You are on page 1of 1

Information Technology Rules: a case of overreach?

said that sedition has to be rede- WhatsApp’s charges made a


PARLEY Only the judiciary, and not the executive, fined. There are two problematic point about a 2019
should give an order on traceability terms here: ‘security of the state’ communique issued by five
and ‘public order’. People are countries (the U.K., the U.S.,
Last week, WhatsApp decided to le- selves misusing user data. So, ideal- shouting in my street; is it a public Australia, New Zealand, and
gally challenge one of India’s new ly, we should be looking to encour- order issue? And we need our Su- Canada) in which they talk
Information Technology rules age more user-controlled preme Court to define these terms about the problems with
which requires messaging platforms encryption and not limiting this and lay out the law on that. encryption. What do you think
to help investigative agencies in possibility. I am also strongly of the belief is going to happen going
identifying the originator of proble- that for these kind of cases, execu- forward?
matic messages. WhatsApp reckons Parminder Jeet Singh: I’ll start tive authority should not be able to
this would break end-to-end encryp- with the points of agreement with give an order. Only a judicial order, RB: Actually, every jurisdiction is
tion and undermine people’s right Rishab, and that is the context of the which should insist on the purpose, struggling with the issue of how to
to privacy. The government res- way the state has been using its how you are going to do it, whether deal with the fact that sometimes

REUTERS
ponded saying it is committed to en- powers in a manner which is be- the intermediary has been given an messages may not be accessible, or
suring the right of privacy for all its coming very dangerous. opportunity of being able to do it data may not be accessible to law
citizens, and that it also has to en- Having said that, we also need to through less intrusive means, which enforcement agency. But I don’t
sure national security. Have these see things in the sense of the fact are all the part of the new rules, think there is a single liberal democ-
new rules been framed to adequate-
ly address the privacy versus secur-
that our societies are changing from
pre-digital to digital societies, and
decryption except at the ends
of a communication? <
> Ideally, we should be
looking to encourage more
should allow access to the origina-
tor of a message. So, these institu-
racy that actually implements laws
mandating traceability in the same
ity balance, especially in the context many fundamental structural user-controlled encryption tional systems should be in a new way that the new IT rules actually
of social media intermediaries such changes have to take place. Among RB: That is actually the fundamen- and not limiting this law, and the Supreme Court should do. This issue of access to encrypted
as WhatsApp? Rishab Bailey and those are also the levers of law en- tal issue here, which is that the go- possibility. clarify terms like ‘public order’ and data has come up over the last 25
Parminder Jeet Singh discuss this forcement, required in the new con- vernment wants you to move away ‘security of the state’. years in many different countries.
Rishab Bailey
question in a conversation moderat- text. Second, as Justice Srikrishna from encryption controlled by the It will always be an ongoing bat- Even in the U.S., for instance, it’s
ed by Sriram Srinivasan. Edited said, a new law should be brought users to encryption done by the in- tle. The powers that a police consta- been discussed since the mid-1990s.
excerpts: out, which discusses the rationale, termediary itself. If the intermedi- able to find an originator. Another ble was given during the colonial re- It particularly comes up every five
gives good institutional checks and ary is controlling the encryption example is of obscene pictures, non gime... it is the same power the or six years when there’s a terrorist
What are your views on how balances, and then places this sig- keys, the government can just go to consensual, intimate pictures (that Indian policeman has in New Delhi attack or something like that and
the IT rules relate to the privacy nificant and new legal possibility for them and ask for this information. are shared). And finally, a lot of the and the Toronto policemen have: of technology companies say we can’t
versus security issue? the law enforcement in that context. wrong kind of content is today arresting people, going into peo- provide you this data because it’s
Third, the biggest problem with PJS: I don’t believe traceability of leaked on WhatsApp by the police ple’s houses. It is the institutional encrypted. But there have been no
Rishab Bailey: The short answer is WhatsApp is that it is a private com- encrypted messages requires break- itself, who get access to a lot of digi- safeguard around those which keep laws actually implemented that
that every provision of the new IT munication channel, and after cer- ing encryption. The metadata, tal media when they do investiga- their power in check. The same specifically deal with this issue, lar-
rules is ultra vires the Constitution tain virality, becomes public. So, which carries many layers of infor- tion. All these require the originator would apply in the digital arena. gely due to opposition from the
Rishab Bailey and the parent IT Act of 2000. The what happens is that with the origi- mation already, including a counter to be found out and these cases are technical community as well as civil
is Technology rules only make superficial attempts nator or traceability mandate, any- that tells you that the message has going to keep on multiplying. And What do you have to say about society and academia.
Policy researcher at balancing privacy and security in- body who’s writing a personal mes- crossed a certain limit of virality, just to say I think it could be found the fact that these didn’t come In Australia, fairly wide-ranging
at the National terests. But it’s very clear that secur- sage to his or her friend is afraid that can be a good enough place to lock out otherwise is not sufficient. as new laws? powers have been given to the go-
Institute of Public ity interests are being given primacy though they are giving an analysis the originator of every message vernment under a law known as the
Finance and Policy over both civil liberty interests as which, in a private sense, is not cri- when it is created. Now, you can al- The government’s response to PJS: Probably much of it is not of Telecommunications and Other Le-
well as economic interests. minal, but it could be criminal in a ways say it doesn’t go with my meth- WhatsApp mentioned the the delegated rule-making level. gislation Amendment Act. This al-
Keep in mind that the govern- public sense. So, how do you ba- od of encryption. But the law does safeguards that come with the These kinds of things should go to lows law enforcement to request in-
ment already has huge powers of lance the private and the public part not follow private models of busi- rules. Any thoughts on that? Parliament and a full-fledged law formation and assistance from
surveillance. This was recognised of it is a concern. ness; private models of business fol- should be written. intermediaries. But even here, they
even in the Justice Srikrishna Com- low the law. RB: The rule as it’s currently draft- can’t mandate the creation of sys-
mittee report that accompanied the Rishab, do you think that the I have been a law enforcement of- ed is vague, disproportionate, and RB: What has progressively hap- temic weaknesses or vulnerabilities.
draft data protection law in 2018. use of metadata is itself enough ficer, and I can see many situations probably unnecessary. The reasons pened over the last few years is that It’s also important to keep in
So, rather than seeking to revise to deal with this issue? where there is really almost no oth- for which this traceability power the Section 79 of the IT Act route, mind that often, platforms don’t al-
Parminder Jeet these powers, the government is er way — I mean you can spend de- can be used are quite broad and the- and the fact that you can make rules ways want to get on the bad side of
Singh giving itself greater ability to snoop RB: It’s unclear why you need to cades of investigation and always refore capable of misuse. The provi- under this, is being used to intro- governments. This might not neces-
is Executive on and interfere with the private have a specific mandate for tracea- find the originator. So, there are ex- sion uses the phrase ‘security of the duce progressively more onerous sarily apply in the Indian context,
Director, IT for lives of citizens. In particular, the bility. Yes, metadata as well as other amples like somebody sending out a state’, which unfortunately has vir- obligations, including on many is- because clearly there’s an adversa-
Change traceability obligation in the new forms of unencrypted data can be message which is derogatory to, say, tually come to mean criticising the sues where you might actually need rial position that’s been adopted
rules is problematic because the accessed by law enforcement. Keep Dalits and this goes viral. This is ille- government in any way. Similarly, to regulation. The argument is that all here. But platforms can also be arm-
technical literature on this is nearly in mind also that the current law in gal under Indian law. So, what say that this power can be used to the rules under Section 79 can do is twisted into building in what’s
universal, in agreeing that this India also allows the government to should the law do? A second exam- detect or prevent an offence basical- give effect to the main provision. called weakness by design into their
would mean breaking the use of request decryption of data where ple relates to systematic election-re- ly gives executive authorities free They can’t introduce new offences, product. For instance, Apple is said
end-to-end encryption for all users it’s held by an intermediary or lated manipulation, which has hap- rein to identify people even before they can’t go beyond what the origi- to have dropped plans to encrypt its
on platforms such as WhatsApp. where the intermediary holds the pened in the West on Twitter; in an offence has been committed. nal provision or, in fact, the parent iCloud data because the FBI pres-
Also, end-to-end encryption is private encryption key. India it happens on WhatsApp. Fo- Act itself contemplates. sured it. These are bigger questions
really needed in the digital econo- reign countries can do it, Indian PJS: This should have been a new that need to be discussed, but I
Scan the QR code to my because data theft and hacking Would the decryption rules be political cells can be doing in a man- law with systemic explanation of in- Coming back to the issue of don’t think that you will actually
listen to the full are only increasing in India. There’s relevant in a context where ner which is illegal. And all these tent, purpose, and institutional sa- encryption, the government’s find too many countries which have
interview online also an issue of platforms them- there are no keys for can really be traced when you are feguards. Like now, the court has release in response to similar provisions in the law.

You might also like