Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / Uncategorized / Western countries have rules to access encrypted data from social platforms, why not India?

Western countries have rules to access encrypted data from social platforms, why not India?

February 11, 2019 by cbn Leave a Comment

Western countries have rules to access encrypted data from social platforms, why not India? By Dr Kamlesh Bajaj

The Ministry of Electronics and Information Technology recently unveiled draft rules under section 79 of the Information Technology Act to curb fake news and rumours on social media platforms.

These platforms are intermediaries under Section 79. The rules clearly state that an intermediary must inform its users not to host, publish or transmit any content that is harmful, harassing, hateful, paedophilic, etc.; or threatens national security or the sovereignty of India; or incites violence or prevents investigation of any offence.

Also, on coming to know of such content, they must act within 36 hours to disable it, and preserve the necessary records for at least 180 days for the purposes of investigation. The rules empower government agencies to ask an intermediary for any information or assistance for investigative, protective and cybersecurity activities. The onus is on the intermediary to ensure there is no violation of these terms.

The proposed amendments are being viewed as a move to access and trace online content that would turn India into a surveillance state. But freedom of expression has limits and this has been reiterated by all governments. Rumours on social media have had huge repercussions. They have triggered violence and even led to lynching of innocents in India.

While China is seen as an example of surveillance, it’s the western world which is challenging global platforms for lawful access to data.

The Five Eyes — US, UK, Canada, Australia and New Zealand — have demanded access to decrypted data to fight global terrorism, protect national security, and for investigation of serious crimes. In a joint statement in August 2018, they said: “Should governments continue to encounter impediments to lawful access to information … we may pursue technological, enforcement, legislative or other measures to achieve lawful access solutions.”

It is clear that governments around the world — not just India — are looking at laws to enable law enforcement agencies access data for national security.

Australia has taken the lead by approving the first anti-encryption law in the democratic world on December 6, 2018. It requires companies to ensure exceptional access to law enforcement agencies, failing which penalties can be imposed on the platforms and their executives sent to jail. UK’s Investigatory Powers Act in 2016, mandated social platforms help agencies with ‘equipment interference’ — a euphemism for decryption. In December 2018, US Deputy Attorney General Rod Rosenstein reiterated his call that technology companies develop “responsible encryption — effective, secure encryption that resists criminal intrusion but allows lawful access with judicial authorisation”.

As is clear from these developments that countries are choosing to pass new and carefully worded laws to deal with the problem of encryption.

It is against this background that the proposed amendments to rules in India must be seen.

India’s proposed rules ask the intermediary to “enable tracing out of such originator of information on its platform as may be required by government agencies who are legally authorised”.

The government has publicly stated that the goal behind such provisions was not breaking of end-to-end encryption, but merely enabling traceability. The removal of unlawful content and asking intermediaries to retain data for 180 days is in line with the EU Data Retention Directive.

The rules make it obligatory for big social media platforms to be treated as a company for better compliance with Indian laws. However, provisions regarding local incorporation significantly exceed the scope of intermediary rules, and ideally be the subject of a Data Protection Law.

India says intermediaries must deploy technology solutions to monitor content for possible terrorist or other national security challenges, and take proactive actions to disable or remove such content. This is something which many of these platforms are already doing for paedophilic content. For example, YouTube does not upload nearly 80% of content after prior review.

While rules are framed to reinforce the need for social media platforms to provide access to data and metadata to law enforcement agencies, there should be a balance between privacy and surveillance with appropriate oversight, in line with Supreme Court judgements.

As India debates the rules necessary to engage with social media platforms, the West has taken a step forward in line with what President Barack Obama said in Austin, Texas on March 12, 2016. “My conclusion is that you cannot take an absolutist view on this. So, if your argument is strong encryption no matter what, and we can and should, in fact, create black boxes, then that I think does not strike the kind of balance that we have lived with for 200, 300 years.” Let’s remember this as India discusses the rules necessary to engage with social media platforms.

(Dr Kamlesh Bajaj was the founder-director of CERT-In and founder-CEO of Data Security Council of India. He is a Distinguished Fellow, EastWest Institute. Views expressed above are his own)

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: Uncategorized

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025
  • Protecting Azure Infrastructure from silicon to systems

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,321)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in