The Promise of Public Interest Technology in India and the United States
Table of Contents
- Foreword
- The Development of Smart Water Markets Using Blockchain Technology (Aditya K. Kaushik)
- Civilian Drones: Privacy Challenges and Potential Resolution (Ananth Padmanabhan)
- The Privacy Negotiators: The Need for U.S. Tech Companies to Mediate Agreements on Government Access to Data in India (Madhulika Srikumar)
- Governing Data: Non-Discrimination and Non-Domination in Decision-Making (Joshua Simons)
- Open Transit Data in India (Richard Abisla)
- Blockchain Regulation in the United States: Evaluating the overall approach to virtual asset regulation (Tanvi Ratna)
- Improving India’s Parliamentary Voting and Recordkeeping (Pranesh Prakash)
- India and the United States: The Time Has Come to Collaborate on Commercial Drones (Sylvia Mishra)
- Civic Futures 2.0: The Gamification of Civic Engagement in Cities (Subhodeep Jash)
- Key Differences Between the U.S. Social Security System and India’s Aadhaar System (Kaliya Young)
Abstract
The India-United States Fellows Exchange is a collaboration between the Global Studies Program and the Fellows Program at New America. The fellowship took place between January and March 2019.
This collection of India-U.S. Fellows research includes 10 original research reports. These papers were edited by Emily Schneider, Melissa Salyk-Virk, and Awista Ayub. This initiative was developed and managed by Peter Bergen.
Acknowledgments
Thank you to our partner in India, the Observer Research Foundation, for hosting our cohort while in New Delhi, and to the Selection Committee for supporting this year’s application process.
We would also like to thank a number of New America teams that helped to shape the experience of the 10 Fellows while they were in residence: Blockchain Trust Accelerator; Cybersecurity Initiative; Future of Property Rights; International Security; Resource Security; Open Technology Institute; Ranking Digital Rights; Political Reform; and Public Interest Technology. Thank you to your staff for making time to meet with the cohort of Fellows throughout the research period, further building out their network, and providing them with thought leadership.
Thank you to the wider New America team for supporting our Fellows by attending open events we had with them, joining us on our Fellows Day at New America, and helping answer any questions they had. A huge thank you to Anne-Marie Slaughter, Tyra Mariani, and Anish Goel for their collective support and encouragement throughout the entire fellowship.
Thank you to our colleagues supporting events, communications, production, and human resources. You carried us through the process, and we are extremely grateful for the time and effort you have put into supporting the fellowship, convening event, and final papers.
A huge thank you for the collaborative effort of a number of our current and former colleagues throughout this process: Catherine York, Emily Schneider, Afua Bruce, Joanne Zalatoris, Maria Elkin, Angela Spidalette, Narmada Variyam, Clarke Reeves, Dee Snyder with Connoisseur Travel, Robin Bradley, Elizabeth Pankova, and Sumaita Mulk.
Downloads
Foreword
New America and the Ford Foundation recognized a unique and timely opportunity to create a fellowship exchange initiative between public interest technology practitioners in India and the United States. The 2019 exchange brought Fellows from India to the United States and sent Fellows to India from the United States with the aim of enabling Fellows from both countries to better harness technology to improve the lives of their citizens. The Fellows were technology practitioners from industry, government, and civil society as well as analysts of technology from academia and the media, and governmental regulators.
Too often, technical experts who understand the details of how a technology works lack the expertise or critical distance necessary to effectively evaluate, and thoughtfully shape, the policy impact of their work. Developing a better understanding of technology’s impact is a precondition for formulating effective and just public policy.
Each Fellow we selected possessed unique experience and expertise, which enabled them to devise novel technological solutions to public problems, and to analyze the effects of technology and of technology policy in new ways over the course of their eight-week research program.
Our first batch of applicants were diverse in talent, experience, education, and physical location. 27 percent of our applicants were female, 95 percent had a degree beyond a Bachelor’s or equivalent, and 62 percent of applicants came from India. Most candidates put forward potential projects in technology policy, privacy, blockchain, future of work, and biometrics. Through a robust selection process, our final cohort consisted of 10 Fellows, four women and six men, and seven were from India and three were U.S.-based.
We had a series of goals for this cohort:
- To increase knowledge and awareness of technology policy challenges and effective technological solutions to social problems in India and the United States
- To increase knowledge and awareness in India and the United States of both the successes and failures of initiatives to apply data science to public problems
- To increase awareness within the United States and India of successful local and regional technological tools addressing public policy challenges
Our 2019 cohort's projects, as you’ll see in the following research papers, focused on a wide range of issues: Open data and public transit in India; civic engagement through technology and gamification; blockchain-based solutions used for water management; civilian drones and the role that India and the United States have in shaping new drone applications; privacy in drone systems and evaluating the implications of this technology on personal data; policy and standards relating to the Indian Parliament’s recordkeeping and legislative process; designing effective regulatory frameworks for blockchain; the politics and ethics of machine learning; data sharing between India and the United States for law enforcement purposes and the underlying privacy standards for access to this electronic data; and the Aadhaar program in India.
Our approach to the fellowship was extremely hands-on and tailored to the unique backgrounds of our cohort. We began with one week of programming at the start of the fellowship in New Delhi, which included a full-day at the Ford Foundation with moderated discussions about the Fellows’ work, as well as keynote conversations. A second day was held at a partner organization—the Observer Research Foundation—with high-level industry speakers from organizations such as Facebook, Centre for Policy Research, The World Bank, Dalberg, and Mozilla.
Through a series of activities during the research exchange period, we supported the formation of a cohesive spirit of shared enterprise among the Fellows in the cohort in a way that ensured that the whole was more than the sum of the individual parts. We hosted events where the cohort met as a group with leading policymakers, experts and analysts working on public policy issues, and we organized individual meetings and interviews between Fellows and experts in the United States and India who could help them make progress on their projects.
The second week of full programming for all 10 Fellows took place at the end of the fellowship in Washington, D.C. Events included a full-day program for all Fellows to highlight their research findings on moderated panel discussions at New America with industry experts. In addition to the moderated discussions with Fellows, invited speakers included U.S.-based policy experts for keynote conversations. Fellows also participated in research workshops, and high-level meetings.
Further, there were industry experts across New America, representing programs and initiatives (Blockchain Trust Accelerator, Cybersecurity Initiative, Future of Property Rights, International Security, Open Technology Institute, Ranking Digital Rights, Political Reform, Public Interest Technology, and Resource Security) that were available to meet with the cohort of Fellows throughout the research period, further building their professional network.
In addition to their research papers, Fellows wrote articles, participated on panels, and took advantage of other media opportunities, and had meetings with technologists and policymakers in both countries.
We hope that you will enjoy reading their research papers, and believe that this anthology of work will prove helpful to India and U.S. policymakers and researchers alike.
Peter Bergen, Vice President for Global Studies & Fellows, New America
The Development of Smart Water Markets Using Blockchain Technology (Aditya K. Kaushik)
Aditya K. Kaushik is a project scientist at Divecha Centre for Climate Change at the Indian Institute of Science where his work revolves around developing applied research initiatives and assisting in science policy communication in the area of water. Kaushik holds a master of science degree in electrical engineering from the University of Southern California and a master of arts degree in law and diplomacy from the Fletcher School at Tufts University.
Acknowledgments : The author would like to thank New America for providing an opportunity to part of the 2019 India-U.S. fellowship program. This paper would not have been possible without contributions from Ahmed Jawad, Anik Bhaduri, Allison Price, Awista Ayub, Christopher Mellon, Jennifer Brody, Keerthana Chandrashekar, Melissa Salyk-Virk, Sharon Burke, Tomicah Tillemann, Yulia Panfil and the 2019 India – US fellows. The author would also like to express his gratitude to the New America editing, publishing and the communications team for their support.
Introduction
A significant reduction in the quantity of freshwater and deterioration of its quality has pushed the world towards a global water crisis.1 Lack of sufficient water, defined as water scarcity, is exacerbated by current global trends of rampant population growth, rapid urbanization, a rise in consumerism, and climate change (see Figure 1). According to the United Nations World Water Development Report 2018, about 46 percent of people in the world live in water scarce regions at least one month per year. This figure is predicted to rise to about 51–55 percent by the year 2050.2 Meanwhile, the global population is estimated to rise by 32 percent by the year 2050. Within this, the global urban population is expected to increase by over 80 percent, thus, increasing the global water demand, which is estimated to rise by 30 percent by the year 2050.3 Water scarcity is inextricably interwoven with the health, food, and energy sectors which has the capacity to significantly disrupt the economic, social, environmental, and political landscape, extending the problem across multiple development sectors.
Traditionally, the problem of water scarcity has been addressed by augmenting the supply side through a structural approach, such as building dams and reservoirs.4 Supply-side augmentation has yielded tremendous benefits vis-à-vis access to water and water services but it has also been environmentally damaging. Policymakers and city planners are increasingly looking at nonstructural demand-side solutions, such as managing water allocations, to ensure more efficient use of resources to complement the traditional structural approaches.5 In water reallocation projects, the movement of water from abundant areas to water-scarce areas tries to adjust the unequal demand for water over a geographic jurisdiction. Typically, centralized governmental institutions are responsible for water reallocation. These institutions are the main suppliers of water and they predict demand-side responses and while also determining supply and distribution costs. They respond to policies designed by city planners and seldom to the needs of individual buyers. This is partly because individual buyers are unable to signal their needs to the suppliers through such centralized ecosystems. Incorrect mapping of supply and demand requirements lead to the inefficient allocation of water resources. In addition, water management and its use result in several negative externalities.6 It is susceptible to problems related to collective action,7 free rider issues,8 and wastage.
Water markets where water assets are treated as a tradable commodity are cited as a solution to better allocate water and address the problem of water scarcity. Development of any market, especially to manage a good like water, is susceptible to market distortions typically caused by information asymmetry and high transaction costs. These market distortions lead to barriers to trade and thus prevent markets to function efficiently. As water is unlike any other commodity and is essential for life, these market distortions can incur a significant social cost. Thus, water markets have been historically a complicated economic policy instrument to implement. The purpose of this paper is to explore how blockchain-based solutions, based on the cities of Los Angeles and Bengalaru as case studies, can be used by regulators to reduce information asymmetry and high transaction costs and help in the development of efficient and transparent water markets.
Figure 1: Water scarcity in 2010 (upper image) and projected water scarcity in 2050 (lower image)
Source: Burek, P., Y. Satoh, G. Fischer, M. T. Kahil, A. Scherzer, S. Tramberend, L. F. Nava et al. "Water Futures and Solution: Fast Track Initiative (Final Report)." IIASA, Laxenburg, Austria (2016). http://pure.iiasa.ac.at/id/eprint/13008/1/WP-16-006.pdf
What are Water Markets?
A water market is a medium that allows buyers and sellers of a water-related good (wastewater, rainwater, groundwater, water rights, or entitlements) to interact and facilitate an exchange. The primary purpose of a water market is to facilitate efficient allocation of water resources and provide a clear measure of the value of water to incentivize conservation.9 The theory of water markets is based on the principle that trading water allows for better economic efficiency between buyers and sellers by allocating water resources in accordance with the strength of the buyer’s water demand. It also allows for better accounting of externalities like pollution and waste by allowing consumers to respond to changes in the operating environment.10 Water markets allow users with high marginal value to purchase water from users with low marginal value. In other words, water is transferred from low water use areas to high water use areas, allowing for allocation efficiency. The interaction between buyers and sellers and traditional market forces determine the price of water. The price of water is influenced by environmental and economic considerations. When markets are functioning efficiently, the market price of water sends signals and thus incentivizes buyers and sellers to increase or decrease their demand and supply. Typically, water is managed as a service industry where the price of water is determined by governing agencies who are unwilling to change the price based on quantity or quality available. Thus, such a system leads to distortions where water is being underpriced and over-consumed. Some of the more successfully functioning water markets exist in the United States (California’s Central Valley), in Australia (the Murray-Darling Basin), and in Chile (the National Market).11 Water markets are typically created to either meet additional water demands, to limit water use, to improve economic productivity and/or to protect natural ecosystems.
Conditions Necessary to Create Efficient Water Markets
Symmetric information exchange between buyers and sellers
Information asymmetry12 revolves around decisions made during transactions. In a water market setting, underlying gaps in the data ecosystem and institutional mechanisms contribute to three kinds of information asymmetries. First, there is a data inequality issue. For example, some participants might have better access to data than others, or the data that is available is of bad quality, or data is available but important data is hidden away, thus leading to adverse selection.13 Adverse selection occurs when some participants are able to make better decisions than others due to access to certain information. For instance, a seller of a treated wastewater has more information about the product quality than the buyer, thus putting the buyer at a disadvantage. The buyers will be unable to decide whether the price quoted is optimal or not vis-à-vis the quality of water supplied. Adverse selection can act as a barrier to entry for new buyers and can also result in bad quality goods weeding out good quality goods over time. Second, when the data ecosystem is susceptible to tampering and institutional infrastructure does not have the necessary checks, balances, and penalty enforcement mechanisms, it can lead to the problem of moral hazard.14 The moral hazard problem occurs when entities participating in a trade transact in bad faith, provide misleading information, or change behavior post-contractual agreement. For instance, during a transaction, one of the parties can misrepresent the quality of the product and the other party is unable to validate the quality, thus promoting mistrust and perpetuating opaqueness in water markets. Third, the creation of monopolies of knowledge can lead to severe distribution effects.15 For instance, a large buyer of a water good, by virtue of access to more and better information, can affect the price and quantity of the water traded. Thus, such information asymmetries lead to market failures. Symmetric information exchange between buyers and sellers is a necessary condition for the creation of efficient water markets.
Low infrastructure and transaction cost
Development and maintenance of a water market come with associated costs. Infrastructure costs include: 1) Initial cost of setting up an enabling mechanism of water markets; 2) Development and deployment of water entitlements; 3) Connecting buyers and sellers; 4) Monitoring and evaluation of water use and externalities; and 5) Enforcement mechanisms for penalty and reward. Transaction costs include: 1) Participation fees; 2) Information search costs of willing buyers and sellers; 3) Negotiation and bargaining costs; 4) Cost of registration for an exchange; 5) Enforcing contracts; and 6) Cost of checking the veracity of the product. High infrastructure costs and associated maintenance costs act as a barrier to setting up a water market.16 High transaction costs can lead to thin markets.17
Stringent regulation and distribution of water entitlements
Regulators set the framework and rules for establishing a water market. They play a key role in identifying and vetting participants, issuing water rights, administering trade, monitoring and evaluating water use, and externalities; and developing enforcement mechanisms for deterring rule breakers. Regulation is subject to bureaucracy and corruption that can prevent water markets from functioning effectively. In a water market setting, if there are different rules for different participants, and if the buyers and sellers do not perceive equal opportunity gains from transactions, then a market failure can occur.18 A robust regulatory mechanism with necessary checks and balances is necessary for developing, implementing, managing, and sustaining a complex economic instrument such as a water market.
Water entitlements are tradable rights held by users for the exclusive use of a water resource as defined by the regulators. Clarity over water rights and a history of water assets are a necessary condition for the functioning of a water market. Information asymmetry and high transaction costs lead to significant market distortions in any market. Its effects are even more magnified when managing water assets in a market-based setting. A robust regulatory process along with a clear system of water rights is necessary to overcome these distortions in order to create a sustainable water market.
Blockchain Solution and Analysis
Traditionally, in a regulated market place, market distortions such as information asymmetry and high transaction costs are tackled through a system of institutional solutions such as: 1) The establishment of norms and standards that act as binding rules and requirements vis-à-vis processes and quality of the goods; 2) The disclosure and transparency mechanism that requires participants in a market to report process adopted, quality of product produced, cost associated, and so on; 3) The monitoring and traceability provisions that allow for tracking of products, quality, and liability allocation;19 and 4) Contingent contracts that allow for a trade to be completed when specific conditions are met.20 However, the effectiveness of these institutional solutions depends on several intermediaries, an individual’s ability to access these intermediaries, an ability to leverage the available data, and the integration of several disparate systems and stakeholders.21 In addition, these solutions are susceptible to inefficiencies, corruption, bureaucracy, human errors, and tampering.
In order to make these institutional solutions more resilient and adaptive, as well as make regulators more accountable, while also setting the conditions that would allow participants to trade, blockchain-based solutions can address these needs. These solutions can be used as a governing tool that can replace intermediaries, modernize the regulatory processes, and act as an accounting, auditing, interlinking and trading platform that enables water markets to function effectively.
Blockchain Technology
As of late, blockchain technology seems like a short-term trend, but some hail it as the best innovation since the internet. Even though the optimism should be handled with caution, blockchain’s key features and potential applications seem well worth the hype. Blockchain is a distributed, decentralized, peer-to-peer database network that allows for fast, secure, and transparent transactions of digital assets. It is a network of ledgers with the capacity to record information, and compute and transact, with each ledger holding an up-to-date copy of the entire network. Each ledger then acts as a node in a network. Unlike in a centralized system, where transactions are validated by a single server acting as a central authority, with blockchain, the veracity of transactions is validated by distributed consensus. For example, if a majority of nodes verify and authenticate a transaction, then the transaction is accepted. This updated version of the transaction is stored in a block. Each block stores a series of transactions and is linked to the previous block of transactions through hashing functions. Through cryptography and complex mathematical puzzles, the blockchain network is virtually immutable. Thus, it can be used to store information and facilitate transactions in a transparent, efficient, and a tamper-proof manner.22
Blockchain for Water Markets
Source: Narang, Shivika, Praphul Chandra, Shweta Jain, and Y. Narahari. "Foundations of Blockchain Technology for Industrial and Societal Applications – A Quarterly Publication of ACCS." A Quarterly Publication of ACCS. (2018). https://acc.digital/foundations-of-blockchain-technology-for-industrial-and-societal-applications/.
The capabilities of blockchain technology can be divided into three fundamental features. First is a shared ledger system that is virtually immutable through a combination of cryptography and distributed consensus algorithm. It protects against the misuse of data and opens up several possibilities in domains where privacy and trust are of critical importance. One of the obvious applications is in securing digital identities. This allows for the creation of a common tamper proof database that facilitates assembling data from multiple sources in a seamless manner. Its distributed consensus mechanism and inherent traceability provisions allow for checking the veracity of this data and validates data sharing. This promotes trust amongst different stakeholders and participants, increases transparency, improves data reliability and reduces audit time. This common tamper proof database facilitates accounting for trades and transfers, prevents double counting, and promotes efficiency in the system. The second feature is tokenization, which is the ability to create coins or tokens that are a digital representation of assets i.e. a unit of a token represents a specific amount of an asset. This paves a path for token economics and allows for faster transactions with better tracking, trading, and transferring of digital assets. The third feature is a “smart” contract, which is a digital protocol that self-executes when certain conditions are met.23 This allows disparate parties to transact in a transparent and trusted manner without a need for an external enforcement mechanism or intermediaries. It facilitates the compliance of participants, enforces negotiations of contracts, and renders transactions traceable. Smart contracts can help reduce transaction costs, human errors, and corruption through automation and thus increase the robustness and resilience of the system.
Figure 4: Mapping of blockchain features with digital water requirements
In a water market setting, the convergence of the three features of blockchain—a shared ledger to store information in an immutable fashion, the ability to create currencies that paves a path for token economics, and smart contracts to execute automated functions when certain conditions are met—makes it a useful tool to reduce information asymmetry and transaction cost. To illustrate this, consider the case of a blockchain based peer to peer trading platform called the Water Ledger developed by an Australian based company called Civic Ledger.24
Civic Ledger conducted a feasibility study on whether Water Ledger can increase transparency and improve efficiency in the water trading market of Murray Darling basin in Australia.25 The primary finding of the study was that the complexities of the water market, such as complicated business and operational rules, lack of available water information and presence of intermediaries, excluded nearly 75 percent of potential users from participating in water trades. Simply put, they did not have confidence and could not understand how these markets functioned.26 The Water Ledger platform developed by Civic Ledger provides a single ecosystem without intermediaries that bring buyers and sellers together. The water trading mechanism in Murray Darling Basin allows for buying and selling of water entitlements—permanent rights to share of water and water allocation shares—seasonal rights to share of water distributed to an entitlement holder.27 Through a system of tokenization i.e. by mapping a physical asset such as allowable water allocation shares to a digital signature in the form of a token, the Water Ledger platform provides clarity over the ownership and history of such a water asset. This makes tracking, trading, and transferring of water assets far more transparent. Through its system of consensus algorithms, Water Ledger verifies all water trades and updates all shared digital ledgers and public registries in real time.28 Having such a tamper-proof blockchain network with robust traceability provisions prevents misrepresentation of transactions, or participants from backing out of a trade after a contract is signed. This provides the participants with confidence in the robustness of such a trading system and tackles the problem of moral hazard.29 In addition to all trades being published in real time, business and operating rules are built into the blockchain system. This reduces uncertainties amongst participants. Any change in the rules of trade will immediately be visible to all users.30 Thus by allowing equal access to information and making all changes to the market rules visible to all, Civic Ledger provides a platform that promotes trust and transparency in the water market ecosystem. This, in turn, reduces the problem of adverse selection that participants face in a water market and prevents the creation of knowledge monopolies.
As demonstrated by Water Ledger, the intermediaries in a water market setting play a variety of roles. They manage operations such as connecting buyers and sellers, providing information, and registering trades. These intermediaries charge a fee to manage these operations. The Water Ledger platform allows buyers and sellers to come together in a single market place without any intermediaries and all information is provided at no cost to participants.31 This reduces the transaction cost and transaction time.32 The platform also integrates with other related departments’ data that determine a buyer’s need such as rainfall data and agricultural throughput. This provides buyers with a range of options optimized to their needs. This reduces information search cost. The process of trading is inexpensive and is simplified through a combination of smart contracts and optimized choices based on the selection of specific parameters that is presented to participants. Automatic execution, settlement, and enforcement of contracts based on complex water market rules eliminates costs associated with negotiating and enforcing trades. Finally, the platforms allow for trades to be published in multiple ledgers simultaneously, thus reducing the cost of maintaining and reconciling multiple ledgers.
Reduction of transaction cost and transaction time allows more users to participate as well as allows for more transactions to actualize. This improves the liquidity in the water trading market.33
Thus, blockchain can be used as an effective tool to eliminate market distortions and pave the way for “smart34” water markets to address the problem of water scarcity. Blockchain would act as: 1) An accounting platform that maintains a ledger of accurate tamper-proof information on water rights, quantity, quality, buyers and sellers; 2) An auditing platform that allows regulators to quantify water flows and quality and penalize rule violations; 3) A trading platform that connects buyers and sellers and facilitates transactions of water assets; and 4) A networking/interlinking platform that allows for seamless interaction among different agencies and stakeholders.
Thus, blockchain can be used as an effective tool to eliminate market distortions and pave the way for “smart” water markets to address the problem of water scarcity.
Challenges of Using Blockchain
Use of other technologies
There are several different types of databases that record digital transactions: version control software packages that keep track of every change made to a file, audit management packages to assist in continuous monitoring and scrutinization, trading tools to facilitate transactions, and accounting tools for book-keeping purposes. These individual tools offer specific features that can rival or supplant blockchain. It is possible that these tools are individually cost-effective and offer a faster execution speed. However, integration of multiple such tools to operate across different functionalities, as in the case of water markets, creates inherent complexities that can lead to inefficiencies and higher costs. As illustrated in the previous section, the blockchain database, through its decentralized shared ledger system, consensus algorithms to verify transactions, and tokenization to track assets and smart contracts, provides an integrated functionality of accounting, auditing, and trading and thus provides seamless integration while adding value across the ecosystem.
High energy consumption and increased transaction time
Blockchains are divided into public or private based on who is allowed to participate in the network. In public blockchains, anyone is allowed to participate without permission;in the consensus validation process, in sending transactions over the network, or in viewing all transactions. Thus, public blockchains offer true transparency and decentralization. Such a blockchain system works well in certain applications such as managing digital currencies. However, on the downside, public blockchains increase transaction time and reduce the network speed as there is significant cost vis-a-vis computational power and the time associated with verifying transactions through a such a distributed consensus protocol. As illustrated in the previous sections, blockchain does reduce costs related to data storage, data capture, and search cost. But it also increases costs significantly during the verification process. For public blockchain to function efficiently and to scale, significant computational power will be necessary to facilitate faster transactions. However, in a water market setting, selected participants are allowed to engage in trade while regulators play a role in deciding the rules of the trade. In such a setting, a private blockchain-based model with a permissioned access setting that puts a limit on the number of participants would be an ideal protocol to use. A system with limited players can reduce the inherent cost associated with using blockchain and thus facilitate faster transactions and provide better scalability options.35
Not truly decentralized
Use of a permissioned blockchain system does not eliminate the role of a central authority and thus is not truly decentralized. However, regulators and institutions play a significant role in the management of water markets. They set the rules of the water markets for participation, compliance, operation, and trading. They also continuously monitor water use, take into account water quantity and quality considerations, and observe externalities and third-party effects. All this in addition to developing a penalty and reward system to ensure compliance. In short, they play a role in preventing market failures. A permissioned blockchain protocol offers a way to make the regulators more accountable, make regulations more robust, and help reduce market distortions.
Exploring the Need for Water Markets in Los Angeles County and Bengaluru
Los Angeles County
The water management infrastructure in Los Angeles County, with the help of 215 community water systems, serves over 10 million people.36 Each of the community water systems is administered by government agencies or privately-owned bodies. The water systems are of different capacities in terms of the volume of water that they can hold and the number of customers they cater to. Each of the water systems is unequally supplied with different water resources. The supply of water to each of the water systems is not determined by need, equity, efficiency or the environment, but rather by historical processes. Different water systems are supplied with water from various sources (as seen in Figure 5) resulting in differences in quality. Also, by being dependent on a particular water resource, water systems are susceptible and vulnerable to shocks such as droughts or contamination. In addition, due to an unequal allocation mechanism, some water systems contain more water or less water than the other systems. This results in different pricing mechanisms for each system. There are some water systems that supply water at $2,000 per year for certain households whereas comparable households in other water systems pay around $200 per year.37
These water systems in Los Angeles County differ in governance regimes, jurisdictional boundaries, and regulations. They are completely decentralized in their management, fragmented in their architecture, and disconnected in their operations. The water systems act as a natural monopoly since consumers have no ability to switch to other suppliers. In addition, there is no systematic or standardized regulatory framework. There is a lack of standardized and accessible databases.38 This results in a lack of supervision, transparency, and accountability in the system, which can lead to an inadequate understanding of water quality and distribution. Governing agencies make assumptions on how to distribute water rather than adequately projecting for future demands and risks. There is also a lack of coordination and oversight as each of the suppliers set their own prices and policies.39
Developing a regional blockchain-based water market that provides a robust regulatory mechanism and an efficient trading platform can help: 1) Reduce inequity by facilitating water systems with surplus water to trade with systems that have a deficit; 2) Develop new revenue streams and local water sources by incentivizing water systems to explore opportunities to tap into new supplies such as rainwater, wastewater, and stormwater; 3) Improve resilience to climate change impacts by facilitating water systems to diversify its supplies; and 4) Creating incentives for water systems to recycle wastewater. 40
Bengaluru
The population of Bengaluru stands at over 10 million; similar in size to that of Los Angeles County.41 However, unlike Los Angeles County, the major supplier of fresh water is a centralized governmental agency called the Bengaluru Water Supply and Sewerage Board (BWSSB). The BWSSB primarily imports water from a single source, the Kaveri river.42 With growing demand and a changing climate, reliance on a single source will make the water system infrastructure vulnerable. The distribution of water by BWSSB is based on a piped water network. There is inter-regional inequity in water distribution as a significant number of urban communities in Bengaluru is not connected to a piped water supply managed by BWSSB.43 Instead, they rely on water supplied by unregulated private companies. These private companies typically extract and sell groundwater.44 Since they can operate under an informal market setting, there is no systematic reporting or regulatory framework to hold them accountable for the quality of water that they supply or the environmental impacts (like falling water tables) that they inflict. In the areas where BWSSB supplies water, the tariffs are low. Such an inefficient pricing model leads to apathy and lack of awareness amongst consumers resulting in overuse and wastage.
In order to reduce the dependence on a single source, there is a need to diversify BWSSB’s water resource portfolio. Thus, there is an opportunity to develop recycled wastewater, catchment and household-scale rainwater, and stormwater as supplementary sources. Financial considerations and management inefficiencies are usually an impediment to developing new local sources. But developing a blockchain-based smart water market that provides a robust accounting, auditing, and trading platform to manage these local sources will bring in new revenue streams, provide access to newer and cheaper water supply options to consumers, improve allocation efficiency, and reduce risk exposure vis-à-vis imported water. These market-based instruments for local water sources can be expanded to include private companies who manage groundwater, thus formalizing the informal water market.
Policy Implications: Beyond Water Markets
Creation of a prosumer market
In light of current water scarcity problems, alternate sources are being tapped to address water needs. Rainwater harvesting and wastewater reuse are popular alternatives. A blockchain-based system can be used to create peer-to-peer trading platforms, where water users can be incentivized to also act as producers. This lays a foundation for a prosumer market, i.e. production by consumers. Development of a prosumer market reduces dependence on surface and groundwater, incentivizes consumers to use less water thereby assisting in conservation, and creates a socially, economically, and environmentally conscious citizenry.
Monitoring water quality levels
A blockchain system can be built to acquire water quality data from quality measurement equipment and can be used by authorities to monitor the levels of water purity in the distribution system. Through smart contracts, an automatic system can be developed to send alerts to relevant authorities and citizens if water quality level falls below permissible limits. Such a mechanism can help to avoid a crisis related to water quality as seen in Flint, Michigan in the United States where there was an unprecedented level of lead in water.
Facilitation of urban-basin interlinkage
The blockchain system can also be integrated with water meters installed at basins to facilitate seamless information transfer to urban water systems. This can help authorities to better design demand and supply models, assess risks and opportunities, and develop a robust real-time disaster response mechanism.
Future Research
The future work will focus on the economic implications of a blockchain-based water market on society. To illustrate this a bit further, one of the key findings of this paper is that using blockchain as an underlying technology to manage water markets reduces market distortions due to information asymmetry. An interesting question that this finding unlocks is how will a water market operate when buyers and sellers have access to perfect information? Based on the “market for lemons” concept,45 when perfect information is available to buyers regarding different grades of quality of goods that are available, over time poor quality goods will be weeded out due to perfect signaling. This can result in either fewer sellers participating in such a market or fewer products albeit higher quality ones available to meet the demand. In a blockchain-based water market context, with fewer goods available, the price of high quality water goods will increase substantially. Such a scenario can lead to the creation of an exclusive market with only a few participants who are able to afford the products. In addition, sellers of poorer quality water goods will have an incentive to move to a non-blockchain-based market, which will result in market segmentation. Thus, the future work will focus on whether a blockchain based water market will increase or decrease the welfare in society.
Conclusion
Water resources are finite and are becoming increasingly scarce in light of natural and anthropogenic stressors such as extreme weather phenomena, population explosion, rapid urbanization, and consumerism. Regulators who manage water are faced with challenges such as inefficiencies in water allocation, apathy amongst consumers, overexploitation of water resources, and pollution.
Water markets are cited as a solution to address the problem of water scarcity and its associated problems. They are instruments that are used to dynamically allocate water-related goods efficiently. However, water markets are a complex economic instrument to implement, manage and sustain as they are susceptible to market distortions especially due to information asymmetry and high transaction cost. A robust regulatory mechanism is necessary to prevent these market distortions. The research paper makes a case for a blockchain-based system to be used by regulators as an accounting, auditing, trading and an interlinking tool to reduce information asymmetry and transaction costs. This paper also explores the potential of a blockchain-based water market to address the inequitable distribution of water in the community water systems of Los Angeles County; and, the underdeveloped local water sources and unregulated private players in Bengaluru.
A blockchain-based smart water market will be able to effectively allocate water resources.
A blockchain-based smart water market will be able to effectively allocate water resources; empower consumers by providing economic and social value, and incentivize conservation and provide positive environmental outcomes. Thus, it will act as an effective policy instrument to reduce water scarcity.
Citations
- The Global Risks Report 2018 13th Edition, [Geneva: World Economic Forum,2018] source.
- The United Nations World Water Development Report 2018: Nature-Based Solutions for Water, [Paris: WWAP (United Nations World Water Assessment Programme) /UN-Water, 2018, UNESCO] source.
- Martina Flörke, Christof Schneider, and Robert I. McDonald, "Water competition between cities and agriculture driven by climate change and urban growth," Nature Sustainability 1, no. 1 (2018): 51.
- Peter H. Gleick, "Global freshwater resources: soft-path solutions for the 21st century," Science 302, no. 5650 (2003): 1524-1528.
- Ibid.
- Negative externalities are costs that impact a party that does not have a role in its creation. For instance, vehicular pollution generated by a specific individual affecting people nearby. Negative externalities cause market failures.
- Collection action problem occurs when individuals pursuing a common goal do not cooperate due to competing interests.
- Free rider issues occur when individuals who do not pay for a good or service reap its benefit. Too many free riders results in over-exploitation or under-production of the good or service.
- Richard E. Howitt, Richard E. and Kristiana Hansen, "The Evolving Western Water Markets," Choices 20, no. 316-2016-6565 (2005): 59.
- Guy Le MoigneShawki Barghouti, Gershon Feder, Lisa Garbus, and Mei Xie, "Country experiences with water resources management," World Bank Technical Paper 175 (1992).
- Ereney Hadjigeorgalis, "A Place for Water Markets: Performance and Challenges," Review of Agricultural Economics 31, no. 1 (2009): 50-67.
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- C. Wilson, Adverse Selection, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics, Palgrave Macmillan, 2008]
- Y. Kotowitz, Moral Hazard, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- J.O. Ledyard, Market Failure, In: Palgrave Macmillan (eds)[London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- David S. Brookshire, Bonnie Colby, Mary Ewers, and Philip T. Ganderton, "Market Prices for Water in the Semiarid West of the United States," Water Resources Research 40, no. 9 (2004).
- John Freebairn and John Quiggin, "Water rights for variable supplies," Australian Journal of Agricultural and Resource Economics 50, no. 3 (2006): 295-312.
- A. Dinar, M. Rosegrant, R. Meinzen-Dick, "Water allocation mechanisms: Principles and examples," The World Bank Policy Research Working Paper 1779 (June 1997).
- Jill E. Hobbs, "Information asymmetry and the role of traceability systems," Agribusiness: An International Journal 20, no. 4 (2004): 397-415.
- Max H. Bazerman and James J. Gillespie, "Betting on the future: The virtues of contingent contracts," Harvard Business Review 77 (1999): 155-162.
- Stefaan G. Verhulst, "Information Asymmetries, Blockchain Technologies, and Social Change," Medium, July 24, 2018, source.
- Sloane Brakeville, and Bhargav Perepa, "Blockchain Basics: Introduction to Distributed Ledgers," IBM Developer, March 18, 2018, accessed April 14, 2019, source.
- Nigel Gopie, "What Are Smart Contracts on Blockchain?" Blockchain Pulse: IBM Blockchain Blog, July 02, 2018, source.
- "Civic Use Cases," Helping Governments to Be More Accessible, Efficient and Effective. source.
- "Civic Ledger Pty Ltd.," Australian Water Partnership. source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "Water Markets and Trade," Australian Government – Murray-Darling Basin Authority, Sept. 29, 2015. source.
- "About Water Ledger," How Water Ledger Works, source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "About Water Ledger," How Water Ledger Works, source.
- Ibid.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management. September 2018.
- Ibid.
- The term “smart” in this context indicates the use of internet of things, big data, predictive analytics integrated over blockchain network as underlying technologies to facilitate the operations of a water market.
- Jayachandran Praveen, “The Difference between Public and Private Blockchain," Blockchain Pulse: IBM Blockchain Blog, Aug. 06, 2018, source.
- J.R. DeShazo, Gregory Pierce, and Henry McCann, “Los Angeles County Community Water Systems Atlas and Policy Guide: Supply Vulnerabilities, At-Risk Populations, Conservation Opportunities, Pricing Policies, and Customer Assistance Programs,” UCLA: Luskin Center for Innovation, (2015), source; U.S. Census Bureau Quick Facts: Los Angeles County, California," Census Bureau Quick Facts, July 1, 2017, source.
- S. Pincetl et al., “Water Management in Los Angeles County: a Research Report,” Los Angeles: UCLA, Institute of Environment and Sustainability, 2015, source
- Ibid.
- Ibid.
- J.R. DeShazo and Gregory Pierce, "Quantifying the Benefits and Designing Governance Structures for a Water Market in Los Angeles County," [Los Angeles: UCLA, Luskin Center for Innovation, Oct. 2016] source
- Bengaluru Water Board, “Blueprint for Future,” source.
- Bangalore Water Supply and Sewerage Board, "About BWSSB," Bangalore Water Supply and Sewerage Board. source.
- Bengaluru Water Board, “Blueprint for Future," source.
- Malini Ranganathan, "'Mafias' in the waterscape: Urban informality and everyday public authority in Bangalore," Water Alternatives 7, no. 1 (2014).
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
Civilian Drones: Privacy Challenges and Potential Resolution (Ananth Padmanabhan)
Ananth Padmanabhan is a New America India-U.S. Fellow, 2019 and a Fellow at the Centre for Policy Research in New Delhi.
Acknowledgements: The author extends heartfelt gratitude to Peter Singer, Arthur Holland Michel, Rachel Stohl, Anand Murali, John Livingstone, Mugilan T. Ramasamy, and Anirudh Rastogi for sharing their insights.
Introduction
From being a technology used predominantly by the military for years, unmanned aerial vehicles (hereinafter referred to interchangeably as UAV, UAS, or drones) have gradually moved into the public sphere by offering versatile civilian uses. This is due to converging technological advances such as hardware miniaturization, sophisticated software functionalities, and advanced sensors.46 While several countries have seen this explosion of drone innovation in the civilian airspace, China stands out with the dominance of Da-Jiang Innovations (DJI) as the market leader.47 The United States has seen the rise and fall of many drone start-ups, alongside a realization on the part of leading aircraft manufacturers about the immense potential of the technology.48 U.S. dominance in adjacent fields – artificial intelligence, robotics, and 3-D printing, to list some here – is significant, making it a force to contend with in this sector. India has primarily witnessed the proliferation of drone service companies that offer solutions across a range of areas, from agriculture to event photography. But Indian companies have not yet made a mark globally when it comes to the manufacture of drones or supporting hardware elements.49 In short, the innovation landscape and relative strengths and weaknesses are significantly varied across countries.
In short, the innovation landscape and relative strengths and weaknesses are significantly varied across countries.
The regulatory landscape is similarly incongruent across jurisdictions.50 In an earlier report, I examined this issue, comparing the regulatory responses across key jurisdictions to the civilian use of this technology.51 This work arose in the context of India’s initial regulatory responses, wherein the Ministry of Civil Aviation (MCA) first declared, in 2014, a complete ban on civilian drone operations and followed by a set of draft regulations that failed to support the full potential of this technology when it came to commercial uses. As that report argued, the fledgling industry could be permanently crippled under the weight of security apprehensions that permeated that set of draft regulations. At the same time, the draft had not considered several aspects of drone operations that demanded regulatory attention, including property protections and safety concerns. It was thus both over- and under-inclusive. But in an optimistic turn, the new regulations that came into effect in December 2018 took a more progressive stance, earning a dial-down of some of the earlier criticisms.52
The newest set of regulations take seriously the challenges of compliance arising from a licensing regime. They propose a reg-tech (regulatory technology) solution to these challenges, namely Digital Sky, which operates as a platform for convenient filing of paperwork to obtain unique identification numbers and operators’ permits.53 These identification numbers and permits are a prerequisite for most remotely piloted aircraft (RPA) operations under the regulations. Appropriately titled Regulations 1.0, these regulations also present a window for future innovation in this sector, including testbed locations for experimental projects.54 Though delivery drones may presently appear a distant use case, considering all operations must have a remote pilot operator for each RPA and be within visual-line-of-sight (VLOS), there is a distinct possibility that the sector would expand with time to accommodate fully autonomous, self-controlling drones that operate without the presence of any manual operator and beyond VLOS.55 The safety of drone operations has also merited significant attention, including insistence on geo-fencing technological capabilities beyond a certain height and for most weight categories, and the requirement of drone operator insurance to compensate for any losses incurred because of commercial operations.56
However, despite privacy (of individuals, communities, and personal data) being a critical concern, solutions have not found a place in the regulatory narrative even as civilian use grows. Drone operators have also flagged concerns regarding confidentiality of their operations but those are outside the scope of this paper. Here, the focus is on end-user concerns, with the argument being advanced that the challenges in this regard are common to the United States and India. These challenges can be further subdivided into two sets, categorized here as “traditional privacy challenges” and “big data privacy challenges.” These challenges are explained more fully in the next section. On both counts, legal and regulatory responses have been far from satisfactory. The aim of this paper is threefold: descriptive for clearly identifying these challenges; explanatory for demonstrating why they remain unresolved; and reformative to advance better regulation in this area.
The discussion proceeds in three segments. The first segment captures the present regulatory landscape in India on this issue and argues that privacy concerns have been mostly ignored or at least unaddressed in any meaningful way. The second segment discusses “traditional privacy challenges” and the limitations of the law, including constitutionally guaranteed rights when it comes to civilian drones and possible high-level responses. The third segment discusses “big data privacy challenges,” current legal and regulatory limitations, and possible high-level strategies and responses. A short conclusion follows.
The Privacy Challenge and Broad Regulatory Brushstrokes
The present Indian regulations only require that RPA operators be “liable to ensure that privacy norms of any entity are not compromised in any manner,” with nothing more by way of guidance on achieving this outcome.57 The RPAS Guidance Manual accompanying these regulations, issued by the Directorate General of Civil Aviation (DGCA), simply restates this liability.58 Additionally, no technological requirements have found mention in the regulations, unlike with safety concerns through the presence of geo-fencing and detect-and-avoid systems. A supplementary document accompanying the regulations places full responsibility on the RPA operator to come up with standard operating procedures (SOP), including to protect the privacy of persons, without any baseline that such SOP must meet in this regard.59
Public documents on the Digital Sky project do not consider privacy an important enough concern to be addressed through this reg-tech solution. The public tender for this digital platform contains Annexure No. 8, which outlines its technology architecture. It merely states that the “privacy of data should be fundamental in the design of the system without sacrificing the utility of the state procurement system” and reiterates that the handling of sensitive and critical data must not remain an afterthought in a system of this scale. It also references the IndiaStack – a system of Application Programming Interfaces built on top of India’s centralized digital identities database, Aadhaar – as a model stack with privacy-protected data sharing.60 This reference disregards the fact that the kind of data gathering and processing that is facilitated by drones is far removed from the use cases of personal data processing that IndiaStack can potentially resolve.
The vision for Digital Sky – no permission, no take-off (NPNT) – envisages setting “rights for airspace permission access at a fine-tuned level (for example, the ability to choose a polygon area of airspace at a particular altitude and for a particular date and time) and … enforced digitally through … generation of verifiable flight telemetry.”61 The DGCA will grant a “permission artefact” in the form of a digitally signed XML format file that specifies the geographic area and time of operations, and the identification details of the remote pilot. The RPAs are meant to carry firmware that can authenticate these artefacts and confirm that the flight parameters of the mission match those contained in the artefact. Thus, to be NPNT compliant, any flight module must carry three important features: a unique identifier to allow the end-to-end traceability of a flight module, a system to obtain and verify a permission artefact, and the elimination of any synthetic flight logs or external systems to provide simulated logs.62
Compared with these elaborate specifications for regulatory compliance, the Digital Sky Technology Standards go easy on privacy concerns. The primary response is through an articulation of “privacy-by-design (PbD).” This is included as a guiding design principle in the Standards, with its four key features being: a) proactive, not reactive, and preventative, not remedial; b) privacy as the default setting; c) visibility and transparency; and d) respect for privacy, of all stakeholders.63 But there is no concrete direction, unlike with aspects such as key management and identification of registered flight modules that find more extensive detailing in the Standards. More recently, the MCA issued a Drone Ecosystem Policy Roadmap, where it is reiterated that “for privacy, we require manufacturers to adhere to a privacy by design standard, eliminating risks of future privacy harms by operators.” Though not a legally binding document, the roadmap captures the MCA’s vision for civilian drone businesses and their regulation through Digital Sky and other means. Discussing fully autonomous drone operations, an area identified as the next frontier of innovation in this technology domain, the roadmap merely notes that “use of algorithms for piloting may be permitted, but only if adequate safety, security and privacy principles are demonstrated in the design of operations.”64 PbD is identified as an area to which airworthiness standards for drone design could potentially extend, such that privacy principles can be “embedded into the functional design … by introducing technical measures that enable privacy as the default setting.”65 In addition to these recommendations, the roadmap also envisages drone service providers including “technical and organizational measures designed to implement data-protection principles as part of any UAS operation that collects personal data, and to integrate the necessary safeguards to protect the rights of data principals” and “feedback and review mechanisms including requests to access, anonymize, or erase the data of the data principal.” Remote pilot operators are also expected to be trained in applicable privacy and data protection laws of India before being approved to handle RPA operations.66
The reference to PbD in the standards and roadmap is also relevant because India’s newly proposed Personal Data Protection Bill, 2018 emphasizes reliance on this concept. This bill resulted from extensive deliberations by an Expert Committee of the Ministry of Electronics and Information Technology headed by retired Justice B.N. Srikrishna (hereafter “Srikrishna Committee”). In relevant part, it states that data fiduciaries shall implement managerial and organizational policies, business practices, and technical systems that anticipate, identify, and avoid harm to the data principal and ensure that the interests of the data principle is accounted for at every stage of personal data processing.67 This provision must be read in the light of deliberations by the Srikrishna Committee leading up to this bill, captured in an initial white paper that was circulated for public comments in November 2017. Here the committee has noted difficulties when operationalizing the notice and consent framework for the internet of things (IoT) and IoT-enabled applications that gather data ubiquitously. These technologies do not present individuals with the opportunity to evaluate privacy harms associated with specific use cases, and based on such evaluations, to either accept or reject such instances and applications of personal data collection and processing. Manufacturers of several “smart devices” used at homes and in personal settings decouple privacy notices from such devices and make them available instead on their respective websites. However, the Committee observed that this is not a very effective method to inform users about the data collection and use practices of such devices. The Committee therefore insisted upon the need to develop better notice design or whether such notices are the right solution for the privacy harms arising from the use of these “smart devices.” The Committee also noted that standard responses such as de-identification techniques do not work very well in many such cases. As an example, the white paper cited gait analysis based on data processing by a wearable activity tracker, where no amount of possible de-identification could secure foolproof privacy protection.68
At present, there are no straightforward responses to the new kinds of privacy challenges posed by a combination of ubiquitous data gathering and advanced data analytics. Drone operations can potentially gather significant amounts of personal data, including facial images and location coordinates of individuals, and analyze them to granular detail. These activities pose great risk to both individual and community privacy, including re-identification of anonymized datasets and extensive profiling. The “big data privacy challenges” arising from these activities are discussed in Part III of this paper. Additionally, civilian drones offer the capability to commit more traditional forms of privacy violations, including intrusions upon spatial privacy and unlawful surveillance. The present regulatory response in India needs to evolve to address these concerns in a stronger way, as detailed in the following section.
Traditional Privacy Challenges and Responses
In the U.S., the Electronic Privacy Information Center (EPIC, a non-profit research center) petitioned the Federal Aviation Administration during the rule-making process for civilian UAS operations, providing an overview of traditional privacy challenges.69 EPIC highlighted the increased capacity for domestic surveillance offered by drones through high-definition cameras, real-time video streams, a massive geographical sweep, heat and motion sensors, automated text and facial recognition technologies, and the ability to operate undetected. It also raised concerns regarding incentives for various kinds of businesses to develop and deploy drones for a wide range of data gathering purposes, including ‘paparazzi drones’ to track and photograph celebrities, street-level drones to enhance satellite imagery, and drones offered as market solutions for private detectives. The FAA refused to consider these issues, leaving it to states to respond appropriately to the various privacy concerns, resulting in a “patchwork” of privacy protection.70 The FAA reaffirmed this stance in February, 2019, as part of a fresh rule-making exercise.71
Similarly, in the Indian context, the privacy jurisprudence does not offer clear principles to adjudicate claims against private violators. The primary reason for this – disproportionate focus on constitutional principles that are better addressed to tackle privacy violations by the State, rather than the organic evolution of privacy through tort law (as has happened in the United States) – and other reasons, such as a weak civil justice system with long-pending cases and minimal judicial guidance on evaluating and apportioning damages for tortious claims, have been elaborated in my earlier report.72
The “patchwork” in the U.S., which is comprised of not only state laws but also a wide range of local ordinances, makes it difficult to pinpoint any legislation as the ideal. At the same time, certain principles and regulatory approaches stand out. Commonly restricted conduct includes operations over public property and critical infrastructure; over private property without the owner’s consent; in parks; and at large events.73 Criminal law and high monetary penalties are relied upon to address intrusive behavior that makes use of drones, with the ability to factor in the intent of the perpetrator when deciding on questions of guilt and punishment. For instance, North Carolina prohibits using drones to photograph a person with the intent to publish or distribute the photo, but exempts “newsgathering, newsworthy events, or events or places to which the general public is invited.” Similarly, Arkansas law criminalizes the use of drones for video voyeurism, Indiana addresses “remote aerial harassment” and “remote aerial voyeurism,” and the Californian legislation is targeted towards individuals who knowingly enter air columns immediately above private property for taking pictures or videos. South Dakota prohibits using a drone with a camera to take photos of private property or a person on private property when the person has a reasonable expectation of privacy.74
Through all of these examples, an attempt to balance multiple values emerges: the prospect of innovation using this new technology, the reasonable expectation of privacy in certain settings, and fairness of criminal action. The American Legislative Exchange Council has put out an easily comprehensible and consistent model law in this regard, primarily focusing on harassment and stalking activities that are met with criminal penalties of the same nature as “a misdemeanor punishable by imprisonment for not more than 90 days or a fine of not more than $500.00, or both.” The model law also proposes penalizing the knowing and intentional operation of drones to “capture photographs, video, or audio recordings of an individual in a manner that invades the individual’s reasonable expectation of privacy.”75 Indian lawmakers could benefit from these insights while avoiding the patchwork in the US, intervening at this early stage to come out with drone legislation that sets the balance between criminal offenses and civil liabilities, and clearly spells out different kinds of conduct to which they apply.
The Indian legal system has also not been responsive to mass surveillance, partly because, for several years, the status of privacy as a fundamental right in India was ambivalent at best. But also, mass surveillance has not run into effective legal and constitutional challenges because Indian courts have analyzed State surveillance within the factual context of individual, rather than systemic, surveillance. In fact, many of the contested instances involve individuals who found their way into “history sheets” maintained by the police for reasons justifiable or otherwise. Upon constitutional challenges against police action, the Supreme Court has balanced out individual rights with social goals, such as maintenance of public order, often prioritizing the latter. Even in cases that apparently address systemic flaws, such as unauthorized telephone tapping, the technical capabilities of the executive and the intent behind the contested State action were both limited towards a subset of individuals. Therefore, the court laid down procedural and substantive restrictions on the authority of the State to carry out surveillance, which would operate on a case-by-case basis. The court’s detailed directives against telephone tapping demanded specificity of State action in the communications and persons and addresses intercepted; the exhausting of alternate and less intrusive ways to acquire the information before activating interception; or the limiting of intercepted material to the necessary minimum. However, these directives are not adequate safeguards against mass surveillance as they fail to conduct a robust review of the technology architecture in place to gather and process data.76
Shifting from this context to one of mass surveillance where technical capabilities permit non-targeted gathering and processing of data without further action from the political executive has been a steep learning curve for the Apex court. The 2018 verdict in Justice Puttaswamy v. Union of India shows the challenges when adjudicating the legality of such measures.77 This case involved an omnibus constitutional challenge to Aadhaar, India’s biometric identities project aimed primarily at de-duplication of identities to ensure that welfare benefits from the State reach their rightful beneficiaries. Among the various grounds of the challenge was a novel one that attacked the excessive seeding of Aadhaar numbers in multiple databases, such as a pension, education, banking, and telecom databases. The petitioners argued that this exercise would, in effect, present the State with a mass surveillance tool. Additionally, they also pointed out that various state resident data hubs (SRDHs) helped to offer a 360-degree view of residents, as publicly acknowledged by the State governments – Haryana, Andhra Pradesh, Tamil Nadu, Madhya Pradesh, and others – instituting them. These SRDHs used the Aadhaar identity as their foundation without incorporating the protections under the Aadhaar Act in respect to data security or privacy. Thus, the SRDHs made it evident that the aggregation of data from different silos, profiling, and consequential surveillance of residents was no longer in the realm of conjecture; it had become reality. The Aadhaar numbers made finding information much more convenient by serving as a unifying link across various government departments and between their respective databases.
To articulate this threat in legal terms, the petitioners relied on important decisions of the European Court of Justice that treated mass surveillance as a separate category when up for judicial review. These cases focused on the structural and architectural aspects of the respective surveillance programs. But the Indian Supreme Court followed a more conservative approach, narrowly balancing immediate individual harms and long-standing social goals rather than assessing medium and long-term consequences of such unified databases. While the majority opinion suggested several quick fixes for any immediate harms from the workings of Aadhaar, they hardly addressed the long-term consequences of SRDHs and other potential applications of Aadhaar for big data analytics and profiling. In fact, the majority did not even reference SRDHs despite the petitioners pointing out that, when combined with multiple databases, the view that Aadhaar offered on citizens could be extremely invasive. The majority observed that the averment of “a surveillance state created by the Aadhaar project is not well founded, and in any case, is taken care of by the diffluence exercise carried out with the striking down certain offending provisions in their present form.”78
For reasons best known to the State, it extensively relied during the hearing on a powerpoint presentation by the Chief Executive Officer of the Unique Identification Authority of India (UIDAI). This presentation mostly focused on the security architecture in place to prevent data leaks and did not address the surveillance threat or refer to the SRDHs. Yet, the majority verdict endorsed these claims that were, at best, irrelevant to the surveillance challenge. This is particularly disconcerting because secure systems can simultaneously be extremely sophisticated surveillance machines. Instead, the majority would have done well to follow the various European court decisions that consistently opposed state-of-the-art mass surveillance architectures because their long-term consequences, while not fully ascertainable, made them even more worrisome and intrusive. All this goes to establish the case here that Indian courts have an extremely limited vocabulary to address questions of mass surveillance. Because of the widespread use of civilian drones in governance is a distinct possibility, it is important that such vocabulary be developed immediately in order to address concerns that are more architectural in nature. Digital Sky or enhanced security systems cannot substitute the need for the same as their primary focus is on ease of regulatory compliance and safety of drone operations.
The court could look to the “chilling effects” doctrine as developed by U.S. courts as a possible solution here. It has, in fact, done so previously in a different setting. In Shreya Singhal v. Union of India,79 a case dealing with free speech, the police had invoked section 66-A of the Information Technology Act, 2000 against some Facebook users for expressing their displeasure at a city-wide shutdown in Mumbai in the wake of Shiv Sena supremo Bal Thackeray’s death. Striking down this provision as being unconstitutional for its chilling effects on the freedom of speech and expression, the court opened doors to the possibility of evaluating structural power imbalances brought on by vaguely-worded criminal offenses. Chilling effects can occur when a citizen apprehends that the State is watching their activities and alters their behavior based on this belief. While immediate criminal consequences may not necessarily follow, the mere existence of vague and overreaching criminal liabilities could restrain individuals from expressing themselves due to the fear of such consequences. As the court reasoned, “Section 66-A is cast so wide that virtually any opinion on any subject would be covered by it, as any serious opinion dissenting with the mores of the day would be caught within its net. Such is the reach of this section and if it is to withstand the test of constitutionality, the chilling effect on free speech would be total.”80
While this doctrine is not a perfect mechanism to scope out the limits of state authority when undertaking mass surveillance, and can even be a conversation-stopper in this context, the verdict in Shreya Singhal demonstrates the need to evaluate possible long-term consequences of state action. To do so, the judiciary must go beyond immediate cases of rights infractions to a critical scrutiny of the architecture of data collection put in place, be it legal or technological. This is not a point limited to rights reviews. Even cases involving the dilution of judicial independence through the formation of tribunals, for instance, demand a similar outlook – as do instances such as circumventing legislative scrutiny through frequent resort to executive ordinances. In all these situations, the State’s usual defense – that the scope for abuse is not grounds for striking down an executive or legislative action – is weakened. These are all architectural questions, ones that have a bearing on even the basic structure of the Constitution, but not in the same way that surveillance orders against repeat offenders or individual instances of telephone tapping impinge on individual rights.
Big Data Privacy Challenges and Some Responses
Besides their low-altitude operations, with direct spatial privacy and surveillance concerns, drones also gather considerable amount of data. Drone platforms – often consisting of in-flight software to help command the aircraft, high-resolution Light Detection and Ranging (LiDAR) imagery solutions, digital orthomosaic technology to stitch together varied images and present a composite picture, photogrammetry to calculate distance and volume measurements, and data analytics solutions – offer critical actionable insights to several industries today. This capability has resulted in business models where such platforms are offered as services.81 In addition to the new kinds of sensors and data that drones can gather, they also transmit the standard types of data that any internet-of-things solution can potentially channel to a central server— – mobile phone data, radio frequency identification data, location, weather and temperature data.
A significant part of such data would fall within the legal definition of sensitive personal information. No special case needs to be made here for the privacy risks associated with such data, evident as they are from the strict legal mandate that prior written consent of the data-holder is required to collect and process the same Apart from the stand-alone risks of such data in the hands of private entities, these pieces of data are often combined with personal data categories – social media behavior, biometric information, financial data – gathered from other sources, to heighten the risk.82 These “big data privacy challenges” are however less obvious as compared with risks highlighted in the previous section, and we remain relatively underinformed about them even in settings outside of the civilian drone context.
Often, the challenges there are not with the gathering of data, but rather with how it is processed and the associated risks. As digital activities grow exponentially, so do the electronic tracks left behind by individuals. The semantic web and other data analytic solutions permit such crumbs to be aggregated by intelligent machines and algorithms to provide a comprehensive picture of an individual’s preferences, personality traits, and values, as well as predict her next move and suggest specific, relevant choices. Yet such practices run the risk of being reductive, incomplete, and often divorced from the context in which the data was originally gathered.83 Because of the efficiency involved in algorithmic perception, prediction, and suggestion, and the recombinant nature of data, private actor incentives are aligned towards the unhindered amassing and processing of huge swaths of personal data, often for purposes unidentifiable at the time of the original transaction or data exchange. As noted by the Indian Supreme Court, these privacy invasions often go undetected because of the non-rivalrous and invisible nature of data access, storage, and transfer.84
Unstructured streaming data presents new challenges for state-of-the-art anonymization strategies developed to deal with static, structured, and well-defined datasets.85 Re-identification techniques have evolved in parallel, combining multiple Personally Identifiable Information (PII)-excluded databases to arrive at near identical results as those emerging from the processing of a PII-inclusive database.86 The newly created database can then be linked with other databases, even PII-excluded ones, to compromise anonymity. These techniques present a cautionary tale: against the ubiquity of “data fingerprints” left by individuals, and the excessive linking of multiple databases, PII protection can do much less than before. Therefore, the legal mandate on big data handlers must go beyond anonymization and de-identification strategies that exclude PII.
Finally, much like the issue with surveillance identified in the previous section , i.e. refocusing attention from targeted to mass surveillance, big data processing demands refocusing attention from individual to group privacy and the simultaneous development of policy positions on handling community data. Individuals, while not personally identifiable in many such cases, may still be “reachable” on account of being within a group targeted for prejudicial action based on data-driven inference and prediction.87 To illustrate, individuals practicing a certain faith can be targeted either by identifying them individually or through a larger group consisting of several individuals practicing this faith. In the latter scenario, while the individual remains unidentified, she is vulnerable to any action taken against the group. Often, individuals are even unaware of such memberships because the aggregated datasets and groups emerging therefrom do not perfectly align with pre-existing real-world groupings, constructed as they are by algorithmic black boxes.88 The excessive linking of multiple datasets also enables group profiling without any personally identifiable information being breached.89 Of particular concern is the possibility of constructing “demographically identifiable information,” which then enables the classification, identification, and/or tracking of a specific categorization based on ethnicity, religion, gender, age, health condition, location, or any other demographically defining factor.90 Though aware of these risks, the Srikrishna Committee did not propose any immediate solutions for community data protection, perhaps because it did not strictly fall within its mandate.91 Noting the need for a “principled basis for according protection to an identifiable community,” “class action remedies for certain kinds of data breaches involving community data,” and “tools like group communication and sanction,” the Committee strongly recommended that the Government of India address them through appropriate legislation.92
Many of the solutions to these threats are within the ambit of personal data protection and regulations thereof, but it is unclear how effective they could be in balancing the multiple values at stake. With new modes of gathering and processing data, such as internet-of-things and remote cloud servers, privacy notices that are predominantly available on websites and mobile apps are fast losing their relevance.93 The pervasiveness of digital technologies and applications has also resulted in “consent fatigue” due to the increasingly large number of requests for consent and the disproportionate time required to meaningfully assess such requests by the user on a routine basis.94 Meaningful consent is further vitiated by a substantial number of companies adopting a “take it or leave it” approach to privacy notices, with no room for negotiation.95 Privacy notices also often suffer from verbosity and dense legalese.96 Moreover, the draft bill proposed by the Srikrishna Committee does not address many situations where it is difficult to register consent because of technological or interface limitations. Consequently, the notice-and-consent foundations of this bill can diminish the flexibility needed for new data technologies to scale and grow.97
Therefore, solutions on offer at present, especially the idea of privacy self-management, need to be customized to the specific context of civilian drone use. Here, responses could include integrating a notice dashboard as part of Digital Sky. The public then can access information about the geographic locations and purposes served by drone operations, the sensing and data gathering technologies onboard the unmanned system, the kinds of data potentially captured, and technical specifications relating to the granularity and accuracy of the data collected and processed, from such dashboard. By providing this option, the DGCA can effectively compel drone operators to carry out privacy impact assessments and publicize them before undertaking such operations. Data minimization can also be achieved because these assessments and disclosures make it possible to evaluate whether the data operations are proportionate with the stated purposes, thereby disincentivizing drone operators to gather or process disproportionate amounts or types of data.98 Many of these recommendations are reflected in a set of voluntary best practices that the National Telecommunications and Information Administration (NTIA) released in 2016.99
Concluding Remarks
The traditional privacy challenges raised by drone technology – fitting drones with devices that can capture personal and private information at very close range, using the technology for mass surveillance, causing discomfort to human beings through their intrusive nature – are concerns totally ignored by the present regulatory response in India, except to place liability on drone operators for any such harms. Criminal law responses similar to those present in many of the state legislations in the U.S. need to be introduced to penalize rogue actors with wrongful intent to intrude upon privacy. In parallel, strengthening the civil tort of privacy through clear delineation of principles for quantification of damages, and the constitutional tort of privacy through appropriate legal standards to restrain mass surveillance projects, is required to safeguard individual interests against such traditional privacy harms.
These are basic steps that must be implemented soon to keep pace in an area where law and technology will continue to evolve.
The Indian State must also move ahead to create appropriate personal and community data protection regimes that place limits on the processing of such data using drone technology. This framework should make use of a co-regulation framework that incentivizes private actors to adopt voluntary codes of conduct and places responsibility on appropriate state authorities to evaluate such codes, suggest suitable modifications, and monitor compliance with the same. The Digital Sky platform, a state-of-the-art solution for regulatory compliance as well as drone tracking, should be expanded to publicize privacy impact assessments carried out by drone operators. These are basic steps that must be implemented soon to keep pace in an area where law and technology will continue to evolve.
Citations
- The Global Risks Report 2018 13th Edition, [Geneva: World Economic Forum,2018] source">source.
- The United Nations World Water Development Report 2018: Nature-Based Solutions for Water, [Paris: WWAP (United Nations World Water Assessment Programme) /UN-Water, 2018, UNESCO] source">source.
- Martina Flörke, Christof Schneider, and Robert I. McDonald, "Water competition between cities and agriculture driven by climate change and urban growth," Nature Sustainability 1, no. 1 (2018): 51.
- Peter H. Gleick, "Global freshwater resources: soft-path solutions for the 21st century," Science 302, no. 5650 (2003): 1524-1528.
- Ibid.
- Negative externalities are costs that impact a party that does not have a role in its creation. For instance, vehicular pollution generated by a specific individual affecting people nearby. Negative externalities cause market failures.
- Collection action problem occurs when individuals pursuing a common goal do not cooperate due to competing interests.
- Free rider issues occur when individuals who do not pay for a good or service reap its benefit. Too many free riders results in over-exploitation or under-production of the good or service.
- Richard E. Howitt, Richard E. and Kristiana Hansen, "The Evolving Western Water Markets," Choices 20, no. 316-2016-6565 (2005): 59.
- Guy Le MoigneShawki Barghouti, Gershon Feder, Lisa Garbus, and Mei Xie, "Country experiences with water resources management," World Bank Technical Paper 175 (1992).
- Ereney Hadjigeorgalis, "A Place for Water Markets: Performance and Challenges," Review of Agricultural Economics 31, no. 1 (2009): 50-67.
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- C. Wilson, Adverse Selection, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics, Palgrave Macmillan, 2008]
- Y. Kotowitz, Moral Hazard, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- J.O. Ledyard, Market Failure, In: Palgrave Macmillan (eds)[London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- David S. Brookshire, Bonnie Colby, Mary Ewers, and Philip T. Ganderton, "Market Prices for Water in the Semiarid West of the United States," Water Resources Research 40, no. 9 (2004).
- John Freebairn and John Quiggin, "Water rights for variable supplies," Australian Journal of Agricultural and Resource Economics 50, no. 3 (2006): 295-312.
- A. Dinar, M. Rosegrant, R. Meinzen-Dick, "Water allocation mechanisms: Principles and examples," The World Bank Policy Research Working Paper 1779 (June 1997).
- Jill E. Hobbs, "Information asymmetry and the role of traceability systems," Agribusiness: An International Journal 20, no. 4 (2004): 397-415.
- Max H. Bazerman and James J. Gillespie, "Betting on the future: The virtues of contingent contracts," Harvard Business Review 77 (1999): 155-162.
- Stefaan G. Verhulst, "Information Asymmetries, Blockchain Technologies, and Social Change," Medium, July 24, 2018, source">source.
- Sloane Brakeville, and Bhargav Perepa, "Blockchain Basics: Introduction to Distributed Ledgers," IBM Developer, March 18, 2018, accessed April 14, 2019, source">source.
- Nigel Gopie, "What Are Smart Contracts on Blockchain?" Blockchain Pulse: IBM Blockchain Blog, July 02, 2018, source">source.
- "Civic Use Cases," Helping Governments to Be More Accessible, Efficient and Effective. source">source.
- "Civic Ledger Pty Ltd.," Australian Water Partnership. source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "Water Markets and Trade," Australian Government – Murray-Darling Basin Authority, Sept. 29, 2015. source">source.
- "About Water Ledger," How Water Ledger Works, source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "About Water Ledger," How Water Ledger Works, source">source.
- Ibid.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management. September 2018.
- Ibid.
- The term “smart” in this context indicates the use of internet of things, big data, predictive analytics integrated over blockchain network as underlying technologies to facilitate the operations of a water market.
- Jayachandran Praveen, “The Difference between Public and Private Blockchain," Blockchain Pulse: IBM Blockchain Blog, Aug. 06, 2018, source">source.
- J.R. DeShazo, Gregory Pierce, and Henry McCann, “Los Angeles County Community Water Systems Atlas and Policy Guide: Supply Vulnerabilities, At-Risk Populations, Conservation Opportunities, Pricing Policies, and Customer Assistance Programs,” UCLA: Luskin Center for Innovation, (2015), source">source; U.S. Census Bureau Quick Facts: Los Angeles County, California," Census Bureau Quick Facts, July 1, 2017, source">source.
- S. Pincetl et al., “Water Management in Los Angeles County: a Research Report,” Los Angeles: UCLA, Institute of Environment and Sustainability, 2015, source">source
- Ibid.
- Ibid.
- J.R. DeShazo and Gregory Pierce, "Quantifying the Benefits and Designing Governance Structures for a Water Market in Los Angeles County," [Los Angeles: UCLA, Luskin Center for Innovation, Oct. 2016] source">source
- Bengaluru Water Board, “Blueprint for Future,” source">source.
- Bangalore Water Supply and Sewerage Board, "About BWSSB," Bangalore Water Supply and Sewerage Board. source">source.
- Bengaluru Water Board, “Blueprint for Future," source">source.
- Malini Ranganathan, "'Mafias' in the waterscape: Urban informality and everyday public authority in Bangalore," Water Alternatives 7, no. 1 (2014).
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- Bart Elias, Unmanned Aircraft Operations in Domestic Airspace: U.S. Policy Perspectives and the Regulatory Landscape (Washington, D.C.: Congressional Research Service, 2016), source.
- Tom Hancock and Wang Xueqiao, “China’s DJI targets agriculture as consumer drone sales slow,” Financial Times, March 25, 2019, source.
- Richard Levick, “Drone Industry Just Beginning To Take Off,” Forbes, May 15, 2018, source.
- Ujjwal Bakshi and Manash Neog, “Much to Drone About,” Economic Times, April 4, 2019, source.
- Therese Jones, International Commercial Drone Regulation and Drone Delivery Services (Santa Monica: RAND Corporation, 2017), source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), source.
- Somya Lohia, “Drone Regulations 1.0 Can Fetch India Major Slice of $100 Billion Industry,” Money Control, January 9, 2019, source.
- Civil Aviation Requirements Series X Part I Issue I: Requirements for Operation of Civil Remotely Piloted Aircraft System (RPAS), F. No. 05-13/2014-AED Vol. IV (New Delhi: Directorate General of Civil Aviation, 2018), source.
- Ibid., Reg. 14.2.
- Ibid., Reg. 12.14 & 12.2.
- Ibid., Reg. 11.2 & 17.1.
- Ibid, Reg. 12.21.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), source.
- Procedures for Operation of Civil Remotely Piloted Aircraft Systems (RPAS) in Indian Airspace, AIP Supplement 164/2018 AAI/ATM/AIS/09-09/2018 (New Delhi: Airports Authority of India, 2018), source.
- Tender Document: Development, Hosting and Maintenance of Digital Sky Platform for Ministry of Civil Aviation IT-11042/1/2018-DIRECTORATE OF IT (New Delhi: Airports Authority of India, 2018), source.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), source.
- Ibid.
- Ibid.
- Drone Ecosystem Policy Roadmap (New Delhi: Ministry of Civil Aviation, 2019), source.
- Ibid, 7.
- Ibid, 14.
- The Personal Data Protection Bill, 2018 (New Delhi: Ministry of Electronics and Information Technology, 2018), source.
- White Paper of the Committee of Experts on a Data Protection Framework for India (New Delhi: Ministry of Electronics and Information Technology, 2017), source
- Petition to the Federal Aviation Administration: Drones and Privacy (Washington, D.C.: Electronic Privacy Information Center, 2012), source.
- Margot Kaminski, “Drone Federalism: Civilian Drones and the Things They Carry,” California Law Review 4 (2013): 57–74.
- Notice of Proposed Rulemaking: Operation of Small Unmanned Aircraft Systems Over People FAA–2018–1087 (Washington, D.C.: Federal Aviation Administration, 2019), source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), source.
- Arthur Holland Michel, Drones at Home: Local and State Drone Laws (New York: Center for the Study of the Drone, Bard College, 2017), source.
- Amanda Essex, Taking Off: State Unmanned Aircraft Systems Policies (Denver, CO: National Conference of State Legislatures, 2016), source.
- An Act Relating To Unmanned Aircraft Systems – Establishing Statewide Standards, Protecting Privacy, And Ensuring Public Safety (Virginia: American Legislative Exchange Council, 2017), source.
- Gautam Bhatia, “State Surveillance and the Right to Privacy in India: A Constitutional Biography,” National Law School of India Review 26 (2014): 127–158.
- (2019) 1 SCC 1.
- Ibid, 359.
- (2015) 5 SCC 1.
- Ibid, 167.
- Colin Snow, “Drones Pose a Unique Big Data Challenge For Business Users,” Forbes, February 6, 2019 source ; Michelle Chan, “What Businesses Need to Know About Drone Data,” Techwire Asia, February 13, 2019, source
- Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules ((New Delhi: Ministry of Electronics and Information Technology, 2011),source"> source ; Ibid. ; Rachel Finn and Anna Donovan, “Big Data, Drone Data: Privacy and Ethical Impacts of the Intersection Between Big Data and Civil Drone Deployments,” in The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, ed. Bart Custers (The Hague: TMC Asser Press, 2016), 47-67.
- As Solove remarks about the “Information Age:” “The data gathered about people is significantly more extensive, the process of combining it is much easier, and the computer technologies to analyze it are more sophisticated and powerful.” See Daniel Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review 154 (2006): 477, 506 ; Ibid., 507–08.
- Jordi Soria-Comas and Josep Domingo-Ferrer, “Big Data Privacy: Challenges to Privacy Principles and Models.” Data Science and Engineering 1 (2016): 21, 22. ; Justice KS Puttaswamy v. Union of India, (2017) 10 SCC 1.
- Guide to Basic Data Anonymisation Techniques (Singapore: Personal Data Protection Commission of Singapore, 2018), www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other-Guides/Guide-to-Anonymisation_v1-(250118).pdf.
- For a particularly stark situation, where the de-identification was considered near foolproof and yet re-identified, see Jean Louis Raisaro et al., “Addressing Beacon Re-Identification Attacks: Quantification and Mitigation of Privacy Risks,” Journal of the American Medical Informatics Association 24 (2017): 799, 800.
- Solon Barocas and Helen Nissenbaum, “Big Data’s End Run around Anonymity and Consent,” in Privacy, Big Data, and the Public Good, eds. Julia Lane et al. (New York, NY: Cambridge University Press, 2014), 44–45.
- Ira S Rubinstein, “Big Data: The End of Privacy or a New Beginning,” International Data Privacy Law 3 (2013): 74, 77–78; Davide Castelvecchi, “Can We Open the Black Box of AI?” Nature 538, no. 7623 (2016): 20.
- Mireille Hildebrandt, “Defining Profiling: A New Type of Knowledge?” in Profiling the European Citizen: Cross-Disciplinary Perspectives, eds. Mireille Hildebrandt and Serge Gutwirth (eBook: Springer, 2008), 17, 20.
- Nathaniel A Raymond, “Beyond ‘Do No Harm’ and Individual Consent: Reckoning with the Emerging Ethical Challenges of Civil Society’s Use of Data,” in Group Privacy: New Challenges of Data Technologies, eds. Linnet Taylor, Luciano Floridi and Bart van der Sloot (eBook: Springer, 2017): 67, 75.
- A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians (New Delhi: Ministry of Electronics and Information Technology, 2018), source.
- Ibid, 45–46.
- Ananth Padmanabhan and Anirudh Rastogi, “Big Data,” in Regulation in India: Design, Capacity, Performance, eds. Devesh Kapur and Madhav Khosla (London: Hart Publishing, 2019): 251, 262.
- Aleecia M. McDonald and Lorrie Faith Cranor, “The Cost of Reading Privacy Policies,” I/S Journal of Law and Policy, 4 (2008): 543, 565.
- Arthur Allen Leff, “Contract as Thing,” American University Law Review 19 (1970): 131.
- Nikhil Narendran, “Policy Framework for Protection of Big Data in State Possession,” in Blockchain for Property: A Roll Out Road Map for India, eds. Baladevan Rangaraju and Vishnu Chandra (New Delhi: India Institute, 2017): 34, 40.
- Rahul Matthan, Privacy 3.0: Unlocking Our Data-Driven Future (Noida: Harper Collins, 2018): 167–171.
- Carmine Cifaldi, “Unmanned Aircraft System Privacy and Data Protection,” in Handbook of Unmanned Aerial Vehicles, eds. K.P. Valavanis and G.J. Vachtsevanos (eBook: Springer, 2018): 1–19.
- Voluntary Best Practices for UAS Privacy, Transparency, and Accountability (Washington, D.C.: National Telecommunications and Information Administration, 2016), source.
The Privacy Negotiators: The Need for U.S. Tech Companies to Mediate Agreements on Government Access to Data in India (Madhulika Srikumar)
Madhulika Srikumar is attending the graduate program at Harvard Law School as a 2019 Inlaks Scholar. She was previously an Associate Fellow and Programme Coordinator with the Cyber Initiative at Observer Research Foundation in New Delhi.
Acknowledgments: The author extends sincere thanks to Sharon Bradford Franklin, Andrew Woods, Greg Nojeim, Heather West, Jennifer Daskal, Tim Maurer and William Carter for their valuable insights. This paper would not have been possible without the kind support of New America and the invaluable guidance provided by Awista Ayub and Melissa Salyk-Virk. The author would also like to thank the 2019 India-US Fellows. All errors in this paper are the author's alone.
Introduction
Apple’s clash with the FBI in 2016 was touted as an “American Revolution” and a reminder of “why we (Americans) have the fourth amendment.”100 Indeed, Apple’s challenge signified the pivotal role that tech companies play in defining the parameters of government surveillance.101 It did so by publicly challenging a court order requiring the company to break the encryption built into its iPhone device.
Cut to 2018: to the chagrin of privacy advocates everywhere, Apple announced that it would move the data of Chinese users to servers owned by a state-run company to comply with China’s data localization law. The company later announced that they would host the encryption keys in China;102 and that the Chinese partner would “have access to all data” of users registered in the country.103
An emerging body of scholarship has now examined the role that tech companies play in instances like Apple’s clash with the FBI – where “surveillance intermediaries” constrain government surveillance, as Alan Rozenshtein argues.104 Scholars have examined the incentives and tools that tech companies use to resist the government (U.S. government in most analyses) and the net positive effect that it has ushered in for users against surveillance excesses by law enforcement.105
What these scholarly attempts have omitted, however, is taking the latter reality into account – where tech companies accede to (sometimes regressive) government demands. The number of internet users in India and China is over four times larger than the United States excluding the number of future users.106 This fact alone introduces finer nuances that dismantle the existing understanding of financial and policy incentives that drive intermediary behavior.
I lay out in the following sections why tech companies must instead be treated as privacy negotiators – not only advocating for user privacy but negotiating the tradeoff between cooperation or resistance in the short term vs. compliance with unintended regulatory consequences in the long term. Over the past year, the scales have tipped in favor of the latter outcome. The difficulty of obtaining electronic data from U.S. tech companies combined with the historic resistance put forth by these companies has been recognized as the primary reason behind the onerous regulation introduced in India.107
In response, tech companies are increasingly relenting to government pressure thereby complying with regulation that is not only poorly designed but one that could pose serious consequences to the privacy of Indian users.
I argue that as privacy negotiators, tech companies are in a unique position in the surveillance architecture to reform cross-border access to data for law enforcement in a manner that secures the privacy interests of Indian (and all foreign) users. Given that these tech companies are privy to the nature of requests and have the legal standing to pushback against the requests- their role as privacy negotiators is established firmly.
In earlier work, I examined the challenges in the current cross-border regime where Indian government requests data from U.S. tech companies, arguing that the respective governments must consider an India-US executive agreement under the Clarifying Lawful Overseas Use of Data Act or CLOUD Act. I argued that such a bilateral agreement would not only ease cross-border access to data and make it more efficient but also safeguard user privacy in the process and ultimately strengthen the overall case against mandatory data localization.
This article takes off from there – given that there is an alternative on the table, there are still no significant advances being made in the conversation. This article explores why. Even while the challenge arising out of the conflict of laws is undeniable, I argue that there is an emerging “conflict of interests” which has resulted in tech companies acceding to Indian government’s demands for localization. The article, therefore, addresses the gap between current literature that examines the challenge of cross-border access to data and the growing scholarship on governing tech companies as “information fiduciaries.”
In Part I, I briefly lay out the challenge of Indian government access to data highlighting how U.S. tech companies have fallen into the role of privacy negotiators. The section also briefly addresses the significant normative turnaround that an India-US executive agreement on data sharing can bring about.
In Part II, I examine how the push for data localization from the Indian government came about and the competing incentives of tech companies that may ultimately drive them to comply with a larger localization mandate.
In Part III, I explore how the recognition of tech companies as data fiduciaries under Indian law may enhance the legal responsibility of privacy negotiators – requiring them not only to pushback against localization but also push for more privacy protecting alternatives such as the CLOUD Act. In the final section, I argue that private tech firms indeed have the clout to push for an executive agreement between India and the U.S. to raise the privacy standards of law enforcement access to data.
This article is limited to examining the regulatory responses stemming from the cross-border conundrum when Indian law enforcement agencies (LEA) request user data from U.S. tech companies whose services are widely used in the country. Any reference to “tech companies” in this paper is limited to prominent U.S. tech service providers that are operational worldwide. Their function as privacy negotiators, therefore, is emblematic of the role they carry out in the current surveillance regime – and as I argue later in the article, also indicative of the duty they must discharge towards all users. Developments in India present a compelling lens to examine this contention since companies’ recent actions in the country exhibit a decisive turnaround in the incentives that earlier drove their resistance in the surveillance regime worldwide.
Conflict of Laws
The system for cross-border access to electronic data for criminal investigations between India and the United States has often been criticized for being outdated and time consuming, sometimes taking as long as three years.108 At the heart of the issue is the conflict of laws between where the user is located, where the company is headquartered and in some cases, where the data is stored.This has led to fragmentation of legal frameworks across jurisdictions and reliance on slow inter-governmental processes like Mutual Legal Assistance Treaties (MLAT).
Access to electronic data – specifically communications content – has become instrumental not just for crimes committed online but also to further investigations where these crimes cause ‘real-world’ harm. U.S. tech companies, governed by the Stored Communications Act, disclose non-content data to government agencies that honor the rule of law and respect fundamental rights. Companies only voluntarily disclose content data during exigent circumstances involving danger of death or serious physical injury to any person
Under normal circumstances content data can only be shared in response to a warrant issued in the U.S. As a result, in most cases investigating officers in India must obtain a warrant meeting the probable cause standard from a U.S. court through the India-U.S. MLAT to access content data. Due to delays and uncertainties associated with the MLAT process, Indian law enforcement officials often express their dissatisfaction of having to comply with a foreign law, especially while tackling crucial cases.109 One such instance is the recent case of disinformation spread through WhatsApp that resulted in mob violence and deaths of 27 people.110
Given this reality, the Indian government in the past year has called for data to be localized or stored within India’s borders. The mandate to store data locally either completely or in the form of “mirror servers” is a harmful and ill-suited policy approach for two reasons.
First, mandating data to be localized is especially dangerous to user privacy since police officials in India rely on legacy laws to access electronic data which require no prior authorisation by courts. Legacy laws in India provide that any court or police officer in charge of a police station can compel the production of any “document or other thing” that is necessary or desirable for the purposes of an investigation or trial.111 Not only has this power been interpreted broadly but in practice it is only police officers who issue notices to companies requesting user data.112 This imposes a much lower threshold than the U.S. Probable Cause standard that is currently enforced on Indian users through the MLAT process where the court issues a warrant.113
Second, data localization is ill-suited for the stated purpose of law enforcement access. Major service providers may not be able to comply with user data requests from the Indian government since U.S. law still effectively bars these companies from disclosing user data to foreign law enforcement authorities.114 Even if U.S. companies comply, only data of Indian citizens can be provided. In cases of transnational crimes such as online radicalisation, money laundering and cybercrimes, Indian police will have to continue to rely on cooperative models like the MLAT process.115
It is crucial that a common framework is devised that eases the existing conflict of laws and increases institutional cooperation between states to discourage further fragmented developments such as mandatory data localization. Access to electronic data, therefore, must be determined on the basis of where the user is located and not where the data is stored. States must strive towards enacting direct data sharing arrangements between foreign LEAs and technology companies to operationalize this. The CLOUD Act signed into law last year by the U.S. Congress can actualize this for the first time and decentralize control over data from U.S. authorities where popular technology companies are located.116
Even while the CLOUD Act is an imperfect solution – the Act by allowing executive agreements between states to bypass the existing conflict of laws provides a workaround that was earlier unavailable. In effect, an India-U.S. executive agreement under the CLOUD Act would establish a higher standard of privacy protection for Indian users that is currently unavailable under Indian law such as limiting the scope of requests and judicial review.117
Conflict of Interests
Push for Data Localization
Calls for mandatory data localization by the Indian government over the past year have emerged as the overwhelming bone of contention. Far from mere rhetoric, the Reserve Bank of India (RBI) has already made it mandatory for all payment service providers to store copies of data locally.118
India’s first draft data protection law imposes mandatory data localization – requiring all data fiduciaries operating in the country to store at least one serving copy of data on a local server.119 The draft law further empowers the government to recognize certain categories of data which must not only be stored but also processed exclusively in the country.120
Admittedly, this push for data localization is part of a larger strategy that the government is rolling out to reassert their sovereignty in the digital economy. However, in no uncertain terms, the committee drafting the law has cited the difficulty that law enforcement faces in accessing user data during criminal investigations and prosecutions as the primary motive behind the move.121 The committee reasons that forcing companies to localize data, even just a copy, can enable “quick and easy access.”
The government directive to command cooperation from companies on surveillance is not limited to data localization. The draft amendment rules to the Information Technology Act imposes an obligation on intermediaries to respond within 72 hours of receiving a request from any government agency; preserve data upon requests for 180 days or longer; and enable “tracing” the originator of the messages shared on their platforms.122
Forcing companies to store data locally – even just copies– has been widely panned by stakeholders in India and abroad. Broadly, enforcing data localization is criticized as a regulatory tool that can lead to unchecked surveillance, impose significant costs on companies, ironically on local startups, compromise security, and as per the U.S. government be discriminatory and trade-distortive. 123
It is undeniable that the Indian government has a legitimate interest in regulating tech companies, especially given their growing strategic importance. A case can even be made that a carefully nuanced localization law – that is backed by evidence and least obstructive in practice – can be an appropriate regulatory response in some cases.124
It is undeniable that the Indian government has a legitimate interest in regulating tech companies, especially given their growing strategic importance.
However, the current data localization directive is driven by the government’s waning patience in eliciting compliance from tech companies across issues – from online speech to taxation. Even in the absence of a consensus across agencies on the extent, indeed the rationale behind data localization, the government is hurtling towards a point of no return. The government’s frustration stems from private and foreign companies wielding public power and, consequently, opposing state sovereignty.
Compliance with such a law would run wildly contrary to the public stance that tech companies have long held on this issue. If passed in its current form, this law will also be counterproductive defeating the government’s intended purpose, likely hurting law enforcement efforts, undermining user privacy in the process.
First, as I mentioned above, it is unclear whether a mandate to relocate data locally will translate into easier access for Indian law enforcement. Given that U.S. law effectively bars these companies from disclosing user data to foreign law enforcement authorities, companies are in a position to legally refuse to comply with requests. As is current practice, companies can continue to demand a judicial order from a U.S. court to comply with a request for content of any online communications.
Second, even if localizing data could assuage fears of foreign surveillance, it could easily lend itself to domestic surveillance. The Committee has sought to localize data for law enforcement but “categorically refused to afford this data any procedural protection”.125 The Committee has instead placed the onus on Parliament to enact another comprehensive legislation for surveillance reform. In other words, the government is enacting data localization in the absence of any, let alone strong, data protection laws and enforcement mechanisms. Some have gone on to argue that the mandate may therefore not fulfill the standard laid out by the Supreme Court on what constitutes a reasonable restriction on an individual’s right to privacy.126 This reasoning is compelling since the government can just as easily adopt less onerous regulations that could serve the purpose adequately and proportionately.
Competing Incentives of Tech Companies
Developments over the past year conclusively indicate that tech companies are relenting to Indian government demands to forcefully localize data. While these demands are not new, the RBI made a decisive move towards enacting this mandate for the first time targeting big tech companies – posing an existential peril to the payment ecosystem in the country. The principal banking regulator made it mandatory for all “payment system providers” to store payments data locally and ensure “unfettered supervisory access” to the data stored within a six-month period.127 Eighty percent of the players, including Google, Amazon, and Whatsapp, have reportedly either complied with the regulation or are planning to.128
Undoubtedly, the RBI notification has a far-reaching impact – not only because it is the first policy of this kind, but more importantly for what it signals lies in store. It has been reported that the Central Bank is relying on the localization regulation to “prepare ground” for a stringent data protection law that would be applicable across sectors not limited to financial data. Further, the close involvement of the central government in seeking compliance with the RBI regulation firmly indicates the emergence of a “whole-of-government” approach, laying the foundation for a wider localization requirement under the upcoming data protection law.
Admittedly, big tech companies have complied with data localization laws in Russia and China previously. However, I argue here, that submitting to an Indian regulation (and thereby a mandate issued by a democratic state) represents a turning point in the incentives that drive their behavior in emerging economies. Take Facebook, for instance. The company recently not only acknowledged that choosing where to build data centers is “one of the most important decisions” they make, but also committed to not storing sensitive data in countries with weak human rights records or lacking security safeguards.129 Meanwhile, Facebook’s subsidiary Whatsapp is on the final stretch before storing all payments-related data within India in the absence of adequate checks and balances under Indian law.130
It may be unclear, even unnecessary, to characterize these actions of tech companies as hypocrisy or doublespeak. Tech companies have been and will continue to strike a balance between cooperation with, and resistance to lawful surveillance across jurisdictions.
In effect, however, the added complexity of responding to foreign governments has contributed to their resistance over time. This, in turn, has resulted in heavy-handed policies in growing markets such as India, which has distorted the incentives that earlier drove their actions. Companies are increasingly either adhering to these policies or showing a willingness to. Even while companies are incentivized by a profit motive, and understandably so, as privacy negotiators their acquiescence or pushback plays an outsized role for the privacy rights of Indian users. This alone demands an exercise in breaking down what incentives drive them.
Launch of new services: The launch of WhatsApp’s first-ever payments service coincided with the RBI localization notification. The RBI’s directive to all payment system providers to store payment data of the Indian leg of a transaction exclusively in India was issued in April 2018. In addition to the local storage requirement, the stated purpose behind the regulation was for providers to establish a mechanism to allow the Central bank to monitor this data end-to-end. The regulation was applicable to all payment providers including international card networks such as Mastercard and Visa, and operators of pre-paid wallets including WhatsApp Payments, Amazon Pay and Google Pay.
The consequent resistance to this regulation by global payment firms including big tech companies illustrated not only how their pushback was unsuccessful, but also the stakes involved for these companies as they were vying to expand in the Indian market. Tech companies view India as the “next frontier of growth” – fighting to capture the sizable and growing digital payments market, which is expected to be worth a reported $500 billion by 2020.131 Google Pay is reported to have 30 million users on the platform in India alone. With over 200 million monthly active users, India is the biggest market for WhatsApp – justifying why the company has been testing its payments service first in the country.
Even while complying with the RBI regulation heralded significant costs and an overhaul of existing operations; and is inconsistent with their previous policy positions on this issue, tech companies ultimately relented. Google, for instance, agreed to abide by all RBI requirements while at the same time maintaining that they promote cross border data flows since they generate more economic value. Apple, on the other hand, has reportedly stalled the launch of Apple Pay in India in light of RBI’s localization mandate.
Even under mounting pressure from industry bodies,132 U.S.-India trade organizations133 and U.S. senators,134 the Indian government has been unwavering in its demand. The Central Bank refused to extend their six-month deadline for compliance;135 did not concede to a less onerous alternative such as a “mirror server” requirement;136 and did not open up to public consultation.137 While companies challenged the RBI directive, it is clear that none of them pursued a legal challenge, though the reasons why remain unclear. Combined with the whole of government approach that the current administration in India has adopted, we see that tech companies acceded to the localization request given their significant growing interest in the market.
Localization as the “less bad” option: Increasingly, tech companies operating in India are seen to be viewing a localization mandate as a less bad option. First, tech companies across the board have agreed to comply (some at the first instance) with the RBI notification to exclusively store payment data arising out of the country locally. The majority of the global payment firms including Amazon and Google have abided by the law and satisfied the regulator’s requirements.138 This differs significantly from how some of the companies have responded to Russia’s 2014 data localization law, with some either ignoring the obligation altogether and the rest failing to fully comply.139
Second, it appears increasingly unlikely that the companies would continue to rely on U.S. law as a crutch to resist or delay responding to requests from Indian agencies.140 In effect by complying with the RBI requirement to store data exclusively in India, the companies have ceded to the regulators’ supervisory powers. Especially given the presence of physical infrastructure or personnel in the country, companies might consider the risk of not attracting punitive action more seriously.141
Third, tech companies might be willing to acquiesce to data localization to stave off demands that could fundamentally alter their technological design. Over the past year, while WhatsApp has been under government pressure to localize data, the company was also fighting the fire to contain the spread of viral rumors on its platform. False videos of child abduction shared on the messaging app triggered a spate of mob-related killings that resulted in over 30 reported deaths.142
The company’s plan to launch its payment service stalled as they came under intense scrutiny from the government to “not evade responsibility” and were being pressured to introduce technology changes to their service.143 This pressure culminated with the Ministry of Electronics and Information Technology (MeitY)’s draft intermediary guidelines late last year that mandatorily required companies to enable “tracing out the originator” of messages upon requests and to respond within 72 hours. While the company made changes to its messaging service to limit forwarding of messages, they pushed back on the tracing requirement as it could entail breaking the end-to-end encryption deployed by the platform.144 We see that while the company was willing to alter its architecture by storing data locally for its payment service, they were at the same time unwilling to alter a critical facet of its business model in encryption.
Responsibility of Tech Companies as Privacy Negotiators
U.S. tech companies operating in India are therefore caught up in what can best be termed as an identity crisis. At the crux of it, the aforementioned incentives muddy the waters for tech companies, making it difficult for them to push for a workaround to adequately address the challenge of Indian law enforcement access to data.
Since U.S. tech companies play a unique role when responding to government surveillance, acting both as the first and last line of defense, I argue that only companies can and must negotiate to protect the long-term privacy interests of Indian users. Especially given that these tech companies will soon be recognized as “data fiduciaries” in the Indian market, I argue that companies indeed have an additional legal responsibility to protect their users’ privacy interests.145 Through the CLOUD Act, tech companies can counteract the demands for data localization while upholding high standards of due process and privacy protections for Indian users that are currently unavailable under Indian law.146
As current literature has exhaustively outlined, tech companies are the only actors privy to the nature of requests they receive from government agencies.147 Not only can tech companies afford the resources to comply with requests, but they can also cooperate more actively, and even pushback through a legal challenge when required.148 Ultimately it is only companies who have the resources or the legal standing to fight a request – further entrenching the role that they play as privacy negotiators.149
The question that then arises is what role do companies discharge as privacy negotiators? Are there any obligations, legal or otherwise, on these companies to safeguard user rights within the larger surveillance architecture?
To predict the route that technology companies will adopt in the tussle between advocating for user privacy and acceding to lawful surveillance, it is necessary to distill the specific interests that tech companies have in going either way. Viewed as pure corporate actors following rational self-interest, it may seem unwise for the companies to assume any additional burden of resisting requests for access to data, even when requests may be overbroad or vague. This holds doubly true when American companies undertake the collective responsibility of addressing requests from foreign governments and are called on to find a fix to the current overburdened cross-border regime for data sharing.
Largely, the current scholarship falls on one of two sides of this debate. The first, popularized by Rozenshtein, adopts an empathetic view that companies as surveillance intermediaries have brought about an overall positive change or “disciplining effect” on the surveillance regime—through pushback in courts and mobilizing public opinion for the benefit of user privacy. Rozenshtein goes so far as to argue that tech companies have never before relied so significantly on a foreign user base and resisted government surveillance this aggressively in part due to their “intense libertarian aversion to government invasions of privacy.”150
The second is more cynical in its outlook where scholars argue that tech companies shielding or delivering information to law enforcement is all happenstance and purely an outcome of their pervasiveness in our digital economy.151 Users should have no expectations to think a “technology company can and should be responsible for its users’ rights.”152 Regardless, the consensus across the two schools is loud and clear. Tech companies post 2013 Snowden disclosures have a commercial incentive to challenge lawful government surveillance and advocate for users rights; and indeed on the whole until now, companies’ actions support this contention.153
However, this contention overall no longer holds any water. As I have outlined above, the incentives of tech companies are no longer aligned with the interests of users – at least Indian users. By conceding, indeed, complying with the Indian government’s mandate to store data locally in the absence of adequate privacy safeguards, tech companies’ interests have conclusively aligned with the government and regulatory interests and no longer appear aligned with those of Indian users; and by extension users in all emerging markets. The incentive to launch a new service in a crucial market or the act of conceding to localization in order to not attract other adverse regulatory mandates are compelling reasons for companies to abandon their seemingly voluntary role as privacy negotiators. Instead, the assertion that companies often choose to fight for user privacy because of their profit motives and not in spite of them—as advanced by the above mentioned cynical school—does a better job of explaining the turn of events helmed by tech companies in the country. Simply put, tech companies find themselves in a conflict of interests—advancing their market priorities versus prioritizing user privacy.
This relationship between tech companies and users stands fundamentally altered with the growing recognition of tech companies as fiduciaries. India’s upcoming draft data protection bill may well be one of the first few legislations that articulates this duty of care for tech companies – recognizing any individual, state, company, or juristic entity who determines the purposes and means of processing personal data (either alone or in conjunction with others) as data fiduciaries.154
The constitutional law scholar Jack Balkin first proposed extending the common law doctrine of fiduciary relationships to the digital economy – and coined the term “information fiduciaries”.155 This proposal has gained wide acceptance, with the drafters of India’s data protection bill adapting it to develop a “fourth path” to deliver a data protection regime, distinct from the U.S., EU and China – relevant not just to India but to “all countries in the Global South”.156
As information fiduciaries, tech companies including social media, search engines, etc. will have to discharge duties of care, confidentiality and loyalty towards users whose data they collect, store and use.157 This fiduciary responsibility bestowed on companies is over and above the contractual rights that users are entitled to and further confers the duty on companies to adopt a professional code of ethics to protect the data principal’s or user’s interests. Balkin likens this duty to that of a doctor’s or lawyer’s:
Suppose that a doctor, lawyer, or accountant sold personal information about their clients to a data broker. Suppose that they used personal information to manipulate a client’s actions for the doctor, lawyer, or accountant’s benefit. Or suppose that they simply disclosed it in order to gain a business advantage at the expense of their client. If they did any of these things, they would likely be liable for a violation of professional conduct … Even absent an express promise not to reveal, use or sell information, there is a duty not to do so in ways that will harm the interests of the client, or that pose a conflict of interest.
The fiduciary relationship between users and companies, however, is not extended to all online service providers who operate in the digital economy. Instead, four criteria must be met for a company to be considered an information fiduciary; whether users are placed in a position of significant vulnerability, whether users disclose personal information to the company in return for gaining access to important online services; and finally whether the company holds disproportionate volumes of data about the user which can be used against her interest.158 Admittedly, India’s draft data protection bill adopts a broader sanction, indeed conferring the fiduciary duty on all actors who process personal data in the digital market.
The criteria set out above, however, are wholly met by private tech firms in the current surveillance ecosystem for the reasons I stated above – that tech companies are the first and last line of defense.159 While the above excerpt suggests that tech companies must be able to avoid conflicts that harm the interests of clients, or in this case users, altogether – the reality is not as wishful. Instead, with the statutory recognition of their fiduciary duty, tech firms have an obligation to carry out their duty of loyalty by resolving any conflict of interest to the benefit of their users’ interests and not their own. Therefore, as privacy negotiators, tech companies must respond to surveillance by not endangering the privacy of their users by localizing data in the absence of adequate safeguards, but instead work towards a sustainable workaround. Commentators have argued that the government’s push towards data localization in the data protection bill (and companies acceding to this demand) undermines the fiduciary relationship laid out in the very same bill – increasing not just privacy but the security risks of users located in India.160
Indeed, the duty of loyalty translates into fiduciaries ensuring that they use data “only in ways that are consistent with users’ expectations.”161 Expectations of Indian users can be easily traced in the submissions to MeitY during the recent public consultation process on the data protection bill. Not only has a significant section of civil society and industry opposed the localization mandate but there is also a growing consensus that an India-U.S. agreement under the CLOUD Act must be considered as a policy alternative. Therefore, as privacy negotiators bestowed with a fiduciary duty, tech companies must strive to leverage their clout to push for such an agreement.
Resolving Conflicts
The whole-of-government approach adopted by Indian policymakers combined with the support from the law enforcement and national security community has all but cemented the government’s single-minded objective of demanding U.S. companies to store personal data locally.162 This move cannot be seen in isolation – only stemming from the challenge that the Indian government currently faces either in accessing user data or enforcing domestic regulations. The government recognizing that data is a “strategic asset”163 is motivated to level the playing field between Indian and foreign players in the digital economy; even appointing industry representatives with reported conflicting interests to policy drafting committees.164 While there is acknowledgement that localization is not a silver-bullet solution for all of these multifarious concerns, law enforcement access is viewed as the only challenge that will definitively be solved by localizing data within Indian borders. With the lines between global tech companies and their Indian counterparts drawn, Indian companies have thrown their support behind localization; expecting that it will give them a competitive advantage against the outsized resources that the technology giants command.
Other developments over the past year have also contributed to a confrontation between foreign tech companies and the Indian government. The reveal, for instance that the Cambridge Analytica leaks had led to sharing of personal information of 560,000 Indians with the political consulting firm.165 And more recently, Twitter initially declining to appear before the parliamentary standing committee on information technology.166
From the perspective of the users, however, there is a dawning realization that critical safeguards for privacy may be lost in this battle for compliance between the government and companies. Especially in the surveillance regime it is ultimately only companies that may have a legal standing to resist requests for excessive collection of user data – further cementing the role that they can play as privacy negotiators. In effect, global technology companies wield significant bargaining clout that,at least until now,as been used sparingly when user privacy has coincided with their commercial interests. On the face of it,that seems to be changing.
Major U.S. tech companies have openly supported President Trump’s signing of the CLOUD Act.167 Microsoft, for instance, has committed to additional privacy protections on top of the CLOUD Act including the requirement for prior-judicial sanction before responding to request.168 Apple is contributing to making the process more transparent by training law enforcement officials from around the world in lawful data collection and by creating a web portal for requesting user data and tracking the status of these requests.169 More recently, Amazon Web Services joined the list of prominent technology companies that have lent support to the CLOUD Act as the answer to data collection for law enforcement.
This support is not insignificant. With their sheer size, near complete integration with the digital economy and transnational operations, the companies have begun to resemble nation states in multilateral negotiations and as such will have a huge bearing on whether the new framework succeeds or fails.
However, as I have examined in Part II of the article, even as companies openly voice support for frameworks such as the CLOUD Act, their actions in response to regulatory pressure in India suggest otherwise. A critical consideration in this equation, however, is users’ trust in the companies’ ability to protect their data and privacy. This trust is not limitless and for it to persist, companies will need to walk the talk of safeguarding user privacy.
Frameworks like the Cybersecurity Tech Accord, signed by over 100 global companies committed to protecting users against malicious cyber threats (even those emanating from state actors), are symbolic of the clout that global tech companies can leverage – an initiative that need to be encouraged in conversations around law enforcement access to data.170
Conclusion
Law enforcement demands for access to data have coincided and intensified with the evolution of electronic communications. And yet, the contours of this access are more fluid today than they have ever been and will only get murkier in the coming years. Two paradoxical trends in technology lend credence to this fact: even as larger and more complex data sets become available, a pivot towards anonymising technologies is likely to make more and more data inaccessible to law enforcement.
Law enforcement demands for access to data have coincided and intensified with the evolution of electronic communications.
Earlier this year, Facebook – arguably the most important arbiter of user privacy – announced the eventual merging of its three messaging services and the creation of an ecosystem where the chat app essentially becomes a web browser.171 The more significant part of the announcement, however, was the deployment of WhatsApp-like encryption across all its services.172 The company would store no content data and would therefore not be in a position to share it with law enforcement. This pivot towards universal encryption is likely to intensify the present demands for data access and a resurgence of the dichotomous debate around user privacy versus national security.
At the same time, as emerging technologies like facial recognition, wearables, and smart assistants become commonplace, they will create highly sophisticated datasets including behavioral data – compounding both the volume and types of data that can be available for criminal investigations.173
While encryption will further frustrate law enforcement attempts to access data, new and emerging datasets will increase their dependence on technology platforms. Reconciling these two demands will need fixing the problems that currently plague cross-border data sharing. An important realization that has emerged in the context of controversies surrounding content moderation and speech regulation by social media platforms has been that centralization of these complex politico-legal decisions in the hands of a few actors.174
Competing priorities around ensuring national security, investigating crimes and protecting user privacy have long evaded any meaningful reconciliation. In many ways, recent developments like India’s data localization mandate have forced technology companies and privacy advocates into a corner. At the same time, new policy frameworks like the CLOUD Act have, for the first time, thrown up an opportunity to arrive at a sustainable and privacy-strengthening solution.
The pivot that technology companies make in their public policy posture now will determine the way in which this debate will be resolved. It is critical that they step up and not only bargain for stronger user protection, but also highlight to countries like India how a cooperative and not compulsive framework will better serve all stakeholders in the long run.
Citations
- The Global Risks Report 2018 13th Edition, [Geneva: World Economic Forum,2018] <a href="source">source">source.
- The United Nations World Water Development Report 2018: Nature-Based Solutions for Water, [Paris: WWAP (United Nations World Water Assessment Programme) /UN-Water, 2018, UNESCO] <a href="source">source">source.
- Martina Flörke, Christof Schneider, and Robert I. McDonald, "Water competition between cities and agriculture driven by climate change and urban growth," Nature Sustainability 1, no. 1 (2018): 51.
- Peter H. Gleick, "Global freshwater resources: soft-path solutions for the 21st century," Science 302, no. 5650 (2003): 1524-1528.
- Ibid.
- Negative externalities are costs that impact a party that does not have a role in its creation. For instance, vehicular pollution generated by a specific individual affecting people nearby. Negative externalities cause market failures.
- Collection action problem occurs when individuals pursuing a common goal do not cooperate due to competing interests.
- Free rider issues occur when individuals who do not pay for a good or service reap its benefit. Too many free riders results in over-exploitation or under-production of the good or service.
- Richard E. Howitt, Richard E. and Kristiana Hansen, "The Evolving Western Water Markets," Choices 20, no. 316-2016-6565 (2005): 59.
- Guy Le MoigneShawki Barghouti, Gershon Feder, Lisa Garbus, and Mei Xie, "Country experiences with water resources management," World Bank Technical Paper 175 (1992).
- Ereney Hadjigeorgalis, "A Place for Water Markets: Performance and Challenges," Review of Agricultural Economics 31, no. 1 (2009): 50-67.
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- C. Wilson, Adverse Selection, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics, Palgrave Macmillan, 2008]
- Y. Kotowitz, Moral Hazard, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- J.O. Ledyard, Market Failure, In: Palgrave Macmillan (eds)[London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- David S. Brookshire, Bonnie Colby, Mary Ewers, and Philip T. Ganderton, "Market Prices for Water in the Semiarid West of the United States," Water Resources Research 40, no. 9 (2004).
- John Freebairn and John Quiggin, "Water rights for variable supplies," Australian Journal of Agricultural and Resource Economics 50, no. 3 (2006): 295-312.
- A. Dinar, M. Rosegrant, R. Meinzen-Dick, "Water allocation mechanisms: Principles and examples," The World Bank Policy Research Working Paper 1779 (June 1997).
- Jill E. Hobbs, "Information asymmetry and the role of traceability systems," Agribusiness: An International Journal 20, no. 4 (2004): 397-415.
- Max H. Bazerman and James J. Gillespie, "Betting on the future: The virtues of contingent contracts," Harvard Business Review 77 (1999): 155-162.
- Stefaan G. Verhulst, "Information Asymmetries, Blockchain Technologies, and Social Change," Medium, July 24, 2018, <a href="source">source">source.
- Sloane Brakeville, and Bhargav Perepa, "Blockchain Basics: Introduction to Distributed Ledgers," IBM Developer, March 18, 2018, accessed April 14, 2019, <a href="source">source">source.
- Nigel Gopie, "What Are Smart Contracts on Blockchain?" Blockchain Pulse: IBM Blockchain Blog, July 02, 2018, <a href="source">source">source.
- "Civic Use Cases," Helping Governments to Be More Accessible, Efficient and Effective. <a href="source">source">source.
- "Civic Ledger Pty Ltd.," Australian Water Partnership. <a href="source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "Water Markets and Trade," Australian Government – Murray-Darling Basin Authority, Sept. 29, 2015. <a href="source">source">source.
- "About Water Ledger," How Water Ledger Works, <a href="source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "About Water Ledger," How Water Ledger Works, <a href="source">source">source.
- Ibid.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management. September 2018.
- Ibid.
- The term “smart” in this context indicates the use of internet of things, big data, predictive analytics integrated over blockchain network as underlying technologies to facilitate the operations of a water market.
- Jayachandran Praveen, “The Difference between Public and Private Blockchain," Blockchain Pulse: IBM Blockchain Blog, Aug. 06, 2018, <a href="source">source">source.
- J.R. DeShazo, Gregory Pierce, and Henry McCann, “Los Angeles County Community Water Systems Atlas and Policy Guide: Supply Vulnerabilities, At-Risk Populations, Conservation Opportunities, Pricing Policies, and Customer Assistance Programs,” UCLA: Luskin Center for Innovation, (2015), <a href="source">source">source; U.S. Census Bureau Quick Facts: Los Angeles County, California," Census Bureau Quick Facts, July 1, 2017, <a href="source">source">source.
- S. Pincetl et al., “Water Management in Los Angeles County: a Research Report,” Los Angeles: UCLA, Institute of Environment and Sustainability, 2015, <a href="source">source">source
- Ibid.
- Ibid.
- J.R. DeShazo and Gregory Pierce, "Quantifying the Benefits and Designing Governance Structures for a Water Market in Los Angeles County," [Los Angeles: UCLA, Luskin Center for Innovation, Oct. 2016] <a href="source">source">source
- Bengaluru Water Board, “Blueprint for Future,” <a href="source">source">source.
- Bangalore Water Supply and Sewerage Board, "About BWSSB," Bangalore Water Supply and Sewerage Board. <a href="source">source">source.
- Bengaluru Water Board, “Blueprint for Future," <a href="source">source">source.
- Malini Ranganathan, "'Mafias' in the waterscape: Urban informality and everyday public authority in Bangalore," Water Alternatives 7, no. 1 (2014).
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- Bart Elias, Unmanned Aircraft Operations in Domestic Airspace: U.S. Policy Perspectives and the Regulatory Landscape (Washington, D.C.: Congressional Research Service, 2016), source">source.
- Tom Hancock and Wang Xueqiao, “China’s DJI targets agriculture as consumer drone sales slow,” Financial Times, March 25, 2019, source">source.
- Richard Levick, “Drone Industry Just Beginning To Take Off,” Forbes, May 15, 2018, source">source.
- Ujjwal Bakshi and Manash Neog, “Much to Drone About,” Economic Times, April 4, 2019, source">source.
- Therese Jones, International Commercial Drone Regulation and Drone Delivery Services (Santa Monica: RAND Corporation, 2017), source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), source">source.
- Somya Lohia, “Drone Regulations 1.0 Can Fetch India Major Slice of $100 Billion Industry,” Money Control, January 9, 2019, source">source.
- Civil Aviation Requirements Series X Part I Issue I: Requirements for Operation of Civil Remotely Piloted Aircraft System (RPAS), F. No. 05-13/2014-AED Vol. IV (New Delhi: Directorate General of Civil Aviation, 2018), source">source.
- Ibid., Reg. 14.2.
- Ibid., Reg. 12.14 & 12.2.
- Ibid., Reg. 11.2 & 17.1.
- Ibid, Reg. 12.21.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), source">source.
- Procedures for Operation of Civil Remotely Piloted Aircraft Systems (RPAS) in Indian Airspace, AIP Supplement 164/2018 AAI/ATM/AIS/09-09/2018 (New Delhi: Airports Authority of India, 2018), source">source.
- Tender Document: Development, Hosting and Maintenance of Digital Sky Platform for Ministry of Civil Aviation IT-11042/1/2018-DIRECTORATE OF IT (New Delhi: Airports Authority of India, 2018), source">source.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), source">source.
- Ibid.
- Ibid.
- Drone Ecosystem Policy Roadmap (New Delhi: Ministry of Civil Aviation, 2019), source">source.
- Ibid, 7.
- Ibid, 14.
- The Personal Data Protection Bill, 2018 (New Delhi: Ministry of Electronics and Information Technology, 2018), source">source.
- White Paper of the Committee of Experts on a Data Protection Framework for India (New Delhi: Ministry of Electronics and Information Technology, 2017), source">source
- Petition to the Federal Aviation Administration: Drones and Privacy (Washington, D.C.: Electronic Privacy Information Center, 2012), source">source.
- Margot Kaminski, “Drone Federalism: Civilian Drones and the Things They Carry,” California Law Review 4 (2013): 57–74.
- Notice of Proposed Rulemaking: Operation of Small Unmanned Aircraft Systems Over People FAA–2018–1087 (Washington, D.C.: Federal Aviation Administration, 2019), source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), source">source.
- Arthur Holland Michel, Drones at Home: Local and State Drone Laws (New York: Center for the Study of the Drone, Bard College, 2017), source">source.
- Amanda Essex, Taking Off: State Unmanned Aircraft Systems Policies (Denver, CO: National Conference of State Legislatures, 2016), source">source.
- An Act Relating To Unmanned Aircraft Systems – Establishing Statewide Standards, Protecting Privacy, And Ensuring Public Safety (Virginia: American Legislative Exchange Council, 2017), source">source.
- Gautam Bhatia, “State Surveillance and the Right to Privacy in India: A Constitutional Biography,” National Law School of India Review 26 (2014): 127–158.
- (2019) 1 SCC 1.
- Ibid, 359.
- (2015) 5 SCC 1.
- Ibid, 167.
- Colin Snow, “Drones Pose a Unique Big Data Challenge For Business Users,” Forbes, February 6, 2019 source">source ; Michelle Chan, “What Businesses Need to Know About Drone Data,” Techwire Asia, February 13, 2019, source">source
- Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules ((New Delhi: Ministry of Electronics and Information Technology, 2011),<a href="source">source"> source">source ; Ibid. ; Rachel Finn and Anna Donovan, “Big Data, Drone Data: Privacy and Ethical Impacts of the Intersection Between Big Data and Civil Drone Deployments,” in The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, ed. Bart Custers (The Hague: TMC Asser Press, 2016), 47-67.
- As Solove remarks about the “Information Age:” “The data gathered about people is significantly more extensive, the process of combining it is much easier, and the computer technologies to analyze it are more sophisticated and powerful.” See Daniel Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review 154 (2006): 477, 506 ; Ibid., 507–08.
- Jordi Soria-Comas and Josep Domingo-Ferrer, “Big Data Privacy: Challenges to Privacy Principles and Models.” Data Science and Engineering 1 (2016): 21, 22. ; Justice KS Puttaswamy v. Union of India, (2017) 10 SCC 1.
- Guide to Basic Data Anonymisation Techniques (Singapore: Personal Data Protection Commission of Singapore, 2018), www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other-Guides/Guide-to-Anonymisation_v1-(250118).pdf.
- For a particularly stark situation, where the de-identification was considered near foolproof and yet re-identified, see Jean Louis Raisaro et al., “Addressing Beacon Re-Identification Attacks: Quantification and Mitigation of Privacy Risks,” Journal of the American Medical Informatics Association 24 (2017): 799, 800.
- Solon Barocas and Helen Nissenbaum, “Big Data’s End Run around Anonymity and Consent,” in Privacy, Big Data, and the Public Good, eds. Julia Lane et al. (New York, NY: Cambridge University Press, 2014), 44–45.
- Ira S Rubinstein, “Big Data: The End of Privacy or a New Beginning,” International Data Privacy Law 3 (2013): 74, 77–78; Davide Castelvecchi, “Can We Open the Black Box of AI?” Nature 538, no. 7623 (2016): 20.
- Mireille Hildebrandt, “Defining Profiling: A New Type of Knowledge?” in Profiling the European Citizen: Cross-Disciplinary Perspectives, eds. Mireille Hildebrandt and Serge Gutwirth (eBook: Springer, 2008), 17, 20.
- Nathaniel A Raymond, “Beyond ‘Do No Harm’ and Individual Consent: Reckoning with the Emerging Ethical Challenges of Civil Society’s Use of Data,” in Group Privacy: New Challenges of Data Technologies, eds. Linnet Taylor, Luciano Floridi and Bart van der Sloot (eBook: Springer, 2017): 67, 75.
- A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians (New Delhi: Ministry of Electronics and Information Technology, 2018), source">source.
- Ibid, 45–46.
- Ananth Padmanabhan and Anirudh Rastogi, “Big Data,” in Regulation in India: Design, Capacity, Performance, eds. Devesh Kapur and Madhav Khosla (London: Hart Publishing, 2019): 251, 262.
- Aleecia M. McDonald and Lorrie Faith Cranor, “The Cost of Reading Privacy Policies,” I/S Journal of Law and Policy, 4 (2008): 543, 565.
- Arthur Allen Leff, “Contract as Thing,” American University Law Review 19 (1970): 131.
- Nikhil Narendran, “Policy Framework for Protection of Big Data in State Possession,” in Blockchain for Property: A Roll Out Road Map for India, eds. Baladevan Rangaraju and Vishnu Chandra (New Delhi: India Institute, 2017): 34, 40.
- Rahul Matthan, Privacy 3.0: Unlocking Our Data-Driven Future (Noida: Harper Collins, 2018): 167–171.
- Carmine Cifaldi, “Unmanned Aircraft System Privacy and Data Protection,” in Handbook of Unmanned Aerial Vehicles, eds. K.P. Valavanis and G.J. Vachtsevanos (eBook: Springer, 2018): 1–19.
- Voluntary Best Practices for UAS Privacy, Transparency, and Accountability (Washington, D.C.: National Telecommunications and Information Administration, 2016), source">source.
- Clark D. Cunningham, “Apple and the American Revolution: Remembering Why We Have the fourth Amendment”, The Yale Law Journal, volume 126, source
- “ Breaking Down Apple’s iPhone Fight With the U.S. Government”, The New York Times, March 21, 2016, source
- Nick Statt, “Apple’s iCloud partner in China will store user data on servers of state-run telecom”, The Verge, July 18, 2018, source
- “Chen Guangcheng, Apple Can’t Resist Playing by China’s Rules”, The New York Times, January 23, 2018, source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, source
- Ibid., “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming), Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, source
- “Top 20 Countries with the Highest Number Of Internet Users”, source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, source
- Ibid.
- See Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, source
- Krishna Pokharel and Rajesh Roy, “India Says Rumors About Child Snatching on WhatsApp Led to Mob Killings”, The Wall Street Journal, July 5, 2018, source
- . Section 91, Code of Criminal Procedure, 1973
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, source
- Id.
- “Cross-Border Law Enforcement Demands: Analysis of the U.S. Department of Justice’s Proposed Bill”, Center for Democracy and Technology, August 17, 2016, source
- Bedavyasa Mohanty and Madhulika Srikumar, “Data localization is no solution,” The Hindu, August 3, 2018, source
- This, however, requires an executive agreement between the United States and the foreign country certifying that the state will rely on robust privacy protections, and respect for due process and the rule of law when making requests to companies directly. Such a framework over time, will not only need to be transparent and hold both companies and LEAs accountable but also be scalable to respond to the increasing volume and complexity of requests. Specifically, due process safeguards on user notification, redressal etc. will need to be incorporated. The U.S. Department of Justice recently issued clarifications on how the CLOUD Act will be operationalized available at source
- For more on the privacy protecting requirements under CLOUD Act, both at an institutional level and for individual requests, see Madhulika Srikumar, Debrae Kennedy-mayo, Peter Swire and Sreenidhi Srinivasan, “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- Sections 40 and 41, The Personal Data Protection Bill, 2018
- Ibid.
- Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, “A Free and Fair Digital Economy Protecting Privacy, Empowering Indians”, 27 July 2018
- Ministry of Electronics and Information Technology, “The Information Technology [Intermediaries Guidelines (Amendment) Rules] 2018,” source
- Pranesh Prakash,“Why Data Localisation Might Lead To Unchecked Surveillance,” Centre for Internet and Society, October 15, 2018, source ; “US criticises India's data localisation norms, draft e-commerce policy,” The Economic Times, April 9, 2019, source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, source
- Josh Constine,” Zuckerberg warns of authoritarian data localization trend,” Techcrunch, source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- “RBI data localisation: 80 percent players, including WhatsApp, comply with norms”, Business Standard, source -80-players-including-whatsapp-comply-with-norms-118101500907_1.html
- “Facebook takes a tough stand on data storage amidst India’s localisation push”, The Economic Times, source
- WhatsApp is working to comply with Reserve Bank of India (RBI) regulations on the local storage of payment-related data, the Economic Times reported. “Only some engineering work is left,” an anonymous senior Facebook executive told ET. source -mandate-report-why-is-it-needed/
- “India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, source
- Komal Gupta, “Google Agrees to Comply with RBI’s Data Localisation Norms,” Livemint , September 10, 2018, source">source Surabhi Aggarwal, “Industry bodies write to IT minister Ravi Shankar Prasad against data bill,” Economic Times, October 4, 2018, //economictimes.indiatimes.com/articleshow/66062141.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- See U.S. India Strategic Partnership Forum (USISPF) submission to MeitY available at source
- Aditya Kalra, “U.S. senators urge India to soften data localisation stance,” Reuters, October 13, 2018, source
- Ashish Shukla, “RBI refuses to extend deadline for data localisation,” IBTimes, October 14, 2018, source
- Bhavin Patel and Hemant Krishna, “Data Localisation: Here’s why the RBI isn’t listening to the ‘Mirroring’ argument,” CNBC TV18, October 15, 2018, source
- Rishab Bailey and Smriti Parsheera ,”Data localisation in India: Questioning the means and ends,”The Leap Blog, February 22, 2019, source
- Amazon not mirroring it abroad Whatsapp asked for 5 more months, mastercard and rest asked for one year
- “Russia fines Facebook $50 for failing to comply with local data privacy law, ” ZDNet, April 12, 2019, source ; Mark Scott, “Russia Prepares to Block LinkedIn After Court Ruling,” The New York Times, November 10, 2016, source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, source
- Government authorities increasingly rely on blocking access to internet altogether to contain cases of public unrest. See Timothy Mclaughlin ,“How Whatsapp Fuels Fake News And Violence In India, ” The Wired, December 12, 2018, source
- “Fighting fake news: Govt asks Whatsapp to take immediate action,” Economic Times, July 3, 2018, source
- The Indian government introduced the draft amendment to the Information Technology Act, 2008 to overhaul the current intermediary liability regime in India. One of the problematic provisions included the requirement for intermediaries to enable tracing the originator of messages. See Yesha Tshering Paul“ Fake News: Misguided Policymaking To Counter Misinformation,” Bloomberg Quint, January 14, 2019, source
- The Srikrishna Committee appointed to draft India’s first comprehensive data protection law introduced the term “fiduciaries” in the Personal Data Protection Bill, 2018. See Arghya Sengupta, “Why the Srikrishna Committee Rejected Ownership of Data in Favour of Fiduciary Duty,” The Wire, August 2, 2018, source
- For more on how Indian law enforcement agencies make requests for data under Indian law, see Chapter 3 in Srikumar et al., “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, source
- For instance, Facebook commits to fight back in court if requests are overbroad or defective. Chris Sonderby, “Sharing Our Latest Transparency Report,” Facebook Newsroom, May 23, 2019, source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, source
- See 3(13), Personal Data Protection Bill, 2018. Available at source; Stakeholders in India however have argued that the draft bill does not imbibe the philosophy of fiduciaries completely since certain sections in the bill still places the disproportionate onus on users to realize their rights. See comments submitted by Dvara Research to MeitY available at source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- See A Free and Fair Digital Economy Protecting Privacy, Empowering Indians: Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, July 27, 2018, available at source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- Id. , see Jack M.Balkin, "Fixing Social Media's Grand Bargain." Hoover Working Group on National Security, Technology, and Law, Aegis Series Paper 1814,2018.
- The author of this piece argues that Balkin’s fiduciary framework could eliminate the third party doctrine in the U.S. altogether binding all companies to a higher duty of care towards users. See Mike Godwin, It’s Time to Reframe Our Relationship With Facebook,” Slate, November 16, 2018, source; In India, the Supreme Court through the 2017 ruling recognising privacy as a fundamental right invalidated the application of third party doctrine. See Gautam Bhatia, “The Supreme Court’s Right to Privacy Judgment – IV: Privacy, Informational Self-Determination, and the Idea of Consent,” Indian Constitutional Law and Philosophy, August 2017, source
- Vivan Sharan, Sidharth Deb, “Reimagining fiduciaries in the digital economy,” Livemint, August, 15, 2018, source
- Ariel Dobkin, "Information Fiduciaries in Practice: Data Privacy and User Expectations." Berkeley Tech. LJ 33 2018: 1.
- Dalip Singh, “Law enforcement agencies favour data localisation “, Economic Times, October 8, 2018, source /articleshow/66113360.cms
- India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, source
- Aria Thaker, “Behind RBI’s digital payments panel, a controversial firm’s shadow, conflict of interest allegations”, Scroll, January 10, 2019, source; The Indian government’s motivation to create an environment favourable to domestic tech firms is most evident in its recent policy on Foreign Direct Investment in e-commerce. See “What India e-commerce policy entails for online retailers”, Livemint, January 16, 2019, source
- a. Aditya Kalra and Aditi Shah, “U.S. firms face off with Indian rival in lobbying against data storage rules,” Reuters, July 24, 2018, source">source b. Vidhi Choudhary and Yashwant Raj, “Cambridge Analytica row: Facebook data breach hit 560K Indian users,”Hindustan Times, April 5, 2018, source
- Prashant Reddy, “View: It's time to tame the social media beast,” Economic Times, February 13, 2019,//economictimes.indiatimes.com/articleshow/67966170.cms?from=mdr&utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- Ben Brody, “Tech Giants Back U.S. Bill Governing Cross-Border Data Searches,”Bloomberg, February 7, 2018, source
- Brad Smith, “A call for principle-based international agreements to govern law enforcement access to data,” Microsoft On the Issues, September 11, 2018, source
- Michael Punke, “AWS and the CLOUD Act,” AWS Security Blog, May 27, 2019, source">source ; Chaim Gartenberg, “Apple will launch a global web portal for law enforcement requests later this year,” The Verge, September 6, 2018, available at source">source; Kristen E. Eichensehr, “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming)
- “One year later: A cybersecurity commitment shared by more than 100 companies,” Tech Accord, May 9, 2019, source
- Mike Isaac, “Zuckerberg Plans to Integrate WhatsApp, Instagram and Facebook Messenger,” The New York Times, January 25, 2019, source
- Mike Isaac, “Facebook’s Mark Zuckerberg Says He’ll Shift Focus to Users’ Privacy,” The New York Times, March 6, 2019, source . Facebook’s official announcement is available at source
- Law enforcement agencies across the world make overbroad demands for location data to find suspects and witnesses at crime scenes. See Jennifer Valentino-Devries, “Tracking Phones, Google Is a Dragnet for the Police,” The New York Times, April 13, 2019, source; also on “reverse location warrants” see Aaron Mak, Close Enough, Slate, February 19, 2019, source; Matthew Haag, “FamilyTreeDNA Admits to Sharing Genetic Data With F.B.I.”, The New York Times, February 4, 2019, source
- Josh Costine, “Facebook will pass off content policy appeals to a new independent oversight body,” Techcrunch, source
Governing Data: Non-Discrimination and Non-Domination in Decision-Making (Joshua Simons)
Joshua Simons is a Sheldon Fellow in Government at Harvard University, and is writing about the politics and ethics of machine learning. His research argues that machine learning is political.
Introduction
This paper is about how modern democracies should govern data-driven decision-making. It examines the goals that democracies might require different institutions to embed in their decision-making procedures, including those that use machine learning. I compare the public philosophies and constitutions of America and India to contrast such goals, the elimination of discrimination and domination respectively.
The present is a critical moment in the governance of data-driven decision-making. Across the world, the debate about the governance of data and the technology companies is gaining pace.175 In India, the government has begun to develop a ‘data marketplace’ for private sector institutions to stimulate innovation.176 India is also on the cusp of adopting a comprehensive legislative framework to govern data-driven decision-making.177 The draft Data Protection Bill, built on the conceptual foundations of the Srikrishna Report, will be the first significant legislation to draw on the data fiduciary concept developed by American lawyers.178
At such a moment, it is important to pause to ask fundamental questions about what the governance of data should aim to achieve. This paper goes beyond familiar concerns about privacy to compare two ideas that might underpin such a governance framework: discrimination, which I associate with American law and politics; and domination, which I associate with Indian law and politics. The U.S. places on institutions only the negative requirement not to discriminate in their decision-making procedures.179 This limited goal does not address the ways in which, without intent or malpractice, decision-making procedures can compound and entrench patterns of inequality.
India’s approach in politics and law to addressing structural social inequality is founded on the concept of domination. In particular, the ambition to eliminate relations of domination is central to the Constitution of India and the writings and speeches of B.R. Ambedkar. India requires society’s most important institutions to embed in their decision procedures the goal of eliminating persistent structures of power between social groups, a goal that extends beyond simply the pursuit of efficiency and non-discrimination.
Other democracies can learn much from India’s traditions, including the U.S. The Indian idea of domination treats equity as a policy to be pursued in the name of democracy.180 This recognizes that pervasive and persistent inequalities of power—of resources and income, education and health, social status and respect—ultimately undermine democracy itself. The promise of political equality, the foundation of collective self-government, becomes a mirage. Because domination is a threat to democracy, institutions across the social, economic, and political spheres must embed the goal of eliminating it in their decision-making procedures.
India’s current approach to governing data neglects these ideas. Instead of drawing fromIndia’s own constitutional and philosophical traditions, the draft Data Protection Bill imports several flimsy concepts from American and European privacy law, including from the EU’s General Data Protection Regulation (GDPR). India should instead pursue its own approach, built on the idea of non-domination, rather than the shaky foundations of privacy. The governance of data should aim not just to protect privacy, but to promote equity.
This paper applies these ideas about non-domination to the governance of data-driven decision-making. It explores how the responsibilities of data fiduciaries, the conceptual pillar of India’s recent Data Protection Bill, might be extended to include responsibilities to address structural injustice. This could be done in a context-sensitive way, that varies across institutions and sectors.
The great strength of the non-domination principle is that it forces us to ask: Who decides? It focuses on who gets to make choices about the design of data-driven decision procedures that will shape the contours of our societies. As we march rapidly towards an algorithmic world, the question of what principles should underpin the governance of data-driven decision-making, will be among the most important political questions in the data-drenched twenty-first century.
The Challenge: Data and Decisions
Data-driven decision-making operates at three levels. First, society itself. Societies are characterized by differences and inequalities of all kinds. Some we do not regard as important, such as what brand of raincoats different groups choose to wear, what humor they prefer, or how they dance. Some are the result of persistent structures of power, such as the way that race, gender, caste and class shape educational and employment opportunities, access to healthcare or credit, or the ability to be seen and heard in public with dignity and respect.181
Second, data. Data sets almost always reflect these differences and inequalities. They show us not only which clothes or humor different groups prefer, but also the complex ways in which race, gender, caste, and class condition the opportunities certain groups are afforded. If African Americans or Dalits are routinely excluded from educational opportunities, property in safe and prosperous locations, or valuable jobs and promotions, then a large and complex dataset will reflect how being an African American or Dalit conditions—and therefore correlates with—the opportunities an individual is afforded in life. Data encodes social inequalities and the structures of power that produce them.182
Third, the decision-making procedure. Data sets can be used to make decisions in a number of ways. These range from simple linear models to sophisticated forms of machine learning. When an institution develops its decision-making procedure, it makes choices about how to structure that procedure. These include choices about the data-driven model itself: which data to train it on, which features to include, what to train it to predict, rank, or classify. These also include choices about how to combine the model with human decision-making, such as what kind of human oversight, if any, to impose.183
There are conflicting ideas about how data makes decisions different. On the one hand, data offers the opportunity to eliminate intractable human prejudice.184 On the other, data threatens to reinforce existing prejudices and inequalities. Wealthy, white, men are better represented in data. Using that data to make decisions—without human reflection or intervention—will simply reproduce those injustices.185
The truth is that we have choices about how we use data to make decisions. Data gives us control over our decision-making procedures, especially machine learning. It enables us to be explicit about the goals we wish to prioritize, the values we wish to promote, and the trade-offs we are willing to make. We can decide to impose a definition of fairness. Or we can decide to ignore issues of justice and equality, and blindly pursue accuracy and efficiency.
Data raises the stakes of these choices, about which values to embed in our decision-making procedure. Data-driven decision-making operates on a vast scale. This means that the choices an institution makes as it designs decision-making procedures will, over time, shape the lives of large numbers of people. Especially in India where data-driven programs operate on a caste scale. Aadhar, India’s national identification system, is now reported to cover almost 1.2 billion citizens.186
To understand the kinds of choices involved, consider an example. Imagine an online advertising tool that recommends job adverts to individuals. The recommendations reflect the past online behavior of users seeking job postings, in particular, which advertisements they clicked on and applied to. Suppose women on average clicked on lower paid jobs than men; the tool then recommends lower paid jobs to women compared to men. The institution designing the tool has three options, each with quite different technical and legal implications.
First, the institution could establish a decision-making procedure that reflects the world (read: data) as it is. This tool would show women lower paid jobs because that’s the data users have given them. Second, the institution could impose some fairness metric on their decision-making procedure. For example, they could impose a maximum difference between average incomes in job postings for men and women within a specified geographic area. Computer scientists have developed a series of sophisticated individual187 and group-based definitions188 of fairness (some of which cannot simultaneously be achieved)189 which could be imposed on the model. Third, the institution could use their decision-making procedure to change the world (read: data). They could show women higher paid jobs on average, subject to some reasonable constraint.
What choice should the institution designing the jobs recommendation tool make? What should our governance framework say about which choice the institution should make? This paper compares two ideas in the U.S. and India about the kinds of burdens that should be placed on institutions as they make these choices: discrimination and domination.190
Governing in America: Non-Discrimination
Over the past five decades, non-discrimination has become among the most important principles for governing decision-making procedures in the U.S. It is broadly accepted that institutions should ensure their decision-making procedures do not discriminate, including procedures that use data. Let us examine this principle by focusing on one particular law, Title VII of the Civil Rights Act of 1964, which prohibits discrimination against employees and applicants on the basis of race, color, sex, national origin, and religion.191
Recall our tool that recommends job adverts to users. The company who designs it has three possible choices: To reflect the world as it is and show women lower paid jobs on average, because those are the job postings they tend to click on; to impose some fairness constraint, such as specifying some maximum difference between the average income of jobs postings between men and women; or to change the world and show women higher paid jobs on average than men, subject to some reasonable constraint.
U.S. discrimination law would not require this company to pursue either of the final two strategies. To require the company to pursue these would, in effect, would require institutions in their decision-procedures to take affirmative action on behalf of protected groups. This extension of the non-discrimination principle has never gained broad purchase in the United States.192 To see why, let’s focus in more detail on Title VII. This will clarify the ideas and concepts that actually underpin the non-discrimination duty—and most importantly, their limits.
Two kinds of legal cases can be brought under Title VII, disparate treatment and disparate impact. Disparate treatment concerns direct discrimination in which similar people are formally treated differently, usually when there is demonstrable intent to discriminate. More important for our purposes is disparate impact, which is indirect discrimination that does not concern intent.193
A disparate impact case involves three questions. First, is there a disparate impact of this policy on members of a protected class? The plaintiff has to show that the decision-making procedure causes a disparate impact with respect to a protected class. Second, is there some business justification for this disparate impact? This has historically been the most important part of a disparate impact case. The defendant has the opportunity to show there is a legitimate business case for this procedure and thereby avoid liability. In data-driven decision-making, the answer is usually likely to be that the procedure accurately predicts something useful to the defendant. Third, is there a less discriminatory means of achieving the same ends? This may become the most important component of a Title VII case in relation to data-driven decision-making. The plaintiff can show that there is another decision-making procedure that achieves the same goal, but produces less discriminatory outcomes across a protected group. 194
In most cases, efficient data-driven decision-making procedures will not fall foul of Title VII discrimination law as currently constituted. This is because the principle of non-discrimination on which the law is developed does not capture cases in which data-driven decision-making procedures reinforce existing structures of inequality and disadvantage.195
Consider two goals that have driven the development of U.S. discrimination law, anti-classification and anti-subordination. The anti-classification goal aims to combat unfairness for individuals in certain protected classes that results from the choices of decision-makers. This mostly concerns formal or intentional discrimination. The anti-subordination goal aims to eradicate inequalities based on membership in protected classes; not just procedurally, but substantively. On the anti-subordination view, the purpose of disparate impact law is not only to unearth well-hidden cases of intentional discrimination, it is also to cover cases of unintentional discrimination which entrench existing patterns of inequality.
Legal theorists and courts have reached consensus only on the anti-classification goal. The law is not now thought by most to serve the purpose of addressing the complex structural inequalities to which disadvantaged groups are subject. Without the anti-subordination grounding, U.S. discrimination law has no basis on which to impose on institutions the requirement to address structural injustice in their decision-making procedures.196 “As a society,” the historian Michael Selmi argues, “we have never been committed to eradicating racial or gender inequality beyond immediate issues of intentional discrimination.”197
The problem with the non-discrimination principle is this. It reinforces the idea that beyond efficiency, the sole responsibility of institutions is to pursue neutrality or blindness in the design of their decision procedures. Institutions have no obligation to ensure that their procedures do not entrench existing structures of inequality.198 Non-discrimination constrains attempts to embed equity in the decision-making procedures of important institutions. It does not support the goal of transforming underlying structures of power or confronting persistent patterns of domination. As the feminist scholar Nancy Down argues, “discrimination analysis is designed to ensure that no one is denied an equal opportunity within the existing structure; it is not designed to change the structure to the least discriminatory, most opportunity-maximizing pattern.”199
I believe that non-discrimination, and the ideas of neutrality or blindness it entails, obscures the politics of debating and deciding between substantive aims, and the trade-offs required to achieve them. Negative duties of non-discrimination are not a satisfactory basis on which to develop a framework for governing data-driven decision-making.200 We must think explicitly about how we should treat individuals differently on the basis of the disadvantages associated with protected groups. The rest of this paper explores how the constitution of India and the arguments of B.R. Ambedkar might enable us to reason through that challenge. They explore another idea to underpin the governance of data-driven decision-making: non-domination.
Governing in India: Non-Domination
In 1950, India adopted a constitution that represented a new social and political experiment. On the eve of independence, most of those who became citizens could not read or write. India was a society characterized by profound hierarchies of power and deep differences of language, education, and culture. The constitution aimed to harness the power of the state to transform these entrenched hierarchies. This was to be achieved, in part, by imposing on institutions a wide range of responsibilities to directly address structural social injustices.
India’s constitution directly challenged the liberal idea that underpins the approach to non-discrimination in the United States, “that every attempt to resolve social question of inequality and material destitution by political means would lead to terror and absolutism.”201 As Sunil Khilnani explains, democracy in India promised “to bring the alien and powerful machine like that of the state under the control of human will…to enable a community of political equals before constitutional law to make their own history.”202 The Constitution, as K. G. Kannabiran describes it, particularly the Social and Economic Directives, expressly places “the state under obligation to eliminate inequalities in status, facilities, and opportunities between people.”203
These ideas were in large part B.R. Ambedkar’s.204 Ambedkar’s primary concern was with the relationship between the political sphere, on the one hand, and the social and economic spheres, on the other. His work explored what burdens the pursuit of political equality in a democracy placed on different actors to address manifest social and economic inequalities.
Introducing the Constitution in 1949, Ambedkar issued a warning to India’s Constituent Assembly. He warned his comrades, “not [to] be content with mere political democracy. We must make our political democracy a social democracy as well.” He continued:
On the 26th January 1950, we are going to enter into a life of contradictions. In politics we will have equality and in social and economic life we will have inequality. In politics we will be recognizing the principle of one man one vote and one vote one value. In our social and economic life, we shall, by reason of our social and economic structure, continue to deny the principle of one man one value. How long shall we continue to live this life of contradictions? How long shall we continue to deny equality in our social and economic life? If we continue to deny it for long, we will do so only by putting our political democracy in peril. We must remove this contradiction at the earliest possible moment or else those who suffer from inequality will blow up the structure of political democracy.205
The contradiction between formal political equality and social and economic inequality is, in the end, a threat to democracy. For Ambedkar, if the equal worth of each citizen in politics stands in stark contrast to persistent inequalities in the economic and social spheres, political equality becomes a mere formalism. The idea of democracy becomes a mirage. Since patterns of domination reproduce persistent inequalities, democracy itself depends on the practical and continuous goal of eliminating patterns of domination.206
This prompts a series of important political questions: Who has what burdens to eliminate non-domination? How should they be imposed? Ambedkar’s reflections on these questions formed the basis of some of the most ambitious provisions in India’s Constitution. The idea was to embed social transformation into the aims and procedures of society’s most important institutions. Powerful institutions were explicitly required to direct their efforts towards the transformation of society. These were the politics of confronting a long history of injustice.
There are two relevant parts of the constitution. In Part III on Fundamental Rights, Article 14 establishes equality before the law; Article 15 prohibits discrimination on the grounds of religion, race, caste, sex, or place of birth; Article 16 establishes equality of opportunity in public employment; and Article 17 prohibits the practice of untouchability. Second, Part IV the Directive Principles of State Policy, which cannot be enforced in law, establish “equality as a policy aimed at bringing about…changes in the structure of society.”207
The implications of these provisions for public sector institutions are reasonably clear: their decision-making procedures must contribute to the elimination patterns of domination. For instance, in 1980, the Supreme Court ruled the policies of reservation and affirmative action of the Indian Railway Board to be consistent with the constitution’s aims and purposes. The Court argued that the State was in fact required to pursue policies of affirmative action—that is, to treat individuals differently based on their membership of groups historically subject to patterns of domination. Issuing the judgment, Justice Krishna Iyer wrote: “the Indian Constitution is a National Charter pregnant with social revolution, not a Legal Parchment barren of militant values, to usher in a democratic, secular, socialist society which belongs equally to the masses hungering for a human deal after feudal colonial history’s long night.”208
The implications for private institutions are less clear. Case law is still developing. Consider the scope of Article 15 (2), which states that no citizen can be restricted on protected grounds from access to “shops, public restaurants, hotels and places of public entertainment, as well as places of public resort dedicated to the use of the general public.” In a 2011 case, the Army College of Medical Services (ACMS) in New Delhi devised its own merit-based admissions procedure. The Court found the procedure to be unconstitutional. Its reasoning stated that private sector institutions were subject to the provisions of Article 15. “If a vast majority of our youngers, especially those belonging to disadvantaged groups, are denied access in the higher educational institutions in the private sector,” argued the judgment, “it would mean that a vast majority of youngers…belonging to disadvantaged groups would be left without access to higher education at all.”
The court drew on Ambedkar’s arguments in the Constituent Assembly debates, to expand the scope of the word “shop” to include private educational institutions. The ACMS admissions procedure, the Court found, produced disparate impact, reinforcing the disadvantage of students from disadvantaged backgrounds. Since ACMS was subject to the provision of Article 15 (2), and its admissions procedure produced demonstrable disparate impact against disadvantaged students, it was unacceptable.
More interesting was the Court’s interpretation of the word “only” when referring to the prohibited grounds of discrimination. They interpreted the word not to prohibit merely explicit or intentional discrimination on the grounds of some protected trait, as courts tend to in the U.S. Instead, the word meant that “the private establishment” must “ensure that the consequences” of its “rules of access . . .do not contribute to the perpetration of the unwarranted social disadvantages associated with the functioning of the social, cultural and economic order.”209 In other words, India’s Supreme Court has been willing to extend constitutional provisions beyond the requirements of non-discrimination. These provisions require private sector institutions to embed the aim of eliminating patterns of domination in their decision procedures.
Non-Domination in Decision-Making
How far this provision will extend remains to be seen, but the underlying idea is clear. Democracy depends on the promise of political equality. This promise is undermined by entrenched patterns of domination. These patterns can be reproduced not only by the state, but by institutions that perform public functions or that distribute important goods, such as employers, landlords, banks, telephone networks, and so on. When these institutions establish their decision-making procedures—hiring and firing, promoting and demoting, setting rent and granting mortgages—they must bear some of the burdens of eliminating patterns of domination.
As Justice Bhagwati, the 17th Chief Justice of India, wrote: “In a hierarchical society with an indelible feudal stamp and incurable actual inequality, it is absurd to suggest that progressive measures to eliminate group disabilities…are antagonistic to equality on the ground that every individual is entitled to equality of opportunity based purely on merit.”210
Let’s explore the implications of the non-domination principle for the governance of data-driven decision-making. Recall the example with which this essay began: the tool that recommends jobs adverts. I argued that that the U.S. non-discrimination principle provides no grounds for placing any responsibility on a public or private institution to either impose some fairness constraint, such as limiting the difference between the average incomes of job posting seen by men and women, or to show women higher average incomes than men, on the grounds that doing so would be to pursue some defensible aim of social justice.
The non-domination approach provides grounds for imposing the responsibility to pursue both of these more ambitious aims. It could require public and private institutions to impose some kind of fairness constraint on their data-driven decision-making procedures, or to construct that procedure to specifically eliminate patterns of domination. The Indian non-domination approach provides a conceptual and legal basis for applying many of the technical approaches to fairness developed in the computer science literature.211
India could develop an approach to governing data built on this non-domination principle. This could be done by broadening the responsibilities of data fiduciaries, established in the draft Data Protection Bill.212 The fiduciary concept rests on the idea of a relationship of trust. Banks are custodians of customers’ money; internet companies are custodians of customers’ data. That relationship of trust entails responsibilities for the fiduciary to act in the best interests of consumers. For instance, processing data is permitted only for purposes that the consumer might “reasonably expect.”213 In a country where citizens expect institutions to bear the responsibility of eliminating patterns of domination,214 the concept of trust might plausibly impose quite significant burdens on grant fiduciaries. They might be required to identify and raise important trade-off choices as they design and develop data-driven decision-making procedures, especially those that bear on entrenched social inequalities. Those choices could then be subject to meaningful public oversight, through explicit regulatory provisions, civil society organizations, and public debate.
Incorporating the non-domination principle into these fiduciary requirements of trust may stretch the idea of trust to its limits. This is not because non-domination is too ambitious an aim, but because the governance of data is about more than privacy. If trust cannot incorporate ideas like non-domination, fairness, and justice, the data fiduciary concept may prove limited in a world of algorithmic decision-making and machine learning. Jack Balkin, who first coined the information fiduciary concept, has written about this challenge. 215
Instead, more comprehensive structural regulation may be required. Such regulation must leave room for flexibility and variation. Eliminating patterns of domination may be part of the pursuit of political equality (essential in any democracy), but considerable variation should be permitted in terms of how this aim is embedded into decision-making procedures. Overly prescriptive and specific regulatory requirements would undermine the institutional innovation that is required to achieve the overall goal.216
At this critical moment in the development of regimes to govern data, we must pause to ask fundamental questions about the ideas and aims that should underpin them. The American approach, guided by the principle of non-discrimination, does not impose on institutions the obligation to transform entrenched social inequalities through their decision-making procedures. In an algorithmic society, in which decisions are ever more often made or informed by algorithmic procedures, there is a risk that these structures of injustice are reproduced on a vast scale that becomes ever harder to adjust. A giant form of path dependency.
The Indian approach, guided by the principle of non-domination, holds that decision-making procedures, in both private and public institutions, are the right place to intervene to address structural injustice. Many difficult questions—about the extent of the responsibilities that different institutions should bear—remain unanswered and profoundly under-theorized.
But what the Indian approach makes clear is that a comprehensive approach to governing data-driven decision-making cannot simply address issues of privacy. Such an approach must confront intractable questions about the burdens of pursuing political equality. After all, as Ambedkar argued, nothing less than the future of democracy is at stake. This has never been truer than in a world in which data-driven decision-making is pervasive.
Conclusion: Who Decides?
I would like to end by drawing attention to perhaps the most significant strength of the Indian approach and the non-domination principle on which it rests. It brings to the surface the politics of decision-making. It makes visible the inevitable trade-offs involved in establishing a decision-making procedure. It therefore forces us to confront the choices we have about the burdens we wish to impose on institutions as they establish those decision-making procedures. It forces us to ask what we wish to achieve and how.
This is an important strength in an algorithmic world. Too often, political choices are buried in the technical details of decision-making procedures. In machine learning, for instance, they are buried in choices about the construction of the dataset, choices about the outcome of interest or target variable, or which variables to include in the model. The risk is that a great many of the political choices necessary in a democracy are buried in the technical decision-making procedures of institutions, beyond the reach of legislative action and political debate. The pursuit of justice is moved slowly but imperceptibly outside the sphere of democratic politics.
Too often, political choices are buried in the technical details of decision-making procedures.
Avoiding this outcome will require comprehensive legislation. That legislation must not only set out the responsibilities of different institutions to address structural injustice in their decision-making procedures. It must also take on an even harder task: establishing the right institutional structure to enforce those provisions. There is a difficult balance to be struck. Regulation should not aim to specify precisely who has which burdens in every case; regulatory overreach can stifle democracy, as well as protect it. Yet without regulation, there can be no democratic oversight at all. This is not a tension specific to algorithmic decision-making, but rather, one that characterizes the relationship between democracy and the modern administrative state. But as ever, data and algorithms raise the stakes.217
The great strength of the non-domination principle is that it forces us to ask: Who decides? The risk is that we pretend that nobody decides. In practice, this means that institutions will decide unilaterally, often in secret and without public oversight, which priorities and values to build into their decision-making procedures. In the case of our example of the job recommendations tool, Google and Facebook decide, without accountability, whether they wish to pursue efficiency, fairness, or non-domination. With the right framework, Google and Facebook may decide first, but their decisions would then be subject to regulatory provisions. And those provisions would, in turn, be subject to the oversight of democratic institutions.
As our societies make more and more important decisions using data, democracies must make choices about how they wish to distribute the burdens of pursuing justice. Ignoring these choices will simply narrow the possibilities of political action, producing a kind of political atrophy, eroding the capacity of citizens to govern themselves in democratic politics. To stimulate their thinking as they confront these choices, democracies all over the world should draw on the writings of B.R. Ambedkar and the provisions of the Constitution of India.
This Indian approach, founded on the principle of non-domination, can provide an approach to governing data-driven decision-making that diverges from the familiar provisions of late twentieth century Anglo-American liberalism.
Citations
- The Global Risks Report 2018 13th Edition, [Geneva: World Economic Forum,2018] <a href="<a href="source">source">source">source.
- The United Nations World Water Development Report 2018: Nature-Based Solutions for Water, [Paris: WWAP (United Nations World Water Assessment Programme) /UN-Water, 2018, UNESCO] <a href="<a href="source">source">source">source.
- Martina Flörke, Christof Schneider, and Robert I. McDonald, "Water competition between cities and agriculture driven by climate change and urban growth," Nature Sustainability 1, no. 1 (2018): 51.
- Peter H. Gleick, "Global freshwater resources: soft-path solutions for the 21st century," Science 302, no. 5650 (2003): 1524-1528.
- Ibid.
- Negative externalities are costs that impact a party that does not have a role in its creation. For instance, vehicular pollution generated by a specific individual affecting people nearby. Negative externalities cause market failures.
- Collection action problem occurs when individuals pursuing a common goal do not cooperate due to competing interests.
- Free rider issues occur when individuals who do not pay for a good or service reap its benefit. Too many free riders results in over-exploitation or under-production of the good or service.
- Richard E. Howitt, Richard E. and Kristiana Hansen, "The Evolving Western Water Markets," Choices 20, no. 316-2016-6565 (2005): 59.
- Guy Le MoigneShawki Barghouti, Gershon Feder, Lisa Garbus, and Mei Xie, "Country experiences with water resources management," World Bank Technical Paper 175 (1992).
- Ereney Hadjigeorgalis, "A Place for Water Markets: Performance and Challenges," Review of Agricultural Economics 31, no. 1 (2009): 50-67.
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- C. Wilson, Adverse Selection, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics, Palgrave Macmillan, 2008]
- Y. Kotowitz, Moral Hazard, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- J.O. Ledyard, Market Failure, In: Palgrave Macmillan (eds)[London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- David S. Brookshire, Bonnie Colby, Mary Ewers, and Philip T. Ganderton, "Market Prices for Water in the Semiarid West of the United States," Water Resources Research 40, no. 9 (2004).
- John Freebairn and John Quiggin, "Water rights for variable supplies," Australian Journal of Agricultural and Resource Economics 50, no. 3 (2006): 295-312.
- A. Dinar, M. Rosegrant, R. Meinzen-Dick, "Water allocation mechanisms: Principles and examples," The World Bank Policy Research Working Paper 1779 (June 1997).
- Jill E. Hobbs, "Information asymmetry and the role of traceability systems," Agribusiness: An International Journal 20, no. 4 (2004): 397-415.
- Max H. Bazerman and James J. Gillespie, "Betting on the future: The virtues of contingent contracts," Harvard Business Review 77 (1999): 155-162.
- Stefaan G. Verhulst, "Information Asymmetries, Blockchain Technologies, and Social Change," Medium, July 24, 2018, <a href="<a href="source">source">source">source.
- Sloane Brakeville, and Bhargav Perepa, "Blockchain Basics: Introduction to Distributed Ledgers," IBM Developer, March 18, 2018, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- Nigel Gopie, "What Are Smart Contracts on Blockchain?" Blockchain Pulse: IBM Blockchain Blog, July 02, 2018, <a href="<a href="source">source">source">source.
- "Civic Use Cases," Helping Governments to Be More Accessible, Efficient and Effective. <a href="<a href="source">source">source">source.
- "Civic Ledger Pty Ltd.," Australian Water Partnership. <a href="<a href="source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "Water Markets and Trade," Australian Government – Murray-Darling Basin Authority, Sept. 29, 2015. <a href="<a href="source">source">source">source.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="source">source">source">source.
- Ibid.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management. September 2018.
- Ibid.
- The term “smart” in this context indicates the use of internet of things, big data, predictive analytics integrated over blockchain network as underlying technologies to facilitate the operations of a water market.
- Jayachandran Praveen, “The Difference between Public and Private Blockchain," Blockchain Pulse: IBM Blockchain Blog, Aug. 06, 2018, <a href="<a href="source">source">source">source.
- J.R. DeShazo, Gregory Pierce, and Henry McCann, “Los Angeles County Community Water Systems Atlas and Policy Guide: Supply Vulnerabilities, At-Risk Populations, Conservation Opportunities, Pricing Policies, and Customer Assistance Programs,” UCLA: Luskin Center for Innovation, (2015), <a href="<a href="source">source">source">source; U.S. Census Bureau Quick Facts: Los Angeles County, California," Census Bureau Quick Facts, July 1, 2017, <a href="<a href="source">source">source">source.
- S. Pincetl et al., “Water Management in Los Angeles County: a Research Report,” Los Angeles: UCLA, Institute of Environment and Sustainability, 2015, <a href="<a href="source">source">source">source
- Ibid.
- Ibid.
- J.R. DeShazo and Gregory Pierce, "Quantifying the Benefits and Designing Governance Structures for a Water Market in Los Angeles County," [Los Angeles: UCLA, Luskin Center for Innovation, Oct. 2016] <a href="<a href="source">source">source">source
- Bengaluru Water Board, “Blueprint for Future,” <a href="<a href="source">source">source">source.
- Bangalore Water Supply and Sewerage Board, "About BWSSB," Bangalore Water Supply and Sewerage Board. <a href="<a href="source">source">source">source.
- Bengaluru Water Board, “Blueprint for Future," <a href="<a href="source">source">source">source.
- Malini Ranganathan, "'Mafias' in the waterscape: Urban informality and everyday public authority in Bangalore," Water Alternatives 7, no. 1 (2014).
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- Bart Elias, Unmanned Aircraft Operations in Domestic Airspace: U.S. Policy Perspectives and the Regulatory Landscape (Washington, D.C.: Congressional Research Service, 2016), <a href="source">source">source.
- Tom Hancock and Wang Xueqiao, “China’s DJI targets agriculture as consumer drone sales slow,” Financial Times, March 25, 2019, <a href="source">source">source.
- Richard Levick, “Drone Industry Just Beginning To Take Off,” Forbes, May 15, 2018, <a href="source">source">source.
- Ujjwal Bakshi and Manash Neog, “Much to Drone About,” Economic Times, April 4, 2019, <a href="source">source">source.
- Therese Jones, International Commercial Drone Regulation and Drone Delivery Services (Santa Monica: RAND Corporation, 2017), <a href="source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="source">source">source.
- Somya Lohia, “Drone Regulations 1.0 Can Fetch India Major Slice of $100 Billion Industry,” Money Control, January 9, 2019, <a href="source">source">source.
- Civil Aviation Requirements Series X Part I Issue I: Requirements for Operation of Civil Remotely Piloted Aircraft System (RPAS), F. No. 05-13/2014-AED Vol. IV (New Delhi: Directorate General of Civil Aviation, 2018), <a href="source">source">source.
- Ibid., Reg. 14.2.
- Ibid., Reg. 12.14 & 12.2.
- Ibid., Reg. 11.2 & 17.1.
- Ibid, Reg. 12.21.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="source">source">source.
- Procedures for Operation of Civil Remotely Piloted Aircraft Systems (RPAS) in Indian Airspace, AIP Supplement 164/2018 AAI/ATM/AIS/09-09/2018 (New Delhi: Airports Authority of India, 2018), <a href="source">source">source.
- Tender Document: Development, Hosting and Maintenance of Digital Sky Platform for Ministry of Civil Aviation IT-11042/1/2018-DIRECTORATE OF IT (New Delhi: Airports Authority of India, 2018), <a href="source">source">source.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="source">source">source.
- Ibid.
- Ibid.
- Drone Ecosystem Policy Roadmap (New Delhi: Ministry of Civil Aviation, 2019), <a href="source">source">source.
- Ibid, 7.
- Ibid, 14.
- The Personal Data Protection Bill, 2018 (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="source">source">source.
- White Paper of the Committee of Experts on a Data Protection Framework for India (New Delhi: Ministry of Electronics and Information Technology, 2017), <a href="source">source">source
- Petition to the Federal Aviation Administration: Drones and Privacy (Washington, D.C.: Electronic Privacy Information Center, 2012), <a href="source">source">source.
- Margot Kaminski, “Drone Federalism: Civilian Drones and the Things They Carry,” California Law Review 4 (2013): 57–74.
- Notice of Proposed Rulemaking: Operation of Small Unmanned Aircraft Systems Over People FAA–2018–1087 (Washington, D.C.: Federal Aviation Administration, 2019), <a href="source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="source">source">source.
- Arthur Holland Michel, Drones at Home: Local and State Drone Laws (New York: Center for the Study of the Drone, Bard College, 2017), <a href="source">source">source.
- Amanda Essex, Taking Off: State Unmanned Aircraft Systems Policies (Denver, CO: National Conference of State Legislatures, 2016), <a href="source">source">source.
- An Act Relating To Unmanned Aircraft Systems – Establishing Statewide Standards, Protecting Privacy, And Ensuring Public Safety (Virginia: American Legislative Exchange Council, 2017), <a href="source">source">source.
- Gautam Bhatia, “State Surveillance and the Right to Privacy in India: A Constitutional Biography,” National Law School of India Review 26 (2014): 127–158.
- (2019) 1 SCC 1.
- Ibid, 359.
- (2015) 5 SCC 1.
- Ibid, 167.
- Colin Snow, “Drones Pose a Unique Big Data Challenge For Business Users,” Forbes, February 6, 2019 <a href="source">source">source ; Michelle Chan, “What Businesses Need to Know About Drone Data,” Techwire Asia, February 13, 2019, <a href="source">source">source
- Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules ((New Delhi: Ministry of Electronics and Information Technology, 2011),<a href="<a href="source">source">source"> <a href="source">source">source ; Ibid. ; Rachel Finn and Anna Donovan, “Big Data, Drone Data: Privacy and Ethical Impacts of the Intersection Between Big Data and Civil Drone Deployments,” in The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, ed. Bart Custers (The Hague: TMC Asser Press, 2016), 47-67.
- As Solove remarks about the “Information Age:” “The data gathered about people is significantly more extensive, the process of combining it is much easier, and the computer technologies to analyze it are more sophisticated and powerful.” See Daniel Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review 154 (2006): 477, 506 ; Ibid., 507–08.
- Jordi Soria-Comas and Josep Domingo-Ferrer, “Big Data Privacy: Challenges to Privacy Principles and Models.” Data Science and Engineering 1 (2016): 21, 22. ; Justice KS Puttaswamy v. Union of India, (2017) 10 SCC 1.
- Guide to Basic Data Anonymisation Techniques (Singapore: Personal Data Protection Commission of Singapore, 2018), www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other-Guides/Guide-to-Anonymisation_v1-(250118).pdf.
- For a particularly stark situation, where the de-identification was considered near foolproof and yet re-identified, see Jean Louis Raisaro et al., “Addressing Beacon Re-Identification Attacks: Quantification and Mitigation of Privacy Risks,” Journal of the American Medical Informatics Association 24 (2017): 799, 800.
- Solon Barocas and Helen Nissenbaum, “Big Data’s End Run around Anonymity and Consent,” in Privacy, Big Data, and the Public Good, eds. Julia Lane et al. (New York, NY: Cambridge University Press, 2014), 44–45.
- Ira S Rubinstein, “Big Data: The End of Privacy or a New Beginning,” International Data Privacy Law 3 (2013): 74, 77–78; Davide Castelvecchi, “Can We Open the Black Box of AI?” Nature 538, no. 7623 (2016): 20.
- Mireille Hildebrandt, “Defining Profiling: A New Type of Knowledge?” in Profiling the European Citizen: Cross-Disciplinary Perspectives, eds. Mireille Hildebrandt and Serge Gutwirth (eBook: Springer, 2008), 17, 20.
- Nathaniel A Raymond, “Beyond ‘Do No Harm’ and Individual Consent: Reckoning with the Emerging Ethical Challenges of Civil Society’s Use of Data,” in Group Privacy: New Challenges of Data Technologies, eds. Linnet Taylor, Luciano Floridi and Bart van der Sloot (eBook: Springer, 2017): 67, 75.
- A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="source">source">source.
- Ibid, 45–46.
- Ananth Padmanabhan and Anirudh Rastogi, “Big Data,” in Regulation in India: Design, Capacity, Performance, eds. Devesh Kapur and Madhav Khosla (London: Hart Publishing, 2019): 251, 262.
- Aleecia M. McDonald and Lorrie Faith Cranor, “The Cost of Reading Privacy Policies,” I/S Journal of Law and Policy, 4 (2008): 543, 565.
- Arthur Allen Leff, “Contract as Thing,” American University Law Review 19 (1970): 131.
- Nikhil Narendran, “Policy Framework for Protection of Big Data in State Possession,” in Blockchain for Property: A Roll Out Road Map for India, eds. Baladevan Rangaraju and Vishnu Chandra (New Delhi: India Institute, 2017): 34, 40.
- Rahul Matthan, Privacy 3.0: Unlocking Our Data-Driven Future (Noida: Harper Collins, 2018): 167–171.
- Carmine Cifaldi, “Unmanned Aircraft System Privacy and Data Protection,” in Handbook of Unmanned Aerial Vehicles, eds. K.P. Valavanis and G.J. Vachtsevanos (eBook: Springer, 2018): 1–19.
- Voluntary Best Practices for UAS Privacy, Transparency, and Accountability (Washington, D.C.: National Telecommunications and Information Administration, 2016), <a href="source">source">source.
- Clark D. Cunningham, “Apple and the American Revolution: Remembering Why We Have the fourth Amendment”, The Yale Law Journal, volume 126, source">source
- “ Breaking Down Apple’s iPhone Fight With the U.S. Government”, The New York Times, March 21, 2016, source">source
- Nick Statt, “Apple’s iCloud partner in China will store user data on servers of state-run telecom”, The Verge, July 18, 2018, source">source
- “Chen Guangcheng, Apple Can’t Resist Playing by China’s Rules”, The New York Times, January 23, 2018, source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, source">source
- Ibid., “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming), Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, source">source
- “Top 20 Countries with the Highest Number Of Internet Users”, source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, source">source
- Ibid.
- See Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, source">source
- Krishna Pokharel and Rajesh Roy, “India Says Rumors About Child Snatching on WhatsApp Led to Mob Killings”, The Wall Street Journal, July 5, 2018, source">source
- . Section 91, Code of Criminal Procedure, 1973
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, source">source
- Id.
- “Cross-Border Law Enforcement Demands: Analysis of the U.S. Department of Justice’s Proposed Bill”, Center for Democracy and Technology, August 17, 2016, source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Data localization is no solution,” The Hindu, August 3, 2018, source">source
- This, however, requires an executive agreement between the United States and the foreign country certifying that the state will rely on robust privacy protections, and respect for due process and the rule of law when making requests to companies directly. Such a framework over time, will not only need to be transparent and hold both companies and LEAs accountable but also be scalable to respond to the increasing volume and complexity of requests. Specifically, due process safeguards on user notification, redressal etc. will need to be incorporated. The U.S. Department of Justice recently issued clarifications on how the CLOUD Act will be operationalized available at source">source
- For more on the privacy protecting requirements under CLOUD Act, both at an institutional level and for individual requests, see Madhulika Srikumar, Debrae Kennedy-mayo, Peter Swire and Sreenidhi Srinivasan, “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- Sections 40 and 41, The Personal Data Protection Bill, 2018
- Ibid.
- Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, “A Free and Fair Digital Economy Protecting Privacy, Empowering Indians”, 27 July 2018
- Ministry of Electronics and Information Technology, “The Information Technology [Intermediaries Guidelines (Amendment) Rules] 2018,” source">source
- Pranesh Prakash,“Why Data Localisation Might Lead To Unchecked Surveillance,” Centre for Internet and Society, October 15, 2018, source">source ; “US criticises India's data localisation norms, draft e-commerce policy,” The Economic Times, April 9, 2019, source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, source">source
- Josh Constine,” Zuckerberg warns of authoritarian data localization trend,” Techcrunch, source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- “RBI data localisation: 80 percent players, including WhatsApp, comply with norms”, Business Standard, source">source -80-players-including-whatsapp-comply-with-norms-118101500907_1.html
- “Facebook takes a tough stand on data storage amidst India’s localisation push”, The Economic Times, source">source
- WhatsApp is working to comply with Reserve Bank of India (RBI) regulations on the local storage of payment-related data, the Economic Times reported. “Only some engineering work is left,” an anonymous senior Facebook executive told ET. source">source -mandate-report-why-is-it-needed/
- “India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, source">source
- Komal Gupta, “Google Agrees to Comply with RBI’s Data Localisation Norms,” Livemint , September 10, 2018, <a href="source">source">source">source Surabhi Aggarwal, “Industry bodies write to IT minister Ravi Shankar Prasad against data bill,” Economic Times, October 4, 2018, //economictimes.indiatimes.com/articleshow/66062141.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- See U.S. India Strategic Partnership Forum (USISPF) submission to MeitY available at source">source
- Aditya Kalra, “U.S. senators urge India to soften data localisation stance,” Reuters, October 13, 2018, source">source
- Ashish Shukla, “RBI refuses to extend deadline for data localisation,” IBTimes, October 14, 2018, source">source
- Bhavin Patel and Hemant Krishna, “Data Localisation: Here’s why the RBI isn’t listening to the ‘Mirroring’ argument,” CNBC TV18, October 15, 2018, source">source
- Rishab Bailey and Smriti Parsheera ,”Data localisation in India: Questioning the means and ends,”The Leap Blog, February 22, 2019, source">source
- Amazon not mirroring it abroad Whatsapp asked for 5 more months, mastercard and rest asked for one year
- “Russia fines Facebook $50 for failing to comply with local data privacy law, ” ZDNet, April 12, 2019, source">source ; Mark Scott, “Russia Prepares to Block LinkedIn After Court Ruling,” The New York Times, November 10, 2016, source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, source">source
- Government authorities increasingly rely on blocking access to internet altogether to contain cases of public unrest. See Timothy Mclaughlin ,“How Whatsapp Fuels Fake News And Violence In India, ” The Wired, December 12, 2018, source">source
- “Fighting fake news: Govt asks Whatsapp to take immediate action,” Economic Times, July 3, 2018, source">source
- The Indian government introduced the draft amendment to the Information Technology Act, 2008 to overhaul the current intermediary liability regime in India. One of the problematic provisions included the requirement for intermediaries to enable tracing the originator of messages. See Yesha Tshering Paul“ Fake News: Misguided Policymaking To Counter Misinformation,” Bloomberg Quint, January 14, 2019, source">source
- The Srikrishna Committee appointed to draft India’s first comprehensive data protection law introduced the term “fiduciaries” in the Personal Data Protection Bill, 2018. See Arghya Sengupta, “Why the Srikrishna Committee Rejected Ownership of Data in Favour of Fiduciary Duty,” The Wire, August 2, 2018, source">source
- For more on how Indian law enforcement agencies make requests for data under Indian law, see Chapter 3 in Srikumar et al., “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, source">source
- For instance, Facebook commits to fight back in court if requests are overbroad or defective. Chris Sonderby, “Sharing Our Latest Transparency Report,” Facebook Newsroom, May 23, 2019, source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, source">source
- See 3(13), Personal Data Protection Bill, 2018. Available at source">source; Stakeholders in India however have argued that the draft bill does not imbibe the philosophy of fiduciaries completely since certain sections in the bill still places the disproportionate onus on users to realize their rights. See comments submitted by Dvara Research to MeitY available at source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- See A Free and Fair Digital Economy Protecting Privacy, Empowering Indians: Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, July 27, 2018, available at source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- Id. , see Jack M.Balkin, "Fixing Social Media's Grand Bargain." Hoover Working Group on National Security, Technology, and Law, Aegis Series Paper 1814,2018.
- The author of this piece argues that Balkin’s fiduciary framework could eliminate the third party doctrine in the U.S. altogether binding all companies to a higher duty of care towards users. See Mike Godwin, It’s Time to Reframe Our Relationship With Facebook,” Slate, November 16, 2018, source">source; In India, the Supreme Court through the 2017 ruling recognising privacy as a fundamental right invalidated the application of third party doctrine. See Gautam Bhatia, “The Supreme Court’s Right to Privacy Judgment – IV: Privacy, Informational Self-Determination, and the Idea of Consent,” Indian Constitutional Law and Philosophy, August 2017, source">source
- Vivan Sharan, Sidharth Deb, “Reimagining fiduciaries in the digital economy,” Livemint, August, 15, 2018, source">source
- Ariel Dobkin, "Information Fiduciaries in Practice: Data Privacy and User Expectations." Berkeley Tech. LJ 33 2018: 1.
- Dalip Singh, “Law enforcement agencies favour data localisation “, Economic Times, October 8, 2018, source">source /articleshow/66113360.cms
- India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, source">source
- Aria Thaker, “Behind RBI’s digital payments panel, a controversial firm’s shadow, conflict of interest allegations”, Scroll, January 10, 2019, source">source; The Indian government’s motivation to create an environment favourable to domestic tech firms is most evident in its recent policy on Foreign Direct Investment in e-commerce. See “What India e-commerce policy entails for online retailers”, Livemint, January 16, 2019, source">source
- a. Aditya Kalra and Aditi Shah, “U.S. firms face off with Indian rival in lobbying against data storage rules,” Reuters, July 24, 2018, <a href="source">source">source">source b. Vidhi Choudhary and Yashwant Raj, “Cambridge Analytica row: Facebook data breach hit 560K Indian users,”Hindustan Times, April 5, 2018, source">source
- Prashant Reddy, “View: It's time to tame the social media beast,” Economic Times, February 13, 2019,//economictimes.indiatimes.com/articleshow/67966170.cms?from=mdr&utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- Ben Brody, “Tech Giants Back U.S. Bill Governing Cross-Border Data Searches,”Bloomberg, February 7, 2018, source">source
- Brad Smith, “A call for principle-based international agreements to govern law enforcement access to data,” Microsoft On the Issues, September 11, 2018, source">source
- Michael Punke, “AWS and the CLOUD Act,” AWS Security Blog, May 27, 2019, <a href="source">source">source">source ; Chaim Gartenberg, “Apple will launch a global web portal for law enforcement requests later this year,” The Verge, September 6, 2018, available at <a href="source">source">source">source; Kristen E. Eichensehr, “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming)
- “One year later: A cybersecurity commitment shared by more than 100 companies,” Tech Accord, May 9, 2019, source">source
- Mike Isaac, “Zuckerberg Plans to Integrate WhatsApp, Instagram and Facebook Messenger,” The New York Times, January 25, 2019, source">source
- Mike Isaac, “Facebook’s Mark Zuckerberg Says He’ll Shift Focus to Users’ Privacy,” The New York Times, March 6, 2019, source">source . Facebook’s official announcement is available at source">source
- Law enforcement agencies across the world make overbroad demands for location data to find suspects and witnesses at crime scenes. See Jennifer Valentino-Devries, “Tracking Phones, Google Is a Dragnet for the Police,” The New York Times, April 13, 2019, source">source; also on “reverse location warrants” see Aaron Mak, Close Enough, Slate, February 19, 2019, source">source; Matthew Haag, “FamilyTreeDNA Admits to Sharing Genetic Data With F.B.I.”, The New York Times, February 4, 2019, source">source
- Josh Costine, “Facebook will pass off content policy appeals to a new independent oversight body,” Techcrunch, source">source
- For instance, in the UK, source; France, source; and Germany, source
- Varun Aggrawal, “Infosys to Set up Data Marketplace for Enterprises – The Hindu BusinessLine,” June 19, 2018, source.
- “The Personal Data Protection Bill” (2018), source; Justice B.N. Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” (Committee of Experts under the Chairmanship of Justice B.N. Shrikrishna, July 2018), source.
- Jack M. Balkin, “Information Fiduciaries and the First Amendment,” U.C. Davis Law Review 49, no. 4 (2016): 1234; Lina Khan and David Pozen, “A Skeptical View of Information Fiduciaries” (SSRN, February 25, 2019), source.
- Whilst the European Union’s approach in the GDPR is limited by is focus on privacy. The challenges of governing data-driven decision-making go well beyond concerns about privacy. See Talia Gillis and Josh Simons, “Explanation < Justification: GDPR and the Perils of Privacy,” (SSRN, 2019).
- To use André Béteille’s phrase, one of India’s most important twentieth-century social theorists. André Béteille, Anti-Utopia: Essential Writings of André Béteille (New Delhi: Oxford University Press, 2005); André Béteille, Ramachandra Guha, and Jonathan P. Parry, Institutions and Inequalities: Essays in Honour of Andre Beteille (New Delhi: Oxford University Press, 1999).
- Purva Khera, Macroeconomic Impacts of Gender Inequality and Informality in India, IMF Working Paper (Washington, District of Columbia DC: International Monetary Fund, 2016); Carol Vlassoff, Gender Equality and Inequality in Rural India: Blessed with a Son (New York, NY: Palgrave Macmillan, 2013); Stephen M. Caliendo, Inequality in America: Race, Poverty, and Fulfilling Democracy’s Promise, Dilemmas in American Politics (Boulder, CO: Westview Press, 2014); Xavier N. De Souza Briggs, Social Capital and Segregation: Race, Connections, and Inequality in America (Cambridge, MassMA.: John F. Kennedy School of Government, 2002).
- It is important to note that this is not just about unrepresentative data. Unrepresentative data excludes some groups, perhaps because there are not enough data points about that group, or the data points that exist are less numerous or rich. This is an important problem, particularly in India, where the underrepresentation of Untouchables and women in data is systemic. But the problems this paper considers would remain even in the most accurate and careful data sets, which are still a reflection of the structure of our social world, including the inequalities and injustices that characterize it. A representative dataset is not devoid of injustice. This leaves open a host of important issues about when the representation of injustice in a dataset actually constitutes an injustice, an issue I hope to address in future work. Cynthia Dwork and Deirdre Mulligan, “It’s Not Privacy, and It’s Not Fair,” Stanford Law Review 66 (September 2013): 35–40; Kate Crawford, “The Hidden Biases in Big Data,” Harvard Business Review, April 1, 2013, source; David Garcia et al., “Analyzing Gender Inequality through Large-Scale Facebook Advertising Data,” Proceedings of the National Academy of Sciences of the United States of America 115, no. 27 (2018): 6958–63, source.
- Andrew D. Selbst and Solon Barocas, “The Intuitive Appeal of Explainable Machines,” SSRN Electronic Journal, 2018, source.
- Daniel Kahneman, Thinking, Fast and Slow (New York, NY: Farrar, Straus and Giroux, 2011).
- Virginia Eubanks, Automating Inequality: How High-Tech Tools Profile, Police and Punish the Poor (New York, NY: St. Martin’s Press, 2018).
- TOI, “Aadhaar Covers over 89% Population: Alphons,” The Times of India, accessed March 5, 2019, source.
- Cynthia Dwork et al., “Fairness through Awareness,” ITCS ’12 (ACM, 2012), 214–226.
- Sam Corbett-Davies and Sharad Goel, “The Measure and Mismeasure of Fairness: A Critical Review of Fair Machine Learning,” 20180731, source.
- Jon Kleinberg, Sendhil Mullainathan, and Manish Raghavan, “Inherent Trade-Offs in the Fair Determination of Risk Scores,” Proceedings of Innovations in Theoretical Computer Science (ITCS), 2017.
- I am therefore moving beyond privacy as a framework for thinking about the governance of data-driven decision-making. Privacy is one concern we might have about those decision-making procedures, usually called “data processing” in existing legislation in the EU and India. But it is far from the only concern. Other aims and values need to be brought into play. Privacy should not be the sole lens through which to view governance data and machine learning. A29WP, “Guidelines on Automated Individual Decision-Making and Profiling” (Article 29 Data Protection Working Party, 2018), source.; ICO, “Guide to the General Data Protection Regulation (GDPR)” (U.K.: Information Commissioner’s Office, August 2018), source; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Most other important pieces of non-discrimination legislation extend the categories to which duties of non-discrimination apply. These include the Equal Pay Act of 1963, which prohibits the payment of different wages to employees of different sexes who perform equal work under similar conditions; the Americans with Disabilities Act (ADA) of 1990, which prohibits discrimination against individuals with a disability and requires the provision of reasonable accommodation to someone who is legally disabled; and the Genetic Information Non-Discrimination Act of 2008, which protects individuals from genetic discrimination in the healthcare and insurance industries.
- For instance, U.S. Executive Orders 10925, 11246, and 11375 require federal contractors who do over $10,000 in Government business in one year to “take affirmative action to ensure that applicants are employed, and that employees are treated during employment, without regard to their race, color, religion, sex or national origin.”
- David Strauss, “Discriminatory Intent and the Taming of Brown,” University of Chicago Law Review 56, no. 3 (1989): 935–935.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019, source; Solon Barocas and Andrew D. Selbst, “Big Data’s Disparate Impact,” California Law Review 104, no. 3 (June 1, 2016): 671–732.
- There is an important emerging debate about precisely this point, including a paper of my own. For the key protagonists, see Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019; Barocas and Selbst, “Big Data’s Disparate Impact”; Lior Strahilevitz, “Privacy versus Antidiscrimination,” Public Law & Legal Theory Working Paper, no. 174 (2007), source; Pamela L. Perry, “Two Faces of Disparate Impact Discrimination,” Fordham Law Review 59, no. 4 (March 1, 1991): 523–595; Cass Sunstein, “The Anticaste Principle,” Michigan Law Review, January 1, 1993, 2410.
- Barocas and Selbst, “Big Data’s Disparate Impact,” 724.
- Sophia Moreau and Deborah Hellman, Philosophical Foundations of Discrimination Law (Oxford: Oxford University Press, 2013), 259.
- Béteille, Anti-Utopia.
- Cass Sunstein makes a similar point. If there is prejudice and statistical discrimination, and if third parties promote discrimination, there will be decreased investments in human capital. Such decreased investments will be a perfectly reasonable response to the real world. And if there are decreased investments in human capital, then prejudice, statistical discrimination, and third-party effects will also increase. Statistical discrimination will become all the more rational; prejudice will hardly be broken down; consumers and employers will be more likely to be discriminators.Ronnie J. Steinberg, Applications of Feminist Legal Theory to Women’s Lives: Sex, Violence, Work and Reproduction. Women in the Political Economy. (Temple University Press, 2012), 560; Sunstein, “The Anticaste Principle,” 2431.
- Dwork et al., “Fairness through Awareness,” 215.
- As Hannah Arendt argued when comparing the American and French revolutions. Rohit De, A People’s Constitution: The Everyday Life of Law in the Indian Republic (Princeton, CT: Princeton University Press, 2018), 5; Uday S. Mehta, “The Social Question and the Absolutism of Politics,” 2010, source; Hannah Arendt, On Revolution (New York, NY: Viking Press, 1965).
- Sunil Khilnani, The Idea of India (New Delhi: Penguin, 2004).
- Kalpana Kannabirān, Tools of Justice: Non-Discrimination and the Indian Constitution (New York, NY: Routledge, 2012), 7.
- B. R. Ambedkar is a neglected character in India’s political history. His ideas have received little attention compared with more widely known figures M. K. Gandhi and Jawaharlal Nehru, in part because of the Congress Party’s dominant role in shaping India’s national story, and the contours of democratic politics after independence. See Valerian Rodrigues, “Justice as the Lens: Interrogating Rawls through Sen and Ambedkar,” Indian Journal of Human Development 5, no. 1 (2011): 153–174; Jean Drèze and Amartya Sen, “Democratic Practice and Social Inequality in India,” Journal of Asian and African Studies 37, no. 2 (2002): 6–37; Martha Nussbaum, “India: Implementing Sex Equality through Law,” Chicago Journal of International Law 2, no. 1 (2001): 35–58.
- Kannabirān, Tools of Justice, 162.
- Patterns of domination, which produce these persistent inequalities in the political and economic spheres, have two effects. First, they undermine the liberty of each individual to benefit from an effective and competent use of their powers. Democracy entailed political equality. Political equality entailed the absence of domination. Second, patterns of domination undermine the possibility of free association. Drawing on John Dewey, Ambedkar argued that free association – the capacity of groups to form links, to self-govern over time – was essential to democratic life. Democracy is not merely a form of government. It is primarily a mode of associated living, of conjoin communicated experience. It is essentially an attitude of respect and reverence towards fellow men. Patterns of domination made impossible the associations and relationships that encouraged and embodied this attitude of respect and reverence.B.R. Ambedkar, Annihilation of Caste: The Annotated Critical Edition, ed. S. Anand (New Delhi: Navayana, 2014), 280, 261.
- Béteille, Guha, and Parry, Institutions and Inequalities, 342.
- V. R. Krishnaiyer, Akhil Bharatiya Soshit Karamchari Sangh and Others vs. Union Of India, No. 185 (Supreme Court of India November 14, 1980).
- J B. Sudershan Reddy, Indian Medical Association vs. Union Of India & Ors, No. 8170 (Supreme Court of India May 12, 2011).
- Deepti Shenoy, “Courting Substantive Equality: Employment Discrimination Law in India,” University of Pennsylvania Journal of International Law 34, no. 3 (2013): 632.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 20190210, source.
- The Personal Data Protection Bill; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” 8.
- De, A People’s Constitution; Béteille, Guha, and Parry, Institutions and Inequalities; Khilnani, The Idea of India.
- This is precisely the challenge that Jack Balkin, who first coined the data fiduciary concept, warned about. Balkin, “Information Fiduciaries and the First Amendment,” 1232–1324.
- As André Béteille argues, institutional well-being is an important consideration. He describes this as equality as a matter of policy, not of right, warning against placing too much faith specifically in the state to eliminate every social inequality, every difference of caste or class. Béteille, Anti-Utopia, 435.
- Joshua A. Kroll et al., “Accountable Algorithms,” University of Pennsylvania Law Review 165, no. 3 (2017): 633–705; Andrew Tutt, “An FDA for Algorithms,” Admin. L. Rev. 83 (2016); Jeremy Waldron, “Accountability: Fundamental to Democracy,” SSRN Scholarly Paper (Rochester, NY: Social Science Research Network, April 1, 2014), source; Craig T. Borowiak, Accountability and Democracy: The Pitfalls and Promise of Popular Control (Oxford University Press, 2011); Adam Przeworski, Susan Carol Stokes, and Bernard Manin, Democracy, Accountability, and Representation (Cambridge: Cambridge University Press, 1999).
Open Transit Data in India (Richard Abisla)
Richard Abisla is the Portfolio Manager, Americas at Caravan Studios, a division of TechSoup.
Acknowledgments: The author extends sincere thanks to Kate Owens, Andrea Rizvi, O.P. Agarwal, Charru Malhotra, Srinivas Kodali, Jackie Klopp, Catherine Hurd Johnson, Marnie Webb, Niranjan Krishnamurthi, and to all those who provided invaluable guidance and information for this project. The author is grateful to New America, in particular, Awista Ayub, Melissa Salyk-Virk, and the 2019 India-US Fellows, and to Caravan Studios and TechSoup for this opportunity. All errors and omissions in this paper are the author’s alone. All information was accurate at the time of submission/publication.
Introduction
Hundreds of millions of people worldwide rely on public transportation daily,218 yet only a tiny proportion of those users have access to accurate information about when their transport will arrive or where it is going. This lack of information is not solely customer-facing: the majority of transit operators, whether public or private, do not collect automated data that would allow them to make more informed business decisions. This lack of data creates a vicious cycle in which commuters, tired of wasting time as they wait for their bus or train, abandon mass transit and seek lower-capacity vehicles, like taxis, rideshares, two-wheelers, or autorickshaws,219 which increases congestion and air pollution. Both transit riders and operators would benefit from access to data about public transportation; on the user side, accurate information increases rider satisfaction and ridership,220 while on the operator side, data can be used to improve offerings and better meet the needs of local communities.221
Technological innovation and the transparency movement have spurred and spread the adoption of open transit data over the past 13 years. In 2006, the creation of a worldwide open standard for transit data, the General Transit Feed Specification (GTFS), provided an interoperable format for transit agencies of all types and modalities to share data that can be displayed on mobile apps, or used to create maps and schedules. A growing worldwide transparency movement, demonstrated by the 2011 launch of the Open Government Partnership222 and the institution of open data policies in the United States (2013), Britain (2010), and India (2012), have provided frameworks and policy assurances that citizens can access data collected by their governments. Despite the proliferation of technological solutions that can promote mass transit ridership and satisfaction, many countries lag in their adoption of open transit data, preventing their residents from accessing readily available tools to use transit more efficiently, save time, and reduce their dependence on lower-capacity vehicles.
This paper seeks to explain barriers to collecting, organizing, and sharing this data in the Indian public transport context, and will provide four case studies of transit data projects that are working to overcome these barriers. These successful projects provide examples of stakeholder engagement that can be replicated in other regions, such as Latin America, and countries where large portions of the population depend on mass transit. The paper will examine opportunities to include public transit data into existing data and transport policies, and will investigate opportunities to increase capacity-building efforts so that local transit authorities have adequate information to make decisions that favor open transit data.
Methodology
In order to investigate transit data organization and publication in India, I interviewed 40 people over the course of seven weeks and made site visits in Delhi, Mumbai, Kochi, Bangalore, and Hyderabad. All interviewees have participated in the Indian mass transit ecosystem by providing, studying, innovating, or using public transit. The interviewees include representatives from central, state, and local government, transit corporation employees, representatives from civil society organizations, and academics; many are also regular public transit riders. I reviewed the existing literature on open data and transit data in India and examined the issue via local press coverage. The objective of the four case studies that follow are to illuminate the different environments and sets of stakeholders that have allowed these projects to develop and garner support within local government and transit corporations.
Case Studies
Kochi: NGO leadership and resources together with a forward-thinking government
In March of 2018, Kochi Metro Rail Limited (KMRL) was heralded as the first metro agency in India to open its data by publishing their GTFS feed on their website. KMRL’s open feed was developed with assistance from the World Resources Institute (WRI), a global research organization active throughout India that works to “turn big ideas into action at the nexus of environment, economic opportunity, and human well-being.”223 Kochi had initially approached WRI for help with their open data, and WRI was able to lend significant mentoring and technical assistance to KMRL staff.224 KMRL publishes a static GTFS feed,225 which, in their case, is as good as real time data due to vehicle management software that ensures trains run on schedule.
KMRL, despite only operating the metro, currently acts as an interim Unified Metropolitan Transport Authority, leading other transportation modalities to organize and share their data. Other stakeholders include private bus operators, a network of 15,000 autorickshaw drivers, and the Rajagiri School of Engineering and Technology (RSET). RSET is developing a data dashboard for KMRL, allowing the agency to analyze their data in more sophisticated ways. This will become increasingly important—and useful—as open data practices spread to other modalities in the Kochi transportation ecosystem. KMRL has helped to organize 950 privately-operated buses that are under contract from the government of the State of Kerala. These bus owners have been organized into seven companies that have agreed to have GPS devices installed on their buses and pay for monthly maintenance.226 The 450 government-owned and operated buses do not yet have GPS installed, as they have yet to go through the required procurement process for the GPS devices. KMRL was also a key player in organizing a cooperative of 15,000 autorickshaw drivers227 that will engage in a variety of activities focused on drivers’ welfare and economic success. Most notably, the cooperative will begin offering transportation to Metro stations on a ticketed basis, and will develop a mobile application that will provide on-demand access to members that utilize the GPS installed in their fare boxes. KMRL officials note that organizing the bus companies into clusters and helping with the organization of the 15,000 autorickshaw drivers into a cooperative have been the most challenging parts of the project.
In order to provide arrival data for transit riders, Kochi has partnered with the Chalo228 mobile application to display metro, ferry, and bus data, and will soon add autorickshaws. Chalo has over 50,000 downloads and over 7,000 daily users, a modest amount for a city of over 2 million people.229 Because Kochi’s data is “open,” or hosted online and available for use, Kochi’s transit system is also displayed in Google Maps, which has over 1 billion active monthly users worldwide. As more buses and ferries are added to the GTFS feed, more developers may elect to build products using the feed. Access to the static GTFS files are free, and a link to the files are sent to the requestor’s email after inputting a name and email address.
Kochi officials have a clear vision that promoting ease of access to public transportation, such as providing first and last mile connectivity to metro stations and providing access to digital schedules and journey planners will both increase equity and improve environmental outcomes. KMRL officials have noted that if transit is faster and cheaper, poorer residents will have more economic opportunities and more disposable income, which can lead to better opportunities for their children and a better quality of life for families.230 This equity lens is unsurprising considering Kerala’s communist-leaning governance history. In a similar vein, the Kerala Minister for Transport has publicly noted that the shift of commuters to private, lower capacity vehicles are increasing pollution, traffic, and accidents.231 Retaining transit riders, and creating new ones, is key to addressing these concerns. Additionally, the Kochi Smart Cities mission shares administration with KMRL, resulting in a close relationship that has also influenced KMRL’s commitment to open data.232
Delhi: Political will and academic leadership
In November of 2018, Delhi became the first city in India to provide static and real-time bus data feeds.233 Delhi’s bus open transit data project was initiated in 2016, with the formation of an advisory committee that included a broad swath of stakeholders in the urban mobility space, including government officials, the Delhi Transport Commissioner, staff from both Delhi bus corporations, university professors, and industry representatives, like Google, and ride-hailing companies Uber and Ola.234 The Committee was a joint initiative of the Indraprastha Institute of Information Technology Delhi (IIITD) and the Delhi government, which is run by the Aam Aadmi Party, a new party that won on an anti-corruption platform and had made campaign promises to improve life in Delhi.235 As a result of the committee’s work, the Delhi Government signed a memorandum of understanding with IIITD to build a portal to share real time information publicly. IIITD, working with a group of student interns, unveiled a portal after five months.236 Both static and real-time GTFS feeds are available on the open transit data portal after a simple registration that includes contact information and explanation of the intended purpose of accessing the data use.
The Delhi GTFS feeds currently include the 1,700 buses that are under the control of the Delhi Integrated Multi-Modal System (DIMTS), a joint venture of the Delhi National Capital Territory Government and the IDFC Foundation. Known as “cluster buses,” these orange buses are monitored by DIMTS, who also manages the contracts with individual private bus operators. All cluster buses have GPS installed, which allows them to be monitored from a central control center. Presently, only DIMTS-administered buses feed real-time data into the control center and the GTFS Real Time feed, as the remaining 3,800 buses managed by the Delhi Transport Company (DTC) are not currently participating due to broken or missing GPS devices.
DIMTS has developed a proprietary transit application, PoochhO.237 In addition to arrival times for the 1,700 cluster buses, PoochhO estimates bus seat availability on buses and provides proximity and contact information for nearby autorickshaw drivers.238 Both DIMTS and DTC buses are visible on Google Maps, with cluster buses providing real-time information and DTC buses offering schedule data. However, Delhi’s bus data will be of limited use until the entire bus system’s data is available.239
Barriers in the Delhi data project include funding constraints and nonfunctional or missing GPS units on the fleet of 3,800 DTC buses. Initially, limited knowledge of open data practices posed a challenge, but the strong partnership with IITD helped Delhi overcome this challenge.240 Furthermore, the partnership allowed the project to succeed without a large financial investment. One of the project’s biggest successes has been cultivating buy-in from the Delhi local government, the Department of Transportation, and DIMTS. And, now that the data is online and open data activists are able to use it for their own analyses.241
Bangalore: Academic influence, strong activism, and press coverage
Despite publicly announcing in 2017 that open bus data would be released imminently, as of early 2019 Bangalore has not published open static nor real-time GTFS feeds.242 Early excitement and positive press coverage243 of Bangalore Municipal Transportation Corporation’s (BMTC) open data commitment has transformed into frustration for many civil society stakeholders, including local tech workers who use a higher tier, yet still public, level of service known as “AC buses.”244 These are commuters who may shift to lower capacity vehicles when they are left waiting at the bus stop too long, adding to congestion and air pollution.245 A major fear of BMTC officials is that providing data on the AC bus lines, which are profitable, would open up those lines to competition from ridesharing companies Uber and Ola, reducing ridership and revenue.246
Another challenge has been buy-in from leadership at BMTC. In 2016, BMTC’s Managing Director supported open data, but soon left the organization, and her replacement wanted to monetize the data.247 This monetization push is a central barrier to open data provision in Bangalore, as BMTC has struggled to find financial resources to support the creation of both static and real-time GTFS feeds. Central to the desire to monetize the data is the reality that BMTC receives little in the way of subsidies from the Karnataka state government, and is run more like a for-profit business than a public service.248 However, many civil society actors and activists take exception to this line of thinking, strongly maintaining that mobility is a right and should be supported by the state government.249 These activist voices have been highlighted in the local press, and have provided positive pressure on BMTC leadership to make data available to riders.
In September 2018, a new IT Director took charge at BMTC and began to actively engage with civil society stakeholders. She began working with local NGOs to organize a static GTFS feed, often the first step to getting more useful real-time data.250 Working with the NGO Fields of View in a voluntary capacity allowed BMTC to experiment with GTFS without incurring costs or undergoing lengthy procurement processes, both of which could have derailed the project.251 The new BMTC leadership reports that they are committed to providing open transit data, and are actively trying to figure out how they can work with civil society and academia to organize and provide the data. While BMTC does provide their own proprietary mobile application,252 usage rates and user satisfaction are low.253
Bangalore’s vibrant stakeholder community continuously advocates for open data, putting pressure on BMTC to address the demand and need for open data. Central to the stakeholder community are academics like Dr. S. Rajagopalan of the International Institute of Information Technology-Bangalore, who served on BMTC advisory committees to help select Intelligent Transportation Systems (ITS), which include the GPS devices and bus management software that can be used to create real-time GTFS feeds.254 BMTC adopted an ITS in 2016, and now every bus has GPS and can be monitored from a central control center.255 Dr. Rajagopalan also helped to create BMTC’s draft Data Sharing Policy, which has yet to be formally adopted.256 The policy is based on both the National Data Sharing and Accessibility Policy and Transport for London’s Open Data Policy.257 The Data Sharing Policy supports opening transit data for use by urban planners, educational institutions, businesses, transportation companies, and trip planning websites and portals.258 In addition to academics like Dr. Rajagopalan, the involvement of activist groups like DataMeet259 and Bangaluru Bus Prayaanikara Vedike (Bangalore Bus Commuters Forum),260 coupled with interest from the local press, have elevated the conversation in Bangalore and put public pressure on BMTC. While these groups are not solely focused on bus data, they do make arguments in favor of better trip planning and for using the data to understand how bus routes provide access to jobs and other resources from across the socioeconomic spectrum. In particular, groups like the Bangaluru Bus Prayaanikara Vedike are interested in making sure that lower-revenue bus lines that go to poorer areas are not terminated.261
Hyderabad: State open data policy leading the way
In 2016, the Telangana State Government unveiled a state open data policy based upon the National Data Sharing and Accessibility Policy (NDSAP), becoming the second state in India to adopt an open data policy.262 The policy provides clear directives to state government departments to open up non-sensitive datasets, going as far as saying that “opening up the government is the new world order.”263 The policy indicates that datasets should be in “human readable and machine readable formats, using open standards, and under open license.”264 The creation of Telangana as a new state after splitting from Andhra Pradesh in 2014 provided a special opportunity for the government to reflect on their practices, and “it was realized that a lot of government decisions were not data-driven.”265 Leadership from top state ministries have paved the way for Telangana state services, including the Telangana State Road Transport Corporation (TSRTC), to implement open data using open standards.
In order to organize GTFS feeds of TSRTC buses that provide services to Hyderabad, the state capital, the Telangana government is working with both WRI and Factly, a local startup that focuses on creating platforms and infrastructure to support open data and “strengthen democracy through engagement.”266 Factly and WRI will create static GTFS feeds for both TSRTC buses and the Hyderabad Metro Rail Limited (HMRL). The first step in organizing the TSRTC data was to identify all bus stops by their latitude and longitude coordinates; this was done by combining several data sets that had been compiled over several years from multiple civil society actors, including Hyderabad Urban Lab, Engineers Without Borders, Mufkhamjah College of Engineering and Technology, Shakti Sustainable Development Foundation, and WRI.267 From these multiple efforts, more than 8,000 bus stops were mapped, more than twice the number of actual bus stops.268
Factly and WRI designed a process to validate the bus stop data so that it can be used as a basis for a static GTFS feed. First, spelling inaccuracies had to be corrected and geo-locations had to be cross-checked, with names assigned to the GPS coordinates of the 3,900 bus stops. A developer hired by WRI built a fuzzy mapping algorithm to check and de-duplicate this data, which was then sent to TSRTC to be verified and audited manually269. The verification process has taken over two months, and is still ongoing as of March 2019. Once complete, TSRTC will update schedule data, and Factly and WRI will create the GTFS feed, as well as a mechanism that TSRTC staff can use to make future changes in schedules and routes. Once completed, the data will be ready to be shared in the public domain.270
Thanks to buy-in from top state officials there has been little staff resistance to organizing the GTFS feed.271 The main barriers have been a lack of validated information and a glut of bus stop information, which have been solved through both machine and human validation processes. TSRTC buses do not currently have GPS devices installed, so there are no immediate plans to organize a real-time GTFS feed. However, the involvement of Factly and WRI certainly bodes well for future developments, should TSRTC endeavor to install GPS devices on their vehicles.
Figure 1: Table of public transit data for case study locations in India
| City | Population* | Metro: Static | Metro: Real Time | Bus: Static | Bus: Real Time |
|---|---|---|---|---|---|
| Kochi | 2.81M | Yes, open | No, in process | No | Partially, closed |
| Delhi | 28.1M | Yes, closed | Yes, closed | Yes, open | Partially, open |
| Bangalore | 11.25M | Yes, closed | Yes, closed | In process | Under negotiation |
| Hyderabad | 9.58M | Yes, closed | Yes, closed | In process | No |
* Demographia World Urban Areas,” Demographia, April 2019, accessed March 10, 2019, http://www.demographia.com/db-worldua.pdf
Case Study Discussion
Stakeholder Engagement
These case studies illustrate the importance of vocal stakeholders, local leadership, and progressive policy. In each city, local champions have emerged from civil society or from within the transit corporation to help lead and shepherd the projects. In Kochi, Bangalore, and Delhi, NGOs or academic institutions have provided labor and technological resources for free or at a very low cost, helping authorities avoid lengthy procurement processes and finding money in already stretched budgets. In Bangalore and Delhi, academics played key roles in influencing city officials to move towards open data, educating officials on the benefits of open data and open standards like GTFS. Both Delhi and Kochi benefitted from political leadership who wanted to show positive change in government services and to increase transparency. In Bangalore, a well-organized civil society is clamoring for transit data, and has the ear of the local press. In Hyderabad, barriers experienced by other cities, such as lack of political will, interest, or budget, have been roundly avoided by the implementation of a state-wide open data policy. These examples show how the leadership of civil society can be a powerful tool in embracing open transit data, and how important of an official state policy it can be with financial resources behind it.
Uses of Open Data
Once data is open and available, agencies can use it to understand their systems and improve their offerings. Transit data can be overlaid with other geospatial data, including population density and housing development, job availability, and employment and education centers.272 In Hyderabad, transit data has been used to show that public transportation options are “infrequent or nearly absent” in the areas of the city where residents are least likely to own or have access to private vehicles, and that they are missing near the city’s slums.273 This analysis of publicly available data shows how transit can be an economic development tool that can break the cycle of poverty. Lack of access to public transportation excludes certain portions of the population from opportunities, making their lives more difficult and expensive, and keeping them in poverty.
Open Transit Data: Not a universal solution
While providing transit data is critical to improving the rider experience, it is not a panacea to solve all transit-related ills. In many cases, comprehensive bus reform is needed to provide drastic improvements in markets where ridership is declining, rider satisfaction is low, and entrenched problems seem insurmountable.274 In Delhi, it is the poor who are most dependent on cheap public transportation, yet they spend 25-30 percent of their income on moving around the city.275 Simply providing these transit riders with more information about when the bus is coming may make their commute less frustrating, but the majority of Delhi’s bus riders do not have the purchasing power to switch to another modality if they get tired of waiting.276 Rather, they will wait for the bus as long as they have to,however crowded it may be. For these riders, knowing when the bus is coming might not be the biggest change they’d request from their transit operator; given the choice, they would probably prioritize more vehicles, more frequent departures, and cheaper fares over digital signage or a smartphone app that communicates arrival times.277
Transit Data: Open best, closed still good
It is also important to note that transit data does not need to be “open,” or publicly available online for free in order to be used for analysis or trip planning. Many agencies choose to organize a GTFS feed, but keep it closed for their own internal analysis and to provide a proprietary mobile or web applications that riders can use to access schedules and trip planners. Transit riders are then only able to use the proprietary application, which provides one point of failure and may be of lower quality than other transit applications. One reason for varying quality is that several of the top transit applications, such as Google Maps and Moovit, are private companies that have invested multiple millions of dollars in their products. It makes sense that the user experience, design, and performance of these applications would be superior to an application created by a city transit agency, no matter the talent and skills of the in-house developers. Additionally, there is little need to reinvent the wheel of building an in-house transit application when publishing a GTFS feed online allows consumers to access multiple applications. It is important to note that smartphone applications are not the only option to provide transit data to consumers, and transit data can be used to create resources like maps and timetables, as well as text or voice-based applications for feature phone users. While open data allows for customers to use more products and researchers to perform more analyses, the first goal should be providing access in order to promote ridership, whether the data itself is open or not.
Suggested Policy Interventions
Despite strong research that shows the benefits of transit data to riders and operators, and organized civil society that clamors for access, too many local governments lag in their provision of data to their communities. What follows are recommendations for policy and capacity building interventions that could help cities provide useful data, thereby promoting the use of mass transit.
National Data Sharing and Accessibility Policy
There are several opportunities to weave transit data into existing policies. First, the National Data Sharing and Accessibility Policy (NDSAP) was implemented in March 2012,278 and soon thereafter the Open Government Data Platform India was launched.279 Despite the NDSAP setting clear expectations for all government agencies to share data in an online format for use by civil society, the policy is not mandatory, and only provides guidelines to central government agencies, and not to state or city government agencies.280 In India, cities have a much closer relationship to the state government than the central government, and city services are often managed by the state government. For this reason, the most effective way to influence urban policy is to influence state policy.
State Open Data Policies
The case of Telangana shows that adapting the NDSAP into state policy provides a clear pathway for open transit data. According to the Centre for Budget and Governance Accountability, as of August 2018, only five of 29 states have instituted their own state-level policy that corresponds to NDSAP or have adopted the NDSAP as state policy.281 While enforcement might be difficult to ensure, given that the national policy itself lacks enforcement mechanisms, expressly including transit data in state open data plans provides clear expectations to cities that transit data be open and freely available. Codifying these expectations into state-level policy will also strengthen the position of both transit activists (like commuters’ groups) and open data organizations and activists (like DataMeet), giving them a policy to refer to as they work to hold local governments and transit operators accountable.
Local, Transit-Specific Open Data Policies
In the absence of a state policy, local, transit-specific open data policies, such as BMTC’s draft policy, would provide a pathway for cities to embrace open data without the express support of the state government. Such policies have the potential to provide leadership from below,282 and could lead to a visible “win” that could demonstrate the value of open data to the lives of everyday residents.283 Releasing transit data on an open standard like GTFS provides the benefit of harnessing the imagination and brainpower of many actors, such as the robust developer and startup community. GTFS also enjoys strong support and interest from civil society, including academics, and large multilateral institutions. Even those who don’t necessarily support GTFS, like Rajarshi Sahai, the former India country manager for transit app startup TRAFI, believe in localized policy: “Policy must evolve out of unique experiences of each city than following templates/exemplars.”284 Codifying open transit data into local public policies would have the dual impact of supporting commuters and transit riders and supplying the potential to spread open data practices amongst all levels of government.
Smart Cities Mission
Transit data could also be couched in existing, and future, Smart Cities policies and projects. Transit on the whole is a focus of the burgeoning Smart Cities movement in India. The focus is to support “urban development through capacity building, research, service, and infrastructure innovations and citizen engagement,” and the central government is actively working with State-level departments and agencies to implement Smart Cities programs.285 A key opportunity to spread the technology tools key to creating open GTFS feeds is the National Urban Innovation Stack (NUIS), a platform to share cloud-based technology services amongst all participating Smart Cities. The NUIS could easily include GTFS creators and management software, in addition to targeted training on open data practices. The NUIS is well positioned to include existing data creation tools, like scripts that convert a city’s transit data from KML or JSON files into GTFS, and GTFS management software. The monetary savings of providing this software centrally would be significant, and would immediately provide tools to 100 cities that would encourage and enable them to organize and publish their transit data. This would also contribute to creating a “culture of data”286 that other cities, such as Medellín, Colombia, have found useful in becoming more data-driven.287 Cities that have invested public funds into developing their own mobile apps could choose to share the source code of these applications, resulting in further savings for cities that want to provide proprietary mobile apps.
National Urban Transport Policy
Lastly, transportation policy itself provides an avenue to compel state and city governments to organize and provide transit data. In the context of rapid urban growth, the Government of India instituted the National Urban Transport Policy (NUTP) in 2006,288 and updated it in 2014.289 A main tenet of the policy is to encourage residents to use public and non-motorized modes through offering financial assistance to state government agencies, as well as providing leadership in order to “guide State-level action plans within an overall framework.”290 The plan acknowledges that state-level policy and laws are the way to improve urban transport, and provides significant financial resources for states to plan and implement public transportation systems. While the NUTP does not explicitly mention open transit data, it does encourage the installation of GPS devices on buses, which make it possible to provide GTFS-Real Time data. A customer-facing data provision that ensures transit riders have access to scheduled and real-time information in a digital format would work towards the ultimate goal of reducing the number of cars on the road, lessening congestion and air pollution. Significantly, the NUTP recommends that each city with more than one million inhabitants set up a Unified Metropolitan Transport Authorities (UMTA).291 These agencies will be charged with integrating different transportation modalities – such as bus, metro trains, and autorickshaws. A key benefit will be the coordination amongst the agencies,292 solving problems like a bus stop that is 200 meters from the Metro entrance, or a bus line running along the same route as the metro.293 UMTAs can support open data by setting standards around data provision and publication, and by requiring all public transportation providers in the metropolitan area to make data available. When systems are fully integrated, it may be possible that some services that make money may subsidize services that are not profitable.294
Capacity Building
Alongside policy, stakeholders agree that capacity building amongst local transit corporation staff could have an enormous impact on the provision of open transit data. Capacity building should focus on the dual audiences of decision-makers, who will engage with cost-benefit analyses and budget considerations, and technical staff, who will create, manage, and maintain GTFS feeds. O.P. Agarwal, the CEO of WRI India, believes that officials want to do the right thing, but often don’t have a good understanding of what open data means and entails, despite the phrase being a popular buzzword.295 Helping leaders understand open data, the required effort and cost to convert existing data to open data, and the benefits to ridership, revenue, and rider satisfaction would help these staff to make more informed decisions that would benefit riders.296 Likewise, more technical training and capacity building is needed, as some IT staff lack the knowledge to build an API to provide their data, and others are uninterested in providing data to startups or end users.297 Strong policy, however, will provide both the incentive and reason for capacity building, and will provide a nationwide goal of transit data provision.
The Smart Cities Mission provides an excellent opportunity to include capacity building around open transit data, due to the existing inclusion of both urban mobility as a thematic priority, and a capacity-building mechanism. The new National Urban Learning Portal298 will provide an online portal for city officials to participate in ongoing trainings relevant to Smart Cities.299 Providing a structure for local officials to participate in centrally-endorsed training programs is a good start to spreading good open data practices. As part of the Smart Cities mission, every city has a Chief Data Officer, who could act as a key resource for city staff who are deputized to organize and publish public data. Mobilizing existing resources to help promote open transit data would be relatively low-cost, yet could easily impact hundreds of millions of people.
Lastly, many sources have noted that there are few national convenings that bring together decision-makers from transit corporations, government officials, NGO representatives, activists, and community groups to discuss and learn about these issues. A forum for all stakeholders could help spur innovation and operationalize some of the research and innovation into the mass transit systems.300 These events provide space for each stakeholder group to understand the needs and challenges of the other, and to start to address issues and challenges together. As one Delhi transit official shared, the more minds there are involved in solving a problem, the better the ideas.301
Conclusion
In the absence of a central policy or law with clear flow-down requirements to states and clear enforcement mechanisms, transit data provision will continue to be ad hoc and dependent on civil society’s leadership and resources. In conversation with several transit authority leaders, it became clear that central policies with clear incentives and enforcement mechanisms would spur local transit providers to organize and publish transit data. One official highlighted the importance of buy-in from the highest level of public hierarchies, stating that “water can only be poured from the top.”302 Funding should not be overlooked as part of the policy push, as many civil society groups become involved in open transit data due to financial constraints within the public transit corporation.303 These NGOs are often able to marshal their own resources, or use related grant funding, to perform tasks that ideally would be the responsibility of the local transit corporation. Capacity building efforts that dovetail with existing government programs can help to socialize information about open data and build comfort and interest amongst both decision-makers and technical staff who will implement open data practices in their organizations.
In order to promote public transit usage and better transit systems in general, cities should invest in transit data.
This paper provides suggestions on amendments to existing policies to include open transit data, proposals on capacity building provision, and technology tools geared to state and city transportation corporations. While civil society has proven to be effective in engaging stakeholders and guiding transit corporations towards understanding the value of open transit data, policy interventions would help to shift the responsibility from NGOs, civic hackers, commuter’s groups, and universities to the government agencies themselves. And while NGOs do a great job spurring transit agencies to adopt open data practices, it is not feasible for them to act as the back office for transit agencies in perpetuity.304 In order to promote public transit usage and better transit systems in general, cities should invest in transit data. Not only will this increase rider satisfaction, ridership, and revenue, but it will decrease congestion and pollution,305 bettering the quality of life for residents of Indian cities, and cities worldwide.
Citations
- The Global Risks Report 2018 13th Edition, [Geneva: World Economic Forum,2018] <a href="<a href="<a href="source">source">source">source">source.
- The United Nations World Water Development Report 2018: Nature-Based Solutions for Water, [Paris: WWAP (United Nations World Water Assessment Programme) /UN-Water, 2018, UNESCO] <a href="<a href="<a href="source">source">source">source">source.
- Martina Flörke, Christof Schneider, and Robert I. McDonald, "Water competition between cities and agriculture driven by climate change and urban growth," Nature Sustainability 1, no. 1 (2018): 51.
- Peter H. Gleick, "Global freshwater resources: soft-path solutions for the 21st century," Science 302, no. 5650 (2003): 1524-1528.
- Ibid.
- Negative externalities are costs that impact a party that does not have a role in its creation. For instance, vehicular pollution generated by a specific individual affecting people nearby. Negative externalities cause market failures.
- Collection action problem occurs when individuals pursuing a common goal do not cooperate due to competing interests.
- Free rider issues occur when individuals who do not pay for a good or service reap its benefit. Too many free riders results in over-exploitation or under-production of the good or service.
- Richard E. Howitt, Richard E. and Kristiana Hansen, "The Evolving Western Water Markets," Choices 20, no. 316-2016-6565 (2005): 59.
- Guy Le MoigneShawki Barghouti, Gershon Feder, Lisa Garbus, and Mei Xie, "Country experiences with water resources management," World Bank Technical Paper 175 (1992).
- Ereney Hadjigeorgalis, "A Place for Water Markets: Performance and Challenges," Review of Agricultural Economics 31, no. 1 (2009): 50-67.
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- C. Wilson, Adverse Selection, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics, Palgrave Macmillan, 2008]
- Y. Kotowitz, Moral Hazard, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- J.O. Ledyard, Market Failure, In: Palgrave Macmillan (eds)[London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- David S. Brookshire, Bonnie Colby, Mary Ewers, and Philip T. Ganderton, "Market Prices for Water in the Semiarid West of the United States," Water Resources Research 40, no. 9 (2004).
- John Freebairn and John Quiggin, "Water rights for variable supplies," Australian Journal of Agricultural and Resource Economics 50, no. 3 (2006): 295-312.
- A. Dinar, M. Rosegrant, R. Meinzen-Dick, "Water allocation mechanisms: Principles and examples," The World Bank Policy Research Working Paper 1779 (June 1997).
- Jill E. Hobbs, "Information asymmetry and the role of traceability systems," Agribusiness: An International Journal 20, no. 4 (2004): 397-415.
- Max H. Bazerman and James J. Gillespie, "Betting on the future: The virtues of contingent contracts," Harvard Business Review 77 (1999): 155-162.
- Stefaan G. Verhulst, "Information Asymmetries, Blockchain Technologies, and Social Change," Medium, July 24, 2018, <a href="<a href="<a href="source">source">source">source">source.
- Sloane Brakeville, and Bhargav Perepa, "Blockchain Basics: Introduction to Distributed Ledgers," IBM Developer, March 18, 2018, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Nigel Gopie, "What Are Smart Contracts on Blockchain?" Blockchain Pulse: IBM Blockchain Blog, July 02, 2018, <a href="<a href="<a href="source">source">source">source">source.
- "Civic Use Cases," Helping Governments to Be More Accessible, Efficient and Effective. <a href="<a href="<a href="source">source">source">source">source.
- "Civic Ledger Pty Ltd.," Australian Water Partnership. <a href="<a href="<a href="source">source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "Water Markets and Trade," Australian Government – Murray-Darling Basin Authority, Sept. 29, 2015. <a href="<a href="<a href="source">source">source">source">source.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="<a href="source">source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="<a href="source">source">source">source">source.
- Ibid.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management. September 2018.
- Ibid.
- The term “smart” in this context indicates the use of internet of things, big data, predictive analytics integrated over blockchain network as underlying technologies to facilitate the operations of a water market.
- Jayachandran Praveen, “The Difference between Public and Private Blockchain," Blockchain Pulse: IBM Blockchain Blog, Aug. 06, 2018, <a href="<a href="<a href="source">source">source">source">source.
- J.R. DeShazo, Gregory Pierce, and Henry McCann, “Los Angeles County Community Water Systems Atlas and Policy Guide: Supply Vulnerabilities, At-Risk Populations, Conservation Opportunities, Pricing Policies, and Customer Assistance Programs,” UCLA: Luskin Center for Innovation, (2015), <a href="<a href="<a href="source">source">source">source">source; U.S. Census Bureau Quick Facts: Los Angeles County, California," Census Bureau Quick Facts, July 1, 2017, <a href="<a href="<a href="source">source">source">source">source.
- S. Pincetl et al., “Water Management in Los Angeles County: a Research Report,” Los Angeles: UCLA, Institute of Environment and Sustainability, 2015, <a href="<a href="<a href="source">source">source">source">source
- Ibid.
- Ibid.
- J.R. DeShazo and Gregory Pierce, "Quantifying the Benefits and Designing Governance Structures for a Water Market in Los Angeles County," [Los Angeles: UCLA, Luskin Center for Innovation, Oct. 2016] <a href="<a href="<a href="source">source">source">source">source
- Bengaluru Water Board, “Blueprint for Future,” <a href="<a href="<a href="source">source">source">source">source.
- Bangalore Water Supply and Sewerage Board, "About BWSSB," Bangalore Water Supply and Sewerage Board. <a href="<a href="<a href="source">source">source">source">source.
- Bengaluru Water Board, “Blueprint for Future," <a href="<a href="<a href="source">source">source">source">source.
- Malini Ranganathan, "'Mafias' in the waterscape: Urban informality and everyday public authority in Bangalore," Water Alternatives 7, no. 1 (2014).
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- Bart Elias, Unmanned Aircraft Operations in Domestic Airspace: U.S. Policy Perspectives and the Regulatory Landscape (Washington, D.C.: Congressional Research Service, 2016), <a href="<a href="source">source">source">source.
- Tom Hancock and Wang Xueqiao, “China’s DJI targets agriculture as consumer drone sales slow,” Financial Times, March 25, 2019, <a href="<a href="source">source">source">source.
- Richard Levick, “Drone Industry Just Beginning To Take Off,” Forbes, May 15, 2018, <a href="<a href="source">source">source">source.
- Ujjwal Bakshi and Manash Neog, “Much to Drone About,” Economic Times, April 4, 2019, <a href="<a href="source">source">source">source.
- Therese Jones, International Commercial Drone Regulation and Drone Delivery Services (Santa Monica: RAND Corporation, 2017), <a href="<a href="source">source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="<a href="source">source">source">source.
- Somya Lohia, “Drone Regulations 1.0 Can Fetch India Major Slice of $100 Billion Industry,” Money Control, January 9, 2019, <a href="<a href="source">source">source">source.
- Civil Aviation Requirements Series X Part I Issue I: Requirements for Operation of Civil Remotely Piloted Aircraft System (RPAS), F. No. 05-13/2014-AED Vol. IV (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="source">source">source">source.
- Ibid., Reg. 14.2.
- Ibid., Reg. 12.14 & 12.2.
- Ibid., Reg. 11.2 & 17.1.
- Ibid, Reg. 12.21.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="source">source">source">source.
- Procedures for Operation of Civil Remotely Piloted Aircraft Systems (RPAS) in Indian Airspace, AIP Supplement 164/2018 AAI/ATM/AIS/09-09/2018 (New Delhi: Airports Authority of India, 2018), <a href="<a href="source">source">source">source.
- Tender Document: Development, Hosting and Maintenance of Digital Sky Platform for Ministry of Civil Aviation IT-11042/1/2018-DIRECTORATE OF IT (New Delhi: Airports Authority of India, 2018), <a href="<a href="source">source">source">source.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="source">source">source">source.
- Ibid.
- Ibid.
- Drone Ecosystem Policy Roadmap (New Delhi: Ministry of Civil Aviation, 2019), <a href="<a href="source">source">source">source.
- Ibid, 7.
- Ibid, 14.
- The Personal Data Protection Bill, 2018 (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="<a href="source">source">source">source.
- White Paper of the Committee of Experts on a Data Protection Framework for India (New Delhi: Ministry of Electronics and Information Technology, 2017), <a href="<a href="source">source">source">source
- Petition to the Federal Aviation Administration: Drones and Privacy (Washington, D.C.: Electronic Privacy Information Center, 2012), <a href="<a href="source">source">source">source.
- Margot Kaminski, “Drone Federalism: Civilian Drones and the Things They Carry,” California Law Review 4 (2013): 57–74.
- Notice of Proposed Rulemaking: Operation of Small Unmanned Aircraft Systems Over People FAA–2018–1087 (Washington, D.C.: Federal Aviation Administration, 2019), <a href="<a href="source">source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="<a href="source">source">source">source.
- Arthur Holland Michel, Drones at Home: Local and State Drone Laws (New York: Center for the Study of the Drone, Bard College, 2017), <a href="<a href="source">source">source">source.
- Amanda Essex, Taking Off: State Unmanned Aircraft Systems Policies (Denver, CO: National Conference of State Legislatures, 2016), <a href="<a href="source">source">source">source.
- An Act Relating To Unmanned Aircraft Systems – Establishing Statewide Standards, Protecting Privacy, And Ensuring Public Safety (Virginia: American Legislative Exchange Council, 2017), <a href="<a href="source">source">source">source.
- Gautam Bhatia, “State Surveillance and the Right to Privacy in India: A Constitutional Biography,” National Law School of India Review 26 (2014): 127–158.
- (2019) 1 SCC 1.
- Ibid, 359.
- (2015) 5 SCC 1.
- Ibid, 167.
- Colin Snow, “Drones Pose a Unique Big Data Challenge For Business Users,” Forbes, February 6, 2019 <a href="<a href="source">source">source">source ; Michelle Chan, “What Businesses Need to Know About Drone Data,” Techwire Asia, February 13, 2019, <a href="<a href="source">source">source">source
- Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules ((New Delhi: Ministry of Electronics and Information Technology, 2011),<a href="<a href="<a href="source">source">source">source"> <a href="<a href="source">source">source">source ; Ibid. ; Rachel Finn and Anna Donovan, “Big Data, Drone Data: Privacy and Ethical Impacts of the Intersection Between Big Data and Civil Drone Deployments,” in The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, ed. Bart Custers (The Hague: TMC Asser Press, 2016), 47-67.
- As Solove remarks about the “Information Age:” “The data gathered about people is significantly more extensive, the process of combining it is much easier, and the computer technologies to analyze it are more sophisticated and powerful.” See Daniel Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review 154 (2006): 477, 506 ; Ibid., 507–08.
- Jordi Soria-Comas and Josep Domingo-Ferrer, “Big Data Privacy: Challenges to Privacy Principles and Models.” Data Science and Engineering 1 (2016): 21, 22. ; Justice KS Puttaswamy v. Union of India, (2017) 10 SCC 1.
- Guide to Basic Data Anonymisation Techniques (Singapore: Personal Data Protection Commission of Singapore, 2018), www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other-Guides/Guide-to-Anonymisation_v1-(250118).pdf.
- For a particularly stark situation, where the de-identification was considered near foolproof and yet re-identified, see Jean Louis Raisaro et al., “Addressing Beacon Re-Identification Attacks: Quantification and Mitigation of Privacy Risks,” Journal of the American Medical Informatics Association 24 (2017): 799, 800.
- Solon Barocas and Helen Nissenbaum, “Big Data’s End Run around Anonymity and Consent,” in Privacy, Big Data, and the Public Good, eds. Julia Lane et al. (New York, NY: Cambridge University Press, 2014), 44–45.
- Ira S Rubinstein, “Big Data: The End of Privacy or a New Beginning,” International Data Privacy Law 3 (2013): 74, 77–78; Davide Castelvecchi, “Can We Open the Black Box of AI?” Nature 538, no. 7623 (2016): 20.
- Mireille Hildebrandt, “Defining Profiling: A New Type of Knowledge?” in Profiling the European Citizen: Cross-Disciplinary Perspectives, eds. Mireille Hildebrandt and Serge Gutwirth (eBook: Springer, 2008), 17, 20.
- Nathaniel A Raymond, “Beyond ‘Do No Harm’ and Individual Consent: Reckoning with the Emerging Ethical Challenges of Civil Society’s Use of Data,” in Group Privacy: New Challenges of Data Technologies, eds. Linnet Taylor, Luciano Floridi and Bart van der Sloot (eBook: Springer, 2017): 67, 75.
- A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="<a href="source">source">source">source.
- Ibid, 45–46.
- Ananth Padmanabhan and Anirudh Rastogi, “Big Data,” in Regulation in India: Design, Capacity, Performance, eds. Devesh Kapur and Madhav Khosla (London: Hart Publishing, 2019): 251, 262.
- Aleecia M. McDonald and Lorrie Faith Cranor, “The Cost of Reading Privacy Policies,” I/S Journal of Law and Policy, 4 (2008): 543, 565.
- Arthur Allen Leff, “Contract as Thing,” American University Law Review 19 (1970): 131.
- Nikhil Narendran, “Policy Framework for Protection of Big Data in State Possession,” in Blockchain for Property: A Roll Out Road Map for India, eds. Baladevan Rangaraju and Vishnu Chandra (New Delhi: India Institute, 2017): 34, 40.
- Rahul Matthan, Privacy 3.0: Unlocking Our Data-Driven Future (Noida: Harper Collins, 2018): 167–171.
- Carmine Cifaldi, “Unmanned Aircraft System Privacy and Data Protection,” in Handbook of Unmanned Aerial Vehicles, eds. K.P. Valavanis and G.J. Vachtsevanos (eBook: Springer, 2018): 1–19.
- Voluntary Best Practices for UAS Privacy, Transparency, and Accountability (Washington, D.C.: National Telecommunications and Information Administration, 2016), <a href="<a href="source">source">source">source.
- Clark D. Cunningham, “Apple and the American Revolution: Remembering Why We Have the fourth Amendment”, The Yale Law Journal, volume 126, <a href="source">source">source
- “ Breaking Down Apple’s iPhone Fight With the U.S. Government”, The New York Times, March 21, 2016, <a href="source">source">source
- Nick Statt, “Apple’s iCloud partner in China will store user data on servers of state-run telecom”, The Verge, July 18, 2018, <a href="source">source">source
- “Chen Guangcheng, Apple Can’t Resist Playing by China’s Rules”, The New York Times, January 23, 2018, <a href="source">source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, <a href="source">source">source
- Ibid., “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming), Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="source">source">source
- “Top 20 Countries with the Highest Number Of Internet Users”, <a href="source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="source">source">source
- Ibid.
- See Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="source">source">source
- Krishna Pokharel and Rajesh Roy, “India Says Rumors About Child Snatching on WhatsApp Led to Mob Killings”, The Wall Street Journal, July 5, 2018, <a href="source">source">source
- . Section 91, Code of Criminal Procedure, 1973
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="source">source">source
- Id.
- “Cross-Border Law Enforcement Demands: Analysis of the U.S. Department of Justice’s Proposed Bill”, Center for Democracy and Technology, August 17, 2016, <a href="source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Data localization is no solution,” The Hindu, August 3, 2018, <a href="source">source">source
- This, however, requires an executive agreement between the United States and the foreign country certifying that the state will rely on robust privacy protections, and respect for due process and the rule of law when making requests to companies directly. Such a framework over time, will not only need to be transparent and hold both companies and LEAs accountable but also be scalable to respond to the increasing volume and complexity of requests. Specifically, due process safeguards on user notification, redressal etc. will need to be incorporated. The U.S. Department of Justice recently issued clarifications on how the CLOUD Act will be operationalized available at <a href="source">source">source
- For more on the privacy protecting requirements under CLOUD Act, both at an institutional level and for individual requests, see Madhulika Srikumar, Debrae Kennedy-mayo, Peter Swire and Sreenidhi Srinivasan, “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, <a href="source">source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- Sections 40 and 41, The Personal Data Protection Bill, 2018
- Ibid.
- Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, “A Free and Fair Digital Economy Protecting Privacy, Empowering Indians”, 27 July 2018
- Ministry of Electronics and Information Technology, “The Information Technology [Intermediaries Guidelines (Amendment) Rules] 2018,” <a href="source">source">source
- Pranesh Prakash,“Why Data Localisation Might Lead To Unchecked Surveillance,” Centre for Internet and Society, October 15, 2018, <a href="source">source">source ; “US criticises India's data localisation norms, draft e-commerce policy,” The Economic Times, April 9, 2019, <a href="source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="source">source">source
- Josh Constine,” Zuckerberg warns of authoritarian data localization trend,” Techcrunch, <a href="source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="source">source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- “RBI data localisation: 80 percent players, including WhatsApp, comply with norms”, Business Standard, <a href="source">source">source -80-players-including-whatsapp-comply-with-norms-118101500907_1.html
- “Facebook takes a tough stand on data storage amidst India’s localisation push”, The Economic Times, <a href="source">source">source
- WhatsApp is working to comply with Reserve Bank of India (RBI) regulations on the local storage of payment-related data, the Economic Times reported. “Only some engineering work is left,” an anonymous senior Facebook executive told ET. <a href="source">source">source -mandate-report-why-is-it-needed/
- “India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, <a href="source">source">source
- Komal Gupta, “Google Agrees to Comply with RBI’s Data Localisation Norms,” Livemint , September 10, 2018, <a href="<a href="source">source">source"><a href="source">source">source Surabhi Aggarwal, “Industry bodies write to IT minister Ravi Shankar Prasad against data bill,” Economic Times, October 4, 2018, //economictimes.indiatimes.com/articleshow/66062141.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- See U.S. India Strategic Partnership Forum (USISPF) submission to MeitY available at <a href="source">source">source
- Aditya Kalra, “U.S. senators urge India to soften data localisation stance,” Reuters, October 13, 2018, <a href="source">source">source
- Ashish Shukla, “RBI refuses to extend deadline for data localisation,” IBTimes, October 14, 2018, <a href="source">source">source
- Bhavin Patel and Hemant Krishna, “Data Localisation: Here’s why the RBI isn’t listening to the ‘Mirroring’ argument,” CNBC TV18, October 15, 2018, <a href="source">source">source
- Rishab Bailey and Smriti Parsheera ,”Data localisation in India: Questioning the means and ends,”The Leap Blog, February 22, 2019, <a href="source">source">source
- Amazon not mirroring it abroad Whatsapp asked for 5 more months, mastercard and rest asked for one year
- “Russia fines Facebook $50 for failing to comply with local data privacy law, ” ZDNet, April 12, 2019, <a href="source">source">source ; Mark Scott, “Russia Prepares to Block LinkedIn After Court Ruling,” The New York Times, November 10, 2016, <a href="source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="source">source">source
- Government authorities increasingly rely on blocking access to internet altogether to contain cases of public unrest. See Timothy Mclaughlin ,“How Whatsapp Fuels Fake News And Violence In India, ” The Wired, December 12, 2018, <a href="source">source">source
- “Fighting fake news: Govt asks Whatsapp to take immediate action,” Economic Times, July 3, 2018, <a href="source">source">source
- The Indian government introduced the draft amendment to the Information Technology Act, 2008 to overhaul the current intermediary liability regime in India. One of the problematic provisions included the requirement for intermediaries to enable tracing the originator of messages. See Yesha Tshering Paul“ Fake News: Misguided Policymaking To Counter Misinformation,” Bloomberg Quint, January 14, 2019, <a href="source">source">source
- The Srikrishna Committee appointed to draft India’s first comprehensive data protection law introduced the term “fiduciaries” in the Personal Data Protection Bill, 2018. See Arghya Sengupta, “Why the Srikrishna Committee Rejected Ownership of Data in Favour of Fiduciary Duty,” The Wire, August 2, 2018, <a href="source">source">source
- For more on how Indian law enforcement agencies make requests for data under Indian law, see Chapter 3 in Srikumar et al., “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, <a href="source">source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="source">source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="source">source">source
- For instance, Facebook commits to fight back in court if requests are overbroad or defective. Chris Sonderby, “Sharing Our Latest Transparency Report,” Facebook Newsroom, May 23, 2019, <a href="source">source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, <a href="source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="source">source">source
- See 3(13), Personal Data Protection Bill, 2018. Available at <a href="source">source">source; Stakeholders in India however have argued that the draft bill does not imbibe the philosophy of fiduciaries completely since certain sections in the bill still places the disproportionate onus on users to realize their rights. See comments submitted by Dvara Research to MeitY available at <a href="source">source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- See A Free and Fair Digital Economy Protecting Privacy, Empowering Indians: Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, July 27, 2018, available at <a href="source">source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- Id. , see Jack M.Balkin, "Fixing Social Media's Grand Bargain." Hoover Working Group on National Security, Technology, and Law, Aegis Series Paper 1814,2018.
- The author of this piece argues that Balkin’s fiduciary framework could eliminate the third party doctrine in the U.S. altogether binding all companies to a higher duty of care towards users. See Mike Godwin, It’s Time to Reframe Our Relationship With Facebook,” Slate, November 16, 2018, <a href="source">source">source; In India, the Supreme Court through the 2017 ruling recognising privacy as a fundamental right invalidated the application of third party doctrine. See Gautam Bhatia, “The Supreme Court’s Right to Privacy Judgment – IV: Privacy, Informational Self-Determination, and the Idea of Consent,” Indian Constitutional Law and Philosophy, August 2017, <a href="source">source">source
- Vivan Sharan, Sidharth Deb, “Reimagining fiduciaries in the digital economy,” Livemint, August, 15, 2018, <a href="source">source">source
- Ariel Dobkin, "Information Fiduciaries in Practice: Data Privacy and User Expectations." Berkeley Tech. LJ 33 2018: 1.
- Dalip Singh, “Law enforcement agencies favour data localisation “, Economic Times, October 8, 2018, <a href="source">source">source /articleshow/66113360.cms
- India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, <a href="source">source">source
- Aria Thaker, “Behind RBI’s digital payments panel, a controversial firm’s shadow, conflict of interest allegations”, Scroll, January 10, 2019, <a href="source">source">source; The Indian government’s motivation to create an environment favourable to domestic tech firms is most evident in its recent policy on Foreign Direct Investment in e-commerce. See “What India e-commerce policy entails for online retailers”, Livemint, January 16, 2019, <a href="source">source">source
- a. Aditya Kalra and Aditi Shah, “U.S. firms face off with Indian rival in lobbying against data storage rules,” Reuters, July 24, 2018, <a href="<a href="source">source">source"><a href="source">source">source b. Vidhi Choudhary and Yashwant Raj, “Cambridge Analytica row: Facebook data breach hit 560K Indian users,”Hindustan Times, April 5, 2018, <a href="source">source">source
- Prashant Reddy, “View: It's time to tame the social media beast,” Economic Times, February 13, 2019,//economictimes.indiatimes.com/articleshow/67966170.cms?from=mdr&utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- Ben Brody, “Tech Giants Back U.S. Bill Governing Cross-Border Data Searches,”Bloomberg, February 7, 2018, <a href="source">source">source
- Brad Smith, “A call for principle-based international agreements to govern law enforcement access to data,” Microsoft On the Issues, September 11, 2018, <a href="source">source">source
- Michael Punke, “AWS and the CLOUD Act,” AWS Security Blog, May 27, 2019, <a href="<a href="source">source">source"><a href="source">source">source ; Chaim Gartenberg, “Apple will launch a global web portal for law enforcement requests later this year,” The Verge, September 6, 2018, available at <a href="<a href="source">source">source"><a href="source">source">source; Kristen E. Eichensehr, “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming)
- “One year later: A cybersecurity commitment shared by more than 100 companies,” Tech Accord, May 9, 2019, <a href="source">source">source
- Mike Isaac, “Zuckerberg Plans to Integrate WhatsApp, Instagram and Facebook Messenger,” The New York Times, January 25, 2019, <a href="source">source">source
- Mike Isaac, “Facebook’s Mark Zuckerberg Says He’ll Shift Focus to Users’ Privacy,” The New York Times, March 6, 2019, <a href="source">source">source . Facebook’s official announcement is available at <a href="source">source">source
- Law enforcement agencies across the world make overbroad demands for location data to find suspects and witnesses at crime scenes. See Jennifer Valentino-Devries, “Tracking Phones, Google Is a Dragnet for the Police,” The New York Times, April 13, 2019, <a href="source">source">source; also on “reverse location warrants” see Aaron Mak, Close Enough, Slate, February 19, 2019, <a href="source">source">source; Matthew Haag, “FamilyTreeDNA Admits to Sharing Genetic Data With F.B.I.”, The New York Times, February 4, 2019, <a href="source">source">source
- Josh Costine, “Facebook will pass off content policy appeals to a new independent oversight body,” Techcrunch, <a href="source">source">source
- For instance, in the UK, source">source; France, source">source; and Germany, source">source
- Varun Aggrawal, “Infosys to Set up Data Marketplace for Enterprises – The Hindu BusinessLine,” June 19, 2018, source">source.
- “The Personal Data Protection Bill” (2018), source">source; Justice B.N. Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” (Committee of Experts under the Chairmanship of Justice B.N. Shrikrishna, July 2018), source">source.
- Jack M. Balkin, “Information Fiduciaries and the First Amendment,” U.C. Davis Law Review 49, no. 4 (2016): 1234; Lina Khan and David Pozen, “A Skeptical View of Information Fiduciaries” (SSRN, February 25, 2019), source">source.
- Whilst the European Union’s approach in the GDPR is limited by is focus on privacy. The challenges of governing data-driven decision-making go well beyond concerns about privacy. See Talia Gillis and Josh Simons, “Explanation < Justification: GDPR and the Perils of Privacy,” (SSRN, 2019).
- To use André Béteille’s phrase, one of India’s most important twentieth-century social theorists. André Béteille, Anti-Utopia: Essential Writings of André Béteille (New Delhi: Oxford University Press, 2005); André Béteille, Ramachandra Guha, and Jonathan P. Parry, Institutions and Inequalities: Essays in Honour of Andre Beteille (New Delhi: Oxford University Press, 1999).
- Purva Khera, Macroeconomic Impacts of Gender Inequality and Informality in India, IMF Working Paper (Washington, District of Columbia DC: International Monetary Fund, 2016); Carol Vlassoff, Gender Equality and Inequality in Rural India: Blessed with a Son (New York, NY: Palgrave Macmillan, 2013); Stephen M. Caliendo, Inequality in America: Race, Poverty, and Fulfilling Democracy’s Promise, Dilemmas in American Politics (Boulder, CO: Westview Press, 2014); Xavier N. De Souza Briggs, Social Capital and Segregation: Race, Connections, and Inequality in America (Cambridge, MassMA.: John F. Kennedy School of Government, 2002).
- It is important to note that this is not just about unrepresentative data. Unrepresentative data excludes some groups, perhaps because there are not enough data points about that group, or the data points that exist are less numerous or rich. This is an important problem, particularly in India, where the underrepresentation of Untouchables and women in data is systemic. But the problems this paper considers would remain even in the most accurate and careful data sets, which are still a reflection of the structure of our social world, including the inequalities and injustices that characterize it. A representative dataset is not devoid of injustice. This leaves open a host of important issues about when the representation of injustice in a dataset actually constitutes an injustice, an issue I hope to address in future work. Cynthia Dwork and Deirdre Mulligan, “It’s Not Privacy, and It’s Not Fair,” Stanford Law Review 66 (September 2013): 35–40; Kate Crawford, “The Hidden Biases in Big Data,” Harvard Business Review, April 1, 2013, source">source; David Garcia et al., “Analyzing Gender Inequality through Large-Scale Facebook Advertising Data,” Proceedings of the National Academy of Sciences of the United States of America 115, no. 27 (2018): 6958–63, source">source.
- Andrew D. Selbst and Solon Barocas, “The Intuitive Appeal of Explainable Machines,” SSRN Electronic Journal, 2018, source">source.
- Daniel Kahneman, Thinking, Fast and Slow (New York, NY: Farrar, Straus and Giroux, 2011).
- Virginia Eubanks, Automating Inequality: How High-Tech Tools Profile, Police and Punish the Poor (New York, NY: St. Martin’s Press, 2018).
- TOI, “Aadhaar Covers over 89% Population: Alphons,” The Times of India, accessed March 5, 2019, source">source.
- Cynthia Dwork et al., “Fairness through Awareness,” ITCS ’12 (ACM, 2012), 214–226.
- Sam Corbett-Davies and Sharad Goel, “The Measure and Mismeasure of Fairness: A Critical Review of Fair Machine Learning,” 20180731, source">source.
- Jon Kleinberg, Sendhil Mullainathan, and Manish Raghavan, “Inherent Trade-Offs in the Fair Determination of Risk Scores,” Proceedings of Innovations in Theoretical Computer Science (ITCS), 2017.
- I am therefore moving beyond privacy as a framework for thinking about the governance of data-driven decision-making. Privacy is one concern we might have about those decision-making procedures, usually called “data processing” in existing legislation in the EU and India. But it is far from the only concern. Other aims and values need to be brought into play. Privacy should not be the sole lens through which to view governance data and machine learning. A29WP, “Guidelines on Automated Individual Decision-Making and Profiling” (Article 29 Data Protection Working Party, 2018), source">source.; ICO, “Guide to the General Data Protection Regulation (GDPR)” (U.K.: Information Commissioner’s Office, August 2018), source">source; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Most other important pieces of non-discrimination legislation extend the categories to which duties of non-discrimination apply. These include the Equal Pay Act of 1963, which prohibits the payment of different wages to employees of different sexes who perform equal work under similar conditions; the Americans with Disabilities Act (ADA) of 1990, which prohibits discrimination against individuals with a disability and requires the provision of reasonable accommodation to someone who is legally disabled; and the Genetic Information Non-Discrimination Act of 2008, which protects individuals from genetic discrimination in the healthcare and insurance industries.
- For instance, U.S. Executive Orders 10925, 11246, and 11375 require federal contractors who do over $10,000 in Government business in one year to “take affirmative action to ensure that applicants are employed, and that employees are treated during employment, without regard to their race, color, religion, sex or national origin.”
- David Strauss, “Discriminatory Intent and the Taming of Brown,” University of Chicago Law Review 56, no. 3 (1989): 935–935.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019, source">source; Solon Barocas and Andrew D. Selbst, “Big Data’s Disparate Impact,” California Law Review 104, no. 3 (June 1, 2016): 671–732.
- There is an important emerging debate about precisely this point, including a paper of my own. For the key protagonists, see Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019; Barocas and Selbst, “Big Data’s Disparate Impact”; Lior Strahilevitz, “Privacy versus Antidiscrimination,” Public Law & Legal Theory Working Paper, no. 174 (2007), source">source; Pamela L. Perry, “Two Faces of Disparate Impact Discrimination,” Fordham Law Review 59, no. 4 (March 1, 1991): 523–595; Cass Sunstein, “The Anticaste Principle,” Michigan Law Review, January 1, 1993, 2410.
- Barocas and Selbst, “Big Data’s Disparate Impact,” 724.
- Sophia Moreau and Deborah Hellman, Philosophical Foundations of Discrimination Law (Oxford: Oxford University Press, 2013), 259.
- Béteille, Anti-Utopia.
- Cass Sunstein makes a similar point. If there is prejudice and statistical discrimination, and if third parties promote discrimination, there will be decreased investments in human capital. Such decreased investments will be a perfectly reasonable response to the real world. And if there are decreased investments in human capital, then prejudice, statistical discrimination, and third-party effects will also increase. Statistical discrimination will become all the more rational; prejudice will hardly be broken down; consumers and employers will be more likely to be discriminators.Ronnie J. Steinberg, Applications of Feminist Legal Theory to Women’s Lives: Sex, Violence, Work and Reproduction. Women in the Political Economy. (Temple University Press, 2012), 560; Sunstein, “The Anticaste Principle,” 2431.
- Dwork et al., “Fairness through Awareness,” 215.
- As Hannah Arendt argued when comparing the American and French revolutions. Rohit De, A People’s Constitution: The Everyday Life of Law in the Indian Republic (Princeton, CT: Princeton University Press, 2018), 5; Uday S. Mehta, “The Social Question and the Absolutism of Politics,” 2010, source">source; Hannah Arendt, On Revolution (New York, NY: Viking Press, 1965).
- Sunil Khilnani, The Idea of India (New Delhi: Penguin, 2004).
- Kalpana Kannabirān, Tools of Justice: Non-Discrimination and the Indian Constitution (New York, NY: Routledge, 2012), 7.
- B. R. Ambedkar is a neglected character in India’s political history. His ideas have received little attention compared with more widely known figures M. K. Gandhi and Jawaharlal Nehru, in part because of the Congress Party’s dominant role in shaping India’s national story, and the contours of democratic politics after independence. See Valerian Rodrigues, “Justice as the Lens: Interrogating Rawls through Sen and Ambedkar,” Indian Journal of Human Development 5, no. 1 (2011): 153–174; Jean Drèze and Amartya Sen, “Democratic Practice and Social Inequality in India,” Journal of Asian and African Studies 37, no. 2 (2002): 6–37; Martha Nussbaum, “India: Implementing Sex Equality through Law,” Chicago Journal of International Law 2, no. 1 (2001): 35–58.
- Kannabirān, Tools of Justice, 162.
- Patterns of domination, which produce these persistent inequalities in the political and economic spheres, have two effects. First, they undermine the liberty of each individual to benefit from an effective and competent use of their powers. Democracy entailed political equality. Political equality entailed the absence of domination. Second, patterns of domination undermine the possibility of free association. Drawing on John Dewey, Ambedkar argued that free association – the capacity of groups to form links, to self-govern over time – was essential to democratic life. Democracy is not merely a form of government. It is primarily a mode of associated living, of conjoin communicated experience. It is essentially an attitude of respect and reverence towards fellow men. Patterns of domination made impossible the associations and relationships that encouraged and embodied this attitude of respect and reverence.B.R. Ambedkar, Annihilation of Caste: The Annotated Critical Edition, ed. S. Anand (New Delhi: Navayana, 2014), 280, 261.
- Béteille, Guha, and Parry, Institutions and Inequalities, 342.
- V. R. Krishnaiyer, Akhil Bharatiya Soshit Karamchari Sangh and Others vs. Union Of India, No. 185 (Supreme Court of India November 14, 1980).
- J B. Sudershan Reddy, Indian Medical Association vs. Union Of India & Ors, No. 8170 (Supreme Court of India May 12, 2011).
- Deepti Shenoy, “Courting Substantive Equality: Employment Discrimination Law in India,” University of Pennsylvania Journal of International Law 34, no. 3 (2013): 632.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 20190210, source">source.
- The Personal Data Protection Bill; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” 8.
- De, A People’s Constitution; Béteille, Guha, and Parry, Institutions and Inequalities; Khilnani, The Idea of India.
- This is precisely the challenge that Jack Balkin, who first coined the data fiduciary concept, warned about. Balkin, “Information Fiduciaries and the First Amendment,” 1232–1324.
- As André Béteille argues, institutional well-being is an important consideration. He describes this as equality as a matter of policy, not of right, warning against placing too much faith specifically in the state to eliminate every social inequality, every difference of caste or class. Béteille, Anti-Utopia, 435.
- Joshua A. Kroll et al., “Accountable Algorithms,” University of Pennsylvania Law Review 165, no. 3 (2017): 633–705; Andrew Tutt, “An FDA for Algorithms,” Admin. L. Rev. 83 (2016); Jeremy Waldron, “Accountability: Fundamental to Democracy,” SSRN Scholarly Paper (Rochester, NY: Social Science Research Network, April 1, 2014), source">source; Craig T. Borowiak, Accountability and Democracy: The Pitfalls and Promise of Popular Control (Oxford University Press, 2011); Adam Przeworski, Susan Carol Stokes, and Bernard Manin, Democracy, Accountability, and Representation (Cambridge: Cambridge University Press, 1999).
- “World Metro Figures Statistics Brief,” UITP, accessed April 29, 2019, source; Global BRT Data, “Global BRT Data,” accessed April 29, 2019, source.
- Autorickshaws are three-wheeled vehicles that supply much of the last-mile connectivity to mass transit in Indian cities.
- Candace Brakewood, Gregory Macfarlane, and Kari Watkins, “The Impact of Real-Time Information on Bus Ridership in New York City,” Transportation Research Part C: Emerging Technologies, 53 (April 2015): 59-75.; Eric Jaffe, “The Best Evidence Yet That Real-Time Arrival Info Increases Transit Ridership,” CityLab, accessed Feb. 20, 2019, source.
- Aaron Antrim and Sean Barbeau, “The Many Uses of GTFS Data- Opening the Door to Transit and Multimodal Applications,” ITS America’s 23rd Annual Meeting & Exposition, April 2013, source; Transit Center, “The Data Transit Riders Want “A Shared Agenda for Public Agencies and Transit Application Developers,” accessed Feb. 16, 2019, source.
- “Open Government Partnership,” Open Government Partnership, accessed Jan. 28, 2019, source.
- “WRI India,” WRI India, accessed January 28, 2019, source.
- KMRL signed a Memorandum of Understanding (MOU) with WRI in February of 2017, which included several initiatives to support urban transport and urban development, including public transport, transit oriented policy, electric mobility, and urban planning in Kochi.
- Available at: source
- The GPS installation was paid for by the Urban Mass Transit Company Limited (UMTC), a joint venture of several national and state government agencies and the private company Infrastructure Leasing and Financial Services Limited (IL&FS).
- “Kochi Metro Rail Limited signs pact with auto drivers,” Deccan Chronicle, Jan. 24, 2018, source.
- In Hindi, “Chalo” means “Let’s Go!”
- “Demographia World Urban Areas,” Demographia, April 2019, source
- G.P. Hari, Personal Interview, Kochi, Feb. 11, 2019.
- “Kochi gets Chalo app for live tracking of buses, ferries,” The Hindu, accessed Jan. 28, 2019, source.
- Aparna Vijaykumar, Personal Interview, Online, March 5, 2019.
- Arjun G., “Delhi Government launches Open Transit Data Platform for Buses,” Medium, accessed Jan. 28, 2019, source; Open Data Portal available at: source
- Pravesh Biyani, Personal Interview, New Delhi, Feb. 14, 2019.
- Ibid.
- Ibid.
- “PoochhO,” Delhi Integrated Multi-modal Transit System, accessed Feb. 15, 2019, source.
- Samir Sharma, Personal Interview, New Delhi, Feb. 15, 2019.
- Ibid.
- Pravesh Biyani, Personal Interview, New Delhi, Feb. 14, 2019.
- Nikhil V.J., “Re: [datameet] – Open Transit Data – Delhi,” Email, 2019.
- “BMTC to open up transit data enabling entrepreneurs build mobility solutions.” Economic Times. source; “BMTC’s data-sharing plan on back burner,” The Hindu, accessed Feb. 4, 2019, source; Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, source.
- ET Bureau, “BMTC to open up transit data enabling entrepreneurs build mobility solutions,” Economic Times. source.
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, source.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, source.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- Tejas Pande, Personal Interview, New Delhi, Feb. 9, 2019;Vinay Sreenivasa, Personal Interview. Online, March 7, 2019; Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Ibid.
- “BMTC,” Bangalore Municipal Transport Corporation, accessed Feb. 20, 2019, source.
- Ibid; Tanushree Dev Barma, Personal Interview, Bangalore, March 5, 2019.
- S. Rajagopalan, Personal Interview, Bangalore, March 5, 2019.
- BMTC Data Sharing Policy Draft (July, 2018), Bangalore: Bangalore Municipal Transit Corporation, 2018.
- S. Rajagopalan, Personal Interview, Bangalore, March 5, 2019.
- Ibid.
- BMTC Data Sharing Policy Draft (July, 2018). Bangalore: Bangalore Municipal Transit Corporation, 2018.
- Srinivas Kodali, “BMTC Intelligent Transportation System (ITS) and Need for Open Transport Data,” Data Meet, accessed Jan. 28, 2019, source .
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, source
- Vinay Sreenivasa, Personal Interview, Online, March 7, 2019.
- Yunus Y. Lasania, “Telangana’s ‘open data’ policy to help start-ups address public issues,” LiveMint, accessed March 15, 2019, source
- Telangana Open Data Policy 2016, Hyderabad, Telangana: Government of Telangana, accessed March 15, 2019, source
- Ibid.
- Yunus Y. Lasania, “Telangana’s ‘open data’ policy to help start-ups address public issues,” LiveMint, accessed March 15, 2019, source
- “Background,” Factly, accessed Feb. 18, 2019, source
- Anant Maringanti, Personal Interview, Hyderabad, March 6, 2019.; Harsha Devulapalli and Girish Agrawal, “Mapping bus transit services in Hyderabad – an illustrative example of the use of open geospatial data,” Transportation Research Procedia. 25 (201): 4196-4206.
- Surya Kandukuri, Personal Interview, Hyderabad, March 6, 2019.
- Vishal Ramprasad, Personal Interview, Mumbai, Feb. 12, 2019.
- Srya Kandukuri, “Notes from our conversation,” Email, 2019.; Surya Kandukuri, Personal Interview, Hyderabad, March 6, 2019.
- Ibid.
- Aaron Antrim and Sean Barbeau, “The Many Uses of GTFS Data- Opening the Door to Transit and Multimodal Applications,” ITS America’s 23rd Annual Meeting and Exposition, April 2013, source
- Harsha Devulapalli and Girish Agrawal, “Mapping bus transit services in Hyderabad – an illustrative example of the use of open geospatial data,” Transportation Research Procedia, 25 (201): 4196-4206.
- Anumita Roychowdhury, Gaurav Dubey, Anu Soman, Waiting for a Bus: Strategies to improve Delhi’s bus system. (New Delhi: Centre for Science and Environment, 2017).
- Ibid.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- In many cases, transit operators do not make a system map or timetable available. Data can be used to provide these more analog solutions in order to meet the information needs of riders who do not possess smartphones or do not access transit data in an online format. Other technologies may prove useful to encompass groups of people who might not use smartphones, such as text or voice-based services.
- Open Government Data Platform India, “National Data Sharing and Accessibility Policy,” accessed Jan. 28, 2019, source
- “Open Government Data Platform India,” Open Government Data Platform India, accessed Jan. 28, 2019, source
- Mohd Ujaley, “Countries to Ride on India’s Open Government Data Platform,” Express Computer, source
- Simonti, Chakraborty, “Open Data Policy of the Government of India: What has it achieved?” CBG India, source
- Joel Gurin, Personal Interview, Online, March 1, 2019.
- Mark Headd, “New Thinking in How Governments Deliver Services,” in Beyond Transparency, ed. Brett Goldstein with Lauren Dyson. (San Francisco: Code for America Press, 2013): 278-9.
- Rajarshi Sahai, “Going Public with Public Transport Data For Public: Dilemmas of Developing Cities,” accessed Jan. 28, 2019, source
- “National Urban Innovation Stack: Strategy and Approach,” New Delhi, India: Ministry of Housing and Urban Affairs, Government of India, 2019, accessed Feb. 8, 2019, source
- “DataSmart Cities: Empowering Cities through Data,” Ministry of Housing and Urban Affairs, Government of India, source
- “We Continue to Create an Open Data Culture,” Makaia, accessed March 5, 2019, source
- “National Urban Transport Policy (2006),” New Delhi, India: Ministry of Urban Development, Government of India, 2006. source
- “National Urban Transport Policy (2014),” New Delhi, India: Ministry of Urban Development, Government of India, 2014. source
- “National Urban Transport Policy,” New Delhi, India: Ministry of Urban Development, Government of India (2006), source
- Ibid.
- GP Hari, Personal Interview, Kochi, Feb. 11, 2019.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Harshith Gokulendra, Personal Interview, New Delhi, March 1, 2019.
- O.P. Agarwal, Personal Interview. New Delhi, March 1, 2019.
- Srinivas Kodali, Personal Interview, New Delhi, Feb. 5, 2019.
- Rajarshi Sahai, Personal Interview, Online, Jan. 30, 2019.
- Available at: source
- Kunal Kumar, “Building National Urban Innovation Stack for Indian Smart Cities Mission – Technologies and Financing Model,” (Panel presentation, Smart Republic Conference, New Delhi, India, Feb. 27-28, 2019).
- Srinivas Kodali,. Personal Interview. New Delhi, Feb. 5, 2019.
- Samir Sharma, Personal Interview. New Delhi, Feb. 15, 2019.
- GP Hari, Personal Interview, Kochi, Feb. 11, 2019.
- Vishal Ramprasad, Personal Interview, Mumbai, Feb. 12, 2019.
- Harsha Krishna, Personal Interview. Bangalore, March 4, 2019;Vipassana Vijayarangan, Personal Interview, Online, Jan. 15, 2019.
- “National Urban Transport Policy,” New Delhi, India: Ministry of Urban Development, Government of India, 2006, source.
Blockchain Regulation in the United States: Evaluating the overall approach to virtual asset regulation (Tanvi Ratna)
Tanvi Ratna is a policy analyst and engineer, managing blockchain projects with a leading global consulting firm, based in India. She helped design the blockchain policy framework of the Government of Karnataka, home to India's Silicon Valley, and helps advise the central government in India on blockchain regulation. Her research focuses on designing effective regulatory frameworks for blockchain.
Introduction
Blockchain technology and cryptocurrencies have received more hype and regulatory attention than perhaps any other emerging technology in recent times. There are both private blockchains, where access to the network is permissioned, and public blockchains, where access is open. Public blockchains are powered by virtual currencies or cryptocurrencies. They are different from Distributed Ledger Technology (DLT), in that they have a consensus layer powered by cryptography, and the whole system sustains itself with an incentive structure, which is the cryptocurrency. Blockchain, for the purposes of this paper, primarily refers to public blockchains unless otherwise specified, as the bulk of the regulatory and policy focus has been around public blockchains.
Blockchain offers a highly compelling case of futuristic regulation and the ability of governments to cope with rapid technological developments for the following reasons:
- Technology with in-built economic model: Public blockchains are different from other technological innovations so far, in the sense that they are more than just a technology, but also more than just a currency or financial instrument. Blockchains are networks with an unorthodox peer-to-peer economic model. This makes it difficult to define a policy precedent or approach.
- Multi-faceted and global instrument: Cryptocurrencies can behave as a currency or equity, they are global by nature, and cut across the fields of technology, finance, and business. Traditionally, all these aspects of economic behavior are regulated in silos.
- Paradigm shift for society and business models: Because of their networked and peer-to-peer nature, blockchains can reorganize existing silos in systems and processes, and have far reaching effects on existing social, business and governance structures.
Blockchain is an interesting test of how governments cope with emerging paradigms, as it is a challenge to traditional mindsets and systems across the board. As phrased in a recent report by Don Tapscott, the challenge is to create a regulatory environment that “simultaneously protects investors and consumers, sustains innovation, grows the economy, and cultivates a new kind of society.”306
This study is a brief survey of regulatory actions and capacity building efforts undertaken by different agencies of the U.S. federal government towards cryptocurrencies and blockchain technology, and some perspectives from the ecosystem and state government levels. The aim of this study is to assess the overall government strategy being adopted towards this technology in the United States.
The Overall Approach to Blockchain Regulation in the United States
The definition of cryptocurrencies is still an evolving debate in the United States, with many calls for over-arching definitions and clarifications. Even at the time of publication of this paper, a taxonomy act had been introduced in the U.S. Congress to address this precise issue.307 The government, at least at the level of federal financial regulators, applies the following system of classification towards cryptocurrencies, or their preferred moniker the “digital asset.”
Figure 1: Classification of Virtual Assets by U.S. Financial Regulators
Source: Multiple officials, U.S. Department of Treasury, personal interviews, Feb. 2019, Washington, D.C.
There are many other agencies involved, outside of the three major regulators, even at the federal level. These include the U.S. Congress, which has a Blockchain Caucus; criminal enforcement agencies such as the FBI, Department of Justice, and Homeland Security; and a host of inter-departmental task forces.
For the purpose of this study, we explore in some detail the actions of the three major regulators who are the main drivers of activity, as well as some perspectives from the ecosystem and state government levels.
Activity by Major Federal Regulators
Securities and Exchange Commission (SEC)
The SEC has been one of the two most active agencies on cryptocurrency regulation in the United States; the other being the Commodity Futures Trading Commission (CFTC), which will be discussed later. The SEC is not one of the first agencies to begin regulating but it became more active with the growth of Initial Coin Offerings (ICOs) and security issue related activity in the blockchain ecosystem around 2016. The SEC views (some) virtual assets as securities, and recently issued guidance to that effect.
Regulatory Action: From 2014 to 2017, the SEC was cautious of cryptocurrencies. From 2013 to 2014, the agency issued investor alerts on Ponzi schemes and fraudulent activities in virtual currencies.308 The focus was on investor education and fraud prevention.
The DAO hack of 2016 309 was a major turning point in shifting the attention of the SEC towards the classification of cryptocurrencies into securities and non-securities. In 2017, the SEC issued an in-depth investigative report definitively classifying the DAO as a security.310 This spurred intense deliberation globally on security vs. utility tokens, and different countries such as Switzerland, Singapore, South Korea issued classification frameworks.
ICOs proliferated in 2017-2018 and the cryptocurrency market reached some of its highest valuations by the end of 2017. In the wake of concerns about scams and an unregulated ICO market, the SEC undertook heavy enforcement action in Feb 2018. Over 80 firms that had undertaken ICO offerings were subpoenaed.311
In 2018-20119 the explorations of asset classes deepened with the submission of proposals to launch a Bitcoin exchange traded fund (ETF) to boost institutional investment. The SEC rejected nine of these proposals. Some major decisions on new submissions are expected in 2019.312
On April 3, 2019 the SEC released its most definitive guidance to date, providing a framework for identifying whether a token was an investment contract or not.313 The SEC has now set a precedent of issuing “no-action letters” to startups after studying their business models. The no action letter lays out conditions to be met and serves as an assurance of no action by the SEC against the startup, for the actions it has disclosed in its application. The SEC issued its first “no-action letter” after 11 months of deliberation and discussion with the Florida-based startup, TurnKey Jet, Inc. after examining it through the Howey Test, 314 and deciding that their token offering was not a security, but closer to crypto-based store credit.
Capacity Development: The first in-depth activity by the SEC on blockchain was the DAO investigation in 2016, and they have been steadily increasing their capacity on the subject ever since. In January 2018, Hester Peirce, a leading champion of blockchain technology, was appointed as one of the five Commissioners of the SEC.315 The agency already had active working groups looking at the technology, such as the distributed ledger working group.
In June 2018, a new senior advisory position was created at the SEC to coordinate efforts across all SEC divisions and offices regarding the application of U.S. securities laws to emerging digital asset technologies and innovations, including initial coin offerings and cryptocurrencies. Valerie Szczepanik was appointed to this role.316
Similar to the model of LabCFTC,317 in October 2018 the SEC set up a dedicated team, called the Strategic Hub for Innovation and Financial Technology (Fintech Finhub), with a sizeable staff to serve as the focal point for tracking and interacting with fintech issues and innovators.318 The Finhub is also in the process of hiring a crypto securities lawyer at the time of this writing.319
Commodity Futures Trading Commission (CFTC)
The CFTC has been one of the two most active federal agencies in the regulation of cryptocurrencies. It is also widely considered to be the most supportive of the innovation.
Virtual currencies have been determined to be commodities by the CFTC under the Commodity Exchange Act. While its regulatory oversight authority over commodity cash markets is limited, it maintains general anti-fraud and manipulation enforcement authority over virtual currency cash markets as a commodity in interstate commerce.320
Regulatory Action: The CFTC adopts and advocates for a “light touch” approach towards cryptocurrencies. It refrained from issuing any directives or taking any enforcement action until late 2018.
During peaking bitcoin prices, ICOs, and an SEC crackdown, the CFTC also undertook enforcement actions from early 2018. It issued a first full ban for fraudulent trading activity to the company CabbageTech in August 2018, and issued the arrest of a cryptocurrency trader for fraud in November 2018.321
Capacity Building: The CFTC has been quick to embrace the incoming changes brought about by a host of emerging technologies, including blockchain and machine learning, and focuses on staying on top of developments and innovating its own processes.322
In 2017, they pioneered a forward-looking regulatory model with the launch of LabCFTC, a focal point to make the CFTC more accessible to fintech innovators and serve as a platform to inform the Commission's understanding of new technologies. The lab aims to promote responsible FinTech innovation to improve the quality, resiliency, and competitiveness of U.S. markets, and to accelerate CFTC engagement with fintech and regtech solutions.
The lab has grown to a six-member core team with law and technology backgrounds and serves as an internal platform and think tank for the CFTC. It is structured in a hub and spoke model, with staff from operating divisions who serve as subject matter experts. LabCFTC has an open door policy and pursues active engagement with the startup and stakeholder community including through hosting office hours in cities across the U.S. It also has international partnerships with governments in the United Kingdom, Australia, and Singapore.323
In 2017, the Agency launched a podcast series, the first of its kind for a government regulator, to educate consumers and bring in wider perspectives from government, private sector, and civil society on a range of topics, including FinTech. Over five podcasts, four consumer advisories, and two primers were released by the CFTC LabCFTC, and the Office of Customer Education and Outreach on the topics of cryptocurrencies and smart contracts between 2017 and 2018.324 The lab recently issued a Request for Information on Ether in order to help inform the Agency on aspects of crypto-asset markets and mechanics. 325
The U.S. Department of the Treasury
The U.S. Department of the Treasury and its associated agencies play a host of important roles in setting the direction and coordination on digital asset regulation.
The U.S. Treasury has been looking into cryptocurrencies through its own divisions, the most visible of which have been three of its specialized agencies: the Internal Revenue Service (IRS), Financial Crimes Enforcement Network (FinCEN), and the Office of Foreign Assets Control (OFAC). The Treasury and their agencies look at virtual assets in their role as a currency, though as an exception, the IRS define them as property for tax purposes.
Financial Crimes Enforcement Network (FinCEN) and Office of Foreign Assets Control (OFAC)
One of the most active areas of guidance and enforcement by the Treasury has been around anti-money laundering (AML), know your customer (KYC), and Counter Terrorism Financing and Sanctions.
With a mandate to safeguard the U.S. financial system from illicit use and combat money laundering, the FinCEN was one of the first regulators to become active on cryptocurrencies in the United States. As early as 2013, the FinCEN issued guidance that virtual currency exchangers and administrators would be considered money transmission businesses (MSBs).326 In a letter to Congress in 2018, FinCEN reiterated that stance with clarifications regarding who would be required to comply.327
As a result, virtual currency exchangers and administrators are required to register with the FinCEN, comply with existing AML/KYC requirements, and the Bank Secrecy Act (BSA), including suspicious activity reports (SARs) and currency transaction reports (CTRs).
As of 2018, there are approximately 100 virtual currency exchangers and administrators that have registered as MSBs with FinCEN.328 FinCEN has examined one third of these MSBs and has brought several enforcement actions.
In 2018, FinCEN and OFAC both released guidance on virtual currencies compliance with sanctions on Iran.329 OFAC added a set of blacklisted digital currency addresses to their Specially Designated Nationals And Blocked Persons (SDN) list.
Internal Revenue Service (IRS)
In 2014, the IRS issued Notice 2014-21 in the form of FAQs to describe how existing tax principles would apply to transactions using virtual currencies.330 In this notice, the IRS stated that virtual currencies would be treated as property for federal tax purposes and provided some information on taxation for some activities such as mining, self-employment, contracting, and third party settlement. However, the technology has matured significantly since then, leaving many questions still unanswered. There have been an increasing number of calls from the community, from lawyers,331 and even from Congress332 for the IRS to issue updated information and clearer guidelines.
Capacity Building: There are two aspects of capacity building in the Treasury: one, at the level of coordination of overall financial regulation; and two, in terms of internal capacity.
At a high level, the Treasury Secretary has the authority to convene all financial regulators. Through the Financial Stability Oversight Council (FSOC), a working group on digital assets was convened in 2017. It was comprised of several regulators, including the SEC, CFTC, the Consumer Financial Protection Board (CFPB), the Federal Reserve, the Office of the Comptroller of the Currency (OCC). After 18 months of deliberation over new technologies, including blockchain, the FSOC came out with a seminal report on recommendations for FinTech in general, which included aspects such as the streamlining of state and federal money transmission laws and experimentation with regulatory sandboxes.333 In recent remarks, a senior official also said the Treasury supported the idea of a federal charter for streamlining regulation.334
The Treasury leads the FSOC digital asset working group and the Treasury and FinCEN participate in a host of inter-agency working groups such as the FBI-led Virtual Currency Emerging Threats Working Group, the FDIC-led Cyber Fraud Working Group, and the Terrorist Financing and Financial Crimes-led Treasury Cyber Working Group.335 These groups provide a consistent platform for capacity building and exchange amongst U.S. financial regulators on blockchain and virtual assets.
Unlike the other agencies, the FinCEN does not have a public-facing focal point of contact for the blockchain community. It does, however, have a network of dedicated officers for virtual currency in its relevant offices and bureaus, such as the Office of Terrorist Financing and Financial Crimes.
In terms of internal capacity building, a unique tool developed by the Treasury is the FinCEN Networking Bulletin that was launched in March 2013. The bulletin provides a more granular explanation of virtual currency movement to law enforcement, and assists them in following the money as it funnels between virtual currency channels and the U.S. financial system.336
Among other things, the bulletin addresses the role of traditional banks, money transmitters, and exchangers that come into play as intermediaries by enabling users to fund the purchase of virtual currencies and exchange virtual currencies for other types of currency. It also highlights known records processes associated with virtual currencies and the potential value these records may offer to investigative officials.
More recently, the bulletin has been expanded from only U.S. financial regulators to include some international partners as well. The bulletin has a crowd-sourcing feature and asks the readers to provide ongoing feedback on what they are learning through their investigations.
This bulletin has helped the FinCEN create a forum to quickly learn of new developments. Furthermore,based on this information, the FinCEN has issued several analytical products of a tactical nature to inform law enforcement operations.
Perspectives of Other Stakeholders
State Governments
State governments within the United States have their own jurisdiction over money transmission and enforcing financial laws, as well as in designing corporate licensing and registration and other incentives to attract startups and investment in their state. New York was the pioneering state in starting these experiments in 2014, and since then several states have come out with their own bills and frameworks.
In 2014, the New York Department of Financial Services created the ‘BitLicense’, a business license for virtual currency activities applying to activities involving New York State or its residents. It included regulation around money transmission, custody, exchange services, and other aspects.337 Although New York had a first mover advantage and followed a thorough consultation process,338 the eventual regulation was seen as onerous339and not well suited to the needs of the startup community.340 Since then, several states have developed bills and legislation to incentivize blockchain startups, including Arizona, Delaware, Nevada, Massachusetts, Washington, and others.341 The most comprehensive and innovative reform to date has, interestingly, come from the state of Wyoming.
In early 2019, Wyoming passed a monumental 13 bills to provide one of the most comprehensive legal frameworks for blockchain startups in the United States.342 Unique protections granted under this legal framework are direct property rights for individual owners of digital assets, a state chartered depository to provide banking services to blockchain startups, a series LLC corporate structure, qualified digital asset custodians, and a regulatory sandbox.343 This framework is the most comprehensive till date in the United States.
Startups and Ecosystem Perspective
The blockchain developer and start-up ecosystems in the United States have faced stark consequences in terms of federal regulations and have their own perspective on how legislation should be created. The significant drop in token prices starting in 2018 led to a period of contraction in the industry (termed “Crypto Winter”) that was, in part, attributed to regulatory crackdowns. The author undertook a series of interviews with blockchain startups and venture capital funds in tech hubs on the West Coast to gauge the impact that regulatory action was having on start-up growth in the space. This revealed a number of key points of concern.
- Investment has slowed down considerably for crypto-based blockchain projects based in the United States: Multiple startups spoke of capital becoming very difficult to secure for crypto-based blockchain projects in the United States. While funding does come in for private blockchain startups, and in trading activity, large scale investment into public blockchain protocols has slowed considerably. Regulatory action has slowed both retail and institutional funding into public blockchain projects, and also impeded the flow of private money. Some startups with innovative products were almost on the verge of shutting down because they were unable to find funding. Many budding startups spoken with in the Seattle area had shut down over the last year because of funding shortages.344
- Public blockchain firms tend to adopt foreign domiciles: Some venture funds commented that even if they wanted to invest in public blockchain startups and have them based in the United States, the lawyers would advise strongly against domicile in the U.S.345 Multiple startups commented that it was a “no-brainer” for them to domicile their crypto-based startups outside of the U.S., which they saw as “unfriendly to cryptocurrencies.”346 A strong sentiment amongst both startups and funds interviewed was that they believed the U.S. government viewed cryptocurrencies negatively and did not support or understand the transformative potential of public blockchains.347
- The regulatory landscape is too confusing for startups: Almost all the startups interviewed found the proliferation of regulators confusing to navigate and said that under current guidelines, they were never sure of when they were under threat of enforcement action. Many startups had taken the initiative of reaching out to their Congressperson and spending significant sums on hiring lawyers. However, they were quickly overwhelmed by jurisdictional confusion between who was setting guidelines and policy standards and who was responsible for enforcement. Practitioners and product developers said that despite best efforts, they were left without a clear understanding of how to legally secure themselves according to continuously emerging guidance measures. As a result, the preference was to domicile their start-up in another country with simpler rules.
- Enterprise experiments are becoming larger: Juxtaposed against a shrinking public blockchain start-up scene were also comments of “Big Tech” experiments in blockchain growing larger and more ambitious. There were multiple mentions of Facebook’s upcoming blockchain product, of the IBM and Walmart’s blockchain project, and Microsoft and other Big Tech firms’ experiments gathering scale and momentum. Some concluded that enterprises would outpace disruptive platforms such as Bitcoin and Ethereum in blockchain adoption, which was in some ways inimical to the disruption of blockchains to monopolistic power.348
Overall Conclusions on the U.S. Approach
The U.S. federal government’s approach has been almost entirely regulatory-led. Legislation and policy are absent from federal government action on virtual assets so far. As a quick note, the Congressional Blockchain Caucus has a small number of members, and although they have introduced three bills, it is unlikely that these will pass anytime soon without wider support in Congress.
An overall assessment of the federal regulatory approach so far highlights the following concerns:
The U.S. federal approach is highly fragmented
The most obvious aspect of the federal approach is the highly fragmented nature of regulatory action. In the absence of directives by Congress or the White House, regulators have taken the lead in government action in the sector. This has created the risk of patchwork regulation due to a highly proliferated financial regulatory system. To their credit, as seen in this paper, federal agencies have put in place many mechanisms for coordination. However, as also seen, this approach has created a lot of confusion and uncertainty on the ground for startups and investors, and has led to the U.S. being seen as an unfriendly destination for crypto-based startups. The model of regulation-by-enforcement, rather than a light touch approach, has deepened this perception and created a clamor for clear rules and guidance before harsh enforcement.
The U.S. federal regulatory approach is missing the paradigm-shifting nature of the technology
Financial regulators have taken a risk-based approach that is technology-neutral. As a result, virtual assets, in their examination by the federal government, have been reduced to their financial functions. This is unfortunate, because blockchain technology powered by cryptocurrencies has transformative implications, not just as a currency or payment medium, but as a business model, as a capital formation model, and as a new protocol for transactions that form the basis of the economy and can impact institutional power and social structures.
There is no agency in the federal government that is looking at blockchain technology as a whole. ICOs, for example, have been reduced to whether or not they are security offerings, but no examination has been done of the model with regard to capital formation laws. No examination has been done of banking laws for blockchain business models at a federal level.
Federal regulators have not undertaken any new rule-making on the issue. This is exacerbated by the lack of federal legislative or executive action. The overall approach of the government has been to extend the application of laws, in many cases from the 1960s, to regulate innovations in the space. This can work in the short term; however, this is increasingly getting entrenched as the federal approach. It started with the FinCEN extending the application of MSB laws in 2013 and continues with the latest SEC guidance furthering the application of the Howey Test in 2019.
It is understandable that since blockchain technology is not used on a major scale yet, federal regulators need not engage in a lengthy and expensive rule making process. However, there are also no signals that such thinking is underway. The internet boom taught us that technology may take time to develop, but it proliferates and gets too big to ignore very fast. The world still faces regulatory challenges from the internet revolution, for example, by not thinking ahead around the use of data in business models. However, these technologies are now too big and deeply embedded in the social fabric to be changed drastically. It would be irresponsible to make similar mistakes with blockchain, as many are referring to it as the second internet.
The U.S. federal regulatory approach is possibly entrenching intermediaries and existing power structures
U.S. regulators, to their credit, have been vocal and careful about wanting to regulate abnormal activity without hampering innovation. However, perhaps unintentionally, regulatory action so far has had the effect of entrenching existing power structures and business models, rather than supporting innovation. This has happened on two fronts.
The first front is entrenched money flows. Blockchain startups had developed an innovative fundraising and user acquisition model with Initial Coin Offerings (ICOs). However, this needed a new regulatory framework, in the absence of which fraudulent activity proliferated. Some countries chose to regulate this by using a sandbox approach. However, the United States undertook a regulation-by-enforcement route, with no clear legal guidelines to hold ICOs. While this did stop fraudulent activity, it also stopped a lot of legitimate activity by scaring away investors and startups, who chose to domicile elsewhere. SEC released its guidelines for ICOs only in February 2019, a year after the wave of enforcement, by which time several other countries had come out with ICO frameworks and startups had relocated. The other effect this had was to reinforce the existing fundraising structures of private, venture capital and institutional money, many of whom were themselves getting disrupted by the ICO model, which had created an alternative avenue of fundraising. It also limited public offerings to traditional listing rules which are notorious in the difficulty they create for startups to list. After the JOBS Act and Section D,349 the ICO model was a second alternative to startup funding that should have received greater attention as an innovation that needed to be fenced in by appropriate rules rather than stopped completely by enforcement.
The second front is entrenched advantage for enterprise and large tech firms. Regulatory action against cryptocurrencies has created a preference for private or enterprise blockchain activity. Prescient industry watchers have already pointed out that true disruption is in public blockchains, that siloed private blockchain experiments would not sustain in the long term and would eventually have to move into a semblance of inter-operable public blockchains. The shift to enterprise blockchain has been to the benefit of existing industry leaders in enterprise solutions, and also spurred Big Tech giants such as Facebook, Amazon, and Microsoft to develop blockchain solutions. This is not a bad development, but juxtaposed with a slowdown of funds for public blockchain startup projects, it also implies that we might see further consolidation of Big Tech over a technology that could have disrupted them.
The U.S. regulatory approach is creating opportunities for regulatory arbitrage globally
The U.S. regulatory approach has been seen by many in the ecosystem as onerous, confusing, and unsupportive, and there is unlikely to be a clear directive from Congress or the White House soon to move towards a single window or more coordinated approach. These conditions have created a ripe environment for global regulatory arbitrage as a lever to attract and retain talented startups and shape the way forward in blockchain technology. Several countries such as Singapore, Malta, and Switzerland have taken a lead in creating sandboxes and other incentives to attract startups and investors, and now have thriving blockchain ecosystems. The timeline for this technology to mature is not too long, and it is likely that mature and scalable solutions will emerge in about five years.350 Unless the regulatory paradigm changes significantly in the United States, other geographies will take a lead in this technology.
Conclusion
The United States’ approach to the regulation of virtual assets has been highly fragmented. Due to the proliferation of federal financial regulators, and the lack of policy oversight, different regulatory agencies have taken the initiative. While from a regulators perspective, this approach is understandable as they are carrying out their respective economic mandates, blockchain is a multi-faceted technology, where financial regulation has direct implications on technological development and business models. Blockchain startups could have served as a disruptor to the centralized influence of large firms in technology and finance. However, the current regulatory framework is not supportive of this disruption, as discussed before.
The United States’ approach to the regulation of virtual assets has been highly fragmented.
The patchwork and regulation-by-enforcement nature of government action is confusing for startups and has deterred U.S. investment into the public blockchain space. Most startups that were working in the public blockchain space have relocated to other countries, and many that stayed are facing funding shortages. This has created a large opportunity for regulatory arbitrage globally, and countries such as Singapore, Switzerland and Malta have made themselves leaders in the space very quickly with progressive regulation and robust startup ecosystems.
There are positive aspects of increased capacity building and inter-agency coordination among federal regulators in the United States. States are also developing innovative frameworks. However, virtual assets remain borderless global assets. Regulating them effectively, while harnessing their innovative potential, will require coordinated action at the national level in terms of both regulations and incentives. However, the White House and Congress remain loosely engaged in the process, and such coordination might not materialize soon.
While America remains a leading player in the technology, competition is increasing globally. In the absence of a holistic policy and regulatory approach, the United States might not fully harness its potential in the long run.
Citations
- The Global Risks Report 2018 13th Edition, [Geneva: World Economic Forum,2018] <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- The United Nations World Water Development Report 2018: Nature-Based Solutions for Water, [Paris: WWAP (United Nations World Water Assessment Programme) /UN-Water, 2018, UNESCO] <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Martina Flörke, Christof Schneider, and Robert I. McDonald, "Water competition between cities and agriculture driven by climate change and urban growth," Nature Sustainability 1, no. 1 (2018): 51.
- Peter H. Gleick, "Global freshwater resources: soft-path solutions for the 21st century," Science 302, no. 5650 (2003): 1524-1528.
- Ibid.
- Negative externalities are costs that impact a party that does not have a role in its creation. For instance, vehicular pollution generated by a specific individual affecting people nearby. Negative externalities cause market failures.
- Collection action problem occurs when individuals pursuing a common goal do not cooperate due to competing interests.
- Free rider issues occur when individuals who do not pay for a good or service reap its benefit. Too many free riders results in over-exploitation or under-production of the good or service.
- Richard E. Howitt, Richard E. and Kristiana Hansen, "The Evolving Western Water Markets," Choices 20, no. 316-2016-6565 (2005): 59.
- Guy Le MoigneShawki Barghouti, Gershon Feder, Lisa Garbus, and Mei Xie, "Country experiences with water resources management," World Bank Technical Paper 175 (1992).
- Ereney Hadjigeorgalis, "A Place for Water Markets: Performance and Challenges," Review of Agricultural Economics 31, no. 1 (2009): 50-67.
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- C. Wilson, Adverse Selection, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics, Palgrave Macmillan, 2008]
- Y. Kotowitz, Moral Hazard, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- J.O. Ledyard, Market Failure, In: Palgrave Macmillan (eds)[London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- David S. Brookshire, Bonnie Colby, Mary Ewers, and Philip T. Ganderton, "Market Prices for Water in the Semiarid West of the United States," Water Resources Research 40, no. 9 (2004).
- John Freebairn and John Quiggin, "Water rights for variable supplies," Australian Journal of Agricultural and Resource Economics 50, no. 3 (2006): 295-312.
- A. Dinar, M. Rosegrant, R. Meinzen-Dick, "Water allocation mechanisms: Principles and examples," The World Bank Policy Research Working Paper 1779 (June 1997).
- Jill E. Hobbs, "Information asymmetry and the role of traceability systems," Agribusiness: An International Journal 20, no. 4 (2004): 397-415.
- Max H. Bazerman and James J. Gillespie, "Betting on the future: The virtues of contingent contracts," Harvard Business Review 77 (1999): 155-162.
- Stefaan G. Verhulst, "Information Asymmetries, Blockchain Technologies, and Social Change," Medium, July 24, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Sloane Brakeville, and Bhargav Perepa, "Blockchain Basics: Introduction to Distributed Ledgers," IBM Developer, March 18, 2018, accessed April 14, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Nigel Gopie, "What Are Smart Contracts on Blockchain?" Blockchain Pulse: IBM Blockchain Blog, July 02, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- "Civic Use Cases," Helping Governments to Be More Accessible, Efficient and Effective. <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- "Civic Ledger Pty Ltd.," Australian Water Partnership. <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "Water Markets and Trade," Australian Government – Murray-Darling Basin Authority, Sept. 29, 2015. <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Ibid.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management. September 2018.
- Ibid.
- The term “smart” in this context indicates the use of internet of things, big data, predictive analytics integrated over blockchain network as underlying technologies to facilitate the operations of a water market.
- Jayachandran Praveen, “The Difference between Public and Private Blockchain," Blockchain Pulse: IBM Blockchain Blog, Aug. 06, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- J.R. DeShazo, Gregory Pierce, and Henry McCann, “Los Angeles County Community Water Systems Atlas and Policy Guide: Supply Vulnerabilities, At-Risk Populations, Conservation Opportunities, Pricing Policies, and Customer Assistance Programs,” UCLA: Luskin Center for Innovation, (2015), <a href="<a href="<a href="<a href="source">source">source">source">source">source; U.S. Census Bureau Quick Facts: Los Angeles County, California," Census Bureau Quick Facts, July 1, 2017, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- S. Pincetl et al., “Water Management in Los Angeles County: a Research Report,” Los Angeles: UCLA, Institute of Environment and Sustainability, 2015, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Ibid.
- Ibid.
- J.R. DeShazo and Gregory Pierce, "Quantifying the Benefits and Designing Governance Structures for a Water Market in Los Angeles County," [Los Angeles: UCLA, Luskin Center for Innovation, Oct. 2016] <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Bengaluru Water Board, “Blueprint for Future,” <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Bangalore Water Supply and Sewerage Board, "About BWSSB," Bangalore Water Supply and Sewerage Board. <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Bengaluru Water Board, “Blueprint for Future," <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Malini Ranganathan, "'Mafias' in the waterscape: Urban informality and everyday public authority in Bangalore," Water Alternatives 7, no. 1 (2014).
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- Bart Elias, Unmanned Aircraft Operations in Domestic Airspace: U.S. Policy Perspectives and the Regulatory Landscape (Washington, D.C.: Congressional Research Service, 2016), <a href="<a href="<a href="source">source">source">source">source.
- Tom Hancock and Wang Xueqiao, “China’s DJI targets agriculture as consumer drone sales slow,” Financial Times, March 25, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Richard Levick, “Drone Industry Just Beginning To Take Off,” Forbes, May 15, 2018, <a href="<a href="<a href="source">source">source">source">source.
- Ujjwal Bakshi and Manash Neog, “Much to Drone About,” Economic Times, April 4, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Therese Jones, International Commercial Drone Regulation and Drone Delivery Services (Santa Monica: RAND Corporation, 2017), <a href="<a href="<a href="source">source">source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="<a href="<a href="source">source">source">source">source.
- Somya Lohia, “Drone Regulations 1.0 Can Fetch India Major Slice of $100 Billion Industry,” Money Control, January 9, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Civil Aviation Requirements Series X Part I Issue I: Requirements for Operation of Civil Remotely Piloted Aircraft System (RPAS), F. No. 05-13/2014-AED Vol. IV (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="source">source">source">source">source.
- Ibid., Reg. 14.2.
- Ibid., Reg. 12.14 & 12.2.
- Ibid., Reg. 11.2 & 17.1.
- Ibid, Reg. 12.21.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="source">source">source">source">source.
- Procedures for Operation of Civil Remotely Piloted Aircraft Systems (RPAS) in Indian Airspace, AIP Supplement 164/2018 AAI/ATM/AIS/09-09/2018 (New Delhi: Airports Authority of India, 2018), <a href="<a href="<a href="source">source">source">source">source.
- Tender Document: Development, Hosting and Maintenance of Digital Sky Platform for Ministry of Civil Aviation IT-11042/1/2018-DIRECTORATE OF IT (New Delhi: Airports Authority of India, 2018), <a href="<a href="<a href="source">source">source">source">source.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="source">source">source">source">source.
- Ibid.
- Ibid.
- Drone Ecosystem Policy Roadmap (New Delhi: Ministry of Civil Aviation, 2019), <a href="<a href="<a href="source">source">source">source">source.
- Ibid, 7.
- Ibid, 14.
- The Personal Data Protection Bill, 2018 (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="<a href="<a href="source">source">source">source">source.
- White Paper of the Committee of Experts on a Data Protection Framework for India (New Delhi: Ministry of Electronics and Information Technology, 2017), <a href="<a href="<a href="source">source">source">source">source
- Petition to the Federal Aviation Administration: Drones and Privacy (Washington, D.C.: Electronic Privacy Information Center, 2012), <a href="<a href="<a href="source">source">source">source">source.
- Margot Kaminski, “Drone Federalism: Civilian Drones and the Things They Carry,” California Law Review 4 (2013): 57–74.
- Notice of Proposed Rulemaking: Operation of Small Unmanned Aircraft Systems Over People FAA–2018–1087 (Washington, D.C.: Federal Aviation Administration, 2019), <a href="<a href="<a href="source">source">source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="<a href="<a href="source">source">source">source">source.
- Arthur Holland Michel, Drones at Home: Local and State Drone Laws (New York: Center for the Study of the Drone, Bard College, 2017), <a href="<a href="<a href="source">source">source">source">source.
- Amanda Essex, Taking Off: State Unmanned Aircraft Systems Policies (Denver, CO: National Conference of State Legislatures, 2016), <a href="<a href="<a href="source">source">source">source">source.
- An Act Relating To Unmanned Aircraft Systems – Establishing Statewide Standards, Protecting Privacy, And Ensuring Public Safety (Virginia: American Legislative Exchange Council, 2017), <a href="<a href="<a href="source">source">source">source">source.
- Gautam Bhatia, “State Surveillance and the Right to Privacy in India: A Constitutional Biography,” National Law School of India Review 26 (2014): 127–158.
- (2019) 1 SCC 1.
- Ibid, 359.
- (2015) 5 SCC 1.
- Ibid, 167.
- Colin Snow, “Drones Pose a Unique Big Data Challenge For Business Users,” Forbes, February 6, 2019 <a href="<a href="<a href="source">source">source">source">source ; Michelle Chan, “What Businesses Need to Know About Drone Data,” Techwire Asia, February 13, 2019, <a href="<a href="<a href="source">source">source">source">source
- Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules ((New Delhi: Ministry of Electronics and Information Technology, 2011),<a href="<a href="<a href="<a href="source">source">source">source">source"> <a href="<a href="<a href="source">source">source">source">source ; Ibid. ; Rachel Finn and Anna Donovan, “Big Data, Drone Data: Privacy and Ethical Impacts of the Intersection Between Big Data and Civil Drone Deployments,” in The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, ed. Bart Custers (The Hague: TMC Asser Press, 2016), 47-67.
- As Solove remarks about the “Information Age:” “The data gathered about people is significantly more extensive, the process of combining it is much easier, and the computer technologies to analyze it are more sophisticated and powerful.” See Daniel Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review 154 (2006): 477, 506 ; Ibid., 507–08.
- Jordi Soria-Comas and Josep Domingo-Ferrer, “Big Data Privacy: Challenges to Privacy Principles and Models.” Data Science and Engineering 1 (2016): 21, 22. ; Justice KS Puttaswamy v. Union of India, (2017) 10 SCC 1.
- Guide to Basic Data Anonymisation Techniques (Singapore: Personal Data Protection Commission of Singapore, 2018), www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other-Guides/Guide-to-Anonymisation_v1-(250118).pdf.
- For a particularly stark situation, where the de-identification was considered near foolproof and yet re-identified, see Jean Louis Raisaro et al., “Addressing Beacon Re-Identification Attacks: Quantification and Mitigation of Privacy Risks,” Journal of the American Medical Informatics Association 24 (2017): 799, 800.
- Solon Barocas and Helen Nissenbaum, “Big Data’s End Run around Anonymity and Consent,” in Privacy, Big Data, and the Public Good, eds. Julia Lane et al. (New York, NY: Cambridge University Press, 2014), 44–45.
- Ira S Rubinstein, “Big Data: The End of Privacy or a New Beginning,” International Data Privacy Law 3 (2013): 74, 77–78; Davide Castelvecchi, “Can We Open the Black Box of AI?” Nature 538, no. 7623 (2016): 20.
- Mireille Hildebrandt, “Defining Profiling: A New Type of Knowledge?” in Profiling the European Citizen: Cross-Disciplinary Perspectives, eds. Mireille Hildebrandt and Serge Gutwirth (eBook: Springer, 2008), 17, 20.
- Nathaniel A Raymond, “Beyond ‘Do No Harm’ and Individual Consent: Reckoning with the Emerging Ethical Challenges of Civil Society’s Use of Data,” in Group Privacy: New Challenges of Data Technologies, eds. Linnet Taylor, Luciano Floridi and Bart van der Sloot (eBook: Springer, 2017): 67, 75.
- A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="<a href="<a href="source">source">source">source">source.
- Ibid, 45–46.
- Ananth Padmanabhan and Anirudh Rastogi, “Big Data,” in Regulation in India: Design, Capacity, Performance, eds. Devesh Kapur and Madhav Khosla (London: Hart Publishing, 2019): 251, 262.
- Aleecia M. McDonald and Lorrie Faith Cranor, “The Cost of Reading Privacy Policies,” I/S Journal of Law and Policy, 4 (2008): 543, 565.
- Arthur Allen Leff, “Contract as Thing,” American University Law Review 19 (1970): 131.
- Nikhil Narendran, “Policy Framework for Protection of Big Data in State Possession,” in Blockchain for Property: A Roll Out Road Map for India, eds. Baladevan Rangaraju and Vishnu Chandra (New Delhi: India Institute, 2017): 34, 40.
- Rahul Matthan, Privacy 3.0: Unlocking Our Data-Driven Future (Noida: Harper Collins, 2018): 167–171.
- Carmine Cifaldi, “Unmanned Aircraft System Privacy and Data Protection,” in Handbook of Unmanned Aerial Vehicles, eds. K.P. Valavanis and G.J. Vachtsevanos (eBook: Springer, 2018): 1–19.
- Voluntary Best Practices for UAS Privacy, Transparency, and Accountability (Washington, D.C.: National Telecommunications and Information Administration, 2016), <a href="<a href="<a href="source">source">source">source">source.
- Clark D. Cunningham, “Apple and the American Revolution: Remembering Why We Have the fourth Amendment”, The Yale Law Journal, volume 126, <a href="<a href="source">source">source">source
- “ Breaking Down Apple’s iPhone Fight With the U.S. Government”, The New York Times, March 21, 2016, <a href="<a href="source">source">source">source
- Nick Statt, “Apple’s iCloud partner in China will store user data on servers of state-run telecom”, The Verge, July 18, 2018, <a href="<a href="source">source">source">source
- “Chen Guangcheng, Apple Can’t Resist Playing by China’s Rules”, The New York Times, January 23, 2018, <a href="<a href="source">source">source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, <a href="<a href="source">source">source">source
- Ibid., “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming), Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="source">source">source">source
- “Top 20 Countries with the Highest Number Of Internet Users”, <a href="<a href="source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="source">source">source">source
- Ibid.
- See Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="source">source">source">source
- Krishna Pokharel and Rajesh Roy, “India Says Rumors About Child Snatching on WhatsApp Led to Mob Killings”, The Wall Street Journal, July 5, 2018, <a href="<a href="source">source">source">source
- . Section 91, Code of Criminal Procedure, 1973
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="source">source">source">source
- Id.
- “Cross-Border Law Enforcement Demands: Analysis of the U.S. Department of Justice’s Proposed Bill”, Center for Democracy and Technology, August 17, 2016, <a href="<a href="source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Data localization is no solution,” The Hindu, August 3, 2018, <a href="<a href="source">source">source">source
- This, however, requires an executive agreement between the United States and the foreign country certifying that the state will rely on robust privacy protections, and respect for due process and the rule of law when making requests to companies directly. Such a framework over time, will not only need to be transparent and hold both companies and LEAs accountable but also be scalable to respond to the increasing volume and complexity of requests. Specifically, due process safeguards on user notification, redressal etc. will need to be incorporated. The U.S. Department of Justice recently issued clarifications on how the CLOUD Act will be operationalized available at <a href="<a href="source">source">source">source
- For more on the privacy protecting requirements under CLOUD Act, both at an institutional level and for individual requests, see Madhulika Srikumar, Debrae Kennedy-mayo, Peter Swire and Sreenidhi Srinivasan, “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, <a href="<a href="source">source">source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- Sections 40 and 41, The Personal Data Protection Bill, 2018
- Ibid.
- Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, “A Free and Fair Digital Economy Protecting Privacy, Empowering Indians”, 27 July 2018
- Ministry of Electronics and Information Technology, “The Information Technology [Intermediaries Guidelines (Amendment) Rules] 2018,” <a href="<a href="source">source">source">source
- Pranesh Prakash,“Why Data Localisation Might Lead To Unchecked Surveillance,” Centre for Internet and Society, October 15, 2018, <a href="<a href="source">source">source">source ; “US criticises India's data localisation norms, draft e-commerce policy,” The Economic Times, April 9, 2019, <a href="<a href="source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="source">source">source">source
- Josh Constine,” Zuckerberg warns of authoritarian data localization trend,” Techcrunch, <a href="<a href="source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="source">source">source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- “RBI data localisation: 80 percent players, including WhatsApp, comply with norms”, Business Standard, <a href="<a href="source">source">source">source -80-players-including-whatsapp-comply-with-norms-118101500907_1.html
- “Facebook takes a tough stand on data storage amidst India’s localisation push”, The Economic Times, <a href="<a href="source">source">source">source
- WhatsApp is working to comply with Reserve Bank of India (RBI) regulations on the local storage of payment-related data, the Economic Times reported. “Only some engineering work is left,” an anonymous senior Facebook executive told ET. <a href="<a href="source">source">source">source -mandate-report-why-is-it-needed/
- “India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, <a href="<a href="source">source">source">source
- Komal Gupta, “Google Agrees to Comply with RBI’s Data Localisation Norms,” Livemint , September 10, 2018, <a href="<a href="<a href="source">source">source">source"><a href="<a href="source">source">source">source Surabhi Aggarwal, “Industry bodies write to IT minister Ravi Shankar Prasad against data bill,” Economic Times, October 4, 2018, //economictimes.indiatimes.com/articleshow/66062141.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- See U.S. India Strategic Partnership Forum (USISPF) submission to MeitY available at <a href="<a href="source">source">source">source
- Aditya Kalra, “U.S. senators urge India to soften data localisation stance,” Reuters, October 13, 2018, <a href="<a href="source">source">source">source
- Ashish Shukla, “RBI refuses to extend deadline for data localisation,” IBTimes, October 14, 2018, <a href="<a href="source">source">source">source
- Bhavin Patel and Hemant Krishna, “Data Localisation: Here’s why the RBI isn’t listening to the ‘Mirroring’ argument,” CNBC TV18, October 15, 2018, <a href="<a href="source">source">source">source
- Rishab Bailey and Smriti Parsheera ,”Data localisation in India: Questioning the means and ends,”The Leap Blog, February 22, 2019, <a href="<a href="source">source">source">source
- Amazon not mirroring it abroad Whatsapp asked for 5 more months, mastercard and rest asked for one year
- “Russia fines Facebook $50 for failing to comply with local data privacy law, ” ZDNet, April 12, 2019, <a href="<a href="source">source">source">source ; Mark Scott, “Russia Prepares to Block LinkedIn After Court Ruling,” The New York Times, November 10, 2016, <a href="<a href="source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="source">source">source">source
- Government authorities increasingly rely on blocking access to internet altogether to contain cases of public unrest. See Timothy Mclaughlin ,“How Whatsapp Fuels Fake News And Violence In India, ” The Wired, December 12, 2018, <a href="<a href="source">source">source">source
- “Fighting fake news: Govt asks Whatsapp to take immediate action,” Economic Times, July 3, 2018, <a href="<a href="source">source">source">source
- The Indian government introduced the draft amendment to the Information Technology Act, 2008 to overhaul the current intermediary liability regime in India. One of the problematic provisions included the requirement for intermediaries to enable tracing the originator of messages. See Yesha Tshering Paul“ Fake News: Misguided Policymaking To Counter Misinformation,” Bloomberg Quint, January 14, 2019, <a href="<a href="source">source">source">source
- The Srikrishna Committee appointed to draft India’s first comprehensive data protection law introduced the term “fiduciaries” in the Personal Data Protection Bill, 2018. See Arghya Sengupta, “Why the Srikrishna Committee Rejected Ownership of Data in Favour of Fiduciary Duty,” The Wire, August 2, 2018, <a href="<a href="source">source">source">source
- For more on how Indian law enforcement agencies make requests for data under Indian law, see Chapter 3 in Srikumar et al., “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, <a href="<a href="source">source">source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="source">source">source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="source">source">source">source
- For instance, Facebook commits to fight back in court if requests are overbroad or defective. Chris Sonderby, “Sharing Our Latest Transparency Report,” Facebook Newsroom, May 23, 2019, <a href="<a href="source">source">source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, <a href="<a href="source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="source">source">source">source
- See 3(13), Personal Data Protection Bill, 2018. Available at <a href="<a href="source">source">source">source; Stakeholders in India however have argued that the draft bill does not imbibe the philosophy of fiduciaries completely since certain sections in the bill still places the disproportionate onus on users to realize their rights. See comments submitted by Dvara Research to MeitY available at <a href="<a href="source">source">source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- See A Free and Fair Digital Economy Protecting Privacy, Empowering Indians: Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, July 27, 2018, available at <a href="<a href="source">source">source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- Id. , see Jack M.Balkin, "Fixing Social Media's Grand Bargain." Hoover Working Group on National Security, Technology, and Law, Aegis Series Paper 1814,2018.
- The author of this piece argues that Balkin’s fiduciary framework could eliminate the third party doctrine in the U.S. altogether binding all companies to a higher duty of care towards users. See Mike Godwin, It’s Time to Reframe Our Relationship With Facebook,” Slate, November 16, 2018, <a href="<a href="source">source">source">source; In India, the Supreme Court through the 2017 ruling recognising privacy as a fundamental right invalidated the application of third party doctrine. See Gautam Bhatia, “The Supreme Court’s Right to Privacy Judgment – IV: Privacy, Informational Self-Determination, and the Idea of Consent,” Indian Constitutional Law and Philosophy, August 2017, <a href="<a href="source">source">source">source
- Vivan Sharan, Sidharth Deb, “Reimagining fiduciaries in the digital economy,” Livemint, August, 15, 2018, <a href="<a href="source">source">source">source
- Ariel Dobkin, "Information Fiduciaries in Practice: Data Privacy and User Expectations." Berkeley Tech. LJ 33 2018: 1.
- Dalip Singh, “Law enforcement agencies favour data localisation “, Economic Times, October 8, 2018, <a href="<a href="source">source">source">source /articleshow/66113360.cms
- India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, <a href="<a href="source">source">source">source
- Aria Thaker, “Behind RBI’s digital payments panel, a controversial firm’s shadow, conflict of interest allegations”, Scroll, January 10, 2019, <a href="<a href="source">source">source">source; The Indian government’s motivation to create an environment favourable to domestic tech firms is most evident in its recent policy on Foreign Direct Investment in e-commerce. See “What India e-commerce policy entails for online retailers”, Livemint, January 16, 2019, <a href="<a href="source">source">source">source
- a. Aditya Kalra and Aditi Shah, “U.S. firms face off with Indian rival in lobbying against data storage rules,” Reuters, July 24, 2018, <a href="<a href="<a href="source">source">source">source"><a href="<a href="source">source">source">source b. Vidhi Choudhary and Yashwant Raj, “Cambridge Analytica row: Facebook data breach hit 560K Indian users,”Hindustan Times, April 5, 2018, <a href="<a href="source">source">source">source
- Prashant Reddy, “View: It's time to tame the social media beast,” Economic Times, February 13, 2019,//economictimes.indiatimes.com/articleshow/67966170.cms?from=mdr&utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- Ben Brody, “Tech Giants Back U.S. Bill Governing Cross-Border Data Searches,”Bloomberg, February 7, 2018, <a href="<a href="source">source">source">source
- Brad Smith, “A call for principle-based international agreements to govern law enforcement access to data,” Microsoft On the Issues, September 11, 2018, <a href="<a href="source">source">source">source
- Michael Punke, “AWS and the CLOUD Act,” AWS Security Blog, May 27, 2019, <a href="<a href="<a href="source">source">source">source"><a href="<a href="source">source">source">source ; Chaim Gartenberg, “Apple will launch a global web portal for law enforcement requests later this year,” The Verge, September 6, 2018, available at <a href="<a href="<a href="source">source">source">source"><a href="<a href="source">source">source">source; Kristen E. Eichensehr, “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming)
- “One year later: A cybersecurity commitment shared by more than 100 companies,” Tech Accord, May 9, 2019, <a href="<a href="source">source">source">source
- Mike Isaac, “Zuckerberg Plans to Integrate WhatsApp, Instagram and Facebook Messenger,” The New York Times, January 25, 2019, <a href="<a href="source">source">source">source
- Mike Isaac, “Facebook’s Mark Zuckerberg Says He’ll Shift Focus to Users’ Privacy,” The New York Times, March 6, 2019, <a href="<a href="source">source">source">source . Facebook’s official announcement is available at <a href="<a href="source">source">source">source
- Law enforcement agencies across the world make overbroad demands for location data to find suspects and witnesses at crime scenes. See Jennifer Valentino-Devries, “Tracking Phones, Google Is a Dragnet for the Police,” The New York Times, April 13, 2019, <a href="<a href="source">source">source">source; also on “reverse location warrants” see Aaron Mak, Close Enough, Slate, February 19, 2019, <a href="<a href="source">source">source">source; Matthew Haag, “FamilyTreeDNA Admits to Sharing Genetic Data With F.B.I.”, The New York Times, February 4, 2019, <a href="<a href="source">source">source">source
- Josh Costine, “Facebook will pass off content policy appeals to a new independent oversight body,” Techcrunch, <a href="<a href="source">source">source">source
- For instance, in the UK, <a href="source">source">source; France, <a href="source">source">source; and Germany, <a href="source">source">source
- Varun Aggrawal, “Infosys to Set up Data Marketplace for Enterprises – The Hindu BusinessLine,” June 19, 2018, <a href="source">source">source.
- “The Personal Data Protection Bill” (2018), <a href="source">source">source; Justice B.N. Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” (Committee of Experts under the Chairmanship of Justice B.N. Shrikrishna, July 2018), <a href="source">source">source.
- Jack M. Balkin, “Information Fiduciaries and the First Amendment,” U.C. Davis Law Review 49, no. 4 (2016): 1234; Lina Khan and David Pozen, “A Skeptical View of Information Fiduciaries” (SSRN, February 25, 2019), <a href="source">source">source.
- Whilst the European Union’s approach in the GDPR is limited by is focus on privacy. The challenges of governing data-driven decision-making go well beyond concerns about privacy. See Talia Gillis and Josh Simons, “Explanation < Justification: GDPR and the Perils of Privacy,” (SSRN, 2019).
- To use André Béteille’s phrase, one of India’s most important twentieth-century social theorists. André Béteille, Anti-Utopia: Essential Writings of André Béteille (New Delhi: Oxford University Press, 2005); André Béteille, Ramachandra Guha, and Jonathan P. Parry, Institutions and Inequalities: Essays in Honour of Andre Beteille (New Delhi: Oxford University Press, 1999).
- Purva Khera, Macroeconomic Impacts of Gender Inequality and Informality in India, IMF Working Paper (Washington, District of Columbia DC: International Monetary Fund, 2016); Carol Vlassoff, Gender Equality and Inequality in Rural India: Blessed with a Son (New York, NY: Palgrave Macmillan, 2013); Stephen M. Caliendo, Inequality in America: Race, Poverty, and Fulfilling Democracy’s Promise, Dilemmas in American Politics (Boulder, CO: Westview Press, 2014); Xavier N. De Souza Briggs, Social Capital and Segregation: Race, Connections, and Inequality in America (Cambridge, MassMA.: John F. Kennedy School of Government, 2002).
- It is important to note that this is not just about unrepresentative data. Unrepresentative data excludes some groups, perhaps because there are not enough data points about that group, or the data points that exist are less numerous or rich. This is an important problem, particularly in India, where the underrepresentation of Untouchables and women in data is systemic. But the problems this paper considers would remain even in the most accurate and careful data sets, which are still a reflection of the structure of our social world, including the inequalities and injustices that characterize it. A representative dataset is not devoid of injustice. This leaves open a host of important issues about when the representation of injustice in a dataset actually constitutes an injustice, an issue I hope to address in future work. Cynthia Dwork and Deirdre Mulligan, “It’s Not Privacy, and It’s Not Fair,” Stanford Law Review 66 (September 2013): 35–40; Kate Crawford, “The Hidden Biases in Big Data,” Harvard Business Review, April 1, 2013, <a href="source">source">source; David Garcia et al., “Analyzing Gender Inequality through Large-Scale Facebook Advertising Data,” Proceedings of the National Academy of Sciences of the United States of America 115, no. 27 (2018): 6958–63, <a href="source">source">source.
- Andrew D. Selbst and Solon Barocas, “The Intuitive Appeal of Explainable Machines,” SSRN Electronic Journal, 2018, <a href="source">source">source.
- Daniel Kahneman, Thinking, Fast and Slow (New York, NY: Farrar, Straus and Giroux, 2011).
- Virginia Eubanks, Automating Inequality: How High-Tech Tools Profile, Police and Punish the Poor (New York, NY: St. Martin’s Press, 2018).
- TOI, “Aadhaar Covers over 89% Population: Alphons,” The Times of India, accessed March 5, 2019, <a href="source">source">source.
- Cynthia Dwork et al., “Fairness through Awareness,” ITCS ’12 (ACM, 2012), 214–226.
- Sam Corbett-Davies and Sharad Goel, “The Measure and Mismeasure of Fairness: A Critical Review of Fair Machine Learning,” 20180731, <a href="source">source">source.
- Jon Kleinberg, Sendhil Mullainathan, and Manish Raghavan, “Inherent Trade-Offs in the Fair Determination of Risk Scores,” Proceedings of Innovations in Theoretical Computer Science (ITCS), 2017.
- I am therefore moving beyond privacy as a framework for thinking about the governance of data-driven decision-making. Privacy is one concern we might have about those decision-making procedures, usually called “data processing” in existing legislation in the EU and India. But it is far from the only concern. Other aims and values need to be brought into play. Privacy should not be the sole lens through which to view governance data and machine learning. A29WP, “Guidelines on Automated Individual Decision-Making and Profiling” (Article 29 Data Protection Working Party, 2018), <a href="source">source">source.; ICO, “Guide to the General Data Protection Regulation (GDPR)” (U.K.: Information Commissioner’s Office, August 2018), <a href="source">source">source; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Most other important pieces of non-discrimination legislation extend the categories to which duties of non-discrimination apply. These include the Equal Pay Act of 1963, which prohibits the payment of different wages to employees of different sexes who perform equal work under similar conditions; the Americans with Disabilities Act (ADA) of 1990, which prohibits discrimination against individuals with a disability and requires the provision of reasonable accommodation to someone who is legally disabled; and the Genetic Information Non-Discrimination Act of 2008, which protects individuals from genetic discrimination in the healthcare and insurance industries.
- For instance, U.S. Executive Orders 10925, 11246, and 11375 require federal contractors who do over $10,000 in Government business in one year to “take affirmative action to ensure that applicants are employed, and that employees are treated during employment, without regard to their race, color, religion, sex or national origin.”
- David Strauss, “Discriminatory Intent and the Taming of Brown,” University of Chicago Law Review 56, no. 3 (1989): 935–935.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019, <a href="source">source">source; Solon Barocas and Andrew D. Selbst, “Big Data’s Disparate Impact,” California Law Review 104, no. 3 (June 1, 2016): 671–732.
- There is an important emerging debate about precisely this point, including a paper of my own. For the key protagonists, see Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019; Barocas and Selbst, “Big Data’s Disparate Impact”; Lior Strahilevitz, “Privacy versus Antidiscrimination,” Public Law & Legal Theory Working Paper, no. 174 (2007), <a href="source">source">source; Pamela L. Perry, “Two Faces of Disparate Impact Discrimination,” Fordham Law Review 59, no. 4 (March 1, 1991): 523–595; Cass Sunstein, “The Anticaste Principle,” Michigan Law Review, January 1, 1993, 2410.
- Barocas and Selbst, “Big Data’s Disparate Impact,” 724.
- Sophia Moreau and Deborah Hellman, Philosophical Foundations of Discrimination Law (Oxford: Oxford University Press, 2013), 259.
- Béteille, Anti-Utopia.
- Cass Sunstein makes a similar point. If there is prejudice and statistical discrimination, and if third parties promote discrimination, there will be decreased investments in human capital. Such decreased investments will be a perfectly reasonable response to the real world. And if there are decreased investments in human capital, then prejudice, statistical discrimination, and third-party effects will also increase. Statistical discrimination will become all the more rational; prejudice will hardly be broken down; consumers and employers will be more likely to be discriminators.Ronnie J. Steinberg, Applications of Feminist Legal Theory to Women’s Lives: Sex, Violence, Work and Reproduction. Women in the Political Economy. (Temple University Press, 2012), 560; Sunstein, “The Anticaste Principle,” 2431.
- Dwork et al., “Fairness through Awareness,” 215.
- As Hannah Arendt argued when comparing the American and French revolutions. Rohit De, A People’s Constitution: The Everyday Life of Law in the Indian Republic (Princeton, CT: Princeton University Press, 2018), 5; Uday S. Mehta, “The Social Question and the Absolutism of Politics,” 2010, <a href="source">source">source; Hannah Arendt, On Revolution (New York, NY: Viking Press, 1965).
- Sunil Khilnani, The Idea of India (New Delhi: Penguin, 2004).
- Kalpana Kannabirān, Tools of Justice: Non-Discrimination and the Indian Constitution (New York, NY: Routledge, 2012), 7.
- B. R. Ambedkar is a neglected character in India’s political history. His ideas have received little attention compared with more widely known figures M. K. Gandhi and Jawaharlal Nehru, in part because of the Congress Party’s dominant role in shaping India’s national story, and the contours of democratic politics after independence. See Valerian Rodrigues, “Justice as the Lens: Interrogating Rawls through Sen and Ambedkar,” Indian Journal of Human Development 5, no. 1 (2011): 153–174; Jean Drèze and Amartya Sen, “Democratic Practice and Social Inequality in India,” Journal of Asian and African Studies 37, no. 2 (2002): 6–37; Martha Nussbaum, “India: Implementing Sex Equality through Law,” Chicago Journal of International Law 2, no. 1 (2001): 35–58.
- Kannabirān, Tools of Justice, 162.
- Patterns of domination, which produce these persistent inequalities in the political and economic spheres, have two effects. First, they undermine the liberty of each individual to benefit from an effective and competent use of their powers. Democracy entailed political equality. Political equality entailed the absence of domination. Second, patterns of domination undermine the possibility of free association. Drawing on John Dewey, Ambedkar argued that free association – the capacity of groups to form links, to self-govern over time – was essential to democratic life. Democracy is not merely a form of government. It is primarily a mode of associated living, of conjoin communicated experience. It is essentially an attitude of respect and reverence towards fellow men. Patterns of domination made impossible the associations and relationships that encouraged and embodied this attitude of respect and reverence.B.R. Ambedkar, Annihilation of Caste: The Annotated Critical Edition, ed. S. Anand (New Delhi: Navayana, 2014), 280, 261.
- Béteille, Guha, and Parry, Institutions and Inequalities, 342.
- V. R. Krishnaiyer, Akhil Bharatiya Soshit Karamchari Sangh and Others vs. Union Of India, No. 185 (Supreme Court of India November 14, 1980).
- J B. Sudershan Reddy, Indian Medical Association vs. Union Of India & Ors, No. 8170 (Supreme Court of India May 12, 2011).
- Deepti Shenoy, “Courting Substantive Equality: Employment Discrimination Law in India,” University of Pennsylvania Journal of International Law 34, no. 3 (2013): 632.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 20190210, <a href="source">source">source.
- The Personal Data Protection Bill; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” 8.
- De, A People’s Constitution; Béteille, Guha, and Parry, Institutions and Inequalities; Khilnani, The Idea of India.
- This is precisely the challenge that Jack Balkin, who first coined the data fiduciary concept, warned about. Balkin, “Information Fiduciaries and the First Amendment,” 1232–1324.
- As André Béteille argues, institutional well-being is an important consideration. He describes this as equality as a matter of policy, not of right, warning against placing too much faith specifically in the state to eliminate every social inequality, every difference of caste or class. Béteille, Anti-Utopia, 435.
- Joshua A. Kroll et al., “Accountable Algorithms,” University of Pennsylvania Law Review 165, no. 3 (2017): 633–705; Andrew Tutt, “An FDA for Algorithms,” Admin. L. Rev. 83 (2016); Jeremy Waldron, “Accountability: Fundamental to Democracy,” SSRN Scholarly Paper (Rochester, NY: Social Science Research Network, April 1, 2014), <a href="source">source">source; Craig T. Borowiak, Accountability and Democracy: The Pitfalls and Promise of Popular Control (Oxford University Press, 2011); Adam Przeworski, Susan Carol Stokes, and Bernard Manin, Democracy, Accountability, and Representation (Cambridge: Cambridge University Press, 1999).
- “World Metro Figures Statistics Brief,” UITP, accessed April 29, 2019, source">source; Global BRT Data, “Global BRT Data,” accessed April 29, 2019, source">source.
- Autorickshaws are three-wheeled vehicles that supply much of the last-mile connectivity to mass transit in Indian cities.
- Candace Brakewood, Gregory Macfarlane, and Kari Watkins, “The Impact of Real-Time Information on Bus Ridership in New York City,” Transportation Research Part C: Emerging Technologies, 53 (April 2015): 59-75.; Eric Jaffe, “The Best Evidence Yet That Real-Time Arrival Info Increases Transit Ridership,” CityLab, accessed Feb. 20, 2019, source">source.
- Aaron Antrim and Sean Barbeau, “The Many Uses of GTFS Data- Opening the Door to Transit and Multimodal Applications,” ITS America’s 23rd Annual Meeting & Exposition, April 2013, source">source; Transit Center, “The Data Transit Riders Want “A Shared Agenda for Public Agencies and Transit Application Developers,” accessed Feb. 16, 2019, source">source.
- “Open Government Partnership,” Open Government Partnership, accessed Jan. 28, 2019, source">source.
- “WRI India,” WRI India, accessed January 28, 2019, source">source.
- KMRL signed a Memorandum of Understanding (MOU) with WRI in February of 2017, which included several initiatives to support urban transport and urban development, including public transport, transit oriented policy, electric mobility, and urban planning in Kochi.
- Available at: source">source
- The GPS installation was paid for by the Urban Mass Transit Company Limited (UMTC), a joint venture of several national and state government agencies and the private company Infrastructure Leasing and Financial Services Limited (IL&FS).
- “Kochi Metro Rail Limited signs pact with auto drivers,” Deccan Chronicle, Jan. 24, 2018, source">source.
- In Hindi, “Chalo” means “Let’s Go!”
- “Demographia World Urban Areas,” Demographia, April 2019, source">source
- G.P. Hari, Personal Interview, Kochi, Feb. 11, 2019.
- “Kochi gets Chalo app for live tracking of buses, ferries,” The Hindu, accessed Jan. 28, 2019, source">source.
- Aparna Vijaykumar, Personal Interview, Online, March 5, 2019.
- Arjun G., “Delhi Government launches Open Transit Data Platform for Buses,” Medium, accessed Jan. 28, 2019, source">source; Open Data Portal available at: source">source
- Pravesh Biyani, Personal Interview, New Delhi, Feb. 14, 2019.
- Ibid.
- Ibid.
- “PoochhO,” Delhi Integrated Multi-modal Transit System, accessed Feb. 15, 2019, source">source.
- Samir Sharma, Personal Interview, New Delhi, Feb. 15, 2019.
- Ibid.
- Pravesh Biyani, Personal Interview, New Delhi, Feb. 14, 2019.
- Nikhil V.J., “Re: [datameet] – Open Transit Data – Delhi,” Email, 2019.
- “BMTC to open up transit data enabling entrepreneurs build mobility solutions.” Economic Times. source">source; “BMTC’s data-sharing plan on back burner,” The Hindu, accessed Feb. 4, 2019, source">source; Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, source">source.
- ET Bureau, “BMTC to open up transit data enabling entrepreneurs build mobility solutions,” Economic Times. source">source.
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, source">source.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, source">source.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- Tejas Pande, Personal Interview, New Delhi, Feb. 9, 2019;Vinay Sreenivasa, Personal Interview. Online, March 7, 2019; Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Ibid.
- “BMTC,” Bangalore Municipal Transport Corporation, accessed Feb. 20, 2019, source">source.
- Ibid; Tanushree Dev Barma, Personal Interview, Bangalore, March 5, 2019.
- S. Rajagopalan, Personal Interview, Bangalore, March 5, 2019.
- BMTC Data Sharing Policy Draft (July, 2018), Bangalore: Bangalore Municipal Transit Corporation, 2018.
- S. Rajagopalan, Personal Interview, Bangalore, March 5, 2019.
- Ibid.
- BMTC Data Sharing Policy Draft (July, 2018). Bangalore: Bangalore Municipal Transit Corporation, 2018.
- Srinivas Kodali, “BMTC Intelligent Transportation System (ITS) and Need for Open Transport Data,” Data Meet, accessed Jan. 28, 2019, source">source .
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, source">source
- Vinay Sreenivasa, Personal Interview, Online, March 7, 2019.
- Yunus Y. Lasania, “Telangana’s ‘open data’ policy to help start-ups address public issues,” LiveMint, accessed March 15, 2019, source">source
- Telangana Open Data Policy 2016, Hyderabad, Telangana: Government of Telangana, accessed March 15, 2019, source">source
- Ibid.
- Yunus Y. Lasania, “Telangana’s ‘open data’ policy to help start-ups address public issues,” LiveMint, accessed March 15, 2019, source">source
- “Background,” Factly, accessed Feb. 18, 2019, source">source
- Anant Maringanti, Personal Interview, Hyderabad, March 6, 2019.; Harsha Devulapalli and Girish Agrawal, “Mapping bus transit services in Hyderabad – an illustrative example of the use of open geospatial data,” Transportation Research Procedia. 25 (201): 4196-4206.
- Surya Kandukuri, Personal Interview, Hyderabad, March 6, 2019.
- Vishal Ramprasad, Personal Interview, Mumbai, Feb. 12, 2019.
- Srya Kandukuri, “Notes from our conversation,” Email, 2019.; Surya Kandukuri, Personal Interview, Hyderabad, March 6, 2019.
- Ibid.
- Aaron Antrim and Sean Barbeau, “The Many Uses of GTFS Data- Opening the Door to Transit and Multimodal Applications,” ITS America’s 23rd Annual Meeting and Exposition, April 2013, source">source
- Harsha Devulapalli and Girish Agrawal, “Mapping bus transit services in Hyderabad – an illustrative example of the use of open geospatial data,” Transportation Research Procedia, 25 (201): 4196-4206.
- Anumita Roychowdhury, Gaurav Dubey, Anu Soman, Waiting for a Bus: Strategies to improve Delhi’s bus system. (New Delhi: Centre for Science and Environment, 2017).
- Ibid.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- In many cases, transit operators do not make a system map or timetable available. Data can be used to provide these more analog solutions in order to meet the information needs of riders who do not possess smartphones or do not access transit data in an online format. Other technologies may prove useful to encompass groups of people who might not use smartphones, such as text or voice-based services.
- Open Government Data Platform India, “National Data Sharing and Accessibility Policy,” accessed Jan. 28, 2019, source">source
- “Open Government Data Platform India,” Open Government Data Platform India, accessed Jan. 28, 2019, source">source
- Mohd Ujaley, “Countries to Ride on India’s Open Government Data Platform,” Express Computer, source">source
- Simonti, Chakraborty, “Open Data Policy of the Government of India: What has it achieved?” CBG India, source">source
- Joel Gurin, Personal Interview, Online, March 1, 2019.
- Mark Headd, “New Thinking in How Governments Deliver Services,” in Beyond Transparency, ed. Brett Goldstein with Lauren Dyson. (San Francisco: Code for America Press, 2013): 278-9.
- Rajarshi Sahai, “Going Public with Public Transport Data For Public: Dilemmas of Developing Cities,” accessed Jan. 28, 2019, source">source
- “National Urban Innovation Stack: Strategy and Approach,” New Delhi, India: Ministry of Housing and Urban Affairs, Government of India, 2019, accessed Feb. 8, 2019, source">source
- “DataSmart Cities: Empowering Cities through Data,” Ministry of Housing and Urban Affairs, Government of India, source">source
- “We Continue to Create an Open Data Culture,” Makaia, accessed March 5, 2019, source">source
- “National Urban Transport Policy (2006),” New Delhi, India: Ministry of Urban Development, Government of India, 2006. source">source
- “National Urban Transport Policy (2014),” New Delhi, India: Ministry of Urban Development, Government of India, 2014. source">source
- “National Urban Transport Policy,” New Delhi, India: Ministry of Urban Development, Government of India (2006), source">source
- Ibid.
- GP Hari, Personal Interview, Kochi, Feb. 11, 2019.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Harshith Gokulendra, Personal Interview, New Delhi, March 1, 2019.
- O.P. Agarwal, Personal Interview. New Delhi, March 1, 2019.
- Srinivas Kodali, Personal Interview, New Delhi, Feb. 5, 2019.
- Rajarshi Sahai, Personal Interview, Online, Jan. 30, 2019.
- Available at: source">source
- Kunal Kumar, “Building National Urban Innovation Stack for Indian Smart Cities Mission – Technologies and Financing Model,” (Panel presentation, Smart Republic Conference, New Delhi, India, Feb. 27-28, 2019).
- Srinivas Kodali,. Personal Interview. New Delhi, Feb. 5, 2019.
- Samir Sharma, Personal Interview. New Delhi, Feb. 15, 2019.
- GP Hari, Personal Interview, Kochi, Feb. 11, 2019.
- Vishal Ramprasad, Personal Interview, Mumbai, Feb. 12, 2019.
- Harsha Krishna, Personal Interview. Bangalore, March 4, 2019;Vipassana Vijayarangan, Personal Interview, Online, Jan. 15, 2019.
- “National Urban Transport Policy,” New Delhi, India: Ministry of Urban Development, Government of India, 2006, source">source.
- Don Tapscott, “2018 Regulation Roundtable: Addressing the Regulatory Challenges of Disruptive Innovation,” Summary of 10 May 2018 Proceedings held at KPMG Toronto, Blockchain Research Institute, Aug. 8 2018.
- Warren Davidson, R-OH, "Text – H.R.7356 – 115th Congress (2017-2018): Token Taxonomy Act." Congress.gov. December 20, 2018, accessed April 14, 2019, source.
- U.S. Securities and Exchange Commission, “Ponzi Schemes Using Virtual Currencies,” July 23, 2017, source
- The DAO is one example of a Decentralized Autonomous Organization, which is a term used to describe a “virtual” organization embodied in computer code and executed on a distributed ledger or blockchain.
- U.S. Securities and Exchange Commission, “Report of Investigation Pursuant to Section 21(a) of the Securities Exchange Act of 1934: The DAO,” July 25, 2017, source
- Lester Coleman, "SEC Subpoenas 80 Cryptocurrency Firms," CCN, March 04, 2018, accessed May 16, 2019. source.
- Nikhilesh De, "SEC Again Delays Decision on Bitwise Bitcoin ETF Approval," CoinDesk, May 15, 2019. accessed May 16, 2019, source.
- U.S. Securities and Exchange Commission, Fintech Finhub, "Framework for “Investment Contract” Analysis of Digital Assets," April 3, 2019, accessed April 14, 2019, source.
- The Howey Test is the standard methodology, put in place by the U.S. Supreme Court to determine whether a transaction is an example of an "investment contract,” i.e., a security. It derives from a 1946 case, SEC v. W.J. Howey Co., a lawsuit involving the Howey Company of Florida. In the context of blockchain tokens, the Howey test can be expressed as three independent elements: (1) An investment of money, (2) in a common enterprise, (3) with an expectation of profits predominantly from the efforts of others.
- "A New Commissioner at America's Main Securities Regulator Causes a Buzz," The Economist, Nov. 08, 2018, accessed April 14, 2019, source.
- Stan Higgins, "The SEC Just Appointed Its First-Ever Crypto Czar," CoinDesk, June 04, 2018, accessed April 14, 2019, source.
- Detailed in the next section, LabCFTC is a pioneering regulatory model in dealing with fintech innovations
- Stephan O'Neal, “SEC Launches FinHub to Communicate With Industry, But What Does It Have to Say?" Cointelegraph, Feb. 13, 2019, accessed April 14, 2019, source.
- Yogita Khatri, "The SEC Wants to Hire a 'Crypto Securities' Advisor," CoinDesk, April 01, 2019, accessed April 14, 2019, source.
- Commodity Futures Trading Commission, “An Introduction to Virtual Currency,” 2017, source.
- Khatri, Yogita, "CabbageTech CEO Indicted in New York for Defrauding Crypto Investors," CoinDesk, March 27, 2019, accessed April 14, 2019, source.
- Chris Giancarlo, "CFTC Chairman Chris Giancarlo,” DC Blockchain Summit 2019, Georgetown University, Washington, D.C., March 6, 2019.
- Daniel Gorfine (Director, LabCFTC), personal interview, Washington, D.C., April 2019.
- Daniel Gorfine, "Podcasts." Commodity Futures Trading Commission, accessed April 14, 2019. source.
- Commodity Futures Trading Commission, "Request for Input on Crypto-asset Mechanics and Markets." December 11, 2018, accessed May 12, 2019, source.
- United States Financial Crimes Enforcement Network, Department of Treasury, Guidance: Application of FinCEN’s Regulations to Persons Administering, Exchanging, or Using Virtual Currencies, FIN-2013-G001, March 18, 2013, source.
- Peter Van Valkenburgh, "FinCEN Raises Major Licensing Problem for ICOs in New Letter to Congress," Coin Center, March 6, 2018, accessed May 12, 2019, source.
- Timothy Spangler and Robert J. Rhatigan. "FinCEN Warns That Virtual Currency Activities Are Subject to Anti-Money Laundering Obligations," Lexology, April 03, 2018, accessed April 14, 2019, source.
- FinCEN, "Advisory on the Iranian Regime’s Illicit and Malign Activities and Attempts to Exploit the Financial System," FIN-2018-A006, October 11, 2018, accessed April 14, 2019, source Advisory FINAL 508.pdf.
- Internal Revenue Service, "Notice 2014-21," March 2014, accessed April 14, 2019, source.
- "Tax Treatment of Cryptocurrency Hard Forks for Taxable Year 2017," American Bar Association to Internal Revenue Service, March 19, 2017, Washington, D.C.
- "IRS Treatment of Virtual Currencies," U.S. House of Representatives Committee on Ways and Means to Internal Revenue Service, Sept. 19, 2018, Washington, D.C. source.
- Steven T. Mnuchin and Craig S. Phillips, “A Financial System That Creates Economic Opportunities Nonbank Financials, Fintech, and Innovation,” U.S. Department of the Treasury, July 2018. source.
- Craig S. Phillips "Fireside Chat with Counselor Craig Phillips, U.S. Dept. of the Treasury," Speech at the D.C. Blockchain Summit 2019, Georgetown University, Washington, D.C., March 6, 2019.
- Statement of Jennifer Shasky Calvery, Director, Financial Crimes Enforcement Network, United States Department of the Treasury (2013) (testimony of Jennifer Shasky Calvery).source.
- Ibid.
- "Virtual Currency Business (BitLicense)," New York Department of Financial Services, 2015. source.
- Patrick Murck, (Partner, Cooley LLP), personal interview, March 2019.
- Marco Santori and Maria Vullo, "Legal Tender? The Regulation of Cryptocurrencies," June 7, 2018, accessed April 14, 2019, source.
- Anonymous New York venture capitalist in blockchain, personal interview, March 2019.
- Gage Lathrop and Dale Werts, "Blockchain and Cryptocurrency: State Law Roundup," JD Supra, July 10, 2018, accessed April 14, 2019, source.
- Long, Caitlin, "What Do Wyoming's 13 New Blockchain Laws Mean?" Forbes, April 08, 2019, accessed April 14, 2019, source.
- Caitlin Long (Co-Founder, Wyoming Blockchain Coalition), personal interview, Feb. 2019.
- Multiple start-up founders and business strategy leads (anonymous), personal interview, April 2019, Seattle.
- Greg Heuss (Managing Partner, Counterpoint Ventures), personal interview, April 2019, Seattle, Washington.
- Multiple start-ups (anonymous), interview by the author, April 2019, Los Angeles and San Francisco, California.
- David Otto (Founder and Managing Partner, Martin Davis PLLC), personal interview, April 2019, Seattle, Washington.
- Multiple start-ups and Venture Capitalists (anonymous), interview by the author, April 2019, Los Angeles and San Francisco, California.
- The SEC, as well as the securities laws it enforces, have come under bipartisan criticism from academics, entrepreneurs, investors, and members of Congress for creating red tape that makes it difficult both for entrepreneurs to raise capital in the public markets and for investors to find wealth-building opportunities. This concern prompted Congress to pass regulatory relief overwhelmingly in the Jumpstart Our Business Start-ups (JOBS) Act, which was signed by President Obama in 2012. In 2018, the U.S. House of Representatives passed a bill allowing further relief, the Jobs and Investor Confidence Act. The JOBS Act eased some burdens on entrepreneurs by exempting small and “emerging growth” companies from some of the costly burdens of securities laws like the Sarbanes-Oxley Act of 2002 and the Dodd-Frank Act 2010.For further reference: John Berlau, "Cryptocurrency and the SEC's Limitless Power Grab," Competitive Enterprise Institute, April 11, 2019, accessed April 14, 2019, source.
- Multiple venture capitalists, interviewed by author, Feb./Apr. 2019, New York, Seattle, San Francisco.
Improving India’s Parliamentary Voting and Recordkeeping (Pranesh Prakash)
I would like to thank Alex Howard, Ashok Hariharan, Heather Hurlburt, Jim Magnificio, PDT Achary, Srijoni Sen, and TK Vishwanathan for talking to me at length and sharing their immense knowledge so freely, and to Chakshu Roy and Eric Mill for the valuable inputs and pointing me in the right direction. I would also like to thank the 2019 cohort of New America’s India-US Public Interest Technology Fellowship for their valuable feedback, and New America—particularly Awista Ayub and Melissa Salyk-Virk—for providing me the fellowship that allowed for this paper, and for their patience. All errors and omissions remain mine.
Parliamentary Voting
Every democratic assembly requires a way of gauging the opinion of the gathering. The most common way to do this in a parliament is through voting. However, there is no standard way of voting. And even when voting is used, as James Carey notes in his book on parliamentary voting, “in most countries, it [is] exceedingly unusual to record how each legislator voted on a given proposal.”351 This is true of India as well: individual legislators’ votes are not usually recorded. It is a common misconception that one can review the voting record of one’s representative in parliament. Voting records cannot serve as a means of accountability for individual members of parliament, nor for the member of the legislative assembly and the local city councillor.352
Voting Procedures in the Indian Parliament
Before getting into the whys and wherefores of parliamentary voting, it is instructive to look at the law in India and to understand how voting currently happens in India’s Lok Sabha (House of the People) and Rajya Sabha (Council of States). Voting procedures are codified in the “Rules of Procedure and Conduct of Business” that are framed by each House of Parliament. While the Lok Sabha and the Rajya Sabha frame their rules of business and procedures independently, they are similar, if not identical, on most important matters.
All issues that need to be decided by the Lok Sabha and the Rajya Sabha take the form of “motions” proposed by individual members.353 All motions require voting, as mandated by the Constitution of India, art. 100(1), which states:
Save as otherwise provided in this Constitution, all questions at any sitting of either House or joint sitting of the Houses shall be determined by a majority of votes of the members present and voting, other than the Speaker or person acting as Chairman or Speaker.354
However, the constitution does not define what a “vote” is, nor how a determination of a “majority” is to be made.
Voice Votes
The most common form of voting is the voice vote, and it is the default followed in all cases where counted voting is not mandatory. In this form of voting, the Speaker (in the Lok Sabha) or the Chairman (in the Rajya Sabha)355 puts forth the motion, and asks those who agree with the motion to say “Aye,” and those who disagree to say “Nay.” Whichever group seems to have more voices (i.e., is louder) is proclaimed by the speaker to “have it.” After making the declaration once, the Speaker is, in theory, supposed to wait to see if there is any objection. If there is not any objection, she repeats either “the Ayes have it” or “the Noes have it” two more times, after which the motion is considered voted upon.
While the sense of the House as a whole may be determined through a voice vote, it is clear that the views of each member is not. Further, when one watches the proceedings of Parliament as relayed on television, one realizes that this is a mechanical invocation since there is usually no pause between the Speaker asking those who oppose to motion to say “No” and her declaring thrice: “the ayes have it, the ayes have it, the ayes have it,” all in a single go.
Counted Votes
If a member of Parliament objects to the Speaker's declaration of the result of a voice vote, the motion may need to be put to a counted vote, as detailed below. This can take one of four forms: a head count, a vote using a voting machine, a vote by going into “lobbies,” or a vote by “aye” or “no” slips (this form is only available in the Lok Sabha).
In a head count, those who agree with the motion will stand up when asked to and the number of members standing will be counted, and similarly for those who oppose the motion. While the numbers are recorded (unlike in a voice vote), the names of the voters are not. If the Speaker wishes, she may order a “division.” It is up to the Speaker as to which form of counting to use. She may, thus opt not to order a division—during which members' names are recorded alongside their votes—and instead use a head count, during which members' names are not recorded.
“Division” is parliamentary parlance for counted voting.356 When a division is ordered by the Speaker, the Secretary-General of the House starts the ringing of the division bell (which rings intermittently for division in the Rajya Sabha, and continuously for division in the Lok Sabha). This bell rings for 3½ minutes,357 after which the doors to the inner lobby of the house are shut, preventing the entry or exit of Members of Parliament (MPs). The Speaker takes one more voice vote and declares the results. If the results are challenged a second time, she has to order that votes be counted. The most common form of counted voting in India is through the “automatic vote recorders,” which were introduced in 1956.358 To use it, the MP presses a “vote activation button” along with a button indicating their vote—“Aye,” “No,” or “Abstention”—for ten seconds (and the results are shown on a board before being declared as final). Otherwise, the division may be undertaken by “lobby,” where the ayes and the noes go to opposite sides of the room and a division clerk counts them by name. In the Lok Sabha, one additional method of division is permitted, whereby MPs take “aye” or “no” slips, write their division number on it and sign it, and then hand it to a division clerk. In all cases, members who for some reason cannot vote using the prescribed method (e.g., for reasons of infirmity) are allowed alternative forms of voting as long as they are within the lobby. Further, before the division results are announced, each MP has the opportunity to correct her vote in case she did not cast it correctly, or cast it from the wrong seat. Once the result of a division is announced, however, it may not be challenged.
While the totals of the ayes and noes from a division are provided when the “unedited” version of the debates are put up on the Lok Sabha and the Rajya Sabha websites the day after a debate, the names of the individual members and the way they voted is not provided until the edited version appears, which may take up to a few weeks.
When are Divisions Mandatory?
There are two situations in which voting by division is provided for under the rules. First, when a member of the house disputes the Speaker’s declaration on two successive voice votes on the same motion, and the Speaker using her discretion, opts to order a division instead of a head count.
Second, if a vote requires the assent of at least two-thirds of the members of the House of Parliament. In this latter case, a division is mandatory. This is only required for seven distinct kinds of matters: for amendments to the Constitution of India,359 for removal of the President360 or judges of the Supreme Court,361 for limiting the powers of autonomous tribal states,362 for the power to legislate on behalf of the States,363 for the establishment of all-India services,364 or for the approval or extension of a proclamation of emergency.365 Needless to say, all of these are infrequent occurrences, with constitutional amendments being the most common among them.
Secret Ballots
There are some circumstances in which the votes are recorded secretly. The election of the President and the Vice-President are both done through a “system of proportional representation by means of the single transferable vote and the voting at such election shall be by secret ballot.”366
Voting Procedures in the USA and the United Kingdom
The U.S. Constitution has a specific provision on voting that not only talks about voting, but specifically speaks of recorded votes by stating, “the Yeas and Nays of the Members of either House on any question shall, at the Desire of one-fifth of those present, be entered on the Journal.”367 Given this provision, the default in both the House of Representatives and the Senate is voice votes, with counted votes being the exception. Counted votes in the House can take the form of a division (where names are not counted, only totals), recorded teller votes and ‘yea and nay’ votes (where names and totals are counted in both cases, and both happen electronically). In the Senate, counted votes happen either through a “division” vote or by a roll-call vote, with roll-calls being the official way of deciding contentious issues.368 The rules in the Senate even allow a motion to be passed without a vote if it is “without objection.”369
In the United Kingdom, the procedure is similar to India, with a voice vote being the default, and divisions by going into separate lobbies (chambers to the left and the right of the main room) being held when MPs dispute the Speaker’s assessment of a voice vote.370
In the U.S. Congress, the rules provide 15 minutes as a minimum between the announcement of a roll-call/recorded vote and its conduct. In the United Kingdom, eight minutes is provided from the time the division bell starts ringing to when the lobby doors are closed.371 Both the United States and the United Kingdom allow for deferred voting, thus allowing a number of different votes to be held together in a cluster at a pre-announced time, thus simplifying voting significantly.372
Voting Freedom
Should a legislator vote in accordance with her conscience, or in accordance with what she believes her constituents (or the majority thereof) want, or in accordance with what her party leadership wants? This is an inescapable and central issue in all party-based democratic systems. Carey dubs this the “fundamental tension between individualism and collectivism,”373 and explains that “individual accountability implies that legislators answer to the specific demands of citizens in their behavior, including voting. Collective accountability implies that teams of legislators—mainly parties and coalitions, in most legislatures–act collectively to promote a policy agenda and are evaluated by citizens as a group according to their effectiveness in advancing it. Where constituents—even supporters of the same party or coalition—put diverse demands on legislators, the demands of individual accountability can contradict the collective action on which collective accountability is based.”374
This tension also has one other basis, which is the question of who voters and constituents would wish to hold accountable: parties or individual MPs. Do voters vote on the basis of parties, regardless of who is standing for election for that party, or do they vote on the basis of individuals, even if that individual shifts between parties? Or does it lie somewhere in between, and if so, closer to which end of the spectrum? There are no clear answers to these questions, and indeed, there might not be one universal answer.
Whips
In different parliaments, the term “whip” is used to mean different things.375 In the following discussions, the term is mainly used to refer to instructions issued by a political party to its legislators. The negative consequences for disobeying a whip are quite different in India from countries like the United States or the United Kingdom. In the U.S. Congress, “disciplinary action for voting against the views of party leaders is rare, although Senators and Representatives may indirectly be sanctioned by denial of assignment to, or leadership positions on important committees.”376 Whereas in the United Kingdom, the measures for disobeying a whip “can include a written reprimand from the party chief whip (also communicated to the Member’s constituency party organization), temporary suspension from the party organization in Parliament, or a ”withdrawal of the whip," a formal expulsion from the party organization."377
However, in India, the anti-defection law passed in 1985 allows an MP to be disqualified from her parliamentary seat upon disobeying a party whip!378 In the Supreme Court case of Kihoto Hollohan v. Zachillhu, the anti-defection law was upheld.379 However, in doing so, the court also limited the application of the law to no-confidence motions and motions on “integral policy and program of the political party on the basis of which it approached the electorate.”380 This might seem a reasonable limitation, however, it has not worked out in practice since the Supreme Court has also held that the Speaker can unilaterally decide whether a legislator has voluntarily given up her seat or has gone against party directions.381 There is no clear way in which a Speaker can distinguish between disobeying a party on a trifling matter and on an “integral policy and program” since many parties don’t release election manifestos, and even then it is difficult to say which policies and programs are “integral” to the party and which ones aren’t.
Voting Practices Compared
There is a clear historical trajectory to the idea of recorded voting, as David Beetham notes:
[…] the idea of accountability implies a more focused and systematic ‘account-giving’ after the event, to which the public can respond. As we have already seen, constituents are increasingly interested in learning how their representatives have voted on key issues before parliament, and interrogating them about their actions. For members to have their voting record published, and to be able to give a reasoned defense of their record, is of the essence of political accountability. The extension of the Internet makes this requirement much more readily realizable, and it is now a standard feature in many parliaments.382
This seems to suggest that recorded voting is now seen as a bare minimum. Importantly, recorded voting by itself does not include justification of MPs’ votes to their constituents, nor does it include reporting by MPs to their constituents on other forms of parliamentary activity.383
In 2018, the U.S. House of Representatives had 500 recorded votes,384 and the Senate had 274 (in both cases, not including committees). In 2017, the numbers were 710 and 325 respectively. Since the 2017 general elections in the United Kingdom, there have been 353 divisions in the House of Commons. By comparison, in India, in the 16th Lok Sabha (2014-2019), there have been 90 divisions, 55 of which were mandatory and 35 were non-mandatory. But only 11 bills were voted upon. This is despite the far lengthier and cumbersome processes for recorded voting in both the United States and the United Kingdom.
There is a clear indication that India’s anti-defection law is responsible for this. An insightful study by Shalaka Patil shows that there was a dramatic drop in the number of divisions held in the Lok Sabha after 1985, when the anti-defection law was enacted.385 The 3rd Lok Sabha (1962-67) had 330 divisions, whereas the 14th Lok Sabha had only 20 divisions.
While voice votes implicitly introduce a presumption that the government will carry the motion, the anti-defection law has implicitly introduced a presumption that all the members vote in line with their party even if a division were to be held.
Interestingly, whips are not recorded in the United States, nor in the United Kingdom, though educated guesses can be made by looking at voting records.
Voting Reforms
Recording of Votes
The various forms of voting reveal different information to different actors. Voice votes and head counts are forms of “signal votes” where individual MP’s positions are not revealed to their constituents or the public, but are revealed to their party leaders. Division votes are “open votes” that show the MP’s position to the public.386 Less than 2 percent of the bills considered by the Lok Sabha are decided by counted votes.387 This needs to change. One cannot sufficiently evaluate an MP’s legislative and representative roles without voting records.
At the very least, the most important votes in Parliament—all motions related to bills and subordinate legislation, as well as no-confidence motions which determine whether a government survives or falls—ought to be voted on through divisions. There have been multiple instances of governments, with the help of partisan speakers, refusing to hold divisions even on no-confidence motions, as was the case in the state of Maharashtra in 2014,388 and last year in Sri Lanka.389 These are indeed cases of parliamentary procedures being used to undermine democracy in a way that the framers of the procedures never contemplated.
One problem that arises with the recording of votes is that MPs are not always present for votes. To improve attendance and engagement during votes on bills and subordinate legislation, the practice of deferred/clustered divisions should be introduced, allowing Parliamentarians to vote on a number of laws and amendments at the same time. These two sets of changes would need the amendment of Parliamentary rules of procedure.
Recording of Whips
While many political scientists have focused on analyzing votes by legislators in various countries and their public nature,390 not many have studied the public availability of instructions issued by political parties. While this is useful in all democracies with political parties, it is essential in countries like India where disobeying whips issued by political parties can have very serious consequences.
Even if one argues that in a weak parliament (where the legislature largely votes in accordance with the executive’s will) the voting record of individual legislators does not matter, one cannot say the same about political parties. Since the whips that political parties issue to their MPs can have consequences, there ought to be a clear record kept of them. While Patil suggests that whips ought to be conveyed to the Ministry of Parliamentary Affairs, it is better for whips to be conveyed to Speaker or the Secretary-General of each House of Parliament,391 since that would serve two distinct functions. First, since it is the Speaker who has the power to disqualify an MP, whips ought to be available to the Speaker. Second, whips are an important aspect of parliamentary functioning, and as such should form part of the record of Parliament and be published by the same authority that publishes debates and the votes of legislators.
Manifestos by Political Parties
Even if one disagrees with Kihoto Hollohan v. Zachillhu,392 one would agree that in order for any reasonable application of that decision, all political parties should have to indicate to voters what policies and programs are “integral” to the party through a separate section of their manifesto issued in multiple languages before a Lok Sabha election. Currently, many political parties do not even release manifestos.393 Without this, it will be left to the Speaker to judge what issues were advertised to the electorate as “integral” to a party.
Beyond Voting
Voting is only one part of the duties of an MP.394 While it is clear that an individual MP does not have too much leeway to influence governmental policy through votes in Parliament, it is far from clear that MPs don’t have influence over governmental policy. Most important laws (though not all) are usually referred to standing committees and the inputs of those standing committees, which generally have representation from multiple political parties, are often taken seriously by various ministries and laws are often re-written to address the concerns of the standing committees. As a general practice, standing committee reports are issued collectively (with allowances for dissents) and are helmed by the MP chairing each committee. This makes it harder for MPs to use standing committees as a location for signaling their work to their constituents, and perhaps also accounts for their low attendance rates.395 But this lack of signaling also means that there can be cross-party cooperation, rather than mere contention, in standing committees, which is harder to achieve on the floor of Parliament.
When it comes to legislating from within Parliament, but from outside the government, i.e., what are known as “Private Member’s Bills,” the record is so abysmal in terms of them being passed that it is noteworthy that some MPs continue to introduce private members’ bills. It seems that MPs do so to push discussions on a topic and gain the attention of the government (as happened with MP Kanimozhi’s Transgender Rights Bill, which failed, but led to the government taking up the issue and introducing its own bill), or to engage in signaling to their constituents or their party leaders.
Apart from work within Parliament, MPs undertake much constituency-related work, including the disbursement of the MP local area development (MPLAD) funds and working with various levels of government to implement developmental programs in their constituency.
A few MPs have started issuing reports of their own performance in and outside of Parliament.396 It would be welcome if the press highlighted such reports, and created peer pressure for other MPs to start issuing progress reports to their constituents.
Parliamentary Recordkeeping
Parliamentary functioning can only be judged by the records it keeps, and thus parliamentary records are a critical part of parliamentary accountability.
What kinds of records does parliament generate? There are at least the following forms of records:
- Debate Records, with speaker’s and members’ names and timings
- Voting records, vote counts, and quorum counts
- Questions and answers, including corrections
- Bills and acts
- Subordinate legislation
- Amendments
- Committee meeting records
- Committee reports, including dissents
- Resolutions, references, announcements, statements, and special addresses
- Summary of work reports
- Reports of elections, inductions, and resignations, and deaths of members
- Rules of procedure and conduct of business
- Stand-alone books, pamphlets, and reports
Technology Use Within Parliament
Is there a uniform and efficient process for handling these records and for making them public? In 2016, an additional director of the Lok Sabha Secretariat noted that “presently, a digitization project is under progress for the creation of PDF files of the proceedings of Lok Sabha, including Questions and Debates.”397 This makes it clear that there is no digital workflow for these documents. While the Lok Sabha and Rajya Sabha websites are updated on a daily basis, their site architecture, their abysmal search functionalities, and the less-than-useful format of the records on the sites make it clear that the records are both hard to find, and hard to make use of by researchers and citizens.
In the Rajya Sabha’s 2017 annual report, the chapter dedicated to LARRDIS (the parliamentary information retrieval system) has a dismal section on achievements related to computerization, where they list only four achievements: “using the Internet” for research, communications being “sent through email,” “soft copies” being emailed, and “all typing work” being “done on computers.”398
While the National Informatics Centre has a “Parliament Information Division,” which seems to be responsible for maintenance of the Parliamentary websites, there is not much information available about its functioning.
While there are a few Parliament-related files on data.gov.in, the central government’s open data portal, there are no datasets relating to Parliamentary debates. In response to an email asking for bulk access to the digitized debate dataset, the data custodians (as listed on data.gov.in) for both the Lok Sabha and the Rajya Sabha explained that whatever was on the website was all that was accessible.
How Open Standards Can Help
One technical way to improve the accessibility of parliamentary records, and consequently improve the work of parliamentarians, bureaucrats who work with parliamentary records, and researchers,399 is to use a structured and semantically marked-up format for recordkeeping and to establish a digital workflow for both houses of Parliament. There is an open standard400 for parliamentary (and judicial) records called Akoma Ntoso (“AKN”), which is an XML-based semantic structured format standardized within an international standards body called OASIS. All of the different forms of records produced by the Indian Parliament can be represented in the AKN format.
Ashok Hariharan, a software developer who was a coordinator of the Africa i-Parliaments Action Plan within the U.N.’s Department of Economic and Social Affairs, noted that there were several benefits to going in for a semantically marked-up structured format, including efficiency; improved collaboration among institutions; preservation; interoperability; cost-effectiveness; value addition; and ease of comparative research.401
Producing Revised Versions of Laws
Various ministries and departments often do not have the latest version of the laws relating to their work on their website, instead opting to put up the base (unamended) statute, with each of the amendments listed separately rather than offering an integrated view of the law. They do this because integrating all the amendments is not easy in the formats they use (PDF and DOC/DOCX), and the integration has to be done manually. By contrast, if a format like AKN were used for the original statute and the subsequent amendments, then any suitable software can be used to automatically create the integrated version of the law.
Dated Versioning of Laws
At times, especially for judicial cases, government departments (who often file the cases) and courts need to know what the precise content of a law was on a particular date. In order to have this, the department or court needs to keep an integrated version of the law after each amendment. For laws that get amended frequently—e.g., regulations by the Central Board of Direct Taxes and the Reserve Bank of India—this would be quite cumbersome. If AKN were used, then an accurate version of the law as on a particular date could even be generated dynamically.
Tracking Changes During Amendments
One problem that many legislators face is that of keeping track of the amendments proposed for the bills that they are considering. The amendments often take the form of a document which contains cryptic declarations such as, “on page 5, line 17 substitute […].” Neither the Ministry of Parliamentary Affairs, nor the parliamentary secretariats produce redlined versions of the law with all the proposed amendments incorporated. That job is left up to the offices of each parliamentarian, and can be very cumbersome since all the data for doing this has to be entered manually. If AKN were used with a digital workflow management software, such redlined versions could be created automatically. MPs would even be able to directly edit a copy of the proposed bill and automate the generation of the amendments they wish to propose in forms easily understood by both the software as well as by the parliamentary secretariat.
Making Complex Research Easier
Usage of a structured format like AKN allows for complex structure-aware searches to be conducted, enabling research that otherwise would have been difficult to carry out.402
Examples of Usage of Akoma Ntoso
The European Union uses AKN internally for many purposes, apart from using a platform called AT4AM,403 which also uses AKN, for handling amendments, and which is tightly integrated with their work-task allocation, budgeting, and translation systems. AKN is also used in South Africa, the United Kingdom, Italy, the U.S. state of California, and a host of other jurisdictions. In 2017, a U.N. inter-agency Working Group on Document Standards recommended the formation of a “Semantic Interoperability Framework,” which included the usage of Akoma Ntoso localized for the U.N.’s needs (AKN4UN) as one of the two prongs.404
Many NGOs that work on legislative transparency use a free/libre/open source platform named Indigo,405 which provides a convenient interface for writing laws in AKN, including transforming existing laws into AKN. In India, an NGO named Nyaaya had already converted more than 800 Indian laws into AKN.406
In India, the use of an XML-based format called XBRL is mandated for the submission of all company financial reports to the Ministry of Corporate Affairs. Given this, there is precedent for using XML-based semantically-marked up and structured formats within government. Indeed, the National Policy on Open Standards mandates the use of open standards for e-governance, and the Interoperability Framework for e-Governance (IFEG) lists a number of standards, but unfortunately, the IFEG does not list Akoma Ntoso as one of the standards since it doesn’t take legislation or parliamentary records as a separate e-governance domain.
Judicial Interventions
An important case in this regard has emerged from a right to information (RTI) query by a law student, wherein he asked the Legislative Drafting Department of the Ministry of Law to provide him a copy of the Indian Christian Marriage Act, 1972 since the version available on IndiaCode.nic.in was not readable. Later, this case was filed as a public interest litigation (PIL) in the Delhi High Court, noting that Section 4 of the RTI Act mandates the proactive uploading of laws by the government. In this regard, Justice Manmohan of the Delhi HC quoted the CIC order:
“Section 4 [of the Right to Information Act] mandates the Ministry of Law to place the texts of enactments. It is the duty of Legislative Department to provide information about access of every updated enactment. It is not just a recommended obligation under Section 4(1)(a) of RTI Act, but a constitutional mandate, a legal necessity, and an essential requirement for peace.”
In one of his orders, Justice Manmohan even asked the Ministry of Law to convene a meeting to consider, among other issues, whether Akoma Ntoso could be used as a standard.407 Unfortunately, the minutes from the meeting convened by the Ministry of Law do not mention Akoma Ntoso.408 It would seem that even this judicial intervention did not suffice to put India on the path to the modernization of parliamentary recordkeeping.
Costs
The Indian Parliament is one of the most underfunded parliaments in the world, getting an annual budget in 2017-18 of 0.049 percent of the total government expenditure, whereas the worldwide average is ten times higher at 0.49 percent.409 I asked one of the original authors of Akoma Ntoso, who has a long history of consulting on legislative standards transitions, for a cost estimate given the Indian scenario.410 The largest cost, he noted would be for proof-readers for the digitization of existing legislation. Writing the software for parsing of laws is not very expensive, coming to only six to seven months of work for a single person (i.e., six to seven man-months), even taking into account the customizations required.411 The search functionality with a public-facing website would be another six man-months. Automating the production of new documents would be a bit more complicated. Overall, he estimated a cost of around $2-5 million USD, which, even on the higher end of the estimate, is less than three percent of the annual Parliamentary budget of $150 million USD.412
Even with this comparatively low overall importance given to parliamentary budgeting, the amount needed for a transformation of records in a minuscule percentage, and even less given the spread of the developmental costs over a multi-year period. Given this, improving the technology on which our Parliament is built is not in the least a difficult choice.
Conclusion
There are multiple aspects to what makes a parliament democratic and legitimate: its representative character, openness and transparency, accessibility, accountability, and effectiveness.413 In this paper, I have focused solely on openness, transparency, and accountability in the form of parliamentary voting and parliamentary records. I have demonstrated that both the practices as well as the rules of procedure covering voting in the Indian parliament require a serious overhaul if we are to have meaningful accountability of Parliamentarians to their constituents for their legislative functions.
We must mandate counted voting on all motions related to bills and delegated legislation, as well as no-confidence motions. The lack of such provisions currently contributes to a lack of legislative accountability, as well as opening up the possibility of a Speaker misusing her powers during a no-confidence motion. Further, we need parliamentary recording of whips issued by political parties to their members in order to enable a Speaker to know when a whip has been disobeyed by a member, as well as for accountability of political parties to those who voted for them. We also need to mandate pre-election declaration of “integral” policies and programs by each political party to ensure that it is clear when there’s a violation of such a policy or program by a member of parliament who got elected on the party ticket.
However, I have also argued that it is insufficient, as Parliamentarians perform many functions beyond legislation. There is a need for greater transparency and reporting by Parliamentarians themselves, in the absence of any other systematic means of reporting to the electorate about their promises and accomplishments.
In relation to recordkeeping, I have pointed out the harms caused by the non-usage of a semantic and structured open standard for legislative records, and the manifold benefits of adopting a format like Akoma Ntoso alongside an appropriate digital workflow, including for bureaucrats, parliamentarians, researchers, and voters. I have also provided a cost estimate for the development of and transition to an Akoma Ntoso-based platform in a way that covers both past and current records.
Finally, I have also pointed out multiple avenues for further research on parliamentary accountability and recordkeeping in the Indian context.
Appendix 1: Examples of Akoma Ntoso
Here is a snippet of the Aadhaar Act (2016) marked up in Akoma Ntoso:
<akomaNtoso xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.akomantoso.org/2.0" xsi:schemaLocation="http://www.akomantoso.org/2.0 akomantoso20.xsd">
<act contains="originalVersion">
<preface>
<p class="title">
<shortTitle>Aadhaar (Targeted Delivery Of Financial And Other Subsidies, Benefits And Services) Act, 2016</shortTitle>
</p>
</preface>
<preamble>
<p>A Bill to provide for, as a good governance, efficient, transparent, and targeted delivery of subsidies, benefits and services, the expenditure for which is incurred from the Consolidated Fund of India, to individuals residing in India through assigning of unique identity numbers to such individuals and for matters connected therewith or incidental thereto.</p>
<p>Be it enacted by Parliament in the Sixty-seventh Year of the Republic of India as follows:–</p>
</preamble>
<body>
<chapter id="chapter-I">
<num>I</num>
<heading>Preliminary</heading>
<section id="section-1">
<num>1.</num>
<heading>Short title, extent and commencement.–</heading>
<subsection id="section-1.1">
<num>(1)</num>
<content>
<p>This Act may be called the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016.</p>
</content>
</subsection>
</section>
</chapter>
</body>
</act>
</akomaNtoso>
Example of Akoma Ntoso snippet recording the presence of a quorum and a vote in a debate, and then to include that in a summary analysis by linkage:
<!– Verbatim debate notation, which creates "eId" references named "quantity_2" (for ayes) and "quantity_3" (for noes).–>
<debateSection eId="dbsect_2" name="… ">
<summary eId="summary_1">(Question carried by <quantity eId="quantity_2" normalized="72" refersTo="#ayes">72</quantity> to <quantity normalized="34" eId ="quantity_3" refersTo="#noes"> 34</quantity> votes)</summary>
</debateSection>
<!– Analysis notation, which refers to the debate outcome (via "href" tags of "quantity_{2,3}").–>
<parliamentary>
<voting eId="voting_1" href="#summary_1" refersTo="#voting" outcome="#approved">
<quorum eId="voting_1__quorum_1" refersTo="#majority" value="80"/>
<count eId="voting_1__count_2" refersTo="#ayes" href="#quantity_2" value="72"/>
<count eId="voting_1__count_3" refersTo="#noes" href="#quantity_3" value="34"/>
</voting>
</parliamentary>
Disclaimer: Portions of this section of the report have been edited for clarity due to the terms being used (i.e., "division" and "counted votes") are overlapping, but not identical sets. [2/18/2022]
Citations
- The Global Risks Report 2018 13th Edition, [Geneva: World Economic Forum,2018] <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- The United Nations World Water Development Report 2018: Nature-Based Solutions for Water, [Paris: WWAP (United Nations World Water Assessment Programme) /UN-Water, 2018, UNESCO] <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Martina Flörke, Christof Schneider, and Robert I. McDonald, "Water competition between cities and agriculture driven by climate change and urban growth," Nature Sustainability 1, no. 1 (2018): 51.
- Peter H. Gleick, "Global freshwater resources: soft-path solutions for the 21st century," Science 302, no. 5650 (2003): 1524-1528.
- Ibid.
- Negative externalities are costs that impact a party that does not have a role in its creation. For instance, vehicular pollution generated by a specific individual affecting people nearby. Negative externalities cause market failures.
- Collection action problem occurs when individuals pursuing a common goal do not cooperate due to competing interests.
- Free rider issues occur when individuals who do not pay for a good or service reap its benefit. Too many free riders results in over-exploitation or under-production of the good or service.
- Richard E. Howitt, Richard E. and Kristiana Hansen, "The Evolving Western Water Markets," Choices 20, no. 316-2016-6565 (2005): 59.
- Guy Le MoigneShawki Barghouti, Gershon Feder, Lisa Garbus, and Mei Xie, "Country experiences with water resources management," World Bank Technical Paper 175 (1992).
- Ereney Hadjigeorgalis, "A Place for Water Markets: Performance and Challenges," Review of Agricultural Economics 31, no. 1 (2009): 50-67.
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- C. Wilson, Adverse Selection, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics, Palgrave Macmillan, 2008]
- Y. Kotowitz, Moral Hazard, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- J.O. Ledyard, Market Failure, In: Palgrave Macmillan (eds)[London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- David S. Brookshire, Bonnie Colby, Mary Ewers, and Philip T. Ganderton, "Market Prices for Water in the Semiarid West of the United States," Water Resources Research 40, no. 9 (2004).
- John Freebairn and John Quiggin, "Water rights for variable supplies," Australian Journal of Agricultural and Resource Economics 50, no. 3 (2006): 295-312.
- A. Dinar, M. Rosegrant, R. Meinzen-Dick, "Water allocation mechanisms: Principles and examples," The World Bank Policy Research Working Paper 1779 (June 1997).
- Jill E. Hobbs, "Information asymmetry and the role of traceability systems," Agribusiness: An International Journal 20, no. 4 (2004): 397-415.
- Max H. Bazerman and James J. Gillespie, "Betting on the future: The virtues of contingent contracts," Harvard Business Review 77 (1999): 155-162.
- Stefaan G. Verhulst, "Information Asymmetries, Blockchain Technologies, and Social Change," Medium, July 24, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Sloane Brakeville, and Bhargav Perepa, "Blockchain Basics: Introduction to Distributed Ledgers," IBM Developer, March 18, 2018, accessed April 14, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Nigel Gopie, "What Are Smart Contracts on Blockchain?" Blockchain Pulse: IBM Blockchain Blog, July 02, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- "Civic Use Cases," Helping Governments to Be More Accessible, Efficient and Effective. <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- "Civic Ledger Pty Ltd.," Australian Water Partnership. <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "Water Markets and Trade," Australian Government – Murray-Darling Basin Authority, Sept. 29, 2015. <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Ibid.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management. September 2018.
- Ibid.
- The term “smart” in this context indicates the use of internet of things, big data, predictive analytics integrated over blockchain network as underlying technologies to facilitate the operations of a water market.
- Jayachandran Praveen, “The Difference between Public and Private Blockchain," Blockchain Pulse: IBM Blockchain Blog, Aug. 06, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- J.R. DeShazo, Gregory Pierce, and Henry McCann, “Los Angeles County Community Water Systems Atlas and Policy Guide: Supply Vulnerabilities, At-Risk Populations, Conservation Opportunities, Pricing Policies, and Customer Assistance Programs,” UCLA: Luskin Center for Innovation, (2015), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; U.S. Census Bureau Quick Facts: Los Angeles County, California," Census Bureau Quick Facts, July 1, 2017, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- S. Pincetl et al., “Water Management in Los Angeles County: a Research Report,” Los Angeles: UCLA, Institute of Environment and Sustainability, 2015, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Ibid.
- Ibid.
- J.R. DeShazo and Gregory Pierce, "Quantifying the Benefits and Designing Governance Structures for a Water Market in Los Angeles County," [Los Angeles: UCLA, Luskin Center for Innovation, Oct. 2016] <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Bengaluru Water Board, “Blueprint for Future,” <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Bangalore Water Supply and Sewerage Board, "About BWSSB," Bangalore Water Supply and Sewerage Board. <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Bengaluru Water Board, “Blueprint for Future," <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Malini Ranganathan, "'Mafias' in the waterscape: Urban informality and everyday public authority in Bangalore," Water Alternatives 7, no. 1 (2014).
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- Bart Elias, Unmanned Aircraft Operations in Domestic Airspace: U.S. Policy Perspectives and the Regulatory Landscape (Washington, D.C.: Congressional Research Service, 2016), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Tom Hancock and Wang Xueqiao, “China’s DJI targets agriculture as consumer drone sales slow,” Financial Times, March 25, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Richard Levick, “Drone Industry Just Beginning To Take Off,” Forbes, May 15, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Ujjwal Bakshi and Manash Neog, “Much to Drone About,” Economic Times, April 4, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Therese Jones, International Commercial Drone Regulation and Drone Delivery Services (Santa Monica: RAND Corporation, 2017), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Somya Lohia, “Drone Regulations 1.0 Can Fetch India Major Slice of $100 Billion Industry,” Money Control, January 9, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Civil Aviation Requirements Series X Part I Issue I: Requirements for Operation of Civil Remotely Piloted Aircraft System (RPAS), F. No. 05-13/2014-AED Vol. IV (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Ibid., Reg. 14.2.
- Ibid., Reg. 12.14 & 12.2.
- Ibid., Reg. 11.2 & 17.1.
- Ibid, Reg. 12.21.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Procedures for Operation of Civil Remotely Piloted Aircraft Systems (RPAS) in Indian Airspace, AIP Supplement 164/2018 AAI/ATM/AIS/09-09/2018 (New Delhi: Airports Authority of India, 2018), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Tender Document: Development, Hosting and Maintenance of Digital Sky Platform for Ministry of Civil Aviation IT-11042/1/2018-DIRECTORATE OF IT (New Delhi: Airports Authority of India, 2018), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Ibid.
- Ibid.
- Drone Ecosystem Policy Roadmap (New Delhi: Ministry of Civil Aviation, 2019), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Ibid, 7.
- Ibid, 14.
- The Personal Data Protection Bill, 2018 (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- White Paper of the Committee of Experts on a Data Protection Framework for India (New Delhi: Ministry of Electronics and Information Technology, 2017), <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Petition to the Federal Aviation Administration: Drones and Privacy (Washington, D.C.: Electronic Privacy Information Center, 2012), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Margot Kaminski, “Drone Federalism: Civilian Drones and the Things They Carry,” California Law Review 4 (2013): 57–74.
- Notice of Proposed Rulemaking: Operation of Small Unmanned Aircraft Systems Over People FAA–2018–1087 (Washington, D.C.: Federal Aviation Administration, 2019), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Arthur Holland Michel, Drones at Home: Local and State Drone Laws (New York: Center for the Study of the Drone, Bard College, 2017), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Amanda Essex, Taking Off: State Unmanned Aircraft Systems Policies (Denver, CO: National Conference of State Legislatures, 2016), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- An Act Relating To Unmanned Aircraft Systems – Establishing Statewide Standards, Protecting Privacy, And Ensuring Public Safety (Virginia: American Legislative Exchange Council, 2017), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Gautam Bhatia, “State Surveillance and the Right to Privacy in India: A Constitutional Biography,” National Law School of India Review 26 (2014): 127–158.
- (2019) 1 SCC 1.
- Ibid, 359.
- (2015) 5 SCC 1.
- Ibid, 167.
- Colin Snow, “Drones Pose a Unique Big Data Challenge For Business Users,” Forbes, February 6, 2019 <a href="<a href="<a href="<a href="source">source">source">source">source">source ; Michelle Chan, “What Businesses Need to Know About Drone Data,” Techwire Asia, February 13, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules ((New Delhi: Ministry of Electronics and Information Technology, 2011),<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source"> <a href="<a href="<a href="<a href="source">source">source">source">source">source ; Ibid. ; Rachel Finn and Anna Donovan, “Big Data, Drone Data: Privacy and Ethical Impacts of the Intersection Between Big Data and Civil Drone Deployments,” in The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, ed. Bart Custers (The Hague: TMC Asser Press, 2016), 47-67.
- As Solove remarks about the “Information Age:” “The data gathered about people is significantly more extensive, the process of combining it is much easier, and the computer technologies to analyze it are more sophisticated and powerful.” See Daniel Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review 154 (2006): 477, 506 ; Ibid., 507–08.
- Jordi Soria-Comas and Josep Domingo-Ferrer, “Big Data Privacy: Challenges to Privacy Principles and Models.” Data Science and Engineering 1 (2016): 21, 22. ; Justice KS Puttaswamy v. Union of India, (2017) 10 SCC 1.
- Guide to Basic Data Anonymisation Techniques (Singapore: Personal Data Protection Commission of Singapore, 2018), www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other-Guides/Guide-to-Anonymisation_v1-(250118).pdf.
- For a particularly stark situation, where the de-identification was considered near foolproof and yet re-identified, see Jean Louis Raisaro et al., “Addressing Beacon Re-Identification Attacks: Quantification and Mitigation of Privacy Risks,” Journal of the American Medical Informatics Association 24 (2017): 799, 800.
- Solon Barocas and Helen Nissenbaum, “Big Data’s End Run around Anonymity and Consent,” in Privacy, Big Data, and the Public Good, eds. Julia Lane et al. (New York, NY: Cambridge University Press, 2014), 44–45.
- Ira S Rubinstein, “Big Data: The End of Privacy or a New Beginning,” International Data Privacy Law 3 (2013): 74, 77–78; Davide Castelvecchi, “Can We Open the Black Box of AI?” Nature 538, no. 7623 (2016): 20.
- Mireille Hildebrandt, “Defining Profiling: A New Type of Knowledge?” in Profiling the European Citizen: Cross-Disciplinary Perspectives, eds. Mireille Hildebrandt and Serge Gutwirth (eBook: Springer, 2008), 17, 20.
- Nathaniel A Raymond, “Beyond ‘Do No Harm’ and Individual Consent: Reckoning with the Emerging Ethical Challenges of Civil Society’s Use of Data,” in Group Privacy: New Challenges of Data Technologies, eds. Linnet Taylor, Luciano Floridi and Bart van der Sloot (eBook: Springer, 2017): 67, 75.
- A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Ibid, 45–46.
- Ananth Padmanabhan and Anirudh Rastogi, “Big Data,” in Regulation in India: Design, Capacity, Performance, eds. Devesh Kapur and Madhav Khosla (London: Hart Publishing, 2019): 251, 262.
- Aleecia M. McDonald and Lorrie Faith Cranor, “The Cost of Reading Privacy Policies,” I/S Journal of Law and Policy, 4 (2008): 543, 565.
- Arthur Allen Leff, “Contract as Thing,” American University Law Review 19 (1970): 131.
- Nikhil Narendran, “Policy Framework for Protection of Big Data in State Possession,” in Blockchain for Property: A Roll Out Road Map for India, eds. Baladevan Rangaraju and Vishnu Chandra (New Delhi: India Institute, 2017): 34, 40.
- Rahul Matthan, Privacy 3.0: Unlocking Our Data-Driven Future (Noida: Harper Collins, 2018): 167–171.
- Carmine Cifaldi, “Unmanned Aircraft System Privacy and Data Protection,” in Handbook of Unmanned Aerial Vehicles, eds. K.P. Valavanis and G.J. Vachtsevanos (eBook: Springer, 2018): 1–19.
- Voluntary Best Practices for UAS Privacy, Transparency, and Accountability (Washington, D.C.: National Telecommunications and Information Administration, 2016), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Clark D. Cunningham, “Apple and the American Revolution: Remembering Why We Have the fourth Amendment”, The Yale Law Journal, volume 126, <a href="<a href="<a href="source">source">source">source">source
- “ Breaking Down Apple’s iPhone Fight With the U.S. Government”, The New York Times, March 21, 2016, <a href="<a href="<a href="source">source">source">source">source
- Nick Statt, “Apple’s iCloud partner in China will store user data on servers of state-run telecom”, The Verge, July 18, 2018, <a href="<a href="<a href="source">source">source">source">source
- “Chen Guangcheng, Apple Can’t Resist Playing by China’s Rules”, The New York Times, January 23, 2018, <a href="<a href="<a href="source">source">source">source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, <a href="<a href="<a href="source">source">source">source">source
- Ibid., “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming), Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="source">source">source">source">source
- “Top 20 Countries with the Highest Number Of Internet Users”, <a href="<a href="<a href="source">source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="source">source">source">source">source
- Ibid.
- See Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="source">source">source">source">source
- Krishna Pokharel and Rajesh Roy, “India Says Rumors About Child Snatching on WhatsApp Led to Mob Killings”, The Wall Street Journal, July 5, 2018, <a href="<a href="<a href="source">source">source">source">source
- . Section 91, Code of Criminal Procedure, 1973
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="source">source">source">source">source
- Id.
- “Cross-Border Law Enforcement Demands: Analysis of the U.S. Department of Justice’s Proposed Bill”, Center for Democracy and Technology, August 17, 2016, <a href="<a href="<a href="source">source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Data localization is no solution,” The Hindu, August 3, 2018, <a href="<a href="<a href="source">source">source">source">source
- This, however, requires an executive agreement between the United States and the foreign country certifying that the state will rely on robust privacy protections, and respect for due process and the rule of law when making requests to companies directly. Such a framework over time, will not only need to be transparent and hold both companies and LEAs accountable but also be scalable to respond to the increasing volume and complexity of requests. Specifically, due process safeguards on user notification, redressal etc. will need to be incorporated. The U.S. Department of Justice recently issued clarifications on how the CLOUD Act will be operationalized available at <a href="<a href="<a href="source">source">source">source">source
- For more on the privacy protecting requirements under CLOUD Act, both at an institutional level and for individual requests, see Madhulika Srikumar, Debrae Kennedy-mayo, Peter Swire and Sreenidhi Srinivasan, “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, <a href="<a href="<a href="source">source">source">source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- Sections 40 and 41, The Personal Data Protection Bill, 2018
- Ibid.
- Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, “A Free and Fair Digital Economy Protecting Privacy, Empowering Indians”, 27 July 2018
- Ministry of Electronics and Information Technology, “The Information Technology [Intermediaries Guidelines (Amendment) Rules] 2018,” <a href="<a href="<a href="source">source">source">source">source
- Pranesh Prakash,“Why Data Localisation Might Lead To Unchecked Surveillance,” Centre for Internet and Society, October 15, 2018, <a href="<a href="<a href="source">source">source">source">source ; “US criticises India's data localisation norms, draft e-commerce policy,” The Economic Times, April 9, 2019, <a href="<a href="<a href="source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="<a href="source">source">source">source">source
- Josh Constine,” Zuckerberg warns of authoritarian data localization trend,” Techcrunch, <a href="<a href="<a href="source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="<a href="source">source">source">source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- “RBI data localisation: 80 percent players, including WhatsApp, comply with norms”, Business Standard, <a href="<a href="<a href="source">source">source">source">source -80-players-including-whatsapp-comply-with-norms-118101500907_1.html
- “Facebook takes a tough stand on data storage amidst India’s localisation push”, The Economic Times, <a href="<a href="<a href="source">source">source">source">source
- WhatsApp is working to comply with Reserve Bank of India (RBI) regulations on the local storage of payment-related data, the Economic Times reported. “Only some engineering work is left,” an anonymous senior Facebook executive told ET. <a href="<a href="<a href="source">source">source">source">source -mandate-report-why-is-it-needed/
- “India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, <a href="<a href="<a href="source">source">source">source">source
- Komal Gupta, “Google Agrees to Comply with RBI’s Data Localisation Norms,” Livemint , September 10, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source"><a href="<a href="<a href="source">source">source">source">source Surabhi Aggarwal, “Industry bodies write to IT minister Ravi Shankar Prasad against data bill,” Economic Times, October 4, 2018, //economictimes.indiatimes.com/articleshow/66062141.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- See U.S. India Strategic Partnership Forum (USISPF) submission to MeitY available at <a href="<a href="<a href="source">source">source">source">source
- Aditya Kalra, “U.S. senators urge India to soften data localisation stance,” Reuters, October 13, 2018, <a href="<a href="<a href="source">source">source">source">source
- Ashish Shukla, “RBI refuses to extend deadline for data localisation,” IBTimes, October 14, 2018, <a href="<a href="<a href="source">source">source">source">source
- Bhavin Patel and Hemant Krishna, “Data Localisation: Here’s why the RBI isn’t listening to the ‘Mirroring’ argument,” CNBC TV18, October 15, 2018, <a href="<a href="<a href="source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,”Data localisation in India: Questioning the means and ends,”The Leap Blog, February 22, 2019, <a href="<a href="<a href="source">source">source">source">source
- Amazon not mirroring it abroad Whatsapp asked for 5 more months, mastercard and rest asked for one year
- “Russia fines Facebook $50 for failing to comply with local data privacy law, ” ZDNet, April 12, 2019, <a href="<a href="<a href="source">source">source">source">source ; Mark Scott, “Russia Prepares to Block LinkedIn After Court Ruling,” The New York Times, November 10, 2016, <a href="<a href="<a href="source">source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="<a href="source">source">source">source">source
- Government authorities increasingly rely on blocking access to internet altogether to contain cases of public unrest. See Timothy Mclaughlin ,“How Whatsapp Fuels Fake News And Violence In India, ” The Wired, December 12, 2018, <a href="<a href="<a href="source">source">source">source">source
- “Fighting fake news: Govt asks Whatsapp to take immediate action,” Economic Times, July 3, 2018, <a href="<a href="<a href="source">source">source">source">source
- The Indian government introduced the draft amendment to the Information Technology Act, 2008 to overhaul the current intermediary liability regime in India. One of the problematic provisions included the requirement for intermediaries to enable tracing the originator of messages. See Yesha Tshering Paul“ Fake News: Misguided Policymaking To Counter Misinformation,” Bloomberg Quint, January 14, 2019, <a href="<a href="<a href="source">source">source">source">source
- The Srikrishna Committee appointed to draft India’s first comprehensive data protection law introduced the term “fiduciaries” in the Personal Data Protection Bill, 2018. See Arghya Sengupta, “Why the Srikrishna Committee Rejected Ownership of Data in Favour of Fiduciary Duty,” The Wire, August 2, 2018, <a href="<a href="<a href="source">source">source">source">source
- For more on how Indian law enforcement agencies make requests for data under Indian law, see Chapter 3 in Srikumar et al., “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, <a href="<a href="<a href="source">source">source">source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="source">source">source">source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="source">source">source">source">source
- For instance, Facebook commits to fight back in court if requests are overbroad or defective. Chris Sonderby, “Sharing Our Latest Transparency Report,” Facebook Newsroom, May 23, 2019, <a href="<a href="<a href="source">source">source">source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, <a href="<a href="<a href="source">source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="source">source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="source">source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="source">source">source">source">source
- See 3(13), Personal Data Protection Bill, 2018. Available at <a href="<a href="<a href="source">source">source">source">source; Stakeholders in India however have argued that the draft bill does not imbibe the philosophy of fiduciaries completely since certain sections in the bill still places the disproportionate onus on users to realize their rights. See comments submitted by Dvara Research to MeitY available at <a href="<a href="<a href="source">source">source">source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- See A Free and Fair Digital Economy Protecting Privacy, Empowering Indians: Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, July 27, 2018, available at <a href="<a href="<a href="source">source">source">source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- Id. , see Jack M.Balkin, "Fixing Social Media's Grand Bargain." Hoover Working Group on National Security, Technology, and Law, Aegis Series Paper 1814,2018.
- The author of this piece argues that Balkin’s fiduciary framework could eliminate the third party doctrine in the U.S. altogether binding all companies to a higher duty of care towards users. See Mike Godwin, It’s Time to Reframe Our Relationship With Facebook,” Slate, November 16, 2018, <a href="<a href="<a href="source">source">source">source">source; In India, the Supreme Court through the 2017 ruling recognising privacy as a fundamental right invalidated the application of third party doctrine. See Gautam Bhatia, “The Supreme Court’s Right to Privacy Judgment – IV: Privacy, Informational Self-Determination, and the Idea of Consent,” Indian Constitutional Law and Philosophy, August 2017, <a href="<a href="<a href="source">source">source">source">source
- Vivan Sharan, Sidharth Deb, “Reimagining fiduciaries in the digital economy,” Livemint, August, 15, 2018, <a href="<a href="<a href="source">source">source">source">source
- Ariel Dobkin, "Information Fiduciaries in Practice: Data Privacy and User Expectations." Berkeley Tech. LJ 33 2018: 1.
- Dalip Singh, “Law enforcement agencies favour data localisation “, Economic Times, October 8, 2018, <a href="<a href="<a href="source">source">source">source">source /articleshow/66113360.cms
- India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, <a href="<a href="<a href="source">source">source">source">source
- Aria Thaker, “Behind RBI’s digital payments panel, a controversial firm’s shadow, conflict of interest allegations”, Scroll, January 10, 2019, <a href="<a href="<a href="source">source">source">source">source; The Indian government’s motivation to create an environment favourable to domestic tech firms is most evident in its recent policy on Foreign Direct Investment in e-commerce. See “What India e-commerce policy entails for online retailers”, Livemint, January 16, 2019, <a href="<a href="<a href="source">source">source">source">source
- a. Aditya Kalra and Aditi Shah, “U.S. firms face off with Indian rival in lobbying against data storage rules,” Reuters, July 24, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source"><a href="<a href="<a href="source">source">source">source">source b. Vidhi Choudhary and Yashwant Raj, “Cambridge Analytica row: Facebook data breach hit 560K Indian users,”Hindustan Times, April 5, 2018, <a href="<a href="<a href="source">source">source">source">source
- Prashant Reddy, “View: It's time to tame the social media beast,” Economic Times, February 13, 2019,//economictimes.indiatimes.com/articleshow/67966170.cms?from=mdr&utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- Ben Brody, “Tech Giants Back U.S. Bill Governing Cross-Border Data Searches,”Bloomberg, February 7, 2018, <a href="<a href="<a href="source">source">source">source">source
- Brad Smith, “A call for principle-based international agreements to govern law enforcement access to data,” Microsoft On the Issues, September 11, 2018, <a href="<a href="<a href="source">source">source">source">source
- Michael Punke, “AWS and the CLOUD Act,” AWS Security Blog, May 27, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source"><a href="<a href="<a href="source">source">source">source">source ; Chaim Gartenberg, “Apple will launch a global web portal for law enforcement requests later this year,” The Verge, September 6, 2018, available at <a href="<a href="<a href="<a href="source">source">source">source">source"><a href="<a href="<a href="source">source">source">source">source; Kristen E. Eichensehr, “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming)
- “One year later: A cybersecurity commitment shared by more than 100 companies,” Tech Accord, May 9, 2019, <a href="<a href="<a href="source">source">source">source">source
- Mike Isaac, “Zuckerberg Plans to Integrate WhatsApp, Instagram and Facebook Messenger,” The New York Times, January 25, 2019, <a href="<a href="<a href="source">source">source">source">source
- Mike Isaac, “Facebook’s Mark Zuckerberg Says He’ll Shift Focus to Users’ Privacy,” The New York Times, March 6, 2019, <a href="<a href="<a href="source">source">source">source">source . Facebook’s official announcement is available at <a href="<a href="<a href="source">source">source">source">source
- Law enforcement agencies across the world make overbroad demands for location data to find suspects and witnesses at crime scenes. See Jennifer Valentino-Devries, “Tracking Phones, Google Is a Dragnet for the Police,” The New York Times, April 13, 2019, <a href="<a href="<a href="source">source">source">source">source; also on “reverse location warrants” see Aaron Mak, Close Enough, Slate, February 19, 2019, <a href="<a href="<a href="source">source">source">source">source; Matthew Haag, “FamilyTreeDNA Admits to Sharing Genetic Data With F.B.I.”, The New York Times, February 4, 2019, <a href="<a href="<a href="source">source">source">source">source
- Josh Costine, “Facebook will pass off content policy appeals to a new independent oversight body,” Techcrunch, <a href="<a href="<a href="source">source">source">source">source
- For instance, in the UK, <a href="<a href="source">source">source">source; France, <a href="<a href="source">source">source">source; and Germany, <a href="<a href="source">source">source">source
- Varun Aggrawal, “Infosys to Set up Data Marketplace for Enterprises – The Hindu BusinessLine,” June 19, 2018, <a href="<a href="source">source">source">source.
- “The Personal Data Protection Bill” (2018), <a href="<a href="source">source">source">source; Justice B.N. Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” (Committee of Experts under the Chairmanship of Justice B.N. Shrikrishna, July 2018), <a href="<a href="source">source">source">source.
- Jack M. Balkin, “Information Fiduciaries and the First Amendment,” U.C. Davis Law Review 49, no. 4 (2016): 1234; Lina Khan and David Pozen, “A Skeptical View of Information Fiduciaries” (SSRN, February 25, 2019), <a href="<a href="source">source">source">source.
- Whilst the European Union’s approach in the GDPR is limited by is focus on privacy. The challenges of governing data-driven decision-making go well beyond concerns about privacy. See Talia Gillis and Josh Simons, “Explanation < Justification: GDPR and the Perils of Privacy,” (SSRN, 2019).
- To use André Béteille’s phrase, one of India’s most important twentieth-century social theorists. André Béteille, Anti-Utopia: Essential Writings of André Béteille (New Delhi: Oxford University Press, 2005); André Béteille, Ramachandra Guha, and Jonathan P. Parry, Institutions and Inequalities: Essays in Honour of Andre Beteille (New Delhi: Oxford University Press, 1999).
- Purva Khera, Macroeconomic Impacts of Gender Inequality and Informality in India, IMF Working Paper (Washington, District of Columbia DC: International Monetary Fund, 2016); Carol Vlassoff, Gender Equality and Inequality in Rural India: Blessed with a Son (New York, NY: Palgrave Macmillan, 2013); Stephen M. Caliendo, Inequality in America: Race, Poverty, and Fulfilling Democracy’s Promise, Dilemmas in American Politics (Boulder, CO: Westview Press, 2014); Xavier N. De Souza Briggs, Social Capital and Segregation: Race, Connections, and Inequality in America (Cambridge, MassMA.: John F. Kennedy School of Government, 2002).
- It is important to note that this is not just about unrepresentative data. Unrepresentative data excludes some groups, perhaps because there are not enough data points about that group, or the data points that exist are less numerous or rich. This is an important problem, particularly in India, where the underrepresentation of Untouchables and women in data is systemic. But the problems this paper considers would remain even in the most accurate and careful data sets, which are still a reflection of the structure of our social world, including the inequalities and injustices that characterize it. A representative dataset is not devoid of injustice. This leaves open a host of important issues about when the representation of injustice in a dataset actually constitutes an injustice, an issue I hope to address in future work. Cynthia Dwork and Deirdre Mulligan, “It’s Not Privacy, and It’s Not Fair,” Stanford Law Review 66 (September 2013): 35–40; Kate Crawford, “The Hidden Biases in Big Data,” Harvard Business Review, April 1, 2013, <a href="<a href="source">source">source">source; David Garcia et al., “Analyzing Gender Inequality through Large-Scale Facebook Advertising Data,” Proceedings of the National Academy of Sciences of the United States of America 115, no. 27 (2018): 6958–63, <a href="<a href="source">source">source">source.
- Andrew D. Selbst and Solon Barocas, “The Intuitive Appeal of Explainable Machines,” SSRN Electronic Journal, 2018, <a href="<a href="source">source">source">source.
- Daniel Kahneman, Thinking, Fast and Slow (New York, NY: Farrar, Straus and Giroux, 2011).
- Virginia Eubanks, Automating Inequality: How High-Tech Tools Profile, Police and Punish the Poor (New York, NY: St. Martin’s Press, 2018).
- TOI, “Aadhaar Covers over 89% Population: Alphons,” The Times of India, accessed March 5, 2019, <a href="<a href="source">source">source">source.
- Cynthia Dwork et al., “Fairness through Awareness,” ITCS ’12 (ACM, 2012), 214–226.
- Sam Corbett-Davies and Sharad Goel, “The Measure and Mismeasure of Fairness: A Critical Review of Fair Machine Learning,” 20180731, <a href="<a href="source">source">source">source.
- Jon Kleinberg, Sendhil Mullainathan, and Manish Raghavan, “Inherent Trade-Offs in the Fair Determination of Risk Scores,” Proceedings of Innovations in Theoretical Computer Science (ITCS), 2017.
- I am therefore moving beyond privacy as a framework for thinking about the governance of data-driven decision-making. Privacy is one concern we might have about those decision-making procedures, usually called “data processing” in existing legislation in the EU and India. But it is far from the only concern. Other aims and values need to be brought into play. Privacy should not be the sole lens through which to view governance data and machine learning. A29WP, “Guidelines on Automated Individual Decision-Making and Profiling” (Article 29 Data Protection Working Party, 2018), <a href="<a href="source">source">source">source.; ICO, “Guide to the General Data Protection Regulation (GDPR)” (U.K.: Information Commissioner’s Office, August 2018), <a href="<a href="source">source">source">source; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Most other important pieces of non-discrimination legislation extend the categories to which duties of non-discrimination apply. These include the Equal Pay Act of 1963, which prohibits the payment of different wages to employees of different sexes who perform equal work under similar conditions; the Americans with Disabilities Act (ADA) of 1990, which prohibits discrimination against individuals with a disability and requires the provision of reasonable accommodation to someone who is legally disabled; and the Genetic Information Non-Discrimination Act of 2008, which protects individuals from genetic discrimination in the healthcare and insurance industries.
- For instance, U.S. Executive Orders 10925, 11246, and 11375 require federal contractors who do over $10,000 in Government business in one year to “take affirmative action to ensure that applicants are employed, and that employees are treated during employment, without regard to their race, color, religion, sex or national origin.”
- David Strauss, “Discriminatory Intent and the Taming of Brown,” University of Chicago Law Review 56, no. 3 (1989): 935–935.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019, <a href="<a href="source">source">source">source; Solon Barocas and Andrew D. Selbst, “Big Data’s Disparate Impact,” California Law Review 104, no. 3 (June 1, 2016): 671–732.
- There is an important emerging debate about precisely this point, including a paper of my own. For the key protagonists, see Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019; Barocas and Selbst, “Big Data’s Disparate Impact”; Lior Strahilevitz, “Privacy versus Antidiscrimination,” Public Law & Legal Theory Working Paper, no. 174 (2007), <a href="<a href="source">source">source">source; Pamela L. Perry, “Two Faces of Disparate Impact Discrimination,” Fordham Law Review 59, no. 4 (March 1, 1991): 523–595; Cass Sunstein, “The Anticaste Principle,” Michigan Law Review, January 1, 1993, 2410.
- Barocas and Selbst, “Big Data’s Disparate Impact,” 724.
- Sophia Moreau and Deborah Hellman, Philosophical Foundations of Discrimination Law (Oxford: Oxford University Press, 2013), 259.
- Béteille, Anti-Utopia.
- Cass Sunstein makes a similar point. If there is prejudice and statistical discrimination, and if third parties promote discrimination, there will be decreased investments in human capital. Such decreased investments will be a perfectly reasonable response to the real world. And if there are decreased investments in human capital, then prejudice, statistical discrimination, and third-party effects will also increase. Statistical discrimination will become all the more rational; prejudice will hardly be broken down; consumers and employers will be more likely to be discriminators.Ronnie J. Steinberg, Applications of Feminist Legal Theory to Women’s Lives: Sex, Violence, Work and Reproduction. Women in the Political Economy. (Temple University Press, 2012), 560; Sunstein, “The Anticaste Principle,” 2431.
- Dwork et al., “Fairness through Awareness,” 215.
- As Hannah Arendt argued when comparing the American and French revolutions. Rohit De, A People’s Constitution: The Everyday Life of Law in the Indian Republic (Princeton, CT: Princeton University Press, 2018), 5; Uday S. Mehta, “The Social Question and the Absolutism of Politics,” 2010, <a href="<a href="source">source">source">source; Hannah Arendt, On Revolution (New York, NY: Viking Press, 1965).
- Sunil Khilnani, The Idea of India (New Delhi: Penguin, 2004).
- Kalpana Kannabirān, Tools of Justice: Non-Discrimination and the Indian Constitution (New York, NY: Routledge, 2012), 7.
- B. R. Ambedkar is a neglected character in India’s political history. His ideas have received little attention compared with more widely known figures M. K. Gandhi and Jawaharlal Nehru, in part because of the Congress Party’s dominant role in shaping India’s national story, and the contours of democratic politics after independence. See Valerian Rodrigues, “Justice as the Lens: Interrogating Rawls through Sen and Ambedkar,” Indian Journal of Human Development 5, no. 1 (2011): 153–174; Jean Drèze and Amartya Sen, “Democratic Practice and Social Inequality in India,” Journal of Asian and African Studies 37, no. 2 (2002): 6–37; Martha Nussbaum, “India: Implementing Sex Equality through Law,” Chicago Journal of International Law 2, no. 1 (2001): 35–58.
- Kannabirān, Tools of Justice, 162.
- Patterns of domination, which produce these persistent inequalities in the political and economic spheres, have two effects. First, they undermine the liberty of each individual to benefit from an effective and competent use of their powers. Democracy entailed political equality. Political equality entailed the absence of domination. Second, patterns of domination undermine the possibility of free association. Drawing on John Dewey, Ambedkar argued that free association – the capacity of groups to form links, to self-govern over time – was essential to democratic life. Democracy is not merely a form of government. It is primarily a mode of associated living, of conjoin communicated experience. It is essentially an attitude of respect and reverence towards fellow men. Patterns of domination made impossible the associations and relationships that encouraged and embodied this attitude of respect and reverence.B.R. Ambedkar, Annihilation of Caste: The Annotated Critical Edition, ed. S. Anand (New Delhi: Navayana, 2014), 280, 261.
- Béteille, Guha, and Parry, Institutions and Inequalities, 342.
- V. R. Krishnaiyer, Akhil Bharatiya Soshit Karamchari Sangh and Others vs. Union Of India, No. 185 (Supreme Court of India November 14, 1980).
- J B. Sudershan Reddy, Indian Medical Association vs. Union Of India & Ors, No. 8170 (Supreme Court of India May 12, 2011).
- Deepti Shenoy, “Courting Substantive Equality: Employment Discrimination Law in India,” University of Pennsylvania Journal of International Law 34, no. 3 (2013): 632.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 20190210, <a href="<a href="source">source">source">source.
- The Personal Data Protection Bill; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” 8.
- De, A People’s Constitution; Béteille, Guha, and Parry, Institutions and Inequalities; Khilnani, The Idea of India.
- This is precisely the challenge that Jack Balkin, who first coined the data fiduciary concept, warned about. Balkin, “Information Fiduciaries and the First Amendment,” 1232–1324.
- As André Béteille argues, institutional well-being is an important consideration. He describes this as equality as a matter of policy, not of right, warning against placing too much faith specifically in the state to eliminate every social inequality, every difference of caste or class. Béteille, Anti-Utopia, 435.
- Joshua A. Kroll et al., “Accountable Algorithms,” University of Pennsylvania Law Review 165, no. 3 (2017): 633–705; Andrew Tutt, “An FDA for Algorithms,” Admin. L. Rev. 83 (2016); Jeremy Waldron, “Accountability: Fundamental to Democracy,” SSRN Scholarly Paper (Rochester, NY: Social Science Research Network, April 1, 2014), <a href="<a href="source">source">source">source; Craig T. Borowiak, Accountability and Democracy: The Pitfalls and Promise of Popular Control (Oxford University Press, 2011); Adam Przeworski, Susan Carol Stokes, and Bernard Manin, Democracy, Accountability, and Representation (Cambridge: Cambridge University Press, 1999).
- “World Metro Figures Statistics Brief,” UITP, accessed April 29, 2019, <a href="source">source">source; Global BRT Data, “Global BRT Data,” accessed April 29, 2019, <a href="source">source">source.
- Autorickshaws are three-wheeled vehicles that supply much of the last-mile connectivity to mass transit in Indian cities.
- Candace Brakewood, Gregory Macfarlane, and Kari Watkins, “The Impact of Real-Time Information on Bus Ridership in New York City,” Transportation Research Part C: Emerging Technologies, 53 (April 2015): 59-75.; Eric Jaffe, “The Best Evidence Yet That Real-Time Arrival Info Increases Transit Ridership,” CityLab, accessed Feb. 20, 2019, <a href="source">source">source.
- Aaron Antrim and Sean Barbeau, “The Many Uses of GTFS Data- Opening the Door to Transit and Multimodal Applications,” ITS America’s 23rd Annual Meeting & Exposition, April 2013, <a href="source">source">source; Transit Center, “The Data Transit Riders Want “A Shared Agenda for Public Agencies and Transit Application Developers,” accessed Feb. 16, 2019, <a href="source">source">source.
- “Open Government Partnership,” Open Government Partnership, accessed Jan. 28, 2019, <a href="source">source">source.
- “WRI India,” WRI India, accessed January 28, 2019, <a href="source">source">source.
- KMRL signed a Memorandum of Understanding (MOU) with WRI in February of 2017, which included several initiatives to support urban transport and urban development, including public transport, transit oriented policy, electric mobility, and urban planning in Kochi.
- Available at: <a href="source">source">source
- The GPS installation was paid for by the Urban Mass Transit Company Limited (UMTC), a joint venture of several national and state government agencies and the private company Infrastructure Leasing and Financial Services Limited (IL&FS).
- “Kochi Metro Rail Limited signs pact with auto drivers,” Deccan Chronicle, Jan. 24, 2018, <a href="source">source">source.
- In Hindi, “Chalo” means “Let’s Go!”
- “Demographia World Urban Areas,” Demographia, April 2019, <a href="source">source">source
- G.P. Hari, Personal Interview, Kochi, Feb. 11, 2019.
- “Kochi gets Chalo app for live tracking of buses, ferries,” The Hindu, accessed Jan. 28, 2019, <a href="source">source">source.
- Aparna Vijaykumar, Personal Interview, Online, March 5, 2019.
- Arjun G., “Delhi Government launches Open Transit Data Platform for Buses,” Medium, accessed Jan. 28, 2019, <a href="source">source">source; Open Data Portal available at: <a href="source">source">source
- Pravesh Biyani, Personal Interview, New Delhi, Feb. 14, 2019.
- Ibid.
- Ibid.
- “PoochhO,” Delhi Integrated Multi-modal Transit System, accessed Feb. 15, 2019, <a href="source">source">source.
- Samir Sharma, Personal Interview, New Delhi, Feb. 15, 2019.
- Ibid.
- Pravesh Biyani, Personal Interview, New Delhi, Feb. 14, 2019.
- Nikhil V.J., “Re: [datameet] – Open Transit Data – Delhi,” Email, 2019.
- “BMTC to open up transit data enabling entrepreneurs build mobility solutions.” Economic Times. <a href="source">source">source; “BMTC’s data-sharing plan on back burner,” The Hindu, accessed Feb. 4, 2019, <a href="source">source">source; Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="source">source">source.
- ET Bureau, “BMTC to open up transit data enabling entrepreneurs build mobility solutions,” Economic Times. <a href="source">source">source.
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="source">source">source.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="source">source">source.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- Tejas Pande, Personal Interview, New Delhi, Feb. 9, 2019;Vinay Sreenivasa, Personal Interview. Online, March 7, 2019; Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Ibid.
- “BMTC,” Bangalore Municipal Transport Corporation, accessed Feb. 20, 2019, <a href="source">source">source.
- Ibid; Tanushree Dev Barma, Personal Interview, Bangalore, March 5, 2019.
- S. Rajagopalan, Personal Interview, Bangalore, March 5, 2019.
- BMTC Data Sharing Policy Draft (July, 2018), Bangalore: Bangalore Municipal Transit Corporation, 2018.
- S. Rajagopalan, Personal Interview, Bangalore, March 5, 2019.
- Ibid.
- BMTC Data Sharing Policy Draft (July, 2018). Bangalore: Bangalore Municipal Transit Corporation, 2018.
- Srinivas Kodali, “BMTC Intelligent Transportation System (ITS) and Need for Open Transport Data,” Data Meet, accessed Jan. 28, 2019, <a href="source">source">source .
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="source">source">source
- Vinay Sreenivasa, Personal Interview, Online, March 7, 2019.
- Yunus Y. Lasania, “Telangana’s ‘open data’ policy to help start-ups address public issues,” LiveMint, accessed March 15, 2019, <a href="source">source">source
- Telangana Open Data Policy 2016, Hyderabad, Telangana: Government of Telangana, accessed March 15, 2019, <a href="source">source">source
- Ibid.
- Yunus Y. Lasania, “Telangana’s ‘open data’ policy to help start-ups address public issues,” LiveMint, accessed March 15, 2019, <a href="source">source">source
- “Background,” Factly, accessed Feb. 18, 2019, <a href="source">source">source
- Anant Maringanti, Personal Interview, Hyderabad, March 6, 2019.; Harsha Devulapalli and Girish Agrawal, “Mapping bus transit services in Hyderabad – an illustrative example of the use of open geospatial data,” Transportation Research Procedia. 25 (201): 4196-4206.
- Surya Kandukuri, Personal Interview, Hyderabad, March 6, 2019.
- Vishal Ramprasad, Personal Interview, Mumbai, Feb. 12, 2019.
- Srya Kandukuri, “Notes from our conversation,” Email, 2019.; Surya Kandukuri, Personal Interview, Hyderabad, March 6, 2019.
- Ibid.
- Aaron Antrim and Sean Barbeau, “The Many Uses of GTFS Data- Opening the Door to Transit and Multimodal Applications,” ITS America’s 23rd Annual Meeting and Exposition, April 2013, <a href="source">source">source
- Harsha Devulapalli and Girish Agrawal, “Mapping bus transit services in Hyderabad – an illustrative example of the use of open geospatial data,” Transportation Research Procedia, 25 (201): 4196-4206.
- Anumita Roychowdhury, Gaurav Dubey, Anu Soman, Waiting for a Bus: Strategies to improve Delhi’s bus system. (New Delhi: Centre for Science and Environment, 2017).
- Ibid.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- In many cases, transit operators do not make a system map or timetable available. Data can be used to provide these more analog solutions in order to meet the information needs of riders who do not possess smartphones or do not access transit data in an online format. Other technologies may prove useful to encompass groups of people who might not use smartphones, such as text or voice-based services.
- Open Government Data Platform India, “National Data Sharing and Accessibility Policy,” accessed Jan. 28, 2019, <a href="source">source">source
- “Open Government Data Platform India,” Open Government Data Platform India, accessed Jan. 28, 2019, <a href="source">source">source
- Mohd Ujaley, “Countries to Ride on India’s Open Government Data Platform,” Express Computer, <a href="source">source">source
- Simonti, Chakraborty, “Open Data Policy of the Government of India: What has it achieved?” CBG India, <a href="source">source">source
- Joel Gurin, Personal Interview, Online, March 1, 2019.
- Mark Headd, “New Thinking in How Governments Deliver Services,” in Beyond Transparency, ed. Brett Goldstein with Lauren Dyson. (San Francisco: Code for America Press, 2013): 278-9.
- Rajarshi Sahai, “Going Public with Public Transport Data For Public: Dilemmas of Developing Cities,” accessed Jan. 28, 2019, <a href="source">source">source
- “National Urban Innovation Stack: Strategy and Approach,” New Delhi, India: Ministry of Housing and Urban Affairs, Government of India, 2019, accessed Feb. 8, 2019, <a href="source">source">source
- “DataSmart Cities: Empowering Cities through Data,” Ministry of Housing and Urban Affairs, Government of India, <a href="source">source">source
- “We Continue to Create an Open Data Culture,” Makaia, accessed March 5, 2019, <a href="source">source">source
- “National Urban Transport Policy (2006),” New Delhi, India: Ministry of Urban Development, Government of India, 2006. <a href="source">source">source
- “National Urban Transport Policy (2014),” New Delhi, India: Ministry of Urban Development, Government of India, 2014. <a href="source">source">source
- “National Urban Transport Policy,” New Delhi, India: Ministry of Urban Development, Government of India (2006), <a href="source">source">source
- Ibid.
- GP Hari, Personal Interview, Kochi, Feb. 11, 2019.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Harshith Gokulendra, Personal Interview, New Delhi, March 1, 2019.
- O.P. Agarwal, Personal Interview. New Delhi, March 1, 2019.
- Srinivas Kodali, Personal Interview, New Delhi, Feb. 5, 2019.
- Rajarshi Sahai, Personal Interview, Online, Jan. 30, 2019.
- Available at: <a href="source">source">source
- Kunal Kumar, “Building National Urban Innovation Stack for Indian Smart Cities Mission – Technologies and Financing Model,” (Panel presentation, Smart Republic Conference, New Delhi, India, Feb. 27-28, 2019).
- Srinivas Kodali,. Personal Interview. New Delhi, Feb. 5, 2019.
- Samir Sharma, Personal Interview. New Delhi, Feb. 15, 2019.
- GP Hari, Personal Interview, Kochi, Feb. 11, 2019.
- Vishal Ramprasad, Personal Interview, Mumbai, Feb. 12, 2019.
- Harsha Krishna, Personal Interview. Bangalore, March 4, 2019;Vipassana Vijayarangan, Personal Interview, Online, Jan. 15, 2019.
- “National Urban Transport Policy,” New Delhi, India: Ministry of Urban Development, Government of India, 2006, <a href="source">source">source.
- Don Tapscott, “2018 Regulation Roundtable: Addressing the Regulatory Challenges of Disruptive Innovation,” Summary of 10 May 2018 Proceedings held at KPMG Toronto, Blockchain Research Institute, Aug. 8 2018.
- Warren Davidson, R-OH, "Text – H.R.7356 – 115th Congress (2017-2018): Token Taxonomy Act." Congress.gov. December 20, 2018, accessed April 14, 2019, source">source.
- U.S. Securities and Exchange Commission, “Ponzi Schemes Using Virtual Currencies,” July 23, 2017, source">source
- The DAO is one example of a Decentralized Autonomous Organization, which is a term used to describe a “virtual” organization embodied in computer code and executed on a distributed ledger or blockchain.
- U.S. Securities and Exchange Commission, “Report of Investigation Pursuant to Section 21(a) of the Securities Exchange Act of 1934: The DAO,” July 25, 2017, source">source
- Lester Coleman, "SEC Subpoenas 80 Cryptocurrency Firms," CCN, March 04, 2018, accessed May 16, 2019. source">source.
- Nikhilesh De, "SEC Again Delays Decision on Bitwise Bitcoin ETF Approval," CoinDesk, May 15, 2019. accessed May 16, 2019, source">source.
- U.S. Securities and Exchange Commission, Fintech Finhub, "Framework for “Investment Contract” Analysis of Digital Assets," April 3, 2019, accessed April 14, 2019, source">source.
- The Howey Test is the standard methodology, put in place by the U.S. Supreme Court to determine whether a transaction is an example of an "investment contract,” i.e., a security. It derives from a 1946 case, SEC v. W.J. Howey Co., a lawsuit involving the Howey Company of Florida. In the context of blockchain tokens, the Howey test can be expressed as three independent elements: (1) An investment of money, (2) in a common enterprise, (3) with an expectation of profits predominantly from the efforts of others.
- "A New Commissioner at America's Main Securities Regulator Causes a Buzz," The Economist, Nov. 08, 2018, accessed April 14, 2019, source">source.
- Stan Higgins, "The SEC Just Appointed Its First-Ever Crypto Czar," CoinDesk, June 04, 2018, accessed April 14, 2019, source">source.
- Detailed in the next section, LabCFTC is a pioneering regulatory model in dealing with fintech innovations
- Stephan O'Neal, “SEC Launches FinHub to Communicate With Industry, But What Does It Have to Say?" Cointelegraph, Feb. 13, 2019, accessed April 14, 2019, source">source.
- Yogita Khatri, "The SEC Wants to Hire a 'Crypto Securities' Advisor," CoinDesk, April 01, 2019, accessed April 14, 2019, source">source.
- Commodity Futures Trading Commission, “An Introduction to Virtual Currency,” 2017, source">source.
- Khatri, Yogita, "CabbageTech CEO Indicted in New York for Defrauding Crypto Investors," CoinDesk, March 27, 2019, accessed April 14, 2019, source">source.
- Chris Giancarlo, "CFTC Chairman Chris Giancarlo,” DC Blockchain Summit 2019, Georgetown University, Washington, D.C., March 6, 2019.
- Daniel Gorfine (Director, LabCFTC), personal interview, Washington, D.C., April 2019.
- Daniel Gorfine, "Podcasts." Commodity Futures Trading Commission, accessed April 14, 2019. source">source.
- Commodity Futures Trading Commission, "Request for Input on Crypto-asset Mechanics and Markets." December 11, 2018, accessed May 12, 2019, source">source.
- United States Financial Crimes Enforcement Network, Department of Treasury, Guidance: Application of FinCEN’s Regulations to Persons Administering, Exchanging, or Using Virtual Currencies, FIN-2013-G001, March 18, 2013, source">source.
- Peter Van Valkenburgh, "FinCEN Raises Major Licensing Problem for ICOs in New Letter to Congress," Coin Center, March 6, 2018, accessed May 12, 2019, source">source.
- Timothy Spangler and Robert J. Rhatigan. "FinCEN Warns That Virtual Currency Activities Are Subject to Anti-Money Laundering Obligations," Lexology, April 03, 2018, accessed April 14, 2019, source">source.
- FinCEN, "Advisory on the Iranian Regime’s Illicit and Malign Activities and Attempts to Exploit the Financial System," FIN-2018-A006, October 11, 2018, accessed April 14, 2019, source">source Advisory FINAL 508.pdf.
- Internal Revenue Service, "Notice 2014-21," March 2014, accessed April 14, 2019, source">source.
- "Tax Treatment of Cryptocurrency Hard Forks for Taxable Year 2017," American Bar Association to Internal Revenue Service, March 19, 2017, Washington, D.C.
- "IRS Treatment of Virtual Currencies," U.S. House of Representatives Committee on Ways and Means to Internal Revenue Service, Sept. 19, 2018, Washington, D.C. source">source.
- Steven T. Mnuchin and Craig S. Phillips, “A Financial System That Creates Economic Opportunities Nonbank Financials, Fintech, and Innovation,” U.S. Department of the Treasury, July 2018. source">source.
- Craig S. Phillips "Fireside Chat with Counselor Craig Phillips, U.S. Dept. of the Treasury," Speech at the D.C. Blockchain Summit 2019, Georgetown University, Washington, D.C., March 6, 2019.
- Statement of Jennifer Shasky Calvery, Director, Financial Crimes Enforcement Network, United States Department of the Treasury (2013) (testimony of Jennifer Shasky Calvery).source">source.
- Ibid.
- "Virtual Currency Business (BitLicense)," New York Department of Financial Services, 2015. source">source.
- Patrick Murck, (Partner, Cooley LLP), personal interview, March 2019.
- Marco Santori and Maria Vullo, "Legal Tender? The Regulation of Cryptocurrencies," June 7, 2018, accessed April 14, 2019, source">source.
- Anonymous New York venture capitalist in blockchain, personal interview, March 2019.
- Gage Lathrop and Dale Werts, "Blockchain and Cryptocurrency: State Law Roundup," JD Supra, July 10, 2018, accessed April 14, 2019, source">source.
- Long, Caitlin, "What Do Wyoming's 13 New Blockchain Laws Mean?" Forbes, April 08, 2019, accessed April 14, 2019, source">source.
- Caitlin Long (Co-Founder, Wyoming Blockchain Coalition), personal interview, Feb. 2019.
- Multiple start-up founders and business strategy leads (anonymous), personal interview, April 2019, Seattle.
- Greg Heuss (Managing Partner, Counterpoint Ventures), personal interview, April 2019, Seattle, Washington.
- Multiple start-ups (anonymous), interview by the author, April 2019, Los Angeles and San Francisco, California.
- David Otto (Founder and Managing Partner, Martin Davis PLLC), personal interview, April 2019, Seattle, Washington.
- Multiple start-ups and Venture Capitalists (anonymous), interview by the author, April 2019, Los Angeles and San Francisco, California.
- The SEC, as well as the securities laws it enforces, have come under bipartisan criticism from academics, entrepreneurs, investors, and members of Congress for creating red tape that makes it difficult both for entrepreneurs to raise capital in the public markets and for investors to find wealth-building opportunities. This concern prompted Congress to pass regulatory relief overwhelmingly in the Jumpstart Our Business Start-ups (JOBS) Act, which was signed by President Obama in 2012. In 2018, the U.S. House of Representatives passed a bill allowing further relief, the Jobs and Investor Confidence Act. The JOBS Act eased some burdens on entrepreneurs by exempting small and “emerging growth” companies from some of the costly burdens of securities laws like the Sarbanes-Oxley Act of 2002 and the Dodd-Frank Act 2010.For further reference: John Berlau, "Cryptocurrency and the SEC's Limitless Power Grab," Competitive Enterprise Institute, April 11, 2019, accessed April 14, 2019, source">source.
- Multiple venture capitalists, interviewed by author, Feb./Apr. 2019, New York, Seattle, San Francisco.
- John M. Carey, Legislative Voting and Accountability, Cambridge Studies in Comparative Politics (Cambridge University Press, 2009), ix.
- This expectation was, in some part, because of the way I had seen the voting records of American members of Congress being used to discuss their past positions on legislative matter, as well as to examine the linkages between the funding they received and the positions they espoused.
- Rule 246, “Rules of Procedure and Conduct of Business in the Council of States (Rajya Sabha),” August 2016, source; and Rule 364, “Rules of Procedure and Conduct of Business in Lok Sabha,” April 2014, source.
- “Constitution of India,” 1950, source.
- For the sake of brevity, the term “Speaker” shall be used to cover both the Speaker of the Lok Sabha as well as the Chairman of the Rajya Sabha.
- A head-count is not seen as a “division” under the Rules of Procedures of the Lok Sabha and the Rajya Sabha, even though votes are counted.
- This was increased from 2½ minutes in 1989 (Lok Sabha) and 2006 (Rajya Sabha).
- It was in 1956-57 that the Indo-German Trade Centre was contracted to install ‘automatic vote recording equipment,’ i.e., voting machines, manufactured by Telefonbau und Normalzeit G.M.B.H. of Frankfurt, West Germany, in both the Lok Sabha as well as the Rajya Sabha. Incidentally, this contract led to what was the first ruling on parliamentary privilege within the Rajya Sabha, and the second in the Lok Sabha in relation to a case before the Election Tribunal and the Calcutta High Court on disqualification of a member. See, Rajya Sabha Committee on Privileges, “First Report,” May 1958, source; Lok Sabha Committee on Privileges, “Second Report,” April 1958, source; and Brojo Gopal Das v. Kalipada Banerjee, January 1959, source. Given that the equipment did not have any means of the MP authenticating herself (unlike the machine used in the U.S. House of Representatives), that necessitated the allocation of specific seats to each member, which had not been fixed (except the reservation of a few rows for government ministers) until then. As a book on Indian parliamentary procedure notes, “each member is now allotted a fixed seat from where he has to address the House unless it otherwise directed by the Chair, and at the time of a division he has to record his vote by operating the apparatus fixed to his seat.” MN Kaul and SL Shakdher, Practice and Procedure of Parliament, 3rd ed., vol. 1 (Metropolitan Book Co., 1979), source; this is also encapsulated in the Lok Sabha Rules of Procedure. Rule 349(vii), “Rules of Procedure and Conduct of Business in Lok Sabha”
- India Const., art. 368(2).
- India Const., arts. 61(2)(b) and 61(4).
- India Const., art. 124(4).
- India Const., art. 244A(3).
- India Const., art. 249.
- India Const., art. 312.
- India Const., art.352(6).
- India Const., arts. 55(3) & 66(1).
- U.S. Const., art. I, . 5, cl. 3.
- Elizabeth Rybicki, “Voting and Quorum Procedures in the Senate,” (Congressional Research Service, August 2013), 5.
- Rybicki, 5.
- “Divisions,” UK Parliament, accessed 10 March 2019, source
- Ibid.
- Shalaka Patil, “Push Button Parliament – Why India Needs a Non-Partisan, Recorded Vote System,” Anuario Colombiano de Derecho Internacional 4 (2011): 182, source.
- Carey, Legislative Voting and Accountability, 166.
- Carey, 166.
- Whips can be the letter that are issued by a senior functionary of a political party, issuing directions to the members of that party in parliament—usually directing them to vote in a particular manner on a motion, to abstain from voting, or even to just attend a particular session of parliament. The term can also be used to describe the privilege of belonging to a political party; thus when an MP’s whip is removed, that MP is expelled from the party, until that MP’s whip is restored. Finally, the term can also be used to describe the senior political party functionaries whose job it is to issue and remove whips, and otherwise ensure cohesion among their fellow party members. Whips are statutorily recognized in multiple parliaments, and draw salaries from the public exchequer as well in countries like India and the U.K.
- R. Eric Petersen, “Parliament and Congress: A Brief Comparison of the British House of Commons and the U.S. House of Representatives,” 2005, 4, source.
- Petersen, 4.
- The law allows for disqualification if there is “voluntarily giving up of seat” or if an MP “votes or abstains from voting in such House contrary to any direction issued by the political party to which he belongs or by any person or authority authorized by it in this behalf, without obtaining, in either case, the prior permission of such political party, person or authority and such voting or abstention”. There are limited circumstances in whips may not be issued, namely in the election of presidents and vice-presidents.
- Kihoto Hollohan v. Zachillhu, 1992 SCR (1) 686. The court noted that, “there are certain side effects and fall out which might affect and hurt even honest dissenters and conscientious objectors, but these are the usual plus and minus of all areas of experimental legislation.”
- Ibid.
- Mannadi Satyanarayan Reddy v. Andhra Pradesh Legislative Assembly and Others, 2009 (3) ALT 32.
- David Beetham, Parliament and Democracy in the Twenty-First Century: A Guide to Good Practice (Inter-Parliamentary Union, 2006), 96, source.
- Beetham, 96.
- The situation before 1972-73 when the U.S. House of Representatives moved to electronic voting was described by the Clerk of the House: “Voting in the House was something of a mystery, unless you were present in the chamber when the roll was called, and attentive to the Members’ responses, and then, of course, people in the gallery then, as now, could not take notes. You did not know until the next day when the vote was recapitulated in the Congressional Record how the Members individually had voted.” – Donnald K. Anderson, Clerk of the U.S. House of Representatives (2006)
- Patil, “Push Button Parliament – Why India Needs a Non-Partisan, Recorded Vote System,” 170–72.
- Simon Hug, Simone Wegmann, and Reto Wüest, ‘Parliamentary Voting Procedures in Comparison’, West European Politics 38, no. 5 (September 2015): 943, source.
- Patil, “Push Button Parliament – Why India Needs a Non-Partisan, Recorded Vote System,” 171.
- Varghese K. George, “Voice Vote Valid Only When Nobody Questions It,” The Hindu, November 2014, source.
- Anusha Ondaatjie and Iain Marlow, “No Confidence in New PM, Sri Lanka Lawmakers Tell Parliament,” Bloomberg, accessed 29 April 2019, source.
- See Hug, Wegmann, and Wüest,”Parliamentary Voting Procedures in Comparison.”
- For this to happen, it ought to be taken up by the Rules Committee of either house, and a change recommended. Thereupon, the rules of procedure of the Lok Sabha and the Rajya Sabha should be amended by each house. While the lack of a clear rule is not a bar for this practice to be implemented, it would give it a more binding character if it found expression in the rules of procedure. As a start, though, it would be judicious for political parties to start publicly documenting every whip they issue (whether one-line, two-line, or three-line whips) on their website.
- Patil, “Push Button Parliament — Why India Needs a Non-Partisan, Recorded Vote System,” 191.
- Patil, 192.
- MPs have at least four distinct kinds of duties: (1) Legislative and deliberative: MPs debate, draft, and pass statutes, they amend or reject subordinate legislation promulgated by the Executive; (2) Oversight: they exercise budgetary oversight, participate in committees that examine the workings of the government, and have powers to conduct special investigations via “joint parliamentary committees,” fell governments through “no-confidence motions,” impeach the President, approve or disapprove declarations of emergency, and interrogate the functioning of the government through a variety of means [Question Hour, Calling Attention Motion, etc.], and impeach judges of constitutional courts; (3) Elective: they vote for the elections for the president and vice-president of India (apart from parliamentary functionaries such as the Speaker of the Lok Sabha, etc.; (4) Representative: MPs represent their political parties, and represent their constituents by raising issues relevant to their constituents in Parliament [or in parliamentary committees and processes], by aiding their constituents in communicating with governmental bodies and getting their concerns heard by the government and local bodies, and recommending specific developmental projects be undertaken in their constituency and providing the funding for that through the MPLAD fund.
- Lok Sabha Secretariat, “Resumé of Work Done by Lok Sabha: 16th Lok Sabha, 13th Session,” February 2018, 32–33, source.
- MP’s Reports, Dr. Shashi Tharoor’s Official Website, 2019, source. MP Shashi Tharoor has been leading the way, having issued such reports since his first term from 2009-2014. Instructively, in his latest end-term report covering 2014-2019, he only dedicates two sections for work within the Lok Sabha and a Standing Committee, while eleven sections are dedicated to work outside of Parliament.
- Manju Jain, “Delivering Parliamentary Library and Research Services in an Interconnected World: The Case of the Parliament of India,” IFLA – Library and Research Services for Parliaments, September 2016, source.
- Rajya Sabha Secretariat, ‘Rajya Sabha Annual Report 2017’, 2017, source.
- Empirical research for this paper would have been aided greatly if Parliamentary debates were available in a structured format such as Akoma Ntoso.
- There are many definitions of open standards, but for the purposes of this section I mean that it has been standardized by a committee with open participation and an open process, and is available for free, and may be implemented in free/libre/open source software without payment of any royalties.
- Ashok Hariharan, interview by author, March 2019.
- John Sheridan and Jim Mangiafico, ‘Structure-Aware Search of UK Legislation’, in XML London 2016 Conference Proceedings (London, United Kingdom: XML London, 2016), 78–81, source.
- ‘AT4AM.eu’, AT4AM.eu, accessed 30 January 2019, source.
- “U.N. Semantic Interoperability Framework for Normative and Parliamentary Documents (UNSIF) | United Nations System Chief Executives Board for Coordination,” United Nations System, accessed 16 April 2019, source. The blog post on this notes: ‘The adoption of [the UN Semantic Interoperability Framework] has put the foundations for the establishment of a UN-wide ecosystem of machine-readable documents that will foster collaboration and reduce costs in information management across the system by transforming the web of information enclosed in traditional word processing documents into a web of data that can be interpreted by computers to create innovative services. By having documents available in a common semantically rich format will raise dramatically the UN capacity to coordinate activities, create synergies and respond to clients’ information demands, improve the efficiency and quality of information processing, dissemination and accessibility, and bring significant benefits in terms of governance, accountability and transparency.”
- “Indigo Platform for Publishing Beautiful Legislation: Laws-Africa/Indigo’ (Laws.Africa, March 2019), source.
- Nyaaya, “Laws of India in Akoma Ntoso XML format,” source.
- Union of India v. Vansh Sharad Gupta, W.P. (C) 4761/2016, order dated May 25, 2017, source.
- Union of India v. Vansh Sharad Gupta, W.P. (C) 4761/2016, order dated December 15, 2017, source.
- Chakshu Roy, “Budgeting for Democracy,” The Indian Express, February 2017, source.
- Ashok Hariharan, interview with author, March 2019. Hariharan.’
- Hariharan.
- Hariharan.
- Beetham, Parliament and Democracy in the Twenty-First Century, 7.
India and the United States: The Time Has Come to Collaborate on Commercial Drones (Sylvia Mishra)
Sylvia Mishra is a Scoville Fellow and her research focuses on nuclear strategy and nonproliferation, Southern Asian security and nuclear dynamics, U.S. policy in Indo-Pacific, and emerging and disruptive technologies.
This paper is written from an exploratory strategic lens underscoring why India and the United States ought to focus on bolstering partnership on commercial drones. The paper immensely benefited from interviews and discussions with Peter W. Singer, Arthur Holland Michel, Rachel Stohl, Sharon Burke, Bhaskar Kanungo, Allegra Harpootlian, and Col. Dennis Wille.
Introduction
On December 1, 2018, flying commercial drones became legal in India as the Directorate General of Civil Aviation’s (DGCA) put forward guidelines on how unmanned aircraft can operate within the country.414 The opening up of the drone, or unmanned aerial vehicles (UAV), market is expected to improve efficiency and create jobs in certain sectors like agriculture, forestry, media, construction, and disaster management while also expanding the culture of innovation. Commercial drones are among the fastest growing segments in India and their demand is growing exponentially. In some of the public sectors, such as infrastructure, transport, agriculture, and disaster management, drones are already being utilized for land surveillance, improvements to infrastructure, precision agriculture, 3-D digital mapping, and tracking a variety of issues of river erosion and deforestation.415 At the World Economic Forum Annual Meeting in Davos in 2019, the Indian state government of Andhra Pradesh announced that it will start testing a policy framework—Advanced Drone Operations Toolkit developed in partnership with 41 government agencies and private enterprises to enable state-wide drone delivery operations aimed at bringing key medical supplies to communities across the state. The open source guide was developed in collaboration with the governments of Rwanda andSwitzerland, and leverages the work of the Drone Innovator’s Network (DIN) to roll out socially impactful, advanced drone operations.416
As the utility of drones in the commercial sector grows, several market reports indicate that the Indian commercial drone market will reach $885.7 million by 2021.
The adoption of commercial drone applications is on the rise across sectors. As the utility of drones in the commercial sector grows, several market reports indicate that the Indian commercial drone market will reach $885.7 million by 2021.417 India has been one of the top drone-importing nations, accounting for 22.5 percent of the world’s UAV imports.418 Israel and the United States have emerged as top drone exporters to India as the focus has been on expanding its armed drone inventory. In 2018, the Indian government approved the purchase of Heron TP missile-armed drones from Israel. The United States will export the General Atomics MQ-9 Guardian/Predator-B long-range unmanned combat aerial vehicle (UCAV) to India, making it one of the most significant defense sales between the United States and India.419 The sale of drones with military applications has become an important part of bilateral defense ties between India and the United States, and both countries operate under the Defense Technology and Trade Initiative. Breaking away from the dominant narrative that focuses on India-U.S. collaboration on drones for military purposes, this paper aims to underscore that India and the United States have a unique opportunity to partner on commercial drones. Over the coming years, drones will become an integral element to a better standard of living. India and the United States. should partner to harness the benefits of commercial drones by leveraging the technological prowess and culture of innovation that exist in both countries.
The paper aims to develop a framework where India and the United States can cooperate to promote greater use of drone technology in the commercial sector to transform working practices, bring significant economic benefits, and boost prosperity. This paper benefited from interviews conducted with several experts in Washington, D.C. and New Delhi, and takes the position that a partnership on commercial drones is essential. It outlines how India and the United States can collaborate on a multilateral level, a bilateral government-to-government level, and an industry-to-industry level. As and how the global airspace becomes congested and increasingly contested, the development of counter-drone technologies is also inevitable. The paper also discusses counter-drone technologies, their evolution and use in the U.S. market, and use by law enforcement agencies. It outlines how India can learn how some of the counter-drone technologies are being utilized by law enforcement agencies in the United States.
Why Does India-U.S. Cooperation on Commercial Drones Matter?
As India and the United States continue to bolster their bilateral partnership, one facet of their relationship that remains understudied, and mandates greater attention, is commercial drones and their use for public benefit. As the oldest and largest democracies, the United States and India also need to focus on using drone technologies to drive positive social change, proactively shape demand for commercial drone technology and its applications across various sectors and domestic growth opportunities. India and the United States have a rich pool of resources and talent, the spirit of innovation to build an ecosystem that depends more heavily on the civic use of drone tech. Drone technology is rapidly advancing. Even though the commercial drone sector in India is still evolving and regulations are being formed, this industry has the potential to transform societies. Not to mention that as commercial drones proliferate, the surrounding industry would also grow; jobs in analytics and data processing are just an example. A McKinsey report indicated that the value of the commercial drone industry and activity has risen from $40 million in 2012 to about $1 billion in 2017420. It is expected that by 2026, commercial drones—both corporate and consumer applications—will have an annual impact of $31 billion to $46 billion on the country’s GDP.421 Despite the drone market in India being in a nascent stage, the paper offers an overview of how India and the United States can cooperate to incentivize the use of drones for a variety of purposes. Several industries in India will be greatly enhanced, and will enable smarter employment of people with the use of drones as force multipliers in the agriculture, construction, energy and logistic sectors. In much the same way that the Federal Aviation Administration’s (FAA) Part 107 rules have facilitated the spread of commercial drone operations in the U.S., the Directorate of Civil Aviation (DGCA) in India needs to undertake incremental steps to relieve the indigenous commercial drone industries from the scourge of regulations that curtails the sector to flourish.422 It is important that the DGCA undertakes policies that ensure both safety and security of drones, but also gradually encourages operations beyond the current limit of 400 feet of Beyond Visual Line of Sight (BVLOS).
Three Levels of Cooperation on Commercial Drones
The two countries can cooperate on three levels: multilateral, bilateral, and industry-to-industry.
1) Multilateral Cooperation for Responsible Drone Use: There are wide variations in drone laws amongst countries. In fact, even within the United States, drone laws vary from state to state and work on a sort of drone federalism. In 2018, the International Standard Organization (ISO) proposed international standards for drone operations with the expectation that these standards will be adopted by countries globally. The objective of the ISO’s international standards is to establish drone regulation that every country can agree on, and will help normalize drone operations and responsible use throughout the world. The ISO standards focus primarily on data security, air safety, privacy, and facilitating ways where UAVs can be used in a variety of commercial scenarios.423
It is imperative that both India and the United States at a multilateral level push for the spread of safe and responsible practices of common drone laws. While several countries are trying to grapple with this challenge, it is important for the architects of India’s drone ecosystem to keep in mind that adopting the ISO standards needs to be swift and smooth. If the United States and India are able to both converge to the ISO standards and also encourage other countries to join, it will allow for great cross-pollination among businesses across countries. For example, U.S. companies that have already matured in commercial drone technologies would not have to bear a huge cost to restructure their operations in India for compliance. Moreover, the manufacturing of drones and the import and export of hardware and software can become globalized. This means that drone hardware can be manufactured in one country, software developed in another country, and the final product can be used in another country. In a globalized and an integrated economic environment, India and the United States adopting ISO standards would make cooperation between them and with other countries easier.
2) Partnership at the Government Level for a Cause: Humanitarian Assistance and Disaster Relief (HADR): In the past decade, India has been a first responder in several humanitarian disasters and international crises. It demonstrates India's commitment as a responsible actor in the global order and willingness to become a net security provider in the region. New Delhi has contributed its resources to prevent and mitigate regional and international crises.424 India’s leadership role and India-U.S. efforts following the devastating earthquake in Nepal have been noteworthy. Drones have been at the forefront of India’s increased efforts in HADR. Humanitarian organizations and several governments across the world have mobilized drones to collect vital information about collapsed buildings, locate survivors, and supply victims with relief packages. The National Disaster Management Authority (NDMA) helped in Nepal’s relief efforts using the Netra drone for aid.425 Similarly, the NDMA has been using the resources of several indigenous drone manufacturing companies in India. For example, Airpix, a company that specializes in aerial photography and video production, was used in a campaign to rebuild Uttarakhand and to spread awareness about infrastructural deficiencies in the mountainous state.426 India has also been sending medicine to remote areas in Rwanda, Malawi, Uganda and other places with the delivery of medical services using drones.
While India and the U.S. government have their own mechanisms in dealing with HADR, cooperation on HADR is featured in the New Framework for the U.S.-India Defense Relationship (2005) and was reiterated in the 2015 framework. As India and the United States develop frameworks and models of cooperation and burden-sharing in the Indo-Pacific, collaboration on HADR using drones is a good starting point. Both countries can benefit from the complementary nature of their efforts and interests in the region.427
There are already a few examples of India-U.S. cooperation on drones with a focus on HADR. Under the Defense Technology and Trade Initiative (DTTI), India and the United States are working on an air-launched unmanned system which would have HADR as one of the targeted uses.428 Another example of cooperation between the two countries on drones is that in the wake of a polio outbreak, a U.S.-based company, WeRobotics, was asked by the Center for Disease Control and Prevention (CDC) to organize training on medical cargo drones in Papua New Guinea (PNG). WeRobotics partnered with two Indian companies,Soli Consultancy and Redwing Labs India, to ensure the project’s completion and success.429
3) Industry-to-Industry Cooperation to Boost India’s Commercial Drones Market: China has emerged as the leading civilian drone exporter.430 India has not been able to become an exporter of commercial drones, and there are several challenges that have stymied the commercial drone ecosystem in India. One factor is the lack of clarity on the drone manufacturing licensing process from the Department of Industrial Policy and Promotion (DIPP). Another challenge is import restrictions on the components (motors, propellers, batteries) for assembling a drone. The export of drones also goes through an inter-ministerial panel due to restrictions under the SCOMET list.431
Under the Civil Aviation Regulations, the DGCA has launched the Digital Sky platform, which is built around the principle of “No Permission, No Takeoff.” While Digital Sky will be in charge of handling flights permissions, to give an impetus to the commercial drone industry, some of the issues such as “Beyond Visual Line of Sight” (BVLOS) and Autonomous Operations need to be resolved.432
Set against some of these challenges and uncertainties are the regulatory framework in India, which are still evolving, and a sweeping cross-pollination between Indian and U.S. industries may not be possible. However, the Indian drone industry will find it beneficial to partner with U.S. drone industries on building the software. There are few examples of such cooperation. For instance, Precision Hawk is a U.S. company working in partnership with the FAA and the National Aeronautics and Space Administration (NASA) on Low Altitude Tracking and Avoidance Systems (LATAS). The LATAS platform will show pilots of manned aircraft where UAVs are in the airspace before they become a safety hazard. For this project, Precision Hawk is collaborating with a technology partner in India called Webonise on the simulation of drones in a virtual environment to aid the development of this platform.433
Challenges
To foster India-U.S. partnership at the three proposed levels, there are several challenges that the Indian commercial drones’ ecosystem will need to overcome at the policy and regulatory level.434
As drones are gradually incorporated into the Indian airspace, there are several long-standing liability issues and privacy laws that the DGCA will need to clarify. Remotely controlled drones are increasingly cheap, and more widely available, but they pose real privacy risks. Some of the examples include surveillance drones violating property rights, and pervasive surveillance. A research survey, reported by Forbes in early 2019, indicated that flying drones 24/7 generated fears of the police.435 The way commercial drone technology is progressing, it seems quite likely that corporate giants like Amazon, Google, UPS, and Alibaba will be stepping up efforts to enable drones to play a significant role in the “last-mile” delivery – transporting items from the warehouse to the customer’s doorstep.436
Policymakers will be required to ensure a balance between the benefits of commercial drone use and its privacy costs. Any framework that provides impetus to a new technology is required to ensure that that spirit of innovation is sustained, while individual rights to privacy and freedom of expression are also maintained. For instance, a Rand report indicates that a team of researchers explored the hidden or indirect costs and potential consequences, both positive and negative, of adopting commercial delivery drones.437 The study revealed that regulators around the world are struggling to keep pace with new drone delivery technology and some countries are banning the use of commercial drones as regulating a technology which is still evolving is a challenge. Moreover, as there are security implications of this technology, regulators are erring on the side of cautious by banning the delivery applications of commercial drones.
While some of the current regulations in place cover licensure for pilots, registration, restricted fly zones, and insurance, one of the primary challenges of using delivery drones is a requirement that drones stay within the pilot’s line of sight (which almost defeats the purpose of commercial delivery drones).438 India’s Ministry of Civil Aviation’s framework for Civil Aviation Regulations (2.0) still does not provide specifics for several issues such as current imports and permission structures, or drone licensing and registrations, among other things. The authorities will also need to devise a regulatory response and guidance for mid-air collisions and injury to property and persons.
To increase bilateral partnership on commercial drones, India will first need to fine-tune some of its regulatory policies and also look at international standardization of commercial drone laws. One positive development that will spur interest and investments in the Indian drone ecosystem is that the government has allowed for 100% foreign direct investments in manufacturing commercial drones.439
While the Indian government and industry leaders will grapple these regulatory challenges for the commercial drone ecosystem, it is important to remember that drone technology will only advance worldwide. The number of people and industries that sees value in utilizing drones as force multipliers increase. Therefore, India cannot afford to stay behind the curve or stymie talent and technology in this industry.
Counter Drone Technology and Operations
Research indicates that most drone operators fly in good faith; however, there are some actors that can do a lot of damage using commercial drones. There are an increasing number of reports that state that extremist groups, militias, and drug cartels are using commercial drones as weapons.440 The proliferation of drones and the possibility of their use for malignant purposes, such as use of drones by organized criminals to run counter operations against law enforcement, plan robberies and other crimes, have led to the development of counter-drone technologies.441 Industries are investing in developing counter-drone technologies for law enforcement agencies to prevent unwarranted use of commercial drones and to ensure the safety and security of civilians. Counter-drone technology, also commonly known as counter-UAS (C-UAS) or counter-UAV, refers to systems that are used to detect and intercept unmanned aircraft. Drones are dual-use and can pose threats in both civilian and wartime environments. Concerns regarding the weaponization and use of commercial drones in conflicts, most notably by non-state actors, are growing. Drones have been used in conflicts in Syria, Iraq, and Ukraine. For instance, the Islamic State (ISIS) was able to import and construct several hundreds of inexpensive drones and use them in battlefields in Iraq and Syria.442 According to a report from the Center for a New American Security, more than 90 countries and non-state actors operate drones and their increasing use will have an impact on the future of conflict, crisis stability, and escalation dynamics.443 Non-state actors are increasingly able to transform commercial/hobby drones into military hardware and in the future, this trend will only grow as it provides non-state actors access to the kind of operational awareness that was previously held only by state militaries.444
It is in the context of these developments and security concerns that commercial industries are rapidly investing in counter-drone technologies to keep people safe from rogue drones. A report calledCounter-Drones System by the Center for the Study of Drone at Bard College found out that there are at least 235 counter-drone products either available on the market or are in various stages of development.445 Several detection, identification, and neutralization technologies are being employed and developed by leading defense contractors. Some of the most prominent counter-drone technologies for detection and tracking include scanning for radio frequency, electro-optical, infrared, acoustic, and combined sensors. Other technologies and methods used for interdiction of drones involve radio frequency jamming, spoofing, laser, nets, and projectiles.446The global counter-drone market size is expected to reach $1.85 billion by 2024 as incidences of unauthorized use of UAVs and acts of terror using drones rise.447
Given that major proliferation of drones is underway in the Subcontinent, India needs to devote adequate attention to developing and mainstreaming counter-drone technologies. India has a unique opportunity to learn some of the lessons of how counter-drone technology is evolving in the United States and being utilized by federal law enforcement agencies. Given C-UAS technologies are dependent on innovation, industries in India can collaborate with counter-drone tech companies in the United States and become part of the global supply chain of C-UAS tech.
On February 1, 2019, CNBC reported that by 2022 the Federal Aviation Administration (FAA) expects that there will be 2.9 million drones flying in the United States.448 While commercial drones are beneficial to the national economy, the rapid multiplication of drones in the skies poses significant security risks. As greater numbers of drones are flying dangerously close to commercial and private aircraft, there have been several near misses between drones and aircraft.449 While reining in rogue drones has received significant attention during the last five years, there are several outstanding challenges as all counter-drone technologies need to reconcile with legal and safety mechanisms. The FAA considers drones to be aircraft and does not allow shooting down an aircraft, thus making shooting down drones illegal and a federal crime in the United States. Only the federal government’s law enforcement agencies have been granted the authority to employ C-UAS technologies,450 thus his suggesting that counter-drone adoption measures will take place in close coordination with FAA laws.
In July 2018, the FAA updated its guidance on “Unmanned Aircraft Systems (UAS) Detection and Countermeasures” and underscored that successful mitigation of rogue drones is reliant on accurate detection. One of the major findings of the FAA report is that the “low technical readiness of C-UAS systems, combined with a multitude of other factors, such as geography, interference, location of the majority of reported VAS sightings, and cost of deployment and operation, demonstrate this technology is not ready for use in domestic civil airport environments.”451 The report emphasized the challenges of C-UAS technologies and the potential risks of targeted UAS when engaged in airport environment, which can introduce greater hazards than it is intended to mitigate.
Despite the slow pace of adoption of counter drone tech, it is pertinent that law enforcement agencies and security officials will need to be prepared, trained, and equipped to counter hostile drones. The U.S. Congress recognized that the need for counter-drone tech will only grow and, therefore, in the 2017 and 2018 National Defense Authorization Acts (NDAAs) enabled limited C-UAS authority to the Department of Defense and Energy.452 Notwithstanding these challenges, there are several companies, such as SkySafe, DeDrone, Fortem, that are working with the Department of Defense (DoD) to keep unwanted drones in check; though the real challenge continues to be the regulatory battle. For instance, SkySafe does not only track drones but also intercepts them, but hacking and/or intercepting drones is illegal in the United States.453 It is, therefore, important that companies, local and federal government agencies have a greater level of coordination when it comes to counter drones technologies.
With an increasing boom of the commercial drone market in India, drones are becoming cheaper, smaller, more agile, and stealthier. After several incidents of drone sightings around Indian airports, the government is investing in the development of reliable, safe and secure C-UAS technologies. For example, the Defence Research and Development Organization (DRDO) has taken up the development of high-intensity laser weapons.454 Additionally, the Indian government’s Bureau of Civil Aviation and Security (BCAS) has been engaging with two Israeli companies to develop drone disabling technologies around Indian airports. This technology primarily looks at two categorization of skills – soft kill (a drone which flies into a secured airspace can be destabilized and its system frozen) and hard kill (the drone can be destroyed).455
The growth in the market of counter-drone technology is another area where the industry in both India and the United States can cooperate. The BCAS can work with the U.S. industries and federal law enforcement agencies to navigate the policies adopted and the regulatory challenges involved in the lawful elimination of drones.
There is also a major component of learning lessons from the United States and applying them in the Indian context to foster a culture of safety and responsibility throughout the drone industry. For instance, to mitigate rogue drones near the National Nuclear Security Administration’s (NNSA) sites, the Office of Defense Nuclear Security has deployed its first C-UAS platform. The NNSA worked in partnership with the FAA for the designation of Los Alamos Lab as a “No-Drone Zone” and to set up a system to detect, identify, track, and intercept unsanctioned drones at Los Alamos National Laboratory.456 It would be in India’s security interest to draw upon the lessons from the NNSA-FAA collaboration to better understand the capabilities, functional efficacy, and ease of handling of anti-drone technology. Additionally, training a specific team – either the Central Industrial Security Force (CISF) personnel or the Air Traffic Controllers (ATC) – staff at airports would be highly beneficial for the Indian security establishment.
Some Key Considerations for the Way Forward
The use and utility of commercial drones are on the rise and expectedly will continue to grow. As there are some significant developments for new regulatory frameworks for drones in India, there is an opportunity for New Delhi to increase partnership with the United States on commercial drones. India will need to fine-tune its regulatory policies on commercial drone laws according to international standards. The increasing number of drones in the sky and the growing number of violations – accidental or criminal – also incentivizes Indian and American industries to collaborate on counter-drone tools to keep out unwanted drones. Drone technology in the commercial sector has the potential to create tremendous impact with regard to job creation, increasing productivity, and efficiency. However, there will be considerable concerns about both the promise of the technology and its ability to carry out tasks while ensuring safety, security and privacy of citizens. Expectations regarding drone technology in the commercial sector need to be more pragmatic and rooted in reality.
Expectations regarding drone technology in the commercial sector need to be more pragmatic and rooted in reality.
Despite the rapid advances of drone technology, there needs to be significant progress in several aspects of the technology: autonomous flights (this technology is still developing but it allows drones to fly without a user directing their flight); and battery performance (improvements in battery technology are expected to boost drone flight time). Though some of these improvements will allow commercial drones to fly for longer durations without battery recharging, the drone technology can fall short of the promise. It is important for industry players and policymakers to temper expectations of what drone technology as a whole can achieve, given it is still evolving and is not a fully mature technology.
Drones are not horizontal technology (i.e. the movement and transfer of this technology from one sector to the other is not easily possible.)457 The most disruptive technologies that have made huge impacts on consumer use are horizontal technologies like e-commerce. However, since drones are not a horizontal technology, there would be significant expenditure on R&D in every sector where drone applications are envisioned. For example, the last-mile delivery drones will require a very different approach than farm surveillance by drones. Last-mile delivery will require precision, timeliness, accuracy, interaction with humans, and an understanding of potential obstacles. Farm surveillance applications will require imaging technology, stability in dire environmental conditions, and autonomy. This again indicates that there needs to be a management of expectations on the commercial drones’ impact across sectors.
In the Indian context, it is clear that the development of the commercial drones sector will happen in close coordination with the Indian government. However, experts warn that stiff regulations could stifle the commercial drones sector from flourishing. There must be a balanced approach where the government is able to safeguard an individual’s privacy, monitor drones that could harm national security, but simultaneously encourage policies that enable the commercial drones sector to flourish.
To conclude, it is important to highlight that although much of the recent debate on drones has centered on the state’s use of drones for surveillance and military purposes, the use of drones by and for civil society deserves attention. For any underlying opportunity in the case of the commercial drone market in India, there is a vital need for enabling policies and handholding between India and the United States. For a smooth launch and progress of the commercial drone industry in India, there needs to be policy consensus and coordination among the Ministry of Defense, the Ministry of Home Affairs, the Ministry of Commerce and Industry, the Ministry of Civil Aviation, the Department for Promotion of Industry and Internal Trade, and Niti Ayog, among others. Moreover, there also needs to be significant investment from the government on drone education – training pilots, capacity building for manufacturing, registration and tracking of drones, certification of remote pilots and other professional drone services. The time is right and ripe for India to collaborate with the United States on the development of its commercial drone sector, setting and strengthening the regulatory landscape to allow commercial drones to be used effectively and safely and also for the scalability of the technology.
Citations
- The Global Risks Report 2018 13th Edition, [Geneva: World Economic Forum,2018] <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- The United Nations World Water Development Report 2018: Nature-Based Solutions for Water, [Paris: WWAP (United Nations World Water Assessment Programme) /UN-Water, 2018, UNESCO] <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Martina Flörke, Christof Schneider, and Robert I. McDonald, "Water competition between cities and agriculture driven by climate change and urban growth," Nature Sustainability 1, no. 1 (2018): 51.
- Peter H. Gleick, "Global freshwater resources: soft-path solutions for the 21st century," Science 302, no. 5650 (2003): 1524-1528.
- Ibid.
- Negative externalities are costs that impact a party that does not have a role in its creation. For instance, vehicular pollution generated by a specific individual affecting people nearby. Negative externalities cause market failures.
- Collection action problem occurs when individuals pursuing a common goal do not cooperate due to competing interests.
- Free rider issues occur when individuals who do not pay for a good or service reap its benefit. Too many free riders results in over-exploitation or under-production of the good or service.
- Richard E. Howitt, Richard E. and Kristiana Hansen, "The Evolving Western Water Markets," Choices 20, no. 316-2016-6565 (2005): 59.
- Guy Le MoigneShawki Barghouti, Gershon Feder, Lisa Garbus, and Mei Xie, "Country experiences with water resources management," World Bank Technical Paper 175 (1992).
- Ereney Hadjigeorgalis, "A Place for Water Markets: Performance and Challenges," Review of Agricultural Economics 31, no. 1 (2009): 50-67.
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- C. Wilson, Adverse Selection, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics, Palgrave Macmillan, 2008]
- Y. Kotowitz, Moral Hazard, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- J.O. Ledyard, Market Failure, In: Palgrave Macmillan (eds)[London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- David S. Brookshire, Bonnie Colby, Mary Ewers, and Philip T. Ganderton, "Market Prices for Water in the Semiarid West of the United States," Water Resources Research 40, no. 9 (2004).
- John Freebairn and John Quiggin, "Water rights for variable supplies," Australian Journal of Agricultural and Resource Economics 50, no. 3 (2006): 295-312.
- A. Dinar, M. Rosegrant, R. Meinzen-Dick, "Water allocation mechanisms: Principles and examples," The World Bank Policy Research Working Paper 1779 (June 1997).
- Jill E. Hobbs, "Information asymmetry and the role of traceability systems," Agribusiness: An International Journal 20, no. 4 (2004): 397-415.
- Max H. Bazerman and James J. Gillespie, "Betting on the future: The virtues of contingent contracts," Harvard Business Review 77 (1999): 155-162.
- Stefaan G. Verhulst, "Information Asymmetries, Blockchain Technologies, and Social Change," Medium, July 24, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Sloane Brakeville, and Bhargav Perepa, "Blockchain Basics: Introduction to Distributed Ledgers," IBM Developer, March 18, 2018, accessed April 14, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Nigel Gopie, "What Are Smart Contracts on Blockchain?" Blockchain Pulse: IBM Blockchain Blog, July 02, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- "Civic Use Cases," Helping Governments to Be More Accessible, Efficient and Effective. <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- "Civic Ledger Pty Ltd.," Australian Water Partnership. <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "Water Markets and Trade," Australian Government – Murray-Darling Basin Authority, Sept. 29, 2015. <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Ibid.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management. September 2018.
- Ibid.
- The term “smart” in this context indicates the use of internet of things, big data, predictive analytics integrated over blockchain network as underlying technologies to facilitate the operations of a water market.
- Jayachandran Praveen, “The Difference between Public and Private Blockchain," Blockchain Pulse: IBM Blockchain Blog, Aug. 06, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- J.R. DeShazo, Gregory Pierce, and Henry McCann, “Los Angeles County Community Water Systems Atlas and Policy Guide: Supply Vulnerabilities, At-Risk Populations, Conservation Opportunities, Pricing Policies, and Customer Assistance Programs,” UCLA: Luskin Center for Innovation, (2015), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source; U.S. Census Bureau Quick Facts: Los Angeles County, California," Census Bureau Quick Facts, July 1, 2017, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- S. Pincetl et al., “Water Management in Los Angeles County: a Research Report,” Los Angeles: UCLA, Institute of Environment and Sustainability, 2015, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Ibid.
- Ibid.
- J.R. DeShazo and Gregory Pierce, "Quantifying the Benefits and Designing Governance Structures for a Water Market in Los Angeles County," [Los Angeles: UCLA, Luskin Center for Innovation, Oct. 2016] <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Bengaluru Water Board, “Blueprint for Future,” <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Bangalore Water Supply and Sewerage Board, "About BWSSB," Bangalore Water Supply and Sewerage Board. <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Bengaluru Water Board, “Blueprint for Future," <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Malini Ranganathan, "'Mafias' in the waterscape: Urban informality and everyday public authority in Bangalore," Water Alternatives 7, no. 1 (2014).
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- Bart Elias, Unmanned Aircraft Operations in Domestic Airspace: U.S. Policy Perspectives and the Regulatory Landscape (Washington, D.C.: Congressional Research Service, 2016), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Tom Hancock and Wang Xueqiao, “China’s DJI targets agriculture as consumer drone sales slow,” Financial Times, March 25, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Richard Levick, “Drone Industry Just Beginning To Take Off,” Forbes, May 15, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Ujjwal Bakshi and Manash Neog, “Much to Drone About,” Economic Times, April 4, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Therese Jones, International Commercial Drone Regulation and Drone Delivery Services (Santa Monica: RAND Corporation, 2017), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Somya Lohia, “Drone Regulations 1.0 Can Fetch India Major Slice of $100 Billion Industry,” Money Control, January 9, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Civil Aviation Requirements Series X Part I Issue I: Requirements for Operation of Civil Remotely Piloted Aircraft System (RPAS), F. No. 05-13/2014-AED Vol. IV (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Ibid., Reg. 14.2.
- Ibid., Reg. 12.14 & 12.2.
- Ibid., Reg. 11.2 & 17.1.
- Ibid, Reg. 12.21.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Procedures for Operation of Civil Remotely Piloted Aircraft Systems (RPAS) in Indian Airspace, AIP Supplement 164/2018 AAI/ATM/AIS/09-09/2018 (New Delhi: Airports Authority of India, 2018), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Tender Document: Development, Hosting and Maintenance of Digital Sky Platform for Ministry of Civil Aviation IT-11042/1/2018-DIRECTORATE OF IT (New Delhi: Airports Authority of India, 2018), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Ibid.
- Ibid.
- Drone Ecosystem Policy Roadmap (New Delhi: Ministry of Civil Aviation, 2019), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Ibid, 7.
- Ibid, 14.
- The Personal Data Protection Bill, 2018 (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- White Paper of the Committee of Experts on a Data Protection Framework for India (New Delhi: Ministry of Electronics and Information Technology, 2017), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Petition to the Federal Aviation Administration: Drones and Privacy (Washington, D.C.: Electronic Privacy Information Center, 2012), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Margot Kaminski, “Drone Federalism: Civilian Drones and the Things They Carry,” California Law Review 4 (2013): 57–74.
- Notice of Proposed Rulemaking: Operation of Small Unmanned Aircraft Systems Over People FAA–2018–1087 (Washington, D.C.: Federal Aviation Administration, 2019), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Arthur Holland Michel, Drones at Home: Local and State Drone Laws (New York: Center for the Study of the Drone, Bard College, 2017), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Amanda Essex, Taking Off: State Unmanned Aircraft Systems Policies (Denver, CO: National Conference of State Legislatures, 2016), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- An Act Relating To Unmanned Aircraft Systems – Establishing Statewide Standards, Protecting Privacy, And Ensuring Public Safety (Virginia: American Legislative Exchange Council, 2017), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Gautam Bhatia, “State Surveillance and the Right to Privacy in India: A Constitutional Biography,” National Law School of India Review 26 (2014): 127–158.
- (2019) 1 SCC 1.
- Ibid, 359.
- (2015) 5 SCC 1.
- Ibid, 167.
- Colin Snow, “Drones Pose a Unique Big Data Challenge For Business Users,” Forbes, February 6, 2019 <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source ; Michelle Chan, “What Businesses Need to Know About Drone Data,” Techwire Asia, February 13, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules ((New Delhi: Ministry of Electronics and Information Technology, 2011),<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source"> <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source ; Ibid. ; Rachel Finn and Anna Donovan, “Big Data, Drone Data: Privacy and Ethical Impacts of the Intersection Between Big Data and Civil Drone Deployments,” in The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, ed. Bart Custers (The Hague: TMC Asser Press, 2016), 47-67.
- As Solove remarks about the “Information Age:” “The data gathered about people is significantly more extensive, the process of combining it is much easier, and the computer technologies to analyze it are more sophisticated and powerful.” See Daniel Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review 154 (2006): 477, 506 ; Ibid., 507–08.
- Jordi Soria-Comas and Josep Domingo-Ferrer, “Big Data Privacy: Challenges to Privacy Principles and Models.” Data Science and Engineering 1 (2016): 21, 22. ; Justice KS Puttaswamy v. Union of India, (2017) 10 SCC 1.
- Guide to Basic Data Anonymisation Techniques (Singapore: Personal Data Protection Commission of Singapore, 2018), www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other-Guides/Guide-to-Anonymisation_v1-(250118).pdf.
- For a particularly stark situation, where the de-identification was considered near foolproof and yet re-identified, see Jean Louis Raisaro et al., “Addressing Beacon Re-Identification Attacks: Quantification and Mitigation of Privacy Risks,” Journal of the American Medical Informatics Association 24 (2017): 799, 800.
- Solon Barocas and Helen Nissenbaum, “Big Data’s End Run around Anonymity and Consent,” in Privacy, Big Data, and the Public Good, eds. Julia Lane et al. (New York, NY: Cambridge University Press, 2014), 44–45.
- Ira S Rubinstein, “Big Data: The End of Privacy or a New Beginning,” International Data Privacy Law 3 (2013): 74, 77–78; Davide Castelvecchi, “Can We Open the Black Box of AI?” Nature 538, no. 7623 (2016): 20.
- Mireille Hildebrandt, “Defining Profiling: A New Type of Knowledge?” in Profiling the European Citizen: Cross-Disciplinary Perspectives, eds. Mireille Hildebrandt and Serge Gutwirth (eBook: Springer, 2008), 17, 20.
- Nathaniel A Raymond, “Beyond ‘Do No Harm’ and Individual Consent: Reckoning with the Emerging Ethical Challenges of Civil Society’s Use of Data,” in Group Privacy: New Challenges of Data Technologies, eds. Linnet Taylor, Luciano Floridi and Bart van der Sloot (eBook: Springer, 2017): 67, 75.
- A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Ibid, 45–46.
- Ananth Padmanabhan and Anirudh Rastogi, “Big Data,” in Regulation in India: Design, Capacity, Performance, eds. Devesh Kapur and Madhav Khosla (London: Hart Publishing, 2019): 251, 262.
- Aleecia M. McDonald and Lorrie Faith Cranor, “The Cost of Reading Privacy Policies,” I/S Journal of Law and Policy, 4 (2008): 543, 565.
- Arthur Allen Leff, “Contract as Thing,” American University Law Review 19 (1970): 131.
- Nikhil Narendran, “Policy Framework for Protection of Big Data in State Possession,” in Blockchain for Property: A Roll Out Road Map for India, eds. Baladevan Rangaraju and Vishnu Chandra (New Delhi: India Institute, 2017): 34, 40.
- Rahul Matthan, Privacy 3.0: Unlocking Our Data-Driven Future (Noida: Harper Collins, 2018): 167–171.
- Carmine Cifaldi, “Unmanned Aircraft System Privacy and Data Protection,” in Handbook of Unmanned Aerial Vehicles, eds. K.P. Valavanis and G.J. Vachtsevanos (eBook: Springer, 2018): 1–19.
- Voluntary Best Practices for UAS Privacy, Transparency, and Accountability (Washington, D.C.: National Telecommunications and Information Administration, 2016), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Clark D. Cunningham, “Apple and the American Revolution: Remembering Why We Have the fourth Amendment”, The Yale Law Journal, volume 126, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- “ Breaking Down Apple’s iPhone Fight With the U.S. Government”, The New York Times, March 21, 2016, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Nick Statt, “Apple’s iCloud partner in China will store user data on servers of state-run telecom”, The Verge, July 18, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- “Chen Guangcheng, Apple Can’t Resist Playing by China’s Rules”, The New York Times, January 23, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Ibid., “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming), Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- “Top 20 Countries with the Highest Number Of Internet Users”, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Ibid.
- See Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Krishna Pokharel and Rajesh Roy, “India Says Rumors About Child Snatching on WhatsApp Led to Mob Killings”, The Wall Street Journal, July 5, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- . Section 91, Code of Criminal Procedure, 1973
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Id.
- “Cross-Border Law Enforcement Demands: Analysis of the U.S. Department of Justice’s Proposed Bill”, Center for Democracy and Technology, August 17, 2016, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Data localization is no solution,” The Hindu, August 3, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- This, however, requires an executive agreement between the United States and the foreign country certifying that the state will rely on robust privacy protections, and respect for due process and the rule of law when making requests to companies directly. Such a framework over time, will not only need to be transparent and hold both companies and LEAs accountable but also be scalable to respond to the increasing volume and complexity of requests. Specifically, due process safeguards on user notification, redressal etc. will need to be incorporated. The U.S. Department of Justice recently issued clarifications on how the CLOUD Act will be operationalized available at <a href="<a href="<a href="<a href="source">source">source">source">source">source
- For more on the privacy protecting requirements under CLOUD Act, both at an institutional level and for individual requests, see Madhulika Srikumar, Debrae Kennedy-mayo, Peter Swire and Sreenidhi Srinivasan, “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- Sections 40 and 41, The Personal Data Protection Bill, 2018
- Ibid.
- Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, “A Free and Fair Digital Economy Protecting Privacy, Empowering Indians”, 27 July 2018
- Ministry of Electronics and Information Technology, “The Information Technology [Intermediaries Guidelines (Amendment) Rules] 2018,” <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Pranesh Prakash,“Why Data Localisation Might Lead To Unchecked Surveillance,” Centre for Internet and Society, October 15, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source ; “US criticises India's data localisation norms, draft e-commerce policy,” The Economic Times, April 9, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Josh Constine,” Zuckerberg warns of authoritarian data localization trend,” Techcrunch, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- “RBI data localisation: 80 percent players, including WhatsApp, comply with norms”, Business Standard, <a href="<a href="<a href="<a href="source">source">source">source">source">source -80-players-including-whatsapp-comply-with-norms-118101500907_1.html
- “Facebook takes a tough stand on data storage amidst India’s localisation push”, The Economic Times, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- WhatsApp is working to comply with Reserve Bank of India (RBI) regulations on the local storage of payment-related data, the Economic Times reported. “Only some engineering work is left,” an anonymous senior Facebook executive told ET. <a href="<a href="<a href="<a href="source">source">source">source">source">source -mandate-report-why-is-it-needed/
- “India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Komal Gupta, “Google Agrees to Comply with RBI’s Data Localisation Norms,” Livemint , September 10, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source"><a href="<a href="<a href="<a href="source">source">source">source">source">source Surabhi Aggarwal, “Industry bodies write to IT minister Ravi Shankar Prasad against data bill,” Economic Times, October 4, 2018, //economictimes.indiatimes.com/articleshow/66062141.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- See U.S. India Strategic Partnership Forum (USISPF) submission to MeitY available at <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Aditya Kalra, “U.S. senators urge India to soften data localisation stance,” Reuters, October 13, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Ashish Shukla, “RBI refuses to extend deadline for data localisation,” IBTimes, October 14, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Bhavin Patel and Hemant Krishna, “Data Localisation: Here’s why the RBI isn’t listening to the ‘Mirroring’ argument,” CNBC TV18, October 15, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,”Data localisation in India: Questioning the means and ends,”The Leap Blog, February 22, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Amazon not mirroring it abroad Whatsapp asked for 5 more months, mastercard and rest asked for one year
- “Russia fines Facebook $50 for failing to comply with local data privacy law, ” ZDNet, April 12, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source ; Mark Scott, “Russia Prepares to Block LinkedIn After Court Ruling,” The New York Times, November 10, 2016, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Government authorities increasingly rely on blocking access to internet altogether to contain cases of public unrest. See Timothy Mclaughlin ,“How Whatsapp Fuels Fake News And Violence In India, ” The Wired, December 12, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- “Fighting fake news: Govt asks Whatsapp to take immediate action,” Economic Times, July 3, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- The Indian government introduced the draft amendment to the Information Technology Act, 2008 to overhaul the current intermediary liability regime in India. One of the problematic provisions included the requirement for intermediaries to enable tracing the originator of messages. See Yesha Tshering Paul“ Fake News: Misguided Policymaking To Counter Misinformation,” Bloomberg Quint, January 14, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- The Srikrishna Committee appointed to draft India’s first comprehensive data protection law introduced the term “fiduciaries” in the Personal Data Protection Bill, 2018. See Arghya Sengupta, “Why the Srikrishna Committee Rejected Ownership of Data in Favour of Fiduciary Duty,” The Wire, August 2, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- For more on how Indian law enforcement agencies make requests for data under Indian law, see Chapter 3 in Srikumar et al., “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- For instance, Facebook commits to fight back in court if requests are overbroad or defective. Chris Sonderby, “Sharing Our Latest Transparency Report,” Facebook Newsroom, May 23, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- See 3(13), Personal Data Protection Bill, 2018. Available at <a href="<a href="<a href="<a href="source">source">source">source">source">source; Stakeholders in India however have argued that the draft bill does not imbibe the philosophy of fiduciaries completely since certain sections in the bill still places the disproportionate onus on users to realize their rights. See comments submitted by Dvara Research to MeitY available at <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- See A Free and Fair Digital Economy Protecting Privacy, Empowering Indians: Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, July 27, 2018, available at <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- Id. , see Jack M.Balkin, "Fixing Social Media's Grand Bargain." Hoover Working Group on National Security, Technology, and Law, Aegis Series Paper 1814,2018.
- The author of this piece argues that Balkin’s fiduciary framework could eliminate the third party doctrine in the U.S. altogether binding all companies to a higher duty of care towards users. See Mike Godwin, It’s Time to Reframe Our Relationship With Facebook,” Slate, November 16, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source; In India, the Supreme Court through the 2017 ruling recognising privacy as a fundamental right invalidated the application of third party doctrine. See Gautam Bhatia, “The Supreme Court’s Right to Privacy Judgment – IV: Privacy, Informational Self-Determination, and the Idea of Consent,” Indian Constitutional Law and Philosophy, August 2017, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Vivan Sharan, Sidharth Deb, “Reimagining fiduciaries in the digital economy,” Livemint, August, 15, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Ariel Dobkin, "Information Fiduciaries in Practice: Data Privacy and User Expectations." Berkeley Tech. LJ 33 2018: 1.
- Dalip Singh, “Law enforcement agencies favour data localisation “, Economic Times, October 8, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source /articleshow/66113360.cms
- India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Aria Thaker, “Behind RBI’s digital payments panel, a controversial firm’s shadow, conflict of interest allegations”, Scroll, January 10, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source; The Indian government’s motivation to create an environment favourable to domestic tech firms is most evident in its recent policy on Foreign Direct Investment in e-commerce. See “What India e-commerce policy entails for online retailers”, Livemint, January 16, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- a. Aditya Kalra and Aditi Shah, “U.S. firms face off with Indian rival in lobbying against data storage rules,” Reuters, July 24, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source"><a href="<a href="<a href="<a href="source">source">source">source">source">source b. Vidhi Choudhary and Yashwant Raj, “Cambridge Analytica row: Facebook data breach hit 560K Indian users,”Hindustan Times, April 5, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Prashant Reddy, “View: It's time to tame the social media beast,” Economic Times, February 13, 2019,//economictimes.indiatimes.com/articleshow/67966170.cms?from=mdr&utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- Ben Brody, “Tech Giants Back U.S. Bill Governing Cross-Border Data Searches,”Bloomberg, February 7, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Brad Smith, “A call for principle-based international agreements to govern law enforcement access to data,” Microsoft On the Issues, September 11, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Michael Punke, “AWS and the CLOUD Act,” AWS Security Blog, May 27, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source"><a href="<a href="<a href="<a href="source">source">source">source">source">source ; Chaim Gartenberg, “Apple will launch a global web portal for law enforcement requests later this year,” The Verge, September 6, 2018, available at <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source"><a href="<a href="<a href="<a href="source">source">source">source">source">source; Kristen E. Eichensehr, “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming)
- “One year later: A cybersecurity commitment shared by more than 100 companies,” Tech Accord, May 9, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Mike Isaac, “Zuckerberg Plans to Integrate WhatsApp, Instagram and Facebook Messenger,” The New York Times, January 25, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Mike Isaac, “Facebook’s Mark Zuckerberg Says He’ll Shift Focus to Users’ Privacy,” The New York Times, March 6, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source . Facebook’s official announcement is available at <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Law enforcement agencies across the world make overbroad demands for location data to find suspects and witnesses at crime scenes. See Jennifer Valentino-Devries, “Tracking Phones, Google Is a Dragnet for the Police,” The New York Times, April 13, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source; also on “reverse location warrants” see Aaron Mak, Close Enough, Slate, February 19, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source; Matthew Haag, “FamilyTreeDNA Admits to Sharing Genetic Data With F.B.I.”, The New York Times, February 4, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Josh Costine, “Facebook will pass off content policy appeals to a new independent oversight body,” Techcrunch, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- For instance, in the UK, <a href="<a href="<a href="source">source">source">source">source; France, <a href="<a href="<a href="source">source">source">source">source; and Germany, <a href="<a href="<a href="source">source">source">source">source
- Varun Aggrawal, “Infosys to Set up Data Marketplace for Enterprises – The Hindu BusinessLine,” June 19, 2018, <a href="<a href="<a href="source">source">source">source">source.
- “The Personal Data Protection Bill” (2018), <a href="<a href="<a href="source">source">source">source">source; Justice B.N. Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” (Committee of Experts under the Chairmanship of Justice B.N. Shrikrishna, July 2018), <a href="<a href="<a href="source">source">source">source">source.
- Jack M. Balkin, “Information Fiduciaries and the First Amendment,” U.C. Davis Law Review 49, no. 4 (2016): 1234; Lina Khan and David Pozen, “A Skeptical View of Information Fiduciaries” (SSRN, February 25, 2019), <a href="<a href="<a href="source">source">source">source">source.
- Whilst the European Union’s approach in the GDPR is limited by is focus on privacy. The challenges of governing data-driven decision-making go well beyond concerns about privacy. See Talia Gillis and Josh Simons, “Explanation < Justification: GDPR and the Perils of Privacy,” (SSRN, 2019).
- To use André Béteille’s phrase, one of India’s most important twentieth-century social theorists. André Béteille, Anti-Utopia: Essential Writings of André Béteille (New Delhi: Oxford University Press, 2005); André Béteille, Ramachandra Guha, and Jonathan P. Parry, Institutions and Inequalities: Essays in Honour of Andre Beteille (New Delhi: Oxford University Press, 1999).
- Purva Khera, Macroeconomic Impacts of Gender Inequality and Informality in India, IMF Working Paper (Washington, District of Columbia DC: International Monetary Fund, 2016); Carol Vlassoff, Gender Equality and Inequality in Rural India: Blessed with a Son (New York, NY: Palgrave Macmillan, 2013); Stephen M. Caliendo, Inequality in America: Race, Poverty, and Fulfilling Democracy’s Promise, Dilemmas in American Politics (Boulder, CO: Westview Press, 2014); Xavier N. De Souza Briggs, Social Capital and Segregation: Race, Connections, and Inequality in America (Cambridge, MassMA.: John F. Kennedy School of Government, 2002).
- It is important to note that this is not just about unrepresentative data. Unrepresentative data excludes some groups, perhaps because there are not enough data points about that group, or the data points that exist are less numerous or rich. This is an important problem, particularly in India, where the underrepresentation of Untouchables and women in data is systemic. But the problems this paper considers would remain even in the most accurate and careful data sets, which are still a reflection of the structure of our social world, including the inequalities and injustices that characterize it. A representative dataset is not devoid of injustice. This leaves open a host of important issues about when the representation of injustice in a dataset actually constitutes an injustice, an issue I hope to address in future work. Cynthia Dwork and Deirdre Mulligan, “It’s Not Privacy, and It’s Not Fair,” Stanford Law Review 66 (September 2013): 35–40; Kate Crawford, “The Hidden Biases in Big Data,” Harvard Business Review, April 1, 2013, <a href="<a href="<a href="source">source">source">source">source; David Garcia et al., “Analyzing Gender Inequality through Large-Scale Facebook Advertising Data,” Proceedings of the National Academy of Sciences of the United States of America 115, no. 27 (2018): 6958–63, <a href="<a href="<a href="source">source">source">source">source.
- Andrew D. Selbst and Solon Barocas, “The Intuitive Appeal of Explainable Machines,” SSRN Electronic Journal, 2018, <a href="<a href="<a href="source">source">source">source">source.
- Daniel Kahneman, Thinking, Fast and Slow (New York, NY: Farrar, Straus and Giroux, 2011).
- Virginia Eubanks, Automating Inequality: How High-Tech Tools Profile, Police and Punish the Poor (New York, NY: St. Martin’s Press, 2018).
- TOI, “Aadhaar Covers over 89% Population: Alphons,” The Times of India, accessed March 5, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Cynthia Dwork et al., “Fairness through Awareness,” ITCS ’12 (ACM, 2012), 214–226.
- Sam Corbett-Davies and Sharad Goel, “The Measure and Mismeasure of Fairness: A Critical Review of Fair Machine Learning,” 20180731, <a href="<a href="<a href="source">source">source">source">source.
- Jon Kleinberg, Sendhil Mullainathan, and Manish Raghavan, “Inherent Trade-Offs in the Fair Determination of Risk Scores,” Proceedings of Innovations in Theoretical Computer Science (ITCS), 2017.
- I am therefore moving beyond privacy as a framework for thinking about the governance of data-driven decision-making. Privacy is one concern we might have about those decision-making procedures, usually called “data processing” in existing legislation in the EU and India. But it is far from the only concern. Other aims and values need to be brought into play. Privacy should not be the sole lens through which to view governance data and machine learning. A29WP, “Guidelines on Automated Individual Decision-Making and Profiling” (Article 29 Data Protection Working Party, 2018), <a href="<a href="<a href="source">source">source">source">source.; ICO, “Guide to the General Data Protection Regulation (GDPR)” (U.K.: Information Commissioner’s Office, August 2018), <a href="<a href="<a href="source">source">source">source">source; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Most other important pieces of non-discrimination legislation extend the categories to which duties of non-discrimination apply. These include the Equal Pay Act of 1963, which prohibits the payment of different wages to employees of different sexes who perform equal work under similar conditions; the Americans with Disabilities Act (ADA) of 1990, which prohibits discrimination against individuals with a disability and requires the provision of reasonable accommodation to someone who is legally disabled; and the Genetic Information Non-Discrimination Act of 2008, which protects individuals from genetic discrimination in the healthcare and insurance industries.
- For instance, U.S. Executive Orders 10925, 11246, and 11375 require federal contractors who do over $10,000 in Government business in one year to “take affirmative action to ensure that applicants are employed, and that employees are treated during employment, without regard to their race, color, religion, sex or national origin.”
- David Strauss, “Discriminatory Intent and the Taming of Brown,” University of Chicago Law Review 56, no. 3 (1989): 935–935.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019, <a href="<a href="<a href="source">source">source">source">source; Solon Barocas and Andrew D. Selbst, “Big Data’s Disparate Impact,” California Law Review 104, no. 3 (June 1, 2016): 671–732.
- There is an important emerging debate about precisely this point, including a paper of my own. For the key protagonists, see Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019; Barocas and Selbst, “Big Data’s Disparate Impact”; Lior Strahilevitz, “Privacy versus Antidiscrimination,” Public Law & Legal Theory Working Paper, no. 174 (2007), <a href="<a href="<a href="source">source">source">source">source; Pamela L. Perry, “Two Faces of Disparate Impact Discrimination,” Fordham Law Review 59, no. 4 (March 1, 1991): 523–595; Cass Sunstein, “The Anticaste Principle,” Michigan Law Review, January 1, 1993, 2410.
- Barocas and Selbst, “Big Data’s Disparate Impact,” 724.
- Sophia Moreau and Deborah Hellman, Philosophical Foundations of Discrimination Law (Oxford: Oxford University Press, 2013), 259.
- Béteille, Anti-Utopia.
- Cass Sunstein makes a similar point. If there is prejudice and statistical discrimination, and if third parties promote discrimination, there will be decreased investments in human capital. Such decreased investments will be a perfectly reasonable response to the real world. And if there are decreased investments in human capital, then prejudice, statistical discrimination, and third-party effects will also increase. Statistical discrimination will become all the more rational; prejudice will hardly be broken down; consumers and employers will be more likely to be discriminators.Ronnie J. Steinberg, Applications of Feminist Legal Theory to Women’s Lives: Sex, Violence, Work and Reproduction. Women in the Political Economy. (Temple University Press, 2012), 560; Sunstein, “The Anticaste Principle,” 2431.
- Dwork et al., “Fairness through Awareness,” 215.
- As Hannah Arendt argued when comparing the American and French revolutions. Rohit De, A People’s Constitution: The Everyday Life of Law in the Indian Republic (Princeton, CT: Princeton University Press, 2018), 5; Uday S. Mehta, “The Social Question and the Absolutism of Politics,” 2010, <a href="<a href="<a href="source">source">source">source">source; Hannah Arendt, On Revolution (New York, NY: Viking Press, 1965).
- Sunil Khilnani, The Idea of India (New Delhi: Penguin, 2004).
- Kalpana Kannabirān, Tools of Justice: Non-Discrimination and the Indian Constitution (New York, NY: Routledge, 2012), 7.
- B. R. Ambedkar is a neglected character in India’s political history. His ideas have received little attention compared with more widely known figures M. K. Gandhi and Jawaharlal Nehru, in part because of the Congress Party’s dominant role in shaping India’s national story, and the contours of democratic politics after independence. See Valerian Rodrigues, “Justice as the Lens: Interrogating Rawls through Sen and Ambedkar,” Indian Journal of Human Development 5, no. 1 (2011): 153–174; Jean Drèze and Amartya Sen, “Democratic Practice and Social Inequality in India,” Journal of Asian and African Studies 37, no. 2 (2002): 6–37; Martha Nussbaum, “India: Implementing Sex Equality through Law,” Chicago Journal of International Law 2, no. 1 (2001): 35–58.
- Kannabirān, Tools of Justice, 162.
- Patterns of domination, which produce these persistent inequalities in the political and economic spheres, have two effects. First, they undermine the liberty of each individual to benefit from an effective and competent use of their powers. Democracy entailed political equality. Political equality entailed the absence of domination. Second, patterns of domination undermine the possibility of free association. Drawing on John Dewey, Ambedkar argued that free association – the capacity of groups to form links, to self-govern over time – was essential to democratic life. Democracy is not merely a form of government. It is primarily a mode of associated living, of conjoin communicated experience. It is essentially an attitude of respect and reverence towards fellow men. Patterns of domination made impossible the associations and relationships that encouraged and embodied this attitude of respect and reverence.B.R. Ambedkar, Annihilation of Caste: The Annotated Critical Edition, ed. S. Anand (New Delhi: Navayana, 2014), 280, 261.
- Béteille, Guha, and Parry, Institutions and Inequalities, 342.
- V. R. Krishnaiyer, Akhil Bharatiya Soshit Karamchari Sangh and Others vs. Union Of India, No. 185 (Supreme Court of India November 14, 1980).
- J B. Sudershan Reddy, Indian Medical Association vs. Union Of India & Ors, No. 8170 (Supreme Court of India May 12, 2011).
- Deepti Shenoy, “Courting Substantive Equality: Employment Discrimination Law in India,” University of Pennsylvania Journal of International Law 34, no. 3 (2013): 632.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 20190210, <a href="<a href="<a href="source">source">source">source">source.
- The Personal Data Protection Bill; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” 8.
- De, A People’s Constitution; Béteille, Guha, and Parry, Institutions and Inequalities; Khilnani, The Idea of India.
- This is precisely the challenge that Jack Balkin, who first coined the data fiduciary concept, warned about. Balkin, “Information Fiduciaries and the First Amendment,” 1232–1324.
- As André Béteille argues, institutional well-being is an important consideration. He describes this as equality as a matter of policy, not of right, warning against placing too much faith specifically in the state to eliminate every social inequality, every difference of caste or class. Béteille, Anti-Utopia, 435.
- Joshua A. Kroll et al., “Accountable Algorithms,” University of Pennsylvania Law Review 165, no. 3 (2017): 633–705; Andrew Tutt, “An FDA for Algorithms,” Admin. L. Rev. 83 (2016); Jeremy Waldron, “Accountability: Fundamental to Democracy,” SSRN Scholarly Paper (Rochester, NY: Social Science Research Network, April 1, 2014), <a href="<a href="<a href="source">source">source">source">source; Craig T. Borowiak, Accountability and Democracy: The Pitfalls and Promise of Popular Control (Oxford University Press, 2011); Adam Przeworski, Susan Carol Stokes, and Bernard Manin, Democracy, Accountability, and Representation (Cambridge: Cambridge University Press, 1999).
- “World Metro Figures Statistics Brief,” UITP, accessed April 29, 2019, <a href="<a href="source">source">source">source; Global BRT Data, “Global BRT Data,” accessed April 29, 2019, <a href="<a href="source">source">source">source.
- Autorickshaws are three-wheeled vehicles that supply much of the last-mile connectivity to mass transit in Indian cities.
- Candace Brakewood, Gregory Macfarlane, and Kari Watkins, “The Impact of Real-Time Information on Bus Ridership in New York City,” Transportation Research Part C: Emerging Technologies, 53 (April 2015): 59-75.; Eric Jaffe, “The Best Evidence Yet That Real-Time Arrival Info Increases Transit Ridership,” CityLab, accessed Feb. 20, 2019, <a href="<a href="source">source">source">source.
- Aaron Antrim and Sean Barbeau, “The Many Uses of GTFS Data- Opening the Door to Transit and Multimodal Applications,” ITS America’s 23rd Annual Meeting & Exposition, April 2013, <a href="<a href="source">source">source">source; Transit Center, “The Data Transit Riders Want “A Shared Agenda for Public Agencies and Transit Application Developers,” accessed Feb. 16, 2019, <a href="<a href="source">source">source">source.
- “Open Government Partnership,” Open Government Partnership, accessed Jan. 28, 2019, <a href="<a href="source">source">source">source.
- “WRI India,” WRI India, accessed January 28, 2019, <a href="<a href="source">source">source">source.
- KMRL signed a Memorandum of Understanding (MOU) with WRI in February of 2017, which included several initiatives to support urban transport and urban development, including public transport, transit oriented policy, electric mobility, and urban planning in Kochi.
- Available at: <a href="<a href="source">source">source">source
- The GPS installation was paid for by the Urban Mass Transit Company Limited (UMTC), a joint venture of several national and state government agencies and the private company Infrastructure Leasing and Financial Services Limited (IL&FS).
- “Kochi Metro Rail Limited signs pact with auto drivers,” Deccan Chronicle, Jan. 24, 2018, <a href="<a href="source">source">source">source.
- In Hindi, “Chalo” means “Let’s Go!”
- “Demographia World Urban Areas,” Demographia, April 2019, <a href="<a href="source">source">source">source
- G.P. Hari, Personal Interview, Kochi, Feb. 11, 2019.
- “Kochi gets Chalo app for live tracking of buses, ferries,” The Hindu, accessed Jan. 28, 2019, <a href="<a href="source">source">source">source.
- Aparna Vijaykumar, Personal Interview, Online, March 5, 2019.
- Arjun G., “Delhi Government launches Open Transit Data Platform for Buses,” Medium, accessed Jan. 28, 2019, <a href="<a href="source">source">source">source; Open Data Portal available at: <a href="<a href="source">source">source">source
- Pravesh Biyani, Personal Interview, New Delhi, Feb. 14, 2019.
- Ibid.
- Ibid.
- “PoochhO,” Delhi Integrated Multi-modal Transit System, accessed Feb. 15, 2019, <a href="<a href="source">source">source">source.
- Samir Sharma, Personal Interview, New Delhi, Feb. 15, 2019.
- Ibid.
- Pravesh Biyani, Personal Interview, New Delhi, Feb. 14, 2019.
- Nikhil V.J., “Re: [datameet] – Open Transit Data – Delhi,” Email, 2019.
- “BMTC to open up transit data enabling entrepreneurs build mobility solutions.” Economic Times. <a href="<a href="source">source">source">source; “BMTC’s data-sharing plan on back burner,” The Hindu, accessed Feb. 4, 2019, <a href="<a href="source">source">source">source; Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="<a href="source">source">source">source.
- ET Bureau, “BMTC to open up transit data enabling entrepreneurs build mobility solutions,” Economic Times. <a href="<a href="source">source">source">source.
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="<a href="source">source">source">source.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="<a href="source">source">source">source.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- Tejas Pande, Personal Interview, New Delhi, Feb. 9, 2019;Vinay Sreenivasa, Personal Interview. Online, March 7, 2019; Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Ibid.
- “BMTC,” Bangalore Municipal Transport Corporation, accessed Feb. 20, 2019, <a href="<a href="source">source">source">source.
- Ibid; Tanushree Dev Barma, Personal Interview, Bangalore, March 5, 2019.
- S. Rajagopalan, Personal Interview, Bangalore, March 5, 2019.
- BMTC Data Sharing Policy Draft (July, 2018), Bangalore: Bangalore Municipal Transit Corporation, 2018.
- S. Rajagopalan, Personal Interview, Bangalore, March 5, 2019.
- Ibid.
- BMTC Data Sharing Policy Draft (July, 2018). Bangalore: Bangalore Municipal Transit Corporation, 2018.
- Srinivas Kodali, “BMTC Intelligent Transportation System (ITS) and Need for Open Transport Data,” Data Meet, accessed Jan. 28, 2019, <a href="<a href="source">source">source">source .
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="<a href="source">source">source">source
- Vinay Sreenivasa, Personal Interview, Online, March 7, 2019.
- Yunus Y. Lasania, “Telangana’s ‘open data’ policy to help start-ups address public issues,” LiveMint, accessed March 15, 2019, <a href="<a href="source">source">source">source
- Telangana Open Data Policy 2016, Hyderabad, Telangana: Government of Telangana, accessed March 15, 2019, <a href="<a href="source">source">source">source
- Ibid.
- Yunus Y. Lasania, “Telangana’s ‘open data’ policy to help start-ups address public issues,” LiveMint, accessed March 15, 2019, <a href="<a href="source">source">source">source
- “Background,” Factly, accessed Feb. 18, 2019, <a href="<a href="source">source">source">source
- Anant Maringanti, Personal Interview, Hyderabad, March 6, 2019.; Harsha Devulapalli and Girish Agrawal, “Mapping bus transit services in Hyderabad – an illustrative example of the use of open geospatial data,” Transportation Research Procedia. 25 (201): 4196-4206.
- Surya Kandukuri, Personal Interview, Hyderabad, March 6, 2019.
- Vishal Ramprasad, Personal Interview, Mumbai, Feb. 12, 2019.
- Srya Kandukuri, “Notes from our conversation,” Email, 2019.; Surya Kandukuri, Personal Interview, Hyderabad, March 6, 2019.
- Ibid.
- Aaron Antrim and Sean Barbeau, “The Many Uses of GTFS Data- Opening the Door to Transit and Multimodal Applications,” ITS America’s 23rd Annual Meeting and Exposition, April 2013, <a href="<a href="source">source">source">source
- Harsha Devulapalli and Girish Agrawal, “Mapping bus transit services in Hyderabad – an illustrative example of the use of open geospatial data,” Transportation Research Procedia, 25 (201): 4196-4206.
- Anumita Roychowdhury, Gaurav Dubey, Anu Soman, Waiting for a Bus: Strategies to improve Delhi’s bus system. (New Delhi: Centre for Science and Environment, 2017).
- Ibid.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- In many cases, transit operators do not make a system map or timetable available. Data can be used to provide these more analog solutions in order to meet the information needs of riders who do not possess smartphones or do not access transit data in an online format. Other technologies may prove useful to encompass groups of people who might not use smartphones, such as text or voice-based services.
- Open Government Data Platform India, “National Data Sharing and Accessibility Policy,” accessed Jan. 28, 2019, <a href="<a href="source">source">source">source
- “Open Government Data Platform India,” Open Government Data Platform India, accessed Jan. 28, 2019, <a href="<a href="source">source">source">source
- Mohd Ujaley, “Countries to Ride on India’s Open Government Data Platform,” Express Computer, <a href="<a href="source">source">source">source
- Simonti, Chakraborty, “Open Data Policy of the Government of India: What has it achieved?” CBG India, <a href="<a href="source">source">source">source
- Joel Gurin, Personal Interview, Online, March 1, 2019.
- Mark Headd, “New Thinking in How Governments Deliver Services,” in Beyond Transparency, ed. Brett Goldstein with Lauren Dyson. (San Francisco: Code for America Press, 2013): 278-9.
- Rajarshi Sahai, “Going Public with Public Transport Data For Public: Dilemmas of Developing Cities,” accessed Jan. 28, 2019, <a href="<a href="source">source">source">source
- “National Urban Innovation Stack: Strategy and Approach,” New Delhi, India: Ministry of Housing and Urban Affairs, Government of India, 2019, accessed Feb. 8, 2019, <a href="<a href="source">source">source">source
- “DataSmart Cities: Empowering Cities through Data,” Ministry of Housing and Urban Affairs, Government of India, <a href="<a href="source">source">source">source
- “We Continue to Create an Open Data Culture,” Makaia, accessed March 5, 2019, <a href="<a href="source">source">source">source
- “National Urban Transport Policy (2006),” New Delhi, India: Ministry of Urban Development, Government of India, 2006. <a href="<a href="source">source">source">source
- “National Urban Transport Policy (2014),” New Delhi, India: Ministry of Urban Development, Government of India, 2014. <a href="<a href="source">source">source">source
- “National Urban Transport Policy,” New Delhi, India: Ministry of Urban Development, Government of India (2006), <a href="<a href="source">source">source">source
- Ibid.
- GP Hari, Personal Interview, Kochi, Feb. 11, 2019.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Harshith Gokulendra, Personal Interview, New Delhi, March 1, 2019.
- O.P. Agarwal, Personal Interview. New Delhi, March 1, 2019.
- Srinivas Kodali, Personal Interview, New Delhi, Feb. 5, 2019.
- Rajarshi Sahai, Personal Interview, Online, Jan. 30, 2019.
- Available at: <a href="<a href="source">source">source">source
- Kunal Kumar, “Building National Urban Innovation Stack for Indian Smart Cities Mission – Technologies and Financing Model,” (Panel presentation, Smart Republic Conference, New Delhi, India, Feb. 27-28, 2019).
- Srinivas Kodali,. Personal Interview. New Delhi, Feb. 5, 2019.
- Samir Sharma, Personal Interview. New Delhi, Feb. 15, 2019.
- GP Hari, Personal Interview, Kochi, Feb. 11, 2019.
- Vishal Ramprasad, Personal Interview, Mumbai, Feb. 12, 2019.
- Harsha Krishna, Personal Interview. Bangalore, March 4, 2019;Vipassana Vijayarangan, Personal Interview, Online, Jan. 15, 2019.
- “National Urban Transport Policy,” New Delhi, India: Ministry of Urban Development, Government of India, 2006, <a href="<a href="source">source">source">source.
- Don Tapscott, “2018 Regulation Roundtable: Addressing the Regulatory Challenges of Disruptive Innovation,” Summary of 10 May 2018 Proceedings held at KPMG Toronto, Blockchain Research Institute, Aug. 8 2018.
- Warren Davidson, R-OH, "Text – H.R.7356 – 115th Congress (2017-2018): Token Taxonomy Act." Congress.gov. December 20, 2018, accessed April 14, 2019, <a href="source">source">source.
- U.S. Securities and Exchange Commission, “Ponzi Schemes Using Virtual Currencies,” July 23, 2017, <a href="source">source">source
- The DAO is one example of a Decentralized Autonomous Organization, which is a term used to describe a “virtual” organization embodied in computer code and executed on a distributed ledger or blockchain.
- U.S. Securities and Exchange Commission, “Report of Investigation Pursuant to Section 21(a) of the Securities Exchange Act of 1934: The DAO,” July 25, 2017, <a href="source">source">source
- Lester Coleman, "SEC Subpoenas 80 Cryptocurrency Firms," CCN, March 04, 2018, accessed May 16, 2019. <a href="source">source">source.
- Nikhilesh De, "SEC Again Delays Decision on Bitwise Bitcoin ETF Approval," CoinDesk, May 15, 2019. accessed May 16, 2019, <a href="source">source">source.
- U.S. Securities and Exchange Commission, Fintech Finhub, "Framework for “Investment Contract” Analysis of Digital Assets," April 3, 2019, accessed April 14, 2019, <a href="source">source">source.
- The Howey Test is the standard methodology, put in place by the U.S. Supreme Court to determine whether a transaction is an example of an "investment contract,” i.e., a security. It derives from a 1946 case, SEC v. W.J. Howey Co., a lawsuit involving the Howey Company of Florida. In the context of blockchain tokens, the Howey test can be expressed as three independent elements: (1) An investment of money, (2) in a common enterprise, (3) with an expectation of profits predominantly from the efforts of others.
- "A New Commissioner at America's Main Securities Regulator Causes a Buzz," The Economist, Nov. 08, 2018, accessed April 14, 2019, <a href="source">source">source.
- Stan Higgins, "The SEC Just Appointed Its First-Ever Crypto Czar," CoinDesk, June 04, 2018, accessed April 14, 2019, <a href="source">source">source.
- Detailed in the next section, LabCFTC is a pioneering regulatory model in dealing with fintech innovations
- Stephan O'Neal, “SEC Launches FinHub to Communicate With Industry, But What Does It Have to Say?" Cointelegraph, Feb. 13, 2019, accessed April 14, 2019, <a href="source">source">source.
- Yogita Khatri, "The SEC Wants to Hire a 'Crypto Securities' Advisor," CoinDesk, April 01, 2019, accessed April 14, 2019, <a href="source">source">source.
- Commodity Futures Trading Commission, “An Introduction to Virtual Currency,” 2017, <a href="source">source">source.
- Khatri, Yogita, "CabbageTech CEO Indicted in New York for Defrauding Crypto Investors," CoinDesk, March 27, 2019, accessed April 14, 2019, <a href="source">source">source.
- Chris Giancarlo, "CFTC Chairman Chris Giancarlo,” DC Blockchain Summit 2019, Georgetown University, Washington, D.C., March 6, 2019.
- Daniel Gorfine (Director, LabCFTC), personal interview, Washington, D.C., April 2019.
- Daniel Gorfine, "Podcasts." Commodity Futures Trading Commission, accessed April 14, 2019. <a href="source">source">source.
- Commodity Futures Trading Commission, "Request for Input on Crypto-asset Mechanics and Markets." December 11, 2018, accessed May 12, 2019, <a href="source">source">source.
- United States Financial Crimes Enforcement Network, Department of Treasury, Guidance: Application of FinCEN’s Regulations to Persons Administering, Exchanging, or Using Virtual Currencies, FIN-2013-G001, March 18, 2013, <a href="source">source">source.
- Peter Van Valkenburgh, "FinCEN Raises Major Licensing Problem for ICOs in New Letter to Congress," Coin Center, March 6, 2018, accessed May 12, 2019, <a href="source">source">source.
- Timothy Spangler and Robert J. Rhatigan. "FinCEN Warns That Virtual Currency Activities Are Subject to Anti-Money Laundering Obligations," Lexology, April 03, 2018, accessed April 14, 2019, <a href="source">source">source.
- FinCEN, "Advisory on the Iranian Regime’s Illicit and Malign Activities and Attempts to Exploit the Financial System," FIN-2018-A006, October 11, 2018, accessed April 14, 2019, <a href="source">source">source Advisory FINAL 508.pdf.
- Internal Revenue Service, "Notice 2014-21," March 2014, accessed April 14, 2019, <a href="source">source">source.
- "Tax Treatment of Cryptocurrency Hard Forks for Taxable Year 2017," American Bar Association to Internal Revenue Service, March 19, 2017, Washington, D.C.
- "IRS Treatment of Virtual Currencies," U.S. House of Representatives Committee on Ways and Means to Internal Revenue Service, Sept. 19, 2018, Washington, D.C. <a href="source">source">source.
- Steven T. Mnuchin and Craig S. Phillips, “A Financial System That Creates Economic Opportunities Nonbank Financials, Fintech, and Innovation,” U.S. Department of the Treasury, July 2018. <a href="source">source">source.
- Craig S. Phillips "Fireside Chat with Counselor Craig Phillips, U.S. Dept. of the Treasury," Speech at the D.C. Blockchain Summit 2019, Georgetown University, Washington, D.C., March 6, 2019.
- Statement of Jennifer Shasky Calvery, Director, Financial Crimes Enforcement Network, United States Department of the Treasury (2013) (testimony of Jennifer Shasky Calvery).<a href="source">source">source.
- Ibid.
- "Virtual Currency Business (BitLicense)," New York Department of Financial Services, 2015. <a href="source">source">source.
- Patrick Murck, (Partner, Cooley LLP), personal interview, March 2019.
- Marco Santori and Maria Vullo, "Legal Tender? The Regulation of Cryptocurrencies," June 7, 2018, accessed April 14, 2019, <a href="source">source">source.
- Anonymous New York venture capitalist in blockchain, personal interview, March 2019.
- Gage Lathrop and Dale Werts, "Blockchain and Cryptocurrency: State Law Roundup," JD Supra, July 10, 2018, accessed April 14, 2019, <a href="source">source">source.
- Long, Caitlin, "What Do Wyoming's 13 New Blockchain Laws Mean?" Forbes, April 08, 2019, accessed April 14, 2019, <a href="source">source">source.
- Caitlin Long (Co-Founder, Wyoming Blockchain Coalition), personal interview, Feb. 2019.
- Multiple start-up founders and business strategy leads (anonymous), personal interview, April 2019, Seattle.
- Greg Heuss (Managing Partner, Counterpoint Ventures), personal interview, April 2019, Seattle, Washington.
- Multiple start-ups (anonymous), interview by the author, April 2019, Los Angeles and San Francisco, California.
- David Otto (Founder and Managing Partner, Martin Davis PLLC), personal interview, April 2019, Seattle, Washington.
- Multiple start-ups and Venture Capitalists (anonymous), interview by the author, April 2019, Los Angeles and San Francisco, California.
- The SEC, as well as the securities laws it enforces, have come under bipartisan criticism from academics, entrepreneurs, investors, and members of Congress for creating red tape that makes it difficult both for entrepreneurs to raise capital in the public markets and for investors to find wealth-building opportunities. This concern prompted Congress to pass regulatory relief overwhelmingly in the Jumpstart Our Business Start-ups (JOBS) Act, which was signed by President Obama in 2012. In 2018, the U.S. House of Representatives passed a bill allowing further relief, the Jobs and Investor Confidence Act. The JOBS Act eased some burdens on entrepreneurs by exempting small and “emerging growth” companies from some of the costly burdens of securities laws like the Sarbanes-Oxley Act of 2002 and the Dodd-Frank Act 2010.For further reference: John Berlau, "Cryptocurrency and the SEC's Limitless Power Grab," Competitive Enterprise Institute, April 11, 2019, accessed April 14, 2019, <a href="source">source">source.
- Multiple venture capitalists, interviewed by author, Feb./Apr. 2019, New York, Seattle, San Francisco.
- John M. Carey, Legislative Voting and Accountability, Cambridge Studies in Comparative Politics (Cambridge University Press, 2009), ix.
- This expectation was, in some part, because of the way I had seen the voting records of American members of Congress being used to discuss their past positions on legislative matter, as well as to examine the linkages between the funding they received and the positions they espoused.
- Rule 246, “Rules of Procedure and Conduct of Business in the Council of States (Rajya Sabha),” August 2016, source">source; and Rule 364, “Rules of Procedure and Conduct of Business in Lok Sabha,” April 2014, source">source.
- “Constitution of India,” 1950, source">source.
- For the sake of brevity, the term “Speaker” shall be used to cover both the Speaker of the Lok Sabha as well as the Chairman of the Rajya Sabha.
- A head-count is not seen as a “division” under the Rules of Procedures of the Lok Sabha and the Rajya Sabha, even though votes are counted.
- This was increased from 2½ minutes in 1989 (Lok Sabha) and 2006 (Rajya Sabha).
- It was in 1956-57 that the Indo-German Trade Centre was contracted to install ‘automatic vote recording equipment,’ i.e., voting machines, manufactured by Telefonbau und Normalzeit G.M.B.H. of Frankfurt, West Germany, in both the Lok Sabha as well as the Rajya Sabha. Incidentally, this contract led to what was the first ruling on parliamentary privilege within the Rajya Sabha, and the second in the Lok Sabha in relation to a case before the Election Tribunal and the Calcutta High Court on disqualification of a member. See, Rajya Sabha Committee on Privileges, “First Report,” May 1958, source">source; Lok Sabha Committee on Privileges, “Second Report,” April 1958, source">source; and Brojo Gopal Das v. Kalipada Banerjee, January 1959, source">source. Given that the equipment did not have any means of the MP authenticating herself (unlike the machine used in the U.S. House of Representatives), that necessitated the allocation of specific seats to each member, which had not been fixed (except the reservation of a few rows for government ministers) until then. As a book on Indian parliamentary procedure notes, “each member is now allotted a fixed seat from where he has to address the House unless it otherwise directed by the Chair, and at the time of a division he has to record his vote by operating the apparatus fixed to his seat.” MN Kaul and SL Shakdher, Practice and Procedure of Parliament, 3rd ed., vol. 1 (Metropolitan Book Co., 1979), source">source; this is also encapsulated in the Lok Sabha Rules of Procedure. Rule 349(vii), “Rules of Procedure and Conduct of Business in Lok Sabha”
- India Const., art. 368(2).
- India Const., arts. 61(2)(b) and 61(4).
- India Const., art. 124(4).
- India Const., art. 244A(3).
- India Const., art. 249.
- India Const., art. 312.
- India Const., art.352(6).
- India Const., arts. 55(3) & 66(1).
- U.S. Const., art. I, . 5, cl. 3.
- Elizabeth Rybicki, “Voting and Quorum Procedures in the Senate,” (Congressional Research Service, August 2013), 5.
- Rybicki, 5.
- “Divisions,” UK Parliament, accessed 10 March 2019, source">source
- Ibid.
- Shalaka Patil, “Push Button Parliament – Why India Needs a Non-Partisan, Recorded Vote System,” Anuario Colombiano de Derecho Internacional 4 (2011): 182, source">source.
- Carey, Legislative Voting and Accountability, 166.
- Carey, 166.
- Whips can be the letter that are issued by a senior functionary of a political party, issuing directions to the members of that party in parliament—usually directing them to vote in a particular manner on a motion, to abstain from voting, or even to just attend a particular session of parliament. The term can also be used to describe the privilege of belonging to a political party; thus when an MP’s whip is removed, that MP is expelled from the party, until that MP’s whip is restored. Finally, the term can also be used to describe the senior political party functionaries whose job it is to issue and remove whips, and otherwise ensure cohesion among their fellow party members. Whips are statutorily recognized in multiple parliaments, and draw salaries from the public exchequer as well in countries like India and the U.K.
- R. Eric Petersen, “Parliament and Congress: A Brief Comparison of the British House of Commons and the U.S. House of Representatives,” 2005, 4, source">source.
- Petersen, 4.
- The law allows for disqualification if there is “voluntarily giving up of seat” or if an MP “votes or abstains from voting in such House contrary to any direction issued by the political party to which he belongs or by any person or authority authorized by it in this behalf, without obtaining, in either case, the prior permission of such political party, person or authority and such voting or abstention”. There are limited circumstances in whips may not be issued, namely in the election of presidents and vice-presidents.
- Kihoto Hollohan v. Zachillhu, 1992 SCR (1) 686. The court noted that, “there are certain side effects and fall out which might affect and hurt even honest dissenters and conscientious objectors, but these are the usual plus and minus of all areas of experimental legislation.”
- Ibid.
- Mannadi Satyanarayan Reddy v. Andhra Pradesh Legislative Assembly and Others, 2009 (3) ALT 32.
- David Beetham, Parliament and Democracy in the Twenty-First Century: A Guide to Good Practice (Inter-Parliamentary Union, 2006), 96, source">source.
- Beetham, 96.
- The situation before 1972-73 when the U.S. House of Representatives moved to electronic voting was described by the Clerk of the House: “Voting in the House was something of a mystery, unless you were present in the chamber when the roll was called, and attentive to the Members’ responses, and then, of course, people in the gallery then, as now, could not take notes. You did not know until the next day when the vote was recapitulated in the Congressional Record how the Members individually had voted.” – Donnald K. Anderson, Clerk of the U.S. House of Representatives (2006)
- Patil, “Push Button Parliament – Why India Needs a Non-Partisan, Recorded Vote System,” 170–72.
- Simon Hug, Simone Wegmann, and Reto Wüest, ‘Parliamentary Voting Procedures in Comparison’, West European Politics 38, no. 5 (September 2015): 943, source">source.
- Patil, “Push Button Parliament – Why India Needs a Non-Partisan, Recorded Vote System,” 171.
- Varghese K. George, “Voice Vote Valid Only When Nobody Questions It,” The Hindu, November 2014, source">source.
- Anusha Ondaatjie and Iain Marlow, “No Confidence in New PM, Sri Lanka Lawmakers Tell Parliament,” Bloomberg, accessed 29 April 2019, source">source.
- See Hug, Wegmann, and Wüest,”Parliamentary Voting Procedures in Comparison.”
- For this to happen, it ought to be taken up by the Rules Committee of either house, and a change recommended. Thereupon, the rules of procedure of the Lok Sabha and the Rajya Sabha should be amended by each house. While the lack of a clear rule is not a bar for this practice to be implemented, it would give it a more binding character if it found expression in the rules of procedure. As a start, though, it would be judicious for political parties to start publicly documenting every whip they issue (whether one-line, two-line, or three-line whips) on their website.
- Patil, “Push Button Parliament — Why India Needs a Non-Partisan, Recorded Vote System,” 191.
- Patil, 192.
- MPs have at least four distinct kinds of duties: (1) Legislative and deliberative: MPs debate, draft, and pass statutes, they amend or reject subordinate legislation promulgated by the Executive; (2) Oversight: they exercise budgetary oversight, participate in committees that examine the workings of the government, and have powers to conduct special investigations via “joint parliamentary committees,” fell governments through “no-confidence motions,” impeach the President, approve or disapprove declarations of emergency, and interrogate the functioning of the government through a variety of means [Question Hour, Calling Attention Motion, etc.], and impeach judges of constitutional courts; (3) Elective: they vote for the elections for the president and vice-president of India (apart from parliamentary functionaries such as the Speaker of the Lok Sabha, etc.; (4) Representative: MPs represent their political parties, and represent their constituents by raising issues relevant to their constituents in Parliament [or in parliamentary committees and processes], by aiding their constituents in communicating with governmental bodies and getting their concerns heard by the government and local bodies, and recommending specific developmental projects be undertaken in their constituency and providing the funding for that through the MPLAD fund.
- Lok Sabha Secretariat, “Resumé of Work Done by Lok Sabha: 16th Lok Sabha, 13th Session,” February 2018, 32–33, source">source.
- MP’s Reports, Dr. Shashi Tharoor’s Official Website, 2019, source">source. MP Shashi Tharoor has been leading the way, having issued such reports since his first term from 2009-2014. Instructively, in his latest end-term report covering 2014-2019, he only dedicates two sections for work within the Lok Sabha and a Standing Committee, while eleven sections are dedicated to work outside of Parliament.
- Manju Jain, “Delivering Parliamentary Library and Research Services in an Interconnected World: The Case of the Parliament of India,” IFLA – Library and Research Services for Parliaments, September 2016, source">source.
- Rajya Sabha Secretariat, ‘Rajya Sabha Annual Report 2017’, 2017, source">source.
- Empirical research for this paper would have been aided greatly if Parliamentary debates were available in a structured format such as Akoma Ntoso.
- There are many definitions of open standards, but for the purposes of this section I mean that it has been standardized by a committee with open participation and an open process, and is available for free, and may be implemented in free/libre/open source software without payment of any royalties.
- Ashok Hariharan, interview by author, March 2019.
- John Sheridan and Jim Mangiafico, ‘Structure-Aware Search of UK Legislation’, in XML London 2016 Conference Proceedings (London, United Kingdom: XML London, 2016), 78–81, source">source.
- ‘AT4AM.eu’, AT4AM.eu, accessed 30 January 2019, source">source.
- “U.N. Semantic Interoperability Framework for Normative and Parliamentary Documents (UNSIF) | United Nations System Chief Executives Board for Coordination,” United Nations System, accessed 16 April 2019, source">source. The blog post on this notes: ‘The adoption of [the UN Semantic Interoperability Framework] has put the foundations for the establishment of a UN-wide ecosystem of machine-readable documents that will foster collaboration and reduce costs in information management across the system by transforming the web of information enclosed in traditional word processing documents into a web of data that can be interpreted by computers to create innovative services. By having documents available in a common semantically rich format will raise dramatically the UN capacity to coordinate activities, create synergies and respond to clients’ information demands, improve the efficiency and quality of information processing, dissemination and accessibility, and bring significant benefits in terms of governance, accountability and transparency.”
- “Indigo Platform for Publishing Beautiful Legislation: Laws-Africa/Indigo’ (Laws.Africa, March 2019), source">source.
- Nyaaya, “Laws of India in Akoma Ntoso XML format,” source">source.
- Union of India v. Vansh Sharad Gupta, W.P. (C) 4761/2016, order dated May 25, 2017, source">source.
- Union of India v. Vansh Sharad Gupta, W.P. (C) 4761/2016, order dated December 15, 2017, source">source.
- Chakshu Roy, “Budgeting for Democracy,” The Indian Express, February 2017, source">source.
- Ashok Hariharan, interview with author, March 2019. Hariharan.’
- Hariharan.
- Hariharan.
- Beetham, Parliament and Democracy in the Twenty-First Century, 7.
- Ministry of Civil Aviation, Government Announces Regulations for Drones, New Delhi, India: Press Information Bureau, Government of India, August 27, 2018, source; Gill, Prabhjote, “Flying Drones are Finally Legal in India.,” Business Insider, August 29, 2018, source.
- For a discussion on how unmanned aerial vehicles or commercial drones are being utilized in some of the core public sectors and allowing civilian uses of aerial monitoring, see: Padmanabhan, Ananth, “Civilian Drones and India’s Regulatory Response,” Carnegie India, March 10, 2017, source.
- “Cleared for Take-Off: India Ready for the Drone Revolution, Pilots New Open Source Guide for Governments,” World Economic Forum, January 25, 2019, source.
- FE Bureau, “India’s Drone Market Expected to Grow $885.7 mn by 2021,” Financial Express, October 8, 2018, source.
- Mallapur, Chaitanya, “India Tops List of Drone-Importing Nations,” Business Insider, May 4, 2015, source.
- Panda, Ankit, “US Approves Sale of Armed Predator-B Drones to India,” The Diplomat, May 2, 2018. source.
- Pamela Cohn, Alastair Green, Meredith Langstaff, and Melanie Roller, “Commercial Drones are Here: The Future of Unmanned Aerial Systems”, McKinsey Report, December 2017, source
- Pamela Cohn, Alastair Green, Meredith Langstaff, and Melanie Roller, “Commercial Drones Are Here: The Future of Unmanned Aerial Systems,” McKinsey Report, December 2017, source.
- “Drone Certification: A Step-by-Step Guide to FAA Part 107 for U.S. Commercial Drone Pilots,” UAV Coach, source.
- Dukowitz, Jack, “ISO Releases Draft of First International Drone Standards for Public Comment,” UAVCoach. November 30, 2018, source.
- Government. Ministry of External Affairs. Responding First as a Leading Power. source
- Kuronuma, Yuki. ‘Drones Help Rescue Efforts in Nepal.’ Nikkei Asian Review. May 11, 2015. source
- Parmar, Tekendra, “Drones in India,” Center for the Study of the Drone. December 4, 2014. source.
- Rossow, Richard M. and C. Raja Mohan, Deepening India-U.S. Cooperation on Humanitarian Assistance and Disaster Relief in the Indian Ocean and the Asia-Pacific Regions, CSIS, Wadhwani Chair in U.S.-India Policy Studies, October 2015. source.
- Mehta, Aaron, “US, India Collaborating on Air-Launched Drone,” Defense News, March 18, 2019, source
- “Building Cargo Drone Expertise in Papua New Guinea,” iRevolutions, February 25, 2019, source.
- “Is China at the Forefront of Drone Technology?”, CSIS ChinaPower, May 29, 2018, source
- Das, Pranab K, “The Customs Paradigm in Combatting Weapons of Mass Destruction,” Ministry of Finance, Government of India. source.
- Ministry of Civil Aviation. Operations of Remotely Piloted Aircraft System (RPAS) to be Enabled through Digital Sky Platform, Press Information Bureau, August 27, 2018. source
- Mathews, Neelam, “India Struggles With Drone Issues.” AINOnline, February 17, 2016, source
- For a detailed discussion on the various challenges to bolster the commercial drone sector in India, see “Make in India for Unmanned Aircraft Systems: Awaiting its Kitty Hawk Moment,” FICCI and EY, source
- Rice, Stephen, “Eyes in the Sky: The Public has Privacy Concerns About Drones”, Forbes, February 4, 2019, source
- A doorstep delivery would entail collection of customer data at levels which would be considered private such as residence address, timings for deliveries among other detailed information on customers.
- Lohn, Andrew J, Gulden, Timothy R. Xu, Jia. Jones, Therese, Kuhn, Kenneth, Welser IV, William. “What’s in Store for Commercial Delivery Drones,” Rand Research Brief, source
- Lohn, Andrew J, Gulden, Timothy R. Xu, Jia. Jones, Therese, Kuhn, Kenneth, Welser IV, William. “What’s in Store for Commercial Delivery Drones,” Rand Research Brief, source
- ET Bureau, “Drones: Out of Sight, but in Indian Govt’s Mind,” Economic Times, January 16, 2019, source
- Isaak, Adam “With More Drones in the Sky Every Year, ‘Counter-Drone’ Tech Can Keep the Bad Ones at Bay”, CNBC, February 2, 2019, source
- Chang, Lulu “FBI Rescue Hostage Team Bamboozled After Criminals Unleash Drone Swarm”, Digital Trends, May 4, 2018, source
- Brennan, David. “Why are Militants Using Drones? UAV Weapons Have Spread Far Beyond Nation States,” Newsweek, April 24, 2018, source.
- “Game of Drones-Proliferated Drones,” Wargame Report, Center for New American Security, June 29, 2016, source.
- Harper, Alexander, “Drones Level the Battlefield for Extremists,” The Interpreter, April 20, 2018, source.
- Michel, Arthur H, ‘Counter-Drone Systems.’ The Center for Study of Drone, Bard College, February 2018, accessed April 26, 2019. source
- Ibid.
- Grand View Research, “Anti-Drone Market Size Worth $1.85 Billion By 2024 | CAGR: 24.1%,” accessed April 26, 2019. source
- “Why We Need Counter-Drone Technology Now More than Ever,” CNBC, February 1, 2019, source
- Federal Aviation Administration, Pilot Reports of Close Calls With Drones Soar in 2015, August 12, 2015, source
- Goglia, John,“FAA Confirms Shooting a Drone is a Federal Crime. So When Will U.S. Prosecute?” Forbes, April 13, 2016, source
- U.S. Department of Transportation, Updated Guidance on Unmanned Aircraft System (UAS) Detection and Countermeasures, Federal Aviation Agency. July 19, 2018, source
- Snead, Jason, John-Michael Seibler, and David Inserra, “Establishing a Legal Framework for Counter-Drone Technologies,” The Heritage Foundation, April 16, 2018, source
- French, Sally, “Department Of Defense Is Using SkySafe To Crack Down on Rogue Drones,” Drone Girl, July 20, 2017, source
- Peri, Dinaker, “Expanding Anti-UAVs Market to Counter Drone Technology,” CLAWS Journal, Winter 2015, source
- Ahuja, Namrata B, “Govt Plans to Deploy Anti-Drone Facilities at Airports,” The Week, March 14, 2018, source
- National Nuclear Security Administration, NNSA Deploys its First Counter-Unmanned Aircraft System, Nov. 19, 2018, source
- Horizontal technology refers to application of a technology across different sectors without much investment in R&D. An example would be e-commerce where selling a book is similar to selling a laptop.
Civic Futures 2.0: The Gamification of Civic Engagement in Cities (Subhodeep Jash)
Subhodeep Jash is a Senior Consultant with FTI Consulting Asia’s Strategic Communications Practice at New Delhi. The idea for this research stemmed from his stint with the WZB Berlin Social Science Center.
Acknowledgements: I would like to express my gratitude to Charru Malhotra, Perry Nunes, Liav Orgad and Jess Riegel for their valuable insights. I wish to express my appreciation for the kind support and guidance of Awista Ayub and Melissa Salyk-Virk at New America. Last, but not the least, I thank the entire cohort of the 2019 India-U.S. Fellows for their feedback towards refining the contours of this paper.
Executive Summary
Citizenship is a fundamentally political institution. This research focuses on the intersection of technology and active citizenship, which is a central component of a republican conception of citizenship where citizens are expected to engage in political deliberation and contribute to the common good of the community. This paper is a primer on the newer forms of civic interactions that emerge when gaming elements (such as points, badges, rankings, rewards, etc.) are introduced into a non-game setting like civic engagement. Further, it maps current trends and variations around the gamification of civic engagement. It begins with two unique use-cases from Boston (United States) and Tlalnepantla (Mexico) that illustrate how gamification can encourage greater participation in governance processes and possibly address gaps in efficiency facing democracies. Finally, the research attempts to form a typology of the various civic innovation projects in Europe and the Americas, and Subsequently, examines the broad level societal benefits and ethical challenges that arise from these interventions.
The closing section of the paper introduces the context of civic engagement in one of the world’s largest digital demos, India and what a potential for gamification in that socio-political context could imply. While this potential for gamified governance looks encouraging, its use is being examined more as a complementary tool to existing approaches surrounding citizen participation and interactions.
Pokemon Gov and “Points” of Kindness
Digital technology is increasingly used to experiment with new forms of encouraging citizen engagement. The spectrum of such experimentation ranges from chatbots that drive interactions between government officials and citizens in Jersey,458 (an island located in the English Channel), to points-based systems such as catalogues of good deeds (in Mexico) to motivate active citizenship. A common thread behind such ideas is to provide incentives that motivate civic activism, with the hope that, over time, such incentives will create a culture of communal activism. Two such salient use-cases for gamification emerging in the U.S. city of Boston and the Mexican city of Tlalnepantla are discussed hereunder that illustrate successful deployment in these new civic interactions.
Digital technology is increasingly used to experiment with new forms of encouraging citizen engagement.
In 2016, the city of Boston in the state of Massachusetts launched a spring-time campaign called “SpotHoles” as a way to encourage constituents to generate more pothole reports during the snow-melt month of March when potholes are especially prevalent. Prior to this campaign, residents could call a helpline to report such civic grievances. However, a major challenge existed within the helpline reporting system: the ability to situate these potholes within the neighborhoods.
Subsequently, the SpotHoles campaign was deployed to report potholes with better accuracy across the city by using a mobile application-based scavenger hunt akin to the augmented reality mobile game, Pokémon Go. After creating a branded campaign with associated digital assets, SpotHoles netted more than 300 percent higher citizen-reported potholes459 than the same period in the previous year. And even better, the increased reports were accompanied by an accurate location because of the mobile reporting application’s ability to geo-locate issues, allowing users to snap a picture and send a note to the city.
The success of the initiative led to a partnership between Niantic Inc., the developer of Pokémon Go and the Boston Mayor’s Office of Urban Mechanics to institute a participatory Pokémon Go initiative with school students. The initiative developed “PokéStops,”460 which provided a way of incorporating real-world locations into the game build. For example, the potential locations for PokéStops could be small parks or historic buildings. Students were asked to make short videos explaining why these locations should be included in the game. Then, a youth-led selection jury would pick the winning locations. The idea of involving citizens into this curation exercise was identified as a way to celebrate meaningful and accessible locations in the city and raise civic awareness among youth.
As another example, Tlalnepantla de Baz, a city in Mexico, suffered from low civic engagement and its residents were indifferent to neighborhood problems. There was little interest even in filing reports of criminal acts, which prevented the authorities from taking action. This indifference threatened the city’s social fabric, making citizens feel disconnected and insecure. In 2016, an initiative from the Mayor’s office461 encouraged local citizens to participate in the community by choosing a “good deed” from a catalog. Examples of good deeds included voting, assistance to the elderly, job training, first-aid courses, safety training, professional consultations, organizing cultural events, and self-employment workshops. Good deeds could be municipal, but also universal—for example, the promotion of environmental activities. Each good deed that was performed was recorded and given a score, and citizens were able to claim benefits according to their score from a parallel “Catalogue of Municipal Benefits.” Municipal benefits included bike rental and public transportation, scholarships, tickets to cultural events, and reduced municipal housing. The goal is to motivate civic activism, with the hope that, over time, such incentives will create a culture of communal activism. In the past few years, there have been suggestions to use technology to motivate more active citizenship.
The Tlalnepantla city officials were inspired by community network projects that promoted a sense of collaboration in other cities but felt that those projects were too narrowly focused. The city’s Mayor, Guillermo Alfredo Martínez González, said that the initiative led to a closer interaction among residents by promoting good deeds, and had a transformative effect on the entire society by “allowing for greater collective development, conflict resolution, stronger identity, and reconstitution of the social fabric.”462
Both these endeavors highlight how game elements such as a points based system or a scavenger hunt akin interface can reinvigorate the interactions between citizens and public policy. This paper examines a range of such similar experiments that brought about this emergence in the gamification of civic engagement.
Defining Gamified Civic Engagement
New forms of civic interactions have been driven by the incorporation of game elements (i.e. points, badges, levels, rankings, rewards) into the non-game context of citizen engagement and have created conditions for gamified civic engagement.463 In recent years, there has been a growing appeal of the gamification of civic engagement as a possible solution to reshaping participatory regimes among residents in cities similar to the cases of Boston and Tlalnepantla.
It is important to distinguish gamification from “mere games”—since the use of game mechanics does not necessarily make a product a (video-) game.464 While the main scope of games is pure entertainment, gamification is aimed at transmitting features that leverage elements of role play, story, and agency.465 According to some authors (Landers et al., 2018), this happens under three conditions:
- The perception of a non-trivial goal that can reasonably be pursued
- The desire to pursue that goal under behavioral rules that differ from the behavioral rules that one would normally apply
- The voluntary nature of the decision to pursue that goal
Background
An increasing number of cities, including a large number in the developed world, suffer from low civic participation, an absence of social solidarity, and a feeling of apathy in creating solutions to common problems. Harvard-based sociologist Robert Putnam suggests that people living in diverse but divided communities tend to “hunker down” and “withdraw from collective life”466 by placing less trust in their neighbors, including those from a similar background. As a result, they assume markedly more negative attitudes towards their local areas, vote less; volunteer less, and give less to charity. A recent report of the City of London portends an alarming development—it indicates a lack of “cross-community contact,” and a low level of active citizenship, especially among newcomers.467 The report finds this reality to be “one of the key challenges facing cities across the world” and urges the need to find solutions to encourage active citizens who “shape the decisions that affect their communities and their city” and share “a sense of rootedness and active participation in community life.”468
The OECD is one of the few public institutions that have guidelines469 on measuring trust, both interpersonal and institutional. A recent OECD study finds that only 43 percent of citizens trust their government. Trust in government is deteriorating in many OECD countries. Lack of trust compromises the willingness of citizens and business to respond to public policies and contribute to a sustainable economic recovery. Open government policies that concentrate on citizen engagement and access to information can increase public trust.
Early Use Cases
What are the earliest use-cases of gamification around civic engagement? One of the early salient cases is the ‘Howard Dean for Iowa Game’,470 the first official video game commissioned in the history of the U.S. presidential elections in 2003. Players in the game earned points for virtual sign-waving, door-to-door canvassing, and pamphleteering. The engagement for this game led to 100,000 plays before the Iowa caucus and signaled a new form of political campaigning.
Another example occurred in 2004 when the Illinois House Republicans released a game called Take Back Illinois471 designed to represent their political positions on various policy issues (such as economic development, healthcare, and education). The game was at the center of that year’s legislative electoral race. The game attained a fair degree of popularity as it received traction from online distribution channels and supported via local blogs. The game was praised for its attempt to capture political communication rhetoric in a persuasive manner.
During the lead up to Barack Obama’s presidential inauguration in 2009, his team asked American citizens to vote for whichever issue they cared about most on a platform called Change.gov. The idea was to crowdsource the highest-priority issues from American citizens.
Then, in 2016, Hillary Clinton’s presidential campaign team launched an app designed to gamify the campaign process. The application, which was inspired by the Facebook game, Farmville, offered virtual badges and real-life rewards for activities such as sharing promotional videos through social media platforms.
These scenarios all have a precise scope: to engage potential voters. Albeit, none of these three campaigns led to successful electoral outcomes for the three candidates, they did herald an innovative approach to bolster citizen engagement.
Certain experiments pertaining to gamification were seen more in a setting to provoke discussions, as seen in citizen engagement processes with SAM from New Zealand,472 where an AI chatbot simulated interaction between a virtual politician and users on Facebook messenger. All of these early engagement efforts sought to explore ways to reinvent the citizen interaction process through gamification as it offered greater motivation towards participation and a transparent mechanism to engage in governance processes.
The Landscape of Citizen Gamification
During the course of this research, 25 to 30 initiatives that attempted to gamify civic engagement were mapped. These projects were geographically diverse, spreading across Europe, North America, and Asia. Based on the mechanisms involved, the projects could be divided into two broad categories:
- Participatory decision-making: consultation/budgeting forums and crowdsourced decision-making, and
- Points-based system and community currencies.
Citizen engagement efforts employ several different “means” to achieve many different “ends.” Depending on the context, citizens can play different roles ranging from providing ideas and expertise (as with policy crowdsourcing platforms) to being representatives of specific interests (as seen with participatory budgeting and deliberative polling).473
Participatory Decision-making: Consultation and budgeting forums
Graham Smith terms “democratic innovations” as the institutions “that have been specifically designed to increase and deepen citizen participation in the political decision-making process.”474 These innovations, as per Smith, are consequential in that they represent a departure from the traditional institutional architecture of advanced industrial nation-states. Citizen assemblies, participatory budgeting forums, town halls, online citizen groups, and newer legislative forms (such as liquid democracy) would be classifiable as democratic innovations based on this taxonomy. In this regard, gamification within the context of participatory consultation and budgeting forums has seen use-cases that have boosted the participatory dimension of citizen engagement.
Ovar, a small town in Portugal, saw an impressive 25 percent of its residents turn out to vote in its first participatory budgeting campaign. A seaside town of 55,398 people, Ovar is one of the oldest municipalities in the country. The city implemented participatory budgeting as a means for the mayor, Salvador Malheiro, to connect with the citizens and better engage with young people. The program, which was allotted €100,000, used a gamification strategy with a leader board that highlighted which proposals were receiving the most votes. It also gave people both online and offline methods of voting, through either paper ballots or a website form.
In 2015, Decide Madrid,475 a platform for public participation in decision-making, was launched by the Madrid city council. Decide Madrid has four main functions: proposals and votes for new local laws; debates; participatory budgeting; and consultations. The platform allows any resident to propose a new local law that other residents can vote on to show support. Proposals that gain support from one percent of the census population are then put to a binding public vote.
A variant similar to participatory budgeting, “CrowdLaw,”476 is a participatory lawmaking process where legislative bodies can tap into new methods for unlocking the intelligence and expertise of the citizenry beyond an electoral process.
In Reykjavik, Iceland, a CrowdLaw web platform for “idea generation” and “policy crowdsourcing” allows citizens to present and discuss ideas related to the services and operations of the city of Reykjavik since 2010. The website has seen a fairly positive response as it’s been used by 20 percent of Iceland’s population.477
vTaiwan,478 an experimental e-consultation platform, was used to engage 200,000 people in crafting legislation on topics as varied as company shareholder requirements, regulating ridesharing services like Uber, internet alcohol sales, and online education. The online engagement process used a combination of an online system called “pol.is”479 and Slido, a questionnaire tool.
Points-based Systems and Community Currencies
There have been a few cities that have promoted the idea of a local civic currency towards promoting social innovation and as a means to invest in projects at a local level.480 Nu Spaarpas,481 for example, was a municipal experiment that was launched in Rotterdam in the Netherlands around 2000 to create a loyalty points-like system to incentivize sustainable and eco-friendly consumption choices. Consumers were rewarded when they engaged in behaviors such as buying green or recyclable products. These loyalty points could be redeemed for gifts such as event tickets or public transportation passes.
Cities such as Gent482 (in Belgium), Cascais483 (in Portugal), and the example of Tlalnepantla (in Mexico) have taken the lead in developing similar community currency (digital or physical) driven initiatives that foster active citizenship or sustainability-driven action.
Recently, a system of digital social credit has been offered by Andrew Yang,484 the founder of Venture for America and U.S. 2020 Democratic presidential candidate. In his view, Digital Social Credits can improve civic engagement, volunteer rates, and social interactions across the community. Credits can be gained by “participating in a town fair,” “tutoring a local student,” or “volunteering at a local shelter.”485
Points- or rating-based system can, however, present a set of technological, psychological, and ethical challenges. Who decides what is a “good deed?” What criteria is used for creating such systems? How should a city disseminate the idea or allow for registering participants or recording data? How effective are such incentives likely to be in cultivating positive habits and morals, and what can be the societal side effects?
While these challenges are not examined in this paper, the feasibility and ethical implications of scoring systems, especially in light of the bad reputation earned with the adoption of China’s Social Credit System, become pertinent for further research into the design of scoring systems. Algorithmic citizenship earned a bad reputation following the adoption of China’s Social Credit System (SCS) in 2014.486 The SCS creates a world in which one’s daily online activities are constantly monitored and evaluated to create a Citizen Score, which is publicly ranked and compared against the entire population. China’s SCS ranks citizens based on criteria such as credit history, consumption behavior, social connections, personal characteristics, and compliance with the government’s ideological framework.487 The Citizen Score affects the eligibility of citizens for basic services (mortgage, job, social benefits, etc.) and provides people with rewards (e.g., one can rent a car without a deposit or have a faster check-in experience at the airport) and punishments (e.g., restricted access to restaurants or removal of the right to travel abroad). As China looks to make this project mandatory by 2020 and its intentions with regard to big data governance systems, notwithstanding, the SCS can be conceived more like an ecosystem of initiatives sharing a similar underlying logic than a fully integrated machine for social control.
The distinction, however, is that unlike the pervasive algorithmic citizenship profiles in China that are punitive in nature, the civic experiments outlined here for cities across Europe and the Americas are largely voluntary and not developed around sanctions or any form of activities that are classified as being negative.
Impact of Gamified Systems
Benefits
What do the gamified systems mean in terms of social benefit at a local level? Gamified innovations provide novel solutions that simultaneously solve a social need and augment capabilities and relationships and improve the use of assets and resources. Social innovation models that are driven through citizen engagement lead to a greater good for society and enhance social interaction and engagement levels. It is evident that gamification can mobilize citizens effectively to participate in public decision-making. Citizen participation needs to be fun, easy and interactive. People are provided a voice and incentive towards building an engaged society with a sense of fulfilling both their rights and responsibilities towards more active civic engagement.488
The efficacy of such platforms depend on a variety of factors, such as: (a) voluntary participation that is sometimes incentivized, but not coerced; (b) trust of the civil society placed in the state authorities to provide the motivation accompanied by an underlying assumption of a republican, “active” citizen rather than a “Marshallian” (passive) citizen;489 (c) ca requirement to perform some sort of action, and not just be a passive recipient490; (d) digital literacy combined with internet and smartphone proliferation within the ecosystem to allow adequate diversity of participation.
In 2009, a study published by the MacArthur Foundation investigated the correlation between video games and their capacity to stimulate civic and political engagement. The report identified a direct correlation between the civic potential of video games and further engagement in civic life, especially by young citizens.491
Participatory processes work best at a local level as party politics are less dominant. Citizens also find it easier to spot problems, identify solutions and evaluate legislation for issues that directly affect their daily lives.492
With several initiatives, a tech interface is meant to be a layer supplementing an offline discussion forum, as happened in Decide Madrid and vTaiwan, the use-cases highlighted earlier.
Measuring Engagement Levels
While we have examined the broad strokes of the kinds of gamification that are being driven in the civic engagement context, it is important to evaluate whether these civic-driven initiatives encourage low-risk/low-cost engagement or whether they can be a driver of social change (both online and offline).
In an effort to measure levels of engagement, the International Association of Public Participation (IAP2) has developed a public participation spectrum to help groups define the public’s role in any public participation process on an increasing level of intensity ranging on a scale of: Inform, Consult, Involve, Collaborate and Empower. These varying degrees of engagement on the participation spectrum can be outlined as follows.
- Inform: To allow citizens with a balanced and objective understanding of a problem alternatives and solutions.
- Consult: To obtain citizen feedback on a policy challenge or problem facing citizens
- Involve: To have a direct engagement mechanism for citizen redressal on their needs and concerns.
- Collaborate: To partner with the public on each aspect of the policy cycle (from the development of alternatives to identifying the preferred solution).
- Empower: To place decision making authority to the public.
Figure 1: Spectrum of Public Participation
(Source: Tim Bonnemann, City of Vancouver Mayor's Engaged City Task Force Final Report on https://www.flickr.com/photos/planspark/12249559465 )
Taxonomy Of Gamified Civic Engagement Projects
| Initiative/Platform (City/Country) | Category | Mechanics | Depth of Participation |
|---|---|---|---|
| SpotHoles Campaign (Boston, USA) | Participatory (crowdsourced) decision making | Hybrid reality game app-based | Inform, Consult, Involve, Collaborate |
| City Points (Cascais, Portugal) | Points/rating based system | App based | Inform, Involve, Collaborate |
| Change Tomorrow (Ovar, Portugal) | Participatory decision making | Web based + Offline | Inform, Consult, Involve |
| Better Reykjavik (Reykjavik, Iceland) | Participatory decision making | Web based | Inform, Consult, Involve, Collaborate, Empower |
| vTaiwan (Taipei, Taiwan) | Participatory decision making | Web-based + offline forums | Inform, Consult, Involve, Collaborate |
| Nu Spaarpas (Rotterdam, Netherlands) | Points/rating based system | Card based technology | Inform, Involve, Collaborate |
| Torekes (Gent, Belgium) | Points/rating based system | Loyalty card based | Inform, Involve, Collaborate |
| Decide Madrid (Madrid, Spain) | Participatory decision making | Web-based + offline forums | Inform, Consult, Involve, Collaborate |
| Citizenlab (Brussels, Belgium) | Participatory decision making | Web + app based | Inform, Consult, Involve, Collaborate |
| Hull Coin (Hull, England) | Points/rating based system | App based | Inform, Involve, Collaborate |
| Echo Citoyen (Paris, France) | Participatory decision making | Web-based + offline forums | Inform, Consult, Involve, Collaborate |
| Next Election (Bangalore, India) | Participatory decision making | Web + app based | Inform, Consult, Collaborate |
Figure 2: Taxonomy of Gamified Civic Engagement Projects
It is important to note some commonalities among the 12 initiatives presented in Figure 2. First, most of the experiments were created by non-profits or administered through collaborations between startups and city councils. Second, all the initiatives have a similar goal, which is to inform the public and obtain a reasonable degree of participation. Further, over half of the initiatives have a consultative dimension, (i.e. receiving feedback from the citizens on a civic problem) thereby reflecting a fair degree of citizen engagement. Third, a majority (over 70 percent) of the initiatives have used a blend of channels for engagement, including either web/app-based platforms and offline elements. And lastly, all the initiatives are based on positive acts and duties and do not carry any punitive elements.
For a subsequent iteration of the synoptic table, a more detailed study of these initiatives would need to be carried out in order to acquire a better measure of how successful these platforms are. While this paper has not delved into these finer details, any subsequent research in this area could look to incorporate the following aspects:
- Creator of the initiatives
- Participation (voluntary/mandated) and opt-out scope
- Privacy and security features for the web/app based platforms
- Transparency in disclosures for activities or lists in the points or rating based systems
- Feedback mechanisms for users or citizens
Challenges to Gamified Systems
Samuel Bowles in his book The Moral Economy493 argues that substituting moral goodness with a reward and punishment system attacks the core of Rousseau’s social contract. Intrinsic motivation, he believes, is a better motivation than extrinsic rewards. Given that several of the game elements border on steering the choice architecture towards a more rewards-centered arc, this is a trade-off that can produce unintended consequences. For example, the ‘paradox of disincentives’494 may be viewed here as the outcome of an authoritarian exercise of power from the moment in which citizens perceive that they lack the ultimate control of their decisions.
Beth Noveck, of the Governance Lab at New York University, argues that civic innovation in governments implies a conceptual shift in the exercise of public power.495 The introduction of gamified governance implies a shift towards upending the status quo towards reuniting citizenship with expertise. It postulates a bottom-up approach to building public policies, and it necessitates new mental models for conceiving the exercise of regulatory powers from public institutions.
Design becomes a critical challenge, in terms of marshaling convincing evidence for the adoption of new technologies or including the right motivational incentives for a crowdsourced decision-making process.496 Also, the perils of ‘groupthink’ can produce cognitive biases, as studied by eminent behavioral economist, Daniel Kahneman when each decision-maker in a group has too little information to solve a given problem and instead observes others in the hope of becoming wiser.497
With the increased use of computer algorithms to monitor digital activity, any form of scoring systems is bound to raise questions relating to one’s status, identity, and rights. John Cheney-Lippold captured this phenomenon with the term jus algoritmi,498 which describes a new form of citizenship produced by online data collection and used by law enforcement agencies (the NSA’s PRISM Surveillance Program of targeting “algorithmically foreigners,”499 or the U.S. Homeland Security Department’s plan to collect data on immigrants based on search results, social media handles, and mobile phone information500). Algorithmic citizenship brings to the fore fundamental questions on the digital sphere and public function of online activity.
Normative citizen scoring (e.g., general assessment of moral personality or ethical integrity) in all aspects and on a large scale by public authorities endangers individual freedom and autonomy, especially when used in violation of fundamental rights, or “when used disproportionately and without a delineated and communicated legitimate purpose”,501 as has been highlighted in the European Commission’s High Level Expert Group on Artificial Intelligence guidelines titled “Draft Ethics Guidelines for Trustworthy A.I.”502
Scaling solutions is a critical component in the new practice of public problem solving, as argued by Tara McGuinness, Former Director to the White House Task Force on Community solutions and Anne-Marie Slaughter, CEO of New America.503 Some of the startups echoed this sentiment as well in terms of constraints. Navigating the right areas for creating new forms of civic engagement is another important dimension that emerges as a key consideration for some of these projects. The measurement of impact is not quite so straightforward. Accounting for context when measuring impact is imperative, and thereby a theory of change for mapping complex causality is needed. For example, large scale participation if orchestrated by advocacy groups may not be a reliable indicator of citizens’ informed value preferences. In this context, political scientists Robert Dahl and John Dryzek moot the formation of small groups of citizens that comprise the non-elite, typically recruited through random sampling.
These challenges outline the fact that, while it is enticing for gamified applications to offer low-cost and higher engagement forms, the design of such systems are intricate in nature and require much deeper deliberation.
Civic Engagement in India: Potential for Gamification?
In India, the Ministry of Electronics and Information Technology (MeitY) launched the National Portal of India (www.india.gov.in) in November 2005 as well as the Open Government Data Platform (www.data.gov.in) in October 2012 for providing easier access to public information and data. In 2014, the Digital India program laid the groundwork towards increasing the level of citizen participation in the decision-making process through digital tools such as MyGov and the eponymous Prime Minister’s mobile app, Narendra Modi. While these platforms have exhibited some initial promise, the lack of an adequate vision means that they no longer remained relevant and have been reduced to a platform for input on various advertising or marketing campaigns instead of substantive issue-driven citizen interactions.
As far as the civic engagement ecosystem in cities goes, there has typically been sporadic levels of engagement. Traditionally, civic engagement has not been a top priority. However, there is potential in its future application with citizens increasingly using technology (especially mobile) with over 175 million smartphone users expected to emerge in the next four years.504 Civil society organizations such as the Janaagraha Centre for Citizenship and Democracy, and the federal government’s efforts under the ‘Digital India program’ have led to strengthening capacities towards digital literacy.
While gamification in this context is still at a pretty nascent stage, there are a few applications that have been identified during this research.
ichangemycity505 is a locational online social networking platform launched in 2012 by Janaagraha Centre for Citizenship and Democracy for civic action. The site uses the power of the internet to connect people who are in the same vicinity and helps them discuss and act on civic issues. The platform largely uses a complaint redressal system for citizens to raise concerns on potholes, unattended garbage, water supply, and related civic issues. There is a system of “upvoting” (where other users can vote for complaints to be prioritized) as part of the interaction mechanism to ensure resolution of a complaint.
Next Election506 is envisaged as a virtual town hall that brings citizens, politicians, and journalists together. It seeks to create a vertical accountability framework among a diverse range of actors in order to bridge the gap between elected representatives and constituents. It has microsites that comprise sentiment analysis on issues such as sanitation and environment as well as scorecard systems that allow individuals to rate elected representatives, building a network of issue-based champions.
Civis507, started off as a web platform and sought to create meaningful engagements with participatory consultation exercises around livability metrics in Bangalore, Gurgaon, and Mumbai. Civis, thus operates more on the participatory or crowdsourced decision-making spectrum. About 1,074 citizens participated in a consultation on the city of Bangalore’s revised master plan.
Reap Benefit508 is an NGO based out of Bangalore that looks to empower civic problem solving among youth through a mix of skill enhancement, local data, and contextual solutions. The NGO wants to build a community of “solve ninjas” around issues such as sanitation, education, and healthcare. The organization does employ game elements in the form of badges for different skills: mobilize, report, build, prototyping solutions, and campaigning.
Village Capital,509 a venture capital firm in collaboration with the Omidyar Network, ran an accelerator program last year to support the growing ecosystem of civic tech startups in India. Fourteen platforms that were developing ideas about improving governance and augmenting citizen-facing interactions were part of this program. According to Perry Nunes, a manager at Village Capital, a large part of these initiatives were geared towards streamlining public service delivery and helping local or municipal governments. Transparency and governance and citizen participation were two of the broad themes for civic innovation ideas.
The overarching state of play in India looks to be based around improvements in backend governance delivery. There is a resource constraint present when it comes to capacities for scaling civic engagement models. With this context, gamification in India can leverage individual choices at a low cost as it aims to produce a common good. Gamification also has more commonalities with crowdsourcing vis-a-vis ‘nudges’510, which are aspects of a choice architecture that alters people’s behavior in a predictable manner without forbidding any options or significantly altering economic incentives. However, the introduction of any sort of game mechanics must fit the right socio-economic context. At present, the focal point for civic innovations is in Southern India (Bangalore in particular). The design of these innovations is largely geared toward problem identification or grievance redressal, but there is enough room for new forms to emerge that focus on solution identification and crowdsourced policy-making.
The Way Forward: A Blueprint for Gamifying Citizenship
Digital technology is increasingly used to experiment with new forms of encouraging active citizenship. The current spectrum extends from China’s social credit system to ideas such as catalogs of good deeds to motivate active citizenship. While China’s Social Credit System has been unequivocally condemned in the Western world, many of its scoring components are also common for social networks outside China.
A scoring system, therefore, needs to have a more contextual and cognitive design. For example, there are certain principles that could be considered while building such systems. Based on the nascent scholarship and conversations with some of the developers of these civic innovations, future scoring systems should be:
- Voluntary. A voluntary system that provides equal forms of participation in terms of allowing each registered resident to participate and the choice to opt out of a system after signing up.
- Deliberative. The public can participate in something akin to the Catalog of Good Deeds idea in Mexico.
- Flexible. Any list of deeds or activities needs to be subject to a review and constant iteration.
- Transferable. Earned points can be transferred among citizens’ subject to certain conditions.
- Secure. The technological infrastructure on which a system is built needs to be safe and secure (in which data is encrypted).
- Positive Acts. The system can be built around rewards, however, a decision to not participate should not impose any negative costs.
- Adaptive. It is interoperable and can be implemented either at a sub-municipal level or supra-municipal level, such as a consortium of cities (e.g. C40 Cities511) where an individual can claim benefits in one participatory city based on good deeds in other participating cities.
- Activity-centric. It is action-based: no score will be given to individuals—this is not a citizen rating method—but to “deeds.” It is imperative that extrinsic rewards don’t become a substitute for intrinsic motivation. The two would need to go hand in hand.
Gamification can mobilize citizens to effectively participate in public decision-making. But note that gamification can also have detrimental effects if the design is manipulative in terms of the choice architecture it presents or has the unintended consequence of excluding participants in any way. In this regard, it becomes imperative to ensure that any such context starts with the sense of belonging to the local community and to amplify with a smart gamification scheme.
The gamification of civic engagement syncs well with the ability to create new spatial interactions around local issues (such as waste management, potholes, etc.).
Any adaptation of the innovations discussed in this paper would need to fit into the socio-political context of the region. Blended models or formal and unconventional channels should operate together to engage citizens in policy-making.
Conclusion
Gamifying citizen engagement is certainly not a panacea for all societal ills, and it poses various challenges of its own—notably those linked to aspects of privacy, design, and inclusion. But, in combination with other innovations and methods, especially the interlinkages with behavioral economics and collective intelligence, it does offer a potentially valuable and still somewhat under-explored approach512 to governance in the 21st century. The motivation towards greater participation and transparency across the public participation spectrum ranges from informing to empowering the public.
While the verdict for attributing success to gamification in this space is still not clear, the governance potential offered by gamification stems primarily from the avenues it offers for greater motivation and participation, inclusion and, consequently, transparency across the full policy life cycle—from agenda setting to solution ideation, policy development, implementation, enforcement, and review of effectiveness.
Citations
- The Global Risks Report 2018 13th Edition, [Geneva: World Economic Forum,2018] <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- The United Nations World Water Development Report 2018: Nature-Based Solutions for Water, [Paris: WWAP (United Nations World Water Assessment Programme) /UN-Water, 2018, UNESCO] <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Martina Flörke, Christof Schneider, and Robert I. McDonald, "Water competition between cities and agriculture driven by climate change and urban growth," Nature Sustainability 1, no. 1 (2018): 51.
- Peter H. Gleick, "Global freshwater resources: soft-path solutions for the 21st century," Science 302, no. 5650 (2003): 1524-1528.
- Ibid.
- Negative externalities are costs that impact a party that does not have a role in its creation. For instance, vehicular pollution generated by a specific individual affecting people nearby. Negative externalities cause market failures.
- Collection action problem occurs when individuals pursuing a common goal do not cooperate due to competing interests.
- Free rider issues occur when individuals who do not pay for a good or service reap its benefit. Too many free riders results in over-exploitation or under-production of the good or service.
- Richard E. Howitt, Richard E. and Kristiana Hansen, "The Evolving Western Water Markets," Choices 20, no. 316-2016-6565 (2005): 59.
- Guy Le MoigneShawki Barghouti, Gershon Feder, Lisa Garbus, and Mei Xie, "Country experiences with water resources management," World Bank Technical Paper 175 (1992).
- Ereney Hadjigeorgalis, "A Place for Water Markets: Performance and Challenges," Review of Agricultural Economics 31, no. 1 (2009): 50-67.
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- C. Wilson, Adverse Selection, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics, Palgrave Macmillan, 2008]
- Y. Kotowitz, Moral Hazard, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- J.O. Ledyard, Market Failure, In: Palgrave Macmillan (eds)[London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- David S. Brookshire, Bonnie Colby, Mary Ewers, and Philip T. Ganderton, "Market Prices for Water in the Semiarid West of the United States," Water Resources Research 40, no. 9 (2004).
- John Freebairn and John Quiggin, "Water rights for variable supplies," Australian Journal of Agricultural and Resource Economics 50, no. 3 (2006): 295-312.
- A. Dinar, M. Rosegrant, R. Meinzen-Dick, "Water allocation mechanisms: Principles and examples," The World Bank Policy Research Working Paper 1779 (June 1997).
- Jill E. Hobbs, "Information asymmetry and the role of traceability systems," Agribusiness: An International Journal 20, no. 4 (2004): 397-415.
- Max H. Bazerman and James J. Gillespie, "Betting on the future: The virtues of contingent contracts," Harvard Business Review 77 (1999): 155-162.
- Stefaan G. Verhulst, "Information Asymmetries, Blockchain Technologies, and Social Change," Medium, July 24, 2018, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Sloane Brakeville, and Bhargav Perepa, "Blockchain Basics: Introduction to Distributed Ledgers," IBM Developer, March 18, 2018, accessed April 14, 2019, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Nigel Gopie, "What Are Smart Contracts on Blockchain?" Blockchain Pulse: IBM Blockchain Blog, July 02, 2018, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- "Civic Use Cases," Helping Governments to Be More Accessible, Efficient and Effective. <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- "Civic Ledger Pty Ltd.," Australian Water Partnership. <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "Water Markets and Trade," Australian Government – Murray-Darling Basin Authority, Sept. 29, 2015. <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Ibid.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management. September 2018.
- Ibid.
- The term “smart” in this context indicates the use of internet of things, big data, predictive analytics integrated over blockchain network as underlying technologies to facilitate the operations of a water market.
- Jayachandran Praveen, “The Difference between Public and Private Blockchain," Blockchain Pulse: IBM Blockchain Blog, Aug. 06, 2018, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- J.R. DeShazo, Gregory Pierce, and Henry McCann, “Los Angeles County Community Water Systems Atlas and Policy Guide: Supply Vulnerabilities, At-Risk Populations, Conservation Opportunities, Pricing Policies, and Customer Assistance Programs,” UCLA: Luskin Center for Innovation, (2015), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source; U.S. Census Bureau Quick Facts: Los Angeles County, California," Census Bureau Quick Facts, July 1, 2017, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- S. Pincetl et al., “Water Management in Los Angeles County: a Research Report,” Los Angeles: UCLA, Institute of Environment and Sustainability, 2015, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source
- Ibid.
- Ibid.
- J.R. DeShazo and Gregory Pierce, "Quantifying the Benefits and Designing Governance Structures for a Water Market in Los Angeles County," [Los Angeles: UCLA, Luskin Center for Innovation, Oct. 2016] <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source
- Bengaluru Water Board, “Blueprint for Future,” <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Bangalore Water Supply and Sewerage Board, "About BWSSB," Bangalore Water Supply and Sewerage Board. <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Bengaluru Water Board, “Blueprint for Future," <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Malini Ranganathan, "'Mafias' in the waterscape: Urban informality and everyday public authority in Bangalore," Water Alternatives 7, no. 1 (2014).
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- Bart Elias, Unmanned Aircraft Operations in Domestic Airspace: U.S. Policy Perspectives and the Regulatory Landscape (Washington, D.C.: Congressional Research Service, 2016), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Tom Hancock and Wang Xueqiao, “China’s DJI targets agriculture as consumer drone sales slow,” Financial Times, March 25, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Richard Levick, “Drone Industry Just Beginning To Take Off,” Forbes, May 15, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Ujjwal Bakshi and Manash Neog, “Much to Drone About,” Economic Times, April 4, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Therese Jones, International Commercial Drone Regulation and Drone Delivery Services (Santa Monica: RAND Corporation, 2017), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Somya Lohia, “Drone Regulations 1.0 Can Fetch India Major Slice of $100 Billion Industry,” Money Control, January 9, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Civil Aviation Requirements Series X Part I Issue I: Requirements for Operation of Civil Remotely Piloted Aircraft System (RPAS), F. No. 05-13/2014-AED Vol. IV (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Ibid., Reg. 14.2.
- Ibid., Reg. 12.14 & 12.2.
- Ibid., Reg. 11.2 & 17.1.
- Ibid, Reg. 12.21.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Procedures for Operation of Civil Remotely Piloted Aircraft Systems (RPAS) in Indian Airspace, AIP Supplement 164/2018 AAI/ATM/AIS/09-09/2018 (New Delhi: Airports Authority of India, 2018), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Tender Document: Development, Hosting and Maintenance of Digital Sky Platform for Ministry of Civil Aviation IT-11042/1/2018-DIRECTORATE OF IT (New Delhi: Airports Authority of India, 2018), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Ibid.
- Ibid.
- Drone Ecosystem Policy Roadmap (New Delhi: Ministry of Civil Aviation, 2019), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Ibid, 7.
- Ibid, 14.
- The Personal Data Protection Bill, 2018 (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- White Paper of the Committee of Experts on a Data Protection Framework for India (New Delhi: Ministry of Electronics and Information Technology, 2017), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Petition to the Federal Aviation Administration: Drones and Privacy (Washington, D.C.: Electronic Privacy Information Center, 2012), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Margot Kaminski, “Drone Federalism: Civilian Drones and the Things They Carry,” California Law Review 4 (2013): 57–74.
- Notice of Proposed Rulemaking: Operation of Small Unmanned Aircraft Systems Over People FAA–2018–1087 (Washington, D.C.: Federal Aviation Administration, 2019), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Arthur Holland Michel, Drones at Home: Local and State Drone Laws (New York: Center for the Study of the Drone, Bard College, 2017), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Amanda Essex, Taking Off: State Unmanned Aircraft Systems Policies (Denver, CO: National Conference of State Legislatures, 2016), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- An Act Relating To Unmanned Aircraft Systems – Establishing Statewide Standards, Protecting Privacy, And Ensuring Public Safety (Virginia: American Legislative Exchange Council, 2017), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Gautam Bhatia, “State Surveillance and the Right to Privacy in India: A Constitutional Biography,” National Law School of India Review 26 (2014): 127–158.
- (2019) 1 SCC 1.
- Ibid, 359.
- (2015) 5 SCC 1.
- Ibid, 167.
- Colin Snow, “Drones Pose a Unique Big Data Challenge For Business Users,” Forbes, February 6, 2019 <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source ; Michelle Chan, “What Businesses Need to Know About Drone Data,” Techwire Asia, February 13, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules ((New Delhi: Ministry of Electronics and Information Technology, 2011),<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source"> <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source ; Ibid. ; Rachel Finn and Anna Donovan, “Big Data, Drone Data: Privacy and Ethical Impacts of the Intersection Between Big Data and Civil Drone Deployments,” in The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, ed. Bart Custers (The Hague: TMC Asser Press, 2016), 47-67.
- As Solove remarks about the “Information Age:” “The data gathered about people is significantly more extensive, the process of combining it is much easier, and the computer technologies to analyze it are more sophisticated and powerful.” See Daniel Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review 154 (2006): 477, 506 ; Ibid., 507–08.
- Jordi Soria-Comas and Josep Domingo-Ferrer, “Big Data Privacy: Challenges to Privacy Principles and Models.” Data Science and Engineering 1 (2016): 21, 22. ; Justice KS Puttaswamy v. Union of India, (2017) 10 SCC 1.
- Guide to Basic Data Anonymisation Techniques (Singapore: Personal Data Protection Commission of Singapore, 2018), www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other-Guides/Guide-to-Anonymisation_v1-(250118).pdf.
- For a particularly stark situation, where the de-identification was considered near foolproof and yet re-identified, see Jean Louis Raisaro et al., “Addressing Beacon Re-Identification Attacks: Quantification and Mitigation of Privacy Risks,” Journal of the American Medical Informatics Association 24 (2017): 799, 800.
- Solon Barocas and Helen Nissenbaum, “Big Data’s End Run around Anonymity and Consent,” in Privacy, Big Data, and the Public Good, eds. Julia Lane et al. (New York, NY: Cambridge University Press, 2014), 44–45.
- Ira S Rubinstein, “Big Data: The End of Privacy or a New Beginning,” International Data Privacy Law 3 (2013): 74, 77–78; Davide Castelvecchi, “Can We Open the Black Box of AI?” Nature 538, no. 7623 (2016): 20.
- Mireille Hildebrandt, “Defining Profiling: A New Type of Knowledge?” in Profiling the European Citizen: Cross-Disciplinary Perspectives, eds. Mireille Hildebrandt and Serge Gutwirth (eBook: Springer, 2008), 17, 20.
- Nathaniel A Raymond, “Beyond ‘Do No Harm’ and Individual Consent: Reckoning with the Emerging Ethical Challenges of Civil Society’s Use of Data,” in Group Privacy: New Challenges of Data Technologies, eds. Linnet Taylor, Luciano Floridi and Bart van der Sloot (eBook: Springer, 2017): 67, 75.
- A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Ibid, 45–46.
- Ananth Padmanabhan and Anirudh Rastogi, “Big Data,” in Regulation in India: Design, Capacity, Performance, eds. Devesh Kapur and Madhav Khosla (London: Hart Publishing, 2019): 251, 262.
- Aleecia M. McDonald and Lorrie Faith Cranor, “The Cost of Reading Privacy Policies,” I/S Journal of Law and Policy, 4 (2008): 543, 565.
- Arthur Allen Leff, “Contract as Thing,” American University Law Review 19 (1970): 131.
- Nikhil Narendran, “Policy Framework for Protection of Big Data in State Possession,” in Blockchain for Property: A Roll Out Road Map for India, eds. Baladevan Rangaraju and Vishnu Chandra (New Delhi: India Institute, 2017): 34, 40.
- Rahul Matthan, Privacy 3.0: Unlocking Our Data-Driven Future (Noida: Harper Collins, 2018): 167–171.
- Carmine Cifaldi, “Unmanned Aircraft System Privacy and Data Protection,” in Handbook of Unmanned Aerial Vehicles, eds. K.P. Valavanis and G.J. Vachtsevanos (eBook: Springer, 2018): 1–19.
- Voluntary Best Practices for UAS Privacy, Transparency, and Accountability (Washington, D.C.: National Telecommunications and Information Administration, 2016), <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source.
- Clark D. Cunningham, “Apple and the American Revolution: Remembering Why We Have the fourth Amendment”, The Yale Law Journal, volume 126, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- “ Breaking Down Apple’s iPhone Fight With the U.S. Government”, The New York Times, March 21, 2016, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Nick Statt, “Apple’s iCloud partner in China will store user data on servers of state-run telecom”, The Verge, July 18, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- “Chen Guangcheng, Apple Can’t Resist Playing by China’s Rules”, The New York Times, January 23, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Ibid., “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming), Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- “Top 20 Countries with the Highest Number Of Internet Users”, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Ibid.
- See Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Krishna Pokharel and Rajesh Roy, “India Says Rumors About Child Snatching on WhatsApp Led to Mob Killings”, The Wall Street Journal, July 5, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- . Section 91, Code of Criminal Procedure, 1973
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Id.
- “Cross-Border Law Enforcement Demands: Analysis of the U.S. Department of Justice’s Proposed Bill”, Center for Democracy and Technology, August 17, 2016, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Data localization is no solution,” The Hindu, August 3, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- This, however, requires an executive agreement between the United States and the foreign country certifying that the state will rely on robust privacy protections, and respect for due process and the rule of law when making requests to companies directly. Such a framework over time, will not only need to be transparent and hold both companies and LEAs accountable but also be scalable to respond to the increasing volume and complexity of requests. Specifically, due process safeguards on user notification, redressal etc. will need to be incorporated. The U.S. Department of Justice recently issued clarifications on how the CLOUD Act will be operationalized available at <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- For more on the privacy protecting requirements under CLOUD Act, both at an institutional level and for individual requests, see Madhulika Srikumar, Debrae Kennedy-mayo, Peter Swire and Sreenidhi Srinivasan, “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- Sections 40 and 41, The Personal Data Protection Bill, 2018
- Ibid.
- Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, “A Free and Fair Digital Economy Protecting Privacy, Empowering Indians”, 27 July 2018
- Ministry of Electronics and Information Technology, “The Information Technology [Intermediaries Guidelines (Amendment) Rules] 2018,” <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Pranesh Prakash,“Why Data Localisation Might Lead To Unchecked Surveillance,” Centre for Internet and Society, October 15, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source ; “US criticises India's data localisation norms, draft e-commerce policy,” The Economic Times, April 9, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Josh Constine,” Zuckerberg warns of authoritarian data localization trend,” Techcrunch, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- “RBI data localisation: 80 percent players, including WhatsApp, comply with norms”, Business Standard, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source -80-players-including-whatsapp-comply-with-norms-118101500907_1.html
- “Facebook takes a tough stand on data storage amidst India’s localisation push”, The Economic Times, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- WhatsApp is working to comply with Reserve Bank of India (RBI) regulations on the local storage of payment-related data, the Economic Times reported. “Only some engineering work is left,” an anonymous senior Facebook executive told ET. <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source -mandate-report-why-is-it-needed/
- “India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Komal Gupta, “Google Agrees to Comply with RBI’s Data Localisation Norms,” Livemint , September 10, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source"><a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source Surabhi Aggarwal, “Industry bodies write to IT minister Ravi Shankar Prasad against data bill,” Economic Times, October 4, 2018, //economictimes.indiatimes.com/articleshow/66062141.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- See U.S. India Strategic Partnership Forum (USISPF) submission to MeitY available at <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Aditya Kalra, “U.S. senators urge India to soften data localisation stance,” Reuters, October 13, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Ashish Shukla, “RBI refuses to extend deadline for data localisation,” IBTimes, October 14, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Bhavin Patel and Hemant Krishna, “Data Localisation: Here’s why the RBI isn’t listening to the ‘Mirroring’ argument,” CNBC TV18, October 15, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,”Data localisation in India: Questioning the means and ends,”The Leap Blog, February 22, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Amazon not mirroring it abroad Whatsapp asked for 5 more months, mastercard and rest asked for one year
- “Russia fines Facebook $50 for failing to comply with local data privacy law, ” ZDNet, April 12, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source ; Mark Scott, “Russia Prepares to Block LinkedIn After Court Ruling,” The New York Times, November 10, 2016, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Government authorities increasingly rely on blocking access to internet altogether to contain cases of public unrest. See Timothy Mclaughlin ,“How Whatsapp Fuels Fake News And Violence In India, ” The Wired, December 12, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- “Fighting fake news: Govt asks Whatsapp to take immediate action,” Economic Times, July 3, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- The Indian government introduced the draft amendment to the Information Technology Act, 2008 to overhaul the current intermediary liability regime in India. One of the problematic provisions included the requirement for intermediaries to enable tracing the originator of messages. See Yesha Tshering Paul“ Fake News: Misguided Policymaking To Counter Misinformation,” Bloomberg Quint, January 14, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- The Srikrishna Committee appointed to draft India’s first comprehensive data protection law introduced the term “fiduciaries” in the Personal Data Protection Bill, 2018. See Arghya Sengupta, “Why the Srikrishna Committee Rejected Ownership of Data in Favour of Fiduciary Duty,” The Wire, August 2, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- For more on how Indian law enforcement agencies make requests for data under Indian law, see Chapter 3 in Srikumar et al., “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- For instance, Facebook commits to fight back in court if requests are overbroad or defective. Chris Sonderby, “Sharing Our Latest Transparency Report,” Facebook Newsroom, May 23, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- See 3(13), Personal Data Protection Bill, 2018. Available at <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; Stakeholders in India however have argued that the draft bill does not imbibe the philosophy of fiduciaries completely since certain sections in the bill still places the disproportionate onus on users to realize their rights. See comments submitted by Dvara Research to MeitY available at <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- See A Free and Fair Digital Economy Protecting Privacy, Empowering Indians: Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, July 27, 2018, available at <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- Id. , see Jack M.Balkin, "Fixing Social Media's Grand Bargain." Hoover Working Group on National Security, Technology, and Law, Aegis Series Paper 1814,2018.
- The author of this piece argues that Balkin’s fiduciary framework could eliminate the third party doctrine in the U.S. altogether binding all companies to a higher duty of care towards users. See Mike Godwin, It’s Time to Reframe Our Relationship With Facebook,” Slate, November 16, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; In India, the Supreme Court through the 2017 ruling recognising privacy as a fundamental right invalidated the application of third party doctrine. See Gautam Bhatia, “The Supreme Court’s Right to Privacy Judgment – IV: Privacy, Informational Self-Determination, and the Idea of Consent,” Indian Constitutional Law and Philosophy, August 2017, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Vivan Sharan, Sidharth Deb, “Reimagining fiduciaries in the digital economy,” Livemint, August, 15, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Ariel Dobkin, "Information Fiduciaries in Practice: Data Privacy and User Expectations." Berkeley Tech. LJ 33 2018: 1.
- Dalip Singh, “Law enforcement agencies favour data localisation “, Economic Times, October 8, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source /articleshow/66113360.cms
- India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Aria Thaker, “Behind RBI’s digital payments panel, a controversial firm’s shadow, conflict of interest allegations”, Scroll, January 10, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; The Indian government’s motivation to create an environment favourable to domestic tech firms is most evident in its recent policy on Foreign Direct Investment in e-commerce. See “What India e-commerce policy entails for online retailers”, Livemint, January 16, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- a. Aditya Kalra and Aditi Shah, “U.S. firms face off with Indian rival in lobbying against data storage rules,” Reuters, July 24, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source"><a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source b. Vidhi Choudhary and Yashwant Raj, “Cambridge Analytica row: Facebook data breach hit 560K Indian users,”Hindustan Times, April 5, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Prashant Reddy, “View: It's time to tame the social media beast,” Economic Times, February 13, 2019,//economictimes.indiatimes.com/articleshow/67966170.cms?from=mdr&utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- Ben Brody, “Tech Giants Back U.S. Bill Governing Cross-Border Data Searches,”Bloomberg, February 7, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Brad Smith, “A call for principle-based international agreements to govern law enforcement access to data,” Microsoft On the Issues, September 11, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Michael Punke, “AWS and the CLOUD Act,” AWS Security Blog, May 27, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source"><a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source ; Chaim Gartenberg, “Apple will launch a global web portal for law enforcement requests later this year,” The Verge, September 6, 2018, available at <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source"><a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; Kristen E. Eichensehr, “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming)
- “One year later: A cybersecurity commitment shared by more than 100 companies,” Tech Accord, May 9, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Mike Isaac, “Zuckerberg Plans to Integrate WhatsApp, Instagram and Facebook Messenger,” The New York Times, January 25, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Mike Isaac, “Facebook’s Mark Zuckerberg Says He’ll Shift Focus to Users’ Privacy,” The New York Times, March 6, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source . Facebook’s official announcement is available at <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Law enforcement agencies across the world make overbroad demands for location data to find suspects and witnesses at crime scenes. See Jennifer Valentino-Devries, “Tracking Phones, Google Is a Dragnet for the Police,” The New York Times, April 13, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; also on “reverse location warrants” see Aaron Mak, Close Enough, Slate, February 19, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; Matthew Haag, “FamilyTreeDNA Admits to Sharing Genetic Data With F.B.I.”, The New York Times, February 4, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Josh Costine, “Facebook will pass off content policy appeals to a new independent oversight body,” Techcrunch, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- For instance, in the UK, <a href="<a href="<a href="<a href="source">source">source">source">source">source; France, <a href="<a href="<a href="<a href="source">source">source">source">source">source; and Germany, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Varun Aggrawal, “Infosys to Set up Data Marketplace for Enterprises – The Hindu BusinessLine,” June 19, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- “The Personal Data Protection Bill” (2018), <a href="<a href="<a href="<a href="source">source">source">source">source">source; Justice B.N. Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” (Committee of Experts under the Chairmanship of Justice B.N. Shrikrishna, July 2018), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Jack M. Balkin, “Information Fiduciaries and the First Amendment,” U.C. Davis Law Review 49, no. 4 (2016): 1234; Lina Khan and David Pozen, “A Skeptical View of Information Fiduciaries” (SSRN, February 25, 2019), <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Whilst the European Union’s approach in the GDPR is limited by is focus on privacy. The challenges of governing data-driven decision-making go well beyond concerns about privacy. See Talia Gillis and Josh Simons, “Explanation < Justification: GDPR and the Perils of Privacy,” (SSRN, 2019).
- To use André Béteille’s phrase, one of India’s most important twentieth-century social theorists. André Béteille, Anti-Utopia: Essential Writings of André Béteille (New Delhi: Oxford University Press, 2005); André Béteille, Ramachandra Guha, and Jonathan P. Parry, Institutions and Inequalities: Essays in Honour of Andre Beteille (New Delhi: Oxford University Press, 1999).
- Purva Khera, Macroeconomic Impacts of Gender Inequality and Informality in India, IMF Working Paper (Washington, District of Columbia DC: International Monetary Fund, 2016); Carol Vlassoff, Gender Equality and Inequality in Rural India: Blessed with a Son (New York, NY: Palgrave Macmillan, 2013); Stephen M. Caliendo, Inequality in America: Race, Poverty, and Fulfilling Democracy’s Promise, Dilemmas in American Politics (Boulder, CO: Westview Press, 2014); Xavier N. De Souza Briggs, Social Capital and Segregation: Race, Connections, and Inequality in America (Cambridge, MassMA.: John F. Kennedy School of Government, 2002).
- It is important to note that this is not just about unrepresentative data. Unrepresentative data excludes some groups, perhaps because there are not enough data points about that group, or the data points that exist are less numerous or rich. This is an important problem, particularly in India, where the underrepresentation of Untouchables and women in data is systemic. But the problems this paper considers would remain even in the most accurate and careful data sets, which are still a reflection of the structure of our social world, including the inequalities and injustices that characterize it. A representative dataset is not devoid of injustice. This leaves open a host of important issues about when the representation of injustice in a dataset actually constitutes an injustice, an issue I hope to address in future work. Cynthia Dwork and Deirdre Mulligan, “It’s Not Privacy, and It’s Not Fair,” Stanford Law Review 66 (September 2013): 35–40; Kate Crawford, “The Hidden Biases in Big Data,” Harvard Business Review, April 1, 2013, <a href="<a href="<a href="<a href="source">source">source">source">source">source; David Garcia et al., “Analyzing Gender Inequality through Large-Scale Facebook Advertising Data,” Proceedings of the National Academy of Sciences of the United States of America 115, no. 27 (2018): 6958–63, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Andrew D. Selbst and Solon Barocas, “The Intuitive Appeal of Explainable Machines,” SSRN Electronic Journal, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Daniel Kahneman, Thinking, Fast and Slow (New York, NY: Farrar, Straus and Giroux, 2011).
- Virginia Eubanks, Automating Inequality: How High-Tech Tools Profile, Police and Punish the Poor (New York, NY: St. Martin’s Press, 2018).
- TOI, “Aadhaar Covers over 89% Population: Alphons,” The Times of India, accessed March 5, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Cynthia Dwork et al., “Fairness through Awareness,” ITCS ’12 (ACM, 2012), 214–226.
- Sam Corbett-Davies and Sharad Goel, “The Measure and Mismeasure of Fairness: A Critical Review of Fair Machine Learning,” 20180731, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Jon Kleinberg, Sendhil Mullainathan, and Manish Raghavan, “Inherent Trade-Offs in the Fair Determination of Risk Scores,” Proceedings of Innovations in Theoretical Computer Science (ITCS), 2017.
- I am therefore moving beyond privacy as a framework for thinking about the governance of data-driven decision-making. Privacy is one concern we might have about those decision-making procedures, usually called “data processing” in existing legislation in the EU and India. But it is far from the only concern. Other aims and values need to be brought into play. Privacy should not be the sole lens through which to view governance data and machine learning. A29WP, “Guidelines on Automated Individual Decision-Making and Profiling” (Article 29 Data Protection Working Party, 2018), <a href="<a href="<a href="<a href="source">source">source">source">source">source.; ICO, “Guide to the General Data Protection Regulation (GDPR)” (U.K.: Information Commissioner’s Office, August 2018), <a href="<a href="<a href="<a href="source">source">source">source">source">source; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Most other important pieces of non-discrimination legislation extend the categories to which duties of non-discrimination apply. These include the Equal Pay Act of 1963, which prohibits the payment of different wages to employees of different sexes who perform equal work under similar conditions; the Americans with Disabilities Act (ADA) of 1990, which prohibits discrimination against individuals with a disability and requires the provision of reasonable accommodation to someone who is legally disabled; and the Genetic Information Non-Discrimination Act of 2008, which protects individuals from genetic discrimination in the healthcare and insurance industries.
- For instance, U.S. Executive Orders 10925, 11246, and 11375 require federal contractors who do over $10,000 in Government business in one year to “take affirmative action to ensure that applicants are employed, and that employees are treated during employment, without regard to their race, color, religion, sex or national origin.”
- David Strauss, “Discriminatory Intent and the Taming of Brown,” University of Chicago Law Review 56, no. 3 (1989): 935–935.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source; Solon Barocas and Andrew D. Selbst, “Big Data’s Disparate Impact,” California Law Review 104, no. 3 (June 1, 2016): 671–732.
- There is an important emerging debate about precisely this point, including a paper of my own. For the key protagonists, see Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019; Barocas and Selbst, “Big Data’s Disparate Impact”; Lior Strahilevitz, “Privacy versus Antidiscrimination,” Public Law & Legal Theory Working Paper, no. 174 (2007), <a href="<a href="<a href="<a href="source">source">source">source">source">source; Pamela L. Perry, “Two Faces of Disparate Impact Discrimination,” Fordham Law Review 59, no. 4 (March 1, 1991): 523–595; Cass Sunstein, “The Anticaste Principle,” Michigan Law Review, January 1, 1993, 2410.
- Barocas and Selbst, “Big Data’s Disparate Impact,” 724.
- Sophia Moreau and Deborah Hellman, Philosophical Foundations of Discrimination Law (Oxford: Oxford University Press, 2013), 259.
- Béteille, Anti-Utopia.
- Cass Sunstein makes a similar point. If there is prejudice and statistical discrimination, and if third parties promote discrimination, there will be decreased investments in human capital. Such decreased investments will be a perfectly reasonable response to the real world. And if there are decreased investments in human capital, then prejudice, statistical discrimination, and third-party effects will also increase. Statistical discrimination will become all the more rational; prejudice will hardly be broken down; consumers and employers will be more likely to be discriminators.Ronnie J. Steinberg, Applications of Feminist Legal Theory to Women’s Lives: Sex, Violence, Work and Reproduction. Women in the Political Economy. (Temple University Press, 2012), 560; Sunstein, “The Anticaste Principle,” 2431.
- Dwork et al., “Fairness through Awareness,” 215.
- As Hannah Arendt argued when comparing the American and French revolutions. Rohit De, A People’s Constitution: The Everyday Life of Law in the Indian Republic (Princeton, CT: Princeton University Press, 2018), 5; Uday S. Mehta, “The Social Question and the Absolutism of Politics,” 2010, <a href="<a href="<a href="<a href="source">source">source">source">source">source; Hannah Arendt, On Revolution (New York, NY: Viking Press, 1965).
- Sunil Khilnani, The Idea of India (New Delhi: Penguin, 2004).
- Kalpana Kannabirān, Tools of Justice: Non-Discrimination and the Indian Constitution (New York, NY: Routledge, 2012), 7.
- B. R. Ambedkar is a neglected character in India’s political history. His ideas have received little attention compared with more widely known figures M. K. Gandhi and Jawaharlal Nehru, in part because of the Congress Party’s dominant role in shaping India’s national story, and the contours of democratic politics after independence. See Valerian Rodrigues, “Justice as the Lens: Interrogating Rawls through Sen and Ambedkar,” Indian Journal of Human Development 5, no. 1 (2011): 153–174; Jean Drèze and Amartya Sen, “Democratic Practice and Social Inequality in India,” Journal of Asian and African Studies 37, no. 2 (2002): 6–37; Martha Nussbaum, “India: Implementing Sex Equality through Law,” Chicago Journal of International Law 2, no. 1 (2001): 35–58.
- Kannabirān, Tools of Justice, 162.
- Patterns of domination, which produce these persistent inequalities in the political and economic spheres, have two effects. First, they undermine the liberty of each individual to benefit from an effective and competent use of their powers. Democracy entailed political equality. Political equality entailed the absence of domination. Second, patterns of domination undermine the possibility of free association. Drawing on John Dewey, Ambedkar argued that free association – the capacity of groups to form links, to self-govern over time – was essential to democratic life. Democracy is not merely a form of government. It is primarily a mode of associated living, of conjoin communicated experience. It is essentially an attitude of respect and reverence towards fellow men. Patterns of domination made impossible the associations and relationships that encouraged and embodied this attitude of respect and reverence.B.R. Ambedkar, Annihilation of Caste: The Annotated Critical Edition, ed. S. Anand (New Delhi: Navayana, 2014), 280, 261.
- Béteille, Guha, and Parry, Institutions and Inequalities, 342.
- V. R. Krishnaiyer, Akhil Bharatiya Soshit Karamchari Sangh and Others vs. Union Of India, No. 185 (Supreme Court of India November 14, 1980).
- J B. Sudershan Reddy, Indian Medical Association vs. Union Of India & Ors, No. 8170 (Supreme Court of India May 12, 2011).
- Deepti Shenoy, “Courting Substantive Equality: Employment Discrimination Law in India,” University of Pennsylvania Journal of International Law 34, no. 3 (2013): 632.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 20190210, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- The Personal Data Protection Bill; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” 8.
- De, A People’s Constitution; Béteille, Guha, and Parry, Institutions and Inequalities; Khilnani, The Idea of India.
- This is precisely the challenge that Jack Balkin, who first coined the data fiduciary concept, warned about. Balkin, “Information Fiduciaries and the First Amendment,” 1232–1324.
- As André Béteille argues, institutional well-being is an important consideration. He describes this as equality as a matter of policy, not of right, warning against placing too much faith specifically in the state to eliminate every social inequality, every difference of caste or class. Béteille, Anti-Utopia, 435.
- Joshua A. Kroll et al., “Accountable Algorithms,” University of Pennsylvania Law Review 165, no. 3 (2017): 633–705; Andrew Tutt, “An FDA for Algorithms,” Admin. L. Rev. 83 (2016); Jeremy Waldron, “Accountability: Fundamental to Democracy,” SSRN Scholarly Paper (Rochester, NY: Social Science Research Network, April 1, 2014), <a href="<a href="<a href="<a href="source">source">source">source">source">source; Craig T. Borowiak, Accountability and Democracy: The Pitfalls and Promise of Popular Control (Oxford University Press, 2011); Adam Przeworski, Susan Carol Stokes, and Bernard Manin, Democracy, Accountability, and Representation (Cambridge: Cambridge University Press, 1999).
- “World Metro Figures Statistics Brief,” UITP, accessed April 29, 2019, <a href="<a href="<a href="source">source">source">source">source; Global BRT Data, “Global BRT Data,” accessed April 29, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Autorickshaws are three-wheeled vehicles that supply much of the last-mile connectivity to mass transit in Indian cities.
- Candace Brakewood, Gregory Macfarlane, and Kari Watkins, “The Impact of Real-Time Information on Bus Ridership in New York City,” Transportation Research Part C: Emerging Technologies, 53 (April 2015): 59-75.; Eric Jaffe, “The Best Evidence Yet That Real-Time Arrival Info Increases Transit Ridership,” CityLab, accessed Feb. 20, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Aaron Antrim and Sean Barbeau, “The Many Uses of GTFS Data- Opening the Door to Transit and Multimodal Applications,” ITS America’s 23rd Annual Meeting & Exposition, April 2013, <a href="<a href="<a href="source">source">source">source">source; Transit Center, “The Data Transit Riders Want “A Shared Agenda for Public Agencies and Transit Application Developers,” accessed Feb. 16, 2019, <a href="<a href="<a href="source">source">source">source">source.
- “Open Government Partnership,” Open Government Partnership, accessed Jan. 28, 2019, <a href="<a href="<a href="source">source">source">source">source.
- “WRI India,” WRI India, accessed January 28, 2019, <a href="<a href="<a href="source">source">source">source">source.
- KMRL signed a Memorandum of Understanding (MOU) with WRI in February of 2017, which included several initiatives to support urban transport and urban development, including public transport, transit oriented policy, electric mobility, and urban planning in Kochi.
- Available at: <a href="<a href="<a href="source">source">source">source">source
- The GPS installation was paid for by the Urban Mass Transit Company Limited (UMTC), a joint venture of several national and state government agencies and the private company Infrastructure Leasing and Financial Services Limited (IL&FS).
- “Kochi Metro Rail Limited signs pact with auto drivers,” Deccan Chronicle, Jan. 24, 2018, <a href="<a href="<a href="source">source">source">source">source.
- In Hindi, “Chalo” means “Let’s Go!”
- “Demographia World Urban Areas,” Demographia, April 2019, <a href="<a href="<a href="source">source">source">source">source
- G.P. Hari, Personal Interview, Kochi, Feb. 11, 2019.
- “Kochi gets Chalo app for live tracking of buses, ferries,” The Hindu, accessed Jan. 28, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Aparna Vijaykumar, Personal Interview, Online, March 5, 2019.
- Arjun G., “Delhi Government launches Open Transit Data Platform for Buses,” Medium, accessed Jan. 28, 2019, <a href="<a href="<a href="source">source">source">source">source; Open Data Portal available at: <a href="<a href="<a href="source">source">source">source">source
- Pravesh Biyani, Personal Interview, New Delhi, Feb. 14, 2019.
- Ibid.
- Ibid.
- “PoochhO,” Delhi Integrated Multi-modal Transit System, accessed Feb. 15, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Samir Sharma, Personal Interview, New Delhi, Feb. 15, 2019.
- Ibid.
- Pravesh Biyani, Personal Interview, New Delhi, Feb. 14, 2019.
- Nikhil V.J., “Re: [datameet] – Open Transit Data – Delhi,” Email, 2019.
- “BMTC to open up transit data enabling entrepreneurs build mobility solutions.” Economic Times. <a href="<a href="<a href="source">source">source">source">source; “BMTC’s data-sharing plan on back burner,” The Hindu, accessed Feb. 4, 2019, <a href="<a href="<a href="source">source">source">source">source; Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="<a href="<a href="source">source">source">source">source.
- ET Bureau, “BMTC to open up transit data enabling entrepreneurs build mobility solutions,” Economic Times. <a href="<a href="<a href="source">source">source">source">source.
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="<a href="<a href="source">source">source">source">source.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- Tejas Pande, Personal Interview, New Delhi, Feb. 9, 2019;Vinay Sreenivasa, Personal Interview. Online, March 7, 2019; Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Ibid.
- “BMTC,” Bangalore Municipal Transport Corporation, accessed Feb. 20, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Ibid; Tanushree Dev Barma, Personal Interview, Bangalore, March 5, 2019.
- S. Rajagopalan, Personal Interview, Bangalore, March 5, 2019.
- BMTC Data Sharing Policy Draft (July, 2018), Bangalore: Bangalore Municipal Transit Corporation, 2018.
- S. Rajagopalan, Personal Interview, Bangalore, March 5, 2019.
- Ibid.
- BMTC Data Sharing Policy Draft (July, 2018). Bangalore: Bangalore Municipal Transit Corporation, 2018.
- Srinivas Kodali, “BMTC Intelligent Transportation System (ITS) and Need for Open Transport Data,” Data Meet, accessed Jan. 28, 2019, <a href="<a href="<a href="source">source">source">source">source .
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="<a href="<a href="source">source">source">source">source
- Vinay Sreenivasa, Personal Interview, Online, March 7, 2019.
- Yunus Y. Lasania, “Telangana’s ‘open data’ policy to help start-ups address public issues,” LiveMint, accessed March 15, 2019, <a href="<a href="<a href="source">source">source">source">source
- Telangana Open Data Policy 2016, Hyderabad, Telangana: Government of Telangana, accessed March 15, 2019, <a href="<a href="<a href="source">source">source">source">source
- Ibid.
- Yunus Y. Lasania, “Telangana’s ‘open data’ policy to help start-ups address public issues,” LiveMint, accessed March 15, 2019, <a href="<a href="<a href="source">source">source">source">source
- “Background,” Factly, accessed Feb. 18, 2019, <a href="<a href="<a href="source">source">source">source">source
- Anant Maringanti, Personal Interview, Hyderabad, March 6, 2019.; Harsha Devulapalli and Girish Agrawal, “Mapping bus transit services in Hyderabad – an illustrative example of the use of open geospatial data,” Transportation Research Procedia. 25 (201): 4196-4206.
- Surya Kandukuri, Personal Interview, Hyderabad, March 6, 2019.
- Vishal Ramprasad, Personal Interview, Mumbai, Feb. 12, 2019.
- Srya Kandukuri, “Notes from our conversation,” Email, 2019.; Surya Kandukuri, Personal Interview, Hyderabad, March 6, 2019.
- Ibid.
- Aaron Antrim and Sean Barbeau, “The Many Uses of GTFS Data- Opening the Door to Transit and Multimodal Applications,” ITS America’s 23rd Annual Meeting and Exposition, April 2013, <a href="<a href="<a href="source">source">source">source">source
- Harsha Devulapalli and Girish Agrawal, “Mapping bus transit services in Hyderabad – an illustrative example of the use of open geospatial data,” Transportation Research Procedia, 25 (201): 4196-4206.
- Anumita Roychowdhury, Gaurav Dubey, Anu Soman, Waiting for a Bus: Strategies to improve Delhi’s bus system. (New Delhi: Centre for Science and Environment, 2017).
- Ibid.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- In many cases, transit operators do not make a system map or timetable available. Data can be used to provide these more analog solutions in order to meet the information needs of riders who do not possess smartphones or do not access transit data in an online format. Other technologies may prove useful to encompass groups of people who might not use smartphones, such as text or voice-based services.
- Open Government Data Platform India, “National Data Sharing and Accessibility Policy,” accessed Jan. 28, 2019, <a href="<a href="<a href="source">source">source">source">source
- “Open Government Data Platform India,” Open Government Data Platform India, accessed Jan. 28, 2019, <a href="<a href="<a href="source">source">source">source">source
- Mohd Ujaley, “Countries to Ride on India’s Open Government Data Platform,” Express Computer, <a href="<a href="<a href="source">source">source">source">source
- Simonti, Chakraborty, “Open Data Policy of the Government of India: What has it achieved?” CBG India, <a href="<a href="<a href="source">source">source">source">source
- Joel Gurin, Personal Interview, Online, March 1, 2019.
- Mark Headd, “New Thinking in How Governments Deliver Services,” in Beyond Transparency, ed. Brett Goldstein with Lauren Dyson. (San Francisco: Code for America Press, 2013): 278-9.
- Rajarshi Sahai, “Going Public with Public Transport Data For Public: Dilemmas of Developing Cities,” accessed Jan. 28, 2019, <a href="<a href="<a href="source">source">source">source">source
- “National Urban Innovation Stack: Strategy and Approach,” New Delhi, India: Ministry of Housing and Urban Affairs, Government of India, 2019, accessed Feb. 8, 2019, <a href="<a href="<a href="source">source">source">source">source
- “DataSmart Cities: Empowering Cities through Data,” Ministry of Housing and Urban Affairs, Government of India, <a href="<a href="<a href="source">source">source">source">source
- “We Continue to Create an Open Data Culture,” Makaia, accessed March 5, 2019, <a href="<a href="<a href="source">source">source">source">source
- “National Urban Transport Policy (2006),” New Delhi, India: Ministry of Urban Development, Government of India, 2006. <a href="<a href="<a href="source">source">source">source">source
- “National Urban Transport Policy (2014),” New Delhi, India: Ministry of Urban Development, Government of India, 2014. <a href="<a href="<a href="source">source">source">source">source
- “National Urban Transport Policy,” New Delhi, India: Ministry of Urban Development, Government of India (2006), <a href="<a href="<a href="source">source">source">source">source
- Ibid.
- GP Hari, Personal Interview, Kochi, Feb. 11, 2019.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Harshith Gokulendra, Personal Interview, New Delhi, March 1, 2019.
- O.P. Agarwal, Personal Interview. New Delhi, March 1, 2019.
- Srinivas Kodali, Personal Interview, New Delhi, Feb. 5, 2019.
- Rajarshi Sahai, Personal Interview, Online, Jan. 30, 2019.
- Available at: <a href="<a href="<a href="source">source">source">source">source
- Kunal Kumar, “Building National Urban Innovation Stack for Indian Smart Cities Mission – Technologies and Financing Model,” (Panel presentation, Smart Republic Conference, New Delhi, India, Feb. 27-28, 2019).
- Srinivas Kodali,. Personal Interview. New Delhi, Feb. 5, 2019.
- Samir Sharma, Personal Interview. New Delhi, Feb. 15, 2019.
- GP Hari, Personal Interview, Kochi, Feb. 11, 2019.
- Vishal Ramprasad, Personal Interview, Mumbai, Feb. 12, 2019.
- Harsha Krishna, Personal Interview. Bangalore, March 4, 2019;Vipassana Vijayarangan, Personal Interview, Online, Jan. 15, 2019.
- “National Urban Transport Policy,” New Delhi, India: Ministry of Urban Development, Government of India, 2006, <a href="<a href="<a href="source">source">source">source">source.
- Don Tapscott, “2018 Regulation Roundtable: Addressing the Regulatory Challenges of Disruptive Innovation,” Summary of 10 May 2018 Proceedings held at KPMG Toronto, Blockchain Research Institute, Aug. 8 2018.
- Warren Davidson, R-OH, "Text – H.R.7356 – 115th Congress (2017-2018): Token Taxonomy Act." Congress.gov. December 20, 2018, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- U.S. Securities and Exchange Commission, “Ponzi Schemes Using Virtual Currencies,” July 23, 2017, <a href="<a href="source">source">source">source
- The DAO is one example of a Decentralized Autonomous Organization, which is a term used to describe a “virtual” organization embodied in computer code and executed on a distributed ledger or blockchain.
- U.S. Securities and Exchange Commission, “Report of Investigation Pursuant to Section 21(a) of the Securities Exchange Act of 1934: The DAO,” July 25, 2017, <a href="<a href="source">source">source">source
- Lester Coleman, "SEC Subpoenas 80 Cryptocurrency Firms," CCN, March 04, 2018, accessed May 16, 2019. <a href="<a href="source">source">source">source.
- Nikhilesh De, "SEC Again Delays Decision on Bitwise Bitcoin ETF Approval," CoinDesk, May 15, 2019. accessed May 16, 2019, <a href="<a href="source">source">source">source.
- U.S. Securities and Exchange Commission, Fintech Finhub, "Framework for “Investment Contract” Analysis of Digital Assets," April 3, 2019, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- The Howey Test is the standard methodology, put in place by the U.S. Supreme Court to determine whether a transaction is an example of an "investment contract,” i.e., a security. It derives from a 1946 case, SEC v. W.J. Howey Co., a lawsuit involving the Howey Company of Florida. In the context of blockchain tokens, the Howey test can be expressed as three independent elements: (1) An investment of money, (2) in a common enterprise, (3) with an expectation of profits predominantly from the efforts of others.
- "A New Commissioner at America's Main Securities Regulator Causes a Buzz," The Economist, Nov. 08, 2018, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- Stan Higgins, "The SEC Just Appointed Its First-Ever Crypto Czar," CoinDesk, June 04, 2018, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- Detailed in the next section, LabCFTC is a pioneering regulatory model in dealing with fintech innovations
- Stephan O'Neal, “SEC Launches FinHub to Communicate With Industry, But What Does It Have to Say?" Cointelegraph, Feb. 13, 2019, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- Yogita Khatri, "The SEC Wants to Hire a 'Crypto Securities' Advisor," CoinDesk, April 01, 2019, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- Commodity Futures Trading Commission, “An Introduction to Virtual Currency,” 2017, <a href="<a href="source">source">source">source.
- Khatri, Yogita, "CabbageTech CEO Indicted in New York for Defrauding Crypto Investors," CoinDesk, March 27, 2019, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- Chris Giancarlo, "CFTC Chairman Chris Giancarlo,” DC Blockchain Summit 2019, Georgetown University, Washington, D.C., March 6, 2019.
- Daniel Gorfine (Director, LabCFTC), personal interview, Washington, D.C., April 2019.
- Daniel Gorfine, "Podcasts." Commodity Futures Trading Commission, accessed April 14, 2019. <a href="<a href="source">source">source">source.
- Commodity Futures Trading Commission, "Request for Input on Crypto-asset Mechanics and Markets." December 11, 2018, accessed May 12, 2019, <a href="<a href="source">source">source">source.
- United States Financial Crimes Enforcement Network, Department of Treasury, Guidance: Application of FinCEN’s Regulations to Persons Administering, Exchanging, or Using Virtual Currencies, FIN-2013-G001, March 18, 2013, <a href="<a href="source">source">source">source.
- Peter Van Valkenburgh, "FinCEN Raises Major Licensing Problem for ICOs in New Letter to Congress," Coin Center, March 6, 2018, accessed May 12, 2019, <a href="<a href="source">source">source">source.
- Timothy Spangler and Robert J. Rhatigan. "FinCEN Warns That Virtual Currency Activities Are Subject to Anti-Money Laundering Obligations," Lexology, April 03, 2018, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- FinCEN, "Advisory on the Iranian Regime’s Illicit and Malign Activities and Attempts to Exploit the Financial System," FIN-2018-A006, October 11, 2018, accessed April 14, 2019, <a href="<a href="source">source">source">source Advisory FINAL 508.pdf.
- Internal Revenue Service, "Notice 2014-21," March 2014, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- "Tax Treatment of Cryptocurrency Hard Forks for Taxable Year 2017," American Bar Association to Internal Revenue Service, March 19, 2017, Washington, D.C.
- "IRS Treatment of Virtual Currencies," U.S. House of Representatives Committee on Ways and Means to Internal Revenue Service, Sept. 19, 2018, Washington, D.C. <a href="<a href="source">source">source">source.
- Steven T. Mnuchin and Craig S. Phillips, “A Financial System That Creates Economic Opportunities Nonbank Financials, Fintech, and Innovation,” U.S. Department of the Treasury, July 2018. <a href="<a href="source">source">source">source.
- Craig S. Phillips "Fireside Chat with Counselor Craig Phillips, U.S. Dept. of the Treasury," Speech at the D.C. Blockchain Summit 2019, Georgetown University, Washington, D.C., March 6, 2019.
- Statement of Jennifer Shasky Calvery, Director, Financial Crimes Enforcement Network, United States Department of the Treasury (2013) (testimony of Jennifer Shasky Calvery).<a href="<a href="source">source">source">source.
- Ibid.
- "Virtual Currency Business (BitLicense)," New York Department of Financial Services, 2015. <a href="<a href="source">source">source">source.
- Patrick Murck, (Partner, Cooley LLP), personal interview, March 2019.
- Marco Santori and Maria Vullo, "Legal Tender? The Regulation of Cryptocurrencies," June 7, 2018, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- Anonymous New York venture capitalist in blockchain, personal interview, March 2019.
- Gage Lathrop and Dale Werts, "Blockchain and Cryptocurrency: State Law Roundup," JD Supra, July 10, 2018, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- Long, Caitlin, "What Do Wyoming's 13 New Blockchain Laws Mean?" Forbes, April 08, 2019, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- Caitlin Long (Co-Founder, Wyoming Blockchain Coalition), personal interview, Feb. 2019.
- Multiple start-up founders and business strategy leads (anonymous), personal interview, April 2019, Seattle.
- Greg Heuss (Managing Partner, Counterpoint Ventures), personal interview, April 2019, Seattle, Washington.
- Multiple start-ups (anonymous), interview by the author, April 2019, Los Angeles and San Francisco, California.
- David Otto (Founder and Managing Partner, Martin Davis PLLC), personal interview, April 2019, Seattle, Washington.
- Multiple start-ups and Venture Capitalists (anonymous), interview by the author, April 2019, Los Angeles and San Francisco, California.
- The SEC, as well as the securities laws it enforces, have come under bipartisan criticism from academics, entrepreneurs, investors, and members of Congress for creating red tape that makes it difficult both for entrepreneurs to raise capital in the public markets and for investors to find wealth-building opportunities. This concern prompted Congress to pass regulatory relief overwhelmingly in the Jumpstart Our Business Start-ups (JOBS) Act, which was signed by President Obama in 2012. In 2018, the U.S. House of Representatives passed a bill allowing further relief, the Jobs and Investor Confidence Act. The JOBS Act eased some burdens on entrepreneurs by exempting small and “emerging growth” companies from some of the costly burdens of securities laws like the Sarbanes-Oxley Act of 2002 and the Dodd-Frank Act 2010.For further reference: John Berlau, "Cryptocurrency and the SEC's Limitless Power Grab," Competitive Enterprise Institute, April 11, 2019, accessed April 14, 2019, <a href="<a href="source">source">source">source.
- Multiple venture capitalists, interviewed by author, Feb./Apr. 2019, New York, Seattle, San Francisco.
- John M. Carey, Legislative Voting and Accountability, Cambridge Studies in Comparative Politics (Cambridge University Press, 2009), ix.
- This expectation was, in some part, because of the way I had seen the voting records of American members of Congress being used to discuss their past positions on legislative matter, as well as to examine the linkages between the funding they received and the positions they espoused.
- Rule 246, “Rules of Procedure and Conduct of Business in the Council of States (Rajya Sabha),” August 2016, <a href="source">source">source; and Rule 364, “Rules of Procedure and Conduct of Business in Lok Sabha,” April 2014, <a href="source">source">source.
- “Constitution of India,” 1950, <a href="source">source">source.
- For the sake of brevity, the term “Speaker” shall be used to cover both the Speaker of the Lok Sabha as well as the Chairman of the Rajya Sabha.
- A head-count is not seen as a “division” under the Rules of Procedures of the Lok Sabha and the Rajya Sabha, even though votes are counted.
- This was increased from 2½ minutes in 1989 (Lok Sabha) and 2006 (Rajya Sabha).
- It was in 1956-57 that the Indo-German Trade Centre was contracted to install ‘automatic vote recording equipment,’ i.e., voting machines, manufactured by Telefonbau und Normalzeit G.M.B.H. of Frankfurt, West Germany, in both the Lok Sabha as well as the Rajya Sabha. Incidentally, this contract led to what was the first ruling on parliamentary privilege within the Rajya Sabha, and the second in the Lok Sabha in relation to a case before the Election Tribunal and the Calcutta High Court on disqualification of a member. See, Rajya Sabha Committee on Privileges, “First Report,” May 1958, <a href="source">source">source; Lok Sabha Committee on Privileges, “Second Report,” April 1958, <a href="source">source">source; and Brojo Gopal Das v. Kalipada Banerjee, January 1959, <a href="source">source">source. Given that the equipment did not have any means of the MP authenticating herself (unlike the machine used in the U.S. House of Representatives), that necessitated the allocation of specific seats to each member, which had not been fixed (except the reservation of a few rows for government ministers) until then. As a book on Indian parliamentary procedure notes, “each member is now allotted a fixed seat from where he has to address the House unless it otherwise directed by the Chair, and at the time of a division he has to record his vote by operating the apparatus fixed to his seat.” MN Kaul and SL Shakdher, Practice and Procedure of Parliament, 3rd ed., vol. 1 (Metropolitan Book Co., 1979), <a href="source">source">source; this is also encapsulated in the Lok Sabha Rules of Procedure. Rule 349(vii), “Rules of Procedure and Conduct of Business in Lok Sabha”
- India Const., art. 368(2).
- India Const., arts. 61(2)(b) and 61(4).
- India Const., art. 124(4).
- India Const., art. 244A(3).
- India Const., art. 249.
- India Const., art. 312.
- India Const., art.352(6).
- India Const., arts. 55(3) & 66(1).
- U.S. Const., art. I, . 5, cl. 3.
- Elizabeth Rybicki, “Voting and Quorum Procedures in the Senate,” (Congressional Research Service, August 2013), 5.
- Rybicki, 5.
- “Divisions,” UK Parliament, accessed 10 March 2019, <a href="source">source">source
- Ibid.
- Shalaka Patil, “Push Button Parliament – Why India Needs a Non-Partisan, Recorded Vote System,” Anuario Colombiano de Derecho Internacional 4 (2011): 182, <a href="source">source">source.
- Carey, Legislative Voting and Accountability, 166.
- Carey, 166.
- Whips can be the letter that are issued by a senior functionary of a political party, issuing directions to the members of that party in parliament—usually directing them to vote in a particular manner on a motion, to abstain from voting, or even to just attend a particular session of parliament. The term can also be used to describe the privilege of belonging to a political party; thus when an MP’s whip is removed, that MP is expelled from the party, until that MP’s whip is restored. Finally, the term can also be used to describe the senior political party functionaries whose job it is to issue and remove whips, and otherwise ensure cohesion among their fellow party members. Whips are statutorily recognized in multiple parliaments, and draw salaries from the public exchequer as well in countries like India and the U.K.
- R. Eric Petersen, “Parliament and Congress: A Brief Comparison of the British House of Commons and the U.S. House of Representatives,” 2005, 4, <a href="source">source">source.
- Petersen, 4.
- The law allows for disqualification if there is “voluntarily giving up of seat” or if an MP “votes or abstains from voting in such House contrary to any direction issued by the political party to which he belongs or by any person or authority authorized by it in this behalf, without obtaining, in either case, the prior permission of such political party, person or authority and such voting or abstention”. There are limited circumstances in whips may not be issued, namely in the election of presidents and vice-presidents.
- Kihoto Hollohan v. Zachillhu, 1992 SCR (1) 686. The court noted that, “there are certain side effects and fall out which might affect and hurt even honest dissenters and conscientious objectors, but these are the usual plus and minus of all areas of experimental legislation.”
- Ibid.
- Mannadi Satyanarayan Reddy v. Andhra Pradesh Legislative Assembly and Others, 2009 (3) ALT 32.
- David Beetham, Parliament and Democracy in the Twenty-First Century: A Guide to Good Practice (Inter-Parliamentary Union, 2006), 96, <a href="source">source">source.
- Beetham, 96.
- The situation before 1972-73 when the U.S. House of Representatives moved to electronic voting was described by the Clerk of the House: “Voting in the House was something of a mystery, unless you were present in the chamber when the roll was called, and attentive to the Members’ responses, and then, of course, people in the gallery then, as now, could not take notes. You did not know until the next day when the vote was recapitulated in the Congressional Record how the Members individually had voted.” – Donnald K. Anderson, Clerk of the U.S. House of Representatives (2006)
- Patil, “Push Button Parliament – Why India Needs a Non-Partisan, Recorded Vote System,” 170–72.
- Simon Hug, Simone Wegmann, and Reto Wüest, ‘Parliamentary Voting Procedures in Comparison’, West European Politics 38, no. 5 (September 2015): 943, <a href="source">source">source.
- Patil, “Push Button Parliament – Why India Needs a Non-Partisan, Recorded Vote System,” 171.
- Varghese K. George, “Voice Vote Valid Only When Nobody Questions It,” The Hindu, November 2014, <a href="source">source">source.
- Anusha Ondaatjie and Iain Marlow, “No Confidence in New PM, Sri Lanka Lawmakers Tell Parliament,” Bloomberg, accessed 29 April 2019, <a href="source">source">source.
- See Hug, Wegmann, and Wüest,”Parliamentary Voting Procedures in Comparison.”
- For this to happen, it ought to be taken up by the Rules Committee of either house, and a change recommended. Thereupon, the rules of procedure of the Lok Sabha and the Rajya Sabha should be amended by each house. While the lack of a clear rule is not a bar for this practice to be implemented, it would give it a more binding character if it found expression in the rules of procedure. As a start, though, it would be judicious for political parties to start publicly documenting every whip they issue (whether one-line, two-line, or three-line whips) on their website.
- Patil, “Push Button Parliament — Why India Needs a Non-Partisan, Recorded Vote System,” 191.
- Patil, 192.
- MPs have at least four distinct kinds of duties: (1) Legislative and deliberative: MPs debate, draft, and pass statutes, they amend or reject subordinate legislation promulgated by the Executive; (2) Oversight: they exercise budgetary oversight, participate in committees that examine the workings of the government, and have powers to conduct special investigations via “joint parliamentary committees,” fell governments through “no-confidence motions,” impeach the President, approve or disapprove declarations of emergency, and interrogate the functioning of the government through a variety of means [Question Hour, Calling Attention Motion, etc.], and impeach judges of constitutional courts; (3) Elective: they vote for the elections for the president and vice-president of India (apart from parliamentary functionaries such as the Speaker of the Lok Sabha, etc.; (4) Representative: MPs represent their political parties, and represent their constituents by raising issues relevant to their constituents in Parliament [or in parliamentary committees and processes], by aiding their constituents in communicating with governmental bodies and getting their concerns heard by the government and local bodies, and recommending specific developmental projects be undertaken in their constituency and providing the funding for that through the MPLAD fund.
- Lok Sabha Secretariat, “Resumé of Work Done by Lok Sabha: 16th Lok Sabha, 13th Session,” February 2018, 32–33, <a href="source">source">source.
- MP’s Reports, Dr. Shashi Tharoor’s Official Website, 2019, <a href="source">source">source. MP Shashi Tharoor has been leading the way, having issued such reports since his first term from 2009-2014. Instructively, in his latest end-term report covering 2014-2019, he only dedicates two sections for work within the Lok Sabha and a Standing Committee, while eleven sections are dedicated to work outside of Parliament.
- Manju Jain, “Delivering Parliamentary Library and Research Services in an Interconnected World: The Case of the Parliament of India,” IFLA – Library and Research Services for Parliaments, September 2016, <a href="source">source">source.
- Rajya Sabha Secretariat, ‘Rajya Sabha Annual Report 2017’, 2017, <a href="source">source">source.
- Empirical research for this paper would have been aided greatly if Parliamentary debates were available in a structured format such as Akoma Ntoso.
- There are many definitions of open standards, but for the purposes of this section I mean that it has been standardized by a committee with open participation and an open process, and is available for free, and may be implemented in free/libre/open source software without payment of any royalties.
- Ashok Hariharan, interview by author, March 2019.
- John Sheridan and Jim Mangiafico, ‘Structure-Aware Search of UK Legislation’, in XML London 2016 Conference Proceedings (London, United Kingdom: XML London, 2016), 78–81, <a href="source">source">source.
- ‘AT4AM.eu’, AT4AM.eu, accessed 30 January 2019, <a href="source">source">source.
- “U.N. Semantic Interoperability Framework for Normative and Parliamentary Documents (UNSIF) | United Nations System Chief Executives Board for Coordination,” United Nations System, accessed 16 April 2019, <a href="source">source">source. The blog post on this notes: ‘The adoption of [the UN Semantic Interoperability Framework] has put the foundations for the establishment of a UN-wide ecosystem of machine-readable documents that will foster collaboration and reduce costs in information management across the system by transforming the web of information enclosed in traditional word processing documents into a web of data that can be interpreted by computers to create innovative services. By having documents available in a common semantically rich format will raise dramatically the UN capacity to coordinate activities, create synergies and respond to clients’ information demands, improve the efficiency and quality of information processing, dissemination and accessibility, and bring significant benefits in terms of governance, accountability and transparency.”
- “Indigo Platform for Publishing Beautiful Legislation: Laws-Africa/Indigo’ (Laws.Africa, March 2019), <a href="source">source">source.
- Nyaaya, “Laws of India in Akoma Ntoso XML format,” <a href="source">source">source.
- Union of India v. Vansh Sharad Gupta, W.P. (C) 4761/2016, order dated May 25, 2017, <a href="source">source">source.
- Union of India v. Vansh Sharad Gupta, W.P. (C) 4761/2016, order dated December 15, 2017, <a href="source">source">source.
- Chakshu Roy, “Budgeting for Democracy,” The Indian Express, February 2017, <a href="source">source">source.
- Ashok Hariharan, interview with author, March 2019. Hariharan.’
- Hariharan.
- Hariharan.
- Beetham, Parliament and Democracy in the Twenty-First Century, 7.
- Ministry of Civil Aviation, Government Announces Regulations for Drones, New Delhi, India: Press Information Bureau, Government of India, August 27, 2018, source">source; Gill, Prabhjote, “Flying Drones are Finally Legal in India.,” Business Insider, August 29, 2018, source">source.
- For a discussion on how unmanned aerial vehicles or commercial drones are being utilized in some of the core public sectors and allowing civilian uses of aerial monitoring, see: Padmanabhan, Ananth, “Civilian Drones and India’s Regulatory Response,” Carnegie India, March 10, 2017, source">source.
- “Cleared for Take-Off: India Ready for the Drone Revolution, Pilots New Open Source Guide for Governments,” World Economic Forum, January 25, 2019, source">source.
- FE Bureau, “India’s Drone Market Expected to Grow $885.7 mn by 2021,” Financial Express, October 8, 2018, source">source.
- Mallapur, Chaitanya, “India Tops List of Drone-Importing Nations,” Business Insider, May 4, 2015, source">source.
- Panda, Ankit, “US Approves Sale of Armed Predator-B Drones to India,” The Diplomat, May 2, 2018. source">source.
- Pamela Cohn, Alastair Green, Meredith Langstaff, and Melanie Roller, “Commercial Drones are Here: The Future of Unmanned Aerial Systems”, McKinsey Report, December 2017, source">source
- Pamela Cohn, Alastair Green, Meredith Langstaff, and Melanie Roller, “Commercial Drones Are Here: The Future of Unmanned Aerial Systems,” McKinsey Report, December 2017, source">source.
- “Drone Certification: A Step-by-Step Guide to FAA Part 107 for U.S. Commercial Drone Pilots,” UAV Coach, source">source.
- Dukowitz, Jack, “ISO Releases Draft of First International Drone Standards for Public Comment,” UAVCoach. November 30, 2018, source">source.
- Government. Ministry of External Affairs. Responding First as a Leading Power. source">source
- Kuronuma, Yuki. ‘Drones Help Rescue Efforts in Nepal.’ Nikkei Asian Review. May 11, 2015. source">source
- Parmar, Tekendra, “Drones in India,” Center for the Study of the Drone. December 4, 2014. source">source.
- Rossow, Richard M. and C. Raja Mohan, Deepening India-U.S. Cooperation on Humanitarian Assistance and Disaster Relief in the Indian Ocean and the Asia-Pacific Regions, CSIS, Wadhwani Chair in U.S.-India Policy Studies, October 2015. source">source.
- Mehta, Aaron, “US, India Collaborating on Air-Launched Drone,” Defense News, March 18, 2019, source">source
- “Building Cargo Drone Expertise in Papua New Guinea,” iRevolutions, February 25, 2019, source">source.
- “Is China at the Forefront of Drone Technology?”, CSIS ChinaPower, May 29, 2018, source">source
- Das, Pranab K, “The Customs Paradigm in Combatting Weapons of Mass Destruction,” Ministry of Finance, Government of India. source">source.
- Ministry of Civil Aviation. Operations of Remotely Piloted Aircraft System (RPAS) to be Enabled through Digital Sky Platform, Press Information Bureau, August 27, 2018. source">source
- Mathews, Neelam, “India Struggles With Drone Issues.” AINOnline, February 17, 2016, source">source
- For a detailed discussion on the various challenges to bolster the commercial drone sector in India, see “Make in India for Unmanned Aircraft Systems: Awaiting its Kitty Hawk Moment,” FICCI and EY, source">source
- Rice, Stephen, “Eyes in the Sky: The Public has Privacy Concerns About Drones”, Forbes, February 4, 2019, source">source
- A doorstep delivery would entail collection of customer data at levels which would be considered private such as residence address, timings for deliveries among other detailed information on customers.
- Lohn, Andrew J, Gulden, Timothy R. Xu, Jia. Jones, Therese, Kuhn, Kenneth, Welser IV, William. “What’s in Store for Commercial Delivery Drones,” Rand Research Brief, source">source
- Lohn, Andrew J, Gulden, Timothy R. Xu, Jia. Jones, Therese, Kuhn, Kenneth, Welser IV, William. “What’s in Store for Commercial Delivery Drones,” Rand Research Brief, source">source
- ET Bureau, “Drones: Out of Sight, but in Indian Govt’s Mind,” Economic Times, January 16, 2019, source">source
- Isaak, Adam “With More Drones in the Sky Every Year, ‘Counter-Drone’ Tech Can Keep the Bad Ones at Bay”, CNBC, February 2, 2019, source">source
- Chang, Lulu “FBI Rescue Hostage Team Bamboozled After Criminals Unleash Drone Swarm”, Digital Trends, May 4, 2018, source">source
- Brennan, David. “Why are Militants Using Drones? UAV Weapons Have Spread Far Beyond Nation States,” Newsweek, April 24, 2018, source">source.
- “Game of Drones-Proliferated Drones,” Wargame Report, Center for New American Security, June 29, 2016, source">source.
- Harper, Alexander, “Drones Level the Battlefield for Extremists,” The Interpreter, April 20, 2018, source">source.
- Michel, Arthur H, ‘Counter-Drone Systems.’ The Center for Study of Drone, Bard College, February 2018, accessed April 26, 2019. source">source
- Ibid.
- Grand View Research, “Anti-Drone Market Size Worth $1.85 Billion By 2024 | CAGR: 24.1%,” accessed April 26, 2019. source">source
- “Why We Need Counter-Drone Technology Now More than Ever,” CNBC, February 1, 2019, source">source
- Federal Aviation Administration, Pilot Reports of Close Calls With Drones Soar in 2015, August 12, 2015, source">source
- Goglia, John,“FAA Confirms Shooting a Drone is a Federal Crime. So When Will U.S. Prosecute?” Forbes, April 13, 2016, source">source
- U.S. Department of Transportation, Updated Guidance on Unmanned Aircraft System (UAS) Detection and Countermeasures, Federal Aviation Agency. July 19, 2018, source">source
- Snead, Jason, John-Michael Seibler, and David Inserra, “Establishing a Legal Framework for Counter-Drone Technologies,” The Heritage Foundation, April 16, 2018, source">source
- French, Sally, “Department Of Defense Is Using SkySafe To Crack Down on Rogue Drones,” Drone Girl, July 20, 2017, source">source
- Peri, Dinaker, “Expanding Anti-UAVs Market to Counter Drone Technology,” CLAWS Journal, Winter 2015, source">source
- Ahuja, Namrata B, “Govt Plans to Deploy Anti-Drone Facilities at Airports,” The Week, March 14, 2018, source">source
- National Nuclear Security Administration, NNSA Deploys its First Counter-Unmanned Aircraft System, Nov. 19, 2018, source">source
- Horizontal technology refers to application of a technology across different sectors without much investment in R&D. An example would be e-commerce where selling a book is similar to selling a laptop.
- “The Chatbots Taking Over Government: What Jobs Can They Do?” October 17, 2017, source.
- Lindsay Curdele, “Pokemon Gov: Gamifying Civic Engagement,” July 28, 2016source.
- Participatory Pokemon Go, last modified July 5, 2017, source.
- “Catalog of Good Deeds: Building Civil Society Through Daily Acts of Kindness, Tlalnepantla De Baz, Mexico: Mayors Challenge Finalist, 2016,source.
- Ibid.
- G. Sgueo, A discussion on gamified digital advocacy, Workshop The Future of Law. Technology, Innovation and Access to Justice, Chair for Public Law and Comparative Law, Humboldt University of Berlin and Friedrich Naumann Stiftung for Freedom, November 2018.
- Alan Ivan Chorney, "Taking the Game out of Gamification," Dalhousie Journal of Interdisciplinary Management, Vol. 8, No. 1 (2012).
- Jane McGonigal, Reality is broken: Why games make us better and how they can change the world. (New York: Penguin, 2011).
- Robert D. Putnam, "E Pluribus Unum: Diversity and Community in the Twenty-first Century." (The 2006 Johan Skytte Prize Lecture, 2007).
- Nicholas Plumb, Hannah Millinship Hayes, et al, “Integration City: A new communities agenda for London,” October 2016, source.
- Ibid
- OECD Guidelines on Measuring Trust, Nov. 23, 2017, source.
- I. Bogost, “The rhetoric of video games” in K. SALEN (ed.), The Ecology of Games: Connecting Youth, Games, and Learning, (MIT Press, 2008), p. 130.
- Ibid.
- Gianluca Sgueo, “Games, Powers & Democracies: Chapter 1,” Games, Powers & Democracies, (Milan: Bocconi University Press, 2018).
- , Barnett et al., “Toward Metrics for Re(imagining) Governance: The Promise and Challenge of Evaluating Innovations in How We Govern,” GovLab Working Paper, April 18, 2013.
- Graham Smith, Democratic innovations: Designing institutions for citizen participation (Cambridge: Cambridge University Press, 2009).
- Decide Madrid, source.
- CrowdLaw Introduction, The GovLab, Sep. 2017, source
- “Over Half of Reykjavik Residents Steer Policymaking – Here's How,” Apolitical, Sept. 2017, source.
- Vtaiwan, source.
- “Taiwan Is Using Social Media to Crowdsource Legislation,” Apolitical, June 2017, source.
- Beth Noveck, “More Than A Coin: The Rise Of Civic Cryptocurrency,”June 25, 2018, source.
- Paul van Sambeek, Edgar Kampers, “NU-spaarpas, the Sustainable Incentive Card Scheme, 2004.
- De Torekes, source
- “Engage Your Citizens with Gamification,” Innowave, source.
- Peter Hasson, “Social Credit,” Daily Caller, Nov. 2018, source.
- Andrew Yang, “Modern Time Banking,” source.
- Rachel Botsman, “Big Data Meets Big Brother As China Moves To Rate Its Citizens,” Wired, Oct. 21, 2017, source.
- Rogier Creemers, "China's Social Credit System: An Evolving Practice of Control." (2018)
- A. Davies and J. Simon, “Citizen engagement in social innovation – a case study report,” adeliverable of the project: “The theoretical, empirical and policy foundations for building socialinnovation in Europe” (TEPSIE), European Commission – 7th Framework Programme, Brussels:European Commission, DG Research, 2012.
- Fred Powell, "Civil society, social policy and participatory democracy: Past, present and future." Social Policy and Society 8, no. 1 (2009): 49-58.
- Ibid
- Joseph Kahne, Ellen Middaugh, and Chris Evans. The civic potential of video games. (Cambridge, MA: MIT Press, 2009).
- “Who Knows Best? Cities Consult Citizens for Fresh IdeasPlace,” Feb. 2019, source.
- Samuel Bowles, “The Moral Economy: Why Good Incentives are no substitute for good citizens,” (New Haven, CT: Yale University Press, 2017).
- Cass R. Sunstein, “Why nudge?: The politics of libertarian paternalism,” ((New Haven, CT: Yale University Press, 2014).
- Beth Noveck, Smarter Citizens, Smarter State, (Harvard, MA:Harvard University Press, 2015).
- BETH Noveck, "Wiki-government: How Technology Can Make Government Better, Democracy Stronger, and Citizens More Powerful,” (Washington, DC: Brookings Institution 2009).
- Amos Tversky and Daniel Kahneman, "Judgment Under Uncertainty: Heuristics and Biases," Science 185, no. 4157 (1974): 1124-1131.
- John Cheney-Lippold, "A New Algorithmic Identity: Soft Biopolitics and the Modulation of Control," Theory, Culture & Society 28, no. 6 (2011): 164-181.
- John Cheney-Lippold, "Jus algoritmi: How the National Security Agency Remade Citizenship," International Journal of Communication 10 (2016): 22.
- Colin Daileda “The U.S. Will Start Collecting Social and Search Data on Every Immigrant Soon,” Mashable, September 2017, source.
- Draft Ethics Guidelines for Trustworthy AI, European Commission, December 2018, source.
- Ibid.
- Tara McGuinness and Anne-Marie Slaughter, “The New Practice of Public Problem Solving,” Stanford Social Innovation Review, Spring 2019. source
- Bharath Visweswariah, “Solving India's Most Pressing Challenges with Civic Tech,” Medium, May 21, 2018, source.
- “About: ichangemycity,” source.
- “Next Election: Make It Count!,” source.
- “Civis,” source.
- “Building Young India's Champions | Solve ninja, Reap Benefit,” source
- “Home.” Village Capital, vilcap.com/.
- Richard H. Thaler and Cass R. Sunstein, Nudge: Improving Decisions about Health, Wealth, and Happiness, (New York: Penguin, 2009).
- “C40 Cities | Networks,” source
- Stefaan Verhulst, Towards a Science of Gamification and its Relationship to Governance and Democracy (2018).
Key Differences Between the U.S. Social Security System and India’s Aadhaar System (Kaliya Young)
Kaliya Young also known as "Identity Woman" is the author of A Comprehensive Guide to Self-Sovereign Identity and the Domains of Identity. She holds a Master of Science in Identity Management and Security from the University of Texas at Austin. She currently serves on the faculty of Merritt College in Oakland California.
Acknowledgments: The author would like to thank all the people she spoke with in India about Aadhaar. This paper would not have been possible without the support of New America and the guidance provided by Awista Ayub and Melissa Salyk-Virk. The author would also like to thank the 2019 India-U.S. Fellows.
Introduction
As the world’s largest democracies, with 1.3 billion and 326 million people respectively, India and the United States both need to support the abstract representation of individuals and entities and support their transactions with each other confidently in the digital world.
In a 2013 lecture, Nandan Nilekani, founding chairman of Unique Identification Authority of India (UIDAI) stated, "the same thing happened in the 1930s in the United States when Roosevelt passed the Social Security Act as part of the New Deal.”513 Because the United States is often admired as a large functioning democracy, the fact that it uses a national ID number means that there is an assumption that the U.S. system must be a good model.
The United States began issuing Social Security numbers (SSN) to a small segment of citizens in 1935.514 The system has evolved over the past 85 years and now numbers are issued to children at birth. Today, Social Security numbers are used by employers to verify employment eligibility and by the government to track the collection of taxes, social benefit contributions by people, and to support them receiving benefits. Most residents also have a state level driver’s license or ID card that an SSN is required in the application process. This type of ID has a photo biometric and is held by 87 percent of adults.515
Over the past 10 years, India has rolled out an identity system based on the collection of biometrics and simple demographic information from all of its residents. The system is called Aadhaar, meaning foundation in Hindi. To date, Aadhaar claims to have enrolled 1.3 billion residents.
Both Aadhaar numbers and SSN are unique numbers issued to residents by their federal government. A card with the number on it is mailed to the resident. To this extent, the numbers are comparable. There are differences in the registration and enrollment processes, but this is not really where the major differences lie.
The important differences center on how numbers serve as part of an overall identity system in both the public and private sector. This paper walks through the specifics of these differences comparing the U.S. and Indian systems throughout.
The first section provides context for each ID and considers the historical and contemporary risks of identity systems.
The second section considers the role of the number itself, and, further, explains how the creators of Aadhaar position the number within a sprawling system that continues to add new features, particularly in contrast with the limited role of the SSN within the U.S. context.
The third section looks at the very different legal and regulatory frameworks that inform the operation of the agencies responsible for both Aadhaar and Social Security, along with contrasts in the visibility of operations through the court systems where challenges occur.
The fourth section outlines how the national-level UIDAI worked with state-level governments and consultants in India to create vast databases of information about residents at the local level. These state-level databases are called State Resident Data Hubs. In the United States, there are no large scale databases of this type. This section walks through the range of regulations that have been put in place since the 1960s to guard against the creation of such databases in the United States.
Finally, the paper concludes with a discussion in sections five and six about how the use of the SSN has become limited to employee enrollment and financial services in contrast to the ever-expanding use of Aadhaar in the private sector and employment context.
Risks of Identity Technologies
Identity systems, one of the original public interest technologies,516 arose with the creation of contemporary nation-states.517 The first identity documents were simply receipts that proved that an individual had been surveyed in a census or that they were registered by a local authority in return for a government service in response to a live event (e.g., birth, marriage, and/or death). As a result, these documents or statuses shaped a citizen’s perception of identity as a member of a common public or state. 518
Identity technologies have tremendous power. They can enable the constructive engagement of citizens with their government, but can be used by the state in ways that cause great harm.
Democracies benefit from diverse input into the design of identity systems and a broad consensus about their operation, transparency, and accountability to the citizens whose information is managed by these systems.
Existing mental models of how identity and identification systems work are based on government registries for births, deaths, and marriages where events are recorded on paper in a ledger book and certificates issued. Identifier oriented systems like the SSN originated at a time when paper-based punch cards were the latest technology. There were limits to how far and wide a number could circulate when paper technologies like punch cards, index cards, and the physical mail system were the only means of circulation.
Even when identity technology is limited to paper, its abuse could lead to horrific results. IBM’s punch card technology was instrumental in facilitating the Nazi genocide of Jews in Europe via the census records in various countries.519 Several Indian subjects interviewed for this research paper pointed out that there have been a number of significant events of communal and caste violence in India:
- Keezhvenmani520 (Tamil Nadu, 1968)
- Gujarat521 (1969)
- Nellie522 (Assam, 1983)
- The Anti-Sikh Riots (1984)523
- Hashimpura (Uttar Pradesh, 1987)524
- Lakshmanpur Bathe (Bihar, 1997)525
- Gujarat (2002)526
- Khairlanji (Maharashtra, 2006)527
Some of these incidents were facilitated by datasets from Voter IDs and Ration Cards, and some had implicit state involvement.528 Beyond these large incidents involving thousands of deaths at one time, there are also tens of thousands of reports of more isolated incidents of violence every year against Dalits.529
In the third millennium, computers became ubiquitous and we, i.e., society writ-large, must consider how identification-based systems translate into a new digital medium. There are new opportunities and risks created by the design and implementation of identity technologies and the systems they are connected to.
Techno-Utopianism,530 the predominant stance of UIDAI, iSPRIT and India Stack proponents,531 does not address some of the real security risks. In India, security researchers and reporters who have brought to light the flaws, vulnerabilities, and leaks of the Aadhaar number system have been prosecuted by the UIDAI as criminals.532 This has led to groups of concerned critics collaborating and publishing under pseudonyms to ensure the public knows about the issues and vulnerabilities while limiting their own risk.533
What is the Role of The Number
Both the U.S. Social Security Number and Aadhaar Number are core to how the respective systems work but the way the number is seen and how the designers of the programs orient around it is quite different.
In India, there has been a proliferation of digital services linked to and surrounding the Aadhaar number. Some examples include:
- Aadhaar-enabled payment services for bank transfers using only the Aadhaar number;
- Aadhaar payment bridge for government-to-citizen transfers;
- Offline authentication with QR code;
- Mobile Aadhaar application including lock and unlock service;
- Aadhaar authentication history logs;
- VirtualID creation;
- Mobile OTP for authentication;
- eKYC (electronic Know Your Customer);
- DigiLocker, a service for people to download all the documents they have been issued by different government departments; and
- eSignatures and document signed locker.
However, security researchers I spoke with highlighted major flaws in the design of many of these services.534 There has also been a stream of reporting about specific security vulnerabilities that have been uncovered, like API’s to the core demographic database that was reported to be completely open.535
The creators of Aadhaar and the India Stack led by iSPIRT,536 a trade association of software makers focused on the Indian market, see the Aadhaar number as the center of a bottleneck in an ecosystem. The Aadhar system is built under the assumption that national identity numbers are the equivalent of IP addresses in a digital network.537 This assumption creates significant correlation risks and the potential to amass vast datasets that can be used for commercial and government surveillance.
In the United States, public concern about the possible use of the SSN for government surveillance has limited the use of the number and led to regulations about its use in both the public and private sector.
On the other hand, in the India stack model, not only does the Indian government provide an identity card to citizens, acknowledging them and giving them a “proof” to share, but it also provides authentication services.538 Indians can use their UID to log in to services and then either use a biometric or get a one-time password (OTP) sent to their phone which they then enter to complete remote authentication. This means that the UIDAI has a record of all of the places where a person authenticates their identity, and this information is kept in Aadhaar’s logs for six months.
It is very difficult to imagine a proposal by private sector companies or government leaders in the United States that would require individuals to “log in” with their SSN.539 U.S. government agencies, both as a matter of policy and law, are reducing or ending their reliance on the SSN as the canonical identifier of people. There is no way an SSN can be used for authentication against a factor of authentication (password, OTP, biometric) held by the Social Security Administration.
There is ongoing work in the United States to develop ways for individuals to prove they are a particular person by leveraging government-issued identity documents in digital form.540 An important feature of some of these systems is that they do not rely on a connection to a central government database to prove their veracity.541
Legal and Regulatory Frameworks
UIDAI and its leadership have a culture of operating just beyond or just within a legal and regulatory framework. Two books about the story of the creation of Aadhaar have been written by journalists.542 Both document how the project did not have a legal or regulatory basis for six years between 2009 and 2016 and operated with a startup culture. They describe how the UIDAI leaders pushed to build out Aadhaar despite this legal limbo.
When it was finally made legal with the Aadhaar Act of 2016, the UIDAI was also left as its own regulator with enormous freedom to expand aspects of the system and build new “features” without any need to consult the public. UIDAI did not do privacy impact or security assessments that would bring transparency to how the system would work or change in the future and what the implications would be. In my interviews with UIDAI leaders, they described the next new features that were going to be appearing within the India Stack framework while at the same time saying that the UIDAI had no responsibility for how people were asked for their identity information or how that information was used by those requesting it.
Unlike UIDAI, when the U.S. government changes any technology at the core of its operations, it moves with a deliberate and careful approach bound by the legal and regulatory framework of the government, particularly when working with the sensitive personal information of its residents. For decades, there have been extensive on-the-record hearings by various legislative committees and presidential commissions addressing government systems for registering citizens and collecting and using data about them. Hearings of this type are, by default, not public in the Indian parliamentary system.
Another contrast between the two systems is a key mechanism for public accountability. Challenges to U.S. government procedures happen in the courts, where proceedings produce court transcripts. The 38 days of hearings about Aadhaar before the Indian Supreme Court produced no transcripts: the best we have are some summaries543 and aggregations of live tweeting544 done by observers in the courtroom.
In contrast to the U.S. Social Security Administration, the UIDAI is its own regulator. This is in part because, in India, most legislation is written in a way that delegates significant regulatory power to the government while the law concentrates on legal and policy issues. In the case of the Aadhaar Act, substantial regulatory power was given not to the government but to UIDAI itself,545 meaning it is not actually accountable to any other organization. And the UIDAI is exempted from Right to Information [RTI] requests and it sets the grievance mechanisms for itself.546 The UIDAI is responsible for regulating the ecosystem around it. Many have questioned the revolving door that is seemingly connecting the UIDAI and private industry and question whether this limits the ability of UIDAI to regulate its own ecosystem.547
From Enrollment to Mass Databases
Governments register people into systems through enrollment. In the United States, enrollment systems are run entirely by government officials who are accountable to government agencies within which corruption is very rare. There is coordination between the local county and state levels that have the authority to register births and the federal Social Security Administration through a system called enumeration at birth (EAB).548
Enrolling people in more than one program or system at once is multi-context enrollment. In the United States, legislation at the federal level, colloquially known as the Motor Voter Act and officially as National Voter Registration Act549 of 1993 mandates that states provide the opportunity for people who are signing up or renewing a driver’s license to also have the opportunity to register to vote in elections. Individuals getting a driver’s license must proactively choose to be enrolled in this second and very different system. A special process pushes data from the driver's license registration process over to the government agency that manages the state-level voter list.
In India, multi-context enrollment takes place with state-level registrars. States are incentivized to enroll their people because they get to collect more information than the basic four fields (name, birthdate, gender, and address) required by the UIDAI “Know Your Resident” rules. Different states have added additional fields, such as marital status, house status550, occupation, and VoterID number.551 This data was intended to be reserved for the state and is known as “Know Your Resident Plus” [KYR+] data.
Indian residents, when they go through the process of getting their Aadhaar number for the first time, are enrolled in the UIDAI Central Identity Repository and the State Resident Data Hub.552
Figure 3: Flow of Data from Enrollment into the CIDR and SRDH by Anand Venkatanarayanan https://medium.com/karana/the-360-degree-database-17a0f91e6a33
UIDAI created the software and required that states use this software if they wanted to get UID information and additional KYR information.553
Several years into enrollment, problems surfaced. Some residents were bypassing State enrollment agents by enrolling through banks and other registrars, and states did not have access to that data.554 In response, the UIDAI made a deal with states to share the UID and demographic data from residents of their states that enrolled with other registrars.555
It is claimed that this activity stopped with the passage of the Aadhaar Act in 2016 and that all the State Resident Data Hubs were destroyed.556 However, there is evidence that these Hubs are still operating.557 Even if the data is no longer sent directly from the UIDAI to SRDH, each of the states has agreements to access the KYC API of the UIDAI CIDR, so when they interact with residents they can pull the data from the UIDAI into their state-level databases (see Figure 5).
Figure 5: SRDH – State Adoption Strategy Document & State Resident Data Hub (SRDH) Application Framework Adoption Guidelines by UIDAI
The State Resident Data Hubs use the UID as the anchor to integrate all data from different state databases together. This happens in two ways. One is a linking process where residents who are recipients of a particular subsidy, benefit, or service go to the agency and assert their ID from a given system and provide their Aadhaar number. They may be asked to authenticate via a thumb print. This process is known as linking, or organic seeding.558
Another process, known as inorganic seeding, combines data from SRDH and UIDs together with existing databases from various subsidies, benefits, or services. This process occurs without the awareness or consent of residents. Authorities might check with residents/beneficiaries to see if they made the correct link or to find beneficiaries who “did not match” any particular Aadhaar number and ask them what their number was. This human resolution requires more effort to complete.
The assumption is that only those with matching UID Aadhaar numbers are “real” beneficiaries. Everyone else is a ghost or fake and can be eliminated. Indian naming conventions are very fluid,559 and the same people use different names in different contexts.560 This strategy to address who is on different social services programs is causing disruption to clients who have their benefits cut off because their legitimate claims are not recognized by the system.561
The State Resident Data Hubs have applied a computer science data modeling idea of “single source of truth”562 and sought to impose it on Indian society and bureaucracy, deciding that whatever is recorded563 in the UIDAI database is the single source of truth about an individual.
Rather than creating mass databases and integrating all data about citizens across all contexts, the U.S. government is actively taking steps to stop or reduce the use of the SSN, even in unlinked discrete databases.564 Currently, the use of the number at the federal level is mandated for only a few agencies and services, such as the Internal Revenue Service (tax authority), Social Security Administration, passport applications, and for loans by any federal agency. Other agencies that request the number must inform residents that sharing it is voluntary, and they will not be denied services if they do not share the number.
This was not always the case. Beginning with an executive order by President Eisenhower in 1953, there was a phase where using the SSN as a key to interact with various services was encouraged and even mandated.565
In 1961 the Internal Revenue Service required the use of SNNs when filing taxes. Increased digitization of records in the 1960s drove the need for common reference systems across government agencies and within the private sector, and they chose the SSN as a way to do this.
In 1965, there was a proposal to create a National Data Center that would pool statistical information held by the Census Bureau, the Internal Revenue Service, the Bureau of Labor Statistics, the Social Security Administration, the Federal Reserve Board as well as a dozen other federal agencies.566 The public reaction to merging all of these bureaucratic records caught proponents off guard because they thought that the composite data were necessary for a well-ordered society, and the benefits were self-evident.567 But the reaction by the public was hostile and sustained when the proposal was floated in 1967, and again in 1970 when it was finally rejected. There was widespread press coverage that looked at the implications for the present and future by creating such databases (see Figure 8).
Figure 8: (c) 1967 The Atlantic Media Co., as first published on the cover of The Atlantic Magazine.
All rights reserved. Distributed by Tribune Content Agency, LLC
Today, India has the type of database the American public rejected in the 1960s and 1970s. The process was started by the UIDAI and their approved consultants (among them Accenture, Ernst and Young, KPMG, PwC, Wipro, and Deloitte) with the software they developed and supported.568 This is particularly true in Andhra Pradesh and Telangana, which have recently become separate states. They did intense surveys of their residents, linking all the data collected to a citizen’s Aadhaar number.569 Andhra Pradesh used The People Hub (see Figure 9) to combine 29 different department databases.570
Figure 9: Screenshot of Andhra Pradesh online state survey http://prajasadhikarasurvey.ap.gov.in/PSS2017/index.html [this link is not live]. It is from this
How did the United States move from public outcry against a National Data Center to developing actual laws and regulation that helped citizens accept the same data being collected by discrete agencies to guard against information sharing between agencies? While India adopted the use of Aadhaar across several agencies to deliver services, the U.S. was slower to move in that direction with the SSN, but did get there eventually.
In this time period the late 1960s and early 1970s there were multiple hearings, task forces, and committees convened by various agencies of the federal government and committees in United States Congress. These included The Social Security Number Task Force in 1970.571 In 1973, the Secretary of Health Education and Welfare Advisory Committee on Automated Personal Data Systems issued a report entitled, “Records, Computers and the Rights of Citizens.”572 The committee developed a code of fair information practices, inspired by the code of fair labor practices.
Below is the Committee’s original formulation of the Code:
- Safeguards for personal privacy based on our concept of mutuality in record keeping would require adherence by record-keeping organizations to certain fundamental principles of fair information practice.
- There must be no personal data record-keeping systems whose very existence is secret.
- There must be a way for an individual to find out what information about him is in a record and how it is used.
- There must be a way for an individual to prevent information about him obtained for one purpose from being used or made available for other purposes without his consent.
- There must be a way for an individual to correct or amend a record of identifiable information about himself.
- Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take reasonable precautions to prevent misuse of the data.
These were the starting points of what evolved to be the Fair Information Practices and Principles,573 and later evolved into the Privacy Act of 1974,574 that prohibits data sharing between government agencies. It states:
No governmental agency can "deny to any individual any right, benefit, or privilege provided by law because of such individual's refusal to disclose his social security account number" except refusal to disclose after a request pursuant to requirements of federal statutes or pursuant to pre-existing federal or state statutes or regulations through which a system of records had already (before January 1, 1975) been set up. (5 U.S.C. § 552a) (note, Section 7 Disclosure of Social Security Number)
Over the next several years, the U.S. government began to move in a direction that would result in expanded use of the SSN. In 1976, the Tax Reform Act expanded the use of the SNN outside of Federal Agencies, by authorizing the direct use of the SSN in state and local government programs.575 In 1977, Personal Privacy in an Information Society by the Privacy Protection Study Commission576 was delivered to President Carter. It covered the relationships among government agencies across a broad range of services and had a special chapter on the SSN.577 The Debt Collections Act of 1982 required that the SSN be collected as part of the applications for all federal loans (student, agriculture, small business—each administered by different departments)578 as a standard practice.
It is important to keep in mind that mandating the use of the SSN for privacy protection meant that each of these departments could not share data about residents with each other without consent. Many government departments that encompass workforces and programs like the military or Medicare (healthcare for the elderly), that relied heavily on the SSN as “the identifier,”made significant changes to their system and stopped using it altogether.579
The Driver’s License Protection Act of 1994 places strict limits on who can access the Department of Motor Vehicles’ data, and under what circumstances.580 The e-Government Act of 2002581 requires agencies that collect data about citizens to complete a Privacy Impact Assessment (PIA) for electronic information systems and to make the results public. The PIA must be conducted before developing or procuring an ID system that will collect, maintain, or disseminate information in an identifiable form or about members of the public. They must also conduct this assessment when merging databases, or when business processes change significantly by adding new uses or disclosures of information. Here is what the PIAs must analyze and describe:582
Conducting a PIA.
PIAs must analyze and describe:
- what information is to be collected (e.g., nature and source);
- why the information is being collected (e.g., to determine eligibility);
- intended use of the information (e.g., to verify existing data);
- with whom the information will be shared (e.g., another agency for a specified programmatic purpose);
- what opportunities individuals have to decline to provide information (i.e., where providing information is voluntary) or to consent to particular uses of the information (other than required or authorized uses), and how individuals can grant consent;
- how the information will be secured (e.g., administrative and technological controls7); and
- whether a system of records is being created under the Privacy Act, 5 U.S.C. 552a.
Major information systems. PIAs conducted for these systems should reflect more extensive analyses of:
- the consequences of collection and flow of information;
- the alternatives to collection and handling as designed; and
- the appropriate measures to mitigate risks identified for each alternative.
Throughout the last two decades, there have been more reports by the federal government about the SSN.583
Today, in the United States the use of the SSN is strictly regulated and culturally limited, while, in India, there is currently no privacy protection bill of any kind that applies to the government or the private sector.584
Commercial Sector Enrollment and Use
In the United States, several federal government statutes mandate the use of the SSN for particular financial service transactions, such as opening a bank account,585 cashing a check over $3,000 USD, being the beneficial owner of businesses, or applying for a home loan. Because the SSN card is literally just a paper card with a name and number on it, agencies also conduct Know Your Customer (KYC) checks with identity documents that have photographs, such as driver’s licenses, passports, military IDs, and permanent resident cards. Laws require the collection of this type of data, but they also mandate the protection of this information.586
India, like the United States, has a KYC requirement driven by international requirements mandated by the Financial Action Task Force (FATF)587 that put these requirements in place after the September 11, 2001 terrorist attacks. The original design of the UIDAI database would permit residents to do authentication of their name and address. This process would start with a resident sharing personal information with a bank. The bank would then send it to the UIDAI which would send back an affirmative or negative answer to whether it matched. While this design is commonly used to preserve individual privacy, it also limits the amount of information that leaves the database.
Indian addresses are much more complex than U.S. addresses: each building has a name or number, within a block, within a district, and then a city.588 In addition to this complexity, India has 22 official languages. Its administration uses English, which most residents do not read or speak. Language barriers make it difficult to get an accurate answer from the UIDAI database. Lastly, regulated banks require a copy of an identity document, and many people do not have an appropriate one.
In 2014, the UIDAI made a significant design change and created a process known as eKYC,589 where banks and telecommunications companies could ask people for their Aadhaar number on enrollment, do a biometric authentication with a fingerprint on a device, and the UIDAI would send the business a digital document with their name, birth date, Aadhaar number, and physical address. They could then use this address to populate their database and keep the digital copy on file.
In the United States, there are very few services offered by any government that allows private companies to connect with a government database and extract private citizen data.590 The Social Security Administration has set up a system known as Consent Based SSN Verification (CBSV). Various private companies have been granted a special license for $5,000 USD to connect to the government agency to do this type of check (CBSV).
Businesses use one of these agencies to check against the database with the consent of the person whose information is being checked. They share the name, SSN, and date of birth. These are sent to the government, checked against the SSN Master File, and a Yes/No indicator is sent back to the business.
Since it is uncommon in everyday life to have one’s SSN information checked by businesses, banks doing large numbers of transactions with people require a different license to participate in this system.
In contrast, in India residents are regularly asked to show their Aadhaar “card” and this document is regularly photocopied. As a result of this process, a new convention has arisen where individuals take a photocopy of their card and write the purpose for which it was made across the image. This, users hope, is a way to prevent the photo copy from being used by someone else to open an account or to obtain a service in their name.591
Employment Enrollment and Use
When people seek employment in the United States, they are required to share their SSN with their employer. Employers are required by law to verify that the people they are hiring have valid SSNs. The CBSV is used for employee SSN verifications.
Individuals can also self-check via the e-Verify system set up by the Department of Homeland Security on an online portal. Individuals can enter their SSN with their current citizenship status and receive a report about their current eligibility to work.
Employers can enroll to use the e-Verify system too. They log into the system every time they want to check a potential employee’s status by using information listed in the I-9 form (legal name, SSN, date of birth, and current citizenship status). The employer will then receive a report about the applicant’s current eligibility to work.
Employers who want to check if an SSN is valid for the purposes of tax withholding can register with the Social Security Number Verification System (SSNVS) to do so. Employers enter the names and SSN of employees that they want to check. The system reports back if they match a person in the system. Employers do this is to ensure that the taxes they are withholding from their employees actually lines up with records at the Social Security Administration.
At the end of every quarter, employers send the government income taxes that they withhold from their employees along with the name and SSN. The government uses the SSN as an index to tax records and social benefit schemes into which they pay social security and Medicare.
While these systems can potentially be used to extract information for other purposes, this is explicitly prohibited.592
In India, the Employees Provident Fund Organization requires Aadhaar (EPFO)593 to open an account, and participation in PF is mandatory, so employees do not have a choice as to whether or not they want to share their Aadhaar number with their employer who will then pass it along to the EPFO.
In India, several employers, particularly the government, connect to the Aadhaar Enabled Biometric Attendance System.594 This means that every day, when an employee arrives to work, they are required to enter their Aadhaar number but it is authenticated with a fingerprint. The biometric template is sent to the CIDR and the authentication event is logged. This means the government not only has a record of what an employee earned and tax deductions they submitted quarterly, it also knows when the employee was at work in any given day.
Figure 11: Authentication Process of Matrix that Integrates with the AEBAS server. https://www.matrixaccesscontrol.com/aadhaar-enabled-biometric-attendance-solution.html.
Conclusion
The framing of how a national identity number can and must be used, along with the regulation of its use, often determines how companies, other governments, and citizens all use national identity numbers. It is vital that a global dialogue continues about the specifics of how the identity systems work in the two largest democracies.
While in India I learned there were a lot of assumptions made about how the U.S. system works that are actually incorrect. I hope that this paper provides a starting point to understand the key differences between the U.S. and Indian systems and made clear to readers from both countries about how the systems work.
In the United States, there is significant regulation around the use of SSNs, and extensive privacy protection rules about any personally identifiable information.595 There is public dialogue, which has been ongoing since the creation of the SSN, about how much information is appropriate for the U.S. government to have on residents in order to provide them with services.
The Aadhar system is more exclusively digital because it was created in the last 10 years. There are no privacy or data protection laws in place in India. The creators of the Aadhaar system chose to expand the features of the system without public input and feedback, and because they are their own regulator.
In my research, I have not found any comprehensive government-led privacy impact assessments or evaluations about the use of Aadhaar in any context. Aadhaar proponents see it as having the potential to “solve” a vast range of problems. Yet, there tends to be insufficient consideration of the ways in which the proposed solutions that use Aadhaar might create risks for those individuals and institutions it intends to serve
Identity systems are powerful tools that have the potential for good, but also for great harm. Those highlighting legitimate concerns in democracies should not be fearful that their criticism will be criminalized. Public engagement and robust public dialogue about identity systems in all countries should continue and be supported.
Citations
- The Global Risks Report 2018 13th Edition, [Geneva: World Economic Forum,2018] <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- The United Nations World Water Development Report 2018: Nature-Based Solutions for Water, [Paris: WWAP (United Nations World Water Assessment Programme) /UN-Water, 2018, UNESCO] <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- Martina Flörke, Christof Schneider, and Robert I. McDonald, "Water competition between cities and agriculture driven by climate change and urban growth," Nature Sustainability 1, no. 1 (2018): 51.
- Peter H. Gleick, "Global freshwater resources: soft-path solutions for the 21st century," Science 302, no. 5650 (2003): 1524-1528.
- Ibid.
- Negative externalities are costs that impact a party that does not have a role in its creation. For instance, vehicular pollution generated by a specific individual affecting people nearby. Negative externalities cause market failures.
- Collection action problem occurs when individuals pursuing a common goal do not cooperate due to competing interests.
- Free rider issues occur when individuals who do not pay for a good or service reap its benefit. Too many free riders results in over-exploitation or under-production of the good or service.
- Richard E. Howitt, Richard E. and Kristiana Hansen, "The Evolving Western Water Markets," Choices 20, no. 316-2016-6565 (2005): 59.
- Guy Le MoigneShawki Barghouti, Gershon Feder, Lisa Garbus, and Mei Xie, "Country experiences with water resources management," World Bank Technical Paper 175 (1992).
- Ereney Hadjigeorgalis, "A Place for Water Markets: Performance and Challenges," Review of Agricultural Economics 31, no. 1 (2009): 50-67.
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- C. Wilson, Adverse Selection, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics, Palgrave Macmillan, 2008]
- Y. Kotowitz, Moral Hazard, In: Palgrave Macmillan (eds) [London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- J.O. Ledyard, Market Failure, In: Palgrave Macmillan (eds)[London: The New Palgrave Dictionary of Economics. Palgrave Macmillan, 2008]
- David S. Brookshire, Bonnie Colby, Mary Ewers, and Philip T. Ganderton, "Market Prices for Water in the Semiarid West of the United States," Water Resources Research 40, no. 9 (2004).
- John Freebairn and John Quiggin, "Water rights for variable supplies," Australian Journal of Agricultural and Resource Economics 50, no. 3 (2006): 295-312.
- A. Dinar, M. Rosegrant, R. Meinzen-Dick, "Water allocation mechanisms: Principles and examples," The World Bank Policy Research Working Paper 1779 (June 1997).
- Jill E. Hobbs, "Information asymmetry and the role of traceability systems," Agribusiness: An International Journal 20, no. 4 (2004): 397-415.
- Max H. Bazerman and James J. Gillespie, "Betting on the future: The virtues of contingent contracts," Harvard Business Review 77 (1999): 155-162.
- Stefaan G. Verhulst, "Information Asymmetries, Blockchain Technologies, and Social Change," Medium, July 24, 2018, <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- Sloane Brakeville, and Bhargav Perepa, "Blockchain Basics: Introduction to Distributed Ledgers," IBM Developer, March 18, 2018, accessed April 14, 2019, <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- Nigel Gopie, "What Are Smart Contracts on Blockchain?" Blockchain Pulse: IBM Blockchain Blog, July 02, 2018, <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- "Civic Use Cases," Helping Governments to Be More Accessible, Efficient and Effective. <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- "Civic Ledger Pty Ltd.," Australian Water Partnership. <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "Water Markets and Trade," Australian Government – Murray-Darling Basin Authority, Sept. 29, 2015. <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management, Sept. 2018.
- "About Water Ledger," How Water Ledger Works, <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- Ibid.
- "OECD Blockchain Policy Forum – Distributed Ledgers: Opportunities and Challenges," Releasing the Floodgates: Blockchain for Water Management. September 2018.
- Ibid.
- The term “smart” in this context indicates the use of internet of things, big data, predictive analytics integrated over blockchain network as underlying technologies to facilitate the operations of a water market.
- Jayachandran Praveen, “The Difference between Public and Private Blockchain," Blockchain Pulse: IBM Blockchain Blog, Aug. 06, 2018, <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- J.R. DeShazo, Gregory Pierce, and Henry McCann, “Los Angeles County Community Water Systems Atlas and Policy Guide: Supply Vulnerabilities, At-Risk Populations, Conservation Opportunities, Pricing Policies, and Customer Assistance Programs,” UCLA: Luskin Center for Innovation, (2015), <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source; U.S. Census Bureau Quick Facts: Los Angeles County, California," Census Bureau Quick Facts, July 1, 2017, <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- S. Pincetl et al., “Water Management in Los Angeles County: a Research Report,” Los Angeles: UCLA, Institute of Environment and Sustainability, 2015, <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source
- Ibid.
- Ibid.
- J.R. DeShazo and Gregory Pierce, "Quantifying the Benefits and Designing Governance Structures for a Water Market in Los Angeles County," [Los Angeles: UCLA, Luskin Center for Innovation, Oct. 2016] <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source
- Bengaluru Water Board, “Blueprint for Future,” <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- Bangalore Water Supply and Sewerage Board, "About BWSSB," Bangalore Water Supply and Sewerage Board. <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- Bengaluru Water Board, “Blueprint for Future," <a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source">source.
- Malini Ranganathan, "'Mafias' in the waterscape: Urban informality and everyday public authority in Bangalore," Water Alternatives 7, no. 1 (2014).
- George A. Akerlof, "The Market for ‘Lemons:’ Quality Uncertainty and the Market Mechanism," Uncertainty in Economics (Academic Press, 1978): 235-251.
- Bart Elias, Unmanned Aircraft Operations in Domestic Airspace: U.S. Policy Perspectives and the Regulatory Landscape (Washington, D.C.: Congressional Research Service, 2016), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Tom Hancock and Wang Xueqiao, “China’s DJI targets agriculture as consumer drone sales slow,” Financial Times, March 25, 2019, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Richard Levick, “Drone Industry Just Beginning To Take Off,” Forbes, May 15, 2018, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Ujjwal Bakshi and Manash Neog, “Much to Drone About,” Economic Times, April 4, 2019, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Therese Jones, International Commercial Drone Regulation and Drone Delivery Services (Santa Monica: RAND Corporation, 2017), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Somya Lohia, “Drone Regulations 1.0 Can Fetch India Major Slice of $100 Billion Industry,” Money Control, January 9, 2019, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Civil Aviation Requirements Series X Part I Issue I: Requirements for Operation of Civil Remotely Piloted Aircraft System (RPAS), F. No. 05-13/2014-AED Vol. IV (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Ibid., Reg. 14.2.
- Ibid., Reg. 12.14 & 12.2.
- Ibid., Reg. 11.2 & 17.1.
- Ibid, Reg. 12.21.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Procedures for Operation of Civil Remotely Piloted Aircraft Systems (RPAS) in Indian Airspace, AIP Supplement 164/2018 AAI/ATM/AIS/09-09/2018 (New Delhi: Airports Authority of India, 2018), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Tender Document: Development, Hosting and Maintenance of Digital Sky Platform for Ministry of Civil Aviation IT-11042/1/2018-DIRECTORATE OF IT (New Delhi: Airports Authority of India, 2018), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- DGCA RPAS Guidance Manual (New Delhi: Directorate General of Civil Aviation, 2018), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Ibid.
- Ibid.
- Drone Ecosystem Policy Roadmap (New Delhi: Ministry of Civil Aviation, 2019), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Ibid, 7.
- Ibid, 14.
- The Personal Data Protection Bill, 2018 (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- White Paper of the Committee of Experts on a Data Protection Framework for India (New Delhi: Ministry of Electronics and Information Technology, 2017), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source
- Petition to the Federal Aviation Administration: Drones and Privacy (Washington, D.C.: Electronic Privacy Information Center, 2012), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Margot Kaminski, “Drone Federalism: Civilian Drones and the Things They Carry,” California Law Review 4 (2013): 57–74.
- Notice of Proposed Rulemaking: Operation of Small Unmanned Aircraft Systems Over People FAA–2018–1087 (Washington, D.C.: Federal Aviation Administration, 2019), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Ananth Padmanabhan, Civilian Drones and India’s Regulatory Response (New Delhi: Carnegie India, 2017), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Arthur Holland Michel, Drones at Home: Local and State Drone Laws (New York: Center for the Study of the Drone, Bard College, 2017), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Amanda Essex, Taking Off: State Unmanned Aircraft Systems Policies (Denver, CO: National Conference of State Legislatures, 2016), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- An Act Relating To Unmanned Aircraft Systems – Establishing Statewide Standards, Protecting Privacy, And Ensuring Public Safety (Virginia: American Legislative Exchange Council, 2017), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Gautam Bhatia, “State Surveillance and the Right to Privacy in India: A Constitutional Biography,” National Law School of India Review 26 (2014): 127–158.
- (2019) 1 SCC 1.
- Ibid, 359.
- (2015) 5 SCC 1.
- Ibid, 167.
- Colin Snow, “Drones Pose a Unique Big Data Challenge For Business Users,” Forbes, February 6, 2019 <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source ; Michelle Chan, “What Businesses Need to Know About Drone Data,” Techwire Asia, February 13, 2019, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source
- Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules ((New Delhi: Ministry of Electronics and Information Technology, 2011),<a href="<a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source"> <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source ; Ibid. ; Rachel Finn and Anna Donovan, “Big Data, Drone Data: Privacy and Ethical Impacts of the Intersection Between Big Data and Civil Drone Deployments,” in The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, ed. Bart Custers (The Hague: TMC Asser Press, 2016), 47-67.
- As Solove remarks about the “Information Age:” “The data gathered about people is significantly more extensive, the process of combining it is much easier, and the computer technologies to analyze it are more sophisticated and powerful.” See Daniel Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review 154 (2006): 477, 506 ; Ibid., 507–08.
- Jordi Soria-Comas and Josep Domingo-Ferrer, “Big Data Privacy: Challenges to Privacy Principles and Models.” Data Science and Engineering 1 (2016): 21, 22. ; Justice KS Puttaswamy v. Union of India, (2017) 10 SCC 1.
- Guide to Basic Data Anonymisation Techniques (Singapore: Personal Data Protection Commission of Singapore, 2018), www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other-Guides/Guide-to-Anonymisation_v1-(250118).pdf.
- For a particularly stark situation, where the de-identification was considered near foolproof and yet re-identified, see Jean Louis Raisaro et al., “Addressing Beacon Re-Identification Attacks: Quantification and Mitigation of Privacy Risks,” Journal of the American Medical Informatics Association 24 (2017): 799, 800.
- Solon Barocas and Helen Nissenbaum, “Big Data’s End Run around Anonymity and Consent,” in Privacy, Big Data, and the Public Good, eds. Julia Lane et al. (New York, NY: Cambridge University Press, 2014), 44–45.
- Ira S Rubinstein, “Big Data: The End of Privacy or a New Beginning,” International Data Privacy Law 3 (2013): 74, 77–78; Davide Castelvecchi, “Can We Open the Black Box of AI?” Nature 538, no. 7623 (2016): 20.
- Mireille Hildebrandt, “Defining Profiling: A New Type of Knowledge?” in Profiling the European Citizen: Cross-Disciplinary Perspectives, eds. Mireille Hildebrandt and Serge Gutwirth (eBook: Springer, 2008), 17, 20.
- Nathaniel A Raymond, “Beyond ‘Do No Harm’ and Individual Consent: Reckoning with the Emerging Ethical Challenges of Civil Society’s Use of Data,” in Group Privacy: New Challenges of Data Technologies, eds. Linnet Taylor, Luciano Floridi and Bart van der Sloot (eBook: Springer, 2017): 67, 75.
- A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians (New Delhi: Ministry of Electronics and Information Technology, 2018), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Ibid, 45–46.
- Ananth Padmanabhan and Anirudh Rastogi, “Big Data,” in Regulation in India: Design, Capacity, Performance, eds. Devesh Kapur and Madhav Khosla (London: Hart Publishing, 2019): 251, 262.
- Aleecia M. McDonald and Lorrie Faith Cranor, “The Cost of Reading Privacy Policies,” I/S Journal of Law and Policy, 4 (2008): 543, 565.
- Arthur Allen Leff, “Contract as Thing,” American University Law Review 19 (1970): 131.
- Nikhil Narendran, “Policy Framework for Protection of Big Data in State Possession,” in Blockchain for Property: A Roll Out Road Map for India, eds. Baladevan Rangaraju and Vishnu Chandra (New Delhi: India Institute, 2017): 34, 40.
- Rahul Matthan, Privacy 3.0: Unlocking Our Data-Driven Future (Noida: Harper Collins, 2018): 167–171.
- Carmine Cifaldi, “Unmanned Aircraft System Privacy and Data Protection,” in Handbook of Unmanned Aerial Vehicles, eds. K.P. Valavanis and G.J. Vachtsevanos (eBook: Springer, 2018): 1–19.
- Voluntary Best Practices for UAS Privacy, Transparency, and Accountability (Washington, D.C.: National Telecommunications and Information Administration, 2016), <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source">source.
- Clark D. Cunningham, “Apple and the American Revolution: Remembering Why We Have the fourth Amendment”, The Yale Law Journal, volume 126, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- “ Breaking Down Apple’s iPhone Fight With the U.S. Government”, The New York Times, March 21, 2016, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Nick Statt, “Apple’s iCloud partner in China will store user data on servers of state-run telecom”, The Verge, July 18, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- “Chen Guangcheng, Apple Can’t Resist Playing by China’s Rules”, The New York Times, January 23, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Ibid., “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming), Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- “Top 20 Countries with the Highest Number Of Internet Users”, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Ibid.
- See Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Krishna Pokharel and Rajesh Roy, “India Says Rumors About Child Snatching on WhatsApp Led to Mob Killings”, The Wall Street Journal, July 5, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- . Section 91, Code of Criminal Procedure, 1973
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Id.
- “Cross-Border Law Enforcement Demands: Analysis of the U.S. Department of Justice’s Proposed Bill”, Center for Democracy and Technology, August 17, 2016, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Data localization is no solution,” The Hindu, August 3, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- This, however, requires an executive agreement between the United States and the foreign country certifying that the state will rely on robust privacy protections, and respect for due process and the rule of law when making requests to companies directly. Such a framework over time, will not only need to be transparent and hold both companies and LEAs accountable but also be scalable to respond to the increasing volume and complexity of requests. Specifically, due process safeguards on user notification, redressal etc. will need to be incorporated. The U.S. Department of Justice recently issued clarifications on how the CLOUD Act will be operationalized available at <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- For more on the privacy protecting requirements under CLOUD Act, both at an institutional level and for individual requests, see Madhulika Srikumar, Debrae Kennedy-mayo, Peter Swire and Sreenidhi Srinivasan, “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- Sections 40 and 41, The Personal Data Protection Bill, 2018
- Ibid.
- Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, “A Free and Fair Digital Economy Protecting Privacy, Empowering Indians”, 27 July 2018
- Ministry of Electronics and Information Technology, “The Information Technology [Intermediaries Guidelines (Amendment) Rules] 2018,” <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Pranesh Prakash,“Why Data Localisation Might Lead To Unchecked Surveillance,” Centre for Internet and Society, October 15, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source ; “US criticises India's data localisation norms, draft e-commerce policy,” The Economic Times, April 9, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Josh Constine,” Zuckerberg warns of authoritarian data localization trend,” Techcrunch, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Reserve Bank of India Notifications, “Storage of Payment Systems Data”, Apr. 6, 2018
- “RBI data localisation: 80 percent players, including WhatsApp, comply with norms”, Business Standard, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source -80-players-including-whatsapp-comply-with-norms-118101500907_1.html
- “Facebook takes a tough stand on data storage amidst India’s localisation push”, The Economic Times, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- WhatsApp is working to comply with Reserve Bank of India (RBI) regulations on the local storage of payment-related data, the Economic Times reported. “Only some engineering work is left,” an anonymous senior Facebook executive told ET. <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source -mandate-report-why-is-it-needed/
- “India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Komal Gupta, “Google Agrees to Comply with RBI’s Data Localisation Norms,” Livemint , September 10, 2018, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source"><a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source Surabhi Aggarwal, “Industry bodies write to IT minister Ravi Shankar Prasad against data bill,” Economic Times, October 4, 2018, //economictimes.indiatimes.com/articleshow/66062141.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- See U.S. India Strategic Partnership Forum (USISPF) submission to MeitY available at <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Aditya Kalra, “U.S. senators urge India to soften data localisation stance,” Reuters, October 13, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Ashish Shukla, “RBI refuses to extend deadline for data localisation,” IBTimes, October 14, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Bhavin Patel and Hemant Krishna, “Data Localisation: Here’s why the RBI isn’t listening to the ‘Mirroring’ argument,” CNBC TV18, October 15, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,”Data localisation in India: Questioning the means and ends,”The Leap Blog, February 22, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Amazon not mirroring it abroad Whatsapp asked for 5 more months, mastercard and rest asked for one year
- “Russia fines Facebook $50 for failing to comply with local data privacy law, ” ZDNet, April 12, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source ; Mark Scott, “Russia Prepares to Block LinkedIn After Court Ruling,” The New York Times, November 10, 2016, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Bedavyasa Mohanty and Madhulika Srikumar, “Hitting Refresh: Making India-US Data Sharing Work,” ORF Special Report 37, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Rishab Bailey and Smriti Parsheera ,“Data localisation in India: Questioning the means and ends,” NIPFP Working Paper Series, no.242, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Government authorities increasingly rely on blocking access to internet altogether to contain cases of public unrest. See Timothy Mclaughlin ,“How Whatsapp Fuels Fake News And Violence In India, ” The Wired, December 12, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- “Fighting fake news: Govt asks Whatsapp to take immediate action,” Economic Times, July 3, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- The Indian government introduced the draft amendment to the Information Technology Act, 2008 to overhaul the current intermediary liability regime in India. One of the problematic provisions included the requirement for intermediaries to enable tracing the originator of messages. See Yesha Tshering Paul“ Fake News: Misguided Policymaking To Counter Misinformation,” Bloomberg Quint, January 14, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- The Srikrishna Committee appointed to draft India’s first comprehensive data protection law introduced the term “fiduciaries” in the Personal Data Protection Bill, 2018. See Arghya Sengupta, “Why the Srikrishna Committee Rejected Ownership of Data in Favour of Fiduciary Duty,” The Wire, August 2, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- For more on how Indian law enforcement agencies make requests for data under Indian law, see Chapter 3 in Srikumar et al., “India-US Data Sharing For Law Enforcement : Blueprint For Reforms,” Observer Research Foundation, January, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- See Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- For instance, Facebook commits to fight back in court if requests are overbroad or defective. Chris Sonderby, “Sharing Our Latest Transparency Report,” Facebook Newsroom, May 23, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Alan Z. Rozenshtein, “Surveillance Intermediaries”, Stanford Law Review, volume 70, January 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- The authors in this paper argue that Silicon Valley have been forced to accept their role as our “corporate avatars” when they possess “neither the will nor the means to effectively challenge government snooping”. See Chapter 1 in Developments in the Law — More Data, More Problems, Harvard Law Review, volume 131 no.6 : 1715-1722, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- See 3(13), Personal Data Protection Bill, 2018. Available at <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source; Stakeholders in India however have argued that the draft bill does not imbibe the philosophy of fiduciaries completely since certain sections in the bill still places the disproportionate onus on users to realize their rights. See comments submitted by Dvara Research to MeitY available at <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- See A Free and Fair Digital Economy Protecting Privacy, Empowering Indians: Committee of Experts under the Chairmanship of Justice B.N. Srikrishna, July 27, 2018, available at <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Jack M. Balkin, "Information fiduciaries and the first amendment." UCDL Rev. 49 ,1183, 2015
- Id. , see Jack M.Balkin, "Fixing Social Media's Grand Bargain." Hoover Working Group on National Security, Technology, and Law, Aegis Series Paper 1814,2018.
- The author of this piece argues that Balkin’s fiduciary framework could eliminate the third party doctrine in the U.S. altogether binding all companies to a higher duty of care towards users. See Mike Godwin, It’s Time to Reframe Our Relationship With Facebook,” Slate, November 16, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source; In India, the Supreme Court through the 2017 ruling recognising privacy as a fundamental right invalidated the application of third party doctrine. See Gautam Bhatia, “The Supreme Court’s Right to Privacy Judgment – IV: Privacy, Informational Self-Determination, and the Idea of Consent,” Indian Constitutional Law and Philosophy, August 2017, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Vivan Sharan, Sidharth Deb, “Reimagining fiduciaries in the digital economy,” Livemint, August, 15, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Ariel Dobkin, "Information Fiduciaries in Practice: Data Privacy and User Expectations." Berkeley Tech. LJ 33 2018: 1.
- Dalip Singh, “Law enforcement agencies favour data localisation “, Economic Times, October 8, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source /articleshow/66113360.cms
- India Pushes Back Against Tech ‘Colonization’ by Internet Giants”,The New York Times, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Aria Thaker, “Behind RBI’s digital payments panel, a controversial firm’s shadow, conflict of interest allegations”, Scroll, January 10, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source; The Indian government’s motivation to create an environment favourable to domestic tech firms is most evident in its recent policy on Foreign Direct Investment in e-commerce. See “What India e-commerce policy entails for online retailers”, Livemint, January 16, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- a. Aditya Kalra and Aditi Shah, “U.S. firms face off with Indian rival in lobbying against data storage rules,” Reuters, July 24, 2018, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source"><a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source b. Vidhi Choudhary and Yashwant Raj, “Cambridge Analytica row: Facebook data breach hit 560K Indian users,”Hindustan Times, April 5, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Prashant Reddy, “View: It's time to tame the social media beast,” Economic Times, February 13, 2019,//economictimes.indiatimes.com/articleshow/67966170.cms?from=mdr&utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
- Ben Brody, “Tech Giants Back U.S. Bill Governing Cross-Border Data Searches,”Bloomberg, February 7, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Brad Smith, “A call for principle-based international agreements to govern law enforcement access to data,” Microsoft On the Issues, September 11, 2018, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Michael Punke, “AWS and the CLOUD Act,” AWS Security Blog, May 27, 2019, <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source"><a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source ; Chaim Gartenberg, “Apple will launch a global web portal for law enforcement requests later this year,” The Verge, September 6, 2018, available at <a href="<a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source"><a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source; Kristen E. Eichensehr, “Digital Switzerlands”, University of Pennsylvania Law Review, Volume 164 (forthcoming)
- “One year later: A cybersecurity commitment shared by more than 100 companies,” Tech Accord, May 9, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Mike Isaac, “Zuckerberg Plans to Integrate WhatsApp, Instagram and Facebook Messenger,” The New York Times, January 25, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Mike Isaac, “Facebook’s Mark Zuckerberg Says He’ll Shift Focus to Users’ Privacy,” The New York Times, March 6, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source . Facebook’s official announcement is available at <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Law enforcement agencies across the world make overbroad demands for location data to find suspects and witnesses at crime scenes. See Jennifer Valentino-Devries, “Tracking Phones, Google Is a Dragnet for the Police,” The New York Times, April 13, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source; also on “reverse location warrants” see Aaron Mak, Close Enough, Slate, February 19, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source; Matthew Haag, “FamilyTreeDNA Admits to Sharing Genetic Data With F.B.I.”, The New York Times, February 4, 2019, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- Josh Costine, “Facebook will pass off content policy appeals to a new independent oversight body,” Techcrunch, <a href="<a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source">source
- For instance, in the UK, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; France, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; and Germany, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source
- Varun Aggrawal, “Infosys to Set up Data Marketplace for Enterprises – The Hindu BusinessLine,” June 19, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- “The Personal Data Protection Bill” (2018), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; Justice B.N. Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” (Committee of Experts under the Chairmanship of Justice B.N. Shrikrishna, July 2018), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Jack M. Balkin, “Information Fiduciaries and the First Amendment,” U.C. Davis Law Review 49, no. 4 (2016): 1234; Lina Khan and David Pozen, “A Skeptical View of Information Fiduciaries” (SSRN, February 25, 2019), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Whilst the European Union’s approach in the GDPR is limited by is focus on privacy. The challenges of governing data-driven decision-making go well beyond concerns about privacy. See Talia Gillis and Josh Simons, “Explanation < Justification: GDPR and the Perils of Privacy,” (SSRN, 2019).
- To use André Béteille’s phrase, one of India’s most important twentieth-century social theorists. André Béteille, Anti-Utopia: Essential Writings of André Béteille (New Delhi: Oxford University Press, 2005); André Béteille, Ramachandra Guha, and Jonathan P. Parry, Institutions and Inequalities: Essays in Honour of Andre Beteille (New Delhi: Oxford University Press, 1999).
- Purva Khera, Macroeconomic Impacts of Gender Inequality and Informality in India, IMF Working Paper (Washington, District of Columbia DC: International Monetary Fund, 2016); Carol Vlassoff, Gender Equality and Inequality in Rural India: Blessed with a Son (New York, NY: Palgrave Macmillan, 2013); Stephen M. Caliendo, Inequality in America: Race, Poverty, and Fulfilling Democracy’s Promise, Dilemmas in American Politics (Boulder, CO: Westview Press, 2014); Xavier N. De Souza Briggs, Social Capital and Segregation: Race, Connections, and Inequality in America (Cambridge, MassMA.: John F. Kennedy School of Government, 2002).
- It is important to note that this is not just about unrepresentative data. Unrepresentative data excludes some groups, perhaps because there are not enough data points about that group, or the data points that exist are less numerous or rich. This is an important problem, particularly in India, where the underrepresentation of Untouchables and women in data is systemic. But the problems this paper considers would remain even in the most accurate and careful data sets, which are still a reflection of the structure of our social world, including the inequalities and injustices that characterize it. A representative dataset is not devoid of injustice. This leaves open a host of important issues about when the representation of injustice in a dataset actually constitutes an injustice, an issue I hope to address in future work. Cynthia Dwork and Deirdre Mulligan, “It’s Not Privacy, and It’s Not Fair,” Stanford Law Review 66 (September 2013): 35–40; Kate Crawford, “The Hidden Biases in Big Data,” Harvard Business Review, April 1, 2013, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; David Garcia et al., “Analyzing Gender Inequality through Large-Scale Facebook Advertising Data,” Proceedings of the National Academy of Sciences of the United States of America 115, no. 27 (2018): 6958–63, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Andrew D. Selbst and Solon Barocas, “The Intuitive Appeal of Explainable Machines,” SSRN Electronic Journal, 2018, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Daniel Kahneman, Thinking, Fast and Slow (New York, NY: Farrar, Straus and Giroux, 2011).
- Virginia Eubanks, Automating Inequality: How High-Tech Tools Profile, Police and Punish the Poor (New York, NY: St. Martin’s Press, 2018).
- TOI, “Aadhaar Covers over 89% Population: Alphons,” The Times of India, accessed March 5, 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Cynthia Dwork et al., “Fairness through Awareness,” ITCS ’12 (ACM, 2012), 214–226.
- Sam Corbett-Davies and Sharad Goel, “The Measure and Mismeasure of Fairness: A Critical Review of Fair Machine Learning,” 20180731, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- Jon Kleinberg, Sendhil Mullainathan, and Manish Raghavan, “Inherent Trade-Offs in the Fair Determination of Risk Scores,” Proceedings of Innovations in Theoretical Computer Science (ITCS), 2017.
- I am therefore moving beyond privacy as a framework for thinking about the governance of data-driven decision-making. Privacy is one concern we might have about those decision-making procedures, usually called “data processing” in existing legislation in the EU and India. But it is far from the only concern. Other aims and values need to be brought into play. Privacy should not be the sole lens through which to view governance data and machine learning. A29WP, “Guidelines on Automated Individual Decision-Making and Profiling” (Article 29 Data Protection Working Party, 2018), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.; ICO, “Guide to the General Data Protection Regulation (GDPR)” (U.K.: Information Commissioner’s Office, August 2018), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Most other important pieces of non-discrimination legislation extend the categories to which duties of non-discrimination apply. These include the Equal Pay Act of 1963, which prohibits the payment of different wages to employees of different sexes who perform equal work under similar conditions; the Americans with Disabilities Act (ADA) of 1990, which prohibits discrimination against individuals with a disability and requires the provision of reasonable accommodation to someone who is legally disabled; and the Genetic Information Non-Discrimination Act of 2008, which protects individuals from genetic discrimination in the healthcare and insurance industries.
- For instance, U.S. Executive Orders 10925, 11246, and 11375 require federal contractors who do over $10,000 in Government business in one year to “take affirmative action to ensure that applicants are employed, and that employees are treated during employment, without regard to their race, color, religion, sex or national origin.”
- David Strauss, “Discriminatory Intent and the Taming of Brown,” University of Chicago Law Review 56, no. 3 (1989): 935–935.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; Solon Barocas and Andrew D. Selbst, “Big Data’s Disparate Impact,” California Law Review 104, no. 3 (June 1, 2016): 671–732.
- There is an important emerging debate about precisely this point, including a paper of my own. For the key protagonists, see Kleinberg et al., “Discrimination in the Age of Algorithms,” 2019; Barocas and Selbst, “Big Data’s Disparate Impact”; Lior Strahilevitz, “Privacy versus Antidiscrimination,” Public Law & Legal Theory Working Paper, no. 174 (2007), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; Pamela L. Perry, “Two Faces of Disparate Impact Discrimination,” Fordham Law Review 59, no. 4 (March 1, 1991): 523–595; Cass Sunstein, “The Anticaste Principle,” Michigan Law Review, January 1, 1993, 2410.
- Barocas and Selbst, “Big Data’s Disparate Impact,” 724.
- Sophia Moreau and Deborah Hellman, Philosophical Foundations of Discrimination Law (Oxford: Oxford University Press, 2013), 259.
- Béteille, Anti-Utopia.
- Cass Sunstein makes a similar point. If there is prejudice and statistical discrimination, and if third parties promote discrimination, there will be decreased investments in human capital. Such decreased investments will be a perfectly reasonable response to the real world. And if there are decreased investments in human capital, then prejudice, statistical discrimination, and third-party effects will also increase. Statistical discrimination will become all the more rational; prejudice will hardly be broken down; consumers and employers will be more likely to be discriminators.Ronnie J. Steinberg, Applications of Feminist Legal Theory to Women’s Lives: Sex, Violence, Work and Reproduction. Women in the Political Economy. (Temple University Press, 2012), 560; Sunstein, “The Anticaste Principle,” 2431.
- Dwork et al., “Fairness through Awareness,” 215.
- As Hannah Arendt argued when comparing the American and French revolutions. Rohit De, A People’s Constitution: The Everyday Life of Law in the Indian Republic (Princeton, CT: Princeton University Press, 2018), 5; Uday S. Mehta, “The Social Question and the Absolutism of Politics,” 2010, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; Hannah Arendt, On Revolution (New York, NY: Viking Press, 1965).
- Sunil Khilnani, The Idea of India (New Delhi: Penguin, 2004).
- Kalpana Kannabirān, Tools of Justice: Non-Discrimination and the Indian Constitution (New York, NY: Routledge, 2012), 7.
- B. R. Ambedkar is a neglected character in India’s political history. His ideas have received little attention compared with more widely known figures M. K. Gandhi and Jawaharlal Nehru, in part because of the Congress Party’s dominant role in shaping India’s national story, and the contours of democratic politics after independence. See Valerian Rodrigues, “Justice as the Lens: Interrogating Rawls through Sen and Ambedkar,” Indian Journal of Human Development 5, no. 1 (2011): 153–174; Jean Drèze and Amartya Sen, “Democratic Practice and Social Inequality in India,” Journal of Asian and African Studies 37, no. 2 (2002): 6–37; Martha Nussbaum, “India: Implementing Sex Equality through Law,” Chicago Journal of International Law 2, no. 1 (2001): 35–58.
- Kannabirān, Tools of Justice, 162.
- Patterns of domination, which produce these persistent inequalities in the political and economic spheres, have two effects. First, they undermine the liberty of each individual to benefit from an effective and competent use of their powers. Democracy entailed political equality. Political equality entailed the absence of domination. Second, patterns of domination undermine the possibility of free association. Drawing on John Dewey, Ambedkar argued that free association – the capacity of groups to form links, to self-govern over time – was essential to democratic life. Democracy is not merely a form of government. It is primarily a mode of associated living, of conjoin communicated experience. It is essentially an attitude of respect and reverence towards fellow men. Patterns of domination made impossible the associations and relationships that encouraged and embodied this attitude of respect and reverence.B.R. Ambedkar, Annihilation of Caste: The Annotated Critical Edition, ed. S. Anand (New Delhi: Navayana, 2014), 280, 261.
- Béteille, Guha, and Parry, Institutions and Inequalities, 342.
- V. R. Krishnaiyer, Akhil Bharatiya Soshit Karamchari Sangh and Others vs. Union Of India, No. 185 (Supreme Court of India November 14, 1980).
- J B. Sudershan Reddy, Indian Medical Association vs. Union Of India & Ors, No. 8170 (Supreme Court of India May 12, 2011).
- Deepti Shenoy, “Courting Substantive Equality: Employment Discrimination Law in India,” University of Pennsylvania Journal of International Law 34, no. 3 (2013): 632.
- Jon Kleinberg et al., “Discrimination in the Age of Algorithms,” 20190210, <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source.
- The Personal Data Protection Bill; Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians.”
- Srikrishna, “A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians,” 8.
- De, A People’s Constitution; Béteille, Guha, and Parry, Institutions and Inequalities; Khilnani, The Idea of India.
- This is precisely the challenge that Jack Balkin, who first coined the data fiduciary concept, warned about. Balkin, “Information Fiduciaries and the First Amendment,” 1232–1324.
- As André Béteille argues, institutional well-being is an important consideration. He describes this as equality as a matter of policy, not of right, warning against placing too much faith specifically in the state to eliminate every social inequality, every difference of caste or class. Béteille, Anti-Utopia, 435.
- Joshua A. Kroll et al., “Accountable Algorithms,” University of Pennsylvania Law Review 165, no. 3 (2017): 633–705; Andrew Tutt, “An FDA for Algorithms,” Admin. L. Rev. 83 (2016); Jeremy Waldron, “Accountability: Fundamental to Democracy,” SSRN Scholarly Paper (Rochester, NY: Social Science Research Network, April 1, 2014), <a href="<a href="<a href="<a href="<a href="source">source">source">source">source">source">source; Craig T. Borowiak, Accountability and Democracy: The Pitfalls and Promise of Popular Control (Oxford University Press, 2011); Adam Przeworski, Susan Carol Stokes, and Bernard Manin, Democracy, Accountability, and Representation (Cambridge: Cambridge University Press, 1999).
- “World Metro Figures Statistics Brief,” UITP, accessed April 29, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source; Global BRT Data, “Global BRT Data,” accessed April 29, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Autorickshaws are three-wheeled vehicles that supply much of the last-mile connectivity to mass transit in Indian cities.
- Candace Brakewood, Gregory Macfarlane, and Kari Watkins, “The Impact of Real-Time Information on Bus Ridership in New York City,” Transportation Research Part C: Emerging Technologies, 53 (April 2015): 59-75.; Eric Jaffe, “The Best Evidence Yet That Real-Time Arrival Info Increases Transit Ridership,” CityLab, accessed Feb. 20, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Aaron Antrim and Sean Barbeau, “The Many Uses of GTFS Data- Opening the Door to Transit and Multimodal Applications,” ITS America’s 23rd Annual Meeting & Exposition, April 2013, <a href="<a href="<a href="<a href="source">source">source">source">source">source; Transit Center, “The Data Transit Riders Want “A Shared Agenda for Public Agencies and Transit Application Developers,” accessed Feb. 16, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- “Open Government Partnership,” Open Government Partnership, accessed Jan. 28, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- “WRI India,” WRI India, accessed January 28, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- KMRL signed a Memorandum of Understanding (MOU) with WRI in February of 2017, which included several initiatives to support urban transport and urban development, including public transport, transit oriented policy, electric mobility, and urban planning in Kochi.
- Available at: <a href="<a href="<a href="<a href="source">source">source">source">source">source
- The GPS installation was paid for by the Urban Mass Transit Company Limited (UMTC), a joint venture of several national and state government agencies and the private company Infrastructure Leasing and Financial Services Limited (IL&FS).
- “Kochi Metro Rail Limited signs pact with auto drivers,” Deccan Chronicle, Jan. 24, 2018, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- In Hindi, “Chalo” means “Let’s Go!”
- “Demographia World Urban Areas,” Demographia, April 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- G.P. Hari, Personal Interview, Kochi, Feb. 11, 2019.
- “Kochi gets Chalo app for live tracking of buses, ferries,” The Hindu, accessed Jan. 28, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Aparna Vijaykumar, Personal Interview, Online, March 5, 2019.
- Arjun G., “Delhi Government launches Open Transit Data Platform for Buses,” Medium, accessed Jan. 28, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source; Open Data Portal available at: <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Pravesh Biyani, Personal Interview, New Delhi, Feb. 14, 2019.
- Ibid.
- Ibid.
- “PoochhO,” Delhi Integrated Multi-modal Transit System, accessed Feb. 15, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Samir Sharma, Personal Interview, New Delhi, Feb. 15, 2019.
- Ibid.
- Pravesh Biyani, Personal Interview, New Delhi, Feb. 14, 2019.
- Nikhil V.J., “Re: [datameet] – Open Transit Data – Delhi,” Email, 2019.
- “BMTC to open up transit data enabling entrepreneurs build mobility solutions.” Economic Times. <a href="<a href="<a href="<a href="source">source">source">source">source">source; “BMTC’s data-sharing plan on back burner,” The Hindu, accessed Feb. 4, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source; Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- ET Bureau, “BMTC to open up transit data enabling entrepreneurs build mobility solutions,” Economic Times. <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- Tejas Pande, Personal Interview, New Delhi, Feb. 9, 2019;Vinay Sreenivasa, Personal Interview. Online, March 7, 2019; Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Ibid.
- “BMTC,” Bangalore Municipal Transport Corporation, accessed Feb. 20, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Ibid; Tanushree Dev Barma, Personal Interview, Bangalore, March 5, 2019.
- S. Rajagopalan, Personal Interview, Bangalore, March 5, 2019.
- BMTC Data Sharing Policy Draft (July, 2018), Bangalore: Bangalore Municipal Transit Corporation, 2018.
- S. Rajagopalan, Personal Interview, Bangalore, March 5, 2019.
- Ibid.
- BMTC Data Sharing Policy Draft (July, 2018). Bangalore: Bangalore Municipal Transit Corporation, 2018.
- Srinivas Kodali, “BMTC Intelligent Transportation System (ITS) and Need for Open Transport Data,” Data Meet, accessed Jan. 28, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source .
- Naveen Menezes, “Two years on, commuters continue to suffer as BMTC squats on real-time data,” Economic Times, accessed Feb. 16, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Vinay Sreenivasa, Personal Interview, Online, March 7, 2019.
- Yunus Y. Lasania, “Telangana’s ‘open data’ policy to help start-ups address public issues,” LiveMint, accessed March 15, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Telangana Open Data Policy 2016, Hyderabad, Telangana: Government of Telangana, accessed March 15, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Ibid.
- Yunus Y. Lasania, “Telangana’s ‘open data’ policy to help start-ups address public issues,” LiveMint, accessed March 15, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- “Background,” Factly, accessed Feb. 18, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Anant Maringanti, Personal Interview, Hyderabad, March 6, 2019.; Harsha Devulapalli and Girish Agrawal, “Mapping bus transit services in Hyderabad – an illustrative example of the use of open geospatial data,” Transportation Research Procedia. 25 (201): 4196-4206.
- Surya Kandukuri, Personal Interview, Hyderabad, March 6, 2019.
- Vishal Ramprasad, Personal Interview, Mumbai, Feb. 12, 2019.
- Srya Kandukuri, “Notes from our conversation,” Email, 2019.; Surya Kandukuri, Personal Interview, Hyderabad, March 6, 2019.
- Ibid.
- Aaron Antrim and Sean Barbeau, “The Many Uses of GTFS Data- Opening the Door to Transit and Multimodal Applications,” ITS America’s 23rd Annual Meeting and Exposition, April 2013, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Harsha Devulapalli and Girish Agrawal, “Mapping bus transit services in Hyderabad – an illustrative example of the use of open geospatial data,” Transportation Research Procedia, 25 (201): 4196-4206.
- Anumita Roychowdhury, Gaurav Dubey, Anu Soman, Waiting for a Bus: Strategies to improve Delhi’s bus system. (New Delhi: Centre for Science and Environment, 2017).
- Ibid.
- O.P. Agarwal, Personal Interview, New Delhi, March 1, 2019.
- In many cases, transit operators do not make a system map or timetable available. Data can be used to provide these more analog solutions in order to meet the information needs of riders who do not possess smartphones or do not access transit data in an online format. Other technologies may prove useful to encompass groups of people who might not use smartphones, such as text or voice-based services.
- Open Government Data Platform India, “National Data Sharing and Accessibility Policy,” accessed Jan. 28, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- “Open Government Data Platform India,” Open Government Data Platform India, accessed Jan. 28, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Mohd Ujaley, “Countries to Ride on India’s Open Government Data Platform,” Express Computer, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Simonti, Chakraborty, “Open Data Policy of the Government of India: What has it achieved?” CBG India, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Joel Gurin, Personal Interview, Online, March 1, 2019.
- Mark Headd, “New Thinking in How Governments Deliver Services,” in Beyond Transparency, ed. Brett Goldstein with Lauren Dyson. (San Francisco: Code for America Press, 2013): 278-9.
- Rajarshi Sahai, “Going Public with Public Transport Data For Public: Dilemmas of Developing Cities,” accessed Jan. 28, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- “National Urban Innovation Stack: Strategy and Approach,” New Delhi, India: Ministry of Housing and Urban Affairs, Government of India, 2019, accessed Feb. 8, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- “DataSmart Cities: Empowering Cities through Data,” Ministry of Housing and Urban Affairs, Government of India, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- “We Continue to Create an Open Data Culture,” Makaia, accessed March 5, 2019, <a href="<a href="<a href="<a href="source">source">source">source">source">source
- “National Urban Transport Policy (2006),” New Delhi, India: Ministry of Urban Development, Government of India, 2006. <a href="<a href="<a href="<a href="source">source">source">source">source">source
- “National Urban Transport Policy (2014),” New Delhi, India: Ministry of Urban Development, Government of India, 2014. <a href="<a href="<a href="<a href="source">source">source">source">source">source
- “National Urban Transport Policy,” New Delhi, India: Ministry of Urban Development, Government of India (2006), <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Ibid.
- GP Hari, Personal Interview, Kochi, Feb. 11, 2019.
- Harsha Krishna, Personal Interview, Bangalore, March 4, 2019.
- Harshith Gokulendra, Personal Interview, New Delhi, March 1, 2019.
- O.P. Agarwal, Personal Interview. New Delhi, March 1, 2019.
- Srinivas Kodali, Personal Interview, New Delhi, Feb. 5, 2019.
- Rajarshi Sahai, Personal Interview, Online, Jan. 30, 2019.
- Available at: <a href="<a href="<a href="<a href="source">source">source">source">source">source
- Kunal Kumar, “Building National Urban Innovation Stack for Indian Smart Cities Mission – Technologies and Financing Model,” (Panel presentation, Smart Republic Conference, New Delhi, India, Feb. 27-28, 2019).
- Srinivas Kodali,. Personal Interview. New Delhi, Feb. 5, 2019.
- Samir Sharma, Personal Interview. New Delhi, Feb. 15, 2019.
- GP Hari, Personal Interview, Kochi, Feb. 11, 2019.
- Vishal Ramprasad, Personal Interview, Mumbai, Feb. 12, 2019.
- Harsha Krishna, Personal Interview. Bangalore, March 4, 2019;Vipassana Vijayarangan, Personal Interview, Online, Jan. 15, 2019.
- “National Urban Transport Policy,” New Delhi, India: Ministry of Urban Development, Government of India, 2006, <a href="<a href="<a href="<a href="source">source">source">source">source">source.
- Don Tapscott, “2018 Regulation Roundtable: Addressing the Regulatory Challenges of Disruptive Innovation,” Summary of 10 May 2018 Proceedings held at KPMG Toronto, Blockchain Research Institute, Aug. 8 2018.
- Warren Davidson, R-OH, "Text – H.R.7356 – 115th Congress (2017-2018): Token Taxonomy Act." Congress.gov. December 20, 2018, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- U.S. Securities and Exchange Commission, “Ponzi Schemes Using Virtual Currencies,” July 23, 2017, <a href="<a href="<a href="source">source">source">source">source
- The DAO is one example of a Decentralized Autonomous Organization, which is a term used to describe a “virtual” organization embodied in computer code and executed on a distributed ledger or blockchain.
- U.S. Securities and Exchange Commission, “Report of Investigation Pursuant to Section 21(a) of the Securities Exchange Act of 1934: The DAO,” July 25, 2017, <a href="<a href="<a href="source">source">source">source">source
- Lester Coleman, "SEC Subpoenas 80 Cryptocurrency Firms," CCN, March 04, 2018, accessed May 16, 2019. <a href="<a href="<a href="source">source">source">source">source.
- Nikhilesh De, "SEC Again Delays Decision on Bitwise Bitcoin ETF Approval," CoinDesk, May 15, 2019. accessed May 16, 2019, <a href="<a href="<a href="source">source">source">source">source.
- U.S. Securities and Exchange Commission, Fintech Finhub, "Framework for “Investment Contract” Analysis of Digital Assets," April 3, 2019, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- The Howey Test is the standard methodology, put in place by the U.S. Supreme Court to determine whether a transaction is an example of an "investment contract,” i.e., a security. It derives from a 1946 case, SEC v. W.J. Howey Co., a lawsuit involving the Howey Company of Florida. In the context of blockchain tokens, the Howey test can be expressed as three independent elements: (1) An investment of money, (2) in a common enterprise, (3) with an expectation of profits predominantly from the efforts of others.
- "A New Commissioner at America's Main Securities Regulator Causes a Buzz," The Economist, Nov. 08, 2018, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Stan Higgins, "The SEC Just Appointed Its First-Ever Crypto Czar," CoinDesk, June 04, 2018, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Detailed in the next section, LabCFTC is a pioneering regulatory model in dealing with fintech innovations
- Stephan O'Neal, “SEC Launches FinHub to Communicate With Industry, But What Does It Have to Say?" Cointelegraph, Feb. 13, 2019, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Yogita Khatri, "The SEC Wants to Hire a 'Crypto Securities' Advisor," CoinDesk, April 01, 2019, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Commodity Futures Trading Commission, “An Introduction to Virtual Currency,” 2017, <a href="<a href="<a href="source">source">source">source">source.
- Khatri, Yogita, "CabbageTech CEO Indicted in New York for Defrauding Crypto Investors," CoinDesk, March 27, 2019, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Chris Giancarlo, "CFTC Chairman Chris Giancarlo,” DC Blockchain Summit 2019, Georgetown University, Washington, D.C., March 6, 2019.
- Daniel Gorfine (Director, LabCFTC), personal interview, Washington, D.C., April 2019.
- Daniel Gorfine, "Podcasts." Commodity Futures Trading Commission, accessed April 14, 2019. <a href="<a href="<a href="source">source">source">source">source.
- Commodity Futures Trading Commission, "Request for Input on Crypto-asset Mechanics and Markets." December 11, 2018, accessed May 12, 2019, <a href="<a href="<a href="source">source">source">source">source.
- United States Financial Crimes Enforcement Network, Department of Treasury, Guidance: Application of FinCEN’s Regulations to Persons Administering, Exchanging, or Using Virtual Currencies, FIN-2013-G001, March 18, 2013, <a href="<a href="<a href="source">source">source">source">source.
- Peter Van Valkenburgh, "FinCEN Raises Major Licensing Problem for ICOs in New Letter to Congress," Coin Center, March 6, 2018, accessed May 12, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Timothy Spangler and Robert J. Rhatigan. "FinCEN Warns That Virtual Currency Activities Are Subject to Anti-Money Laundering Obligations," Lexology, April 03, 2018, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- FinCEN, "Advisory on the Iranian Regime’s Illicit and Malign Activities and Attempts to Exploit the Financial System," FIN-2018-A006, October 11, 2018, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source Advisory FINAL 508.pdf.
- Internal Revenue Service, "Notice 2014-21," March 2014, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- "Tax Treatment of Cryptocurrency Hard Forks for Taxable Year 2017," American Bar Association to Internal Revenue Service, March 19, 2017, Washington, D.C.
- "IRS Treatment of Virtual Currencies," U.S. House of Representatives Committee on Ways and Means to Internal Revenue Service, Sept. 19, 2018, Washington, D.C. <a href="<a href="<a href="source">source">source">source">source.
- Steven T. Mnuchin and Craig S. Phillips, “A Financial System That Creates Economic Opportunities Nonbank Financials, Fintech, and Innovation,” U.S. Department of the Treasury, July 2018. <a href="<a href="<a href="source">source">source">source">source.
- Craig S. Phillips "Fireside Chat with Counselor Craig Phillips, U.S. Dept. of the Treasury," Speech at the D.C. Blockchain Summit 2019, Georgetown University, Washington, D.C., March 6, 2019.
- Statement of Jennifer Shasky Calvery, Director, Financial Crimes Enforcement Network, United States Department of the Treasury (2013) (testimony of Jennifer Shasky Calvery).<a href="<a href="<a href="source">source">source">source">source.
- Ibid.
- "Virtual Currency Business (BitLicense)," New York Department of Financial Services, 2015. <a href="<a href="<a href="source">source">source">source">source.
- Patrick Murck, (Partner, Cooley LLP), personal interview, March 2019.
- Marco Santori and Maria Vullo, "Legal Tender? The Regulation of Cryptocurrencies," June 7, 2018, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Anonymous New York venture capitalist in blockchain, personal interview, March 2019.
- Gage Lathrop and Dale Werts, "Blockchain and Cryptocurrency: State Law Roundup," JD Supra, July 10, 2018, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Long, Caitlin, "What Do Wyoming's 13 New Blockchain Laws Mean?" Forbes, April 08, 2019, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Caitlin Long (Co-Founder, Wyoming Blockchain Coalition), personal interview, Feb. 2019.
- Multiple start-up founders and business strategy leads (anonymous), personal interview, April 2019, Seattle.
- Greg Heuss (Managing Partner, Counterpoint Ventures), personal interview, April 2019, Seattle, Washington.
- Multiple start-ups (anonymous), interview by the author, April 2019, Los Angeles and San Francisco, California.
- David Otto (Founder and Managing Partner, Martin Davis PLLC), personal interview, April 2019, Seattle, Washington.
- Multiple start-ups and Venture Capitalists (anonymous), interview by the author, April 2019, Los Angeles and San Francisco, California.
- The SEC, as well as the securities laws it enforces, have come under bipartisan criticism from academics, entrepreneurs, investors, and members of Congress for creating red tape that makes it difficult both for entrepreneurs to raise capital in the public markets and for investors to find wealth-building opportunities. This concern prompted Congress to pass regulatory relief overwhelmingly in the Jumpstart Our Business Start-ups (JOBS) Act, which was signed by President Obama in 2012. In 2018, the U.S. House of Representatives passed a bill allowing further relief, the Jobs and Investor Confidence Act. The JOBS Act eased some burdens on entrepreneurs by exempting small and “emerging growth” companies from some of the costly burdens of securities laws like the Sarbanes-Oxley Act of 2002 and the Dodd-Frank Act 2010.For further reference: John Berlau, "Cryptocurrency and the SEC's Limitless Power Grab," Competitive Enterprise Institute, April 11, 2019, accessed April 14, 2019, <a href="<a href="<a href="source">source">source">source">source.
- Multiple venture capitalists, interviewed by author, Feb./Apr. 2019, New York, Seattle, San Francisco.
- John M. Carey, Legislative Voting and Accountability, Cambridge Studies in Comparative Politics (Cambridge University Press, 2009), ix.
- This expectation was, in some part, because of the way I had seen the voting records of American members of Congress being used to discuss their past positions on legislative matter, as well as to examine the linkages between the funding they received and the positions they espoused.
- Rule 246, “Rules of Procedure and Conduct of Business in the Council of States (Rajya Sabha),” August 2016, <a href="<a href="source">source">source">source; and Rule 364, “Rules of Procedure and Conduct of Business in Lok Sabha,” April 2014, <a href="<a href="source">source">source">source.
- “Constitution of India,” 1950, <a href="<a href="source">source">source">source.
- For the sake of brevity, the term “Speaker” shall be used to cover both the Speaker of the Lok Sabha as well as the Chairman of the Rajya Sabha.
- A head-count is not seen as a “division” under the Rules of Procedures of the Lok Sabha and the Rajya Sabha, even though votes are counted.
- This was increased from 2½ minutes in 1989 (Lok Sabha) and 2006 (Rajya Sabha).
- It was in 1956-57 that the Indo-German Trade Centre was contracted to install ‘automatic vote recording equipment,’ i.e., voting machines, manufactured by Telefonbau und Normalzeit G.M.B.H. of Frankfurt, West Germany, in both the Lok Sabha as well as the Rajya Sabha. Incidentally, this contract led to what was the first ruling on parliamentary privilege within the Rajya Sabha, and the second in the Lok Sabha in relation to a case before the Election Tribunal and the Calcutta High Court on disqualification of a member. See, Rajya Sabha Committee on Privileges, “First Report,” May 1958, <a href="<a href="source">source">source">source; Lok Sabha Committee on Privileges, “Second Report,” April 1958, <a href="<a href="source">source">source">source; and Brojo Gopal Das v. Kalipada Banerjee, January 1959, <a href="<a href="source">source">source">source. Given that the equipment did not have any means of the MP authenticating herself (unlike the machine used in the U.S. House of Representatives), that necessitated the allocation of specific seats to each member, which had not been fixed (except the reservation of a few rows for government ministers) until then. As a book on Indian parliamentary procedure notes, “each member is now allotted a fixed seat from where he has to address the House unless it otherwise directed by the Chair, and at the time of a division he has to record his vote by operating the apparatus fixed to his seat.” MN Kaul and SL Shakdher, Practice and Procedure of Parliament, 3rd ed., vol. 1 (Metropolitan Book Co., 1979), <a href="<a href="source">source">source">source; this is also encapsulated in the Lok Sabha Rules of Procedure. Rule 349(vii), “Rules of Procedure and Conduct of Business in Lok Sabha”
- India Const., art. 368(2).
- India Const., arts. 61(2)(b) and 61(4).
- India Const., art. 124(4).
- India Const., art. 244A(3).
- India Const., art. 249.
- India Const., art. 312.
- India Const., art.352(6).
- India Const., arts. 55(3) & 66(1).
- U.S. Const., art. I, . 5, cl. 3.
- Elizabeth Rybicki, “Voting and Quorum Procedures in the Senate,” (Congressional Research Service, August 2013), 5.
- Rybicki, 5.
- “Divisions,” UK Parliament, accessed 10 March 2019, <a href="<a href="source">source">source">source
- Ibid.
- Shalaka Patil, “Push Button Parliament – Why India Needs a Non-Partisan, Recorded Vote System,” Anuario Colombiano de Derecho Internacional 4 (2011): 182, <a href="<a href="source">source">source">source.
- Carey, Legislative Voting and Accountability, 166.
- Carey, 166.
- Whips can be the letter that are issued by a senior functionary of a political party, issuing directions to the members of that party in parliament—usually directing them to vote in a particular manner on a motion, to abstain from voting, or even to just attend a particular session of parliament. The term can also be used to describe the privilege of belonging to a political party; thus when an MP’s whip is removed, that MP is expelled from the party, until that MP’s whip is restored. Finally, the term can also be used to describe the senior political party functionaries whose job it is to issue and remove whips, and otherwise ensure cohesion among their fellow party members. Whips are statutorily recognized in multiple parliaments, and draw salaries from the public exchequer as well in countries like India and the U.K.
- R. Eric Petersen, “Parliament and Congress: A Brief Comparison of the British House of Commons and the U.S. House of Representatives,” 2005, 4, <a href="<a href="source">source">source">source.
- Petersen, 4.
- The law allows for disqualification if there is “voluntarily giving up of seat” or if an MP “votes or abstains from voting in such House contrary to any direction issued by the political party to which he belongs or by any person or authority authorized by it in this behalf, without obtaining, in either case, the prior permission of such political party, person or authority and such voting or abstention”. There are limited circumstances in whips may not be issued, namely in the election of presidents and vice-presidents.
- Kihoto Hollohan v. Zachillhu, 1992 SCR (1) 686. The court noted that, “there are certain side effects and fall out which might affect and hurt even honest dissenters and conscientious objectors, but these are the usual plus and minus of all areas of experimental legislation.”
- Ibid.
- Mannadi Satyanarayan Reddy v. Andhra Pradesh Legislative Assembly and Others, 2009 (3) ALT 32.
- David Beetham, Parliament and Democracy in the Twenty-First Century: A Guide to Good Practice (Inter-Parliamentary Union, 2006), 96, <a href="<a href="source">source">source">source.
- Beetham, 96.
- The situation before 1972-73 when the U.S. House of Representatives moved to electronic voting was described by the Clerk of the House: “Voting in the House was something of a mystery, unless you were present in the chamber when the roll was called, and attentive to the Members’ responses, and then, of course, people in the gallery then, as now, could not take notes. You did not know until the next day when the vote was recapitulated in the Congressional Record how the Members individually had voted.” – Donnald K. Anderson, Clerk of the U.S. House of Representatives (2006)
- Patil, “Push Button Parliament – Why India Needs a Non-Partisan, Recorded Vote System,” 170–72.
- Simon Hug, Simone Wegmann, and Reto Wüest, ‘Parliamentary Voting Procedures in Comparison’, West European Politics 38, no. 5 (September 2015): 943, <a href="<a href="source">source">source">source.
- Patil, “Push Button Parliament – Why India Needs a Non-Partisan, Recorded Vote System,” 171.
- Varghese K. George, “Voice Vote Valid Only When Nobody Questions It,” The Hindu, November 2014, <a href="<a href="source">source">source">source.
- Anusha Ondaatjie and Iain Marlow, “No Confidence in New PM, Sri Lanka Lawmakers Tell Parliament,” Bloomberg, accessed 29 April 2019, <a href="<a href="source">source">source">source.
- See Hug, Wegmann, and Wüest,”Parliamentary Voting Procedures in Comparison.”
- For this to happen, it ought to be taken up by the Rules Committee of either house, and a change recommended. Thereupon, the rules of procedure of the Lok Sabha and the Rajya Sabha should be amended by each house. While the lack of a clear rule is not a bar for this practice to be implemented, it would give it a more binding character if it found expression in the rules of procedure. As a start, though, it would be judicious for political parties to start publicly documenting every whip they issue (whether one-line, two-line, or three-line whips) on their website.
- Patil, “Push Button Parliament — Why India Needs a Non-Partisan, Recorded Vote System,” 191.
- Patil, 192.
- MPs have at least four distinct kinds of duties: (1) Legislative and deliberative: MPs debate, draft, and pass statutes, they amend or reject subordinate legislation promulgated by the Executive; (2) Oversight: they exercise budgetary oversight, participate in committees that examine the workings of the government, and have powers to conduct special investigations via “joint parliamentary committees,” fell governments through “no-confidence motions,” impeach the President, approve or disapprove declarations of emergency, and interrogate the functioning of the government through a variety of means [Question Hour, Calling Attention Motion, etc.], and impeach judges of constitutional courts; (3) Elective: they vote for the elections for the president and vice-president of India (apart from parliamentary functionaries such as the Speaker of the Lok Sabha, etc.; (4) Representative: MPs represent their political parties, and represent their constituents by raising issues relevant to their constituents in Parliament [or in parliamentary committees and processes], by aiding their constituents in communicating with governmental bodies and getting their concerns heard by the government and local bodies, and recommending specific developmental projects be undertaken in their constituency and providing the funding for that through the MPLAD fund.
- Lok Sabha Secretariat, “Resumé of Work Done by Lok Sabha: 16th Lok Sabha, 13th Session,” February 2018, 32–33, <a href="<a href="source">source">source">source.
- MP’s Reports, Dr. Shashi Tharoor’s Official Website, 2019, <a href="<a href="source">source">source">source. MP Shashi Tharoor has been leading the way, having issued such reports since his first term from 2009-2014. Instructively, in his latest end-term report covering 2014-2019, he only dedicates two sections for work within the Lok Sabha and a Standing Committee, while eleven sections are dedicated to work outside of Parliament.
- Manju Jain, “Delivering Parliamentary Library and Research Services in an Interconnected World: The Case of the Parliament of India,” IFLA – Library and Research Services for Parliaments, September 2016, <a href="<a href="source">source">source">source.
- Rajya Sabha Secretariat, ‘Rajya Sabha Annual Report 2017’, 2017, <a href="<a href="source">source">source">source.
- Empirical research for this paper would have been aided greatly if Parliamentary debates were available in a structured format such as Akoma Ntoso.
- There are many definitions of open standards, but for the purposes of this section I mean that it has been standardized by a committee with open participation and an open process, and is available for free, and may be implemented in free/libre/open source software without payment of any royalties.
- Ashok Hariharan, interview by author, March 2019.
- John Sheridan and Jim Mangiafico, ‘Structure-Aware Search of UK Legislation’, in XML London 2016 Conference Proceedings (London, United Kingdom: XML London, 2016), 78–81, <a href="<a href="source">source">source">source.
- ‘AT4AM.eu’, AT4AM.eu, accessed 30 January 2019, <a href="<a href="source">source">source">source.
- “U.N. Semantic Interoperability Framework for Normative and Parliamentary Documents (UNSIF) | United Nations System Chief Executives Board for Coordination,” United Nations System, accessed 16 April 2019, <a href="<a href="source">source">source">source. The blog post on this notes: ‘The adoption of [the UN Semantic Interoperability Framework] has put the foundations for the establishment of a UN-wide ecosystem of machine-readable documents that will foster collaboration and reduce costs in information management across the system by transforming the web of information enclosed in traditional word processing documents into a web of data that can be interpreted by computers to create innovative services. By having documents available in a common semantically rich format will raise dramatically the UN capacity to coordinate activities, create synergies and respond to clients’ information demands, improve the efficiency and quality of information processing, dissemination and accessibility, and bring significant benefits in terms of governance, accountability and transparency.”
- “Indigo Platform for Publishing Beautiful Legislation: Laws-Africa/Indigo’ (Laws.Africa, March 2019), <a href="<a href="source">source">source">source.
- Nyaaya, “Laws of India in Akoma Ntoso XML format,” <a href="<a href="source">source">source">source.
- Union of India v. Vansh Sharad Gupta, W.P. (C) 4761/2016, order dated May 25, 2017, <a href="<a href="source">source">source">source.
- Union of India v. Vansh Sharad Gupta, W.P. (C) 4761/2016, order dated December 15, 2017, <a href="<a href="source">source">source">source.
- Chakshu Roy, “Budgeting for Democracy,” The Indian Express, February 2017, <a href="<a href="source">source">source">source.
- Ashok Hariharan, interview with author, March 2019. Hariharan.’
- Hariharan.
- Hariharan.
- Beetham, Parliament and Democracy in the Twenty-First Century, 7.
- Ministry of Civil Aviation, Government Announces Regulations for Drones, New Delhi, India: Press Information Bureau, Government of India, August 27, 2018, <a href="source">source">source; Gill, Prabhjote, “Flying Drones are Finally Legal in India.,” Business Insider, August 29, 2018, <a href="source">source">source.
- For a discussion on how unmanned aerial vehicles or commercial drones are being utilized in some of the core public sectors and allowing civilian uses of aerial monitoring, see: Padmanabhan, Ananth, “Civilian Drones and India’s Regulatory Response,” Carnegie India, March 10, 2017, <a href="source">source">source.
- “Cleared for Take-Off: India Ready for the Drone Revolution, Pilots New Open Source Guide for Governments,” World Economic Forum, January 25, 2019, <a href="source">source">source.
- FE Bureau, “India’s Drone Market Expected to Grow $885.7 mn by 2021,” Financial Express, October 8, 2018, <a href="source">source">source.
- Mallapur, Chaitanya, “India Tops List of Drone-Importing Nations,” Business Insider, May 4, 2015, <a href="source">source">source.
- Panda, Ankit, “US Approves Sale of Armed Predator-B Drones to India,” The Diplomat, May 2, 2018. <a href="source">source">source.
- Pamela Cohn, Alastair Green, Meredith Langstaff, and Melanie Roller, “Commercial Drones are Here: The Future of Unmanned Aerial Systems”, McKinsey Report, December 2017, <a href="source">source">source
- Pamela Cohn, Alastair Green, Meredith Langstaff, and Melanie Roller, “Commercial Drones Are Here: The Future of Unmanned Aerial Systems,” McKinsey Report, December 2017, <a href="source">source">source.
- “Drone Certification: A Step-by-Step Guide to FAA Part 107 for U.S. Commercial Drone Pilots,” UAV Coach, <a href="source">source">source.
- Dukowitz, Jack, “ISO Releases Draft of First International Drone Standards for Public Comment,” UAVCoach. November 30, 2018, <a href="source">source">source.
- Government. Ministry of External Affairs. Responding First as a Leading Power. <a href="source">source">source
- Kuronuma, Yuki. ‘Drones Help Rescue Efforts in Nepal.’ Nikkei Asian Review. May 11, 2015. <a href="source">source">source
- Parmar, Tekendra, “Drones in India,” Center for the Study of the Drone. December 4, 2014. <a href="source">source">source.
- Rossow, Richard M. and C. Raja Mohan, Deepening India-U.S. Cooperation on Humanitarian Assistance and Disaster Relief in the Indian Ocean and the Asia-Pacific Regions, CSIS, Wadhwani Chair in U.S.-India Policy Studies, October 2015. <a href="source">source">source.
- Mehta, Aaron, “US, India Collaborating on Air-Launched Drone,” Defense News, March 18, 2019, <a href="source">source">source
- “Building Cargo Drone Expertise in Papua New Guinea,” iRevolutions, February 25, 2019, <a href="source">source">source.
- “Is China at the Forefront of Drone Technology?”, CSIS ChinaPower, May 29, 2018, <a href="source">source">source
- Das, Pranab K, “The Customs Paradigm in Combatting Weapons of Mass Destruction,” Ministry of Finance, Government of India. <a href="source">source">source.
- Ministry of Civil Aviation. Operations of Remotely Piloted Aircraft System (RPAS) to be Enabled through Digital Sky Platform, Press Information Bureau, August 27, 2018. <a href="source">source">source
- Mathews, Neelam, “India Struggles With Drone Issues.” AINOnline, February 17, 2016, <a href="source">source">source
- For a detailed discussion on the various challenges to bolster the commercial drone sector in India, see “Make in India for Unmanned Aircraft Systems: Awaiting its Kitty Hawk Moment,” FICCI and EY, <a href="source">source">source
- Rice, Stephen, “Eyes in the Sky: The Public has Privacy Concerns About Drones”, Forbes, February 4, 2019, <a href="source">source">source
- A doorstep delivery would entail collection of customer data at levels which would be considered private such as residence address, timings for deliveries among other detailed information on customers.
- Lohn, Andrew J, Gulden, Timothy R. Xu, Jia. Jones, Therese, Kuhn, Kenneth, Welser IV, William. “What’s in Store for Commercial Delivery Drones,” Rand Research Brief, <a href="source">source">source
- Lohn, Andrew J, Gulden, Timothy R. Xu, Jia. Jones, Therese, Kuhn, Kenneth, Welser IV, William. “What’s in Store for Commercial Delivery Drones,” Rand Research Brief, <a href="source">source">source
- ET Bureau, “Drones: Out of Sight, but in Indian Govt’s Mind,” Economic Times, January 16, 2019, <a href="source">source">source
- Isaak, Adam “With More Drones in the Sky Every Year, ‘Counter-Drone’ Tech Can Keep the Bad Ones at Bay”, CNBC, February 2, 2019, <a href="source">source">source
- Chang, Lulu “FBI Rescue Hostage Team Bamboozled After Criminals Unleash Drone Swarm”, Digital Trends, May 4, 2018, <a href="source">source">source
- Brennan, David. “Why are Militants Using Drones? UAV Weapons Have Spread Far Beyond Nation States,” Newsweek, April 24, 2018, <a href="source">source">source.
- “Game of Drones-Proliferated Drones,” Wargame Report, Center for New American Security, June 29, 2016, <a href="source">source">source.
- Harper, Alexander, “Drones Level the Battlefield for Extremists,” The Interpreter, April 20, 2018, <a href="source">source">source.
- Michel, Arthur H, ‘Counter-Drone Systems.’ The Center for Study of Drone, Bard College, February 2018, accessed April 26, 2019. <a href="source">source">source
- Ibid.
- Grand View Research, “Anti-Drone Market Size Worth $1.85 Billion By 2024 | CAGR: 24.1%,” accessed April 26, 2019. <a href="source">source">source
- “Why We Need Counter-Drone Technology Now More than Ever,” CNBC, February 1, 2019, <a href="source">source">source
- Federal Aviation Administration, Pilot Reports of Close Calls With Drones Soar in 2015, August 12, 2015, <a href="source">source">source
- Goglia, John,“FAA Confirms Shooting a Drone is a Federal Crime. So When Will U.S. Prosecute?” Forbes, April 13, 2016, <a href="source">source">source
- U.S. Department of Transportation, Updated Guidance on Unmanned Aircraft System (UAS) Detection and Countermeasures, Federal Aviation Agency. July 19, 2018, <a href="source">source">source
- Snead, Jason, John-Michael Seibler, and David Inserra, “Establishing a Legal Framework for Counter-Drone Technologies,” The Heritage Foundation, April 16, 2018, <a href="source">source">source
- French, Sally, “Department Of Defense Is Using SkySafe To Crack Down on Rogue Drones,” Drone Girl, July 20, 2017, <a href="source">source">source
- Peri, Dinaker, “Expanding Anti-UAVs Market to Counter Drone Technology,” CLAWS Journal, Winter 2015, <a href="source">source">source
- Ahuja, Namrata B, “Govt Plans to Deploy Anti-Drone Facilities at Airports,” The Week, March 14, 2018, <a href="source">source">source
- National Nuclear Security Administration, NNSA Deploys its First Counter-Unmanned Aircraft System, Nov. 19, 2018, <a href="source">source">source
- Horizontal technology refers to application of a technology across different sectors without much investment in R&D. An example would be e-commerce where selling a book is similar to selling a laptop.
- “The Chatbots Taking Over Government: What Jobs Can They Do?” October 17, 2017, source">source.
- Lindsay Curdele, “Pokemon Gov: Gamifying Civic Engagement,” July 28, 2016source">source.
- Participatory Pokemon Go, last modified July 5, 2017, source">source.
- “Catalog of Good Deeds: Building Civil Society Through Daily Acts of Kindness, Tlalnepantla De Baz, Mexico: Mayors Challenge Finalist, 2016,source">source.
- Ibid.
- G. Sgueo, A discussion on gamified digital advocacy, Workshop The Future of Law. Technology, Innovation and Access to Justice, Chair for Public Law and Comparative Law, Humboldt University of Berlin and Friedrich Naumann Stiftung for Freedom, November 2018.
- Alan Ivan Chorney, "Taking the Game out of Gamification," Dalhousie Journal of Interdisciplinary Management, Vol. 8, No. 1 (2012).
- Jane McGonigal, Reality is broken: Why games make us better and how they can change the world. (New York: Penguin, 2011).
- Robert D. Putnam, "E Pluribus Unum: Diversity and Community in the Twenty-first Century." (The 2006 Johan Skytte Prize Lecture, 2007).
- Nicholas Plumb, Hannah Millinship Hayes, et al, “Integration City: A new communities agenda for London,” October 2016, source">source.
- Ibid
- OECD Guidelines on Measuring Trust, Nov. 23, 2017, source">source.
- I. Bogost, “The rhetoric of video games” in K. SALEN (ed.), The Ecology of Games: Connecting Youth, Games, and Learning, (MIT Press, 2008), p. 130.
- Ibid.
- Gianluca Sgueo, “Games, Powers & Democracies: Chapter 1,” Games, Powers & Democracies, (Milan: Bocconi University Press, 2018).
- , Barnett et al., “Toward Metrics for Re(imagining) Governance: The Promise and Challenge of Evaluating Innovations in How We Govern,” GovLab Working Paper, April 18, 2013.
- Graham Smith, Democratic innovations: Designing institutions for citizen participation (Cambridge: Cambridge University Press, 2009).
- Decide Madrid, source">source.
- CrowdLaw Introduction, The GovLab, Sep. 2017, source">source
- “Over Half of Reykjavik Residents Steer Policymaking – Here's How,” Apolitical, Sept. 2017, source">source.
- Vtaiwan, source">source.
- “Taiwan Is Using Social Media to Crowdsource Legislation,” Apolitical, June 2017, source">source.
- Beth Noveck, “More Than A Coin: The Rise Of Civic Cryptocurrency,”June 25, 2018, source">source.
- Paul van Sambeek, Edgar Kampers, “NU-spaarpas, the Sustainable Incentive Card Scheme, 2004.
- De Torekes, source">source
- “Engage Your Citizens with Gamification,” Innowave, source">source.
- Peter Hasson, “Social Credit,” Daily Caller, Nov. 2018, source">source.
- Andrew Yang, “Modern Time Banking,” source">source.
- Rachel Botsman, “Big Data Meets Big Brother As China Moves To Rate Its Citizens,” Wired, Oct. 21, 2017, source">source.
- Rogier Creemers, "China's Social Credit System: An Evolving Practice of Control." (2018)
- A. Davies and J. Simon, “Citizen engagement in social innovation – a case study report,” adeliverable of the project: “The theoretical, empirical and policy foundations for building socialinnovation in Europe” (TEPSIE), European Commission – 7th Framework Programme, Brussels:European Commission, DG Research, 2012.
- Fred Powell, "Civil society, social policy and participatory democracy: Past, present and future." Social Policy and Society 8, no. 1 (2009): 49-58.
- Ibid
- Joseph Kahne, Ellen Middaugh, and Chris Evans. The civic potential of video games. (Cambridge, MA: MIT Press, 2009).
- “Who Knows Best? Cities Consult Citizens for Fresh IdeasPlace,” Feb. 2019, source">source.
- Samuel Bowles, “The Moral Economy: Why Good Incentives are no substitute for good citizens,” (New Haven, CT: Yale University Press, 2017).
- Cass R. Sunstein, “Why nudge?: The politics of libertarian paternalism,” ((New Haven, CT: Yale University Press, 2014).
- Beth Noveck, Smarter Citizens, Smarter State, (Harvard, MA:Harvard University Press, 2015).
- BETH Noveck, "Wiki-government: How Technology Can Make Government Better, Democracy Stronger, and Citizens More Powerful,” (Washington, DC: Brookings Institution 2009).
- Amos Tversky and Daniel Kahneman, "Judgment Under Uncertainty: Heuristics and Biases," Science 185, no. 4157 (1974): 1124-1131.
- John Cheney-Lippold, "A New Algorithmic Identity: Soft Biopolitics and the Modulation of Control," Theory, Culture & Society 28, no. 6 (2011): 164-181.
- John Cheney-Lippold, "Jus algoritmi: How the National Security Agency Remade Citizenship," International Journal of Communication 10 (2016): 22.
- Colin Daileda “The U.S. Will Start Collecting Social and Search Data on Every Immigrant Soon,” Mashable, September 2017, source">source.
- Draft Ethics Guidelines for Trustworthy AI, European Commission, December 2018, source">source.
- Ibid.
- Tara McGuinness and Anne-Marie Slaughter, “The New Practice of Public Problem Solving,” Stanford Social Innovation Review, Spring 2019. source">source
- Bharath Visweswariah, “Solving India's Most Pressing Challenges with Civic Tech,” Medium, May 21, 2018, source">source.
- “About: ichangemycity,” source">source.
- “Next Election: Make It Count!,” source">source.
- “Civis,” source">source.
- “Building Young India's Champions | Solve ninja, Reap Benefit,” source">source
- “Home.” Village Capital, vilcap.com/.
- Richard H. Thaler and Cass R. Sunstein, Nudge: Improving Decisions about Health, Wealth, and Happiness, (New York: Penguin, 2009).
- “C40 Cities | Networks,” source">source
- Stefaan Verhulst, Towards a Science of Gamification and its Relationship to Governance and Democracy (2018).
- Nilekani, Nandan ‘Technology to Leapfrog Development: The Aadhaar Experience’ Center for Global Development, The Eighth Annual Richard H. Sabot Lecture.
- “Social Security.” Social Security History, Social Security Administration, www.ssa.gov/history/hfaq.html.
- This statistic was reported in 2009 by “Highway Finance Data Collection.” Policy and Governmental Affairs Office of Highway Policy Information, U.S. Department of Transportation/Federal Highway Administration, www.fhwa.dot.gov/policyinformation/pubs/hf/pl11028/chapter4.cfm.
- Public Interest Technology is a field dedicated to leveraging technology to support public interest organizations and the people they serve. For decades, public interest organizations have worked to improve the lives of the general public. They work on issues that shape our everyday lives, including protecting the environment, human rights, child welfare, and reforming criminal justice. Source New America about Public Interest Technology
- Mawaki, Chango, "Becoming Artifacts: Medieval Seals, Passports and the Future of Digital Identity" (2012). The School of Information Studies- Dissertations. Paper 74.
- Benedict Anderson, Imagined communities: reflections on the origin and spread of nationalism, London: Verso, 1983.
- Edward Black, IBM and the Holocaust: The Stratigic Alliance Between Nazi Germany and America’s Most Powerful Corporation. New York: Random House 2001)
- M Manikandan ‘Fire of 1968 still burning inside’ The New Indian Express. Dec 24, 2017
- 1969 Gujarat riots
- Nellie Massacre
- 1984 Anti-Sikh Riots
- Hashimpura massacre
- Laxmanpur Bathe Masacare
- ‘Timeline of the Riots in Modi’s Gujarat’ New York Times, Aug 19, 2015
- Khairlanji Massacre
- See Kaur, Jaskaran; Crossette, Barbara (2006). Twenty years of impunity: the November 1984 pogroms of Sikhs in India (2nd ed.). Portland, OR: Ensaaf. p. 29. and Rao, Amiya; Ghose, Aurobindo; Pancholi, N. D. (1985). Truth about Delhi violence: report to the nation. India: Citizens for Democracy. Retrieved 4 August 2010.
- Dabas, Maninder, ‘11 Major Incidents of Violence Against Dalits Which Show How Badly We Treat Them’. Indian Times. July 25, 2016
- A Techno-Utopian strongly believes that technology allows mankind to make social, economic, political, and cultural advancements and that technology’s impacts as extremely positive.
- Nandan Nilekani and Viral Shah, Rebooting India: Realizing a Billion Aspirations (Penguin Books, India 2015)
- This was the case for several of my interviees for this research and why I have chosen not to disclose their names. Examples include: Shashidhar KJ, “UIDAI files FIR against journalist for exposing flaws in Aadhaar enrolment,” Medianama, March 29, 2017; Rachna Khaira “Rs 500, 10 minutes, and you have access to billion Aadhaar details, ”Tribune News Service Jan. 4, 2018.
- Interviews with subjects in India who participate in groups to do research and publish their work either under the name of someone who has enough power to reduce the risk they will have a FIR (first information report) filed against them or under a group name.
- Anand Venkatanarayanan, Security Analysis of mAadhaar, Oct 30, 2017Derick Thomas, “What UIDAI doesn’t tell you about offline use of Aadhaar for KYC,” Nov. 18, 2018. Karan Saini, “Extracting personal phone numbers linked to Aadhaar,” May 8, 2018.
- Zack Whittaker. “A new data leak hits Aadhaar, India's national ID database.” ZDNet/ZeroDay, March 23, 2018.
- Original content by iSpirit source
- Cameron, Kim, Laws of Identity See the 4th Law of Identity. in the Directed Identity: A universal identity system must support both “omni-directional”identifiers for use by public entities and “unidirectional” identifiers for use by private entities, thus facilitating discovery while preventing unnecessary release of correlation handles.
- Identification vs. authenticationIdentification is the process of establishing who an entity is within a given population or context. It often takes place through identity proofing, which verifies and validates attributes (such as name, birth date, fingerprints or iris scans) that the entity presents.Authentication is the process of determining if the authenticators (such as a fingerprint or password) used to claim a digital identity are valid – that they belong to the same entity who previously established the identity.World Economic Forum, Identity in a Digital World: A new chapter in the social contract, 2017
- This scenario was imagined by the American Civil Liberties Union and a short film was created of what this would be like when ordering pizza.
- Better Identity in America: A Blueprint for Policymakers, Better Identity Coalition, June 2018.
- See: Department of Homeland Security, Silicon Valley Innovation, Program. ‘Preventing Forgery and Counterfeiting of Certificates and Licenses (70RSAT19R00000002)’, Other Transactions Solicitations Link to site. Direct link to PDF.
- Aadhaar: A Biometric History of India’s 12-Digit Revolution by Shankkar Aiyar and The Aadhaar Effect: Why the World’s largest identity project matters by N.S. Ramnath, Charles Assisi.
- Updates on Aadhaar Final Hearing: Day 1
- Vidyut, Constitutional validity of Aadhaar Series MediaNama
- Prashant Reddy Thikkavarapu, ‘The Aadhaar Bill Is Yet Another Legislation That Leaves Too Much Power With The Government At The Centre’, Caravan Magazine 14 March 2016
- Prashant Reddy Thikkavarapu | ‘New Aadhaar Regulations Grant The UIDAI Unchecked Power, And Offer Little Convenience To Users’, November 21, 2016
- The Ecosystem Around Aadhaar mapped by Vidyut source and Dr. Usha Ramanathan’s Talk on the UIDAI Litigation An argument was made by private individuals and private companies to allow them to use the data as a business database, to use it as an identity platform on which many apps would be built. When the case was under way, five such businesses came to the court to be a part of the litigation. They requested the court to not change anything or their businesses would collapse. The link between businesses and the government in this project was extraordinary.
- Social Security Administration, Enumeration at Birth
- Department of Justice About the National Voter Registration Act
- Number of rooms, type of room, material of the building construction.
- Government of Kerala, Aadhaar Application
- Anand Venkatanarayanan and other security researchers have examined the software used for enrollment and in particular the encryption keys used in the enrollment software.
- All of these are available on the Internet Archive versions of UIDAI sites. UIDAI, State Resident Data Hub (SRDH) State Adoption Strategy Document v1.2 March, 2012. UIDAI Doc Number: UID _603_ECMP, Aadhaar Enrolment Client-Registrar Integration Manual Pre-Enrolment Data, Security & KYR+ Data. Document Version 2.2; UIDAI, Approach Document for Aadhaar Seeding In Service Delivery Databases Version 1.0. 2010; ITE & C Department Govt. of Andhra Pradesh. State Resident Data Hub SRDH; UIDAI, SRDH Application Deployment Guide Version No.1.5; State Resident Data Hub (SRDH) Application Framework Adoption Guidelines; UIDAI, Memorandum of Understanding between the Unique Identification Authority of India And the State Government for the Implementation of SRDH Project
- UIDAI State Resident Data Hub (SRDH), State Adoption Strategy Document v1.2, March, 2012 IDAI Portal and allows a Registrar to access ONLY its own KYR data – hence, a State Registrar cannot access data enrolled by Non State Registrars.
- UIDAI Data Sharing Policy Annexure-B, Memorandum of Understanding between the Unique Identification Authority of India And the State Government for the Implementation of SRDH Project.
- U Sudhakar Reddy, “Aadhaar-linked SRDH Data was shared in the past,” Times of India Mar. 9, 2019.
- Digital India Site: Kerala State Resident Data Hub Lookup Service
- UIDAI, Standard Protocol Covering the Approach & Process for Seeding Aadhaar Numbers in Service Delivery Databases June 2015 Version 1.1
- The same person may have many different names or variations of name based on context. It is also true that different parts of India have different naming conventions. Naming Conventions In India, RitiRiwaz, Aug. 2, 2018, Naming Traditions: How to Name Babies in India Last Updated on Sept. 12, 2017 by Team Babygogo,
- Subjects I interviewed in India went into great detail explaining how the name on their birth certificate was their grandfathers and matched what was on their marriage certificate but this was different from the name they had on all their school records and this was different from how they listed their name on government documents like PAN cards.
- Niha Masih Lost in transition: Has linking Aadhaar to government welfare schemes made it difficult for beneficiaries to avail of aid? Hindustan Times Oct. 08, 2017; Namita Singh Centre: States need to speed up Aadhaar seeding with benefit schemes, MediaNama, Nov. 12, 2018; Reetika Khera, Impact of Aadhaar in Welfare Programmes. The government's estimates of savings are examined, but these do not stand scrutiny. What passes as 'savings' is often the result of denial of legal entitlements for lack of Aadhaar. In that sense, the Aadhaar project undermines the right to life.
- Feggins, R. DevOps Best Practice – Establishing a “Single Source of Truth,” July, 14, 2014.
- Government of Odisha, State Resident Data Hub. sourceOdisha SRDH is a centralized, secure & single source of information on state residents and will be integrated with departmental applications for the purpose of availing Government Welfare Scheme benefits.
- United States Government Government Accountability Office,Social Security Numbers Federal and State Laws Restrict Use of SSNs, yet Gaps Remain, Testimony Before the Committee on Consumer Affairs and Protection andCommittee on Governmental Operations, New York State Assembly, Statement of Barbara D. Bovbjerg, SOCIAL SECURITY NUMBERS, Federal and State Laws Restrict Use of SSNs, yet Gaps Remain, For Release on Delivery Expected at 10:30 a.m. EST Thursday, September 15, 2005.
- Meiser, Ken, Opening Pandoras Box: The Social Security Number from 1937-2018, 2018. (master’s thesis)
- Sarah Igo, the Known Citizen: A history of Privacy in Modern America
- Sawyer and Schechter, “Computers, Privacy and the National Data Center” 811. In the Known Citizen: A history of Privacy in Modern America by Sarah Igo
- UIDAI, ‘State Resident Data Hub (SRDH) Institutional Framework Document’, April 2012. See Section 2.1.3.1 UIDAI Empanelment List
- Government of Telegana, Intensive Household Survey 2014
- Aman Sethi, ‘Why state data hubs pose a risk to Aadhaar security’, Hindustan Times, March 13, 2018
- Social Security Number Task Force, Social Security Administration, Report to the Commissioner (1971)
- Records, Computers and the Rights of Citizens, Report of the Secretary's Advisory Committee on Automated Personal Data Systems July, 1973
- See Robert Gellman, Fair Information Practices: A Basic History
- U.S. Department of Justice, United States Department of Justice Overview of the Privacy Act 1974, 2015 Edition
- Meiser, Ken, Opening Pandora’s Box: The Social Security Number from 1937-2018, 2018. (master’s thesis)
- Personal Privacy in an Information Society, The Report of The Privacy Protection Study Commission, July 1977
- Chapter 16: The Social Security Number. Personal Privacy in an Information Society, The Report of The Privacy Protection Study Commission,
- Meiser, Ken, Opening Pandoras Box: The Social Security Number from 1937-2018, 2018. (master’s thesis)
- Meiser, Ken, Opening Pandoras Box: The Social Security Number from 1937-2018, 2018. (master’s thesis)
- Better Identity Coalition, Better Identity in America: A Blueprint for Policy Makers, 2018. Page 4. accessed
- E-Government Act of 2002 (Pub.L. 107–347, 116 Stat. 2899, 44 U.S.C. § 101, H.R. 2458/S. 803)
- M-03-22, OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002
- Congressional Research Services The Social Security Number: Legal Developments Affecting Its Collection, Disclosure, and Confidentiality, Feb. 21, 2008State Department Report to Congress on Social Security Number Fraud Prevention Act 2017
- Laws currently being proposed would only apply to the private sector.
- Consumer Identification Program 31 C.F.R 1020.220
- The Privacy of Financial Information 12 C.F. R. pt 332 and the Interagency Guidelines Establishing Information Security Standards 12 C.F.R. pt 364. App. B (and corresponding regs) together with several laws mandating reporting to consumers of mis-use and theft of their information; Disclosure by CRA of Consumer File to Consumer; Free Annual Report; 15 U.S.C. §§ 1681g, 1681h, 1681j(a); 12 C.F.R. pt. 1022, subpart N. Duties of Consumer Reporting Agencies Regarding Identity Theft 12 C.F.R. § 1022.123
- FATF – source
- Indian Postal Addresses, Real Addresses taken from Kamat's Address Book,
- Nandan Nilekani and Viral Shah, Rebooting India: Realizing a Billion Aspirations (Penguin Books, India 2015) Page 113-120
- There are a few limited cases such as private investigators, for example, can run license plates if they are in the course of an investigation. Towing companies can run a license plate to locate the owner of a towed vehicle.
- I worked with advocates in India to survey people to create a list of how and where this happens. This was an informal survey via Twitter to get a sense of the range of every day activities that require photocopies of Aadhaar Cards – source transfer between hospital dfKotak Mahindra Bank Mobile App for updating mobile number.private hospitals like #RNTagoreHospitalsAll banks ask for #Aadhaar photocopiesnew SIM card in Chennaiprivate and public schoolsA workshop on Digital marketingRooftop gardening lecture demoHAM Radio classesVoter Id applicationinsurance of many typesshare market,Office HR deptMedical insurance renewalPassport office during renewalPost office, when creating new post office schemes like National Saving CertificatesPAN card data correctionCell phone connection – AirtelVodafone while upgrading SIMElectoral Bond purchaseIndane gas agency for KYC. Sundaram Motors Honda dealer processing insurance claimTCS World 10k Race, BengaluruTamilnadu Ration (TN EPDS)the DTDC courier took my Aadhar card photocopy while sending one package outside India – claimed the authorities at the airports are asking them to submit it as one of the required documents.Livpure RO water purifier.Central University of Himachal Pradesh. For admission related paperwork.
- As stated on their website: “Anyone who knowingly and willfully uses SSNVS to request or obtain information from Social Security under false pretenses violates Federal law and may be punished by a fine or imprisonment, or both.” Business Services Online BSO Suite of Services Page”
- EPFO Scheme How to Link Aadhaar Card With EPFO & UAN Account 2018
- Aadhaar Enabled Biometric Attendance Solution (AEBAS) is an attendance management system designed for government organizations by Government of India to improve productivity of employees. The system authenticates attendance using Aadhaar number created by Unique Identification Authority of India (UIDAI). It is a cloud based BAS that monitors attendance of government employees in real-time.
- Stephen Cobb, Data privacy and data protection: U.S. law and legislation:an ESET White Paper. 2016