exists in a stored form, protected from anything that would cause its current quality or condition to change or deteriorate. Data retention means to keep data, which is currently being generated, in one’s possession into the future.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In short, the article provides only for preservation of existing stored data, pending subsequent disclosure of the data, in relation to specific criminal investigations or proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention uses the term "order or similarly obtain", which is intended to allow the use of other legal methods of achieving preservation than merely by means of a judicial or administrative order or directive (e.g. from police or prosecutor). In some States, preservation orders do not exist in the procedural law, and data can only be preserved and obtained through search and seizure or production order. Flexibility was therefore intended by the use of the phrase "or otherwise obtain" to permit the implementation of this article by the use of these means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Indian law does not have a specific provision for issuing an order for preservation of data, the provisions of section 29 as well as sections 99 to 101 of the Code of Criminal Procedure, 1973 may be utilized to achieve the result intended by Articles 16 and 17. Although section 67C of the IT Act uses the term “preserve and retain such information”, this provision is intended primarily for the purpose of data retention and not data preservation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another provision which may conceivably be used for issuing preservation orders is Rule 3(7) of the Information Technology (Intermediary Guidelines) Rules, 2011 which requires intermediaries to provide “any such assistance” to Government Agencies who are lawfully authorised for investigative, protective, cyber security activity. However, in the absence of a power of preservation in the main statute (IT Act) it remains to be seen whether such an order would be enforced if challenged in a court of law.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 18 – Production order&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to order:&lt;/p&gt;
&lt;p&gt;a. a person in its territory to submit specified computer data in that person’s possession or control, which is stored in a computer system or a computer-data storage medium; and&lt;/p&gt;
&lt;p&gt;b. a service provider offering its services in the territory of the Party to submit subscriber information relating to such services in that service provider’s possession or control.&lt;/p&gt;
&lt;p&gt;2 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;p&gt;3 For the purpose of this article, the term “subscriber information” means any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which can be established:&lt;/p&gt;
&lt;p&gt;a the type of communication service used, the technical provisions taken thereto and the period of service;&lt;/p&gt;
&lt;p&gt;b the subscriber’s identity, postal or geographic address, telephone and other access number, billing and payment information, available on the basis of the service agreement or arrangement;&lt;/p&gt;
&lt;p&gt;c any other information on the site of the installation of communication equipment, available on the basis of the service agreement or arrangement.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Section 28(2)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(2) The Controller or any officer authorized by him in this behalf shall exercise the like powers which are conferred on Income-tax authorities under Chapter XIII of the Income-Tax Act, 1961 and shall exercise such powers, subject to such limitations laid down under that Act.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 58(2)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(2) The Cyber Appellate Tribunal shall have, for the purposes of discharging their functions under this Act, the same powers as are vested in a civil court under the Code of Civil Procedure, 1908, while trying a suit, in respect of the following matters, namely -&lt;/p&gt;
&lt;p&gt;(b) requiring the discovery and production of documents or other electronic records;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;While the Cyber Appellate Tribunal and the Controller of Certifying Authorities both have the power to call for information under the IT Act, these powers can be exercised only for limited purposes since the jurisdiction of both authorities is limited to the procedural provisions of the IT Act and they do not have the jurisdiction to investigate penal provisions. In practice, the penal provisions of the IT Act are investigated by the regular law enforcement apparatus of India, which use statutory provisions for production orders applicable in the offline world to computer systems as well. It is a very common practice amongst law enforcement authorities to issue orders under the Code of Criminal Procedure, 1973 (section 91) or the relevant provisions of the Income Tax Act, 1961 to compel production of information contained in a computer system. The power to order production of a “document or other thing” under section 91 of the Criminal Procedure Code is wide enough to cover all types of information which may be residing in a computer system and can even include the entire computer system itself.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 19 – Search and seizure of stored computer data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to search or similarly access:&lt;/p&gt;
&lt;p&gt;a a computer system or part of it and computer data stored therein; and&lt;/p&gt;
&lt;p&gt;b a computer-data storage medium in which computer data may be stored in its territory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Each Party shall adopt such legislative and other measures as may be necessary to ensure that where its authorities search or similarly access a specific computer system or part of it, pursuant to paragraph 1.a, and have grounds to believe that the data sought is stored in another computer system or part of it in its territory, and such data is lawfully accessible from or available to the initial system, the authorities shall be able to expeditiously extend the search or similar accessing to the other system.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to seize or similarly secure computer data accessed according to paragraphs 1 or 2. These measures shall include the power to:&lt;/p&gt;
&lt;p&gt;a seize or similarly secure a computer system or part of it or a computer-data storage&lt;/p&gt;
&lt;p&gt;medium;&lt;/p&gt;
&lt;p&gt;b make and retain a copy of those computer data;&lt;/p&gt;
&lt;p&gt;c maintain the integrity of the relevant stored computer data;&lt;/p&gt;
&lt;p&gt;d render inaccessible or remove those computer data in the accessed computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to order any person who has knowledge about the functioning of the computer system or measures applied to protect the computer data therein to provide, as is reasonable, the necessary information, to enable the undertaking of the measures referred to in paragraphs 1 and 2.&lt;/p&gt;
&lt;p&gt;5 The powers and procedures referred to in this article shall be subject to Articles 14 and15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;76 Confiscation &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any computer, computer system, floppies, compact disks, tape drives or any other accessories related thereto, in respect of which any provision of this Act, rules, orders or regulations made thereunder has been or is being contravened, shall be liable to confiscation:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Provided &lt;/b&gt;that where it is established to the satisfaction of the court adjudicating the confiscation that the person in whose possession, power or control of any such computer, computer system, floppies, compact disks, tape drives or any other accessories relating thereto is found is not responsible for the contravention of the provisions of this Act, rules, orders or regulations made there under, the court may, instead of making an order for confiscation of such computer, computer system, floppies, compact disks, tape drives or any other accessories related thereto, make such other order authorized by this Act against the person contravening of the provisions of this Act, rules, orders or regulations made there under as it may think fit.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;While Article 19 provides for the power to search and seize computer systems for the investigation into criminal offences of any type of kind, section 76 of the IT Act is limited only to contraventions of the provisions of the Act, rules, orders or regulations made thereunder. However, this does not mean that Indian law enforcement authorities do not have the power to search and seize a computer system for crimes other than those contained in the IT Act; just as in the case of Article 18, the authorities in India are free to use the provisions contained in the Criminal Procedure Code and other sectoral legislations which allow for seizure of property to seize computer systems when investigating criminal offences.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 20 – Real-time collection of traffic data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to:&lt;/p&gt;
&lt;p&gt;a collect or record through the application of technical means on the territory of that Party, and&lt;/p&gt;
&lt;p&gt;b compel a service provider, within its existing technical capability:&lt;/p&gt;
&lt;p&gt;i to collect or record through the application of technical means on the territory of that Party; or&lt;/p&gt;
&lt;p&gt;ii to co-operate and assist the competent authorities in the collection or recording of,&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;traffic data, in real-time, associated with specified communications in its territory transmitted by means of a computer system.&lt;/p&gt;
&lt;p&gt;2 Where a Party, due to the established principles of its domestic legal system, cannot adopt the measures referred to in paragraph 1.a, it may instead adopt legislative and other measures as may be necessary to ensure the real-time collection or recording of traffic data associated with specified communications transmitted in its territory, through the application of technical means on that territory.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such legislative and other measures as may be necessary to oblige a service provider to keep confidential the fact of the execution of any power provided for in this article and any information relating to it.&lt;/p&gt;
&lt;p&gt;4 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;69B Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(1) The Central Government may, to enhance Cyber Security and for identification, analysis and prevention of any intrusion or spread of computer contaminant in the country, by notification in the official Gazette, authorize any agency of the Government to monitor and collect traffic data or information generated, transmitted, received or stored in any computer resource.&lt;/p&gt;
&lt;p&gt;(2) The Intermediary or any person in-charge of the Computer resource shall when called upon by the agency which has been authorized under sub-section (1), provide technical assistance and extend all facilities to such agency to enable online access or to secure and provide online access to the computer resource generating , transmitting, receiving or storing such traffic data or information.&lt;/p&gt;
&lt;p&gt;(3) The procedure and safeguards for monitoring and collecting traffic data or information, shall be such as may be prescribed.&lt;/p&gt;
&lt;p&gt;(4) Any intermediary who intentionally or knowingly contravenes the provisions of sub-section (2) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.&lt;/p&gt;
&lt;p&gt;Explanation: For the purposes of this section, (i) "Computer Contaminant" shall have the meaning assigned to it in section 43.&lt;/p&gt;
&lt;p&gt;(ii) "traffic data" means any data identifying or purporting to identify any person, computer system or computer network or location to or from which the communication is or may be transmitted and includes communications origin, destination, route, time, date, size, duration or type of underlying service or any other information.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Section 69B in the IT Act enables the government to authorise the monitoring and collection of traffic data through any computer system. Under the Convention, orders for collection and recording of traffic data can be given for the purposes mentioned in Articles 14 and 15. On the other hand, as per the Information Technology (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009, an order for monitoring may be issued for any of the following purposes relating to cyber security:&lt;/p&gt;
&lt;p&gt;(a) forecasting of imminent cyber incidents;&lt;/p&gt;
&lt;p&gt;(b) monitoring network application with traffic data or information on computer resource;&lt;/p&gt;
&lt;p&gt;(c) identification and determination of viruses or computer contaminant;&lt;/p&gt;
&lt;p&gt;(d) tracking cyber security breaches or cyber security incidents;&lt;/p&gt;
&lt;p&gt;(e) tracking computer resource breaching cyber security or spreading virus or computer contaminants;&lt;/p&gt;
&lt;p&gt;(f) identifying or tracking of any person who has breached, or is suspected of having breached or being likely to breach cyber security;&lt;/p&gt;
&lt;p&gt;(g) undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resources;&lt;/p&gt;
&lt;p&gt;(h) accessing a stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force;&lt;/p&gt;
&lt;p&gt;(i) any other matter relating to cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As can be seen from the above, the reasons for which an order for monitoring traffic data can be issued are extremely wide, this is in stark contrast to the reasons for which an order for interception of content data may be issued under section 69. The Rules also provide that the intermediary shall not disclose the existence of a monitoring order to any third party and shall take all steps necessary to ensure extreme secrecy in the matter of monitoring of traffic data.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 21 – Interception of content data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary, in relation to a range of serious offences to be determined by domestic law, to empower its competent authorities to:&lt;/p&gt;
&lt;p&gt;a collect or record through the application of technical means on the territory of that Party, and&lt;/p&gt;
&lt;p&gt;b compel a service provider, within its existing technical capability:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i to collect or record through the application of technical means on the territory of that Party, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii to co-operate and assist the competent authorities in the collection or recording of,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;content data, in real-time, of specified communications in its territory transmitted by means of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Where a Party, due to the established principles of its domestic legal system, cannot adopt the measures referred to in paragraph 1.a, it may instead adopt legislative and other measures as may be necessary to ensure the real-time collection or recording of content data on specified communications in its territory through the application of technical means on that territory.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such legislative and other measures as may be necessary to oblige a service provider to keep confidential the fact of the execution of any power provided for in this article and any information relating to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;69 Powers to issue directions for interception or monitoring or decryption of any information through any computer resource &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Where the central Government or a State Government or any of its officer specially authorized by the Central Government or the State Government, as the case may be, in this behalf may, if is satisfied that it is necessary or expedient to do in the interest of the sovereignty or integrity of India, defense of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above or for investigation of any offence, it may, subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information transmitted received or stored through any computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Procedure and safeguards subject to which such interception or monitoring or decryption may be carried out, shall be such as may be prescribed&lt;/p&gt;
&lt;p&gt;(3) The subscriber or intermediary or any person in charge of the computer resource shall, when called upon by any agency which has been directed under sub section (1), extend all facilities and technical assistance to -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) provide access to &lt;b&gt;or secure access to &lt;/b&gt;the computer resource containing such information; generating, transmitting, receiving or storing such information; or&lt;/p&gt;
&lt;p&gt;(b) intercept or monitor or decrypt the information, as the case may be&lt;b&gt;; &lt;/b&gt;or&lt;/p&gt;
&lt;p&gt;(c) provide information stored in computer resource.&lt;/p&gt;
&lt;p&gt;(4) The subscriber or intermediary or any person who fails to assist the agency referred to in sub-section (3) shall be punished with an imprisonment for a term which may extend to seven years and shall also be liable to fine.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;There has been a lot of academic research and debate around the exercise of powers under section 69 of the IT Act, but the current piece is not the place for a standalone critique of section 69.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; The analysis here is limited to a comparison of the provisions of Article 20 vis-à-vis section 69 of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In that background, it needs to be pointed out that two important issues mentioned in Article 20 of the Convention are not specifically mentioned in section 69B, viz. (i) that the order should be only for specific computer data, and (ii) that the intermediary should keep such an order confidential; these requirements are covered by Rules 9 and 20 of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009, respectively.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 22 – Jurisdiction&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish jurisdiction over any offence established in accordance with Articles 2 through 11 of this Convention, when the offence is committed:&lt;/p&gt;
&lt;p&gt;a in its territory; or&lt;/p&gt;
&lt;p&gt;b on board a ship flying the flag of that Party; or&lt;/p&gt;
&lt;p&gt;c on board an aircraft registered under the laws of that Party; or&lt;/p&gt;
&lt;p&gt;d by one of its nationals, if the offence is punishable under criminal law where it was committed or if the offence is committed outside the territorial jurisdiction of any State.&lt;/p&gt;
&lt;p&gt;2 Each Party may reserve the right not to apply or to apply only in specific cases or conditions the jurisdiction rules laid down in paragraphs 1.b through 1.d of this article or any part thereof.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such measures as may be necessary to establish jurisdiction over the offences referred to in Article 24, paragraph 1, of this Convention, in cases where an alleged offender is present in its territory and it does not extradite him or her to another Party, solely on the basis of his or her nationality, after a request for extradition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4 This Convention does not exclude any criminal jurisdiction exercised by a Party in accordance with its domestic law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5 When more than one Party claims jurisdiction over an alleged offence established in accordance with this Convention, the Parties involved shall, where appropriate, consult with a view to determining the most appropriate jurisdiction for prosecution.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1. Short Title, Extent, Commencement and Application &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) It shall extend to the whole of India and, save as otherwise provided in this Act, it applies also to any offence or contravention hereunder committed outside India by any person.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;75 Act to apply for offence or contraventions committed outside India &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Subject to the provisions of sub-section (2), the provisions of this Act shall apply also to any offence or contravention committed outside India by any person irrespective of his nationality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) For the purposes of sub-section (1), this Act shall apply to an offence or contravention committed outside India by any person if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The Convention provides for extra territorial jurisdiction only for crimes committed outside the State by nationals of that State. However, the IT Act applies even to offences under the Act committed by foreign nationals outside India, as long as the act involves a computer system or computer network located in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike para 3 of Article 22 of the Convention, the IT Act does not touch upon the issue of extradition. Cases involving extradition would therefore be dealt with by the general law of the land in respect of extradition requests contained in the Extradition Act, 1962. The Convention requires that in cases where the state refuses to extradite an alleged offender, it should establish jurisdiction over the offences referred to in Article 21(1) so that it can proceed against that offender itself. In this regard, it must be pointed out that Section 34A of the Extradition Act, 1962 provides that “Where the  Central Government is  of the  opinion that  a  fugitive  criminal  cannot  be surrendered or  returned pursuant  to a request for extradition from a foreign State,  it may, as it thinks fit, take steps to prosecute such fugitive criminal in India.” Thus the Extradition Act gives the Indian government the power to prosecute an individual in the event that such individual cannot be extradited.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;International Cooperation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chapter III of the Convention deals specifically with international cooperation between the signatory parties. Such co-operation is to be carried out both "in accordance with the provisions of this Chapter" and "through application of relevant international agreements on international cooperation in criminal matters, arrangements agreed to on the basis of uniform or reciprocal legislation, and domestic laws." The latter clause establishes the general principle that the provisions of Chapter III do not supersede the provisions of international agreements on mutual legal assistance and extradition or the relevant provisions of domestic law pertaining to international co-operation.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although the Convention grants primacy to mutual treaties and agreements between member States, in certain specific circumstances it also provides for an alternative if such treaties do not exist between the member states (Article 27 and 28). The Convention also provides for international cooperation on certain issues which may not have been specifically provided for in mutual assistance treaties entered into between the parties and need to be spelt out due to the unique challenges posed by cyber crimes, such as expedited preservation of stored computer data (Article 29) and expedited disclosure of preserved traffic data (Article 30). Contentious issues such as access to stored computer data, real time collection of traffic data and interception of content data have been specifically left by the Convention to be dealt with as per existing international instruments or arrangements between the parties.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The broad language and wide terminology used IT Act seems to cover a number of the cyber crimes mentioned in the Budapest Convention, even though India has not signed and ratified the same. Penal provisions such as illegal access (Article 2), data interference (Article 4), system interference (Article 5), offence related to child pornography (Article 9), attempt and aiding or abetting (Article 11), corporate liability (Article 12) are substantially covered and reflected in the IT Act in a manner very similar to the requirements of the Convention. Similarly procedural provisions such as search and seizure of stored computer data (Article 19), real-time collection of traffic data (Article 20), interception of content data (Article 21) and Jurisdiction (Article 22) are also substantially reflected in the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However certain penal provisions mentioned in the Convention such as computer related forgery (Article 7), computer related fraud (Article 8) are not provided for specifically in the IT Act but such offences are covered when provisions of the Indian Penal Code, 1860 are read in conjugation with provisions of the IT Act. Similarly procedural provisions such as expedited preservation of stored computer data (Article 16) and production order (Article 18) are not specifically provided for in the IT Act but are covered under Indian law through the provisions of the Code of Criminal Procedure, 1973.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the above two categories there are certain provisions such as misuse of devices (Article 6) and Illegal interception (Article 3) which may not be specifically covered at all under Indian law, but may conceivably be said to be covered through an expansive reading of provisions of the Indian Penal Code and the IT Act. It may therefore be said that even though India has not signed or ratified the Budapest Convention, the legal regime in India is substantially in compliance with the provisions and requirements contained therein.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, the Convention on Cybercrime is perhaps the most important international multi state instruments that may be used to combat cybercrime, not merely because the provisions thereunder may be used as a model to bolster national/local laws by any State, be it a signatory or not (as in the case of India) but also because of the mechanism it lays down for international cooperation in the field of cyber terrorism. In an increasingly interconnected world where more and more information of individuals is finding its way to the cloud or other networked infrastructure the international community is making great efforts to generate norms for increased international cooperation to combat cybercrime and cyber terrorism. While the Convention is one such multilateral effort, States are also proposing to use bilateral treaties to enable them to better fight cybercrime, the United States CLOUD Act, being one such effort. In the backdrop of these novel efforts the role to be played by older instruments such as the Convention on Cybercrime as well as by important States such as India is extremely crucial.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Explanatory Report to the Convention on Cybercrime, Para 304, https://rm.coe.int/16800cce5b.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; The analysis here has been limited to only Chapter I and Chapter II of the Convention, as it is only adherence to these two chapters that is required under the CLOUD Act.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; The only possible enforcement that may be done with regard to the Convention on Cybercrime is that the Council of Europe may put pressure on the signatory State to amend its local laws (if it is refusing to do so) otherwise it would be in violation of its obligations as a member of the European Union.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Alexander Seger, “India and the Budapest Convention: Why Not?”, &lt;a href="https://www.orfonline.org/expert-speak/india-and-the-budapest-convention-why-not/"&gt;https://www.orfonline.org/expert-speak/india-and-the-budapest-convention-why-not/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Explanatory Report to the Convention on Cybercrime, Para 50, https://rm.coe.int/16800cce5b.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; India is a party to the Berne Convention on Literary and Artistic Works, the Agreement on Trade Related Intellectual Property Rights and the Rome Convention. India has also recently (July 4, 2018) announced that it will accede to the WIPO Copyright Treaty as well as the WIPO Performances and Phonographs Treaty.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; The test under the Convention is that the relevant person would be the one who has a leading position within the company, based on:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;a power of representation of the legal person;&lt;/li&gt;
&lt;li&gt;an authority to take decisions on behalf of the legal person;&lt;/li&gt;
&lt;li&gt;an authority to exercise control within the legal person.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt;Vipul Kharbanda and Elonnai Hickock, “MLATs and the proposed Amendments to the US Electronic Communications Privacy Act”, &lt;a href="https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act"&gt;https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; The term “human rights” has been defined in the Act as “rights relating to life, liberty, equality and dignity of the individual guaranteed by the Constitution or embodied in the International Covenants and enforceable by courts in India”.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Explanatory Report to the Convention on Cybercrime, Para 151, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;. .&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; A similar power of interception is available under section 5 of the Telegraph Act, 1885, but that extends only to interception of telegraphic communication and does not extend to communications exchanged through computer networks.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Explanatory Report to the Convention on Cybercrime, Para 244, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act'&gt;http://editors.cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-11-20T16:18:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/regulating-bitcoin-in-india">
    <title>Regulating Bitcoin in India</title>
    <link>http://editors.cis-india.org/internet-governance/blog/regulating-bitcoin-in-india</link>
    <description>
        &lt;b&gt;The article discusses the possible contours of future bitcoin regulation in India. Bitcoin, often considered a ‘notorious’ virtual currency limited only to techies or speculators, is currently fighting a battle to become a bona fide mainstream means of exchange.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While most currencies in the real world have the backing of a central authority of some kind (such as a sovereign or a Central Bank) infusing them with an air of legitimacy, Bitcoin has no such central authority which issues or controls it. Additionally, the distributed and decentralised nature of the Bitcoin network makes regulation a tricky issue. This article seeks to touch upon the issue of Bitcoin regulation and makes certain broad suggestions for the future. It is a follow-up to a previous article by this author discussing the legal treatment of Bitcoin under Indian law, available at &lt;a href="http://cis-india.org/internet-governance/bitcoin-legal-regulation-india"&gt;http://cis-india.org/internet-governance/bitcoin-legal-regulation-india&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Reserve Bank of India (&lt;b&gt;RBI&lt;/b&gt;) has not exactly been shy in recognising and even regulating technological advances in the financial sector as is evident from their detailed guidelines on Internet Banking,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; Prepaid Payment Instruments&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Account Aggregator Regulations,&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; and the consultation paper on proposed regulations for P2P lending platforms,&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; etc. However, though the RBI has acknowledged the existence of Bitcoin (it issued a note cautioning the public against dealing in virtual currencies including Bitcoin way back in 2013&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; and again in 2017&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;), there have been no clear guidelines regarding the same. Nevertheless, Bitcoin has come a long way since its inception and a consensus is emerging amongst the more technically inclined individuals that Bitcoin is infact here to stay.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if a sceptical view is taken that Bitcoin may not last for a long time, that does not mean that regulation is useless as there is already a large amount of money invested in Bitcoin entities in India and Bitcoin exchanges seem to be betting big on this sector really taking off - especially in the backdrop of the government’s recent push towards a more digital and less cash dependent economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Indian government is trying to hard sell the idea of digital payments, primarily using existing banking channels as well as the relatively new National Payments Corporation of India (&lt;b&gt;NPCI&lt;/b&gt;) and the various applications that are cropping up around the NPCI’s UPI platform, one must note that going digital could involve high administrative costs. These costs are typically charged by banks and intermediary merchants, and may not be palatable to all stakeholders, as was evident in the recent fracas between petrol pump owners and banks over proposed transactional charges on card payments.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is this vacuum that alternatives such as prepaid payment instruments and virtual currencies can fill while addressing the concern of high administrative charges, which is likely to be a major hurdle in going digital. Administrative charges for most of these instruments are significantly lower than what existing payment channels charge for digital transactions.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legality of Bitcoin and the need for Regulation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bitcoin technology is being widely embraced all over the world, including neighbouring China which has become one of the biggest markets for the uniquely decentralised currency. However the biggest hurdle that Bitcoin enthusiasts see in mainstreaming this technology is the fact that most countries are treading too cautiously around Bitcoin and therefore do not have regulation governing them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The creation and transfer of Bitcoin is based on an open source cryptographic protocol and is not managed by any central authority.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; It is the decentralized nature of this virtual currency that makes regulation a major challenge. This does not mean that regulators are not capable of regulating Bitcoin, in fact attempts have been made in several jurisdictions but these are mostly in the discussion stage, for eg. the Washington Department of Financial Institutions (“DFI”) introduced a bill in December, 2016 which proposes amendments to certain portions of the Washington Uniform Money Services Act and includes provisions specific to digital currencies;&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; the U.S. District Court for the Southern District of New York has in a decision in September, 2016 taken the view that Bitcoin is money under the plain meaning of Section 1960, the federal money transmission statute.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This article does not intend to undertake a discussion on how Bitcoin is dealt with in various jurisdictions, but instead is aimed at suggesting a possible way forward for Indian regulators to regulate Bitcoin in a manner that satisfies the regulatory zeal towards security as well as ensures that the technology does not get stifled through overregulation. It is important that the regulators create a balanced regulation because an impractical ecosystem for Bitcoin exchanges and their users, may lead to traders seeking alternative methods of purchasing Bitcoin such as P2P trading, over-the-counter (OTC) markets and underground trading platforms, which are significantly more difficult to regulate.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Suggestions for Regulation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since Bitcoin is a decentralised cryptocurrency, it is impossible to regulate it through one single centralised point for all transactions. Neither is it feasible to regulate each and every Bitcoin user. A pragmatic compromise between these two extremes could be to regulate the points at which fiat currency or valuable goods enter the Bitcoin system, i.e. the Bitcoin exchanges where people may buy and sell Bitcoin for actual real world money, or websites which offer Bitcoin as a means of payment. Such an approach would reduce the number of points of supervision and lead to effective enforcement of the regulations. The regulations may require any entity providing services such as buying and selling of Bitcoin for actual money, trading in Bitcoin (such as non-cash exchanges) or providing other Bitcoin related services (such as Bitcoin wallets, merchant gateways, remittance facilities, etc.) to be registered with a central government agency, preferably the Reserve Bank of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One legal issue regarding the regulation of companies transacting in Bitcoin is whether the RBI has the authority or jurisdiction to regulate Bitcoin in the first place. Without getting into the arguments regarding whether it is a dangerous trend or not, an easy way in which the RBI could ensure it has the authority to regulate Bitcoin would be to follow the path that the RBI adopted while regulating Account Aggregators under the Non-Banking Financial Company - Account Aggregator (Reserve Bank) Directions, 2016 wherein the RBI declared Account Aggregators as Non Banking Finance Companies under section 45-I(f)(iii) thereby getting the authority to regulate and supervise them under section 45JA of the Reserve Bank of India Act, 1934.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Regulations, once issued by the Reserve Bank of India, can prescribe mandatory registration, capital adequacy provisions, corporate governance conditions, minimum security protocols, Know Your Customer (KYC) requirements and most importantly provide for regular and ongoing reporting requirements as well as supervision of the Reserve Bank of India over the activities of Bitcoin companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any proposed Bitcoin regulatory framework would seek to address certain issues; for the purposes of this article, we will assume that the following three issues are the ones that must necessarily be addressed by a regulatory framework:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Security of the consumer’s property and prevention of fraud on the consumer. In the technology sector this translates into specific emphasis on increased security (against hacking) for accounts that the consumers maintain with the service provider.&lt;/li&gt;
&lt;li&gt;India has robust exchange control laws and the inherently decentralised and digital nature of Bitcoin can enable transfer of value from one jurisdiction to another without any oversight by a central agency, potentially violating the exchange control laws of India.&lt;/li&gt;
&lt;li&gt;Bitcoin has for long been associated with criminal and nefarious activities, infact many believe that the famous black market website “Silk Road” played a big role in making Bitcoin famous&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; and therefore preventing Bitcoin from being used for illegal activities (or creating a mechanism to ensure a digital trail to help investigations post facto) would be a major issue that the regulations would seek to tackle.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Given the above assumptions, let us examine whether the Regulations suggested above can satisfactorily address the concerns of security of consumers, exchange control, and keeping a tab on criminal activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the regulations provide for minimum capital adequacy requirements as well as registration by the RBI or some other central agency, then the chances of consumers being duped by “fly-by-night” operators would be significantly reduced. The Regulations can also provide for minimum security protocols to be maintained by the companies, which protocols can themselves be developed in concert with Bitcoin experts. Critics may point to the hacking of various Bitcoin exchanges in the recent past, including that of MtGox, in which Bitcoin worth millions of dollars were siphoned off, and argue that the security protocols may not be enough to prevent future instances of hacking. But that is true even for the current security protocols for online banking; and that has not prevented a large number of banks from providing online banking facilities and the RBI regulating the same. The other vital issue that legally mandated security protocols would address (and potentially solve) is the issue of liability in case of hackings. Regulations may provide clarity on this issue and protect innocent customers from negligent companies while at the same time protecting entrepreneurs by defining and limiting the liability for &lt;i&gt;bona fide&lt;/i&gt; and vigilant companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other issue that may be of major concern to the authorities is exchange control. India has extremely specific exchange control laws, and if any person in India wants to transfer any amount to any person overseas, the only legal way to do so is through a bank transfer, which requires filling paperwork giving the reason for the transfer (although the RBI and banks usually don’t ask for any proof for small amounts upto a few lakhs). This means that all transfers outside India are done through proper banking channels and are therefore under the supervision of the RBI. However the decentralised nature of Bitcoin enables individuals to transfer money outside the borders of India without going through any banking channels and hence stay completely outside the purview of the RBI’s supervision. Such a system which lets users transfer money beyond national borders outside legal banking channels could be easily misused by nefarious actors and this is exactly what happened as international drug cartels turned to Bitcoin and other digital currencies to move their ill gotten wealth beyond the borders of various countries.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Regulating the entities which provide Bitcoin wallets and Bitcoin exchanges will ensure that the RBI can exercise its supervisory jurisdiction over Bitcoin transactions of individual customers even though these transactions do not go through the regular banking channels. The Regulations could impose an obligation on the companies to provide information on any suspicious activities or provide greater information about accounts which see very high volumes, etc. to ensure that Bitcoin is not used to finance organised crime. Thus, the regulations could have provisions that would require the companies providing the Bitcoin wallets or exchanges to flag and monitor customers whose trading accounts or Bitcoin wallets have transactions of an amount greater than a specified limit. This would provide the RBI with the ability to enquire as to the reasons for such high volumes and weed out illegal transactions while at the same time allowing bona fide transactions to continue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Very closely linked to the issue of exchange control and supervision of transactions is the issue of checking the furtherance of criminal activities using the apparent anonymity offered by Bitcoin. However if the RBI has regulatory oversight over all the Bitcoin companies that are operating in India, then it would be possible for it to keep an eye on most Bitcoin transactions in India as long as the wallet that originates or terminates the transaction has been provided by a Bitcoin service provider located in India. An argument may be made that a criminal may use the services of Bitcoin wallet services provided by companies outside India and therefore outside the purview of the RBI and its regulations. However this argument may not be as plausible as it may seem at first look; if we assume that for any criminal activity the ultimate goal is to get the money in the form of recognizable legal tender (preferably cash or money in a bank account) then it stands to reason that the Bitcoin in the wallet would be exchanged for currency at some point or the other in the chain, which can only be done through a Bitcoin exchange if the transaction is of a fairly high value (which most criminal transactions are) and these exchanges as well as the accounts maintained by them will be under the purview of the RBI, thus providing the law enforcement agencies with the final link in the chain of transactions. Further, the public nature of the blockchain (the ledger where each Bitcoin trade is registered and verified) also makes it possible for the enforcement agencies to follow the trail of money for each and every Bitcoin or part thereof.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the discussion above, we see that the major arguments that have been given by sceptics regarding Bitcoin and its attractiveness to criminals due to its decentralised nature are actually not very viable on a closer look. Bitcoin and the blockchain technology are extremely important steps in the direction of better and more efficient financial transactions in the global economy, which is why a number of mainstream banks are also showing a keen interest in the blockchain technology.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; Regulations governing Bitcoin or virtual currencies would clear the air regarding their legal status so that consumers as well as entrepreneurs and investors can invest more money in this technology which could potentially change the way financial transactions are carried out across jurisdictions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; &lt;a href="https://www.rbi.org.in/scripts/NotificationUser.aspx?Id=414&amp;amp;Mode=0"&gt;https://www.rbi.org.in/scripts/NotificationUser.aspx?Id=414&amp;amp;Mode=0&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;a href="https://rbi.org.in/scripts/NotificationUser.aspx?Id=10799&amp;amp;Mode=0"&gt;https://rbi.org.in/scripts/NotificationUser.aspx?Id=10799&amp;amp;Mode=0&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; &lt;a href="https://www.rbi.org.in/scripts/BS_ViewMasDirections.aspx?id=10598"&gt;https://www.rbi.org.in/scripts/BS_ViewMasDirections.aspx?id=10598&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="https://rbidocs.rbi.org.in/rdocs/content/pdfs/CPERR280416.pdf"&gt;https://rbidocs.rbi.org.in/rdocs/content/pdfs/CPERR280416.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;a href="https://rbi.org.in/scripts/BS_PressReleaseDisplay.aspx?prid=30247"&gt;https://rbi.org.in/scripts/BS_PressReleaseDisplay.aspx?prid=30247&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;a href="https://rbi.org.in/Scripts/BS_PressReleaseDisplay.aspx?prid=39435"&gt;https://rbi.org.in/Scripts/BS_PressReleaseDisplay.aspx?prid=39435&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;a href="http://timesofindia.indiatimes.com/business/india-business/petrol-pumps-wont-accept-cards-from-monday-to-protest-banks-transaction-fee/articleshow/56402253.cms"&gt;http://timesofindia.indiatimes.com/business/india-business/petrol-pumps-wont-accept-cards-from-monday-to-protest-banks-transaction-fee/articleshow/56402253.cms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; For example, currently the network fee for a person to person Bitcoin transfer is 0.0001 Bitcoin, which comes to roughly Rs. 6 per transaction irrespective of the amount involved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; The processing of Bitcoin transactions is secured by servers called Bitcoin “miners”. These servers communicate over an internet-based network and confirm transactions by adding them to a ledger which is updated and archived periodically using peer-to-peer filesharing technology, also known as the “blockchain”. The integrity and chronological order of the blockchain is enforced with cryptography. In addition to archiving transactions, each new ledger update creates some newly-minted Bitcoins.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; &lt;a href="https://www.virtualcurrencyreport.com/2017/01/washington-department-of-financial-institutions-proposes-virtual-currency-regulation/"&gt;https://www.virtualcurrencyreport.com/2017/01/washington-department-of-financial-institutions-proposes-virtual-currency-regulation/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; &lt;a href="https://www.virtualcurrencyreport.com/2016/09/sdny-opinion-re-bitcoin/"&gt;https://www.virtualcurrencyreport.com/2016/09/sdny-opinion-re-bitcoin/&lt;/a&gt;. For a discussion on how different States and agencies in the United States deal with Bitcoin, please see Misha Tsukerman, “THE BLOCK IS HOT: A SURVEY OF THE STATE OF BITCOIN REGULATION AND SUGGESTIONS FOR THE FUTURE, Berkeley Technology Law Journal, Vol. 30:385, 2015, p. 1127, available at &lt;a href="http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=2084&amp;amp;context=btlj"&gt;http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=2084&amp;amp;context=btlj&lt;/a&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="http://themerkle.com/why-china-isnt-interested-in-banning-bitcoin-importance-of-regulation/"&gt;http://themerkle.com/why-china-isnt-interested-in-banning-bitcoin-importance-of-regulation/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; See generally, Nathaniel Popper, “Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money”, Harper Collins, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; &lt;a href="https://www.bloomberg.com/view/articles/2013-11-18/are-bitcoins-the-criminal-s-best-friend-"&gt;https://www.bloomberg.com/view/articles/2013-11-18/are-bitcoins-the-criminal-s-best-friend-&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; &lt;a href="http://www.morganstanley.com/ideas/big-banks-try-to-harness-blockchain"&gt;http://www.morganstanley.com/ideas/big-banks-try-to-harness-blockchain&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/regulating-bitcoin-in-india'&gt;http://editors.cis-india.org/internet-governance/blog/regulating-bitcoin-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Financial Technology</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Bitcoin</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Virtual Currencies</dc:subject>
    

   <dc:date>2017-04-20T13:17:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law">
    <title>Incident Response Requirements in Indian Law</title>
    <link>http://editors.cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law</link>
    <description>
        &lt;b&gt;Cyber incidents have serious consequences for societies, nations, and those who are victimised by them. The theft, exploitation, exposure or otherwise damage of private, financial, or other sensitive personal or commercial data and cyber attacks that damage computer systems are capable of causing lasting harm. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;A recent example of such an attack  that we have seen from India is the recent data breach involving an alleged 3.2 million debit cards in India.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; In the case of this hack the payment processing networks such as National Payments Corporation of India, Visa and Mastercard, informed the banks regarding the leaks, based on which the banks started the process of blocking and then reissuing the compromised cards. It has also been reported that the banks failed to report this incident to the Computer Emergency Response Team of India (CERT-In) even though they are required by law to do so.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; Such risks are increasingly faced by consumers, businesses, and governments. A person who is a victim of a cyber incident usually looks to receive assistance from the service provider and government agencies, which are prepared to investigate the incident, mitigate its consequences, and help prevent future incidents. It is essential for an effective response to cyber incidents that authorities have as much knowledge regarding the incident as possible and have that knowledge as soon as possible. It is also critical that this information is communicated to the public. This underlines the importance of  reporting  cyber incidents as a tool in making the internet and digital infrastructure   secure.. Like any other crime, an Internet-based crime should be reported to those law enforcement authorities assigned to tackle it at a local, state, national, or international level, depending on the nature and scope of the criminal act. This is the first in a series of blog posts highlighting the importance of incident reporting in the Indian regulatory context with a view to highlight the Indian regulations dealing with incident reporting and the ultimate objective of having a more robust incident reporting environment in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Incident Reporting under CERT Rules&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, section 70-B of the Information Technology Act, 2000 (the “&lt;b&gt;IT Act&lt;/b&gt;”) gives the Central Government the power to appoint an agency of the government to be called the Indian Computer Emergency Response Team. In pursuance of the said provision the Central Government issued the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Functions and Duties) Rules, 2013 (the “&lt;b&gt;CERT Rules&lt;/b&gt;”) which provide the location and manner of functioning of the Indian Computer Emergency Response Team (CERT-In). Rule 12 of the CERT Rules gives every person, company or organisation the option to report cyber security incidents to the CERT-In. It also places an obligation on them to mandatorily report the following kinds of incidents as early as possible:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Targeted scanning/probing of critical networks/systems;&lt;/li&gt;
&lt;li&gt;Compromise of critical systems/information;&lt;/li&gt;
&lt;li&gt;Unauthorized access of IT systems/data;&lt;/li&gt;
&lt;li&gt;Defacement of website or intrusion into a website and unauthorized changes such as inserting malicious code, links to external websites, etc.;&lt;/li&gt;
&lt;li&gt;Malicious code attacks such as spreading of virus/worm/Trojan/botnets/spyware;&lt;/li&gt;
&lt;li&gt;Attacks on servers such as database, mail, and DNS and network devices such as routers;&lt;/li&gt;
&lt;li&gt;Identity theft, spoofing and phishing attacks;&lt;/li&gt;
&lt;li&gt;Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks;&lt;/li&gt;
&lt;li&gt;Attacks on critical infrastructure, SCADA systems and wireless networks;&lt;/li&gt;
&lt;li&gt;Attacks on applications such as e-governance, e-commerce, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The CERT Rules also impose an obligation on service providers, intermediaries, data centres and body corporates to report cyber incidents within a reasonable time so that CERT-In may have scope for timely action. This mandatory obligation of reporting incidents casts a fairly wide net in terms of private sector entities, however it is notable that prima facie the provision does not impose any obligation on government entities to report cyber incidents unless they come under any of the expressions “service providers”, “data centres”, “intermediaries” or “body corporate”. This would mean that if the data kept with the Registrar General &amp;amp; Census Commissioner of India is hacked in a cyber incident, then there is no statutory obligation under the CERT Rules on it to report the incident. It is pertinent to mention here that although there is no obligation on a government department under law to report such an incident, such an obligation may be contained in its internal rules and guidelines, etc. which are not readily available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is pertinent to note that although the CERT Rules provide for a mandatory obligation to report the cyber incidents listed therein, the Rules themselves do not provide for any penalty for non compliance. However this does not mean that there are no consequences for non compliance, it just means that we have to look to the parent legislation i.e. the IT Act for the appropriate penalties for non compliance. Section 70B(6) gives the CERT-In the power to call for information and give directions for the purpose of carrying out its functions. Section 70B(7) provides that any service provider, intermediary, data center, body corporate or person who fails to provide the information called for or comply with the direction under sub-section (6), shall be liable to imprisonment for a period up to  1 (one) year or fine of up to 1 (one) lakh or both.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is possible to argue here that sub-section (6) only talks about calls for information by CERT-In and the obligation under Rule 12 of the CERT Rules is an obligation placed by the central government and not CERT-In. It can also be argued that sub-section (6) is only meant for specific requests made by CERT-In for information and sub-section (7) only penalises those who do not respond to these specific requests. However, even if these arguments were to be accepted and we were to conclude that a violation of the obligation imposed under Rule 12 would not attract the penalty stipulated under sub-section (7) of section 70B, that does not mean that Rule 12 would be left toothless. Section 44(b) of the IT Act provides that where any person is required under any of the Rules or Regulations under the IT Act to furnish any information within a particular time and such person fails to do so, s/he may be liable to pay a penalty of upto Rs. 5,000/- for every day such failure continues. Further section 45 provides for a further penalty of Rs.25,000/- for any contravention of any of the rules or regulations under the Act for which no other penalty has been provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Incident Reporting under Intermediary Guidelines&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 2(1)(w) of the IT Act defined the term “intermediary” in the following manner;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“intermediary” with respect to any particular electronic record, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web hosting service providers, search engines, online payment sites, online-auction sites, online market places and cyber cafes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3(9) of the Information Technology (Intermediaries Guidelines) Rules, 2011 (the “&lt;b&gt;Intermediary Guidelines&lt;/b&gt;”) also imposes an obligation on any intermediary to report any cyber incident and share information related to cyber security incidents with the CERT-In. Since neither the Intermediary Guidelines not the IT Act specifically provide for any penalty for non conformity with Rule 3(9) therefore any enforcement action against an intermediary failing to report a cyber security incident would have to be taken under section 45 of the IT Act containing a penalty of Rs. 25,000/-.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Incident Reporting under the Unified License&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause 39.10(i) of the Unified License Agreement obliges the telecom company to create facilities for the monitoring of all intrusions, attacks and frauds on its technical facilities and provide reports on the same to the Department of Telecom (DoT). Further clause 39.11(ii) provides that for any breach or inadequate compliance with the terms of the license, the telecom company shall be liable to pay a penalty amount of Rs. 50 crores (Rs. 50,00,00,000) per breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear from the above discussion that there is a legal obligation service providers to report  cyber incidents to the CERT-In. Presently, the penalty prescribed under Indian law may not be enough to incentivise companies to adopt comprehensive and consistent incident response programmes. , except in cases of telecom companies under the Unified License Agreement. A fine of Rs. 25,000/- appears to be inconsequential  when compared to the possible dangers and damages that may be caused due to a security breach of data containing, for example,  credit card details.. Further, it is also imperative that apart from the obligation to report the cyber incident to the appropriate authorities (CERT-In) there should also be a legal obligation to report it to the data subjects whose data is stolen or is put at risk due to the said breach. A provision requiring notice to the data subjects could go a long way in ensuring that service providers, intermediaries, data centres and body corporates implement the best data security practices since a breach would then be known by general consumers leading to a flurry of bad publicity which could negatively impact the business of the data controller, and for a business entity an economic stimulus may be an effective way  to ensure compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we continue to research incident response, the questions and areas we are exploring include the ecosystem of incidence response including what is reported, how, and when, appropriate incentives to companies and governments to report incidents, various forms of penalties, the role of cross border sharing of information and jurisdiction and best practices for incident reporting and citizen awareness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Published under Creative Commons License CC BY-SA. Anyone can distribute, remix, tweak, and build upon this document, even for commercial purposes, as long as they credit the creator of this document and license their new creations under the terms identical to the license governing this document&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.huffingtonpost.in/2016/10/21/atm-card-hack-what-banks-are-saying-about-india-s-biggest-data/"&gt;http://www.huffingtonpost.in/2016/10/21/atm-card-hack-what-banks-are-saying-about-india-s-biggest-data/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://tech.economictimes.indiatimes.com/news/internet/cert-in-had-warned-banks-on-oct-7-about-expected-targeted-attacks-from-pakistan/54991025"&gt;http://tech.economictimes.indiatimes.com/news/internet/cert-in-had-warned-banks-on-oct-7-about-expected-targeted-attacks-from-pakistan/54991025&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law'&gt;http://editors.cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-28T01:19:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/raw/rbi-consultation-paper-on-p2p-lending">
    <title>RBI Consultation Paper on P2P Lending: Data Security and Privacy Concerns</title>
    <link>http://editors.cis-india.org/raw/rbi-consultation-paper-on-p2p-lending</link>
    <description>
        &lt;b&gt;On April 28, 2016 the Reserve Bank of India published a consultation paper on P2P Lending and invited comments from the public on the same. The Paper discusses what P2P lending is, the various regulatory practices that govern P2P lending in different jurisdictions and lists our arguments for and against regulating P2P lending platforms.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Arguments against Regulation&lt;/h2&gt;
&lt;p&gt;The arguments against regulation of P2p lending companies as set out in the paper are (briefly):&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Regulating an exempt or nascent sector may be perceived as rubber stamping the industry through regulation, thus lending credibility to the P2P lending which could attract ill informed lenders to the sector who may not understand all the risks associated with the industry. In this way Regulation may cause more harm than good.&lt;/li&gt;
&lt;li&gt;Regulations may also be perceived as too stringent, thus stifling the growth of an innovative, efficient and accessible industry.&lt;/li&gt;
&lt;li&gt;The P2P lending market is currently in a nascent stage and does not pose an immediate systemic risk meriting regulation.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Arguments in favour of Regulation&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The arguments for regulating the market on the other hand are:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Considering the significance of the online industry and the impact which it can have on the traditional banking channels/NBFC sector, it would be prudent to regulate this emerging industry.&lt;/li&gt;
&lt;li&gt;The, the importance of these methods of financing, specially in sectors where formal lending cannot reach, needs to be acknowledged.&lt;/li&gt;
&lt;li&gt;If the sector is left unregulated altogether, there is the risk of unhealthy practices being adopted by one or more players, which may have deleterious consequences.&lt;/li&gt;
&lt;li&gt;Section 45S of RBI Act prohibits an individual or a firm or an unincorporated association of individuals from accepting deposits “if its business wholly or partly includes any of the activities specified in clause (c) of section 45-I (i.e. activities of a financial institution); or if his or its principal business is that of receiving of deposits under any scheme or arrangement or in any other manner, or lending in any manner. Contravention of Section 45S is an offence punishable under section 58B (5A) of RBI Act. As per the Act, ‘‘deposit’’ includes and shall be deemed always to have included any receipt of money by way of deposit or loan or in any other form, but does not include any amount received from an individual or a firm or an association of individuals not being a body corporate, registered under any enactment relating to money lending which is for the time being in force in any State. Since the borrowers and lenders brought together by a P2P platform could fall within these prohibitions, absence of regulation may lead to perpetrating an illegality.”&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;After listing out the arguments, the paper adopts the approach of regulating this industry and proposes to bring P2P lending platforms under the purview of RBI’s regulation by defining them as Non Banking Financial Companies (NBFCs) under section 45-I(f)(iii) of the RBI Act. Once notified as NBFCs, RBI can issue regulations under sections 45JA and 45L. Though there is scope to comment on many aspects of the consultation paper our comments here will be limited to the data security and privacy aspects of the recommendations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Data Security and Privacy Concerns&lt;/h2&gt;
&lt;p&gt;While the understanding of potential borrowers, specially those who have had experiences with commercial financial institutions, is that the more amount of information they provide, the better their chances become of getting a loan. This perception emanates from the fact that any potential borrower is asked for a myriad of documents, including personally identifying documents before a request for a loan is considered, infact for almost all financial institutions it is part of their core prudential norms to ask for identity documents before disbursing a loan. Getting as much information as possible from the borrower is not just a quirk of the financial institutions but it makes business sense for them, since it is those institutions who bear the risk of recovery of their money. There is no reason why the same logic or allowing creditors all the information about the borrower should not be applicable to P2P lending platforms, as far as the principle of prudential business practices is concerned. However, the key difference between disclosing information to P2P lending platforms as opposed to financial institutions is that whilst the information supplied to financial institutions stays limited to the institution and its employees, a large amount of the information (though not necessarily all) given to P2P platforms is made available to all potential creditors, which in P2P lending translates to any internet user who registers as a potential creditor. In this way the potential for the information to reach a wider group of people is much higher and therefore privacy and data security risks require special attention in P2P lending.&lt;/p&gt;
&lt;p&gt;In section 5.3(v) of the Paper it is recommended that “Confidentiality of the customer data and data security would be the responsibility of the Platform. Transparency in operations, adequate measures for data confidentiality and minimum disclosures to borrowers and lenders would also be mandated through a fair practices code.” Whilst the fair practices code has not yet been developed or at least not yet made publicly available, as companies in the P2P lending industry are body corporates, these fair practice codes&amp;nbsp; should be in line with and satisfy the requirements of section 43A of the Information Technology Act, 2000 (“&lt;strong&gt;IT Act&lt;/strong&gt;”) as well as the Guidelines issued by the RBI’s Guidelines on Information security, Electronic Banking, Technology risk management and cyber frauds &lt;strong&gt;[1]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The minimum standards for data protection in Indian law have been laid down by section 43A of the IT Act and the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 (“&lt;strong&gt;Rules&lt;/strong&gt;”) issued under section 43A. As per Rule 4 of the Rules P2P platforms would be required to have a privacy policy to deal with sensitive personal data, which includes any details regarding financial information such bank account, credit/debit cards, etc &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;This policy would have to be published on the website of the platforms and would provide for a number of things such as (i) Clear and easily accessible statements of its practices and policies; (ii) type of personal or sensitive personal data or information collected; (iii) purpose of collection and usage of such information; (iv) disclosure of information including sensitive personal data or information; (v) reasonable security practices and procedures for the data. The other requirements of the Rules as regards consent before usage of the information, collection limitations, imparting information/notice to the consumer (information provider), retention limitation, purpose limitation, opt-out option, disclosure, etc. will also be applicable to P2P platforms and the fair practices code that the RBI would issue for this purpose will have to take all these issues into account.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Rules also provide that body corporates will be considered to have complied with reasonable security practices if they have implemented such security practices and standards and have a comprehensive documented information security programme and information security policies that contain managerial, technical, operational and physical security control measures that are commensurate with the information assets being protected with the nature of business. Although there are no such practices which have been endorsed by any governmental body for P2P lending platforms, however the Department of Banking Supervision, Reserve Bank of India, has issued guidelines on “Information security, Electronic Banking, Technology risk management and cyber frauds" &lt;strong&gt;[3]&lt;/strong&gt;. which could be relied upon until a fair practices code is put into place. The major privacy and data security provisions of these guidelines are given below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Security Baselines&lt;/strong&gt;: The guidelines require banks to be proactive in identifying and specifying the minimum security baselines to be adhered to by the service providers to ensure confidentiality and security of data;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Back up records&lt;/strong&gt;: A cloud computing system must ensure backup of all its clients' information;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Security steps&lt;/strong&gt;: An institution may take the following steps to ensure that risks with respect to confidentiality and security of data are adequately mitigated: (i) Address, agree, and document specific responsibilities of the respective parties in outsourcing; (ii) Discuss and agree on the instances where customer data shall be accessed; (iii) Ensure that service provider employees are adequately aware and informed on the security and privacy policies.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Confidentiality&lt;/strong&gt;: Agreements should provide for maintaining confidentiality of customer's information even after the contract expires or is terminated by either party and specify the liability in case of security breach or leakage.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encryption&lt;/strong&gt;: Normally, a minimum of 128-bit SSL encryption is expected. Banks should only select encryption algorithms which are well established international standards.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Fraud Risk Management&lt;/strong&gt;: It is also necessary that customer confidential information and other data/information available with banks is secured adequately to ensure that fraudsters do not access it to perpetrate fraudulent transactions.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Although inclusion of the above principles in the fair practices code would be helpful, however since the workings of P2P platforms are quite unique, therefore it would be counterproductive to restrict the security and privacy protocols to only those applied to regular banking transactions and the fair practices code should take into account these unique problems of P2P lending rather than seek to apply the existing norms blindly.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="https://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf"&gt;https://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; The Rules define “sensitive personal data or information” as information relating to: "(i) password, (ii) financial information such as Bank account or credit card or debit card or other payment instrument details, (iii) physical, physiological and mental health condition, (iv) sexual orientation, (v) medical records and history, (vi) Biometric information, (vii) any detail relating to the above clauses as provided to body corporate for providing service, and (viii) any of the information received under above clauses by body corporate for processing, stored or processed under lawful contract or otherwise."&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf"&gt;http://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/rbi-consultation-paper-on-p2p-lending'&gt;http://editors.cis-india.org/raw/rbi-consultation-paper-on-p2p-lending&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Reserve Bank of India</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Network Economies</dc:subject>
    
    
        <dc:subject>P2P Lending</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-06-01T11:41:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion">
    <title>Comments by the Centre for Internet and Society on the Report of the Committee on Medium Term Path on Financial Inclusion </title>
    <link>http://editors.cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion</link>
    <description>
        &lt;b&gt;Apart from item-specific suggestions, CIS would like to make one broad comment with regard to the suggestions dealing with linking of Aadhaar numbers with bank accounts. Aadhaar is increasingly being used by the government in various departments as a means to prevent fraud, however there is a serious dearth of evidence to suggest that Aadhaar linkage actually prevents leakages in government schemes. The same argument would be applicable when Aadhaar numbers are sought to be utilized to prevent leakages in the banking sector.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and Society (CIS) is a non-governmental organization which undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the course of its work CIS has also extensively researched and witten about the Aadhaar Scheme of the Government of India, specially from a privacy and technical point of view. CIS was part of the Group of Experts on Privacy constituted by the Planning Commission under the chairmanship of Justice AP Shah Committee and was instrumental in drafting a major part of the report of the Group. In this background CIS would like to mention that it is neither an expert on banking policy in general nor wishes to comment upon the purely banking related recommendations of the Committee. We would like to limit our recommendations to the areas in which we have some expertise and would therefore be commenting only on certain Recommendations of the Committee.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Before giving our individual comments on the relevant recommendations, CIS would like to make one broad comment with regard to the suggestions dealing with linking of Aadhaar numbers with bank accounts. Aadhaar is increasingly being used by the government in various departments as a means to prevent fraud, however there is a serious dearth of evidence to suggest that Aadhaar linkage actually prevents leakages in government schemes. The same argument would be applicable when Aadhaar numbers are sought to be utilized to prevent leakages in the banking sector.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another problem with linking bank accounts with Aadhaar numbers, even if it is not mandatory, is that when the RBI issues an advisory to (optionally) link Aadhaar numbers with bank accounts, a number of banks may implement the advisory too strictly and refuse service to customers (especially marginal customers) whose bank accounts are not linked to their Aadhaar numbers, perhaps due to technical problems in the registration procedure, thereby denying those individuals access to the banking sector, which is contrary to the aims and objectives of the Committee and the stated policy of the RBI to improve access to banking.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Individual Comments&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 1.4 - Given the predominance of individual account holdings, the Committee recommends that a unique biometric identifier such as Aadhaar should be linked to each individual credit account and the information shared with credit information companies. This will not only be useful in identifying multiple accounts, but will also help in mitigating the overall indebtedness of individuals who are often lured into multiple borrowings without being aware of its consequences.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: The discussion of the committee before making this recommendation revolves around the total incidence of indebtedness in rural areas and their Debt-to-Asset ratio representing payment capacity. However, the committee has not discussed any evidence which indicates that borrowing from multiple banks leads to greater indebtedness for individual account holders in the rural sector. Without identifying the problem through evidence the Committee has suggested linking bank accounts with Aadhaar numbers as a solution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 2.2 - On the basis of cross-country evidence and our own experience, the Committee is of the view that to translate financial access into enhanced convenience and usage, there is a need for better utilization of the mobile banking facility and the maximum possible G2P payments, which would necessitate greater engagement by the government in the financial inclusion drive.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: The drafting of the recommendation suggests that RBI is batting for the DBT rather than the subsidy model. However an examination of the discussion in the report suggests that all that the Committee has not discussed or examined the subsidy model vis-à-vis the direct benefit transfer (DBT) model here (though it does recommend DBT in the chapter on G-2-P payments), but only is trying to say is that where government to people money transfer has to take place, it should take place using mobile banking, payment wallets or other such technologies, which have been known to be successful in various countries across the world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 3.1 - The Committee recommends that in order to increase formal credit supply to all agrarian segments, the digitization of land records should be taken up by the states on a priority basis.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 3.2 - In order to ensure actual credit supply to the agricultural sector, the Committee recommends the introduction of Aadhaar-linked mechanism for Credit Eligibility Certificates. For example, in Andhra Pradesh, the revenue authorities issue Credit Eligibility Certificates to Tenant Farmers (under ‘Andhra Pradesh Land Licensed Cultivators Act No 18 of 2011'). Such tenancy /lease certificates, while protecting the owner’s rights, would enable landless cultivators to obtain loans. The Reserve Bank may accordingly modify its regulatory guidelines to banks to directly lend to tenants / lessees against such credit eligibility certificates.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: The Committee in its discussion before the recommendation 3.2 has discussed the problems faced by landless farmers, however there is no discussion or evidence which suggests that an Aadhaar linked Credit Eligibility Certificate is the best solution, or even a solution to the problem. The concern being expressed here is not with the system of a Credit Eligibility Certificate, but with the insistence on linking it to an Aadhaar number, and whether the system can be put in place without linking the same to an Aadhaar number.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 6.11 - Keeping in view the indebtedness and rising delinquency, the Committee is of the view that the credit history of all SHG members would need to be created, linking it to individual Aadhaar numbers. This will ensure credit discipline and will also provide comfort to banks.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: There is no discussion in the Report on the reasons for increase in indebtedness of SHGs. While the recommendation of creating credit histories for SHGs is laudable and very welcome, however there is no logical reason that has been brought out in the Report as to why the same needs to be linked to individual Aadhaar numbers and how such linkage will solve any problems.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 6.13 - The Committee recommends that bank credit to MFIs should be encouraged. The MFIs must provide credit information on their borrowers to credit bureaus through Aadhaar-linked unique identification of individual borrowers.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: Since the discussion before this recommendation clearly indicates multiple lending practices as one of the problems in the Microfinance sector and also suggests better credit information of borrowers as a possible solution, therefore this recommendation per se, seems sound. However, we would still like to point out that the RBI may think of alternative means to get borrower credit history rather than relying upon just the Aadhaar numbers.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 7.3 - Considering the widespread availability of mobile phones across the country, the Committee recommends the use of application-based mobiles as PoS for creating necessary infrastructure to support the large number of new accounts and cards issued under the PMJDY. Initially, the FIF can be used to subsidize the associated costs. This will also help to address the issue of low availability of PoS compared to the number of merchant outlets in the country. Banks should encourage merchants across geographies to adopt such applicationbased mobile as a PoS through some focused education and PoS deployment drives.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 7.5 - The Committee recommends that the National Payments Corporation of India (NPCI) should ensure faster development of a multi-lingual mobile application for customers who use non-smart phones, especially for users of NUUP; this will address the issue of linguistic diversity and thereby promote its popularization and quick adoption.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 7.8 - The Committee recommends that pre-paid payment instrument (PPI) interoperability may be allowed for non-banks to facilitate ease of access to customers and promote wider spread of PPIs across the country. It should however require non-bank PPI operators to enhance their customer grievance redressal mechanism to deal with any issues thereof.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 7.9 - The Committee is of the view that for non-bank PPIs, a small-value cashout may be permitted to incentivize usage with the necessary safeguards including adequate KYC and velocity checks.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comments&lt;/strong&gt;: While CIS supports the effort to use technology and mobile phones to increase banking penetration and improve access to the formal financial sector for rural and semi-rural areas, sufficient security mechanisms should be put in place while rolling out these services keeping in mind the low levels of education and technical sophistication that are prevalent in rural and semi-rural areas.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 8.1 - The Committee recommends that the deposit accounts of beneficiaries of government social payments, preferably all deposits accounts across banks, including the ‘inprinciple’ licensed payments banks and small finance banks, be seeded with Aadhaar in a timebound manner so as to create the necessary eco-system for cash transfer. This could be complemented with the necessary changes in the business correspondent (BC) system (see Chapter 6 for details) and increased adoption of mobile wallets to bridge the ‘last mile’ of service delivery in a cost-efficient manner at the convenience of the common person. This would also result in significant cost reductions for the government besides promoting financial inclusion.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: While the report of the Committee has already given several examples of how cash transfer directly into the bank accounts (rather than requiring the beneficiaries to be at a particular place at a particular time) could be more efficient as well as economical, the Committee is making the same point again here under the chapter that deals specifically with government to person payments. However even before this recommendation, there has been no discussion as to the need for linking or “seeding” the deposit accounts of the beneficiaries with Aadhaar numbers, let alone a discussion of how it would solve any problems.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 10.6 - Given the focus on technology and the increasing number of customer complaints relating to debit/credit cards, the National Payments Corporation of India (NPCI) may be invited to SLBC meetings. They may particularly take up issues of Aadhaar-linkage in bank and payment accounts.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: There is no discussion on why this recommendation has been made, more particularly; there is no discussion at all on why issues of Aadhaar linkage in bank and payment accounts need to be taken up at all.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion'&gt;http://editors.cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Financial Inclusion</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-03-01T13:53:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/summary-of-the-public-consultation-by-vigyan-foundation-oxfam-india-and-g-b-pant-institute-allahabad">
    <title>Summary of the Public Consultation by Vigyan Foundation, Oxfam India and G.B. Pant Institute, Allahabad</title>
    <link>http://editors.cis-india.org/internet-governance/blog/summary-of-the-public-consultation-by-vigyan-foundation-oxfam-india-and-g-b-pant-institute-allahabad</link>
    <description>
        &lt;b&gt;On December 22nd and 23rd a public consultation was organized by the Vigyan Foundation, Oxfam India and G.B. Pant Institute, Allahabad at the GB Pant Social Science Institute, Allahabad to discuss the issues related to making Allahabad into a Smart City under the Smart On December 22nd and 23rd a public consultation was organized by the Vigyan Foundation, Oxfam India and G.B. Pant Institute, Allahabad at the GB Pant Social Science Institute, Allahabad to discuss the issues related to making Allahabad into a Smart City under the Smart City scheme of the Central Government. An agenda for the same is attached herewith. City scheme of the Central Government. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet and Society, Bangalore (CIS) is researching  the 100 Smart City Scheme from the perspective of Big Data and is seeking to understand the role of Big Data in smart cities in India as well as the impact of the generation and use of the same. CIS is also examining whether the current legal framework is adequate to deal with these new technologies. It was in this background that CIS attended a part of the workshop.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the outset the organizers had noted that there will be no discussion on technology and its adoption in this particular workshop.. The format involved a speaker providing his/her viewpoint on the topic concerned and  the discussion revolved mainly around problems relating to traffic, parking, roads, drainage, etc. and there was no discussion of technology or how to utilise it to solve these problems. From the discussions CIS has had with certain people who are quite involved with these public consultations, the impression that we have is that the solutions to these problems were not very complicated and required only some intent and execution, and if that was achieved it would go a long way in improving the infrastructure of the city. This perspective raises the question of whether or not India needs 'Smart Cities' to improve the life of residents or if basic urban solutions are adequate and are in fact needed to lay the foundation for any potential smart city that might be established in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is quite interesting to see the difference in the levels at which the debate on smart cities is happening, in that when the central government talks about smart cities they try to highlight technology and other aspects such as smart meters, smart grids, etc. while the discussion on the ground in the actual cities is currently at a much more basic stage. For example the government website for the smart city project, while describing a &lt;a class="external-link" href="http://smartcities.gov.in/writereaddata/What%20is%20Smart%20City.pdf"&gt;smart city&lt;/a&gt;, mentions a number of “smart solutions” such as “electronic service delivery”, “smart meters” for water, “smart meters” for electricity, “smart parking”, Intelligent Traffic Management”, “Tele-medicine”, etc. Even in all the major public service announcements on the smart city project, the government effort seems to be to focus on these “smart solutions”, projecting technology as the answer to urban problems. However those in the cities themselves appear to be more concerned with adequate parking, adequate water supply, proper roads, waste disposal, etc. This difference in approach is only representative of the yawning gap between the mindspace of those who conceive these schemes and market them on the one hand and those who are tasked with implementing the schemes on the other hand as well as the realities of what cities in India need to address problems related to infrastructure and functioning. However the silver lining in this scenario, atleast on a personal level, is that the people on the ground, are not blindly turning to technology to solve their problems but actually trying to look for the best solutions regardless of whether it is a technology based solution or not.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;img src="http://editors.cis-india.org/home-images/Rashtriya1.jpg" alt="Rashtriya 1" class="image-inline" title="Rashtriya 1" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="http://editors.cis-india.org/home-images/Rashtriya2.jpg" alt="Rashtriya 2" class="image-inline" title="Rashtriya 2" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/summary-of-the-public-consultation-by-vigyan-foundation-oxfam-india-and-g-b-pant-institute-allahabad'&gt;http://editors.cis-india.org/internet-governance/blog/summary-of-the-public-consultation-by-vigyan-foundation-oxfam-india-and-g-b-pant-institute-allahabad&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Smart Cities</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-28T15:22:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/transparency-in-surveillance">
    <title>Transparency in Surveillance</title>
    <link>http://editors.cis-india.org/internet-governance/blog/transparency-in-surveillance</link>
    <description>
        &lt;b&gt;Transparency is an essential need for any democracy to function effectively. It may not be the only requirement for the effective functioning of a democracy, but it is one of the most important principles which need to be adhered to in a democratic state.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A democracy involves the state machinery being 	accountable to the citizens that it is supposed to serve, and for the citizens to be able to hold their state machinery accountable, they need accurate and 	adequate information regarding the activities of those that seek to govern them. However, in modern democracies it is often seen that those in governance 	often try to circumvent legal requirements of transparency and only pay lip service to this principle, while keeping their own functioning as opaque as 	possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This tendency to not give adequate information is very evident in the departments of the government which are concerned with surveillance, and merit can be 	found in the argument that all of the government's clandestine surveillance activities cannot be transparent otherwise they will cease to be "clandestine" 	and hence will be rendered ineffective. However, this argument is often misused as a shield by the government agencies to block the disclosure of all types 	of information about their activities, some of which may be essential to determine whether the current surveillance regime is working in an effective, 	ethical, and legal manner or not. It is this exploitation of the argument, which is often couched in the language of or coupled with concerns of national 	security, that this paper seeks to address while voicing the need for greater transparency in surveillance activities and structures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the first section the paper examines the need for transparency, and specifically deals with the requirement for transparency in surveillance. In the 	next part, the paper discusses the regulations governing telecom surveillance in India. The final part of the paper discusses possible steps that may be 	taken by the government in order to increase transparency in telecom surveillance while keeping in mind that the disclosure of such information should not 	make future surveillance ineffective.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Need for Transparency&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In today's age where technology is all pervasive, the term "surveillance" has developed slightly sinister overtones, especially in the backdrop of the 	Edward Snowden fiasco. Indeed, there have been several independent scandals involving mass surveillance of people in general as well as illegal 	surveillance of specific individuals. The fear that the term surveillance now invokes, especially amongst those social and political activists who seek to 	challenge the status quo, is in part due to the secrecy surrounding the entire surveillance regime. Leaving aside what surveillance is carried out, upon 	whom, and when - the state actors are seldom willing and open to talk about how surveillance is carried out, how decisions regarding who and how to target, 	are reached, how agency budgets are allocated and spent, how effective surveillance actions were, etc. While there may be justified security based 	arguments to not disclose the full extent of the state's surveillance activities, however this cloak of secrecy may be used illegally and in an 	unauthorized manner to achieve ends more harmful to citizen rights than the maintenance of security and order in the society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance and interception/collection of communications data can take place under different legal processes in different countries, ranging from 	court-ordered requests of specified data from telecommunications companies to broad executive requests sent under regimes or regulatory frameworks 	requiring the disclosure of information by telecom companies on a pro-active basis. However, it is an open secret that data collection often takes place 	without due process or under non-legal circumstances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is widely believed that transparency is a critical step towards the creation of mechanisms for increased accountability through which law enforcement 	and government agencies access communications data. It is the first step in the process of starting discussions and an informed public debate regarding how 	the state undertakes activities of surveillance, monitoring and interception of communications and data. Since 2010, a large number of ICT companies have 	begun to publish transparency reports on the extent that governments request their user data as well as requirements to remove content. However, 	governments themselves have not been very forthcoming in providing such detailed information on surveillance programs which is necessary for an informed 	debate on this issue.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; Although some countries currently report limited information on their surveillance 	activities, e.g. the U.S. Department of Justice publishes an annual Wiretap Report (U.S. Courts, 2013a), and the United Kingdom publishes the Interception 	of Communications Commissioner Annual Report (May, 2013), which themselves do not present a complete picture, however even such limited measures are 	unheard of in a country such as India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is obvious that Governments can provide a greater level of transparency regarding the limits in place on the freedom of expression and privacy than 	transparency reports by individual companies. Company transparency reports can only illuminate the extent to which any one company receives requests and 	how that company responds to them. By contrast, government transparency reports can provide a much greater perspective on laws that can potentially restrict the freedom of expression or impact privacy by illustrating the full extent to which requests are made across the ICT industry.	&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, the courts and the laws have traditionally recognized the need for transparency and derive it from the fundamental right to freedom of speech and 	expression guaranteed in our Constitution. This need coupled with a sustained campaign by various organizations finally fructified into the passage of the 	Right to Information Act, 2005, (RTI Act) which amongst other things also places an obligation on the sate to place its documents and records online so 	that the same may be freely available to the public. In light of this law guaranteeing the right to information, the citizens of India have the fundamental 	right to know what the Government is doing in their name. The free flow of information and ideas informs political growth and the freedom of speech and 	expression is the lifeblood of a healthy democracy, it acts as a safety valve. People are more ready to accept the decisions that go against them if they 	can in principle seem to influence them. The Supreme Court of India is of the view that the imparting of information about the working of the government on 	the one hand and its decision affecting the domestic and international trade and other activities on the other is necessary, and has imposed an obligation 	upon the authorities to disclose information.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court, in &lt;i&gt;Namit Sharma&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;,&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; while discussing the importance of 	transparency and the right to information has held:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Right to Information was harnessed as a tool for promoting development; strengthening the democratic governance and effective delivery of 	socio-economic services. 	&lt;i&gt; Acquisition of information and knowledge and its application have intense and pervasive impact on the process of taking informed decision, resulting in 		overall productivity gains &lt;/i&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;……..&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government procedures and regulations shrouded in the veil of secrecy do not allow the litigants to know how their cases are being handled. They shy away 	from questioning the officers handling their cases because of the latters snobbish attitude. Right to information should be guaranteed and needs to be given real substance. In this regard, the Government must assume a major responsibility and mobilize skills to ensure flow of information to citizens.	&lt;i&gt;The traditional insistence on secrecy should be discarded.&lt;/i&gt;"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although these statements were made in the context of the RTI Act the principle which they try to illustrate can be understood as equally applicable to the 	field of state sponsored surveillance. Though Indian intelligence agencies are exempt from the RTI Act, it can be used to provide limited insight into the 	scope of governmental surveillance. This was demonstrated by the Software Freedom Law Centre, who discovered via RTI requests that approximately 7,500 - 	9,000 interception orders are sent on a monthly basis.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is true that transparency alone will not be able to eliminate the barriers to freedom of expression or harm to privacy resulting from overly broad 	surveillance,, transparency provides a window into the scope of current practices and additional measures are needed such as oversight and mechanisms for 	redress in cases of unlawful surveillance. Transparency offers a necessary first step, a foundation on which to examine current practices and contribute to 	a debate on human security and freedom.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is no secret that the current framework of surveillance in India is rife with malpractices of mass surveillance and instances of illegal surveillance. 	There have been a number of instances of illegal and/or unathorised surveillance in the past, the most scandalous and thus most well known is the incident 	where a woman IAS officer was placed under surveillance at the behest of Mr. Amit Shah who is currently the president of the ruling party in India 	purportedly on the instructions of the current prime minister Mr. Narendra Modi.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; There are also a number 	of instances of private individuals indulging in illegal interception and surveillance; in the year 2005, it was reported that Anurag Singh, a private 	detective, along with some associates, intercepted the telephonic conversations of former Samajwadi Party leader Amar Singh. They allegedly contacted 	political leaders and media houses for selling the tapped telephonic conversation records. The interception was allegedly carried out by stealing the genuine government letters and forging and fabricating them to obtain permission to tap Amar Singh's telephonic conversations.	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; The same individual was also implicated for tapping the telephone of the current finance minister Mr. 	Arun Jaitely.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is therefore obvious that the status quo with regard to the surveillance mechanism in India needs to change, but this change has to be brought about in 	a manner so as to make state surveillance more accountable without compromising its effectiveness and addressing legitimate security concerns. Such changes 	cannot be brought about without an informed debate involving all stakeholders and actors associated with surveillance, however the basic minimum 	requirement for an "informed" debate is accurate and sufficient information about the subject matter of the debate. This information is severely lacking in 	the public domain when it comes to state surveillance activities - with most data points about state surveillance coming from news items or leaked 	information. Unless the state becomes more transparent and gives information about its surveillance activities and processes, an informed debate to 	challenge and strengthen the status quo for the betterment of all parties cannot be started.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Current State of Affairs&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Surveillance laws in India are extremely varied and have been in existence since the colonial times, remnants of which are still being utilized by the 	various State Police forces. However in this age of technology the most important tools for surveillance exist in the digital space and it is for this 	reason that this paper shall focus on an analysis of surveillance through interception of telecommunications traffic, whether by tracking voice calls or 	data. The interception of telecommunications actually takes place under two different statutes, the Telegraph Act, 1885 (which deals with interception of 	calls) as well as the Information Technology Act, 2000 (which deals with interception of data).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the telecom surveillance is done as per the procedure prescribed in the Rules under the relevant sections of the two statutes mentioned above,	&lt;i&gt;viz. &lt;/i&gt;Rule 419A of the Telegraph Rules, 1951 for surveillance under the Telegraph Act, 1885 and the Information Technology (Procedure and 	Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 for surveillance under the Information Technology Act, 2000. These Rules put in place various checks and balances and try to ensure that there is a paper trail for every interception request.	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The assumption is that the generation of a paper trail would reduce the number of unauthorized 	interception orders thus ensuring that the powers of interception are not misused. However, even though these checks and balances exist on paper as 	provided in the laws, there is not enough information in the public domain regarding the entire mechanism of interception for anyone to make a judgment on 	whether the system is working or not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As mentioned earlier, currently the only sources of information on interception that are available in the public domain are through news reports and a 	handful of RTI requests which have been filed by various activists.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; The only other institutionalized 	source of information on surveillance in India is the various transparency reports brought out by companies such as Google, Yahoo, Facebook, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, Google was the first major corporation to publish a transparency report in 2010 and has been updating its report ever since. The latest data that 	is available for Google is for the period between January, 2015 to June, 2015 and in that period Google and Youtube together received 3,087 requests for 	data which asked for information on 4,829 user accounts from the Indian Government. Out of these requests Google only supplied information for 44% of the 	requests.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; Although Google claims that they "review each request to make sure that it complies with both 	the spirit and the letter of the law, and we may refuse to produce information or try to narrow the request in some cases", it is not clear why Google 	rejected 56% of the requests. It may also be noted that the number of requests for information that Google received from India were the fifth highest 	amongst all the other countries on which information was given in the Transparency Report, after USA, Germany, France and the U.K.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook's transparency report for the period between January, 2015 to June, 2015 reveals that Facebook received 5,115 requests from the Indian Government 	for 6,268 user accounts, out of which Facebook produced data in 45.32% of the cases.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; Facebook's 	transparency report claims that they respond to requests relating to criminal cases and "Each and every request we receive is checked for legal sufficiency 	and we reject or require greater specificity on requests that are overly broad or vague." However, even in Facebook's transparency report it is unclear why 	55.68% of the requests were rejected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Yahoo transparency report also gives data from the period between January 1, 2015 to June 30, 2015 and reveals that Yahoo received 831 requests for 	data, which related to 1,184 user accounts from the Indian Government. The Yahoo report is a little more detailed and also reveals that 360 of the 831 	requests were rejected by Yahoo, however no details are given as to why the requests were rejected. The report also specifies that in 63 cases, no data was found by Yahoo, in 249 cases only non content data&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; was disclosed while in 159 cases content	&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; was disclosed. The Yahoo report also claims that "We carefully scrutinize each request to make sure 	that it complies with the law, and we push back on those requests that don't satisfy our rigorous standards."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Vodafone Transparency Report gives information regarding government requests for data in other jurisdictions,	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; it does not give any information on government requests in India. This is because Vodafone interprets 	the provisions contained in Rule 25(4) of the IT (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 	(Interception Rules) and Rule 11 of the IT (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009 as well as Rule 	419A(19) of the Indian Telegraph Rules, 1954 which require service providers to maintain confidentiality/secrecy in matters relating to interception, as 	being a legal prohibition on Vodafone to reveal such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the four major companies discussed above, there are a large number of private corporations which have published transparency reports in order to 	acquire a sense of trustworthiness amongst their customers. Infact, the Ranking Digital Rights Project has been involved in ranking some of the biggest 	companies in the world on their commitment to accountability and has brought out the Ranking Digital Rights 2015 Corporate Accountability Index that has 	analysed a representative group of 16 companies "that collectively hold the power to shape the digital lives of billions of people across the globe".&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Suggestions on Transparency&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is clear from the discussions above, as well as a general overview of various news reports on the subject, that telecom surveillance in India is 	shrouded in secrecy and it appears that a large amount of illegal and unauthorized surveillance is taking place behind the protection of this veil of 	secrecy. If the status quo continues, then it is unlikely that any meaningful reforms would take place to bring about greater accountability in the area of 	telecom surveillance. It is imperative, for any sort of changes towards greater accountability to take place, that we have enough information about what 	exactly is happening and for that we need greater transparency since transparency is the first step towards greater accountability.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Transparency Reports&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In very simplistic terms transparency, in anything, can best be achieved by providing as much information about that thing as possible so that there are no 	secrets left. However, it would be naïve to say that all information about interception activities can be made public on the altar of the principle of 	transparency, but that does not mean that there should be no information at all on interception. One of the internationally accepted methods of bringing 	about transparency in interception mechanisms, which is increasingly being adopted by both the private sector as well as governments, is to publish 	Transparency Reports giving various details of interception while keeping security concerns in mind. The two types of transparency reports that we require 	in India and what that would entail is briefly discussed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;By the Government&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem with India's current regime for interception is that the entire mechanism appears more or less adequate on paper with enough checks and 	balances involved in it to prevent misuse of the allotted powers. However, because the entire process is veiled in secrecy, nobody knows exactly how good 	or how rotten the system has become and whether it is working to achieve its intended purposes. It is clear that the current system of interception and 	surveillance being followed by the government has some flaws, as can be gathered from the frequent news articles which talk about incidents of illegal 	surveillance. However, without any other official or more reliable sources of information regarding surveillance activities these anecdotal pieces of 	evidence are all we have to shape the debate regarding surveillance in India. It is only logical then that the debate around surveillance, which is 	informed by such sketchy and unreliable news reports will automatically be biased against the current mechanism since the newspapers would also only be 	interested in reporting the scandalous and the extraordinary incidents. For example, some argue that the government undertakes mass surveillance, while 	others argue that India only carries out targeted surveillance, but there is not enough information publicly available for a third party to support or 	argue against either claim. It is therefore necessary and highly recommended that the government start releasing a transparency report such as the one's 	brought out by the United States and the UK as mentioned above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no need for a separate department or authority just to make the transparency report and this task could probably be performed in-house by any 	department, but considering the sector involved, it would perhaps be best if the Department of Telecommunications is given the responsibility to bring out 	a transparency report. These transparency reports should contain certain minimum amount of data for them to be an effective tool in informing the public 	discourse and debate regarding surveillance and interception. The report needs to strike a balance between providing enough information so that an informed 	analysis can be made of the effectiveness of the surveillance regime without providing so much information so as to make the surveillance activities 	ineffective. Below is a list of suggestions as to what kind of data/information such reports should contain:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Reports should contain data regarding the number of interception orders that have been passed. This statistic would be extremely useful in 	determining how elaborate and how frequently the state indulges in interception activities. This information would be easily available since all 	interception orders have to be sent to the Review Committee set up under Rule 419A of the Telegraph Rules, 1954.&lt;/li&gt;
&lt;li&gt;The Report should contain information on the procedural aspects of surveillance including the delegation of powers to different authorities and 	individuals, information on new surveillance schemes, etc. This information would also be available with the Ministry of Home Affairs since it is a 	Secretary or Joint Secretary level officer in the said Ministry which is supposed to authorize every order for interception.&lt;/li&gt;
&lt;li&gt;The report should contain an aggregated list of reasons given by the authorities for ordering interception. This information would reveal whether 	the authorities are actually ensuring legal justification before issuing interception or are they just paying lip service to the rules to ensure a proper 	paper trail. Since every order of interception has to be in writing, the main reasons for interception can easily be gleaned from a perusal of the orders.&lt;/li&gt;
&lt;li&gt;It should also reveal the percentage of cases where interception has actually found evidence of culpability or been successful in prevention of 	criminal activities. This one statistic would itself give a very good review of the effectiveness of the interception regime. Granted that this information 	may not be very easily obtainable, but it can be obtained with proper coordination with the police and other law enforcement agencies.&lt;/li&gt;
&lt;li&gt;The report should also reveal the percentage of order that have been struck down by the Review Committee as not following the process envisaged 	under the various Rules. This would give a sense of how often the Rules are being flouted while issuing interception orders. This information can easily be 	obtained from the papers and minutes of the meetings of the Review Committee.&lt;/li&gt;
&lt;li&gt;The report should also state the number of times the Review Committee has met in the period being reported upon. The Review Committee is an 	important check on the misuse of powers by the authorities and therefore it is important that the Review Committee carries out its activities in a diligent 	manner.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;It may be noted here that some provisions of the Telegraph Rules, 1954 especially sub-Rules 17 and 18 of Rule 419A as well as Rules 22, 23(1) and 25 of the 	Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009 may need to be amended so as to 	make them compliant with the reporting mechanism proposed above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;By the Private Sector&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have already discussed above the transparency reports published by certain private companies. Suffice it to say that reports from private companies 	should give as much of the information discussed under government reports as possible and/or applicable, since they may not have a large amount of the 	information that is sought to be published in the government reports such as whether the interception was successful, the reasons for interception, etc. It 	is important to have ISPs provide such transparency reports as this will provide two different data points for information on interception and the very 	existence of these private reports may act as a check to ensure the veracity of the government transparency reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As in the case of government reports, for the transparency reports of the private sector to be effective, certain provisions of the Telegraph Rules, 1954 	and the Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009, viz. sub-Rules 14, 15 and 	19 of Rule 419A of the Telegraph Rules, 1954 and Rules 20, 21, 23(1) and 25 of the Information Technology (Procedure and Safeguards for Monitoring and 	Collecting Traffic Data or Information) Rules, 2009.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Overhaul of the Review Committee&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Review Committee which acts as a check on the misuse of powers by the competent authorities is a very important cog in the entire process. However, it 	is staffed entirely by the executive and does not have any members of any other background. Whilst it is probably impractical to have civilian members in 	the Review Committee which has access to potentially sensitive information, it is extremely essential that the Committee has wider representation from 	other sectors specially the judiciary. One or two members from the judiciary on the Review Committee would provide a greater check on the workings of the 	Committee as this would bring in representation from the judicial arm of the State so that the Review Committee does not remain a body manned purely by the 	executive branch. This could go some ways to ensure that the Committee does not just "rubber stamp" the orders of interception issued by the various 	competent authorities.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is not in dispute that there is a need for greater transparency in the government's surveillance activities in order to address the problems associated 	with illegal and unauthorised interceptions. This paper is not making the case that greater transparency in and by itself will be able to solve the 	problems that may be associated with the government's currency interception and surveillance regime, however it is not possible to address any problem 	unless we know the real extent of it. It is essential for an informed debate and discussion that the people participating in the discussion are "informed", 	i.e. they should have accurate and adequate information regarding the issues which are being discussed. The current state of the debate on interception is 	rife with individuals using illustrative and anecdotal evidence which, in the absence of any other evidence, they assume to be the norm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A more transparent and forthcoming state machinery which regularly keeps its citizens abreast of the state of its surveillance regime would be likely to 	get better suggestions and perhaps less criticisms if it does come out that the checks and balances imposed in the regulations are actually making a 	difference to check unauthorized interceptions, and if not, then it is the right of the citizens to know about this and ask for reforms.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; James Losey, "Surveillance of Communications: A Legitimization Crisis and the Need for Transparency",			&lt;i&gt;International Journal of Communication 9(2015)&lt;/i&gt;, Feature 3450-3459, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Namit Sharma v. Union of India,			&lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566&lt;/a&gt; . Although the judgment was overturned on review, however this observation quoted above would still hold as it has not been specifically 			overturned.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;a href="http://sflc.in/wp-content/uploads/2014/09/SFLC-FINAL-SURVEILLANCE-REPORT.pdf"&gt; http://sflc.in/wp-content/uploads/2014/09/SFLC-FINAL-SURVEILLANCE-REPORT.pdf &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; James Losey, "Surveillance of Communications: A Legitimization Crisis and the Need for Transparency",			&lt;i&gt;International Journal of Communication 9 (2015)&lt;/i&gt;, Feature 3450-3459, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;a href="http://gulail.com/the-stalkers/"&gt;http://gulail.com/the-stalkers/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; &lt;a href="http://timesofindia.indiatimes.com/india/Amar-Singh-phone-tap-accused-tracked-Arun-Jaitleys-mobile/articleshow/18582508.cms"&gt; http://timesofindia.indiatimes.com/india/Amar-Singh-phone-tap-accused-tracked-Arun-Jaitleys-mobile/articleshow/18582508.cms &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; &lt;a href="http://ibnlive.in.com/news/arun-jaitley-phonetapping-case-all-accused-get-bail/394997-37-64.html"&gt; http://ibnlive.in.com/news/arun-jaitley-phonetapping-case-all-accused-get-bail/394997-37-64.html &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; For a detailed discussion of the Rules of interception please see Policy Paper on Surveillance in India, by Vipul Kharbanda, 			&lt;a href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india"&gt; http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; As an example please see 			&lt;a href="http://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india"&gt; http://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="https://www.google.com/transparencyreport/userdatarequests/countries/"&gt; https://www.google.com/transparencyreport/userdatarequests/countries/ &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; &lt;a href="https://govtrequests.facebook.com/country/India/2015-H1/"&gt;https://govtrequests.facebook.com/country/India/2015-H1/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Non-content data (NCD) such as basic subscriber information including the information captured at the time of registration such as an alternate 			e-mail address, name, location, and IP address, login details, billing information, and other transactional information (e.g., "to," "from," and 			"date" fields from email headers).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Data that users create, communicate, and store on or through Yahoo. This could include words in a communication (e.g., Mail or Messenger), photos 			on Flickr, files uploaded, Yahoo Address Book entries, Yahoo Calendar event details, thoughts recorded in Yahoo Notepad or comments or posts on 			Yahoo Answers or any other Yahoo property.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;a href="https://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement/country_by_country.html"&gt; https://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement/country_by_country.html &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/transparency-in-surveillance'&gt;http://editors.cis-india.org/internet-governance/blog/transparency-in-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2016-01-23T15:11:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/right-to-privacy-in-peril">
    <title>Right to Privacy in Peril</title>
    <link>http://editors.cis-india.org/internet-governance/blog/right-to-privacy-in-peril</link>
    <description>
        &lt;b&gt;It seems to have become quite a fad, especially amongst journalists, to use this headline and claim that the right to privacy which we consider so inherent to our being, is under attack. However, when I use this heading in this piece I am not referring to the rampant illegal surveillance being done by the government, or the widely reported recent raids on consenting (unmarried) adults who were staying in hotel rooms in Mumbai. I am talking about the fact that the Supreme Court of India has deemed it fit to refer the question of the very existence of a fundamental right to privacy to a Constitution Bench to finally decide the matter, and define the contours of such right if it does exist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In an order dated August 11, 2015 the Supreme Court finally gave in to the arguments advanced by the Attorney General and admitted that there is some “unresolved contradiction” regarding the existence of a constitutional “right to privacy” under the Indian Constitution and requested that a Constitutional Bench of appropriate strength.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court was hearing a petition challenging the implementation of the Adhaar Card Scheme of the government, where one of the grounds to challenge the scheme was that it was violative of the right to privacy guaranteed to all citizens under the Constitution of India. However to counter this argument, the State (via the Attorney General) challenged the very concept that the Constitution of India guarantees a right to privacy by relying on an “unresolved contradiction” in judicial pronouncements on the issue, which so far had only been of academic interest. This “unresolved contradiction” arose because in the cases of &lt;b&gt;&lt;i&gt;M.P. Sharma &amp;amp; Others v. Satish Chandra &amp;amp; Others&lt;/i&gt;&lt;/b&gt;,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of U.P. &amp;amp; Others,&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;b&gt;[2]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt;&lt;/i&gt;(decided by &lt;i&gt;Eight &lt;/i&gt;and &lt;i&gt;Six &lt;/i&gt;Judges respectively) the Supreme Court has categorically denied the existence of a right to privacy under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However somehow the later case of &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of M.P. and another&lt;/i&gt;,&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; (which was decided by a two Judge Bench of the Supreme Court) relied upon the opinion given by the minority of two judges in &lt;i&gt;Kharak Singh&lt;/i&gt; to hold that a right to privacy does exist and is guaranteed as a fundamental right under the Constitution of India.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; Thereafter a large number of cases have held the right to privacy to be a fundamental right, the most important of which are &lt;b&gt;&lt;i&gt;R. Rajagopal &amp;amp; Another &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of Tamil Nadu &amp;amp; Others,&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;b&gt;[5]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt;&lt;/i&gt;(popularly known as &lt;i&gt;Auto Shanker’s &lt;/i&gt;case) and &lt;b&gt;&lt;i&gt;People’s Union for Civil Liberties (PUCL) &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India &amp;amp; Another&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; However, as was noticed by the Supreme Court in its August 11 order, all these judgments were decided by two or three Judges only.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petitioners on the other hand made a number of arguments to counter those made by the Attorney General to the effect that the fundamental right to privacy is well established under Indian law and that there is no need to refer the matter to a Constitutional Bench. These arguments are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The observations made in &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;regarding the absence of right to privacy are not part of the &lt;i&gt;ratio decidendi&lt;/i&gt; of that case and, therefore, do not bind the subsequent smaller Benches such as &lt;b&gt;&lt;i&gt;R. Rajagopal &lt;/i&gt;&lt;/b&gt;and &lt;b&gt;&lt;i&gt;PUCL&lt;/i&gt;&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Even in &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;it was held that the right of a person not to be disturbed at his residence by the State is recognized to be a part of a fundamental right guaranteed under Article 21. It was argued that this is nothing but an aspect of privacy. The observation in para 20 of the majority judgment (quoted in footnote 2 above) at best can be construed only to mean that there is no fundamental right of privacy against the State’s authority to keep surveillance on the activities of a person. However, they argued that such a conclusion cannot be good law any more in view of the express declaration made by a seven-Judge bench decision of this Court in &lt;b&gt;&lt;i&gt;Maneka Gandhi &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India &amp;amp; Another&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Both &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;were decided on an interpretation of the Constitution based on the principles expounded in &lt;b&gt;&lt;i&gt;A.K. Gopalan &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of Madras&lt;/b&gt;&lt;/i&gt;,&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; which have themselves been declared wrong by a larger Bench in &lt;b&gt;&lt;i&gt;Rustom Cavasjee Cooper &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other than the points above, it was also argued that world over in all the countries where Anglo-Saxon jurisprudence is followed, ‘privacy’ is recognized as an important aspect of the liberty of human beings. The petitioners also submitted that it was too late in the day for the Union of India to argue that the Constitution of India does not recognize privacy as an aspect of the liberty under Article 21 of the Constitution of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However these arguments of the petitioners were not enough to convince the Supreme Court that there is no doubt regarding the existence and contours of the right to privacy in India. The Court, swayed by the arguments presented by the Attorney General, admitted that questions of far reaching importance for the Constitution were at issue and needed to be decided by a Constitutional Bench.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Giving some insight into its reasoning to refer this issue to a Constitutional Bench, the Court did seem to suggest that its decision to refer the matter to a larger bench was more an exercise in judicial propriety than an action driven by some genuine contradiction in the law. The Court said that if the observations in &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;were accepted as the law of the land, the fundamental rights guaranteed under the Constitution of India would get “denuded of vigour and vitality”. However the Court felt that institutional integrity and judicial discipline require that smaller benches of the Court follow the decisions of larger benches, unless they have very good reasons for not doing so, and since in this case it appears that the same was not done therefore the Court referred the matter to a larger bench to scrutinize the ratio of &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra)&lt;/i&gt; and decide the judicial correctness of subsequent two judge and three judge bench decisions which have asserted or referred to the right to privacy.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; AIR 1954 SC 300. In para 18 of the Judgment it was held: “A power of search and seizure is in any system of jurisprudence an overriding power of the State for the protection of social security and that power is necessarily regulated by law. When the Constitution makers have thought fit not to subject such regulation to constitutional limitations &lt;i&gt;by recognition of a fundamental right to privacy&lt;/i&gt;, analogous to the American Fourth Amendment, &lt;i&gt;we have no justification to import it, into a totally different fundamental right, by some process of strained construction&lt;/i&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; AIR 1963 SC 1295. In para 20 of the judgment it was held: “&lt;b&gt;… &lt;/b&gt;Nor do we consider that Art. 21 has any relevance in the context as was sought to be suggested by learned counsel for the petitioner. As already pointed out, &lt;i&gt;the right of privacy is not a guaranteed right under our Constitution&lt;/i&gt;and therefore the attempt to ascertain the movement of an individual which is merely a manner in which privacy is invaded is not an infringement of a fundamental right guaranteed by Part III.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; (1975) 2 SCC 148.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; It is interesting to note that while the decisions in both &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; were given in the context of similar facts (challenging the power of the police to make frequent domiciliary visits both during the day and night at the house of the petitioner) while the majority in &lt;i&gt;Kharak Singh&lt;/i&gt; specifically denied the existence of a fundamental right to privacy, however they held the conduct of the police to be violative of the right to personal liberty guaranteed under Article 21, since the Regulations under which the police actions were undertaken were themselves held invalid. On the other hand, while &lt;i&gt;Gobind&lt;/i&gt; held that a fundamental right to privacy does exist in Indian law, it may be interfered with by the State through procedure established by law and therefore upheld the actions of the police since they were acting under validly issued Regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; (1994) 6 SCC 632.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; (1997) 1 SCC 301.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; (1978) 1 SCC 248.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; AIR 1950 SC 27.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; (1970) 1 SCC 248.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/right-to-privacy-in-peril'&gt;http://editors.cis-india.org/internet-governance/blog/right-to-privacy-in-peril&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-13T15:32:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india">
    <title>Policy Paper on Surveillance in India</title>
    <link>http://editors.cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india</link>
    <description>
        &lt;b&gt;This policy brief analyses the different laws regulating surveillance at the State and Central level in India and calls out ways in which the provisions are unharmonized. The brief then provides recommendations for the harmonization of  surveillance law in India.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The current legal framework for surveillance in India is a legacy of the colonial era laws that had been drafted by the British. Surveillance activities by the police are an everyday phenomenon and are included as part of their duties in the various police manuals of the different states. It will become clear from an analysis of the laws and regulations below, that whilst the police manuals cover the aspect of physical surveillance in some detail, they do not discuss the issue of interception of telephone or internet traffic. These issues are dealt with separately under the Telecom Act and the Information Technology Act and the Rules made thereunder, which are applicable to all security agencies and not just the police. Since the Indian laws deal with different aspects of surveillance under different legislations, the regulations dealing with this issue do not have any uniform standards. This paper therefore argues that the need of the hour is to have a single legislation which deals with all aspects of surveillance and interception in one place so that there is uniformity in the laws and practices of surveillance in the entire country.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Legal Regime&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India does not have one integrated policy on surveillance and law enforcement and security agencies have to rely upon a number of different sectoral legislations to carry out their surveillance activities. These include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Police Surveillance under Police Acts and Model Police Manual&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 246(3) of the Constitution of India, read with Entry 2, List II, of the VIIth Schedule, empowers the States to legislate in matters relating to the police. This means that the police force is under the control of the state government rather than the Central government. Consequently, States have their own Police Acts to govern the conduct of the police force. Under the authority of these individual State Police Acts, rules are formulated for day-to-day running of the police. These rules are generally found in the Police Manuals of the individual states. Since a discussion of the Police Manual of each State with its small deviations is beyond the scope of this study, we will discuss the Model Police Manual issued by the Bureau of Police Research and Development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the Model Police Manual, “surveillance and checking of bad characters” is considered to be one of the duties of the police force mentioned in the “Inventory of Police Duties, Functions and Jobs”.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; Surveillance is also one of the main methods utilized by the police for preventing law and order situations and crimes.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; As per the Manual the nature and degree of surveillance depends on the circumstances and persons on whom surveillance is mounted and it is only in very rare cases and on rare occasions that round the clock surveillance becomes necessary for a few days or weeks.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Surveillance of History Sheeted Persons&lt;/i&gt;: Beat Police Officers should be fully conversant with the movements or changes of residence of all persons for whom history sheets of any category are maintained. They are required to promptly report the exact information to the Station House Officer (SHO), who make entries in the relevant registers. The SHO on the basis of this information reports, by the quickest means, to the SHO in whose jurisdiction the concerned person/persons are going to reside or pass through. When a history-sheeted person is likely to travel by the Railway, intimation of his movements should also be given to the nearest Railway Police Station.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; It must be noted that the term “history sheet” or “history sheeter” is not defined either in the Indian Penal Code, 1860, most of the State Police Acts or the Model Police Manual, but it is generally understood and defined in the Oxford English Dictionary as persons with a criminal record.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Surveillance of “Bad Characters”&lt;/i&gt;: Keeping tabs on and getting information regarding “bad characters” is part of the duties of a beat constable. In the case of a “bad character” who is known to have gone to another State, the SHO of the station in the other state is informed using the quickest means possible followed by sending of a BC Roll 'A' directly to the SHO.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; When a “bad character” absents himself or goes out of view, whether wanted in a case or not, the information is required to be disseminated to the police stations having jurisdiction over the places likely to be visited by him and also to the neighbouring stations, whether within the State or outside. If such person is traced and intimation is received of his arrest or otherwise, arrangements to get a complete and true picture of his activities are required to be made and the concerned record updated.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Police Manual clarifies the term “bad characters” to mean “offenders, criminals, or members of organised crime gangs or syndicates or those who foment or incite caste, communal violence, for which history sheets are maintained and require surveillance.”&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; A fascinating glimpse into the history of persons who were considered to be “bad characters” is contained in the article by Surjan Das &amp;amp; Basudeb Chattopadhyay in EPW&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; wherein they bring out the fact that in colonial times a number of the stereotypes propagated by the British crept into their police work as well. It appears that one did not have to be convicted to be a bad character, but people with a dark complexion, strong built, broad chins, deep-set eyes, broad forehead, short hair, scanty or goatee beard, marks on face, moustache, blunt nose, white teeth and monkey-face would normally fit the description of “bad characters”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Surveillance of Suspicious Strangers&lt;/i&gt;: When a stranger of suspicious conduct or demeanour is found within the limits of a police station, the SHO is required to forward a BC Roll to the Police Station in whose jurisdiction the stranger claims to have resided. The receipt of such a roll is required to be immediately acknowledged and replied. If the suspicious stranger states that he resides in another State, a BC Roll is sent directly to the SHO of the station in the other State.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The manual however, does not define who a “suspicious stranger” is and how to identify one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Release of Foreign Prisoners&lt;/i&gt;: Before a foreign prisoner (whose finger prints are taken for record) is released the Superintendent of Police of the district where the case was registered is required to send a report to the Director, I.B. through the Criminal Investigation Department informing the route and conveyance by which such person is likely to leave the country.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Shadowing of convicts and dangerous persons:&lt;/i&gt; The Police Manual contains the following rules for shadowing the convicts on their release from jails:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Dangerous convicts who are not likely to return to their native places are required to be shadowed. The fact, when a convict is to be shadowed is entered in the DCRB in the FP register and communicated to the Superintendent of Jails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) The Police Officer deputed for shadowing an ex-convict is required to enter the fact in the notebook. The Police Officers area furnished with a challan indicating the particulars of the ex-convict marked for shadowing. This form is returned by the SHO of the area where the ex-convict takes up his residence or passes out of view to the DCRB / OCRS where the jail is situated, where it is put on record for further reference and action if any. Even though the subjects being shadowed are kept in view, no restraint is to put upon their movements on any account.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the provisions discussed above, there are also provisions in the Police Manual regarding surveillance of convicts who have been released on medical grounds as well as surveillance of ex-convicts who are required to report their movements to the police as per the provisions of section 356 of the Code of Criminal Procedure.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted above, the various police manuals are issued under the State Police Acts and they govern the police force of the specific states. The fact that each state has its own individual police manual itself leads to non-uniformity regarding standards and practices of surveillance. But it is not only the legislations at the State levels which lead to this problem, even legislation at the Central level, which are applicable to the country as a whole also have differing standards regarding different aspects of surveillance. In order to explore this further, we shall now discuss the central legislations dealing with surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. The Indian Telegraph Act, 1885&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 5 of the Indian Telegraph Act, 1885, empowers the Central Government and State Governments of India to order the interception of messages in two circumstances: (1) in the occurrence of any public emergency or in the interest of public safety, and (2) if it is considered necessary or expedient to do so in the interest of:&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;the sovereignty and integrity of India; or&lt;/li&gt;
&lt;li&gt;the security of the State; or&lt;/li&gt;
&lt;li&gt;friendly relations with foreign states; or&lt;/li&gt;
&lt;li&gt;public order; or&lt;/li&gt;
&lt;li&gt;for preventing incitement to the commission of an offence.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court of India has specified the terms 'public emergency' and 'public safety', based on the following&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"Public emergency would mean the prevailing of a sudden condition or state of affairs affecting the people at large calling for immediate action. The expression 'public safety' means the state or condition of freedom from danger or risk for the people at large. When either of these two conditions are not in existence, the Central Government or a State Government or the authorised officer cannot resort to telephone tapping even though there is satisfaction that it is necessary or expedient so to do in the interests of it sovereignty and integrity of India etc. In other words, even if the Central Government is satisfied that it is necessary or expedient so to do in the interest of the sovereignty and integrity of India or the security of the State or friendly relations with sovereign States or in public order or for preventing incitement to the commission of an offence, it cannot intercept the message, or resort to telephone tapping unless a public emergency has occurred or the interest of public safety or the existence of the interest of public safety requires. Neither the occurrence of public emergency nor the interest of public safety are secretive conditions or situations. Either of the situations would be apparent to a reasonable person."&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2007, Rule 419A was added to the Indian Telegraph Rules, 1951 framed under the Indian Telegraph Act which provided that orders on the interception of communications should only be issued by the Secretary in the Ministry of Home Affairs. However, it provided that in unavoidable circumstances an order could also be issued by an officer, not below the rank of a Joint Secretary to the Government of India, who has been authorised by the Union Home Secretary or the State Home Secretary.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Rule 419A, the interception of any message or class of messages is to be carried out with the prior approval of the Head or the second senior most officer of the authorised security agency at the Central Level and at the State Level with the approval of officers authorised in this behalf not below the rank of Inspector General of Police, in the belowmentioned emergent cases:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;in remote areas, where obtaining of prior directions for interception of messages or class of messages is not feasible; or&lt;/li&gt;
&lt;li&gt;for operational reasons, where obtaining of prior directions for interception of message or class of messages is not feasible;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;however, the concerned competent authority is required to be informed of such interceptions by the approving authority within three working days and such interceptions are to be confirmed by the competent authority within a period of seven working days. If the confirmation from the competent authority is not received within the stipulated seven days, such interception should cease and the same message or class of messages should not be intercepted thereafter without the prior approval of the Union Home Secretary or the State Home Secretary.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 419A also tries to incorporate certain safeguards to curb the risk of unrestricted surveillance by the law enforcement authorities which include the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Any order for interception issued by the competent authority should contain reasons for such direction and a copy of such an order should be forwarded to the Review Committee within a period of seven working days;&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Directions for interception should be issued only when it is not possible to acquire the information by any other reasonable means;&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The directed interception should include the interception of any message or class of messages that are sent to or from any person n or class of persons or relating to any particular subject whether such message or class of messages are received with one or more addresses, specified in the order being an address or addresses likely to be used for the transmission of communications from or to one particular person specified or described in the order or one particular set of premises specified or described in the order;&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The interception directions should specify the name and designation of the officer or the authority to whom the intercepted message or class of messages is to be disclosed to;&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The directions for interception would remain in force for sixty days, unless revoked earlier, and may be renewed but the same should not remain in force beyond a total period of one hundred and eighty days;&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The directions for interception should be conveyed to the designated officers of the licensee(s) in writing by an officer not below the rank of Superintendent of Police or Additional Superintendent of Police or the officer of the equivalent rank;&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The officer authorized to intercept any message or class of messages should maintain proper records mentioning therein, the intercepted message or class of messages, the particulars of persons whose message has been intercepted, the name and other particulars of the officer or the authority to whom the intercepted message or class of messages has been disclosed, etc.;&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;All the requisitioning security agencies should designate one or more nodal officers not below the rank of Superintendent of Police or the officer of the equivalent rank to authenticate and send the requisitions for interception to the designated officers of the concerned service providers to be delivered by an officer not below the rank of Sub-Inspector of Police;&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Records pertaining to directions for interception and of intercepted messages should be destroyed by the competent authority and the authorized security and Law Enforcement Agencies every six months unless these are, or likely to be, required for functional requirements;&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;According to Rule 419A, service providers \are required by law enforcement to intercept communications are required to comply with the following&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Service providers should designate two senior executives of the company in every licensed service area/State/Union Territory as the nodal officers to receive and handle such requisitions for interception;&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The designated nodal officers of the service providers should issue acknowledgment letters to the concerned security and Law Enforcement Agency within two hours on receipt of intimations for interception;&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The system of designated nodal officers for communicating and receiving the requisitions for interceptions should also be followed in emergent cases/unavoidable cases where prior approval of the competent authority has not been obtained;&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The designated nodal officers of the service providers should forward every fifteen days a list of interception authorizations received by them during the preceding fortnight to the nodal officers of the security and Law Enforcement Agencies for confirmation of the authenticity of such authorizations;&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Service providers are required to put in place adequate and effective internal checks to ensure that unauthorized interception of messages does not take place, that extreme secrecy is maintained and that utmost care and precaution is taken with regards to the interception of messages;&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Service providers are held responsible for the actions of their employees. In the case of an established violation of license conditions pertaining to the maintenance of secrecy and confidentiality of information and unauthorized interception of communication, action shall be taken against service providers as per the provisions of the Indian Telegraph Act, and this shall not only include a fine, but also suspension or revocation of their license;&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Service providers should destroy records pertaining to directions for the interception of messages within two months of discontinuance of the interception of such messages and in doing so they should maintain extreme secrecy.&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Review Committee&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 419A of the Indian Telegraph Rules requires the establishment of a Review Committee by the Central Government and the State Government, as the case may be, for the interception of communications, as per the following conditions:&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) The Review Committee to be constituted by the Central Government shall consist of the following members, namely:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Cabinet Secretary - Chairman&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Secretary to the Government of India in charge, Legal Affairs - Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) Secretary to the Government of India, Department of Telecommunications – Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Review Committee to be constituted by a State Government shall consist of the following members, namely:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Chief Secretary – Chairman&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Secretary Law/Legal Remembrancer in charge, Legal Affairs – Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) Secretary to the State Government (other than the Home Secretary) – Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The Review Committee meets at least once in two months and records its findings on whether the issued interception directions are in accordance with the provisions of sub-section (2) of Section 5 of the Indian Telegraph Act. When the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above it may set aside the directions and order for destruction of the copies of the intercepted message or class of messages;&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be noted that the Unlawful Activities (Prevention) Act, 1967, (which is currently used against most acts of urban terrorism) also allows for the interception of communications but the procedures and safeguards are supposed to be the same as under the Indian Telegraph Act and the Information Technology Act.&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Telecom Licenses&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The telecom sector in India has seen immense activity in the last two decades ever since it was opened up to private competition. These last twenty years have seen a lot of turmoil and have offered a tremendous learning opportunity for the private players as well as the governmental bodies regulating the sector. Currently any entity wishing to get a telecom license is offered a UL (Unified License) which contains terms and conditions for all the services that a licensee may choose to offer. However there were a large number of other licenses before the current regime, and since the licenses have a long phase out, we have tried to cover what we believe are the four most important licenses issued to telecom operators starting with the CMTS License:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cellular Mobile Telephony Services (CMTS) License&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of National Telecom Policy (NTP)-1994, the first phase of liberalization in mobile telephone service started with issue of 8 licenses for Cellular Mobile Telephony Services (CMTS) in the 4 metro cities of Delhi, Mumbai, Calcutta and Chennai to 8 private companies in November 1994. Subsequently, 34 licenses for 18 Territorial Telecom Circles were also issued to 14 private companies during 1995 to 1998. During this period a maximum of two licenses were granted for CMTS in each service area and these licensees were called 1st &amp;amp; 2nd cellular licensees.&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt; Consequent upon announcement of guidelines for Unified Access (Basic &amp;amp; Cellular) Services licenses on 11.11.2003, some of the CMTS operators were permitted to migrate from CMTS License to Unified Access Service License (UASL) but currently no new CMTS and Basic service licenses are being awarded after issuing the guidelines for Unified Access Service Licence (UASL).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The important provisions regarding surveillance in the CMTS License are listed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for Interception&lt;/i&gt;: The CMTS License requires the Licensee to provide necessary facilities to the designated authorities for interception of the messages passing through its network.&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring of Telecom Traffic&lt;/i&gt;: The designated person of the Central/State Government as conveyed to the Licensor from time to time in addition to the Licensor or its nominee have the right to monitor the telecommunication traffic in every MSC or any other technically feasible point in the network set up by the licensee. The Licensee is required to make arrangement for monitoring simultaneous calls by Government security agencies. The hardware at licensee’s end and software required for monitoring of calls shall be engineered, provided/installed and maintained by the Licensee at licensee’s cost. In case the security agencies intend to locate the equipment at licensee’s premises for facilitating monitoring, the licensee is required to extend all support in this regard including space and entry of the authorised security personnel. The interface requirements as well as features and facilities as defined by the Licensor are to be implemented by the licensee for both data and speech. The Licensee is also required to ensure suitable redundancy in the complete chain of Monitoring equipment for trouble free operations of monitoring of at least 210 simultaneous calls.&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring Records to be maintained:&lt;/i&gt; Along with the monitored call following records are to be made available:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Called/calling party mobile/PSTN numbers.&lt;/li&gt;
&lt;li&gt;Time/date and duration of interception.&lt;/li&gt;
&lt;li&gt;Location of target subscribers. Cell ID should be provided for location of the target subscriber. However, Licensor may issue directions from time to time on the precision of location, based on technological developments and integration of Global Positioning System (GPS) which shall be binding on the LICENSEE.&lt;/li&gt;
&lt;li&gt;Telephone numbers if any call-forwarding feature has been invoked by target subscriber.&lt;/li&gt;
&lt;li&gt;Data records for even failed call attempts.&lt;/li&gt;
&lt;li&gt;CDR (Call Data Record) of Roaming Subscriber.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to provide the call data records of all the specified calls handled by the system at specified periodicity, as and when required by the security agencies.&lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Protection of Privacy&lt;/i&gt;: It is the responsibility of the Licensee to ensure the protection of privacy of communication and ensure unathorised interception of messages does not take place.&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;License Agreement for Provision of Internet Services (ISP License)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet services were launched in India on 15th August, 1995 by Videsh Sanchar Nigam Limited. In November, 1998, the Government opened up the sector for providing Internet services by private operators. The major provisions dealing with surveillance contained in the ISP License are given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Authorization for monitoring&lt;/i&gt;: Monitoring shall only be by the authorization of the Union Home Secretary or Home Secretaries of the States/Union Territories.&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Access to subscriber list by authorized intelligence agencies and licensor&lt;/i&gt;: The complete and up to date list of subscribers will be made available by the ISP on a password protected website – accessible to authorized intelligence agencies.&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt; Information such as customer name, IP address, bandwidth provided, address of installation, data of installation, contact number and email of leased line customers shall be included in the website.&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt; The licensor or its representatives will also have access to the Database relating to the subscribers of the ISP which is to be available at any instant.&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Right to monitor by the central/state government&lt;/i&gt;: The designated person of the central/state government or the licensor or nominee will have the right to monitor telecommunications traffic in every node or any other technically feasible point in the network. To facilitate this, the ISP must make arrangements for the monitoring of simultaneous calls by the Government or its security agencies.&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Right of DoT to monitor&lt;/i&gt;: DoT will have the ability to monitor customers who generate high traffic value and verify specified user identities on a monthly basis.&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of mirror images:&lt;/i&gt; Mirror images of the remote access information should be made available online for monitoring purposes.&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt; A safeguard provided for in the license is that remote access to networks is only allowed in areas approved by the DOT in consultation with the Security Agencies.&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of information stored on dedicated transmission link:&lt;/i&gt; The ISP will provide the login password to DOT and authorized Government agencies on a monthly basis for access to information stored on any dedicated transmission link from ISP node to subscriber premises.&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of subscriber identity and geographic location:&lt;/i&gt; The ISP must provide the traceable identity and geographic location of their subscribers, and if the subscriber is roaming – the ISP should try to find traceable identities of roaming subscribers from foreign companies.&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for monitoring:&lt;/i&gt; The ISP must provide the necessary facilities for continuous monitoring of the system as required by the licensor or its authorized representatives.&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for tracing&lt;/i&gt;: The ISP will also provide facilities for the tracing of nuisance, obnoxious or malicious calls, messages, or communications. These facilities are to be provided specifically to authorized officers of the Government of India (police, customs, excise, intelligence department) when the information is required for investigations or detection of crimes and in the interest of national security.&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities and equipment to be specified by government:&lt;/i&gt; The types of interception equipment to be used will be specified by the government of India.&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt; This includes the installation of necessary infrastructure in the service area with respect to Internet Telephony Services offered by the ISP including the processing, routing, directing, managing, authenticating the internet calls including the generation of Call Details Record, IP address, called numbers, date, duration, time, and charge of the internet telephony calls.&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for surveillance of mobile terminal activity&lt;/i&gt;: The ISP must also provide the government facilities to carry out surveillance of Mobile Terminal activity within a specified area whenever requested.&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for monitoring international gateway:&lt;/i&gt; As per the requirements of security agencies, every international gateway location having a capacity of 2 Mbps or more will be equipped will have a monitoring center capable of monitoring internet telephony traffic.&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for monitoring in the premise of the ISP&lt;/i&gt;: Every office must be at least 10x10 with adequate power, air conditioning, and accessible only to the monitoring agencies. One local exclusive telephone line must be provided, and a central monitoring center must be provided if the ISP has multiple nodal points.&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Protection of privacy&lt;/i&gt;: There is a responsibility on the ISP to protect the privacy of its communications transferred over its network. This includes securing the information and protecting against unauthorized interception, unauthorized disclosure, ensure the confidentiality of information, and protect against over disclosure of information- except when consent has been given.&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Log of users:&lt;/i&gt; Each ISP must maintain an up to date log of all users connected and the service that they are using (mail, telnet, http, etc). The ISPs must also log every outward login or telnet through their computers. These logs as well as copies of all the packets must be made available in real time to the Telecom Authority.&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Log of internet leased line customers:&lt;/i&gt; A record of each internet leased line customer should be kept along with details of connectivity, and reasons for taking the link should be kept and made readily available for inspection.&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Log of remote access activities:&lt;/i&gt; The ISP will also maintain a complete audit trail of the remote access activities that pertain to the network for at least six months. This information must be available on request for any agency authorized by the licensor.&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring requirements&lt;/i&gt;: The ISP must make arrangements for the monitoring of the telecommunication traffic in every MSC exchange or any other technically feasible point, of at least 210 calls simultaneously.&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Records to be made available&lt;/i&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;CDRS&lt;/i&gt;: When required by security agencies, the ISP must make available records of i) called/calling party mobile/PSTN numbers ii) time/date and duration of calls iii) location of target subscribers and from time to time precise location iv) telephone numbers – and if any call forwarding feature has been evoked – records thereof v) data records for failed call attempts vi) CDR of roaming subscriber.&lt;a href="#_ftn64" name="_ftnref64"&gt;[64]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Bulk connections&lt;/i&gt;: On a monthly basis, and from time to time, information with respect to bulk connections shall be forwarded to DoT, the licensor, and security agencies.&lt;a href="#_ftn65" name="_ftnref65"&gt;[65]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Record of calls beyond specified threshold&lt;/i&gt;: Calls should be checked, analyzed, and a record maintained of all outgoing calls made by customers both during the day and night that exceed a set threshold of minutes. A list of suspected subscribers should be created by the ISP and should be informed to DoT and any officer authorized by the licensor at any point of time.&lt;a href="#_ftn66" name="_ftnref66"&gt;[66]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Record of subscribers with calling line identification restrictions&lt;/i&gt;: Furthermore, a list of calling line identification restriction subscribers with their complete address and details should be created on a password protected website that is available to authorized government agencies.&lt;a href="#_ftn67" name="_ftnref67"&gt;[67]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Unified Access Services (UAS) License&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unified Access Services operators provide services of collection, carriage, transmission and delivery of voice and/or non-voice messages within their area of operation, over the Licensee’s network by deploying circuit and/or packet switched equipment. They may also provide Voice Mail, Audiotex services, Video Conferencing, Videotex, E-Mail, Closed User Group (CUG) as Value Added Services over its network to the subscribers falling within its service area on a non-discriminatory basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The terms of providing the services are regulated under the Unified Access Service License (UASL) which also contains provisions regarding surveillance/interception. These provisions are regularly used by the state agencies to intercept telephonic and data traffic of subscribers. The relevant terms of the UASL dealing with surveillance and interception are discussed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Confidentiality of Information&lt;/i&gt;: The Licensee cannot employ bulk encryption equipment in its network. Any encryption equipment connected to the Licensee’s network for specific requirements has to have prior evaluation and approval of the Licensor or officer specially designated for the purpose. However, any encryption equipment connected to the Licensee’s network for specific requirements has to have prior evaluation and approval of the Licensor or officer specially designated for the purpose. However, the Licensee has the responsibility to ensure protection of privacy of communication and to ensure that unauthorised interception of messages does not take place.&lt;a href="#_ftn68" name="_ftnref68"&gt;[68]&lt;/a&gt; The Licensee shall take necessary steps to ensure that the Licensee and any person(s) acting on its behalf observe confidentiality of customer information.&lt;a href="#_ftn69" name="_ftnref69"&gt;[69]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Responsibility of the Licensee:&lt;/i&gt; The Licensee has to take all necessary steps to safeguard the privacy and confidentiality of any information about a third party and its business to whom it provides the service and from whom it has acquired such information by virtue of the service provided and shall use its best endeavors to secure that :&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;No person acting on behalf of the Licensee or the Licensee divulges or uses any such information except as may be necessary in the course of providing such service to the third party; and&lt;/li&gt;
&lt;li&gt;No such person seeks such information other than is necessary for the purpose of providing service to the third party.&lt;a href="#_ftn70" name="_ftnref70"&gt;[70]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of monitoring facilities&lt;/i&gt;: Requisite monitoring facilities /equipment for each type of system used, shall be provided by the service provider at its own cost for monitoring as and when required by the licensor.&lt;a href="#_ftn71" name="_ftnref71"&gt;[71]&lt;/a&gt; The license also requires the Licensee to provide necessary facilities to the designated authorities for interception of the messages passing through its network.&lt;a href="#_ftn72" name="_ftnref72"&gt;[72]&lt;/a&gt; The licensor in this case is the President of India, as the head of the State, therefore all references to the term licensor can be assumed to be to the government of India (which usually acts through the department of telecom (DOT). For monitoring traffic, the licensee company has to provide access of their network and other facilities as well as to books of accounts to the security agencies.&lt;a href="#_ftn73" name="_ftnref73"&gt;[73]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring by Designated Person:&lt;/i&gt; The designated person of the Central/ State Government as conveyed to the Licensor from time to time in addition to the Licensor or its nominee has the right to monitor the telecommunication traffic in every MSC/Exchange/MGC/MG&lt;b&gt; &lt;/b&gt;or any other technically feasible point in the network set up by the Licensee. The Licensee is required to make arrangement for monitoring simultaneous calls by Government security agencies. The hardware at Licensee’s end and software required for monitoring of calls shall be engineered, provided/installed and maintained by the Licensee at Licensee’s cost. However, the respective Government instrumentality bears the cost of user end hardware and leased line circuits from the MSC/ Exchange/MGC/MG&lt;b&gt; &lt;/b&gt;to the monitoring centres to be located as per their choice in their premises or in the premises of the Licensee. In case the security agencies intend to locate the equipment at Licensee’s premises for facilitating monitoring, the Licensee should extend all support in this regard including space and entry of the authorized security personnel. The Licensee is required to implement the interface requirements as well as features and facilities as defined by the Licensor for both data and speech. The Licensee is to ensure suitable redundancy in the complete chain of Monitoring equipment for trouble free operations of monitoring of at least 210 simultaneous calls for seven security agencies.&lt;a href="#_ftn74" name="_ftnref74"&gt;[74]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring Records to be maintained:&lt;/i&gt; Along with the monitored call following records are to be made available:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Called/calling party mobile/PSTN numbers.&lt;/li&gt;
&lt;li&gt;Time/date and duration of interception.&lt;/li&gt;
&lt;li&gt;Location of target subscribers. Cell ID should be provided for location of the target subscriber. However, Licensor may issue directions from time to time on the precision of location, based on technological developments and integration of Global Positioning System (GPS) which shall be binding on the LICENSEE.&lt;/li&gt;
&lt;li&gt;Telephone numbers if any call-forwarding feature has been invoked by target subscriber.&lt;/li&gt;
&lt;li&gt;Data records for even failed call attempts.&lt;/li&gt;
&lt;li&gt;CDR (Call Data Record) of Roaming Subscriber.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to provide the call data records of all the specified calls handled by the system at specified periodicity, as and when required by the security agencies.&lt;a href="#_ftn75" name="_ftnref75"&gt;[75]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;List of Subscribers:&lt;/i&gt; The complete list of subscribers shall be made available by the Licensee on their website (having password controlled access), so that authorized Intelligence Agencies are able to obtain the subscriber list at any time, as per their convenience with the help of the password.&lt;a href="#_ftn76" name="_ftnref76"&gt;[76]&lt;/a&gt; The Licensor or its representative(s) have an access to the Database relating to the subscribers of the Licensee. The Licensee shall also update the list of his subscribers and make available the same to the Licensor at regular intervals. The Licensee shall make available, at any prescribed instant, to the Licensor or its authorized representative details of the subscribers using the service.&lt;a href="#_ftn77" name="_ftnref77"&gt;[77]&lt;/a&gt; The Licensee must provide traceable identity of their subscribers,&lt;a href="#_ftn78" name="_ftnref78"&gt;[78]&lt;/a&gt; and should be able to provide the geographical location (BTS location) of any subscriber at a given point of time, upon request by the Licensor or any other agency authorized by it.&lt;a href="#_ftn79" name="_ftnref79"&gt;[79]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CDRs for Large Number of Outgoing Calls:&lt;/i&gt; The call detail records for outgoing calls made by subscribers making large number of outgoing calls day and night and to the various telephone numbers should be analyzed. Normally, no incoming call is observed in such cases. This can be done by running special programs for this purpose.&lt;a href="#_ftn80" name="_ftnref80"&gt;[80]&lt;/a&gt; Although this provision itself does not say that it is limited to bulk subscribers (subscribers with more than 10 lines), it is contained as a sub-clause of section 41.19 which talks about specific measures for bulk subscribers, therefore it is possible that this provision is limited only to bulk subscribers and not to all subscribers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;No Remote Access to Suppliers&lt;/i&gt;: Suppliers/manufacturers and affiliate(s) are not allowed any remote access to the be enabled to access Lawful Interception System(LIS), Lawful Interception Monitoring(LIM), Call contents of the traffic and any such sensitive sector/data, which the licensor may notify from time to time, under any circumstances.&lt;a href="#_ftn81" name="_ftnref81"&gt;[81]&lt;/a&gt; The Licensee is also not allowed to use remote access facility for monitoring of content.&lt;a href="#_ftn82" name="_ftnref82"&gt;[82]&lt;/a&gt; Further, suitable technical device is required to be made available at Indian end to the designated security agency/licensor in which a mirror image of the remote access information is available on line for monitoring purposes.&lt;a href="#_ftn83" name="_ftnref83"&gt;[83]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring as per the Rules under Telegraph Act&lt;/i&gt;: In order to maintain the privacy of voice and data, monitoring shall be in accordance with rules in this regard under Indian Telegraph Act, 1885.&lt;a href="#_ftn84" name="_ftnref84"&gt;[84]&lt;/a&gt; It interesting to note that the monitoring under the UASL license is required to be as per the Rules prescribed under the Telegraph Act, but no mention is made of the Rules under the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring from Centralised Location&lt;/i&gt;: The Licensee has to ensure that necessary provision (hardware/ software) is available in its equipment for doing lawful interception and monitoring from a centralized location.&lt;a href="#_ftn85" name="_ftnref85"&gt;[85]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Unified License (UL)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Telecom Policy - 2012 recognized the fact that the evolution from analog to digital technology has facilitated the conversion of voice, data and video to the digital form which are increasingly being rendered through single networks bringing about a convergence in networks, services and devices. It was therefore felt imperative to move towards convergence between various services, networks, platforms, technologies and overcome the incumbent segregation of licensing, registration and regulatory mechanisms in these areas. It was for this reason that the Government of India decided to move to the Unified License regime under which service providers could opt for all or any one or more of a number of different services.&lt;a href="#_ftn86" name="_ftnref86"&gt;[86]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of interception facilities by Licensee&lt;/i&gt;: The UL requires that the requisite monitoring/ interception facilities /equipment for each type of service, should be provided by the Licensee at its own cost for monitoring as per the requirement specified by the Licensor from time to time.&lt;a href="#_ftn87" name="_ftnref87"&gt;[87]&lt;/a&gt; The Licensee is required to provide necessary facilities to the designated authorities of Central/State Government as conveyed by the Licensor from time to time for interception of the messages passing through its network, as per the provisions of the Indian Telegraph Act.&lt;a href="#_ftn88" name="_ftnref88"&gt;[88]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Bulk encryption and unauthorized interception&lt;/i&gt;: The UL prohibits the Licensee from employing bulk encryption equipment in its network. Licensor or officers specially designated for the purpose are allowed to evaluate any encryption equipment connected to the Licensee’s network. However, it is the responsibility of the Licensee to ensure protection of privacy of communication and to ensure that unauthorized interception of messages does not take place.&lt;a href="#_ftn89" name="_ftnref89"&gt;[89]&lt;/a&gt; The use of encryption by the subscriber shall be governed by the Government Policy/rules made under the Information Technology Act, 2000.&lt;a href="#_ftn90" name="_ftnref90"&gt;[90]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Safeguarding of Privacy and Confidentiality&lt;/i&gt;: The Licensee shall take necessary steps to ensure that the Licensee and any person(s) acting on its behalf observe confidentiality of customer information.&lt;a href="#_ftn91" name="_ftnref91"&gt;[91]&lt;/a&gt; Subject to terms and conditions of the license, the Licensee is required to take all necessary steps to safeguard the privacy and confidentiality of any information about a third party and its business to whom it provides services and from whom it has acquired such information by virtue of the service provided and shall use its best endeavors to secure that: a) No person acting on behalf of the Licensee or the Licensee divulges or uses any such information except as may be necessary in the course of providing such service; and b) No such person seeks such information other than is necessary for the purpose of providing service to the third party.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided the above para does not apply where: a) The information relates to a specific party and that party has consented in writing to such information being divulged or used, and such information is divulged or used in accordance with the terms of that consent; or b) The information is already open to the public and otherwise known.&lt;a href="#_ftn92" name="_ftnref92"&gt;[92]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;No Remote Access to Suppliers&lt;/i&gt;: Suppliers/manufacturers and affiliate(s) are not allowed any remote access to the be enabled to access Lawful Interception System(LIS), Lawful Interception Monitoring(LIM), Call contents of the traffic and any such sensitive sector/data, which the licensor may notify from time to time, under any circumstances.&lt;a href="#_ftn93" name="_ftnref93"&gt;[93]&lt;/a&gt; The Licensee is also not allowed to use remote access facility for monitoring of content.&lt;a href="#_ftn94" name="_ftnref94"&gt;[94]&lt;/a&gt; Further, suitable technical device is required to be made available at Indian end to the designated security agency/licensor in which a mirror image of the remote access information is available on line for monitoring purposes.&lt;a href="#_ftn95" name="_ftnref95"&gt;[95]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring as per the Rules under Telegraph Act&lt;/i&gt;: In order to maintain the privacy of voice and data, monitoring shall be in accordance with rules in this regard under Indian Telegraph Act, 1885.&lt;a href="#_ftn96" name="_ftnref96"&gt;[96]&lt;/a&gt; Just as in the UASL, the monitoring under the UL license is required to be as per the Rules prescribed under the Telegraph Act, but no mention is made of the Rules under the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Terms specific to various services &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the UL License intends to cover all services under a single license, in addition to the general terms and conditions for interception, it also has terms for each specific service. We shall now discuss the terms for interception specific to each service offered under the Unified License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Access Service&lt;/i&gt;: The designated person of the Central/ State Government, in addition to the Licensor or its nominee, shall have the right to monitor the telecommunication traffic in every MSC/ Exchange/ MGC/ MG/ Routers or any other technically feasible point in the network set up by the Licensee. The Licensee is required to make arrangement for monitoring simultaneous calls by Government security agencies. For establishing connectivity to Centralized Monitoring System, the Licensee at its own cost shall provide appropriately dimensioned hardware and bandwidth/dark fibre upto a designated point as required by Licensor from time to time. In case the security agencies intend to locate the equipment at Licensee’s premises for facilitating monitoring, the Licensee should extend all support in this regard including space and entry of the authorized security personnel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Interface requirements as well as features and facilities as defined by the Licensor should be implemented by the Licensee for both data and speech. The Licensee should ensure suitable redundancy in the complete chain of Lawful Interception and Monitoring equipment for trouble free operations of monitoring of at least 480 simultaneous calls as per requirement with at least 30 simultaneous calls for each of the designated security/ law enforcement agencies. Each MSC of the Licensee in the service area shall have the capacity for provisioning of at least 3000 numbers for monitoring. Presently there are ten (10) designated security/ law enforcement agencies. The above capacity provisions and no. of designated security/ law enforcement agencies may be amended by the Licensor separately by issuing instructions at any time&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along with the monitored call following records are to be made available:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Called/calling party mobile/PSTN numbers.&lt;/li&gt;
&lt;li&gt;Time/date and duration of interception.&lt;/li&gt;
&lt;li&gt;Location of target subscribers. Cell ID should be provided for location of the target subscriber. However, Licensor may issue directions from time to time on the precision of location, based on technological developments and integration of Global Positioning System (GPS) which shall be binding on the LICENSEE.&lt;/li&gt;
&lt;li&gt;Telephone numbers if any call-forwarding feature has been invoked by target subscriber.&lt;/li&gt;
&lt;li&gt;Data records for even failed call attempts.&lt;/li&gt;
&lt;li&gt;CDR (Call Data Record) of Roaming Subscriber.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to provide the call data records of all the specified calls handled by the system at specified periodicity, as and when required by the security agencies.&lt;a href="#_ftn97" name="_ftnref97"&gt;[97]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The call detail records for outgoing calls made by those subscribers making large number of outgoing calls day and night to the various telephone numbers with normally no incoming calls, is required to be analyzed by the Licensee. The service provider is required to run special programme, devise appropriate fraud management and prevention programme and fix threshold levels of average per day usage in minutes of the telephone connection; all telephone connections crossing the threshold of usage are required to be checked for &lt;i&gt;bona fide&lt;/i&gt; use. A record of check must be maintained which may be verified by Licensor any time. The list/details of suspected subscribers should be informed to the respective TERM Cell of DoT and any other officer authorized by Licensor from time to time.&lt;a href="#_ftn98" name="_ftnref98"&gt;[98]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee shall provide location details of mobile customers as per the accuracy and time frame mentioned in the Unified License. It shall be a part of CDR in the form of longitude and latitude, besides the co-ordinate of the BTS, which is already one of the mandated fields of CDR. To start with, these details will be provided for specified mobile numbers. However, within a period of 3 years from effective date of the Unified License, location details shall be part of CDR for all mobile calls.&lt;a href="#_ftn99" name="_ftnref99"&gt;[99]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Internet Service&lt;/i&gt;: The Licensee is required to maintain CDR/IPDR for Internet including Internet Telephony Service for a minimum period of one year. The Licensee is also required to maintain log-in/log-out details of all subscribers for services provided such as internet access, e-mail, Internet Telephony, IPTV etc. These logs are to be maintained for a minimum period of one year. For the purpose of interception and monitoring of traffic, the copies of all the packets originating from / terminating into the Customer Premises Equipment (CPE) shall be made available to the Licensor/Security Agencies. Further, the list of Internet Lease Line (ILL) customers is to be placed on a password protected website in the format prescribed in the Unified License.&lt;a href="#_ftn100" name="_ftnref100"&gt;[100]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawful Interception and Monitoring (LIM) systems of requisite capacities are to be set up by the Licensees for Internet traffic including Internet telephony traffic through their Internet gateways and /or Internet nodes at their own cost, as per the requirement of the security agencies/Licensor prescribed from time to time. The cost of maintenance of the monitoring equipment and infrastructure at the monitoring centre located at the premises of the licensee shall be borne by the Licensee. In case the Licensee obtains Access spectrum for providing Internet Service / Broadband Wireless Access using the Access Spectrum, the Licensee shall install the required Lawful Interception and Monitoring systems of requisite capacities prior to commencement of service. The Licensee, while providing downstream Internet bandwidth to an Internet Service provider is also required to ensure that all the traffic of downstream ISP passing through the Licensee’s network can be monitored in the network of the Licensee. However, for nodes of Licensee having upstream bandwidth from multiple service providers, the Licensee may be mandated to install LIM/LIS at these nodes, as per the requirement of security agencies. In such cases, upstream service providers may not be required to monitor this bandwidth.&lt;a href="#_ftn101" name="_ftnref101"&gt;[101]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case the Licensee has multiple nodes/points of presence and has capability to monitor the traffic in all the Routers/switches from a central location, the Licensor may accept to monitor the traffic from the said central monitoring location, provided that the Licensee is able to demonstrate to the Licensor/Security Agencies that all routers / switches are accessible from the central monitoring location. Moreover, the Licensee would have to inform the Licensor of every change that takes place in their topology /configuration, and ensure that such change does not make any routers/switches inaccessible from the central monitoring location. Further, Office space of 10 feet x 10 feet with adequate and uninterrupted power supply and air-conditioning which is physically secured and accessible only to the monitoring agencies shall be provided by the Licensee at each Internet Gateway location at its cost.&lt;a href="#_ftn102" name="_ftnref102"&gt;[102]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;National Long Distance (NLD) Service&lt;/i&gt;: The requisite monitoring facilities are required to be provided by the Licensee as per requirement of Licensor. The details of leased circuit provided by the Licensee is to be provided monthly to security agencies &amp;amp; DDG (TERM) of the Licensed Service Area where the licensee has its registered office.&lt;a href="#_ftn103" name="_ftnref103"&gt;[103]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;International Long Distance (ILD) Service&lt;/i&gt;: Office space of 20’x20’ with adequate and uninterrupted power supply and air-conditioning which is physically secured and accessible only to the personnel authorized by the Licensor is required to be provided by the Licensee at each Gateway location free of cost.&lt;a href="#_ftn104" name="_ftnref104"&gt;[104]&lt;/a&gt; The cost of monitoring equipment is to be borne by the Licensee. The installation of the monitoring equipment at the ILD Gateway Station is to be done by the Licensee. After installation of the monitoring equipment, the Licensee shall get the same inspected by monitoring /security agencies. The permission to operate/commission the gateway will be given only after this.&lt;a href="#_ftn105" name="_ftnref105"&gt;[105]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The designated person of the Central/ State Government, in addition to the Licensor or its nominee, has the right to monitor the telecommunication traffic in every ILD Gateway / Routers or any other technically feasible point in the network set up by the Licensee. The Licensee is required to make arrangement for monitoring simultaneous calls by Government security agencies. For establishing connectivity to Centralized Monitoring System, the Licensee, at its own cost, is required to provide appropriately dimensioned hardware and bandwidth/dark fibre upto a designated point as required by Licensor from time to time. In case the security agencies intend to locate the equipment at Licensee’s premises for facilitating monitoring, the Licensee should extend all support in this regard including Space and Entry of the authorized security personnel. The Interface requirements as well as features and facilities as defined by the Licensor should be implemented by the Licensee for both data and speech. The Licensee should ensure suitable redundancy in the complete chain of Monitoring equipment for trouble free operations of monitoring of at least 480 simultaneous calls as per requirement with at least 30 simultaneous calls for each of the designated security/ law enforcement agencies. Each ILD Gateway of the Licensee shall have the capacity for provisioning of at least 5000 numbers for monitoring. Presently there are ten (10) designated security/ law enforcement agencies. The above capacity provisions and number of designated security/ law enforcement agencies may be amended by the Licensor separately by issuing instructions at any time&lt;i&gt;.&lt;/i&gt;&lt;a href="#_ftn106" name="_ftnref106"&gt;[106]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to provide the call data records of all the specified calls handled by the system at specified periodicity, as and when required by the security agencies in the format prescribed from time to time.&lt;a href="#_ftn107" name="_ftnref107"&gt;[107]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Global Mobile Personal Communication by Satellite (GMPCS) Service&lt;/i&gt;: The designated Authority of the Central/State Government shall have the right to monitor the telecommunication traffic in every Gateway set up in India. The Licensee shall make arrangement for monitoring of calls as specified in the Unified License.&lt;a href="#_ftn108" name="_ftnref108"&gt;[108]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hardware/software required for monitoring of calls shall be engineered, provided/installed and maintained by the Licensee at the ICC (Intercept Control Centre) to be established at the GMPCS Gateway(s) as also in the premises of security agencies at Licensee’s cost. The Interface requirements as well as features and facilities shall be worked out and implemented by the Licensee for both data and speech. The Licensee should ensure suitable redundancy in the complete chain of Monitoring equipment for trouble free operations. The Licensee shall provide suitable training to the designated representatives of the Licensor regarding operation and maintenance of Monitoring equipment (ICC &amp;amp; MC). Interception of target subscribers using messaging services should also be provided even if retrieval is carried out using PSTN links. For establishing connectivity to Centralized Monitoring System, the Licensee at its own cost shall provide appropriately dimensioned hardware and bandwidth/dark fibre upto a designated point as required by Licensor from time to time.&lt;a href="#_ftn109" name="_ftnref109"&gt;[109]&lt;/a&gt; The License also has specific obligations to extend monitored calls to designated security agencies as provided in the UL.&lt;a href="#_ftn110" name="_ftnref110"&gt;[110]&lt;/a&gt; Further, the Licensee is required to provide the call data records of all the calls handled by the system at specified periodicity, if and as and when required by the security agencies.&lt;a href="#_ftn111" name="_ftnref111"&gt;[111]&lt;/a&gt; It is the responsibility of the service provider for Global Mobile Personal Communication by Satellite (GMPCS) to provide facility to carry out surveillance of User Terminal activity.&lt;a href="#_ftn112" name="_ftnref112"&gt;[112]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee has to make available adequate monitoring facility at the GMPCS Gateway in India to monitor all traffic (traffic originating/terminating in India) passing through the applicable system. For this purpose, the Licensee shall set up at his cost, the requisite interfaces, as well as features and facilities for monitoring of calls by designated agencies as directed by the Licensor from time to time. In addition to the Target Intercept List (TIL), it should also be possible to carry out specific geographic location based interception, if so desired by the designated security agencies. Monitoring of calls should not be perceptible to mobile users either during direct monitoring or when call has been grounded for monitoring. The Licensee shall not prefer any charges for grounding a call for monitoring purposes. The intercepted data is to be pushed to designated Security Agencies’ server on fire and forget basis. No records shall be maintained by the Licensee regarding monitoring activities and air-time used beyond prescribed time limit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee has to ensure that any User Terminal (UT) registered in the gateway of another country shall re-register with Indian Gateway when operating from Indian Territory. Any UT registered outside India, when attempting to make/receive calls from within India, without due authority, shall be automatically denied service by the system and occurrence of such attempts along with information about UT identity as well as location shall be reported to the designated authority immediately.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to have provision to scan operation of subscribers specified by security/ law enforcement agencies through certain sensitive areas within the Indian territory and shall provide their identity and positional location (latitude and longitude) to Licensor on as and when required basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Public Mobile Radio Trunking Service (PMRTS)&lt;/i&gt;: Suitable monitoring equipment prescribed by the Licensor for each type of System used has to be provided by the Licensee at his own cost for monitoring, as and when required.&lt;a href="#_ftn113" name="_ftnref113"&gt;[113]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Very Small Aperture Terminal (VSAT) Closed User Group (CUG) Service&lt;/i&gt;: Requisite monitoring facilities/ equipment for each type of system used have to be provided by the Licensee at its own cost for monitoring as and when required by the Licensor.&lt;a href="#_ftn114" name="_ftnref114"&gt;[114]&lt;/a&gt; The Licensee shall provide at its own cost technical facilities for accessing any port of the switching equipment at the HUB for interception of the messages by the designated authorities at a location to be determined by the Licensor.&lt;a href="#_ftn115" name="_ftnref115"&gt;[115]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Surveillance of MSS-R Service&lt;/i&gt;: The Licensee has to provide at its own cost technical facilities for accessing any port of the switching equipment at the HUB for interception of the messages by the designated authorities at a location as and when required.&lt;a href="#_ftn116" name="_ftnref116"&gt;[116]&lt;/a&gt; It is the responsibility of the service provider of INSAT- Mobile Satellite System Reporting (MSS-R) service to provide facility to carry out surveillance of User Terminal activity within a specified area.&lt;a href="#_ftn117" name="_ftnref117"&gt;[117]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Resale of International Private Leased Circuit (IPLC) Service&lt;/i&gt;: The Licensee has to take IPLC from the licensed ILDOs. The interception and monitoring of Resellers circuits will take place at the Gateway of the ILDO from whom the IPLC has been taken by the Licensee. The provisioning for Lawful Interception &amp;amp; Monitoring of the Resellers’ IPLC shall be done by the ILD Operator and the concerned ILDO shall be responsible for Lawful Interception and Monitoring of the traffic passing through the IPLC. The Resellers shall extend all cooperation in respect of interception and monitoring of its IPLC and shall be responsible for the interception results. The Licensee shall be responsible to interact, correspond and liaise with the licensor and security agencies with regard to security monitoring of the traffic. The Licensee shall, before providing an IPLC to the customer, get the details of services/equipment to be connected on both ends of IPLC, including type of terminals, data rate, actual use of circuit, protocols/interface to be used etc. The Resellers shall permit only such type of service/protocol on the IPLC for which the concerned ILDO has capability of interception and monitoring. The Licensee has to pass on any direct request placed by security agencies on him for interception of the traffic on their IPLC to the concerned ILDOs within two hours for necessary actions.&lt;a href="#_ftn118" name="_ftnref118"&gt;[118]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. The Information Technology Act, 2000&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Act, 2000, was amended in a major way in 2008 and is the primary legislation which regulates the interception, monitoring, decryption and collection of traffic information of digital communications in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More specifically, section 69 of the Information Technology Act empowers the central Government and the state governments to issue directions for the monitoring, interception or decryption of any information transmitted, received or stored through a computer resource. Section 69 of the Information Technology Act, 2000 expands the grounds upon which interception can take place as compared to the Indian Telegraph Act, 1885. As such, the interception of communications under Section 69 is carried out in the interest of&lt;a href="#_ftn119" name="_ftnref119"&gt;[119]&lt;/a&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The sovereignty or integrity of India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Defence of India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Security of the State&lt;/li&gt;
&lt;li&gt;Friendly relations with foreign States&lt;/li&gt;
&lt;li&gt;Public order&lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any cognizable offense relating to the above&lt;/li&gt;
&lt;li&gt;For the investigation of any offense&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;While the grounds for interception are similar to the Indian Telegraph Act (except for the condition of prevention of incitement of only &lt;i&gt;cognizable&lt;/i&gt; offences and the addition of investigation of any offence) the Information Technology Act does not have the overarching condition that interception can only occur in the case of public emergency or in the interest of public safety.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, section 69 of the Act mandates that any person or intermediary who fails to assist the specified agency with the interception, monitoring, decryption or provision of information stored in a computer resource shall be punished with imprisonment for a term which may extend to seven years and shall be liable for a fine.&lt;a href="#_ftn120" name="_ftnref120"&gt;[120]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 69B of the Information Technology Act empowers the Central Government to authorise the monitoring and collection of information and traffic data generated, transmitted, received or stored through any computer resource for the purpose of cyber security. According to this section, any intermediary who intentionally or knowingly fails to provide technical assistance to the authorised agency which is required to monitor and collection information and traffic data shall be punished with an imprisonment which may extend to three years and will also be liable to a fine.&lt;a href="#_ftn121" name="_ftnref121"&gt;[121]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main difference between Section 69 and Section 69B is that the first requires the interception, monitoring and decryption of all information generated, transmitted, received or stored through a computer resource when it is deemed “necessary or expedient” to do so, whereas Section 69B specifically provides a mechanism for all metadata of all communications through a computer resource for the purpose of combating threats to “cyber security”. Directions under Section 69 can be issued by the Secretary to the Ministry of Home Affairs, whereas directions under Section 69B can only be issued by the Secretary of the Department of Information Technology under the Union Ministry of Communications and Information Technology.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Overlap with the Telegraph Act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Thus while the Telegraph Act only allows for interception of messages or class of messages transmitted by a telegraph, the Information Technology Act enables interception of any information being transmitted or stored in a computer resource. Since a “computer resource” is defined to include a communication device (such as cellphones and PDAs) there is a overlap between the provisions of the Information Technology Act and the Telegraph Act concerning the provisions of interception of information sent through mobile phones. This is further complicated by the fact that the UAS License specifically states that it is governed by the provisions of the Indian Telegraph Act, the Indian Wireless Telegraphy Act and the Telecom Regulatory Authority of India Act, but does not mention the Information Technology Act.&lt;a href="#_ftn122" name="_ftnref122"&gt;[122]&lt;/a&gt; This does not mean that the Licensees under the Telecom Licenses are not bound by any other laws of India (including the Information Technology Act) but it is just an invitation to unnecessary complexities and confusions with regard to a very serious issue such as interception. This situation has thankfully been remedied by the Unified License (UL) which, although issued under section of 4 of the Telegraph Act, also references the Information Technology Act thus providing essential clarity with respect to the applicability of the Information Technology Act to the License Agreement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The interception of internet communications is mainly covered by the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009under the Information Technology Act (the “&lt;b&gt;IT Interception Rules&lt;/b&gt;”). In particular, the rules framed under Section 69 and 69B include safeguards stipulating to who may issue directions of interception and monitoring, how such directions are to be executed, the duration they remain in operation, to whom data may be disclosed, confidentiality obligations of intermediaries, periodic oversight of interception directions by a Review Committee under the Indian Telegraph Act, the retention of records of interception by intermediaries and to the mandatory destruction of information in appropriate cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the IT Interception Rules, only the competent authority can issue an order for the interception, monitoring or decryption of any information generated, transmitted, received or stored in any computer resource under sub-section (2) of section 69 of the Information Technology Act.&lt;a href="#_ftn123" name="_ftnref123"&gt;[123]&lt;/a&gt; At the State and Union Territory level, the State Secretaries respectively in charge of the Home Departments are designated as “competent authorities” to issue interception directions.&lt;a href="#_ftn124" name="_ftnref124"&gt;[124]&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt;In unavoidable circumstances the Joint Secretary to the Government of India, when so authorised by the Competent Authority, may issue an order. Interception may also be carried out with the prior approval of the Head or the second senior most officer of the authorised security agency at the Central Level and at the State Level with the approval of officers authorised in this behalf not below the rank of Inspector General of Police, in the belowmentioned emergent cases:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) in remote areas, where obtaining of prior directions for interception or monitoring or decryption of information is not feasible; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) for operational reasons, where obtaining of prior directions for interception or monitoring or decryption of any information generation, transmitted, received or stored in any computer resource is not feasible,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;however, in the above circumstances the officer would have to inform the competent authority in writing within three working days about the emergency and of the interception, monitoring or decryption and obtain the approval of the competent authority within a period of seven working days. If the approval of the competent authority is not obtained within the said period of seven working days, such interception or monitoring or decryption shall cease and the information shall not be intercepted or monitored or decrypted thereafter without the prior approval of the competent authority.&lt;a href="#_ftn125" name="_ftnref125"&gt;[125]&lt;/a&gt; If a state wishes to intercept information that is beyond its jurisdiction, it must request permission to issue the direction from the Secretary in the Ministry of Home Affairs.&lt;a href="#_ftn126" name="_ftnref126"&gt;[126]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to avoid the risk of unauthorised interception, the IT Interception Rules provide for the following safeguards:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;If authorised by the competent authority, any agency of the government may intercept, monitor, or decrypt information transmitted, received, or stored in any computer resource only for the purposes specified in section 69(1) of the IT Act.&lt;a href="#_ftn127" name="_ftnref127"&gt;[127]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The IT Interception Rules further provide that the competent authority may give any decryption direction to the decryption key holder.&lt;a href="#_ftn128" name="_ftnref128"&gt;[128]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The officer issuing an order for interception is required to issue requests in writing to designated nodal officers of the service provider.&lt;a href="#_ftn129" name="_ftnref129"&gt;[129]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Any direction issued by the competent authority must contain the reasons for direction, and must be forwarded to the review committee seven days after being issued.&lt;a href="#_ftn130" name="_ftnref130"&gt;[130]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;In the case of issuing or approving an interception order, in arriving at its decision the competent authority must consider all alternate means of acquiring the information.&lt;a href="#_ftn131" name="_ftnref131"&gt;[131]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The order must relate to information sent or likely to be sent from one or more particular computer resources to another (or many) computer resources.&lt;a href="#_ftn132" name="_ftnref132"&gt;[132]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The reasons for ordering interceptions must be recorded in writing, and must specify the name and designation of the officer to whom the information obtained is to be disclosed, and also specify the uses to which the information is to be put.&lt;a href="#_ftn133" name="_ftnref133"&gt;[133]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The directions for interception will remain in force for a period of 60 days, unless renewed. If the orders are renewed they cannot be in force for longer than 180 days.&lt;a href="#_ftn134" name="_ftnref134"&gt;[134]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Authorized agencies are prohibited from using or disclosing contents of intercepted communications for any purpose other than investigation, but they are permitted to share the contents with other security agencies for the purpose of investigation or in judicial proceedings. Furthermore, security agencies at the union territory and state level will share any information obtained by following interception orders with any security agency at the centre.&lt;a href="#_ftn135" name="_ftnref135"&gt;[135]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;All records, including electronic records pertaining to interception are to be destroyed by the government agency “every six months, except in cases where such information is required or likely to be required for functional purposes”.&lt;a href="#_ftn136" name="_ftnref136"&gt;[136]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The contents of intercepted, monitored, or decrypted information will not be used or disclosed by any agency, competent authority, or nodal officer for any purpose other than its intended purpose.&lt;a href="#_ftn137" name="_ftnref137"&gt;[137]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The agency authorised by the Secretary of Home Affairs is required to appoint a nodal officer (not below the rank of superintendent of police or equivalent) to authenticate and send directions to service providers or decryption key holders.&lt;a href="#_ftn138" name="_ftnref138"&gt;[138]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The IT Interception Rules also place the following obligations on the service providers:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;In addition, all records pertaining to directions for interception and monitoring are to be destroyed by the service provider within a period of two months following discontinuance of interception or monitoring, unless they are required for any ongoing investigation or legal proceedings.&lt;a href="#_ftn139" name="_ftnref139"&gt;[139]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Upon receiving an order for interception, service providers are required to provide all facilities, co-operation, and assistance for interception, monitoring, and decryption. This includes assisting with: the installation of the authorised agency's equipment, the maintenance, testing, or use of such equipment, the removal of such equipment, and any action required for accessing stored information under the direction.&lt;a href="#_ftn140" name="_ftnref140"&gt;[140]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Additionally, decryption key holders are required to disclose the decryption key and provide assistance in decrypting information for authorized agencies.&lt;a href="#_ftn141" name="_ftnref141"&gt;[141]&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Every fifteen days the officers designated by the intermediaries are required to forward to the nodal officer in charge a list of interceptions orders received by them. The list must include the details such as reference and date of orders of the competent authority.&lt;a href="#_ftn142" name="_ftnref142"&gt;[142]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The service provider is required to put in place adequate internal checks to ensure that unauthorised interception does not take place, and to ensure the extreme secrecy of intercepted information is maintained.&lt;a href="#_ftn143" name="_ftnref143"&gt;[143]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The contents of intercepted communications are not allowed to be disclosed or used by any person other than the intended recipient.&lt;a href="#_ftn144" name="_ftnref144"&gt;[144]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Additionally, the service provider is required to put in place internal checks to ensure that unauthorized interception of information does not take place and extreme secrecy is maintained. This includes ensuring that the interception and related information are handled only by the designated officers of the service provider.&lt;a href="#_ftn145" name="_ftnref145"&gt;[145]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009, under section 69B of the Information Technology Act, stipulate that directions for the monitoring and collection of traffic data or information can be issued by an order made by the competent authority&lt;a href="#_ftn146" name="_ftnref146"&gt;[146]&lt;/a&gt; for any or all of the following purposes related to cyber security:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;forecasting of imminent cyber incidents;&lt;/li&gt;
&lt;li&gt;monitoring network application with traffic data or information on computer resource;&lt;/li&gt;
&lt;li&gt;identification and determination of viruses or computer contaminant;&lt;/li&gt;
&lt;li&gt;tracking cyber security breaches or cyber security incidents;&lt;/li&gt;
&lt;li&gt;tracking computer resource breaching cyber security or spreading virus or computer contaminants;&lt;/li&gt;
&lt;li&gt;identifying or tracking any person who has breached, or is suspected of having breached or likely to breach cyber security;&lt;/li&gt;
&lt;li&gt;undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resources;&lt;/li&gt;
&lt;li&gt;accessing stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force;&lt;/li&gt;
&lt;li&gt;any other matter relating to cyber security.&lt;a href="#_ftn147" name="_ftnref147"&gt;[147]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;According to these Rules, any direction issued by the competent authority should contain reasons for such direction and a copy of such direction should be forwarded to the Review Committee within a period of seven working days.&lt;a href="#_ftn148" name="_ftnref148"&gt;[148]&lt;/a&gt; Furthermore, these Rules state that the Review Committee shall meet at least once in two months and record its finding on whether the issued directions are in accordance with the provisions of sub-section (3) of section 69B of the Act. If the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and issue an order for the destruction of the copies, including corresponding electronic record of the monitored or collected traffic data or information.&lt;a href="#_ftn149" name="_ftnref149"&gt;[149]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information Technology (Guidelines for Cyber Cafes) Rules, 2011&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology (Guidelines for Cyber Cafes) Rules, 2011, were issued under powers granted under section 87(2), read with section 79(2) of the Information Technology Act, 2000.&lt;a href="#_ftn150" name="_ftnref150"&gt;[150]&lt;/a&gt; These rules require cyber cafes in India to store and maintain backup logs for each login by any user, to retain such records for a year and to ensure that the log is not tampered. Rule 7 requires the inspection of cyber cafes to determine that the information provided during registration is accurate and remains updated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. The Indian Post Office Act, 1898&lt;/b&gt;&lt;br /&gt;Section 26 of the Indian Post Office Act, 1898, empowers the Central Government and the State Governments to intercept postal articles.&lt;a href="#_ftn151" name="_ftnref151"&gt;[151]&lt;/a&gt; In particular, section 26 of the Indian Post Office Act, 1898, states that on the occurrence of any public emergency or in the interest of public safety or tranquility, the Central Government, State Government or any officer specially authorised by the Central or State Government may direct the interception, detention or disposal of any postal article, class or description of postal articles in the course of transmission by post. Furthermore, section 26 states that if any doubt arises regarding the existence of public emergency, public safety or tranquility then a certificate to that effect by the Central Government or a State Government would be considered as conclusive proof of such condition being satisfied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to this section, the Central Government and the State Governments of India can intercept postal articles if it is deemed to be in the instance of a 'public emergency' or for 'public safety or tranquility'. However, the Indian Post Office Act, 1898, does not cover electronic communications and does not mandate their interception, which is covered by the Information Technology Act, 2000 and the Indian Telegraph Act, 1885.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. The Indian Wireless Telegraphy Act, 1933&lt;/b&gt;&lt;br /&gt;The Indian Wireless Telegraphy Act was passed to regulate and govern the possession of wireless telegraphy equipment within the territory of India. This Act essentially provides that no person can own “wireless telegraphy apparatus”&lt;a href="#_ftn152" name="_ftnref152"&gt;[152]&lt;/a&gt; except with a license provided under this Act and must use the equipment in accordance with the terms provided in the license.&lt;a href="#_ftn153" name="_ftnref153"&gt;[153]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the major sources of revenue for the Indian State Broadcasting Service was revenue from the licence fee from working of wireless apparatus under the Indian Telegraph Act, 1885.The Indian State Broadcasting Service was losing revenue due to lack of legislation for prosecuting persons using unlicensed wireless apparatus as it was difficult to trace them at the first place and then prove that such instrument has been installed, worked and maintained without licence. Therefore, the current legislation was proposed, in order to prohibit possession of wireless telegraphy apparatus without licence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presently the Act is used to prosecute cases, related to illegal possession and transmission via satellite phones. Any person who wishes to use satellite phones for communication purposes has to get licence from the Department of Telecommunications.&lt;a href="#_ftn154" name="_ftnref154"&gt;[154]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. The Code of Criminal Procedure&lt;/b&gt;&lt;br /&gt;Section 91 of the Code of Criminal Procedure regulates targeted surveillance. In particular, section 91 states that a Court in India or any officer in charge of a police station may summon a person to produce any document or any other thing that is necessary for the purposes of any investigation, inquiry, trial or other proceeding under the Code of Criminal Procedure.&lt;a href="#_ftn155" name="_ftnref155"&gt;[155]&lt;/a&gt; Under section 91, law enforcement agencies in India could theoretically access stored data. Additionally, section 92 of the Code of Criminal Procedure regulates the interception of a document, parcel or thing in the possession of a postal or telegraph authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further section 356(1) of the Code of Criminal Procedure provides that in certain cases the Courts have the power to direct repeat offenders convicted under certain provisions, to notify his residence and any change of, or absence from, such residence after release for a term not exceeding five years from the date of the expiration of the second sentence.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Policy Suggestions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In order to avoid the different standards being adopted for different aspects of surveillance and in different parts of the country, there should be one single policy document or surveillance and interception manual which should contain the rules and regulations regarding all kinds of surveillance. This would not only help in identifying problems in the law but may also be useful in streamlining the entire surveillance regime. However it is easier said than done and requires a mammoth effort at the legislative stage. This is because under the Constitutional scheme of India law and order is a State subject and the police machinery in every State is under the authority of the State government. Therefore it would not be possible to issue a single legislation dealing with all aspects of surveillance since the States are independent in their powers to deal with the police machinery.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even when we look at the issue of interception, certain state legislations especially the ones dealing with organized crime and bootleggers such as the Maharashtra Control of Organized Crime Act, 1999, the Andhra Pradesh Control of Organized Crime Act, 2001, also deal with the issue of interception and contain provisions empowering the state government to intercept communications for the purpose of using it to investigate or prevent criminal activities. Further even the two central level legislations that deal with interception, &lt;i&gt;viz.&lt;/i&gt; the Telegraph Act and the Information Technology Act, specifically empower the State governments also to intercept communications on the same grounds as the Central Government. Since interception of communications is mostly undertaken by security and law enforcement agencies, broadly for the maintenance of law and order, State governments cannot be prevented from issuing their own legislations to deal with interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to the abovementioned legal and constitutional complexities the major problem in achieving harmonization is to get both the Central and State governments on to the same page. Even if the Central government amends the Telegraph Act and the IT Act to bring them in line with each other, the State governments will still be free to do whatever they please. Therefore it seems the best approach in order to achieve harmonization may be to have a two pronged strategy, i.e. (i) issue a National Surveillance Policy covering both interception and general surveillance; and (ii) amend the central legislations i.e. the Telegraph Act and the Information Technology Act in accordance with the National Surveillance Policy. Once a National Surveillance Policy, based on scientific data and the latest theories on criminology is issued, it is hoped that State governments will themselves like to adopt the principles enshrined therein and amend their own legislations dealing with interception to fall in line with the National Surveillance Policy.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Section 6(2)(b) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Section 191 (D) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Section 200 (D) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Section 2011 (I) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Section 201 (II) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Section 201 (IV) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Section 193 (III) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Surjan Das &amp;amp; Basudeb Chattopadhyay, &lt;i&gt;Rural Crime in Police Perception&lt;/i&gt;: &lt;i&gt;A Study of Village Crime Note Books&lt;/i&gt;, 26(3) Economic and Political Weekly 129, 129 (1991).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Section 201 (III) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Section 201 (V) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Section 201 (VII) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Section 356(1) of the Criminal Procedure Code states as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;356. Order for notifying address of previously convicted offender.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) When any person, having been convicted by a Court in India of an offence punishable under section 215, section 489A, section 489B, section 489C or section 489D of the Indian Penal Code, (45 of 1860 ) or of any offence punishable under Chapter XII or Chapter XVII of that Code, with imprisonment for a term of three years or upwards, is again convicted of any offence punishable under any of those sections or Chapters with imprisonment for a term of three years or upwards by any Court other than that of a Magistrate of the second class, such Court may, if it thinks fit, at the time of passing a sentence of imprisonment on such person, also order that his residence and any change of, or absence from, such residence after release be notified as hereinafter provided for a term not exceeding five years from the date of the expiration of such sentence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; The Indian Telegraph Act, 1885, &lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Privacy International, Report: &lt;i&gt;“India”, &lt;/i&gt;Chapter 3: “Surveillance Policies”, &lt;a href="https://www.privacyinternational.org/reports/india/iii-surveillance-policies"&gt;https://www.privacyinternational.org/reports/india/iii-surveillance-policies&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Rule 419A(1), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Rule 419A(1), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Rule 419A(2), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Rule 419A(3), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Rule 419A(4), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Rule 419A(5), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Rule 419A(6), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Rule 419A(7), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Rule 419A(8), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Rule 419A(9), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Rule 419A(18), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt;&lt;i&gt; Ibid.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Rule 419A(10), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Rule 419A(11), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; Rule 419A(12), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Rule 419A(13), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Rule 419A(14), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Rule 419A(15), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Rule 419A(19), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt;&lt;i&gt; Ibid&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt;&lt;i&gt; Ibid&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; Section 46 of the Unlawful Activities Prevention Act, 1967. The Unlawful Activities (Prevention) Act, 1967 has certain additional safeguards such as not allowing intercepted information to be disclosed or received in evidence unless the accused has been provided with a copy of the same atleast 10 days in advance, unless the period of 10 days is specifically waived by the judge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; State owned Public Sector Undertakings (PSUs) (Mahanager Telephone Nigam Limited (MTNL) and Bharat Sanchar Nigam Limited (BSNL)) were issued licenses for provision of CMTS as third operator in various parts of the country. Further, 17 fresh licenses were issued to private companies as fourth cellular operator in September/ October, 2001, one each in 4 Metro cities and 13 Telecom Circles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Section 45.2 of the CMTS License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Section 41.09 of the CMTS License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; Section 41.09 of the CMTS License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Section 44.4 of the CMTS License. Similar provision exists in section 44.11 of the CMTS License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Section 34.28 (xix) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; Section 34.12 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; Section 34.13 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Section 34.22 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Section 34.6 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; Section 34.15 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; Section 34.28 (xiv) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; Section 34.28 (xi) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; Section 34.14 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; Section 34.28 (ix)&amp;amp;(x) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; Section 30.1 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; Section 33.4 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Section 34.4 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; Section 34.7 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; Section 34.9 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; Section 34.27 (a)(i) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; Section 34.27(a)(ii-vi) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Section 32.1, 32.2 (i)(ii), 32.3 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; Section 34.8 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; Section 34.18 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; Section 34.28 (xv) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; Section 41.10 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; Section 41.10 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; Section 41.19(i) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; Section 41.19(ii) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; Section 41.19(iv) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; Section 39.1 of the UASL. Similar provision is contained in section 41.4, 41.12 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; Section 39.3 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; Section 39.2 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; Section 23.2 of the UASL. Similar provisions are contained in section 41.7 of the UASL regarding provision of monitoring equipment for monitoring in the “interest of security”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; Section 42.2 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; Section 41.20(xx) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; Section 41.10 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; Section 41.10 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; Section 41.14 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; Section 41.16 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; Section 41.20(ix) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; Section 41.20(ix) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; Section 41.19(ii) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; Section 41.20(xii) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref82" name="_ftn82"&gt;[82]&lt;/a&gt; Section 41.20(xiii) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref83" name="_ftn83"&gt;[83]&lt;/a&gt; Section 41.20(xiv) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref84" name="_ftn84"&gt;[84]&lt;/a&gt; Section 41.20 (xix) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref85" name="_ftn85"&gt;[85]&lt;/a&gt; Section 41.20(xvi) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref86" name="_ftn86"&gt;[86]&lt;/a&gt; The different services covered by the Unified License are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Unified License (All Services)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Access Service (Service Area-wise)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Internet Service (Category-A with All India jurisdiction)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. Internet Service (Category-B with jurisdiction in a Service Area)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e. Internet Service (Category-C with jurisdiction in a Secondary Switching Area)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;f. National Long Distance (NLD) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;g. International Long Distance (ILD) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;h. Global Mobile Personal Communication by Satellite (GMPCS) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Public Mobile Radio Trunking Service (PMRTS) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;j. Very Small Aperture Terminal (VSAT) Closed User Group (CUG) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;k. INSAT MSS-Reporting (MSS-R) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;l. Resale of International private Leased Circuit (IPLC) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Authorisation for Unified License (All Services) would however cover all services listed at para 2(ii) (b) in all service areas, 2 (ii) (c), 2(ii) (f) to 2(ii) (l) above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref87" name="_ftn87"&gt;[87]&lt;/a&gt; Chapter IV, Para 23.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref88" name="_ftn88"&gt;[88]&lt;/a&gt; Chapter VI, Para 40.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref89" name="_ftn89"&gt;[89]&lt;/a&gt; Chapter V, Para 37.1 of the UL. Similar provision is contained in Chapter VI, Para 39.4,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref90" name="_ftn90"&gt;[90]&lt;/a&gt; Chapter V, Para 37.5 of the UL/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref91" name="_ftn91"&gt;[91]&lt;/a&gt; Chapter V, Para 37.3 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref92" name="_ftn92"&gt;[92]&lt;/a&gt; Chapter V, Para 37.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref93" name="_ftn93"&gt;[93]&lt;/a&gt; Chapter VI, Para 39.23(xii) of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref94" name="_ftn94"&gt;[94]&lt;/a&gt; Chapter VI, Para 39.23 (xiii) of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref95" name="_ftn95"&gt;[95]&lt;/a&gt; Chapter VI, Para 39.23 (xiv) of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref96" name="_ftn96"&gt;[96]&lt;/a&gt; Chapter VI, Para 39.23 (xix) of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref97" name="_ftn97"&gt;[97]&lt;/a&gt; Chapter VIII, Para 8.3 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref98" name="_ftn98"&gt;[98]&lt;/a&gt; Chapter VIII, Para 8.4 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref99" name="_ftn99"&gt;[99]&lt;/a&gt; Chapter VIII, Para 8.5 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref100" name="_ftn100"&gt;[100]&lt;/a&gt; Chapter IX, Paras 7.1 to 7.3 of the UL. Further obligations have also been imposed on the Licensee to ensure that its ILL customers maintain the usage of IP addresses/Network Address Translation (NAT) syslog, in case of multiple users on the same ILL, for a minimum period of one year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref101" name="_ftn101"&gt;[101]&lt;/a&gt; Chapter IX, Paras 8.1 to 8.3 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref102" name="_ftn102"&gt;[102]&lt;/a&gt; Chapter IX, Paras 8.4 and 8.5 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref103" name="_ftn103"&gt;[103]&lt;/a&gt; Chapter X, Para 5.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref104" name="_ftn104"&gt;[104]&lt;/a&gt; Chapter XI, Para 6.3 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref105" name="_ftn105"&gt;[105]&lt;/a&gt; Chapter XI, Para 6.4 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref106" name="_ftn106"&gt;[106]&lt;/a&gt; Chapter XI, Para 6.6 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref107" name="_ftn107"&gt;[107]&lt;/a&gt; Chapter XI, Para 6.7 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref108" name="_ftn108"&gt;[108]&lt;/a&gt; Chapter XII, Para 7.4 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref109" name="_ftn109"&gt;[109]&lt;/a&gt; Chapter XII, Para 7.5 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref110" name="_ftn110"&gt;[110]&lt;/a&gt; Chapter XII, Para 7.6 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref111" name="_ftn111"&gt;[111]&lt;/a&gt; Chapter XII, Para 7.7 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref112" name="_ftn112"&gt;[112]&lt;/a&gt; Chapter XII, Para 7.8 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref113" name="_ftn113"&gt;[113]&lt;/a&gt; Chapter XIII, Para 7.1 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref114" name="_ftn114"&gt;[114]&lt;/a&gt; Chapter XIV, Para 8.1 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref115" name="_ftn115"&gt;[115]&lt;/a&gt; Chapter XIV, Para 8.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref116" name="_ftn116"&gt;[116]&lt;/a&gt; Chapter XV, Para 8.1 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref117" name="_ftn117"&gt;[117]&lt;/a&gt; Chapter XV, Para 8.5 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref118" name="_ftn118"&gt;[118]&lt;/a&gt; Chapter XVI, Paras 4.1 - 4.4 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref119" name="_ftn119"&gt;[119]&lt;/a&gt; Section 69 of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref120" name="_ftn120"&gt;[120]&lt;/a&gt;&lt;i&gt; Ibid&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref121" name="_ftn121"&gt;[121]&lt;/a&gt; Section 69B of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref122" name="_ftn122"&gt;[122]&lt;/a&gt; Section 32 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref123" name="_ftn123"&gt;[123]&lt;/a&gt; Rule 3, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref124" name="_ftn124"&gt;[124]&lt;/a&gt; Rule 2(d), Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref125" name="_ftn125"&gt;[125]&lt;/a&gt; Rule 3, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref126" name="_ftn126"&gt;[126]&lt;/a&gt; Rule 6, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref127" name="_ftn127"&gt;[127]&lt;/a&gt; Rule 4, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref128" name="_ftn128"&gt;[128]&lt;/a&gt; Rule 5, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref129" name="_ftn129"&gt;[129]&lt;/a&gt; Rule 13, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref130" name="_ftn130"&gt;[130]&lt;/a&gt; Rule 7, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref131" name="_ftn131"&gt;[131]&lt;/a&gt; Rule 8, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref132" name="_ftn132"&gt;[132]&lt;/a&gt; Rule 9, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref133" name="_ftn133"&gt;[133]&lt;/a&gt; Rule 10, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref134" name="_ftn134"&gt;[134]&lt;/a&gt; Rule 11, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref135" name="_ftn135"&gt;[135]&lt;/a&gt; Rule 25(2)&amp;amp;(6), Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref136" name="_ftn136"&gt;[136]&lt;/a&gt; Rule 23, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref137" name="_ftn137"&gt;[137]&lt;/a&gt; Rule 25, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref138" name="_ftn138"&gt;[138]&lt;/a&gt; Rule 12, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref139" name="_ftn139"&gt;[139]&lt;/a&gt; Rule 23(2), Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref140" name="_ftn140"&gt;[140]&lt;/a&gt; Rule 19, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref141" name="_ftn141"&gt;[141]&lt;/a&gt; Rule 17, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref142" name="_ftn142"&gt;[142]&lt;/a&gt; Rule 18, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref143" name="_ftn143"&gt;[143]&lt;/a&gt; Rule 20&amp;amp; 21, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref144" name="_ftn144"&gt;[144]&lt;/a&gt; Rule 25, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref145" name="_ftn145"&gt;[145]&lt;/a&gt; Rule 20, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref146" name="_ftn146"&gt;[146]&lt;/a&gt; Rule 3(1) of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref147" name="_ftn147"&gt;[147]&lt;/a&gt; Rule 3(2) of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref148" name="_ftn148"&gt;[148]&lt;/a&gt; Rule 3(3) of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref149" name="_ftn149"&gt;[149]&lt;/a&gt; Rules 7 of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref150" name="_ftn150"&gt;[150]&lt;/a&gt; Introduction to the Information Technology (Guidelines for Cyber Cafe) Rules, 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref151" name="_ftn151"&gt;[151]&lt;/a&gt; The Indian Post Office Act, 1898, &lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref152" name="_ftn152"&gt;[152]&lt;/a&gt; The expression “wireless telegraphy apparatus” has been defined as “any apparatus, appliance, instrument or material used or capable of use in wireless communication, and includes any article determined by rule made under Sec. 10 to be wireless telegraphy apparatus, but does not include any such apparatus, appliance, instrument or material commonly used for other electrical purposes, unless it has been specially designed or adapted for wireless communication or forms part of some apparatus, appliance, instrument or material specially so designed or adapted, nor any article determined by rule made under Section 10 not to be wireless telegraphy apparatus;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref153" name="_ftn153"&gt;[153]&lt;/a&gt; Section 4, Wireless Telegraphy Act, 1933.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref154" name="_ftn154"&gt;[154]&lt;/a&gt; Snehashish Ghosh, Indian Wireless Telegraphy Act, 1933, &lt;a href="http://cis-india.org/telecom/resources/indian-wireless-telegraphy-act"&gt;http://cis-india.org/telecom/resources/indian-wireless-telegraphy-act&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref155" name="_ftn155"&gt;[155]&lt;/a&gt; The Code of Criminal Procedure, 1973, Section 91, &lt;a href="http://www.icf.indianrailways.gov.in/uploads/files/CrPC.pdf"&gt;http://www.icf.indianrailways.gov.in/uploads/files/CrPC.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india'&gt;http://editors.cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-03T15:27:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality">
    <title>Relationship Between Privacy and Confidentiality</title>
    <link>http://editors.cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality</link>
    <description>
        &lt;b&gt;The laws of breach of confidentiality and breach of privacy at first glance seem very similar to each other. If a doctor releases health information relating to a patient that s/he is treating then such an act would give rise to a claim both under the law of privacy as well as under the law of confidentiality.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Similar is the case with financial information released by a bank, etc. This makes one wonder exactly where and how it is that the law of breach of privacy intersects with that of the law of confidentiality. An enquiry into such a complex question of law requires a deeper appreciation of the relationship between these two different principles of law which require a better understanding of the origins and evolutions of these principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this paper we shall try to explore the origins of both the law of privacy as well as confidentiality as they have evolved in the field of tort law in India. Although our primary focus is Indian law, however in order to understand the evolution of these principles it is necessary to discuss their evolution in three common law jurisdictions, &lt;i&gt;viz. &lt;/i&gt;the United States of America, the United Kingdom and India. The reason for an analysis of these three jurisdictions will become clear as the reader goes further into this paper, however for ease of reference it would be better if the reason is clarified here itself. The concept of a right against breach of confidentiality has existed in English common law for a very long time, however the concept of a claim for breach of privacy originated only in American law, other than some statutory protection granted in the last couple of decades, has still not been granted recognition in English common law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a discussion of the evolution of these principles in both American and English law, we will then discuss these principles as they exist in Indian law. This discussion will (or should) at once become easier to understand and digest because of the deeper understanding of the interplay between these two principles gained from a reading of the first two chapters.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy Torts: American Origins&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Looking at the origins of privacy law it has been argued by many academics that the law of privacy in common law has its origins in an article published by 	Samuel Warren and Louis Brandies in the Harvard Law Review in 1890.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; Warren and Brandeis suggested that one 	could generalise certain cases on defamation, breach of copyright in unpublished letters, trade secrets and breach of confidence as all based upon the 	protection of a common value which they called privacy.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; The authors relied upon the existing body of cases 	relating to the law of confidentiality and interpreted it in a way so as to create a "right to privacy" which has evolved into a right quite different from 	the common understanding of confidentiality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although there are certain criticisms of the article by Warren and Brandeis, the background in which the article was written and the lacuna that these two 	scholars were trying to fill in the law of confidentiality as it existed at that time gives some context to the reasons why they felt the need to move away 	from the existing principles and propose a new principle of law. Samuel Warren and Louis Brandies were both worried about the invasion of personal space by the advent of the news and print media which was experiencing a boom during the late 19&lt;sup&gt;th&lt;/sup&gt; century.	&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; Warren and Brandeis were worried that although the existing body of law on confidentiality would protect 	a person from having their picture put on a postcard by their photographer without their consent,&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; however if there was no relationship between the two persons there would be no remedy available to the aggrieved party.	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the criticisms of Warren and Brandeis' article is that to propose the existence of a right to privacy they relied heavily on the English case of	&lt;i&gt;Prince Albert &lt;/i&gt;v. &lt;i&gt;Strange&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;b&gt;[6]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;. It has been proposed by some academics that this was a case which dealt with confidentiality and literary property which was characterized by Warren and Brandeis as a privacy case.	&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; In this case Prince Albert sought to restrain publication of otherwise unpublished private etchings and 	lists of works which were made by Queen Victoria. The etchings appeared to have been removed surreptitiously from the private printer to whom these 	etchings were given and came into the possession of one Mr. Strange who wanted to print and sell the etchings. The case specifically rejected the existence 	of a right to privacy in the following words:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The case is not put by the Plaintiff on any principle of trust or contract, but on property; there is nothing to show contract or confidence. It cannot be 	maintained that privacy constitutes property, or that the Court will interfere to protect the owner in the enjoyment of it; Chadler v. Thompson (3 Camp. 	80). In &lt;i&gt;William Aldred's case&lt;/i&gt; (9 Rep. 58 b.), Wray C. J. said, "The law does not give an action for such things of delight"."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Infact the case mentioned the term "privacy" only once, but that statement was made in the context of whether a delay in granting an injunction in such 	cases would defeat the entire purpose of the suit and was not preceeded or followed by any discussion on a distinct right to privacy:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"In the present case, where privacy is the right invaded, postponing the injunction would be equivalent to denying it altogether. The interposition of this 	Court in these cases does not depend upon any legal right, and to be effectual, it must be immediate."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Warren and Brandeis interpreted this case in a different manner and came to the conclusion that the "principle which protects personal writings 	and all other personal productions, not against theft and physical appropriation, but against publication in any form, is in reality not the principle of 	private property, but that of an inviolate personality".&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The article further incorporated the language of Judge Cooley's treatise (&lt;i&gt;Cooley on Torts&lt;/i&gt;)&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; which 	used the phrase "the right to be let alone". They said that identifying this common element should enable the courts to declare the existence of a general principle which protected a person's appearance, sayings, acts and personal relations from being exposed in public.	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; However it has been argued by some scholars that this phrase was not used by Judge Cooley with as much 	import as has been given by Warren and Brandeis in their article. The phrase was used by Judge Cooley in mere passing while discussing why tort law protected against not only batteries but also assaults with no physical contact, and had no connection with privacy rights.	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Warren and Brandeis' article started getting almost immediate attention and some amount of recognition from various quarters,&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; though it cannot be said that it was universally well received.	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; However over time this tort of privacy slowly started getting recognized by various Courts throughout 	the United States and got a huge boost when it was recognized in a brief section in the &lt;i&gt;First Restatement of Torts&lt;/i&gt; published in 1939. The right to 	privacy in American jurisprudence got another boost and became fully entrenched later on specially with the endorsement of Dr. William Prosser who 	discussed privacy in his treatise on the law of torts, the subsequent editions of which had a more and more elaborate discussion of the tort of privacy. 	This development of the law was further enhanced by Dr. Prosser's position as a reporter of the &lt;i&gt;Second Restatement of Torts&lt;/i&gt;, which imported a four 	part taxonomy of the privacy tort which had been suggested by Dr. Prosser in his previous works.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus we see how, beginning with the article by Warren and Brandeis in 1890, the privacy tort in American jurisprudence developed over the years and became 	further entrenched due to the influence of William Prosser and his works on the tort of privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy Torts in England: An Elaborate Principle of Confidentiality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The law of confidentiality in English law, as applied in certain specific contexts such as attorney client privileges,	&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; doctor patient confidentiality,&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; etc. has been applied since hundreds and even though cases relating to the breach of confidentiality had already existed, however the case of &lt;i&gt;Prince Albert &lt;/i&gt;v.	&lt;i&gt;Strange&lt;/i&gt;,&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; be it due to the interesting facts or the fame of the parties involved, is still 	considered as the clearest and most well established precedent for the tort of breach of confidence.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; Similar cases relying upon this tort kept being decided by the English Courts but the tort of confidentiality was further cemented in English common law by 	the case of &lt;i&gt;Saltman Engineering Co. &lt;/i&gt;v. &lt;i&gt;Campbell Engineering Co.&lt;/i&gt;,&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; which expanded the 	application of the principle by holding that the obligation to respect confidence is not limited to only instances where parties have a contractual 	relationship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The seminal case on the tort of breach of confidentiality in English law was that of &lt;i&gt;Coco&lt;/i&gt; v. &lt;i&gt;A.N Clark (Engineers) Ltd.&lt;/i&gt;,	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; where an inventor enjoined a moped manufacturer from using design ideas communicated by the inventor 	during failed contractual negotiations with the manufacturer.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; In this case Megarry J., held that a case 	of breach of confidence normally requires three elements to succeed, apart from contract, (i) the information itself must have the necessary quality of 	confidence about it, (ii) that information must have been imparted in circumstances importing an obligation of confidence, and (iii) there must be an 	unauthorised use of that information to the detriment of the party communicating it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Relying on the principles enunciated in the above cases and developed by subsequent decisions, English law relating to the tort of breach of 	confidentiality developed into a robust and flexible body of law protecting personal and commercial information from disclosure. Infact by the late 1990s, 	English law was very broad and gradually expanding in its scope of the tort of breach of confidentiality and Courts had stretched the idea of an obligation 	of confidence so as to include cases where there was not even any communication between the parties, such as secret photography and wiretapping. Further 	since third parties had already been reposed with an obligation of confidence when they knowingly received confidential material even if they did not have 	any relationship with the plaintiff, therefore the law of confidence could be extended to parties outside the relationship in which the confidence was initially made. This, although was not as broad and overarching as the American privacy tort, still had the ability to cover a wide range of cases.	&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While English Courts on the one hand kept trying to expand the scope of the confidentiality tort, they also categorically rejected the existence of a 	privacy tort on the lines developed under American jurisprudence. The suggestion of the existence of such a privacy tort in English law was most recently 	rejected by the House of Lords in the case of &lt;i&gt;Wainwright &lt;/i&gt;v. &lt;i&gt;Home Office&lt;/i&gt;,&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; by Lord 	Bingham in the following words:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"What the courts have so far refused to do is to formulate a general principle of "invasion of privacy" (I use the quotation marks to signify doubt about 	what in such a context the expression would mean) from which the conditions of liability in the particular case can be deduced."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this case the plaintiffs made a claim against the prison authorities for strip searching them before they went to meet an inmate and since the incident 	occurred before the coming into force of the Human Rights Act, 1998 of the UK had not yet come into force, so the plaintiffs also argued that there was an 	existing tortuous remedy based on a breach of privacy in common law. While discussing whether English Courts were amenable to or had ever recognized such a common law tort of privacy, the House of Lords cited decisions such as &lt;i&gt;Malone v Metropolitan Police Comr&lt;/i&gt;,	&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;and &lt;i&gt;R v Khan (Sultan)&lt;/i&gt;,&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;i&gt; &lt;/i&gt; in both of which the courts refused to recognize a general right to privacy in the context of tapping of telephones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The absence of any general cause of action for invasion of privacy was also acknowledged by the Court of Appeal in the context of a newspaper reporter and photographer invading into a patient's hospital bedroom in an effort to purportedly interview him and taking photographs, in the case of	&lt;i&gt;Kaye v Robertson&lt;/i&gt;.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus relying on the above line of cases the House of Lords concluded that a general right to privacy does not exist in English common law:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"All three judgments are flat against a judicial power to declare the existence of a high-level right to privacy and I do not think that they suggest that 	the courts should do so. The members of the Court of Appeal certainly thought that it would be desirable if there was legislation to confer a right to 	protect the privacy of a person in the position of Mr Kaye against the kind of intrusion which he suffered, but they did not advocate any wider principle."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus it is clear that English Courts have time and again denied the existence of an American style right to privacy as emanating from common law. The 	Courts have instead tried to expand and widen the scope of the tort of confidentiality so as to cover various situations which may arise due to the 	pervasiveness of technology and which the traditional interpretation of the law of confidentiality was not equipped to deal with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore it is now a little clearer that the reason for the existence of the confusion between the torts of privacy and confidentiality is that the right 	to privacy had its origins in the common law precedents but the right to privacy developed as a distinct and separate right in America, primarily due to 	the influence of Warren and Brandeis's article as well as the works of William Prosser, whereas the Courts in England did not adopt this principle of 	privacy and instead favored a much more elaborate right to confidentiality. In the Indian context, this has led to some amount of confusion because, Indian 	case laws, as will be seen in the following chapter, borrowed heavily from American jurisprudence when discussing the right to privacy and not all cases 	have been able to clearly bring out the difference between the principles of privacy and confidentiality.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Indian Law&lt;/h2&gt;
&lt;h3&gt;Tort of Breach of Privacy&lt;br clear="all" /&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Any analysis of the right to privacy in India, be it in the realm of constitutional law or tort law almost always includes within its ambit a discussion of the two celebrated cases of &lt;i&gt;Kharak Singh &lt;/i&gt;v. &lt;i&gt;Union of India&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;b&gt;[27]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; and	&lt;i&gt;Govind &lt;/i&gt;v. &lt;i&gt;State of M.P.,&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;b&gt;[28]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; which elevated the right to privacy to the 	pedestal of a fundamental right under Indian law. However, an unintended consequence of this has been that pretty much every commentator on Indian law 	includes a discussion of these two cases when discussing the right to privacy, be it under constitutional law or under tort law. However, there is one 	problem with such an analysis of the right to privacy, &lt;i&gt;viz.&lt;/i&gt; these two cases were dealing with a pure constitutional law question and relied upon 	American case laws to read into Article 21 an inbuilt right to privacy. However from a strictly tort law perspective, these cases are not relevant at all, and the seminal case for the tort of breach of privacy would have to be the Apex Court decision in &lt;i&gt;R. Rajagopal &lt;/i&gt;v. &lt;i&gt;State of Tamil Nadu&lt;/i&gt;,	&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt; which specifically recognized this distinction and stated that the right to privacy has two different 	aspects, (i) the constitutional right to privacy, and (ii) the common law right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The facts of the &lt;i&gt;R. Rajagopal &lt;/i&gt;case revolve around the publishing of the autobiography written by the prisoner Auto Shankar, who had been placed in 	jail for committing multiple murders. The autobiography contained proof of involvement of many IAS, IPS officers in his crimes. Although Shankar had 	initially requested that the magazine print his autobiography, he later requested that his story not be published. The publishers held that it was their 	right to publish the autobiography while the IPS and IAS officers on the other hand claimed that Auto Shankar was trying to defame them and wanted to ban 	its publication. The Supreme Court in this case, implicitly accepts the existence of a right to privacy under Indian tort law when&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"21.The question is how far the principles emerging from the United States and English decisions are relevant under our constitutional system. So far as 	the freedom of press is concerned, it flows from the freedom of speech and expression guaranteed by Article 19(1)(a). But the said right is subject to 	reasonable restrictions placed thereon by an existing law or a law made after the commencement of the Constitution in the interests of or in relation to 	the several matters set out therein. Decency and defamation are two of the grounds mentioned in clause (2). 	&lt;i&gt; Law of torts providing for damages for invasion of the right to privacy and defamation and Sections 499/500 IPC are the existing laws saved under 		clause (2). &lt;/i&gt; "&lt;/p&gt;
&lt;p&gt;Discussing the distinction between the two aspects of the right to privacy, the Court held:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The right to privacy as an independent and distinctive concept originated in the field of Tort law, under which a new cause of action for damages 	resulting from unlawful invasion of privacy was recognized. This right has two aspects which are but two faces of the same coin (1) the general law of 	privacy which affords a tort action for damages resulting from an unlawful invasion of privacy and (2) the constitutional recognition given to the right to 	privacy which protects personal privacy against unlawful governmental invasion. The first aspect of this right must be said to have been violated where, 	for example, a person's name or likeness is used, without his consent, for advertising or non-advertising purposes or for that matter, his life story is 	written whether laudatory or otherwise and published without his consent as explained hereinafter. In recent times, however, this right has acquired a 	constitutional status."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a discussion of the various arguments presented by the parties (a number of which are not relevant for the purposes of this paper), the Supreme Court 	laid down the following principles regarding freedom of the press and the right to privacy:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) The right to privacy is implicit in the right to life and liberty guaranteed to the citizens of this country by Article 21. It is a "right to be let 	alone". A citizen has a right to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child-bearing and education among other 	matters. 	&lt;i&gt; None can publish anything concerning the above matters without his consent whether truthful or otherwise and whether laudatory or critical. If he does 		so, he would be violating the right to privacy of the person concerned and would be liable in an action for damages. Position may, however, be 		different, if a person voluntarily thrusts himself into controversy or voluntarily invites or raises a controversy. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The rule aforesaid is subject to the exception, that any publication concerning the aforesaid aspects becomes unobjectionable if such publication is 	based upon public records including court records. This is for the reason that once a matter becomes a matter of public record, the right to privacy no 	longer subsists and it becomes a legitimate subject for comment by press and media among others. We are, however, of the opinion that in the interests of 	decency [Article 19(2)] an exception must be carved out to this rule, viz., a female who is the victim of a sexual assault, kidnap, abduction or a like 	offence should not further be subjected to the indignity of her name and the incident being publicised in press/media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) There is yet another exception to the rule in (1) above - indeed, this is not an exception but an independent rule. In the case of public officials, it 	is obvious, right to privacy, or for that matter, the remedy of action for damages is simply not available with respect to their acts and conduct relevant 	to the discharge of their official duties. This is so even where the publication is based upon facts and statements which are not true, unless the official 	establishes that the publication was made (by the defendant) with reckless disregard for truth. In such a case, it would be enough for the defendant 	(member of the press or media) to prove that he acted after a reasonable verification of the facts; it is not necessary for him to prove that what he has 	written is true. Of course, where the publication is proved to be false and actuated by malice or personal animosity, the defendant would have no defence 	and would be liable for damages. It is equally obvious that in matters not relevant to the discharge of his duties, the public official enjoys the same 	protection as any other citizen, as explained in (1) and (2) above. It needs no reiteration that judiciary, which is protected by the power to punish for 	contempt of court and Parliament and legislatures protected as their privileges are by Articles 105 and 104 respectively of the Constitution of India, 	represent exceptions to this rule."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The above principles have ruled the roost on the issue of privacy and freedom of the press under Indian law, with certain minimal additions. It has been 	held by the Delhi High Court that even though a claim for damages may be made under tort law for breach of privacy, the Court may even grant a pre-publication injunction to prevent a breach of privacy.&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt; The principles laid down in&lt;i&gt;R. Rajagopal&lt;/i&gt; were further clarified in the case of &lt;i&gt;Indu Jain &lt;/i&gt;v. &lt;i&gt;Forbes Incorporated&lt;/i&gt;,	&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; where a case was filed by Indu Jain in the Delhi High Court to stop Forbes magazine from featuring her 	family in the Forbes List of Indian Billionaires. After a discussion of the various authorities and cases on the issue the Court summarized the principles 	relating to privacy and freedom of the press and applying those principles rejected the claim of the plaintiff. However for the purposes of our discussion 	these principles are extremely useful, and have been listed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"(V) Public or general interest in the matter published has to be more than mere idle curiosity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(VI) Public figures like public officials play an influential role in ordering society. They have access to mass media communication both to influence the 	policy and to counter-criticism of their views and activities. The citizen has a legitimate and substantial interest in the conduct of such persons and the 	freedom of press extends to engaging in uninhibited debate about the involvement of public figures in public issues and events. (Ref. (1994) 6 SCC 632 R. 	Rajagopal &amp;amp; Anr. Vs. State of Tamil Nadu &amp;amp; Others Para 18).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(VII) Right to privacy that rests in an individual may be waived by him by express or implied consent or lost by a course of conduct which estops its 	assertions. Such implication may be deduced from the conduct of the parties and the surrounding circumstances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(VIII) A public person or personage is one who by his standing, accomplishment, fame, mode of life or by adopting a profession or calling which gives the 	public a legitimate interest in his doings, affairs and character has so become a public figure and thereby relinquishes at least a part of his privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(IX) The standard to be adopted for assessing as to whether the published material infracts the right to privacy of any individual is that of an ordinary 	man of common sense and prudence and not an out of ordinary or hyper-sensitive man. (Ref. (2007) 1 SCC 143 &lt;i&gt;Ajay Goswami v. UOI &amp;amp; Ors.&lt;/i&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(X) Even though in this country, the freedom of press does not have presumptive priority as in some other jurisdictions including the United States of 	America, however the importance of a free media of communication to a healthy democracy has to receive sufficient importance and emphasis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(XI) In evaluating a relief to be granted in respect of a complaint against infraction of the right to privacy, the court has to balance the rights of the 	persons complaining of infraction of right to privacy against freedom of press and the right of public to disclosure of newsworthy information. Such 	consideration may entail the interest of the community and the court has to balance the proportionality of interfering with one right against the 	proportionality of impact by infraction of the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(XII) The publication has to be judged as a whole and news items, advertisements and published matter cannot be read without the accompanying message that 	is purported to be conveyed to public. Pre-publication censorship may not be countenanced in the scheme of the constitutional framework unless it is 	established that the publication has been made with reckless disregard for truth, publication shall not be normally prohibited. (Ref.: (2007) 1 SCC 143 	Ajay Goswami Vs. UOI &amp;amp; Ors.; (1994) 6 SCC 632 R. Rajagopal &amp;amp; Anr. Vs. State of Tamil Nadu &amp;amp; Others and AIR 2002 Delhi 58 Khushwant Singh &amp;amp; 	Anr. Vs. Maneka Gandhi)."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus we see that the right to privacy in Indian law, even in the realm of tort law has had an inextricable connection with constitutional principles and 	constitutional cases have had a very huge impact on the development of this right in India. However a perusal of these cases shows that the right to 	privacy is available only insofar as information which is personal in nature, however in situations where the information is non-personal in nature the 	right to privacy may not be as useful and this is where, as we shall see below, the tort of breach of confidentiality comes in to fill the void.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tort of Breach of Confidentiality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While there have been a number of landmark cases in India on the issue of breach of confidence in a contractual or a statutory setting, these cases are not 	very relevant for a discussion on the tort of breach of confidentiality. This is not to say that the tort of breach of confidentiality is non-existent in 	Indian law, the Courts here have time and again accepted that there does exist such a tortuous remedy in certain situations. We shall now try to examine 	the contours of this principle of torts by discussing some of the landmark cases on the topic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of &lt;i&gt;Petronet LNG Ltd.&lt;/i&gt; v. &lt;i&gt;Indian Petro Group and Another&lt;/i&gt;,	&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; the Delhi High Court considered a claim by a corporation seeking to prevent a 	news and media group from reporting its confidential negotiations and contracts with counterparties. The claim was based upon both the right to privacy as 	well as the right to confidentiality but in this case the court, looking at the fact that the plaintiff was a corporation and also the type of information 	involved denied the claim on the right to privacy. However, it did allow the injunction claimed by the corporation based on the right to confidentiality. 	Summarizing its discussion of the right to confidentiality, the Court stated thus:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"49. It may be seen from the above discussion, that originally, the law recognized relationships- either through status (marriage) or arising from contract 	(such as employment, contract for services etc) as imposing duties of confidentiality. The decision in &lt;i&gt;Coco&lt;/i&gt; (1969) marked a shift, though 	imperceptibly, to a possibly wider area or zone. &lt;i&gt;Douglas&lt;/i&gt; noted the paradigm shift in the perception, with the enactment of the Human Rights Act; 	even before that, in &lt;i&gt;Attorney General (2)&lt;/i&gt; (also called the &lt;i&gt;Spycatcher case&lt;/i&gt;, or the &lt;i&gt;Guardian case&lt;/i&gt;) the Court acknowledged that 	there could be situations -where a third party (likened to a passerby, coming across sensitive information, wafting from the top of a building, below) 	being obliged to maintain confidentiality, having regard to the nature and sensitivity of the information….."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While discussing the factors that the Court would have to consider while deciding a claim based on the breach of confidentiality, the Delhi High Court 	relied upon and quoted from English judgments as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"50. Even while recognizing the wider nature of duty - in the light of the Human Rights Act, 1998, and Articles 8 and 10 of the European Convention, it was 	cautioned that the court, in each case, where breach of confidentiality, is complained, and even found- has to engage in a balancing process; the factors 	to be weighed while doing so, were reflected in &lt;i&gt;A&lt;/i&gt; v. &lt;i&gt;B Plc&lt;/i&gt; [2003] QB 195; the latest judgment in &lt;i&gt;H.R.H. Prince of Wales&lt;/i&gt; indicates that the court would look at the kind of information, the nature of relationship, etc, and also consider proportionality, while weighing whether 	relief could be given:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The court will need to consider whether, having regard to the nature of the information and all the relevant circumstances, it is legitimate for the owner 	of the information to seek to keep it confidential or whether it is in the public interest that the information should be made public….&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;..In applying the test of proportionality, the nature of the relationship that gives rise to the duty of confidentiality may be important."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Holding that the principles discussed in the English cases given in the context of individual rights of confidentiality would also hold good in the case of 	corporations, the Court held that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"51. Though the reported cases, discussed above, all dealt with individual right, to confidentiality of private information (&lt;i&gt;Duchess of Argyll&lt;/i&gt;;&lt;i&gt;Frazer&lt;/i&gt;; &lt;i&gt;Douglas&lt;/i&gt;; &lt;i&gt;Campbell&lt;/i&gt; and &lt;i&gt;H.R.H. Prince of Wales&lt;/i&gt;) yet, the formulations consciously approved in the	&lt;i&gt;Guardian&lt;/i&gt;, and &lt;i&gt;Campbell&lt;/i&gt;, embrace a wider zone of confidentiality, that can possibly be asserted. For instance, professional records of 	doctors regarding treatment of patients, ailments of individuals, particulars, statements of witnesses deposing in investigations into certain types of 	crimes, particulars of even accused who are facing investigative processes, details victims of heinous assaults and crimes, etc, may, be construed as 	confidential information, which, if revealed, may have untoward consequences, casting a corresponding duty on the person who gets such information - either 	through effort, or unwittingly, not to reveal it. Similarly, in the cases of corporations and businesses, there could be legitimate concerns about its 	internal processes and trade secrets, marketing strategies which are in their nascent stages, pricing policies and so on, which, if prematurely made 	public, could result in irreversible, and unknown commercial consequences. However, what should be the approach of the court when the aggrieved party 	approaches it for relief, would depend on the facts of each case, the nature of the information, the corresponding content of the duty, and the balancing 	exercise to be carried out. It is held, therefore, that even though the plaintiff cannot rely on privacy, its suit is maintainable, as it can assert 	confidentiality in its information."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from privacy, the law of confidentiality has been used in cases where there has been a definite harm to one side but none of the other laws provide for any relief. This was the situation in the case of &lt;i&gt;Zee Telefilms Limited&lt;/i&gt; v. &lt;i&gt;Sundial Communications Pvt Ltd&lt;/i&gt;,	&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; where a company which developed television and media programming had discussed their concept of a new 	show with a network during negotiations which could not be finalized. The network however subsequently tried to start a new show which was based on the 	same concept and idea as the one presented by the plaintiff company. The plaintiff sued the network, inter alia on a claim for breach of confidential 	information and asked that the network be prevented from airing its show. In this case the plaintiff's claim based on copyright was rejected because 	copyright only subsists on the expression of an idea and not the idea itself, therefore the tort of breach of confidentiality had to be resorted to in 	order to give relief to the plaintiffs. Discussing the difference between confidentiality and copyright, the Division Bench of the Bombay High Court held:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"10. The law of the confidence is different from law of copyright. In paragraph 21.2 (page 721), [of Copinger and Skone-James on Copyright (13th Edn.)] the 	learned author has pointed out that right to restrain publication of work upon the grounds, that to do so would be breach of trust of confidence, is a 	broader right than proprietary right of copyright. There can be no copyright of ideas or information and it is not infringement of copyright to adopt or 	appropriate ideas of another or to publish information received from another, provided there is no substantial copying of the form in which those ideas 	have, or that information has, been previously embodied. But if the ideas or information have been acquired by a person under such circumstances that it 	would be a breach of good faith to publish them and he has no just case or excuses for doing so, the court may grant injunction against him. The 	distinction between the copyright and confidence may be of considerable importance with regard to unpublished manuscripts / works submitted, and not 	accepted, for publication or use. Whereas copyright protects material that has been reduced to permanent form, the general law of confidence may protect 	either written or oral confidential communication. Copyright is good against the world generally while confidence operates against those who receive 	information or ideas in confidence. Copyright has a fixed statutory time limit which does not apply to confidential information, though in practice 	application of confidence usually ceases when the information or ideas becomes public knowledge. Further the obligation of confidence rests not only on the 	original recipient, but also on any person who received the information with knowledge acquired at the time or subsequently that it was originally given in 	confidence."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A similar view, in a similar fact situation Single Judge Bench of the Delhi High Court had also came to a similar conclusion in the case of	&lt;i&gt;Anil Gupta&lt;/i&gt; v. &lt;i&gt;Kunal Das Gupta&lt;/i&gt;.&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law of confidentiality has also come to the rescue of employers in attempting to prevent important business and client information from being taken or copied by the employees for their personal gain. In the case of &lt;i&gt;Mr. Diljeet Titus, Advocate&lt;/i&gt; v. &lt;i&gt;Mr. Alfred A. Adebare&lt;/i&gt;,	&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt; the Delhi High Court had to decide a claim based on breach of confidentiality when some ex-employees 	of a law firm tried to take away client lists and drafts of legal agreements and opinions from their earlier employer-law firm. Discussing the importance 	of preventing employees or former employees from away which such actions, the Court held as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"81. I am in full agreement with the views expressed in &lt;i&gt;Margaret,&lt;/i&gt; &lt;i&gt;Duchess of Argyll (Feme Sole)&lt;/i&gt; v. &lt;i&gt;Duke of Argyll and Ors.&lt;/i&gt; (1965) 1 All ER 611, that a Court must step in to restrain a breach of confidence independent of any right under law. Such an obligation need not be 	expressed but be implied and the breach of such confidence is independent of any other right as stated above. The obligation of confidence between an 	advocate and the client can hardly be re-emphasised. Section 16 of the Copyright Act itself emphasizes the aspect of confidentiality &lt;i&gt;de hors&lt;/i&gt; even 	the rights under the Copyright Act. If the defendants are permitted to do what they have done it would shake the very confidence of relationship between 	the advocates and the trust imposed by clients in their advocates. The actions of the defendants cause injury to the plaintiff and as observed by 	Aristotle: 'It makes no difference whether a good man defrauds a bad one, nor whether a man who commits an adultery be a good or a bad man; the law looks 	only to the difference created by the injury."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court allowed the claim of the law firm holding that the relationship between a law firm and its attorneys is of a nature where information passed 	between them would be covered by the law of confidence and would not be allowed to be copied or used by the attorneys for their individual gain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, in 2009, the principles relating to breach of confidentiality under Indian law were very succinctly summarized by the Bombay High Court in the 	case of &lt;i&gt;Urmi Juvekar Chiang &lt;/i&gt;v. &lt;i&gt;Global Broadcasting News Limited&lt;/i&gt;,&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt; where in a fact 	situation similar to the ones in &lt;i&gt;Zee Telefilms &lt;/i&gt;case and the &lt;i&gt;Anil Gupta&lt;/i&gt; case, the Court discussed a number of previous cases on breach of 	confidentiality and laid down the following principles:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"8. The principles on which the action of breach of confidence can succeed, have been culled out as&lt;/p&gt;
&lt;p&gt;(i) he (Plaintiff) had to identify clearly what was the information he was relying on;&lt;/p&gt;
&lt;p&gt;(ii) he (Plaintiff) had to show that it was handed over in the circumstances of confidence;&lt;/p&gt;
&lt;p&gt;(iii) he (Plaintiff) had to show that it was information of the type which could be treated as&lt;/p&gt;
&lt;p&gt;confidential; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) he (Plaintiff) had to show that it was used without licence or there was threat to use it…… It is further noted that at interlocutory 	stage, the Plaintiff does not have to prove (iii) and (iv) referred to above, as he will at the trial. But the Plaintiff must address them and show that he 	has atleast seriously arguable case in relation to each of them."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the above discussion on Indian law it is clear that the Courts in India have tried to incorporate the best of both worlds, in the sense that it has 	taken and adopted the principle of a right to privacy, a breach of which would give rise to an action in torts, from American jurisprudence while rejecting 	the stand taken by English Courts in rejecting such a right to privacy. However, Indian Courts have often referred to the decisions given by English Courts 	as well as American Courts in interpreting the principle of the right to confidentiality. Therefore on an overall examination it would appear that insofar 	as the rights to privacy and confidentiality are concerned, Indian jurisprudence has more in common with American law rather than English law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The law of privacy does not seem to have existed as a recognizable principle of law before it was propounded in the article by Warren and Brandeis in the 	Harvard Law Review in 1890. It slowly gained traction in American jurisprudence over the twentieth century but was rejected outright by the Courts in 	England, which preferred to follow the principle of confidentiality rather than privacy and tried to expand that old principle to fit newer and newer 	situations. Since Indian law borrows heavily from English law and to a smaller extent also from American law, the Courts in India have accepted both, the 	principle of a right to privacy as well as a right to confidentiality. This is not to say that the Courts in America do not recognize a right to 	confidentiality and only accept a right to privacy. Infact American Courts, just like their Indian counterparts, recognize both a right to confidentiality 	as well as a right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since Indian courts accept both the concept of breach of privacy as well as breach of confidentiality, one should not try to figure out if a particular 	circumstance is more appropriate for the one over the other, but actually use both principles to supplement one another for achieving the same objective. 	For example in situations where the conditions required for the application of the law of confidentiality do not exist such as disclosure of personal 	information by a person who did not receive it in a confidential capacity, one could apply the principle of privacy to prevent such information being 	disclosed or claim a remedy after disclosure. On the other hand if the information to be disclosed is not of a personal nature then one could try to 	utilize the law of confidentiality to prevent disclosure or claim damages.&lt;/p&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Harry Kalven, Jr., &lt;i&gt;Privacy in Tort Law-Were Warren and Brandeis Wrong?&lt;/i&gt;, "31 Law &amp;amp; Contemp. Problems". 326, 327 (1966). Elbridge L. 			Adams, &lt;i&gt;The Right of Privacy, and Its Relation to the Law of Libel&lt;/i&gt;, 39 AM. L. REV. 37 (1905).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt;, 2003 UKHL 53.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, "96 Georgetown Law Journal", 123 at 			128 and 132 (2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;i&gt;Pollard &lt;/i&gt; v. &lt;i&gt;Photographic Co.&lt;/i&gt;, (1888) 40 Ch. D. 345.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; It is also said that this concern arose out of the personal experience of Samuel Warren, whose wedding announcement as well as the report on his 			sister-in-law's death in the newspapers did not go down well with him. 			&lt;a href="http://www.english.illinois.edu/-people-/faculty/debaron/380/380powerpoint/privacy.pdf"&gt; http://www.english.illinois.edu/-people-/faculty/debaron/380/380powerpoint/privacy.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; (1848) 41 Eng. Rep. 1171 (Ch.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, "96 Georgetown Law Journal", 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Samuel D. Warren and Louis D. Brandeis, &lt;i&gt;The Right to Privacy&lt;/i&gt;, "4 Harvard Law Review", 193 at 207 (1890).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Thomas M. Cooley, &lt;i&gt;The Law Of Torts&lt;/i&gt;, 2&lt;sup&gt;nd&lt;/sup&gt; Ed., 1888, p. 29.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt;, 2003 UKHL 53.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, "96 Georgetown Law Journal", 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; As early as in 1891, the case of &lt;i&gt;Schuyler&lt;/i&gt; v. &lt;i&gt;Curtis&lt;/i&gt;, 45 NYS 787 (Sup. Ct., 1891) involving the erection of a statue of a dead 			person, recognized the principle proposed in Warren and Brandeis' article.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Most famously the case of &lt;i&gt;Robertson &lt;/i&gt;v. &lt;i&gt;Rochester folding Box Co.&lt;/i&gt;, 64 NE 442 (NY 1902) where the New York Court of appeals 			specifically rejected a the existence of a right to privacy as proposed by Warren and Brandeis.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, "96 Georgetown Law Journal", 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Bredd v. Lovelace, (1577) 21 Eng. Rep. 33 (Ch.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; For doctor patient confidentiality we need look no further than the Hippocratic Oath itself which states "Whatever, in connection with my 			professional service, or not in connection with it, I see or hear, in the life of men, which ought not to be spoken of abroad, I will not divulge, 			as reckoning that all such should be kept secret".&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; (1848) 41 Eng. Rep. 1171 (Ch.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, 96 GEORGETOWN LAW JOURNAL, 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; [1948] 65 RPC 203.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; [1969] RPC 41 (UK).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, 96 GEORGETOWN LAW JOURNAL, 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, 96 GEORGETOWN LAW JOURNAL, 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; 2003 UKHL 53.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; [1979] Ch 344.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; [1997] AC 558.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; [1991] FSR 62&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; &lt;i&gt;Phoolan Devi &lt;/i&gt; v. &lt;i&gt;Shekhar Kapoor and others&lt;/i&gt;, &lt;a href="http://indiankanoon.org/doc/793946/"&gt;http://indiankanoon.org/doc/793946/&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; &lt;a href="http://lobis.nic.in/dhc/GM/judgement/25-01-2010/GM12102007S21722006.pdf"&gt; http://lobis.nic.in/dhc/GM/judgement/25-01-2010/GM12102007S21722006.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; &lt;a href="http://lobis.nic.in/dhc/SRB/judgement/25-04-2009/SRB13042009S11022006.pdf"&gt; http://lobis.nic.in/dhc/SRB/judgement/25-04-2009/SRB13042009S11022006.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; &lt;a href="http://indiankanoon.org/doc/603848/"&gt;http://indiankanoon.org/doc/603848/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; &lt;a href="http://indiankanoon.org/doc/1709727/"&gt;http://indiankanoon.org/doc/1709727/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; &lt;a href="http://delhicourts.nic.in/may06/DILJEET%20TITUS%20VS.%20ALFED%20A.%20ADEBARE.htm"&gt; http://delhicourts.nic.in/may06/DILJEET%20TITUS%20VS.%20ALFED%20A.%20ADEBARE.htm &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; &lt;a href="http://indiankanoon.org/doc/582634/"&gt;http://indiankanoon.org/doc/582634/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality'&gt;http://editors.cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-30T14:27:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2">
    <title>White Paper on RTI and Privacy V1.2</title>
    <link>http://editors.cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2</link>
    <description>
        &lt;b&gt;This white paper explores the relationship between privacy and transparency in the context of the right to information in India. Analysing pertinent case law and legislation - the paper highlights how the courts and the law in India address questions of transparency vs. privacy. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although the right to information is not specifically spelt out in the Constitution of India, 1950, it has been read into Articles 14 (right to equality), 19(1)(a) (freedom of speech and expression) and 21 (right to life) through cases such as &lt;i&gt;Bennet Coleman&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; &lt;i&gt;Tata Press Ltd. &lt;/i&gt;v.&lt;i&gt; Maharashtra Telephone Nigam Ltd.&lt;/i&gt;,&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; etc. The same Articles of the Constitution were also interpreted in &lt;i&gt;Kharak Singh&lt;/i&gt; v.&lt;i&gt;State of U.P.&lt;/i&gt;,&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; &lt;i&gt;Govind&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;,	&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; and a number of other cases, to include within their scope a right to privacy. At the very outset it 	appears that a right to receive information -though achieving greater transparency in public life - could impinge on the right to privacy of certain 	people. The presumed tension between the right to privacy and the right to information has been widely recognized and a framework towards balancing the two 	rights, has been widely discussed across jurisdictions. In India, nowhere is this conflict and the attempt to balance it more evident than under the Right 	to Information Act, 2005 (the "&lt;b&gt;RTI Act&lt;/b&gt;").&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supporting the constitutional right to information enjoyed by the citizens, is the statutorily recognized right to information granted under the RTI Act. 	Any potential infringement of the right to privacy by the provisions of the RTI Act are sought to be balanced by section 8 which provides that no 	information should be disclosed if it creates an unwarranted invasion of the privacy of any individual. This exception states that there is no obligation 	to disclose information which relates to personal information, the disclosure of which has no relationship to any public activity or interest, or which would cause unwarranted invasion of the privacy of the individual unless the larger public interest justifies the disclosure of such information.	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; The Act further goes on to say that where any information relating to or supplied by a third party and 	treated by that party as confidential, is to be disclosed, the Central Public Information Officer or State Public Information Officer has to give written 	notice to that party within five days of receiving such a request inviting such third party (within ten days) to make its case as to whether such 	information should or should not be disclosed.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A plain reading of section 11 suggests that for the section to apply the following three conditions have to be satisfied, i.e. (i) if the PIO is 	considering disclosing the information (ii) the information relates to the third party or was given to a Public Authority by the third party in confidence; 	and (iii) the third party treated the information to be a confidential. It has been held that in order to satisfy the third part of the test stated above, 	the third party has to be consulted and therefore a notice has to be sent to the third party. Even if the third party claims confidentiality, the proviso 	to the section provides that the information cannot be withheld if the public interest in the disclosure outweighs the possible harm or injury that may be 	caused to the third party, except in cases of trade or commercial secrets.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; The Courts have also held that section 11 should be read keeping in mind the exceptions contained in section 8 (discussed in detail later) and the exceptions contained therein.	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This principle of non disclosure of private information can be found across a number of common law jurisdictions. The United Kingdom's Freedom of 	Information Act, 2000 exempts the disclosure of information where it would violate the data protection principles contained in the Data Protection Act, 	1998 or constitute an actionable breach of confidence.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The Australian Freedom of Information Act, 1982 	categorizes documents involving unreasonable disclosure of personal information as conditionally exempt i.e. allows for their disclosure unless such 	disclosure would be contrary to public interest.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The Canadian Access to Information Act also has a provision which allows the authorities to refuse to disclose personal information except in accordance with the provisions of the Canadian Privacy Act.	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An overview of the RTI Act, especially sections 6 to 8 seems to give the impression that the legislature has tried to balance and harmonize conflicting public and private rights and interests by building sufficient safeguards and exceptions to the general principles of disclosure under the Act.	&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; This is why it is generally suggested that section 8, when applied, should be given a strict interpretation as it is a fetter on not only a statutory right granted under the RTI Act but also a pre-existing constitutional right.	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; Logical as this argument may seem and appropriate in some circumstances, it does present a problem 	when dealing with the privacy exception contained in section 8(1)(j). That is because the right to privacy envisaged in this section is also a pre-existing 	constitutional right which has been traced to the same provisions of the Constitution from which the constitutional right of freedom of information 	emanates.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Therefore there is an ambiguity regarding the treatment and priority given to the privacy 	exception vs. the disclosure mandate in the RTI Act, as it requires the balancing of not only two competing statutory rights but also two constitutional 	rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;The Privacy Exception &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As discussed earlier, the purpose of the RTI Act is to increase transparency and ensure that people have access to as much public information as possible. 	Such a right is critical in a democratic country as it allows for accountability of the State and allows individuals to seek out information and make 	informed decisions. However, it seems from the language of the RTI Act that at the time of its drafting the legislature did realize that there would be a 	conflict between the endeavor to provide information and the right to privacy of individuals over the information kept with public authorities, which is 	why a privacy exception was carved into section 8(1)(j) of the Right to Information Act. The Act does not only protect the privacy of the third party who's 	information is at risk of being disclosed, but also the privacy of the applicant. In fact it has now been held that a private respondent need not give 	his/her ID or address as long as the information provided by him/her is sufficient to contact him/her.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is interesting to note that although the RTI Act gives every citizen a right to information, it does not limit this right with a stipulation as to how the information shall be used by the applicant or the reason for which the applicant wants such information.	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; This lack of a purpose limitation in the Act may have privacy implications as non sensitive personal 	information could be sought from different sources and processed by any person so as to convert such non-sensitive or anonymous information into 	identifiable information which could directly impact the privacy of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The exception in S. 8(1)(j) prohibits the disclosure of personal information for two reasons (i) its disclosure does not relate to any public activity or 	interest or (ii) it would be an unwarranted invasion into privacy. The above two conditions however get trumped if a larger public interest is satisfied by 	the disclosure of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One interesting thing about the exception contained in section 8(1)(j) is that this exception itself has an exception to it in the form of a proviso. The 	proviso says that any information which cannot be denied to the central or state legislature shall not be denied to any person. Since the proviso has been 	placed at the end of sub-section 8(1) which is also the end of clause 8(1)(j), one might be tempted to ask whether this proviso applies only to the privacy 	exception i.e. clause 8(1)(j) or to the entire sub-section 8(1) (which includes other exceptions such as national interest, etc.). This issue was put to 	rest by the Bombay High Court when it held that since the proviso has been put only after clause 8(1)(j) and not before each and every clause, it would not 	apply to the entire sub-section 8(1) but only to clause 8(1)(j), thus ensuring that the exceptions to disclosure other than the right to privacy are not 	restricted by this proviso.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Scope of Proviso to section 8(1)(j)&lt;/b&gt;&lt;br /&gt;Though the courts have agreed that the proviso is applicable only to section 8(1)(j), the import of the proviso to section 8(1)(j) is a little more 	ambiguous and there are conflicting decisions by different High Courts on this point. Whereas the Bombay High Court has laid emphasis on the letter of the proviso and derived strength from the objects and overall scheme of the Act to water down the provisions of section 8(1)(j),	&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; the Delhi High Court has disagreed with such an approach which gives "undue, even overwhelming 	deference" to Parliamentary privilege in seeking information. Such an approach would render the protection under section 8(1)j) meaningless, and the basic 	safeguard bereft of content.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; In the words of the Delhi High Court:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;" 	&lt;i&gt; The proviso has to be only as confined to what it enacts, to the class of information that Parliament can ordinarily seek; if it were held that all 		information relating to all public servants, even private information, can be accessed by Parliament, Section 8(1)(j) would be devoid of any substance, 		because the provision makes no distinction between public and private information. Moreover there is no law which enables Parliament to demand all such 		information; it has to be necessarily in the context of some matter, or investigation. If the reasoning of the Bombay High Court were to be accepted, 		there would be nothing left of the right to privacy, elevated to the status of a fundamental right, by several judgments of the Supreme Court. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The interpretation given by the Delhi High Court thus ensures that section 8(1)(j) still has some effect, as otherwise the privacy exception would have 	gotten steamrolled by parliamentary privilege and all sorts of information such as Income Tax Returns, etc. of both private and public individuals would 	have been liable to disclosure under the RTI Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, the RTI Act does not describe the terms "personal information" or "larger public interest" used in section 8(1)(j), which leaves some amount 	of ambiguity in interpreting the privacy exception to the RTI Act. Therefore the only option for anyone to understand these terms in greater depth is to 	discuss and analyse the case laws developed by the Hon'ble Supreme Court and the High Courts which have tried to throw some light on this issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We shall discuss some of these landmark judgments to understand the interpretations given to these terms and then move on to specific instances where 	(applying these principles) information has been disclosed or denied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Personal Information&lt;/b&gt;&lt;br /&gt;The RTI Act defines the term information but does not define the term "personal information". Therefore one has to rely on judicial pronouncements to 	understand the term a more clearly. Looking at the common understanding and dictionary meaning of "personal" as well as the definition of "information" 	contained in the RTI Act it could be said that personal information would be information, information that pertains to a person and as such it takes into 	its fold possibly every kind of information relating to the person. Now, such personal information of the person may, or may not, have relation to any public activity, or to public interest. At the same time, such personal information may, or may not, be private to the person.	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Delhi High Court has tried to draw a distinction between the term "private information" which encompasses the personal intimacies of the home, the 	family, marriage, motherhood, procreation, child rearing and of the like nature and "personal information" which would be any information that pertains to an individual. This would logically imply that all private information would be part of personal information but not the other way round.	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; The term 'personal information' has in other cases, been variously described as "identity particulars 	of public servants, i.e. details such as their dates of birth, personal identification numbers",&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt; and as 	including tax returns, medical records etc.&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; It is worth noting that just because the term used is 	"personal information" does not mean that the information always has to relate to an actual person, but may even be a juristic entity such as a trust or 	corporation, etc.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Larger Public Interest&lt;/b&gt;&lt;br /&gt;The term larger public interest has not been discussed or defined in the RTI Act, however the Courts have developed some tests to determine if in a given 	situation, personal information should be disclosed in the larger public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whenever a Public Information Officer is asked for personal information about any person, it has to balance the competing claims of the privacy of the 	third party on the one hand and claim of public interest on the other and determine whether the public interest in such a disclosure satisfies violating a 	person's privacy. The expression "public interest" is not capable of a precise definition and does not have a rigid meaning. It is therefore an elastic 	term and takes its colors from the statute in which it occurs, the concept varying with the time and the state of the society and its needs. This seems to 	be the reason why the legislature and even the Courts have shied away from a precise definition of "public interest". However, the term public interest 	does not mean something that is merely interesting or satisfies the curiosity or love of information or amusement; but something in which a class of the 	community have some interest by which their rights or liabilities are affected.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have been suggestions that the use of the word "larger" before the term "public interest" denotes that the public interest involved should serve a 	large section of the society and not just a small section of it, i.e. if the information has a bearing on the economy, the moral values in the society; the 	environment; national safety, or the like, the same would qualify as "larger public interest".&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; However 	this is not a very well supported theory and the usage of the term "larger public interest" cannot be given such a narrow meaning, for example what if the 	disclosure of the information could save the lives of only 10 people or even just 5 children? Would the information not be released just because it 	violates one person's right to privacy and there is not a significant number of lives at stake? This does not seem to be what all the cases on the right to privacy, right from &lt;i&gt;Kharak Singh&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;b&gt;[27]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; all the way to &lt;i&gt;Naz Foundation&lt;/i&gt;,	&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; seem to suggest. Infact, in the very same judgment where the above interpretation has been suggested, 	the Court undermines this argument by giving the example of a person with a previous crime of sexual assault being employed in an orphanage and says that 	the interest of the small group of children in the orphanage would outweigh the privacy concerns of the individual thus requiring disclosure of all 	information regarding the employee's past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of the above understanding of section 8(1)(j), there seem to be two different tests that have been proposed by the Courts, which seem to connote 	the same principle although in different words:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. The test laid down by &lt;i&gt;Union Public Service Commission&lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The information sought must relate to „Personal information‟ as understood above of a third party. Therefore, if the information sought 	does not qualify as personal information, the exemption would not apply;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Such personal information should relate to a third person, i.e., a person other than the information seeker or the public authority; AND&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) (a) The information sought should not have a relation to any public activity qua such third person, or to public interest. If the information sought 	relates to public activity of the third party, i.e. to his activities falling within the public domain, the exemption would not apply. Similarly, if the 	disclosure of the personal information is found justified in public interest, the exemption would be lifted, otherwise not; OR (b) The disclosure of the information would cause unwarranted invasion of the privacy of the individual, and that there is no larger public interest involved in such disclosure.	&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The other test was laid down in &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, but in the specific circumstances of disclosure of personal 	information relating to a public official:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) whether the information is deemed to comprise the individual's private details, unrelated to his position in the organization;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) whether the disclosure of the personal information is with the aim of providing knowledge of the proper performance of the duties and tasks assigned 	to the public servant in any specific case; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) whether the disclosure will furnish any information required to establish accountability or transparency in the use of public resources.	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Constitutional Restrictions&lt;/b&gt;&lt;br /&gt;Since there is not extensive academic discussion on the meaning of the term "larger public interest" or "public interest" as provided in section 8(1)(j), 	one is forced to turn to other sources to get a better idea of these terms. One such source is constitutional law, since the right to privacy, as contained in section 8(1)(j) has its origins in Articles 14,&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; 19(1)(a)	&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt; and 21&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; of the Constitution of India. The 	constitutional right to privacy in India is also not an absolute right and various cases have carved out a number of exceptions to privacy, a perusal of 	which may give some indication as to what may be considered as 'larger public interest', these restrictions are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) Reasonable restrictions can be imposed on the right to privacy in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence;	&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) Reasonable restrictions can be imposed upon the right to privacy either in the interests of the general public or for the protection of the interests of 	any Scheduled Tribe;&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c) The right to privacy can be restricted by procedure established by law which procedure would have to satisfy the test laid down in the	&lt;i&gt;Maneka Gandhi case&lt;/i&gt;.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d) The right can be restricted if there is an important countervailing interest which is superior;	&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e) It can be restricted if there is a compelling state interest to be served by doing so;	&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;f) It can be restricted in case there is a compelling public interest to be served by doing so;	&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;g) The &lt;i&gt;Rajagopal tests - &lt;/i&gt;This case lays down three exceptions to the rule that a person's private information cannot be published, &lt;i&gt;viz. &lt;/i&gt; i) person voluntarily thrusts himself into controversy or voluntarily raises or invites a controversy, ii) if publication is based on public records other 	than for sexual assault, kidnap and abduction, iii) there is no right to privacy for public officials with respect to their acts and conduct relevant to 	the discharge of their official duties. It must be noted that although the Court talks about public records, it does not use the term 'public domain' and 	thus it is possible that even if a document has been leaked in the public domain and is freely available, if it is not a matter of public record, the right 	to privacy can still be claimed in regard to it.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Section 8(1)(j) in Practice &lt;br /&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussion in the previous chapter regarding the interpretation of section 8(1)(j), though (hopefully) helpful still seems a little abstract without 	specific instances and illustrations to drive home the point. In this chapter we shall endeavor to briefly discuss some specific cases regarding 	information disclosure where the issue of violation of privacy of a third party was raised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Private Information of Public Officials&lt;/b&gt;&lt;br /&gt;Some of the most common problems regarding section 8(1)(j) come up when discussing information (personal or otherwise) regarding public officers. The issue 	comes up because an argument can be made that certain information such as income tax details, financial details, medical records, etc. of public officials 	should be disclosed since it has a bearing on their public activities and disclosure of such information in case of crooked officers would serve the 	interests of transparency and cleaner government (hence serving a larger public interest). Although section 8(1)(j) does not make any distinction between a 	private person and a public servant, a distinction in the way their personal information is treated does appear in reality due to the inherent nature of a public servant. Infact it has sometimes been argued that public servants must waive the right to privacy in favour of transparency.&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt; However this argument has been repeatedly rejected by the Courts,	&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt; just because a person assumes public office does not mean that he/she would automatically lose their 	right to privacy in favour of transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If personal information regarding a public servant is asked for, then a distinction must be made between the information that is inherently personal to the 	person and that which has a connection with his/her public functions. The information exempted under section 8(1)(j) is personal information which is so 	intimately private in nature that the disclosure of the same would not benefit any other person, but would result in the invasion of the privacy of the 	third party.&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt; In short, the Courts have concluded that there can be no blanket rule regarding what 	information can and cannot be disclosed when it comes to a public servant, and the disclosure (or lack of it) would depend upon the circumstances of each 	case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the earlier thinking of the CIC as well as various High Courts of the country was that information regarding disciplinary proceedings and service 	records of public officials is to be treated as public information in order to boost transparency,&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt; however this line of thinking took almost a U-turn in 2012 after the decision of the Supreme Court in &lt;i&gt;Girish Ramchandra Deshpande &lt;/i&gt;v.	&lt;i&gt;Central Information Commissioner,&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;b&gt;[45]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; and now the prevailing principle is that 	such information is personal information and should not be disclosed unless a larger public interest is would be served by the disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would also be helpful to look at a list of the type of information regarding public servants which has been disclosed in the past, gleaned from various 	cases, to get a better understanding of the prevailing trends in such cases:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Details of postings of public servants at various points of time, since this was not considered as personal information;	&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Copies of posting/ transfer orders of public servants, since it was not considered personal information;	&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Information regarding transfers of colleagues cannot be exempted from disclosure, since disclosure would not cause any unwarranted invasion of 	privacy and non disclosure would defeat the object of the RTI Act;&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Information regarding the criteria adopted and the marks allotted to various academic qualifications, experience and interview in selection process 	for government posts by the state Public Service Commission;&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Information regarding marks obtained in written test, interview, annual confidential reports of the applicant as well as the marks in the written test and interview of the last candidate selected, since this information was not considered as personal information;	&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Information relating to the appointment and educational certificates of teachers in an educational institution (which satisfies the requirements of being a public authority) was disclosed since this was considered as relevant to them performing their functions.	&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The performance of an employee/officer in an organization is primarily a matter between the employee and the employer and normally those aspects are 	governed by the service rules which fall under the expression "personal information", the disclosure of which has no relationship to any public activity or 	public interest. To understand this better below is a brief list of the type of information that has been considered by the Courts as personal information 	which is liable to be exempt from disclosure under section 8(1)(j):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) (a) Salary details, (b) show cause notice, memo and censure, (c) return of assets and liabilities, (d) details of investment and other related details, 	(e) details of gifts accepted, (f) complete enquiry proceedings, (g) details of income tax returns;&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) All memos issued, show cause notices and orders of censure/punishment etc. are personal information. Cannot be revealed unless a larger public 	interest justifies such disclosure;&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Disciplinary information of an employee is personal information and is exempt under section 8(1)(j);	&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Medical records cannot be disclosed due to section 8(1)(j) as they come under "personal information", unless a larger public interest can be shown 	meriting such disclosure;&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Copy of personnel records and service book (containing Annual Confidential Reports, etc.) of a public servant is personal information and cannot be 	disclosed due to section 8(1)(j);&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Information regarding sexual disorder, DNA test between an officer and his surrogate mother, name of his biological father and step father, name of 	his mother and surrogate step mother and such other aspects were denied by the Courts as such information was considered beyond the perception of decency 	and was an invasion into another man's privacy.&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not just the issue of disclosure of personal details of public officials that raises complicated questions regarding the right to information, but 	the opposite is equally true, i.e. what about seemingly "public" details of private individuals. A very complicated question arose with regard to 	information relating to the passport details of private individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Passport Information of Private Individuals&lt;/b&gt;&lt;br /&gt;The disclosure of passport details of private individuals is complicated because for a long time there was some confusion because of the treatment to be 	given to passport details, i.e. would its disclosure cause an invasion of privacy since it contains personally identifying information, specially because 	photocopies of the passport are regularly given for various purposes such as travelling, getting a new phone connection, etc. The Central Information 	Commission used a somewhat convoluted logic that since a person providing information relating to his residence and identity while applying for a passport 	was engaging in a public activity therefore such information relates to a public activity and should be disclosed. This view was rejected by the Delhi High Court in the case of &lt;i&gt;Union of India&lt;/i&gt; v. &lt;i&gt;Hardev Singh&lt;/i&gt;,&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt; and the view taken in&lt;i&gt;Hardev Singh&lt;/i&gt; was later endorsed and relied upon in &lt;i&gt;Union of India &lt;/i&gt;v. &lt;i&gt;Rajesh Bhatia&lt;/i&gt;,	&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt; while hearing a number of petitions to decide what details of a third party's passport should be 	disclosed and what should be exempt from disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A list of the Courts conclusions is given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;Information that can be revealed:&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Name of passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Whether a visa was issued to a third party or not;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Details of the passport including dates of first issue, subsequent renewals, dates of application for renewals, numbers of the new passports and date 	of expiry;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Nature of documents submitted as proof;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Name of police station from where verification for passport was done;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Whether any report was called for from the jurisdictional police;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) Whether passport was renewed through an agent or through a foreign embassy;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) Whether it was renewed in India or any foreign country;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ix) Whether tatkal facility was availed by the passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;Information that cannot be revealed:&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Contents of the documents submitted with the passport application;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Marital status and name and address of husband;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Whether person's name figures as mother/guardian in the passport of any minor;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Copy of passport application form;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Residential address of passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Details of cases filed/pending against passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) Copy of old passport;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) Report of the police and CID for issuing the passport;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ix) Copy of the Verification Certificate, if any such Verification Certificate was relied upon for the issue of the passport.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Instances &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the above two broad categories of information that has been the subject of intense judicial discussion, certain other situations have also 	arisen where the Courts have had to decide the issue of disclosure under section 8(1)(j), a brief summary of such situations is given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) names and details of people who received money as donations from the President out of public funds was considered as information which has a definite 	link to public activities and was therefore liable to be disclosed;&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) information regarding the religion practiced by a person, who is alleged to be a public figure, collected by the Census authorities was not disclosed since it was held that the quest to obtain the information about the religion professed or not professed by a citizen cannot be in any event;	&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) information regarding all FIRs against a person was not protected under section 8(1)(j) since it was already a matter of public record and Court 	record and could not be said to be an invasion of the person's privacy;&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) information regarding the income tax returns of a public charitable trust was held not to be exempt under section 8(1)(j), since the trust involved 	was a public charitable trust functioning under a Scheme formulated by the District Court and registered under the Bombay Public Trust Act as such due to 	its character and activities its tax returns would be in relation to public interest or activities.&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A discussion of the provisions of section 8 and 11 of the RTI Act as well as the case laws under it reveals that the legislature was aware of the dangers 	posed to the privacy of individuals from such a powerful transparency law. However, it did not want the exceptions carved out to protect the privacy of 	individuals to nullify the objects of the RTI Act and therefore drafted the legislation to incorporate the principle that although the RTI Act should not 	be used to violate the privacy of individuals, such an exception will not be applicable if a larger public interest is to be served by the disclosure. This 	principle is in line with other common law jurisdictions such as the U.K, Austalia, Canada, etc. which have similar exceptions based on privacy or 	confidentiality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However it is disappointing to note that the legislature has only left the legislation at the stage of the principle which has left the language of the 	exception very wide and open to varied interpretations. It is understandable that the legislature would try to keep specifics out of the scope of the 	section to make it future proof. It is obvious that it would be impossible for the legislature or the courts to imagine every single circumstance that 	could arise where the right to information and the right to privacy would be at loggerheads. However, such wide and ambiguous drafting has led to cases 	where the Courts and the Central Information Commission have taken opposing views, with the views of the Court obviously prevailing in the end. This was 	illustrated by the issue of disclosure of passport details of private individuals with a large number of CIC cases taking different views till the High 	Court of Delhi gave categorical findings on the issue in the &lt;i&gt;Hardev Singh&lt;/i&gt; and &lt;i&gt;Rajesh Bhatia&lt;/i&gt; cases. Similar was the issue of service 	details of public officials since before the decision of the Supreme Court in the case of &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; in 2012 the prevailing 	thinking of the CIC was that details of disciplinary proceedings against public officials are not covered by section 8(1)(j), however this thinking has now 	taken a U-turn as the Supreme Court's understanding of the right to privacy has taken stronger roots and such information is now outside the scope of the 	RTI Act, unless a larger public interest in the disclosure can be shown.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ambiguity that arises in application when trying to balance the right to privacy against the right to information is a drawback in incorporating only a 	principle and leaving the language ambiguous in any legislation. This paper does not advocate that the legislature try to list out all the instances of 	this problem that are possibly imaginable, this would be too time consuming and may even be counterproductive. However, it is possible for the legislature 	to adopt an accepted practice of legislative drafting and list certain instances where there is an obvious balancing required between the two rights and 	put them as "&lt;i&gt;Illustrations&lt;/i&gt;" to the section. This device has been utilised to great effect by some of the most fundamental legislations in India 	such as the Contract Act, 1872 and the Indian Penal Code, 1860. An alternative to this approach could be to utilize the approach taken in the Australian 	Freedom of Information Act, where the Act itself gives certain factors which should be considered to determine whether access to a particular document 	would be in the public interest or not.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;List of References&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Primary Sources&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Australia Freedom of Information Act, 1982.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;Bennet Coleman&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, AIR 1973 SC 106.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;i&gt;Bhagat Singh &lt;/i&gt;v. &lt;i&gt;Chief Information Commissioner, &lt;/i&gt;2008 (64) AIC 284 (Del).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Calcutta High Court, WP (W) No. 33290 of 2013, dated 20-11-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Canadian Access to Information Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Constitution of India, 1950.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. &lt;i&gt;Govind&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. &lt;i&gt;Haryana Public Service Commission &lt;/i&gt;v. &lt;i&gt;State Information Commission, &lt;/i&gt;AIR 2009 P &amp;amp; H 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10. &lt;i&gt;Jamia Millia Islamia v. Sh. Ikramuddin&lt;/i&gt;, Delhi High Court, WP(C) 5677 of 2011 dated 22-11-2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. &lt;i&gt;Jitendra Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, 2008 (66) AIC 685 (All).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, AIR 1963 SC 129.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;13. &lt;i&gt;Maneka Gandhi &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;, Supreme Court of India, WP No. 231 of 1977, dated 25-01-1978.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. &lt;i&gt;Naz Foundation&lt;/i&gt; Delhi High Court, WP(C) No.7455/2001 dated 02-07-2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;15. &lt;i&gt;P.C. Wadhwa&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, Punjab and Haryana High Court, LPA No. 1252 of 2009 dated 29-11-2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;16. &lt;i&gt;Paardarshita Public Welfare Foundation&lt;/i&gt; v. &lt;i&gt;Union of India and others&lt;/i&gt;, AIR 2011 Del 82.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;17. &lt;i&gt;President's Secretariat&lt;/i&gt; v. &lt;i&gt;Nitish Kumar Tripathi&lt;/i&gt;, Delhi High Court, WP (C) 3382 of 2012, dated 14-06-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;18. &lt;i&gt;Public Information Officer&lt;/i&gt; v. &lt;i&gt;Andhra Pradesh Information Commission&lt;/i&gt;,2009 (76) AIC 854 (AP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;19. &lt;i&gt;R. Rajagopal v. Union of India&lt;/i&gt;, Supreme Court of India, dated 7-10-1994.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20. &lt;i&gt;Rajendra Vasantlal Shah&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner, New Delhi&lt;/i&gt;, AIR 2011 Guj 70.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;21. &lt;i&gt;Rajinder Jaina&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, 2010 (86) AIC 510 (Del. H.C.).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;22. Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;23. &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;24. &lt;i&gt;Srikant Pandaya&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, AIR 2011 MP 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;25. &lt;i&gt;Surendra Singh &lt;/i&gt;v. &lt;i&gt;State of U.P&lt;/i&gt;, AIR 2009 Alld. 106.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;26. &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;27. &lt;i&gt;Tata Press Ltd. &lt;/i&gt;v.&lt;i&gt; Maharashtra Telephone Nigam Ltd.&lt;/i&gt;, (1995) 5 SCC 139.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;28. U.K. Freedom of Information Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;29. &lt;i&gt;UCO Bank&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner and another&lt;/i&gt;, 2009 (79) AIC 545 (P&amp;amp;H).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30. &lt;i&gt;Union Centre for Earth Science Studies &lt;/i&gt;v. &lt;i&gt;Anson Sebastian, &lt;/i&gt;AIR 2010 Ker. 151&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;31. &lt;i&gt;Union of India&lt;/i&gt; v. &lt;i&gt;Hardev Singh&lt;/i&gt; WP(C) 3444 of 2012 dated 23-08-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;32. &lt;i&gt;Union of India &lt;/i&gt;v. &lt;i&gt;Rajesh Bhatia&lt;/i&gt; WP(C) 2232/2012 dated 17-09-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;33. &lt;i&gt;Union Public Service Commission &lt;/i&gt;v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 	13-07-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;34. &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Secondary Sources&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. "Country Report for U.K.", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/united-kingdom"&gt;https://www.privacyinternational.org/reports/united-kingdom&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. "Country Report for Australia", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/australia"&gt;https://www.privacyinternational.org/reports/australia&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. "Country Report for Canada", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/canada"&gt;https://www.privacyinternational.org/reports/canada&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; AIR 1973 SC 106. This case held that the freedom of the press embodies in itself the right of the people to read.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; (1995) 5 SCC 139.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; AIR 1963 SC 129.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Section 8(1) in its entirety states as follows:&lt;/p&gt;
&lt;p&gt;(1) Notwithstanding anything contained in this Act, there shall be no obligation to give any citizen,-&lt;/p&gt;
&lt;p&gt;(a) information, disclosure of which would prejudicially affect the sovereignty and integrity of India, the security, strategic, scientific or 			economic interests of the State, relation with foreign State or lead to incitement of an offence;&lt;/p&gt;
&lt;p&gt;(b) information which has been expressly forbidden to be published by any court of law or tribunal or the disclosure of which may constitute 			contempt of court;&lt;/p&gt;
&lt;p&gt;(c) information, the disclosure of which would cause a breach of privilege of Parliament or the State Legislature;&lt;/p&gt;
&lt;p&gt;(d) information including commercial confidence, trade secrets or intellectual property, the disclosure of which would harm the competitive 			position of a third party, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;/p&gt;
&lt;p&gt;(e) information available to a person in his fiduciary relationship, unless the competent authority is satisfied that the larger public interest 			warrants the disclosure of such information;&lt;/p&gt;
&lt;p&gt;(f) information received in confidence from foreign Government;&lt;/p&gt;
&lt;p&gt;(g) information, the disclosure of which would endanger the life or physical safety of any person or identify the source of information or 			assistance given in confidence for law enforcement or security purposes;&lt;/p&gt;
&lt;p&gt;(h) information which would impede the process of investigation or apprehension or prosecution of offenders;&lt;/p&gt;
&lt;p&gt;(i) cabinet papers including records of deliberations of the Council of Ministers, Secretaries and other officers:&lt;/p&gt;
&lt;p&gt;Provided that the decisions of Council of Ministers, the reasons thereof, and the material on the basis of which the decisions were taken shall be 			made public after the decision has been taken, and the matter is complete, or over:&lt;/p&gt;
&lt;p&gt;Provided further that those matters which come under the exemptions specified in this section shall not be disclosed;&lt;/p&gt;
&lt;p&gt;(j) information which relates to personal information the disclosure of which has no relationship to any public activity or interest, or which 			would cause unwarranted invasion of the privacy of the individual unless the Central Public Information Officer or the State Public Information 			Officer or the appellate authority, as the case may be, is satisfied that the larger public interest justifies the disclosure of such information:&lt;/p&gt;
&lt;p&gt;Provided that the information which cannot be denied to the Parliament or a State Legislature shall not be denied to any person.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Section 11 of the RTI Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;i&gt;The Registrar General&lt;/i&gt; v. &lt;i&gt;A. Kanagaraj&lt;/i&gt;, (Madras High Court, 14 June 2013, available at http://www.indiankanoon.org/doc/36226888/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Arvind Kejriwal v. Central Public Information Officer, (Delhi High Court, 30 September 2011, available at http://www.indiankanoon.org/doc/1923225/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Sections 40 and 41 of the U.K. Freedom of Information Act, 2000.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Section 11A read with section 47-F of the Australia Freedom of Information Act, 1982.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Section 19 of the Canadian Access to Information Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;i&gt;Public Information Officer&lt;/i&gt; v. &lt;i&gt;Andhra Pradesh Information Commission&lt;/i&gt;,2009 (76) AIC 854 (AP).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; &lt;i&gt;Bhagat Singh &lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner, &lt;/i&gt;2008 (64) AIC 284 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Articles 14, 19(1)(a) and 21 of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Calcutta High Court, WP(W) No. 33290 of 2013, dated 20-11-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;i&gt;Jitendra Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, 2008 (66) AIC 685 (All).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom), para 14. Where the Court held that since the medical records of a convict cannot be 			denied to Parliament or State legislature therefore they cannot be exempted from disclosure under the Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; &lt;i&gt;Jamia Millia Islamia v. Sh. Ikramuddin&lt;/i&gt; , Delhi High Court, WP(C) 5677 of 2011 dated 22-11-2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; AIR 1963 SC 129.&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Delhi High Court, WP(C) No.7455/2001 dated 02-07-2009.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 (for stay), dated 13-07-2012. This ruling was overturned by a 			Division Bench of the High Court relying upon a subsequent Supreme Court ruling, however, it could be argued that the Division Bench did not per se 			disagree with the discussion and the principles laid down in this case, but only the way they were applied.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Right to equality.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Freedom of speech and expression.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Right to life.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Article 19(2) of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Article 19(5) of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; &lt;i&gt;Maneka Gandhi &lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, Supreme Court of India, WP No. 231 of 1977, dated 25-01-1978. The test laid down in this case is universally considered 			to be that the procedure established by law which restricts the fundamental right should be just, fair and reasonable.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975. However the Court later used phrases such as 			"reasonable restriction in public interest" and "reasonable restriction upon it for compelling interest of State" interchangeably which seems to 			suggest that the terms "compelling public interest" and "compelling state interest" used by the Court are being used synonymously and the Court 			does not draw any distinction between them. It is also important to note that the wider phrase "countervailing interest is shown to be superior" 			seems to suggest that it is possible, atleast in theory, to have other interests apart from public interest or state interest also which could 			trump the right to privacy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; &lt;i&gt;R. Rajagopal v. Union of India&lt;/i&gt; , Supreme Court of India, dated 7-10-1994. These tests have been listed as one group since they are all applicable in the specific context of 			publication of private information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010. Also see &lt;i&gt;Vijay Prakash&lt;/i&gt; v.			&lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667. This case also held that information cannot be denied on the ground that it 			would be too voluminous.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; &lt;i&gt;Union Centre for Earth Science Studies &lt;/i&gt; v. &lt;i&gt;Anson Sebastian, &lt;/i&gt;AIR 2010 Ker. 151; &lt;i&gt;Union Public Service Commission &lt;/i&gt;v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 			&amp;amp; C.M. No. 2618/2011 (for stay), dated 13-07-2012&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; &lt;i&gt;Haryana Public Service Commission &lt;/i&gt; v. &lt;i&gt;State Information Commission, &lt;/i&gt;AIR 2009 P &amp;amp; H 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; &lt;i&gt;UCO Bank&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner and another&lt;/i&gt;, 2009 (79) AIC 545 (P&amp;amp;H).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; &lt;i&gt;Surendra Singh &lt;/i&gt; v. &lt;i&gt;State of U.P&lt;/i&gt;, AIR 2009 Alld. 106.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; &lt;i&gt;R.K. Jain&lt;/i&gt; v. &lt;i&gt;Union Public Service Commission&lt;/i&gt;, Delhi High Court, LPA No. 618 of 2012, dated 12-11-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; &lt;i&gt;Srikant Pandaya&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, AIR 2011 MP 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; &lt;i&gt;Paardarshita Public Welfare Foundation&lt;/i&gt; v. &lt;i&gt;Union of India and others&lt;/i&gt;, AIR 2011 Del 82. It must be mentioned that this case was not exactly under the procedure prescribed under 			the RTI Act but was a public interest litigation although the courts relied upon the provisions of the RTI Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; WP(C) 3444 of 2012 dated 23-08-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; WP(C) 2232/2012 dated 17-09-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; &lt;i&gt;President's Secretariat&lt;/i&gt; v. &lt;i&gt;Nitish Kumar Tripathi&lt;/i&gt;, Delhi High Court, WP (C) 3382 of 2012, dated 14-06-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; &lt;i&gt;P.C. Wadhwa&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, Punjab and Haryana High Court, LPA No. 1252 of 2009 dated 29-11-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; &lt;i&gt;Rajinder Jaina&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, 2010 (86) AIC 510 (Del. H.C.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; &lt;i&gt;Rajendra Vasantlal Shah&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner, New Delhi&lt;/i&gt;, AIR 2011 Guj 70.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2'&gt;http://editors.cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-09T02:53:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/dna-database-for-missing-persons-and-unidentified-dead-bodies">
    <title>DNA Database for Missing Persons and Unidentified Dead Bodies</title>
    <link>http://editors.cis-india.org/internet-governance/blog/dna-database-for-missing-persons-and-unidentified-dead-bodies</link>
    <description>
        &lt;b&gt;This blog discusses the possible implications of the public interest litigation that has been placed before the Supreme Court petitioning for the establishment of a DNA database in respect to unidentified bodies. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the year 2012 Lokniti, a Non Governmental Organization filed a public interest litigation in the Supreme Court of India asking the government to 	establish a DNA database in respect of unidentified dead bodies as well as for those individuals for whom missing persons reports have been filed so that 	DNA of unidentified dead bodies can be matched against missing persons - arguing that the right to be identified is a part of the right to dignity, and 	that such systems have been adopted across the globe.&lt;a name="_ftnref1"&gt;&lt;/a&gt; The case has come up a few times since 2012 and 	parties have been given time to file their replies in these instances.&lt;a name="_ftnref2"&gt;&lt;/a&gt; Prior to the 2012 Public Interest 	Litigation filed by Lokniti, in 2009 a Public Interest Litigation was filed by a Haryana based doctor. The PIL petitioned for the DNA profiling of unidentified bodies to be made mandatory - arguing that thousands of individuals die with their identity being unknown.	&lt;a name="_ftnref3"&gt;&lt;/a&gt; During the hearing the Bench asked a number of questions including why the Ministry of Health was not 	brought into the case, given the fact that a number of labs that conduct DNA profiling function under the ministry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the case is still pending, the Supreme Court on 22&lt;sup&gt;nd&lt;/sup&gt; September 2014 gave another interim order which was a little more detailed.	&lt;a name="_ftnref4"&gt;&lt;/a&gt; On this date the Ministry of Science and Technology of the Government of India, through the Department of 	Biotechnology stated that they are piloting a DNA profiling Bill that would establish a DNA Profiling Board and a National DNA Data Bank. The National DNA 	Data Bank is envisaged to maintain the following indices for various categories of data:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I. a crime scene index;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;II. a suspects' index;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;III. an offenders' index;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IV. a missing persons' index;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;V. unknown deceased persons' index&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;VI. a volunteers' index; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;VII. such other DNA indices as may be specified by regulations made by the Board.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the Ministry's plans under this Bill is to create DNA profiles of individuals whose relatives have gone missing, on a voluntary basis to help the 	relatives identify missing persons and unidentified dead bodies. They also stated that cross-matching of DNA profiling data in the database would require 	specialized software and the CDFB, Hyderabad is in the process of acquiring the same from the Federal Bureau of investigation, USA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The advocate for Lokniti responded to this saying that the DNA profiling Bill has been pending for a long time and has not seen the light of day for the 	last seven years. To this the response of the government was that it was a complex Bill involving a number of issues which take a long time to resolve.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At this point the Supreme Court, without going into the details of the Bill asked the advocate for the Union of India to obtain instructions regarding the 	following two aspects:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Whether pending the Bill coming into force the concerned Department can constitute a Data Bank in respect of dead persons who are not identifiable; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) when there are missing reports in respect of persons to collect the DNA from the permissible sources like siblings or others so that in case any 	unidentified dead body is found to match the DNA to arrive at the conclusion about the missing persons who are dead; or as an ancillary the missing person 	who is a victim of the crime of kidnapping or where any child, who is not able to find out his parents, can be in a position to find out through the DNA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus it seems that the Supreme Court, recognizing its limitations in directing the legislature to pass a law and the fact that the passing of the DNA 	profiling Bill may take a long time to become law, has tried to find a way out in which the concerns of the petitioner regarding a DNA Databank for missing 	persons and unidentified dead bodies could be addressed without the passage of the DNA profiling Bill. However since the case is still pending in the 	Supreme Court no final directions have been given in this regard. Thus, the Court has left the government with the responsibility to address the question 	of whether a DNA Databank can be established without the passing of a legislation providing legal basis for the collection, profiling, databasing, and use 	of DNA samples.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; http://indianexpress.com/article/india/india-others/sc-wants-centre-to-create-dna-data-bank/#sthash.7zqU0Ill.dpuf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; All the orders between 2012 and 2014 giving time to the parties can be accessed at 			&lt;a href="http://courtnic.nic.in/supremecourt/caseno_listed_1.asp?cno=491%20%20%20&amp;amp;ctype=3&amp;amp;cyear=2012&amp;amp;frmname=causedisp&amp;amp;petname=LOKNITI%20FOUNDATION%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20&amp;amp;resname=U.O.I.%20&amp;amp;%20ORS"&gt; http://courtnic.nic.in/supremecourt/caseno_listed_1.asp?cno=491%20%20%20&amp;amp;ctype=3&amp;amp;cyear=2012&amp;amp;frmname=causedisp&amp;amp;petname=LOKNITI%20FOUNDATION%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20&amp;amp;resname=U.O.I.%20&amp;amp;%20ORS &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; http://indianexpress.com/article/india/india-others/sc-seeks-govt-response-on-making-dna-profiling-mandatory/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; The order dated September 22, 2014 can be found at			&lt;a href="http://courtnic.nic.in/supremecourt/temp/wc%2049112p.txt"&gt;http://courtnic.nic.in/supremecourt/temp/wc%2049112p.txt&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/dna-database-for-missing-persons-and-unidentified-dead-bodies'&gt;http://editors.cis-india.org/internet-governance/blog/dna-database-for-missing-persons-and-unidentified-dead-bodies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-04T15:46:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue">
    <title>The Gujarat High Court Judgment on the Snoopgate Issue </title>
    <link>http://editors.cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Pranlal N. Soni v. State of Gujarat, C/SCA/14389/2014&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the year 2013 the media widely reported that a female civil services officer was regularly spied upon in 2009 due to her acquaintance with the then Chief Minister of Gujarat (and current Prime Minister of India) Mr. Narendra Modi. It was reported that the surveillance was being supervised by the current president of the BJP, Mr. Amit Shah at the behest of Mr. Modi. The case took another twist when the officer and her father said that they had no problems with such surveillance, and had repeatedly conveyed to various statutory authorities including the National Commission for Women, the State Commission for Women, as also before the Hon’ble Supreme Court of India, that they never felt that their privacy was being interfered with by any of the actions of the State Authorities. Infact, para 3.5 of the petition indicated that it was at the behest of the father of the female officer that the State government had carried out the surveillance on his daughter as a security measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Inspite of the repeated claims of the subject of surveillance and her father, the Gujarat Government passed a Notification under the Commissions of Inquiry Act, 1952 appointing a two member Commission of Inquiry to enquire into this incident without jeopardizing the identity or interest of the female officer. This Notification was challenged in the Gujarat High Court by the very same female officer and her father on the ground that it violated their fundamental right to life and liberty. The petitioners claimed that they had to change their residential accommodation four times in the preceding few months due to the constant media glare. The print, electronic and social media, so called social workers and other busybodies constantly intruded into the private life of the petitioners and their family members. The petitioner's email accounts were hacked and scores of indecent calls were received from all over. Under the guise of protecting the petitioner's privacy, every action undertaken by the so called custodians for and on behalf of the petitioners resulted into a breach of privacy of the petitioners, making life impossible for them on a day to day basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After hearing the arguments of the petitioners, including arguments on technical points the Court struck down the Notification issued by the State government to enquire into the issue of the alleged illegal surveillance. However the Court also briefly touched upon the issue of violation of the privacy of the female officer in this whole episode. However, instead of enquiring into whether there was any breach of privacy in the facts of the case, the Court relied upon the statement made by the female officer that whatever surveillance was done did not cause any invasion into her privacy, rather it was the unwelcome media glare that followed the revelations regarding the surveillance which had caused an invasion of her privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus we see that even though the whole snoopgate episode started out as one of “alleged” unwarranted and illegal surveillance this particular judgment is limited only to challenging the validity of the Inquiry Commission appointed by the State Government. In order to challenge the Notification in a PIL the female officer had to show that some fundamental right of hers was violated and in such circumstances privacy is the most obvious fundamental right which was violated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although this judgment talks about privacy, it does not have enough legal analysis of the right to privacy to have any significant ramifications for how privacy is interpreted in the Indian context. The only issue that could possibly be of some importance is that the we could interpret the Court’s reliance on the statement of the female officer that there was no breach of privacy rather than its own examination of facts to mean that in cases of breach of privacy, if the person whose privacy has been breached did not feel his or her privacy to have been invaded then the Courts would rely on the person’s statements rather than the facts. However this is only an interpretation from the facts and it does not seem that the Court has spent any significant amount of time to examine this issue, therefore it may not be prudent to consider this as establishing any legal principle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Note&lt;/b&gt;: The details of the case as well as the judgment can be found at &lt;a href="http://gujarathc-casestatus.nic.in/gujarathc/tabhome.jsp"&gt;http://gujarathc-casestatus.nic.in/gujarathc/tabhome.jsp&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue'&gt;http://editors.cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-10-27T04:40:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/the-aadhaar-case">
    <title>The Aadhaar Case</title>
    <link>http://editors.cis-india.org/internet-governance/blog/the-aadhaar-case</link>
    <description>
        &lt;b&gt;In 2012 a writ petition was filed by Justice K.S. Puttaswamy in the Supreme Court of India challenging the policy of the government in making an Aadhaar card for every person in India and its later plans to link various government benefit schemes to the same.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Over time a number of other cases have been filed in the Supreme Court challenging the Aadhaar mechanism and/or its procedure most of which have now been 	linked to the main petition filed by Justice Puttaswamy.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; This means that the Supreme Court now hears all 	these cases together (i.e. at the same time) since they throw up similar questions and involve the same or similar issues. The court while hearing the case 	made an interim order on September 23, 2013 whereby it ordered that no person should suffer on account of not having an Aadhaar card and that Aadhaar cards 	should not be issued to any illegal immigrants. The relevant extract from the Order of the court is reproduced below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"No person should suffer for not getting the Aadhaar card in spite of the fact that some authority had issued a circular making it mandatory and when any 	person applies to get the Aadhaar card voluntarily, it may be checked whether that person is entitled for it under the law and it should not be given to any 	illegal immigrant."&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be noted that the above order was only an interim measure taken by the Supreme Court till the time it finally decided all the issues involved in 	the case, which is still pending in the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In November 2013 during one of the hearings of the matter, the Supreme Court came to the conclusion that it was an important enough matter for all the states and union territories to be impleaded as parties to the case and passed an order to this effect.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; This was probably because the Aadhaar cards will be issued in the entire country and this is a national issue and therefore it is possible that the court 	thought that if any of the states have any concerns regarding the issue they should have the opportunity to present their case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another petition filed by the Unique Identification Authority of India (UIDAI), the Supreme Court on March 24, 2014 reiterated its earlier order and held that no 	person shall be deprived of any service just because such person lacked an aadhaar number if he/she was otherwise eligible for the service. A direction was 	issued to all government authorities and departments to modify their forms/circulars, etc., so as to not compulsorily require an aadhaar number. In the same 	order the Supreme Court also restrained the UIDAI from transferring any biometric data to any agency without the consent of the person in writing as an 	interim measure.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; After passing these orders the Supreme Court linked this case as well to the petition 	filed by Justice Puttaswamy on which final arguments were being heard in February 2014 which so far do not seem to have concluded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Note&lt;/b&gt; : Please note that the case is still being heard by the Supreme Court and the orders given so far and explained in this blog are all interim measures till 	the case is finally disposed off. The status of the cases can be seen on the following link:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://courtnic.nic.in/supremecourt/casestatus_new/caseno_new_alt.asp"&gt;http://courtnic.nic.in/supremecourt/casestatus_new/caseno_new_alt.asp&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The names and number of the cases that have been covered in this blog are given below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;W.P(C) No. 439 of 2012 titled &lt;i&gt;S. Raju &lt;/i&gt;v. &lt;i&gt;Govt. of India and Others &lt;/i&gt; pending before the D.B. of the High Court of Judicature at Madras.&lt;/li&gt;
&lt;li&gt;PIL No. 10 of 2012 titled &lt;i&gt;Vickram Crishna and Others&lt;/i&gt; v. &lt;i&gt;UIDAI and Others&lt;/i&gt; pending before the High Court of Judicature at Bombay.&lt;/li&gt;
&lt;li&gt;W.P. No. 833 of 2013 titled &lt;i&gt;Aruna Roy &amp;amp; Anr&lt;/i&gt; v. &lt;i&gt;Union of India &amp;amp; Ors&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;W.P. No. 829 of 2013 titled &lt;i&gt;S.G. Vombatkere &amp;amp; Anr&lt;/i&gt; v. &lt;i&gt;Union of India &amp;amp; Ors.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Petition(s) for Special Leave to Appeal (Crl) No(s).2524/2014 titled &lt;i&gt;Unique Identification Authority of India &amp;amp; another&lt;/i&gt; v.	&lt;i&gt;Central Bureau of Investigation&lt;/i&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;All the above cases have now been linked with the ongoing Supreme Court case of &lt;i&gt;K. Puttaswamy&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; W.P(C) No. 439 of 2012 titled &lt;i&gt;S. Raju &lt;/i&gt;v. &lt;i&gt;Govt. of India and Others &lt;/i&gt; pending before the D.B. of the High Court of Judicature at 			Madras and PIL No. 10 of 2012 titled &lt;i&gt;Vickram Crishna and Others&lt;/i&gt; v. &lt;i&gt;UIDAI and Others&lt;/i&gt; pending before the High Court of Judicature 			at Bombay were transferred to the Supreme Court vide Order dated September 23, 2013. Also W.P. No. 833 of 2013 titled Aruna Roy &amp;amp; Anr Vs Union 			of India &amp;amp; Ors, W.P. No. 829 of 2013 titled S G Vombatkere &amp;amp; Anr Vs Union of India &amp;amp; Ors and Petition(s) for Special Leave to Appeal 			(Crl) No(s).2524/2014 titled &lt;i&gt;Unique Identification Authority of India &amp;amp; another&lt;/i&gt; v. &lt;i&gt;Central Bureau of Investigation&lt;/i&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;a href="http://judis.nic.in/temp/494201232392013p.txt"&gt;http://judis.nic.in/temp/494201232392013p.txt&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; &lt;a href="http://judis.nic.in/temp/4942012326112013p.txt"&gt;http://judis.nic.in/temp/4942012326112013p.txt&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="http://courtnic.nic.in/supremecourt/temp/sr%20252414p.txt"&gt;http://courtnic.nic.in/supremecourt/temp/sr%20252414p.txt&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/the-aadhaar-case'&gt;http://editors.cis-india.org/internet-governance/blog/the-aadhaar-case&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-05T09:12:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
