11.07.2015 Views

W7y8w3

W7y8w3

W7y8w3

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IndiaCommunications surveillance, human rights and freedomof expression in IndiaDigital Empowerment Foundation (DEF)Ritu Srivastavawww.defindia.orgIntroductionThe internet is a key tool to exercise the right tofreedom of expression. It not only allows us to exercisethe right to receive information, knowledge,ideas and opinions, but also allows us to exercisethe right to express these – be it in the form ofvideo, audio or writing. Used as a publishing andcommunication tool, it enables millions around theworld to communicate instantly, gives the commoncitizen a voice among an audience of millions, andserves as a huge multimedia library of information.One definition says “the internet is as diverse as humanthought.” 1As access to the internet becomes more diverse,including information on prominent social issues isbecoming important. United Nations (UN) SpecialRapporteur on the Promotion and Protection of theRight to Freedom of Expression and Opinion FrankLa Rue underlined in his report submitted to theHuman Rights Council (HRC) regarding the uniqueand transformative nature of the internet that itnot only enables individuals to exercise their rightto freedom of expression and opinion, but also allowsthem to exercise other human rights and topromote the progress of society as a whole. 2 It hasbeen proven that technological advances have beenpowerful tools for democracy by giving access to all.However, data mining by intelligence agencies blurslines between legitimate surveillance and arbitrarymass surveillance by governments nationally andinternationally.La Rue also emphasised how government andcorporate surveillance are undermining freedom ofexpression. His report states: “Freedom of expressioncannot be ensured without respect to privacyin communications. Privacy and freedom of expressionare interlinked and mutually dependent; an1 ACLU v. Reno, 929 F. Supp. 824, 830-849 (ED Pa. 1996) at 842(District Court Opinion)2 Report of the Special Rapporteur on the promotion and protectionof the right to freedom of opinion and expression, Frank La Rue,17 April 2013. www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdfinfringement upon one can be both the cause andconsequence of an infringement upon the other.” 3His report established the connection betweenfreedom of expression and privacy in communicationsand called for global attention to thewidespread use of surveillance mechanisms byvarious governments that are violating humanrights, such as the right to privacy and freedom ofexpression. It also makes the point that privacy isa fundamental human right, and is important fordemocratic society to maintain its human dignity.Furthermore, the right to privacy reinforces otherrights, such as freedom of expression and information,and freedom of association, also recognisedunder human rights law. 4 However, it is difficult todefine exactly what the right to privacy entails. Privacycan be seen from two perspectives – it dependson the type of information we share or the sides ofour lives that we want to keep private, and whetheror not the information is in the public interest.Governments worldwide have continued tojustify their engagement in wide-ranging surveillanceprogrammes – often at the very limits of thelaw – arguing national security concerns. While Indiais the world’s largest democracy and is said tobe protecting freedom of speech through its lawsand constitution, freedom of expression online isincreasingly being restricted in the country. Justificationsgiven for these restrictions are the problemof defamation and the need to maintain national securityand peace in society.This became evident when the Indian governmentannounced the start of the CentralisedMonitoring System (CMS) in 2009, a programmeto monitor telecommunications in the country. In2013, Minister of State for Communications andInformation Technology Milind Deora initiated therollout of CMS across India. This report analyseshow government surveillance works in India, andhow government and private organisations are accessingindividuals’ online data, which is a threat tofreedom of expression.3 Ibid.4 Universal Declaration of Human Rights, Article 12; United NationsInternational Convention on the Protection of the Rights of AllMigrant Workers and Members of Their Families, Article 14.Communications surveillance laws in IndiaThe term “communications surveillance” encompassesthe monitoring, interception, collection,analysis, use, preservation and retention of, interferencewith, or access to information which arisesfrom, reflects or is about a person’s communicationsin the past, present or future. With more and morepeople accessing the web, the internet user basein India reached 243 million 5 in 2014. This mediumnot only enables users to exchange information anddeliver services, but also allows political discourse.Platforms like Facebook and Twitter and blogs makeit easy for people to communicate and reach a vastaudience.Unlike PRISM, the United States surveillanceprogramme that captured the world’s attentionever since whistleblower Edward Snowden leakeddetails of global spying to The Guardian and WashingtonPost, India silently launched the CMS tomonitor internal communications in 2013. Thesystem cost USD 75 million, and will allow the governmentto access all digital communications andtelecommunications in the country.Since independence, laws in India have prohibitedthe unlawful interception of communications.For example, Section 26 of the India Post Office Act,1898 allows the interception of post for the “publicgood” only. According to this section, this powermay be invoked “on the occurrence of any publicemergency, or in the interest of the public safetyor tranquillity.” 6 The section also says that “a certificatefrom the State or Central Government” isrequired that would serve as conclusive proof as tothe existence of a public emergency, or to show thatthe interception is in the interest of public safety orpeace. Similarly, Section 5(2) of the Telegraph Act,1885 also authorises the interception of messages,but only a) in the event of a public emergency, orin the interest of public safety; and b) if it is necessaryor expedient to do so in the interests ofthe sovereignty and integrity of India, the securityof the state, friendly relations with foreign states,or public order, or for preventing incitement to thecommission of an offence. 7In the case of Hukam Chand Shyam Lal vs. Unionof India and Others, 8 the Supreme Court of India in-5 Times of India. (2014, January 29). India to have 243 millioninternet users by June 2014: IAMAI. Times of India. timesofindia.indiatimes.com/tech/tech-news/India-to-have-243-millioninternet-users-by-June-2014-IAMAI/articleshow/29563698.cms6 The Indian Post Office Act, 1898. www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf7 The Indian Telegraph Act, 1885. http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf8 AIR 1976 SC 789, 1976 SCR (2)1060, (1976) 2 SCC 128.terpreted the meaning of “public emergency”. Thecourt considered “public emergency” merely as an“economic emergency”, and justified surveillanceunder this section unless it raised problems relatingto the matters indicated in the section. The courtalso considered another qualifying term, “publicsafety”, as “security of the public or their freedomfrom danger”.Two separate sections of the InformationTechnology Act 2000 deal with interception andmonitoring of information. Section 69 deals with the“[p]ower to issue directions for interception or monitoringor decryption of any information through anycomputer resource”. 9 Section 69B deals with the“monitor[ing] and collect[ion] of traffic data or informationgenerated, transmitted, received or storedin any computer resource”. This monitoring powercan be used for cyber security purposes. 10 The term“traffic data” has been defined under Section 69Bas “any data identifying or purporting to identifyany person, computer system or computer networkor any location to or from which communication isor may be transmitted.”Surveillance is not only limited to individualmonitoring. Section 67C of the Information TechnologyAct deals with “intermediaries”, and requiresthem to maintain and preserve certain informationunder their control for a minimum of three months.Failure to do this is punishable with imprisonmentfor up to three years and a fine under Section 67C(2). Section 79 of the Information Technology Act 11provides immunity from liability for intermediariesfor third party content that is hosted by them.However, in 2011, the Ministry of Information andTechnology issued two more sets of rules under thisAct – firstly to govern intermediaries such as internetservice providers (ISPs) and web platforms, andsecondly to govern cybercafés. Both of these sets of9 Section 69 of the Information Technology Act. www.chmag.in/article/jan2012/powers-government-under-informationtechnology-act-200010 The Monitoring Rules list 10 “cyber security” concerns for whichmonitoring may be ordered: (a) forecasting of imminent cyberincidents; (b) monitoring network application with traffic dataor information on computer resources; (c) identification anddetermination of viruses/computer contaminants; (d) trackingcyber security breaches or cyber security incidents; (e) trackingcomputer resources breaching cyber security or spreading viruses/computer contaminants; (f) identifying or tracking of any personwho has contravened, or is suspected of having contravened orbeing likely to contravene cyber security; (g) undertaking forensicinvestigation of the concerned computer resource as a part of aninvestigation or internal audit of information security practicesin the computer resource; (h) accessing stored information forenforcement of any provisions of the laws relating to cyber securityin force at the time; (i) any other matter relating to cyber security.11 sflc.in/information-technology-act-and-rules-time-to-change136 / Global Information Society Watch india / 137

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!