<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 31 to 45.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/data-protection-submission"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/data-for-the-benefit-of-people"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/comments-on-the-right-to-information-rules-2017"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/cis-statement-on-right-to-privacy-judgment"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/cis-response-to-draft-e-commerce-policy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/jobs/call-for-design-interns-201906"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy">
    <title>Deep Packet Inspection: How it Works and its Impact on Privacy</title>
    <link>http://editors.cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy</link>
    <description>
        &lt;b&gt; In the last few years, there has been extensive debate and discussion around network neutrality in India. The online campaign in favor of Network Neutrality was led by Savetheinternet.in in India. The campaign was a spectacular success and facilitated sending  over a million emails supporting the cause of network neutrality, eventually leading to ban on differential pricing. Following in the footsteps of the Shreya Singhal judgement, the fact that the issue of net neutrality has managed to attract wide public attention is an encouraging sign for a free and open Internet in India. Since the debate has been focused largely on zero rating, other kinds of network practices impacting network neutrality have yet to be comprehensively explored in the Indian context, nor their impact on other values. In this article, the author focuses on network management, in general, and deep packet inspection, in particular and how it impacts the privacy of users.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;a name="_ek69t4linon1"&gt;&lt;/a&gt; Background&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the last few years, there has been extensive debate and discussion around network neutrality in India. The online campaign in favor of Network Neutrality was led by Savetheinternet.in in India. The campaign, captured in detail by an article in Mint,	&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; was a spectacular success and facilitated sending over a million emails supporting 	the cause of network neutrality, eventually leading to ban on differential pricing. Following in the footsteps of the Shreya Singhal judgement, the fact 	that the issue of net neutrality has managed to attract wide public attention is an encouraging sign for a free and open Internet in India. Since the 	debate has been focused largely on zero rating, other kinds of network practices impacting network neutrality have yet to be comprehensively explored in 	the Indian context, nor their impact on other values. In this article, I focus on network management, in general, and deep packet inspection, in particular 	and how it impacts the privacy of users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ft3wpj7p1jf1"&gt;&lt;/a&gt; The Architecture of the Internet&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Internet exists as a network acting as an intermediary between providers of content and it users.	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Traditionally, the network did not distinguish between those who provided content 	and those who were recipients of this service, in fact often, the users also functioned as content providers. The architectural design of the Internet 	mandated that all content be broken down into data packets which were transmitted through nodes in the network transparently from the source machine to the 	destination machine.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As discussed in detail later, as per the OSI model, the network 	consists of 7 layers. We will go into each of these layers in detail below, however is important to understand that at the base is the physical layer of 	cables and wires, while at the top is application layer which contains all the functions that people want to perform on the Internet and the content 	associated with it. The layers in the middle can be characterised as the protocol layers for the purpose of this discussion. What makes the architecture of 	the Internet remarkable is that these layers are completely independent of each other, and in most cases, indifferent to the other layers. The protocol 	layer is what impacts net neutrality. It is this layer which provides the standards for the manner in which the data must flow through the network. The 	idea was for the it to be as simple and feature free as possible such that it is only concerned with the transmission data as fast as possible ('best 	efforts principle') while innovations are pushed to the layers above or below it.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This aspect of the Internet's architectural design, which mandates that network features are implemented as the end points only (destination and source 	machine), i.e. at the application level, is called the 'end to end principle'.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This 	means that the intermediate nodes do not differentiate between the data packets in any way based on source, application or any other feature and are only concerned with transmitting data as fast as possible, thus creating what has been described as a 'dumb' or neutral network.	&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This feature of the Internet architecture was also considered essential to what 	Jonathan Zittrain has termed as the 'generative' model of the Internet.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Since, the 	Internet Protocol remains a simple layer incapable of discrimination of any form, it meant that no additional criteria could be established for what kind 	of application would access the Internet. Thus, the network remained truly open and ensured that the Internet does not privilege or become the preserve of 	a class of applications, nor does it differentiate between the different kinds of technologies that comprise the physical layer below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the above model speaks of a dumb network not differentiating between the data packets that travel through it, in truth, the network operators engage 	in various kinds of practices that priorities, throttle or discount certain kinds of data packets. In her thesis essay at the Oxford Internet Institute, 	Alissa Cooper&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; states that traffic management involves three different set of 	criteria- a) Some subsets of traffic needs to be managed, and arriving at a criteria to identify those subsets the criteria can be based on source, 	destination, application or users, b) Trigger for the traffic management measure which - could be based upon time of the day, usage threshold or a specific 	network condition, and c) the traffic treatment put into practice when the trigger is met. The traffic treatment can be of three kinds. The first is 	Blocking, in which traffic is prevented from being delivered. The second is Prioritization under which identified traffic is sent sooner or later. This is 	usually done in cases of congestion and one kind of traffic needs to be prioritized. The third kind of treatment is Rate limiting where identified traffic 	is limited to a defined sending rate.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The dumb network does not interfere with an 	application's operation, nor is it sensitive to the needs of an application, and in this way it treats all information sent over it as equal. In such a 	network, the content of the packets is not examined, and Internet providers act according to the destination of the data as opposed to any other factor. 	However, in order to perform traffic management in various circumstances, Deep packet Inspection technology, which does look at the content of data packets 	is commonly used by service providers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_r7ojhgh467u5"&gt;&lt;/a&gt; Deep Packet Inspection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Deep packet inspection (DPI) enables the examination of the content of a data packets being sent over the Internet. Christopher Parsons explains the header 	and the payload of a data packet with respect to the OSI model. In order to understand this better, it is more useful to speak of network in terms of the 	seven layers in the OSI model as opposed to the three layers discussed above.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the OSI model, the top layer, the Application Layer is in contact with the software making a data request. For instance, if the activity in question 	is accessing a webpage, the web-browser makes a request to access a page which is then passed on to the lower layers. The next layer is the Presentation 	Layer which deals with the format in which the data is presented. This lateral performs encryption and compression of the data. In the above example, this 	would involve asking for the HTML file. Next comes the Session Layer which initiates, manages and ends communication between the sender and receiver. In 	the above example, this would involve transmitting and regulating the data of the webpage including its text, images or any other media. These three layers 	are part of the 'payload' of the data packet.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next four layers are part of the 'header' of the data packet. It begins with the Transport Layer which collects data from the Payload and creates a 	connection between the point of origin and the point of receipt, and assembles the packets in the correct order. In terms of accessing a webpage, this 	involves connecting the requesting computer system with the server hosting the data, and ensuring the data packets are put together in an arrangement which 	is cohesive when they are received. The next layer is the Data Link Layer. This layer formats the data packets in such a way that that they are compatible 	with the medium being used for their transmission. The final layer is the Physical Layer which determines the actual media used for transmitting the 	packets.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The transmission of the data packet occurs between the client and server, and packet inspect occurs through some equipment placed between the client and 	the server. There are various ways in which packet inspection has been classified and the level of depth that the inspection needs to qualify in order to 	be categorized as Deep Packet Inspection. We rely on Parson's classification system in this article. According to him, there are three broad categories of 	packet inspection - shallow, medium and deep.&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shallow packet inspection involves the inspection of the only the header, and usually checking it against a blacklist. The focus in this form of inspection 	is on the source and destination (IP address and packet;s port number). This form of inspection primarily deals with the Data Link Layer and Network Layer 	information of the packet. Shallow Packet Inspection is used by firewalls.&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Medium Packet Inspection involves equipment existing between computers running the applications and the ISP or Internet gateways. They use application 	proxies where the header information is inspected against their loaded parse-list and used to look at a specific flows. These kinds of inspections 	technologies are used to look for specific kinds of traffic flows and take pre-defined actions upon identifying it. In this case, the header and a small 	part of the payload is also being examined.&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, Deep Packet Inspection (DPI) enables networks to examine the origin, destination as well the content of data packets (header and payload). These 	technologies look for protocol non-compliance, spam, harmful code or any specific kinds of data that the network wants to monitor. The feature of the DPI 	technology that makes it an important subject of study is the different uses it can be put to. The use cases vary from real time analysis of the packets to 	interception, storage and analysis of contents of a packets.&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_pi28w1745j15"&gt;&lt;/a&gt; The different purposes of DPI&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Network Management and QoS&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The primary justification for DPI presented is network management, and as a means to guarantee and ensure a certain minimum level of QoS (Quality of 	Service). Quality of Service (QoS) as a value conflicting with the objectives of Network Neutrality, has emerged as a significant discussion point in this 	topic. Much like network neutrality, QoS is also a term thrown around in vague, general and non-definitive references. The factors that come into play in 	QoS are network imposed delay, jitter, bandwidth and reliability. Delay, as the name suggests, is the time taken for a packet to be passed by the sender to the receiver. Higher levels of delay are characterized by more data packets held 'in transit' in the network.	&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A paper by Paul Ferguson and Geoff Huston described the TCP as a 'self clocking' 	protocol.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This enables the transmission rate of the sender to be adjusted as per 	the rate of reception by the receiver. As the delay and consequent stress on the protocol increases, this feedback ability begins to lose its sensitivity. 	This becomes most problematic in cases of VoIP and video applications. The idea of QoS generally entails consistent service quality with low delay, low 	jitter and high reliability through a system of preferential treatment provided to some traffic on a criteria formulated around the need of such traffic to 	have greater latency sensitivity and low delay and jitter. This is where Deep Packet Inspection comes into play. In 1991, Cisco pioneered the use of a new 	kind of router that could inspect data packets flowing through the network. DPI is able to look inside the packets and its content, enabling it to classify 	packets according to a formulated policy. DPI, which was used a security tool, to begin with, is a powerful tool as it allows ISPs to limit or block 	specific applications or improve performances of applications in telephony, streaming and real-time gaming. Very few scholars believe in an all-or-nothing approach to network neutrality and QoS and debate often comes down to what forms of differentiations are reasonable for service providers to practice.	&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Security&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deep Packet inspection was initially intended as a measure to manage the network and protect it from transmitting malicious programs . As mentioned above, Shallow Packet Inspection was used to secure LANs and keep out certain kinds of unwanted traffic.	&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Similarly, DPI is used for identical purposes, where it is felt useful to 	enhance security and complete a 'deeper' inspection that also examines the payload along with the header information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Surveillance&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third purpose of DPI is what concerns privacy theorists the most. The fact that DPI technologies enable the network operators to have access to the actual content of the data packets puts them a position of great power as well as making them susceptible to significant pressure from the state.	&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For instance, in US, the ISPs are required to conform to the provisions of the 	Communications Assistance for Law Enforcement Act (CALEA) which means they need to have some surveillance capacities designed into their systems. What is 	more disturbing for privacy theorists compared to the use of DPI for surveillance under legislation like CALEA, are the other alleged uses by organisation 	like the National Security Agency through back end access to the information via the ISPs. Aside from the US government, there have been various reports of use of DPI by governments in countries like China,&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Malaysia&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Singapore.	&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Behavioral targeting&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DPI also enables very granular tracking of the online activities of Internet users. This information is invaluable for the purposes of behavioral targeting 	of content and advertising. Traditionally, this has been done through cookies and other tracking software. DPI allows new way to do this, so far exercised 	only through web-based tools to ISPs and their advertising partners. DPI will enable the ISPs to monitor contents of data packets and use this to create profiles of users which can later be employed for purposes such as targeted advertising.	&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_gn60r7ifwcge"&gt;&lt;/a&gt; Impact on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Each of the above use-cases has significant implications for the privacy of Internet users as the technology in question involves access, tracking or 	retention of their online communication and usage activity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alyssa Cooper compares DPI with other technologies carrying out content inspection such as caching services and individual users employing firewalls or packet sniffers. She argues that one of the most distinguishing feature of DPI is the potential for "mission-creep."	&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Kevin Werbach writes that while networks may deploy DPI for implementation under 	CALEA or traffic peer-to-peer shaping, once deployed DPI techniques can be used for completely different purposes such as pattern matching of intercepted 	content and storage of raw data or conclusions drawn from the data.&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This scope of 	mission creep is even more problematic as it is completely invisible. As opposed to other technologies which rely on cookies or other web-based services, 	the inspection occurs not at the end points, but somewhere in the middle of the network, often without leaving any traces on the user's system, thus 	rendering them virtually undiscoverable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much like other forms of surveillance, DPI threatens the sense that the web is a space where people can engage freely with a wide range of people and 	services. For such a space to continue to exist, it is important for people to feel secure about their communication and transaction on medium. This notion 	of trust is severely harmed by a sense that users are being surveilled and their communication intercepted. This has obvious chilling effect on free speech 	and could also impact electronic commerce.&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Allyssa Cooper also points out another way in which DPI differs from other content tracking technologies. As the DPI is deployed by the ISPs, it creates a 	greater barrier to opting out and choosing another service. There are only limited options available to individuals as far as ISPs are concerned. 	Christopher Parsons does a review of ISPs using DPI technology in UK, US and Canada and offers that various ISPs do provide in their terms of services that 	they use DPI for network management purposes. However, this information is often not as easily accessible as the terms and conditions of online services. 	A;so, As opposed to online services, where it is relatively easier to migrate to another service, due to both presence of more options and the ease of 	migration, it is a much longer and more difficult process to change one's ISP.&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_n5w8euzb4xhb"&gt;&lt;/a&gt; Measures to mitigate risk&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, there are no existing regulatory frameworks in India which deal govern DPI technology in any way. The International Telecommunications Union 	(ITU) prescribes a standard for DPI&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; however, the standard does not engage with 	any questions of privacy and requires all DPI technologies to be capable of identifying payload data, and prescribing classification rules for specific 	applications, thus, conflicting with notions of application agnosticism in network management. More importantly, the requirements to identify, decrypt and 	analyse tunneled and encrypted data threaten the reasonable expectation of privacy when sending and receiving encrypted communication. In this final 	section, I look at some possible principles and practices that may be evolved in order to mitigate privacy risks caused due to DPI technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Limiting 'depth' and breadth&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been argued that inherently what DPI technology intends to do is matching of patterns in the inspected content against a pre-defined list which is 	relevant to the purpose how which DPI is employed. Much like data minimization principles applicable to data controllers and data processors, it is 	possible for network operators to minimize the depth of the inspection (restrict it to header information only or limited payload information) so as to 	serve the purpose at hand. For instance, in cases where the ISP is looking to identify peer-to-peer traffic, there are protocols which declare their names 	in the application header itself. Similarly, a network operators looking to generate usage data about email traffic can do so simply by looking at port 	number and checking them against common email ports.&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, this mitigation 	strategy may not work well for other use-cases such as blocking malicious software or prohibited content or monitoring for the sake of behavioral 	advertising.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While depth referred to the degree of inspection within data packets, breadth refers to the volume of packets being inspected. Alyssa Cooper argues that 	for many DPI use cases, it may be possible to rely on pattern matching on only the first few data packets in a flow, in order to arrive at sufficient data 	to take appropriate response. Cooper uses the same example about peer-to-peer traffic. In some cases, the protocol name may appear on the header file of 	only the first packet of a flow between two peers. In such circumstances, the network operators need not look beyond the header files of the first packet 	in a flow, and can apply the network management rule to the entire flow.&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Data retention&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aside from the depth and breadth of inspection, another important question whether and for along is there a need for data retention. All use cases may not 	require any kind of data retention and even in case where DPI is used for behavioral advertising, only the conclusions drawn may be retained instead of 	retaining the payload data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Transparency&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the issues is that DPI technology is developed and deployed outside the purview of standard organizations like ISO. Hence, there has been a lack of 	open, transparent standards development process in which participants have deliberated the impact of the technology. It is important for DPI to undergo 	these process which are inclusive, in that there is participation by non-engineering stakeholders to highlight the public policy issues such as privacy. Further, aside from the technology, the practices by networks need to be more transparent.	&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Disclosure of the presence of DPI, the level of detail being inspected or retained and the purpose for deployment of DPI can be done. Some ISPs provide some of these details in their terms of service and website notices.	&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, as opposed to web-based services, users have limited interaction with 	their ISP. It would be useful for ISPs to enable greater engagement with their users and make their practices more transparent.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The very nature of of the DPI technology renders some aspects of recognized privacy principles like notice and consent obsolete. The current privacy frameworks under FIPP&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and OECD	&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; rely on the idea of empowering the individual by providing them with knowledge 	and this knowledge enables them to make informed choices. However, for this liberal conception of privacy to function meaningfully, it is necessary that 	there are real and genuine choices presented to the alternatives. While some principles like data minimisation, necessity and proportionality and purpose 	limitation can be instrumental in ensuring that DPI technology is used only for legitimate purposes, however, without effective opt-out mechanisms and 	limited capacity of individual to assess the risks, the efficacy of privacy principles may be far from satisfactory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ongoing Aadhaar case and a host of surveillance projects like CMS, NATGRID, NETRA&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and NMAC	&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; have raised concerns about the state conducting mass-surveillance, particularly 	of online content. In this regard, it is all the more important to recognise the potential of Deep Packet Inspection technologies for impact on privacy 	rights of individuals. Earlier, the Centre for Internet and Society had filed Right to Information applications with the Department of Telecommunications, Government of India regarding the use of DPI, and the government had responded that there was no direction/reference to the ISPs to employ DPI technology.	&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Similarly, MTNL also responded to the RTI Applications and denied using the 	technology.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is notable though, that they did not respond to the questions 	about the traffic management policies they follow. Thus, so far there has been little clarity on actual usage of DPI technology by the ISPs.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ashish Mishra, "India's Net Neutrality Crusaders", available at 			&lt;a href="http://mintonsunday.livemint.com/news/indias-net-neutrality-crusaders/2.3.2289565628.html"&gt; http://mintonsunday.livemint.com/news/indias-net-neutrality-crusaders/2.3.2289565628.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.livinginternet.com/i/iw_arch.htm"&gt;http://www.livinginternet.com/i/iw_arch.htm&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Vinton Cerf and Robert Kahn, "A protocol for packet network intercommunication", available at 			&lt;a href="https://www.semanticscholar.org/paper/A-protocol-for-packet-network-intercommunication-Cerf-Kahn/7b2fdcdfeb5ad8a4adf688eb02ce18b2c38fed7a"&gt; https://www.semanticscholar.org/paper/A-protocol-for-packet-network-intercommunication-Cerf-Kahn/7b2fdcdfeb5ad8a4adf688eb02ce18b2c38fed7a &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Ganley and Ben Algove, "Network Neutrality-A User's Guide", available at			&lt;a href="http://wiki.commres.org/pds/NetworkNeutrality/NetNeutrality.pdf"&gt;http://wiki.commres.org/pds/NetworkNeutrality/NetNeutrality.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; J H Saltzer, D D Clark and D P Reed, "End-to-End arguments in System Design", available at			&lt;a href="http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf"&gt;http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 4.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Jonathan Zittrain, The future of Internet - and how to stop it, (Yale University Press and Penguin UK, 2008) available at 			&lt;a href="https://dash.harvard.edu/bitstream/handle/1/4455262/Zittrain_Future%20of%20the%20Internet.pdf?sequence=1"&gt; https://dash.harvard.edu/bitstream/handle/1/4455262/Zittrain_Future%20of%20the%20Internet.pdf?sequence=1 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Alissa Cooper, How Regulation and Competition Influence Discrimination in Broadband Traffic Management: A Comparative Study of Net Neutrality in 			the United States and the United Kingdom available at 			&lt;a href="http://ora.ox.ac.uk/objects/uuid:757d85af-ec4d-4d8a-86ab-4dec86dab568"&gt; http://ora.ox.ac.uk/objects/uuid:757d85af-ec4d-4d8a-86ab-4dec86dab568 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Christopher Parsons, "The Politics of Deep Packet Inspection: What Drives Surveillance by Internet Service Providers?", available at 			&lt;a href="https://www.christopher-parsons.com/the-politics-of-deep-packet-inspection-what-drives-surveillance-by-internet-service-providers/"&gt; https://www.christopher-parsons.com/the-politics-of-deep-packet-inspection-what-drives-surveillance-by-internet-service-providers/ &lt;/a&gt; at 15.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; at 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; at 19.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Jay Klein, "Digging Deeper Into Deep Packet Inspection (DPI)", available at			&lt;a href="http://spi.unob.cz/papers/2007/2007-06.pdf"&gt;http://spi.unob.cz/papers/2007/2007-06.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Tim Wu, "Network Neutrality: Broadband Discrimination", available at			&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=388863"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=388863&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Ferguson and Geoff Huston, "Quality of Service on the Internet: Fact, Fiction,&lt;/p&gt;
&lt;p&gt;or Compromise?", available at &lt;a href="http://www.potaroo.net/papers/1998-6-qos/qos.pdf"&gt;http://www.potaroo.net/papers/1998-6-qos/qos.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Barbara van Schewick, "Network Neutrality and Quality of Service: What a non-discrimination Rule should look like", available at 			&lt;a href="http://cyberlaw.stanford.edu/downloads/20120611-NetworkNeutrality.pdf"&gt; http://cyberlaw.stanford.edu/downloads/20120611-NetworkNeutrality.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Ohm, "The Rise and Fall of Invasive ISP Surveillance," available at 			&lt;a href="http://paulohm.com/classes/infopriv10/files/ExcerptOhmISPSurveillance.pdf"&gt; http://paulohm.com/classes/infopriv10/files/ExcerptOhmISPSurveillance.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ben Elgin and Bruce Einhorn, "The great firewall of China", available at 			&lt;a href="http://www.bloomberg.com/news/articles/2006-01-22/the-great-firewall-of-china"&gt; http://www.bloomberg.com/news/articles/2006-01-22/the-great-firewall-of-china &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mike Wheatley, "Malaysia's Web Heavily Censored Before Controversial Elections", available at 			&lt;a href="http://siliconangle.com/blog/2013/05/06/malaysias-web-heavily-censored-before-controversial-elections/"&gt; http://siliconangle.com/blog/2013/05/06/malaysias-web-heavily-censored-before-controversial-elections/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Fazal Majid, "Deep packet inspection rears it ugly head" available at			&lt;a href="https://majid.info/blog/telco-snooping/"&gt;https://majid.info/blog/telco-snooping/&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Alissa Cooper, "Doing the DPI Dance: Assessing the Privacy Impact of Deep Packet Inspection," in W. Aspray and P. Doty (Eds.), Privacy in America: 			Interdisciplinary Perspectives, Plymouth, UK: Scarecrow Press, 2011 at 151.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; at 148.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Kevin Werbach, "Breaking the Ice: Rethinking Telecommunications Law for the Digital Age", Journal of Telecommunications and High Technology, 			available at &lt;a href="http://www.jthtl.org/articles.php?volume=4"&gt;http://www.jthtl.org/articles.php?volume=4&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; Note 25 at 149.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; Note 25 at 147.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; International Telecommunications Union, Recommendation ITU-T.Y.2770, Requirements for Deep Packet Inspection in next generation networks, available 			at &lt;a href="https://www.itu.int/rec/T-REC-Y.2770-201211-I/en"&gt;https://www.itu.int/rec/T-REC-Y.2770-201211-I/en&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; Note 25 at 154.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; at 156.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Ohm, "The Rise and Fall of Invasive ISP Surveillance", available at 			&lt;a href="http://paulohm.com/classes/infopriv10/files/ExcerptOhmISPSurveillance.pdf"&gt; http://paulohm.com/classes/infopriv10/files/ExcerptOhmISPSurveillance.pdf &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.nist.gov/nstic/NSTIC-FIPPs.pdf"&gt;http://www.nist.gov/nstic/NSTIC-FIPPs.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm"&gt; https://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; "India's Surveillance State" Software Freedom Law Centre, available at 			&lt;a href="http://sflc.in/indias-surveillance-state-our-report-on-communications-surveillance-in-india/"&gt; http://sflc.in/indias-surveillance-state-our-report-on-communications-surveillance-in-india/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Amber Sinha, "Are we losing our right to privacy and freedom on speech on Indian Internet", DNA, available at 			&lt;a href="http://www.dnaindia.com/scitech/column-are-we-losing-the-right-to-privacy-and-freedom-of-speech-on-indian-internet-2187527"&gt; http://www.dnaindia.com/scitech/column-are-we-losing-the-right-to-privacy-and-freedom-of-speech-on-indian-internet-2187527 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/telecom/use-of-dpi-technology-by-isps.pdf"&gt;http://cis-india.org/telecom/use-of-dpi-technology-by-isps.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Smita Mujumdar, "Use of DPI Technology by ISPs - Response by the Department of Telecommunications" available at 			&lt;a href="http://cis-india.org/telecom/dot-response-to-rti-on-use-of-dpi-technology-by-isps"&gt; http://cis-india.org/telecom/dot-response-to-rti-on-use-of-dpi-technology-by-isps &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy'&gt;http://editors.cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-16T23:14:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/data-protection-submission">
    <title>Data Protection Submission</title>
    <link>http://editors.cis-india.org/internet-governance/files/data-protection-submission</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/data-protection-submission'&gt;http://editors.cis-india.org/internet-governance/files/data-protection-submission&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-04-18T16:37:05Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/data-for-the-benefit-of-people">
    <title>Data for the Benefit of People</title>
    <link>http://editors.cis-india.org/internet-governance/files/data-for-the-benefit-of-people</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/data-for-the-benefit-of-people'&gt;http://editors.cis-india.org/internet-governance/files/data-for-the-benefit-of-people&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-12-01T04:21:32Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector">
    <title>Counter Comments on TRAI's Consultation Paper on Privacy, Security and Ownership of Data in Telecom Sector</title>
    <link>http://editors.cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) has commented on the Consultation Paper on Privacy, Security and Ownership of Data in Telecom Sector published by the Telecom Regulatory Authority of India on August 9, 2017.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The submission is divided in three main parts. The first part 'Preliminary' introduces the document. The second part 'About CIS' is an overview of the organization. The third part contains the 'Counter Comments' on the Consultation Paper taking into account the submission made by other stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Download the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/counter-comments.pdf"&gt;full submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector'&gt;http://editors.cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-23T14:29:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/comments-on-the-right-to-information-rules-2017">
    <title>Comments on the Right to Information Rules, 2017</title>
    <link>http://editors.cis-india.org/openness/blog-old/comments-on-the-right-to-information-rules-2017</link>
    <description>
        &lt;b&gt;On March 31st, 2017, the Ministry of Personnel, Public Grievances and Pensions, Department of Personnel and Training released a Circular framing rules under the Right to Information Act, 2005 (“RTI Rules”). The Ministry invited comments on on the RTI Rules. CIS submitted its comments on April 25, 2017.&lt;/b&gt;
        
&lt;h3 dir="ltr"&gt;1. Preliminary&lt;/h3&gt;
&lt;p dir="ltr"&gt;1.1 On March 31st, 2017, the Ministry of Personnel, Public Grievances and Pensions, Department of Personnel and Training released a Circular framing rules under the Right to Information Act, 2005 (“RTI Rules”). The Ministry invited comments on on the RTI Rules.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;2. The Centre for Internet and Society&lt;/h3&gt;
&lt;p dir="ltr"&gt;2.1. The Centre for Internet and Society, (“CIS”), is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, and cyber-security.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;3. Comments&lt;/h3&gt;
&lt;p dir="ltr"&gt;3.1 General Comments&lt;/p&gt;
&lt;p dir="ltr"&gt;The new RTI Rules introduce various procedural hurdles and provides a great deal of discretionary power to the CIC in dealing with RTI applications and appeals. One of the provisions which has attracted attention in the past also is the abatement of appeals upon the death of the RTI applications. This provision, explored in more detail is especially objectionable in light of the threats that RTI activists face.&lt;/p&gt;
&lt;p&gt;&lt;strong id="docs-internal-guid-f3638231-aeb5-9d2f-4329-a2fd7d07f81a"&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;3.2 Specific Comments&lt;/p&gt;
&lt;p dir="ltr"&gt;3.2.1 Rule 4 of the RTI Rules states that the fees for providing information under the RTI Act would be ‘as notified by Central Government from time to time’. While the RTI Rules also prescribe the fee for filing RTI applications, this phrase provides a window to increase the fees through subsequent notifications. We recommend that the phrase “or as notified by Central Government from time to time” be deleted in order prevent prohibitive increase in the fees in future.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;3.2.2 Rule 4 of the RTI Rules also specifies the fees for provision of information via floppies and diskettes. There is no plausible reason to engage in continued rulemaking applicable to outdated modes of data storage. It would be of much more help if the rules were to prescribe fees for CDs, DVDs and email. We also submit that no fees need be charged for information provided through emails, and this mode of communication must be adopted where possible.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;3.2.3 Rule 8 (1)(viii) states that every appellant must affirm that they have not filed an appeal pertaining to similar matters before the Commission or any court. However, the same matter can lead to multiple counts of causes of actions, and the principle of res judicata barring further action should not apply in these cases. Therefore, it is recommended that this requirement is deleted.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;3.2.4 &amp;nbsp;Rule 12 permits the withdrawal of an appeal on the request of the appellant and &amp;nbsp;the &amp;nbsp;abatement &amp;nbsp;of &amp;nbsp;an &amp;nbsp;appeal &amp;nbsp;on &amp;nbsp;the &amp;nbsp;death &amp;nbsp;of &amp;nbsp;the &amp;nbsp;appellant. This provisions needs to be evaluated in light of the increasing number of cases of threats received by RTI activists. There have been close to 400 documented cases of attacks on RTI applicants,[1] including cases of murder and physical assault. This provision will serve to enable withdrawal of RTI appeals through harassment and other means of coercion.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Further, the abatement of an appeal upon death of an RTI appellant is a clause without any merit and could translate into murders of appellants to cause abatement of the appeal. Additionally, the Supreme Court’s judgment in the matter of Union of India v. Namit Sharma[2] must be kept in mind which clarified the position that RTI applications and appeals are not in the nature of lis and deal with the question of whether requested information ought to be disclosed. Therefore, there is no reason why appeals should abate upon the demise of the appellant.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;3.2.5 &amp;nbsp;Rule 14 permits the CIC to return complaints due to non-compliance with the procedural rules in Rule 13. Such rules[3] have been used in the past to return complaints on unreasonable or artificial grounds. This is an example of additional procedural hurdles introduced by through the rulemaking process instead of making the process more citizen friendly.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;3.2.6 Rule 15 (iii) of the RTI Rules gives the CIC the discretion to close a case without even allowing hearing to the applicant. There is no requirement on the CIC to provide a detailed reasoning of its determination either. This rule is in violation of the right to be heard before adjudication under natural justice principles.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;3.7 The redressal mechanism under Rule 16 of the RTI Rules leaves a lot to be desired. Beginning with the use of the term ‘communication’ to refer to the complaint regarding a non-compliance of the CIC’s order, the rule takes a cavalier approach to addressing the significant number of cases of non-compliance with the CIC’s order. Further, there is no clear procedure spelt out with regard to how the CIC will deal with such matters and whether parties may be heard before making an adjudication. Further, there is an inconsistency in that a communication may be rejected if not submitted in the prescribed format, whereas in the case of appeals it clearly stated that they may not be returned/rejected only on the ground of non-compliance with the format.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;[1]  http://attacksonrtiusers.org&lt;/p&gt;
&lt;p dir="ltr"&gt;[2]  https://indiankanoon.org/doc/47938967/&lt;/p&gt;
&lt;p dir="ltr"&gt;[3]  Rule 9 of the RTI Rules, 2012.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/comments-on-the-right-to-information-rules-2017'&gt;http://editors.cis-india.org/openness/blog-old/comments-on-the-right-to-information-rules-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Call for Comments</dc:subject>
    

   <dc:date>2017-04-27T09:25:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017">
    <title>Comments on Information Technology (Security of Prepaid Payment Instruments) Rules, 2017</title>
    <link>http://editors.cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society submitted comments on the Information Technology (Security of Prepaid Payment Instruments) Rules, 2017. The comments were prepared by Udbhav Tiwari, Pranesh Prakash, Abhay Rana, Amber Sinha and Sunil Abraham. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;1. Preliminary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;1.1. This submission presents comments by the Centre for Internet and Society&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; in response to the Information Technology (Security of Prepaid Payment Instruments) Rules 2017 (“the Rules”).&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; The Ministry of Electronics and Information Technology (MEIT) issued a consultation paper (pdf) which calls for developing a framework for security of digital wallets operating in the country on March 08, 2017. This proposed rules have been drafted under provisions of Information Technology Act, 2000, and comments have been invited from the general public and stakeholders before the enactment of these rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;2. The Centre for Internet and Society&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;2.1. The Centre for Internet and Society, (“CIS”), is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, and cyber-security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved, especially the privacy and data security of citizens. CIS is thankful to the MEIT for this opportunity to provide feedback to the draft rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;3. Comments&lt;/h3&gt;
&lt;h4 style="text-align: justify; "&gt;3.1  General Comments&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Penalty&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no penalty for not complying with these rules.  Even the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 doesn’t have penalties.  Under section 43A of the Information Technology Act (under which the 2011 Rules have been promulgated), a wrongful gain or a wrongful loss needs to be demonstrated.  This should not be a requirement for financial sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Expansion to Contractual Parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A majority of these rules, in order to be effective and realistically protect consumer interest, should also be expanded to third parties, agents, contractual relationships and any other relevant relationship an e-PPI issuer may delegate as a part of their functioning.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.2  Rule 2: Definitions&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Certain key words relevant to the field of e-PPI based digital payments such as authorisation, metadata, etc. are not defined in the rules and should both be defined and accounted for in the rules to ensure modern developments such as big data and machine learning, digital surveillance, etc. do not violate human rights and consumer interest.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.2  Rule 7: Definition of personal information&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 7 provides an exhaustive list of data that will be deemed to be personal information for the purposes of the Rules. While &lt;b&gt;information collected&lt;/b&gt; at the time of issuance of the pre-paid payment instrument and during its use is included within the scope of Rule 7, it makes no reference to metadata generated and collected by the e-PPI issuer.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.3 Rule 4: Inadequate privacy protections&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 4(2) specifies the details that the privacy policies of each e-PPI issuer must contain. However, these specifications are highly inadequate and fall well below the recommendations under the National Privacy Principles in Report of the Group of Experts on Privacy chaired by Justice A P Shah.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: The Rules should include include clearly specified rights to access, correction and opt in/opt out, continuing obligations to seek consent in case of change in policy or purpose and deletion of data after purpose is achieved. Additionally, it must be required that a log of each version of past privacy policies be maintained along with the relevant period of applicability.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.4 Rule 10: Reasonable security practices&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Financial information (“such as bank account or credit card or debit card or other payment instrument details”) is already invoked in an inclusive manner in the definition of ‘personal information’ in Rule 7.  Given this there is no need to make the Reasonable Security Practices Rules applicable to financial data through this provisions: it already is, and it is best to avoid unnecessary redundancy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solution: This entire rule should be removed.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.5  Rule 12: Traceability&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: There is a requirement created under this rule that payment-related interactions with customers or other service providers be “appropriately trace[able]”.  But it is unclear what that would practically mean: would IP logging suffice? would IMEI need to be captured for mobile transactions? what is “appropriately” traceable? — none of those questions are answered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion: The NPCI’s practices and RBI regulations, for instance, seek to limit the amount of information that entities like e-PPI providers have.  These rules need to be brought in line with those practices and regulations.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.6 Rule 5: Risk Assessment&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 5 requires e-PPI issuers to carry out risk assessments associated with the security of the payments systems at least once a year and after any major security incident. However, there are no transparency requirements such as publications of details of such review, a summary of the analysis, any security vulnerabilities discovered etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Broaden the scope of this provision to include not just risk assessments but also security audits.&lt;/li&gt;
&lt;li&gt;Mandate publication of risk assessment and security audit reports.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.7 Rule 11: End-to-End Encryption&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The rule concerning end-to-end encryption (E2E) needs significantly greater detailing to be effective in ensuring the the protection of information at both storage and transit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: Elements such as Secure Element or a Secured Server and Trusted User Interface, both concepts to enable secure payments, can be detailed in the rule and a timeline can be established to require hardware, e-PPI practices and security standards to realistically account for such best practices to ensure modern, secure and industry accepted implementation of the rule.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.8 Rule 13: Retention of Information&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 13 leaves the question of retention entirely unanswered by deferring the future rulemaking to the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: Rule 13 should be expanded to include the various categories of information that can be stored, guidelines for the short-term (fast access) and long-term storage of the information retained under the rule and other relevant details. The rule should also include the security standards that should be followed in the storage of such information, require access logs be maintained for whenever this information is accessed by individuals, detail secure destruction practices at the end of the retention period  and finally mandate that end users be notified by the e-PPI issuer of when such retained information is accessed in all situations bar exceptional circumstances such as national security, compromising an ongoing criminal investigations, etc.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.9 Rule 14: Reporting of Cyber Incidents&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 14 is an excellent opportunity to uphold transparency, accountability and consumer rights by mandating time- and information-bound notification of cyber incidents to customers, including intrusions, database breaches and any other compromise of the integrity of the financial system. While the requirement of reporting such incidents to CERT-In is already present in the Rule 12 of the CERT Rules, the rule retains the optional nature of notifying customers. The rule should include an exhaustive list of categories or kinds of cyber incidents that should be reported to affected end users without compromising the investigation of such breaches by private organisations and public authorities. Further, the rule should also include penalties for non-compliance of this requirement (both to CERT-In and the consumer) to serve as an incentive for e-PPI issuers to uphold consumer public interest. The rule should be expanded to include a detailed mechanism for such reporting, including when e-PPI issuers and the CERT-In can withhold information from consumers as well as requiring the withheld information be disclosed when the investigation has been completed. Finally, the rule should also require that such disclosures be public in nature and consumers not be required to not disseminate such information to enable informed choice by the end user community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) In Rule 14(3) “may” should be substituted by “shall”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Penalties of up to 5 lakh rupees may be imposed for each day that the e-PPI issuer fails to report any severe vulnerability that could likely result in harm to customers.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.10 Rule 15: Customer Awareness and Education&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 15 on Customer Awareness and Education by e-PPI issuers does not take into account the vast lingual diversity and varied socio-economic demographic that makes up the end users of e-PPI providers in India, by mandating the actions under the rule must account for these factors prior to be propagated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: The rule must ensure that e-PPI issuers track record in carrying out awareness is regularly held accountable by both the government and public disclosures on their websites. Further, the rule can be made more concrete and effective by including mobile operating systems in their scope (along with equipments), mandating awareness for best practices for inclusive technologies like USSD banking, specifying notifications to include SMS reports of financial transactions, etc.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.11 Rule 16: Grievance Redressal&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 16 lays down the requirement of grievance redressal, without specifying appellate mechanisms (both within the organisation and at the regulatory level), accountability (via penalties) for non-compliance of the rule nor requiring a clear hierarchy of responsibility within the e-PPI organisation. These factors seriously compromise the efficacy of a grievance redressal framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: Similar rules for grievance redressal that have been enacted by the Insurance Regulatory and Development Authority for the insurance sector and the Telecom Regulatory Authority of India for the telecom sector can and should serve as a reference point for this rule. Their effectiveness and real world operation should also be monitored by the relevant authorities while ensuring sufficient flexibility exists in the rule to uphold consumer rights and the public interest. Proper appellate mechanisms at the regulatory level are essential along with penalties for non-compliance.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.12 Rule 17: Security Standards&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 17 empowers the Central Government to mandate security standards to be followed by e-PPI issuers operating in India. While appreciable in its overall outlook on ensuring a minimum standard of security, the Rule needs be improved upon to make it more effective. This can be in done by specifying certain minimum security standards to ensure all e-PPI issuers have a minimal level of security, instead of leaving them open to being intimated at a later date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: Standards that can either be made mandatory or be used as a reference point to create a new standard under Rule 17(2) are ISO/IEC 14443, IS 14202, ISO/IEC 7816, PCI DSS, etc. Further, the Rule should include penalties for non-compliance of these standards, to make them effectively enforceable by both the government and end users alike. Additional details like the maximum time period in which such security standards should be implemented post their notification, requiring regular third party audits to ensure continuing compliance and effectiveness and requiring updated standards be used upon their release will go a long way in ensuring e-PPI issuers fulfil their mandate under these Rules.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/draft-rules-security%20of%20PPI-for%20public%20comments.pdf"&gt;http://meity.gov.in/sites/upload_files/dit/files/draft-rules-security%20of%20PPI-for%20public%20comments.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017'&gt;http://editors.cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2017-03-23T01:54:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study">
    <title>Clause 12 Of The Data Protection Bill And Digital Healthcare: A Case Study</title>
    <link>http://editors.cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study</link>
    <description>
        &lt;b&gt;In light of the state’s emerging digital healthcare apparatus, how does Clause 12 alter the consent and purpose limitation model?&lt;/b&gt;
        &lt;p&gt;The blog post was &lt;a class="external-link" href="https://www.medianama.com/2022/02/223-data-protection-bill-digital-healthcare-case-study/"&gt;published in Medianama&lt;/a&gt; on February 21, 2022. This is the second in a two-part series by Amber Sinha.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a href="https://www.medianama.com/2022/02/223-data-protection-bill-consent-clause-state-function/"&gt;previous post&lt;/a&gt;, I looked at provisions on non-consensual data processing for state functions under the most recent version of recommendations by the Joint Parliamentary Committee on India’s Data Protection Bill (DPB). The true impact of these provisions can only be appreciated in light of ongoing policy developments and real-life implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To appreciate the significance of the dilutions in Clause 12, let us consider the Indian state’s range of schemes promoting digital healthcare. In July 2018, NITI Aayog, a central government policy think tank in India released a strategy and approach paper (Strategy Paper) on the formulation of the National Health Stack which envisions the creation of a federated application programming interface (API)-enabled health information ecosystem. While the Ministry of Health and Family Welfare has focused on the creation of Electronic Health Records (EHR) Standards for India during the last few years and also identified a contractor for the creation of a centralised health information platform (IHIP), this Strategy Paper advocates a completely different approach, which is described as a Personal Health Records (PHR) framework. In 2021, the National Digital Health Mission (NDHM) was launched under which a citizen shall have the option to obtain a digital health ID. A digital health ID is a unique ID and will carry all health records of a person.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;A Stack Model for Big Data Ecosystem in Healthcare&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A stack model as envisaged in the Strategy Paper, consists of several layers of open APIs connected to each other, often tied together by a unique health identifier. The open nature of APIs has the advantage that it allows public and private actors to build solutions on top of it, which are interoperable with all parts of the stack. It is however worth considering both the ‘openness’ and the role that the state plays in it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the APIs are themselves open, they are a part of a pre-decided technological paradigm, built by private actors and blessed by the state. Even though innovators can build on it, the options available to them are limited by the information architecture created by the stack model. When such a technological paradigm is created for healthcare reform and health data, the stack model poses additional challenges. By tying the stack model to the unique identity, without appropriate processes in place for access control, siloed information, and encrypted communication, the stack model poses tremendous privacy and security concerns. The broad language under Clause 12 of the DPB needs to be looked at in this context.&lt;/p&gt;
&lt;p&gt;Clause 12 allows non-consensual processing of personal data where it is necessary “for the performance of any function of the state authorised by law” in order to provide a service or benefit from the State. In the previous post, I had highlighted the import of the use of only ‘necessity’ to the exclusion of ‘proportionality’. Now, we need to consider its significance in light of the emerging digital healthcare apparatus being created by the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Health Stack and National Digital Health Mission together envision an intricate system of data collection and exchange which in a regulatory vacuum would ensure unfettered access to sensitive healthcare data for both the state and private actors registered with the platforms. The Stack framework relies on repositories where data may be accessed from multiple nodes within the system. Importantly, the Strategy Paper also envisions health data fiduciaries to facilitate consent-driven interaction between entities that generate the health data and entities that want to consume the health records for delivering services to the individual. The cast of characters involve the National Health Authority, health care providers and insurers who access the National Health Electronic Registries, unified data from different programmes such as National Health Resource Repository (NHRR), NIN database, NIC and the Registry of Hospitals in Network of Insurance (ROHINI), private actors such as Swasth, iSpirt who assist the Mission as volunteers. The currency that government and private actors are interested in is data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The promised benefits of healthcare data in an anonymised and aggregate form range from Disease Surveillance to Pharmacovigilance as well as Health Schemes Management Systems and Nutrition Management, benefits which have only been more acutely emphasised during the pandemic. However, the pandemic has also normalised the sharing of sensitive healthcare data with a variety of actors, without much thinking on much-needed data minimisation practises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The potential misuses of healthcare data include greater state surveillance and control, predatory and discriminatory practices by private actors which rely on Clause 12 to do away with even the pretense of informed consent so long as the processing of data is deemed necessary by the state and its private sector partners to provide any service or benefit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subclause (e) in Clause 12, which was added in the last version of the Bill drafted by MeitY and has been retained by the JPC, allows processing wherever it is necessary for ‘any measures’ to provide medical treatment or health services during an epidemic, outbreak or threat to public health. Yet again, the overly-broad language used here is designed to ensure that any annoyances of informed consent can be easily brushed aside wherever the state intends to take any measures under any scheme related to public health.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Effectively, how does the framework under Clause 12 alter the consent and purpose limitation model? Data protection laws introduce an element of control by tying purpose limitation to consent. Individuals provide consent to specified purposes, and data processors are required to respect that choice. Where there is no consent, the purposes of data processing are sought to be limited by the necessity principle in Clause 12. The state (or authorised parties) must be able to demonstrate necessity to the exercise of state function, and data must only be processed for those purposes which flow out of this necessity. However, unlike the consent model, this provides an opportunity to keep reinventing purposes for different state functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the absence of a data protection law, data collected by one agency is shared indiscriminately with other agencies and used for multiple purposes beyond the purpose for which it was collected. The consent and purpose limitation model would have addressed this issue. But, by having a low threshold for non-consensual processing under Clause 12, this form of data processing is effectively being legitimised.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study'&gt;http://editors.cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-03-01T15:07:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india">
    <title>CIS Submission to the Committee of Experts on a Data Protection Framework for India</title>
    <link>http://editors.cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ‘White Paper of the Committee of Experts on a Data Protection Framework for India’ (“White Paper”) released by the Ministry of Electronics and Information Technology. The White paper was drafted by a Committee of Expert (“Committee”) constituted by the Ministry. CIS has conducted research on the issues of privacy, data protection and data security since 2010 and is thankful for the opportunity to put forth its views. The submission was made on January 31, 2018.&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;The submission is divided into four parts — I. Preliminary, II. Scope and Exemption, III. Grounds of Processing, Obligations of Entities and Individual Rights and IV. Regulation and Enforcement. The submission follows the same the order as adopted by the White Paper.&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;&lt;/h4&gt;
&lt;p&gt;&lt;b&gt;Please access the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/data-protection-submission"&gt;full submission here&lt;/a&gt;.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india'&gt;http://editors.cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-04-18T16:39:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india">
    <title>CIS Submission to the Committee of Experts on a Data Protection Framework for India</title>
    <link>http://editors.cis-india.org/internet-governance/files/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india'&gt;http://editors.cis-india.org/internet-governance/files/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-04-06T08:09:09Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/cis-statement-on-right-to-privacy-judgment">
    <title>CIS Statement on Right to Privacy Judgment</title>
    <link>http://editors.cis-india.org/internet-governance/blog/cis-statement-on-right-to-privacy-judgment</link>
    <description>
        &lt;b&gt;In an emphatic endorsement of the right to privacy, a nine judge constitutional bench unanimously upheld a fundamental right to privacy. The events leading to this bench began during the hearings in the ongoing Aadhaar case, when in August 2015, Mukul Rohatgi, the then Attorney General stated that there is no constitutionally guaranteed right to privacy.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;reliance was on two Supreme Court judgments in MP Sharma v Satish Chandra (1954) and Kharak Singh v State of Uttar Pradesh (1962): both cases, decided by eight- and six-judge benches respectively, denied the existence of a constitutional right to privacy. As the subsequent judgments which upheld the right to privacy were by smaller benches, he claimed that MP Sharma and Kharak Singh still prevailed over them, until they were overruled by a larger bench. This landmark judgment was in response to a referral order to clear the confusion over the status of privacy as a right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We, at the Centre for Internet and Society (CIS) welcome this judgement and applaud the depth and scope of the Supreme Court’s reasoning. CIS has been producing research on the different aspects of the right to privacy and its implications for the last seven years and had the privilege of serving on the Justice AP Shah Committee and contributing to the Report of the Group of Experts on Privacy.&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; We are honoured that some of our research has also been cited by the judgment.&lt;a name="fr2" href="#fn2"&gt;[2] &lt;/a&gt;Such judicial recognition is evidence of the impact sound research can have on policymaking.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;In the course of a 547 page judgment, the bench affirmed the fundamental nature of the right to privacy reading it into the values of dignity and liberty. The judgment is instructive in its reference to scholarly works and jurisprudence not only in India but other legal systems such as USA, South Africa, EU and UK, while recognising a broad right to privacy with various dimensions across spatial, informational and decisional spheres. We note with special appreciation that women’s bodily integrity and citizens’ sexual orientation are among those aspects of privacy that were clearly recognised in the judgment. For researchers studying privacy and its importance, this judgment is of great value as it provides clear reasoning to reject oft-quoted arguments which are used to deny privacy’s significance. The judgement is also cognizant of the implications of the digital age and emphasise the need for a robust data protection framework.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The right to privacy has been read into into Article 21 (Right to life and liberty), and Part III (Chapter on Fundamental Rights) of the Constitution. This means that any limitation on the right in the form of reasonable restrictions must not only satisfy the tests evolved under Article 21, but where loss of privacy leads to infringement on other rights, such as chilling effects of surveillance on free speech, the tests for constitutionality under those provisions for also be satisfied by the limiting action. This provides a broad protection to citizens’ privacy which may not be easily restricted. We expect that this judgment will have far reaching impacts, not just with respect to the immediate Aadhaar case, but also to in a score of other matters such as protection of sexual choice by decriminalising Section 377 of the Indian Penal Code, oversight of statutory search and seizure provisions such as Section 132 of the Income Tax Act, personal data collection and processing practices by both state and private actors and mass surveillance programmes in the interest of national security.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;As this judgment comes in response to a referral order, the judges were not dealing with any questions of fact to ground the legal principles in. Subsequent judgments which deal with privacy will apply these principles and further evolve the contours of this right on a case-by-case basis. For now, we welcome this judgment and look forward to its consistent application in the future.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. CIS was quoted in the judgement on footnote 46, page 33 and 34: &lt;a href="http://supremecourtofindia.nic.in/pdf/LU/ALL%20WP(C)%20No.494%20of%202012%20Right%20to%20Privacy.pdf"&gt;http://supremecourtofindia.nic.in/pdf/LU/ALL%20WP(C)%20No.494%20of%202012%20Right%20to%20Privacy.pdf &lt;/a&gt;The quote is " Illustratively, the Centre for Internet and Society has two interesting articles tracing the origin of privacy within Classical Hindu Law and Islamic Law. See Ashna Ashesh and Bhairav Acharya ,“Locating Constructs of Privacy within Classical Hindu Law”, The Centre for Internet and Society, available at &lt;a href="https://cis-india.org/internet-"&gt;https://cis-india.org/internet-&lt;/a&gt;governance/blog/loading-constructs-of-privacy-within-classical-hindu-law. See also Vidushi Marda and Bhairav Acharya, “Identifying Aspects of Privacy in Islamic Law”, The Centre for Internet and Society, available at &lt;a href="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt;https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law&lt;/a&gt; " Further, research commissioned by CIS cited in the judgment includes a reference in page 201 footnote 319, "Bhairav Acharya, “The Four Parts of Privacy in India”, Economic &amp;amp; Political Weekly (2015), Vol. 50 Issue 22, at page 32."&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/cis-statement-on-right-to-privacy-judgment'&gt;http://editors.cis-india.org/internet-governance/blog/cis-statement-on-right-to-privacy-judgment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-08-31T18:13:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/cis-response-to-draft-e-commerce-policy">
    <title>CIS Response to Draft E-Commerce Policy</title>
    <link>http://editors.cis-india.org/internet-governance/blog/cis-response-to-draft-e-commerce-policy</link>
    <description>
        &lt;b&gt;CIS is grateful for the opportunity to submit comments to the Department of Industrial Policy and Promotion on the draft national e-commerce policy. This response was authored by Amber Sinha, Arindrajit Basu, Elonnai Hickok and Vipul Kharbanda.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Access our response to the draft policy here: &lt;a href="https://cis-india.org/internet-governance/resources/e-commerce-submission"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;The E-Commerce Policy is a much needed and timely document that seeks to enable the growth of India's digital ecosystem. Crucially, it backs up India's stance at the WTO, which has been a robust pushback against digital trade policies that would benefit the developed world at the cost of emerging economies. However, in order to ensure that the benefits of the digital economy are truly shared, focus must not only be on the sellers but also on the consumers, which automatically brings in individual rights into the question. No right is absolute but there needs to be a fair trade-off between the mercantilist aspirations of a burgeoning digital economy and the civil and political rights of the individuals who are spurring the economy on. We also appreciate the recognition that the regulation of e-commerce must be an inter-disciplinary effort and the assertion of the roles of various other departments and ministries. However, we also caution against over-reach and encroaching into policy domains that fall within the mandate of existing laws.&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/cis-response-to-draft-e-commerce-policy'&gt;http://editors.cis-india.org/internet-governance/blog/cis-response-to-draft-e-commerce-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>E-Commerce</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-04-26T06:40:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar">
    <title>Can the Judiciary Upturn the Lok Sabha Speaker’s Decision on Aadhaar?</title>
    <link>http://editors.cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar</link>
    <description>
        &lt;b&gt;When ruling on the petition filed by Jairam Ramesh challenging passing the Aadhaar Act as a money Bill, the court has differing precedents to look at.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="https://thewire.in/110795/aadhaar-money-bill-judiciary/"&gt;published in the Wire&lt;/a&gt; on February 21, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a href="http://thewire.in/2016/04/24/the-aadhaar-act-is-not-a-money-bill-31297/" target="_blank" title="an earlier article"&gt;an earlier article&lt;/a&gt;, I had argued that the characterisation of the &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=5&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwj0xo6U_KDSAhVHLo8KHcygCVEQFggvMAQ&amp;amp;url=https%3A%2F%2Fuidai.gov.in%2Fimages%2Fthe_aadhaar_act_2016.pdf&amp;amp;usg=AFQjCNHDmJKdO8jdfGZJKLKRJQpHdf1Frw&amp;amp;sig2=B_YbWncu6eyZHJ1MFTD0NA" rel="external nofollow" target="_blank" title="Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act"&gt;Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act&lt;/a&gt;,  as a money Bill by Sumitra Mahajan, speaker of the Lok Sabha, was  erroneous. Specifically, I had argued that upon perusal of Article 110  (1) of the constitution, the Aadhaar Act does not satisfy the conditions  required of a money Bill. For a legislation to be classified as a money  Bill, it must comprise of ‘only’ provisions dealing with the following  matters: (a) imposition, regulation and abolition of any tax, (b)  borrowing or other financial obligations of the government of India, (c)  custody, withdrawal from or payment into the Consolidated Fund of India  (CFI) or Contingent Fund of India, (d) appropriation of money out of  CFI, (e) expenditure charged on the CFI or (f) receipt or custody or  audit of money into CFI or public account of India; or (g) any matter  incidental to any of the matters specified in sub-clauses (a) to (f).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 110 is modelled on Section 1(2) of the UK’s Parliament Act, 1911, which also defines money Bills as those only dealing with certain enumerated matters. The use of the word ‘only’ was brought up by Ghanshyam Singh Gupta during the constituent assembly debates. He pointed out that the use of the word ‘only’ limits the scope money Bills to only those legislations which did not deal with other matters. His amendment to delete the word ‘only’ was rejected, clearly establishing the intent of the framers of the constitution to keep the ambit of money Bills extremely narrow. G.V. Mavalankar, the first speaker of Lok Sabha, had stated that the word ‘only’ must not be construed so as to give an overly restrictive meaning. For instance, a Bill which deals with taxation could have provisions which deal with the administration of the tax. The finance minister, Arun Jaitley, referred to these words by Mavalankar, justifying the classification of the Aadhaar Act as a money Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Aadhaar Bill does makes references to benefits, subsidies and services funded by the CFI, even a cursory reading of the Bill reveals its main objectives as creating a right to obtain a unique identification number and providing for a statutory apparatus to regulate the entire process. Any reasonable reading of the legislation would be hard pressed to view all provisions in the Aadhaar Act, aside from the one creating a charge on the CFI, as merely administrative provisions incidental to the creation such charge. The mere fact of establishing the Aadhaar number as the identification mechanism for benefits and subsidies funded by the CFI does not give it the character of a money Bill. The Bill merely speaks of facilitating access to unspecified subsidies and benefits rather than their creation and provision being the primary object of the legislation. Erskine May’s seminal textbook, Parliamentary Practice, is instructive in this respect and makes it clear that a legislation which simply makes a charge on the consolidated fund does not becomes a money Bill if otherwise its character is not that of one. Further, the subordinate regulations notified under the Aadhaar Act deal almost entirely with matters to do with enrolment, updation, authentication of the Aadhaar number and related matters such as data security regulations and sharing of information collected, rather than the provision of benefits or subsidies or disbursal of funds otherwise from the CFI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in the context of the petition filed by former Union minister Jairam Ramesh challenging the passage of the law on Aadhaar as a money Bill, the more important question is whether the judiciary has a right to question the speaker’s decision in such a matter. If not, any other questions about whether the legislation is a money Bill will remain merely academic in nature.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Irregularity vs illegality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Article 110 (3) clearly states that with regard to the question whether a legislation is a money Bill or not, the decision of the speaker is final and binding. The question is whether such a clause completely excludes any judicial review. Further, Article 122 prohibits the courts from questioning the validity of any proceedings in parliament on the ground of any alleged irregularity of procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the arguments in the court, the attorney general questioned the locus standi of Ramesh. The petition has been made under Article 32 of the constitution and the government argued that no fundamental rights of Ramesh were violated. However, the court has asked Ramesh to make his submission and adjourned the hearing to July. The petition by Ramesh would hinge largely on the powers of the judiciary to question the decision of the speaker of the Lok Sabha.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The powers of privilege that parliamentarians enjoy are integral to the principle of separation of powers. The rationale behind parliamentary privilege is to prevent interference in the lawmakers’ powers to perform essential functions. The ability to speak and vote inside the legislature without the fear of punishment is certainly essential to the role of a lawmaker. However, the extent of this protection lies at the centre of this discussion. During the constituent assembly debates, H.V. Kamath and others had argued for a schedule to exhaustively codify the existing privileges. However, B.R. Ambedkar pointed to the difficulty of doing so and parliamentary privilege on the lines of the British parliamentary practice was retained in the constitution. In the last few decades, a judicial position has emerged that courts could exercise a limited degree of scrutiny over privileges, as they are primarily responsible for interpreting the constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the matter of &lt;a href="https://indiankanoon.org/doc/1757390/" rel="external nofollow" target="_blank" title="Raja Ram Pal vs The Hon’ble Speaker, Lok Sabha"&gt;&lt;i&gt;Raja Ram Pal vs The Hon’ble Speaker, Lok Sabh&lt;/i&gt;a&lt;/a&gt;,  it had been clarified that proceedings of the legislature were immune  from questioning by courts in the case of procedural irregularity but  not in the case of illegality. In this case, the Supreme Court while  dealing with Article 122 stated that it does not oust review by the  judiciary in cases of “gross illegality, irrationality, violation of  constitutional mandate, mala fides, non-compliance with rules of natural  justice and perversity.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1968, the speaker of the Punjab legislative assembly adjourned the  proceedings for a period of two months following rowdy behaviour.  Subsequently, an ordinance preventing such a suspension was promulgated  and the legislature was summoned by the governor to consider some  expedient financial matters. The speaker disagreed with the decision and  after some confusion, the deputy speaker passed a few Bills as money  Bills. While looking into the question of what was protected from  judicial review, the &lt;a href="https://indiankanoon.org/doc/36589/" rel="external nofollow" target="_blank" title="court stated"&gt;court stated&lt;/a&gt; that the protection did not extend to breaches of mandatory provisions  of the constitution, only to directory provisions. By that logic, if  Article 110 (1) is seen as a mandatory provision, a breach of its  provisions could lead to an interpretation that the Supreme Court may  well question an erroneous decision by the speaker of the Lok Sabha to  certify a legislation as a money Bill. The use of the word “shall” in  Article 110 (1), the nature and design of the provision, its overriding  impact on the other constitutional provisions granting the Rajya Sabha  powers are ample evidence of its mandatory nature. Based on the above,  Anup Surendranath has &lt;a href="http://ccgdelhi.org/doc/%28CCG-NLU%29%20Aadhaar%20Money%20Bill.pdf" rel="external nofollow" target="_blank" title="argued"&gt;argued&lt;/a&gt; that  the passage of the Aadhaar Act as a money Bill when it does not satisfy  the constitutional conditions for it does amount to a gross illegality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The judicial precedent in &lt;i&gt;&lt;a href="https://indiankanoon.org/doc/60568976/" rel="external nofollow" target="_blank" title="Mohd. Saeed Siddiqui vs State of Uttar Pradesh"&gt;Mohd. Saeed Siddiqui vs State of Uttar Pradesh&lt;/a&gt;&lt;/i&gt; where the matter of the court’s power to question the decision of a  speaker was considered, though, leans in the other direction. In 2012,  the &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwiRtov_iKHSAhVLuo8KHYhsClcQFggbMAA&amp;amp;url=http%3A%2F%2Fwww.lawsofindia.org%2Fdownloadfile.php%3Flawid%3D7834%26file%3Duttar_pradesh%2F1981%2F1981UP7.pdf%26pageurl%3D%252Fsingle%252Falpha%252F7.html&amp;amp;usg=AFQjCNGRW8-NChXALunaUbjZRrlM4IvCkA&amp;amp;sig2=rg6YCMf7qRqNw08NnctuhQ" rel="external nofollow" target="_blank" title="Uttar Pradesh Lokayukta and Up-Lokayuktas (Amendment) Act"&gt;Uttar Pradesh Lokayukta and Up-Lokayuktas (Amendment) Act&lt;/a&gt;,  2012 was passed as money Bill by the Uttar Pradesh state legislature.  Subsequently, a writ petition was filed challenging its constitutional  validity. A three-judge bench of the Supreme Court looked into the  application of Article 212. It is the provision corresponding to Article  122, dealing with the power of the courts to inquire into the  proceedings of the state legislature. The court held that Article 212  makes “it clear that the finality of the decision of the Speaker and the  proceedings of the State Legislature being important privilege of the  State Legislature, viz., freedom of speech, debate and proceedings are  not to be inquired by the Courts.” Importantly, ‘proceedings of the  legislature’ were deemed to include within its scope everything done in  transacting parliamentary business, including the passage of the Bill.  While the court did acknowledge the limitations of parliamentary  privilege as established in the &lt;i&gt;Raja Ram Pal&lt;/i&gt; case, it did not adequately take into account the reasoning in it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar Act is a legislation which makes it mandatory of all  residents to enrol for a biometric identification system in order to  avail certain subsidies, benefits and services. It has huge potential  risks for individual privacy and national security and has been the  subject of an extremely high profile Public Interest Litigation. Its  passage as a money Bill, without any oversight from the Rajya Sabha and  an opportunity for substantial debate and discussion, is a fraud on the  Constitution. Whether or not the court chooses to see it that way  remains to be seen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar'&gt;http://editors.cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-27T15:44:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/jobs/call-for-design-interns-201906">
    <title>Call for Design Interns</title>
    <link>http://editors.cis-india.org/jobs/call-for-design-interns-201906</link>
    <description>
        &lt;b&gt;CIS is seeking graphic design interns to create communication material (information and data visualizations, publication layouts, presentations, etc.) for our projects. The intern will assist our researchers in presenting their research in accessible and easy-to-understand forms, as well as design social media collaterals. They will be working with a multi-disciplinary team across two cities, and be supervised by a designer.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Who can apply?&lt;/h4&gt;
&lt;p&gt;Students of design or recent design graduates, who are available to work full-time for at least a month, and have experience in editorial design and creating data visualizations. Others who can demonstrate similar skills and aptitude are also welcome to apply. Applicants with an interest in digital technology research would be preferred.&lt;/p&gt;
&lt;p&gt;Our work is strengthened by the diversity in background, culture, experience, religion, caste, sexual orientation, gender, gender identity, race, ethnicity, age and disability. We welcome applications from candidates belonging to marginalised communities.&lt;/p&gt;
&lt;h4&gt;Skills&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Comfortable working with Adobe InDesign, Illustrator, and Photoshop,&lt;/li&gt;
&lt;li&gt;Comfortable working with Google Docs and Slides, and&lt;/li&gt;
&lt;li&gt;Knowledge of HTML/CSS will be preferred.&lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;Duration of the internship&lt;/h4&gt;
&lt;p&gt;1 – 2 months&lt;/p&gt;
&lt;h4&gt;Location&lt;/h4&gt;
&lt;p&gt;Bangalore or New Delhi&lt;/p&gt;
&lt;h4&gt;Remuneration&lt;/h4&gt;
&lt;p&gt;A modest stipend will be paid&lt;/p&gt;
&lt;h4&gt;How to apply?&lt;/h4&gt;
&lt;p&gt;To apply, please send –&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Resumé,&lt;/li&gt;
&lt;li&gt;Relevant work samples (less than 5MB), and&lt;/li&gt;
&lt;li&gt;Link to online portfolio, if any.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Applications should be sent to Saumyaa Naidu (saumyaa [at] cis-india.org) and Karan Saini (karan [at] cis-india.org) by &lt;strong&gt;June 28, 2019&lt;/strong&gt;.&lt;/p&gt;
&lt;h4&gt;Organisational policies&lt;/h4&gt;
&lt;p&gt;All interns working at CIS must read and abide by CIS' &lt;a href="https://cis-india.org/about/policies" target="_blank"&gt;organisational policies&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/jobs/call-for-design-interns-201906'&gt;http://editors.cis-india.org/jobs/call-for-design-interns-201906&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-06-12T06:16:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-">
    <title>Breeding misinformation in virtual space</title>
    <link>http://editors.cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-</link>
    <description>
        &lt;b&gt;A well-informed citizenry and institutions that provide good information are fundamental to a functional democracy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The phenomenon of fake news has rece-ived significant sc-holarly and  media attention over the last few years. In March, Sir Tim Berners Lee,  inventor of the World Wide Web, has called for a crackdown on fake news,  stating in an open letter that “misinformation, or fake news, which is  surprising, shocking, or designed to appeal to our biases, can spread  like wildfire.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gartner, which annually predicts what the next year in technology  will look like, highlighted ‘increased fake news’  as one of its  predictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report states that by 2022, “majority of individuals in mature  economies will consume more false information than true information. Due  to its wide popularity and reach, social media has come to play a  central role in the fake news debate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Researchers have suggested that rumours penetrate deeper within a  social network than outside, indicating the susceptibility of this  medium. Social networks such as Facebook and communities on messaging  services such as Whats-App groups provide the perfect environment for  spreading rumours. Information received via friends tends to be trusted,  and online networks allow in-dividuals to transmit information to many  friends at once.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to understand the recent phenomenon of fake news, it is  important to recognise that the problem of misinformation and propaganda  has existed for a long time. The historical examples of fake news go  back centuries where, prior to his coronation as Roman Emperor, Octavian  ran a disinformation campaign against Marcus Antonius to turn the Roman  populace against him.&lt;/p&gt;
&lt;p class="imgCenter" style="text-align: justify; "&gt;&lt;a class="objectNew"&gt;&lt;img alt="aa" src="http://images.asianage.com/images/fdeb4b878fd86fc0af509a2eb0b6927a4c6fdede-tc-img-preview.jpg" title="aa" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The advent of the printing press in the 15th century led to  widespread publication; however, there were no standards of verification  and journalistic ethics. Andrew Pettigrew wri-tes in his The Invention  of News, that news reporting in the 16th and 17th centuries was full of  portents about “comets, celestial apparitions, freaks of nature and  natural disasters.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, the immediate cause for the 1857 War of Indepen-dence was  rumours that the bones of cows and pigs were mixed with flour and used  to grease the cartridges used by the sepoys.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Leading up to the Second World War, the radio emerged as a strong  medium for dissemination of disinformation, used by the Nazis and other  Axis powers. More recently, the milk miracle in the mid-1990s consisting  of stories of the idol of Ganesha drinking milk was a popular fake news  phenomenon. In 2008, rumours about the popular snack, Kurkure, being  made out of plastic became so widespread that Pepsi, its holding  company, had to publicly rebut them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A quick survey by us at the Centre of Internet and Society, for a  forthcoming report, of the different kinds of misinformation being  circulated in India, suggested four different kinds of fake news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first is a case of manufactured primary content. This includes  instances where the entire premise on which an argument is based is  patently false. In August 2017, a leading TV channel reported that  electricity had been cut to the Jama Masjid in New Delhi for non-payment  of bills. This was based on a false report carried by a news portal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second kind of fake news involves manipulation or editing of  primary content so as to misrepresent it as something else. This form of  fake news is often seen with respect to multimedia content such as  images, pictures, audios and videos. These two forms of fake news tend  to originate outside traditional media such as newspapers and television  channels, and can be often sourced back to social media and WhatsApp  forwards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, we see such unverified stories being picked up by  traditional media. Further, there are instances where genuine content  such as text and pictures are shared with fallacious contexts and  descriptions. Earlier this year, several dailies pointed out that an  image shared by the ministry of home affairs, purportedly of the  floodlit India-Pakistan border, was actually an image of the  Spain-Morocco border. In this case, the image was not doctored but the  accompanying information was false.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, more complicated cases of misinformation involve the primary  content itself not being false or manipulated, but the facts when they  are reported may be quoted out of context. Most examples of  misinformation spread by mainstream media, which has more evolved  systems of fact checking and verification, and editorial controls, would  tend to fall under this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, there are instances of lack of diligence in fully  understanding the issues before reporting. Such misrepresentations are  often encountered while reporting in fields that require specialised  knowledge, such as science and technology, law, finance etc. Such forms  of misinformation, while not suggestive of malafide intent can still  prove to be quite dangerous in shaping erroneous opinions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the widespread dissemination of fake news contributes greatly  to its effectiveness, it also has a lot to do with the manner in which  it is designed to pander to our cognitive biases. Directionally  motivated reasoning prompts people confronted with political information  to process it with an intention to reach a certain pre-decided  conclusion, and not with the intention to assess it in a dispassionate  manner. This further results in greater susceptibility to confirmation  bias, disconfirmation bias and prior attitude effect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fake news is also linked to the idea of “naïve realism,” the belief  people have that their perception of reality is the only accurate view,  and those in disagreement are necessarily uninformed, irrational, or  biased. This also explains why so much fake news simply does not engage  with alternative points of view.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A well-informed citizenry and institutions that provide good  information are fundamental to a functional democracy. The use of the  digital medium for fast, unhindered and unchecked spread of information  presents a fertile ground for those seeking to spread misinformation.  How we respond to this issue will be vital for democratic societies in  our immediate future. Fake news presents a complex regulatory challenge  that requires the participation of different stakeholders such as the  content disseminators, platforms, norm guardians which include  institutional fact checkers, trade organisations, and “name-and-shaming”  watchdogs, regulators and consumers.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-'&gt;http://editors.cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-08T02:24:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf">
    <title>Beyond Public Squares, Dumb Conduits, and Gatekeepers: The Need for a New Legal Metaphor for Social Media</title>
    <link>http://editors.cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf'&gt;http://editors.cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-05-31T10:19:33Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
