Tabrez Ahmad'sTechnolex


Tabrez Ahmad's Technolex

Technology, Education R&D, Consultancy,Hyperawareness,ODR,

Network of Law

The objective of the blog is to provide a fair analysis and awareness of legal issues in an easy way for the understanding of the people at large


Friday, August 15, 2014

4th Mediation Workshop at College of Legal Studies, UPES


College of Legal Studies, UPES is one of the few pioneer law schools in the world including Harvard Law School which provides special training to the students to inculcate and improve the mediation skills. The University organizes this program twice in a year since 2011.

The 4th Mediation Workshop at College of Legal Studies, UPES is going to begin from 16th August, 2014 by very eminent personalities in India and the world who has made their mark in mediation and have resolved various complex disputes by mediation globally.

This year the mediation team has following personalities

Mr. Niranjan Bhatt, Sr. Counsel, Ahmedabad High Court
Mr. J.P. Sengh, Sr. Advocate, HC, Delhi.
Ms. Sadhana Ramachandran, Advocate, Supreme Court of India
Ms. Veena Ralli, HC of Delhi

The team also includes two American Students Sophie and Carina who came to attend the program on a student exchange program.

Mr. Niranjan Bhatt happens to be the President of the Association of Indian Mediators while Mrs. Sadhana Ramachandran the Secretary of the association needs no introduction being the pioneers in India who promoted the very concept of Mediation and have trained several lawyers and law professionals in the last 15 years.

The Mediation is an informal and confidential way for people to resolve disputes with the help of a neutral mediator who is trained to help people discuss their differences. The mediator does not decide who is right or wrong or issue a decision. Instead, the mediator helps the parties work out their own solutions to problems. A mediation session usually lasts from 3 to 4 hours, although the time can vary depending on how complicated the case is. There is no charge to either party to attend the mediation. Mediation is a negotiation process in which a neutral third party assists the disputing parties in resolving their disputes.

A Mediator uses special negotiation and communication techniques to help the parties to come to a settlement. The parties can appoint a Mediator with their mutual consent or a mediator can be appointed by the Court in a pending litigation.  The decision to mediate is completely voluntary. If the parties do not reach an agreement at the mediation, the charge will be investigated like any other charge. A written signed agreement reached during mediation is enforceable in court just like any other contract. Mediation always leaves the decision making power with the parties. A Mediator does not decide what is fair or right, does not apportion blame, nor renders any opinion on the merits or chances of success if the case is litigated. Rather, a mediator acts as a catalyst to bring the two disputing parties together by defining issues and limiting obstacles to communication and settlement. One of the greatest benefits of mediation is that it allows people to resolve the charge in a friendly way and in ways that meet their own unique needs. Also, a charge can be resolved faster through mediation. While it takes less than 3 months on average to resolve a charge through mediation, it can take 6 months or longer for a charge to be investigated.

Mediation is fair, efficient and can help the parties avoid a lengthy investigation and litigation. Mediation is an effective way of resolving disputes without the need to go to court. It involves an independent third party - a mediator - who helps both sides come to an agreement. Mediation is a flexible process that can be used to settle disputes in a whole range of situations such as: consumer disputes; contract disputes; family disputes; neighborhood disputes to name a few

Mediation is a voluntary process and will only take place if both parties agree. It is a confidential process where the terms of discussion are not disclosed to any party outside the mediation hearing. The mediation programs in addition to helping the students to work through complex personal disputes, the mediators are also developing skills of the students that will benefit them throughout their legal careers. Active listening, assumption-checking, empathy and interest-probing are skills that are important not only to mediation, but also to virtually any practice of law.  If parties are unable to reach agreement, they can still go to court. Details about what went on at the mediation will not be disclosed or used at a court hearing. Both parties share the cost of mediation, which will depend on the value and complexity of the claim.

The Law students should be interested in learning about mediation because being a more effective communicator helps the students in all areas of their life, personal (for instance, handling conflict with friends and family better) as well as professional (like understanding and clarifying what clients and supervisors are looking for). The role of the mediator is to help parties reach a solution to their problem and to arrive at an outcome that both parties are happy to accept. Mediators avoid taking sides, making judgments or giving guidance. They are simply responsible for developing effective communications and building consensus between the parties. The focus of a mediation meeting is to reach a common sense settlement agreeable to both parties in a case.


Monday, August 11, 2014

India Became the 17th Member of the Exclusive Washington Accord

After years of effort and several failures, India finally became the 17th member of the exclusive Washington Accord on Friday, 13th June, 2014. It will help to create equivalence of engineering degree programmes and allow Indians to practice engineering in other member countries. There are six international agreements governing mutual recognition of engineering qualifications and professional competence. In each of these agreements countries/economies who wish to participate may apply for membership, and if accepted become members or signatories to the agreement. In broad principle, each country/economy must meet its own costs, and the body making application must verify that it is the appropriate representative body for that country/economy. The credit for making India a member of Washington Accord goes to many individuals who worked behind the scenes for years.

The World Summit on Accreditation in 2012 was used for backroom diplomacy to allay fears about the Indian system. The process of accreditation had started during late Arjun Singh's tenure as HRD minister. During Kapil Sibal's time, India was made a temporary member. In January, 2014, a comprehensive audit of NBA was undertaken by the Washington Accord team.The oldest such agreement is the APEC Engineer agreement which commenced in 1999. This has Government support in the participating APEC economies.  The formal rules and procedures were developed for a six-year peer-review of signatories and for admission of new signatories, following a period in provisional status. For the crowded list of Tier-II institutions, NBA has given a roadmap so that they are well prepared to become members of Washington Accord. NBA has asked universities to allow affiliated engineering colleges to design at least 50% of the course. For instance, Washington Accord lays emphasis on teaching social sciences along with engineering.

The representative organization in each economy creates a "register" of those engineers wishing to be recognised as meeting the generic international standard. Other economies should give credit when such an engineer seeks to have his or her competence recognised. The Agreement is largely administered between engineering bodies, but there can be Government representation and substantive changes need to be signed off at governmental APEC Agreement level. Washington Accord will, however, not be valid for IT engineers. India will have to sign the Seoul Accord to create similar equivalence of programmes. Becoming part of Washington Accord also does not necessarily mean that all engineering degrees by all Indian colleges will get equivalence with those of other member countries.

NBA has shortlisted 220-odd engineering colleges as Tier-I institutes whose undergraduate engineering programme is in tune with what is required under the Accord. But even Tier-I institutes which include IITs/NITs/BITS Pilani besides many autonomous and deemed universities will now have to apply afresh to NBA and only after extensive verification of their programmes will they be declared fit to be part of Washington Accord institutions.

A massive redesigning of course will take place with emphasis on outcomes and letting students explore and innovate. The admission to the Washington Accord of the accreditation organisations in Hong Kong China and South Africa in the late 1990s and Japan, Singapore, Chinese Taipei, Korea and Malaysia took the number of signatories to 11 by 2009. Since that year, the accrediting organisations in Turkey and Russia have become signatories. Currently there are also five organisations with provisional status. Many of the new and provisional signatories were mentored by established ones as they developed their systems.

Engineers should have knowledge of the environment so that they know how their work is going to have an impact on the ecosystem. They also need understanding of society, management and communication skills. Agreements covering tertiary qualifications in engineering. There are three agreements covering mutual recognition in respect of tertiary-level qualifications in engineering: The Washington Accord signed in 1989 was the first - it recognises substantial equivalence in the accreditation of qualifications in professional engineering, normally of four years duration.

The Sydney Accord commenced in 2001 and recognises substantial equivalence in the accreditation of qualifications in engineering technology, normally of three years duration. The Dublin Accord is an agreement for substantial equivalence in the accreditation of tertiary qualifications in technician engineering, normally of two years duration. The signatories committed to continue to share relevant information; allow their representatives to participate in each other’s accreditation processes and attend relevant meetings of their organisations; and to make reference to this agreement in publications listing accredited programmes. Agreements covering competence standards for practising engineers The other three agreements cover recognition of equivalence at the practising engineer level i.e. it is individual people, not qualifications that are seen to meet the benchmark standard. The concept of these agreements is that a person recognised in one country as reaching the agreed international standard of competence should only be minimally assessed (primarily for local knowledge) prior to obtaining registration in another country that is party to the agreement.

The Sydney and Dublin Accords for engineering technologists and engineering technicians were initiated in 2001 and 2002, respectively. Together with the three agreements for engineering practitioners, the IEA was formed in 2007, and the IEA Secretariat was created to assist with the administration of the accords and agreements and their development. The following organisations hold provisional status; Bangladesh Board of Accreditation for Engineering and Technical Education;  China China Association for Science and Technology; Pakistan Pakistan Engineering Council; Philippines Philippine Technological Council and Sri Lanka Institution of Engineers Sri Lanka


The International Professional Engineers agreement commenced in 2001. It operates the same competence standard as the APEC Engineer agreement but any country/economy may join. The parties to the agreement are largely engineering bodies. There are intentions to draw IPEA and APEC closer together. Whilst accord recognition strictly applies only to education programmes offered within a signatory’s territorial boundaries, the need to accommodate developments in crossborder education has required development of rules for out-of-territory accreditation and recognition. The rules agreed to in 2008 also allow for assistance to emerging economies that may be too small to operate their own accreditation system. The rules are currently under review.

The International Engineering Technologist agreement was signed by participating economies/countries in 2003. The parties to the Agreement have agreed to commence establishing a mutual recognition scheme for engineering technologists. In 1989 the six foundation signatory organisations from Australia, Canada, Ireland, New Zealand, the United Kingdom and United States observed that their individual processes, policies, criteria and requirements for granting accreditation to university level programmes were substantially equivalent. They agreed to grant (or recommend to registering bodies, if different) the same rights and privileges to graduates of programmes accredited by other signatories as they grant to their own accredited programmes.

The adoption of graduate outcome specifications in tertiary education was paralleled by the development of the specification of consensus graduate attributes for the accords. Version 3 was adopted by the accords in 2013 as the exemplar of the educational requirements to be met by signatories. The signatory for each jurisdiction is the recognised organisation for accreditation of professional engineering qualifications. They are listed by jurisdiction, in order of admission to the Accord, with the current operating name of the accrediting organisation. 

1989 Australia Engineers Australia
Canada Engineers Canada
Ireland Engineers Ireland
New Zealand Institution of Professional Engineers New Zealand
United Kingdom Engineering Council United Kingdom
United States Accreditation Board for Engineering and Technology
1995 Hong Kong China The Hong Kong Institution of Engineers
1999 South Africa Engineering Council of South Africa
2005 Japan Japan Accreditation Board for Engineering Education
2006 Singapore Institution of Engineers Singapore
2007 Korea Accreditation Board for Engineering Education of Korea
Chinese Taipei Institute of Engineering Education Taiwan
2009 Malaysia Board of Engineers Malaysia
2011 Turkey MUDEK (Association for Evaluation and Accreditation of Engineering Programs)
2012 Russia Association for Engineering Education of Russia

The Accord recognises that the members of the European Network for Accreditation of Engineering Education (ENAEE) operate similar accreditation processes to similar standards within Europe, and its authorised members provide the Eur-ACE label to accredited programmes. Four of the Accord members are also authorised members of ENAEE. There is a formal mechanism between the IEA and ENAEE to maximise mutual understanding and potential benefits of the two organisations.

The current signatories to the Washington Accord that together deliver over 7,000 programmes. The Accord requires a body that wishes to become a signatory to first apply for provisional status. The body must demonstrate it has an accreditation system that meets basic requirements. To proceed to signatory status the body must demonstrate substantial equivalence of its standards and processes in a review by a team drawn from the signatories, and be approved by unanimous agreement of the signatories.


Friday, July 11, 2014

Crime and Digital Forensics: Lessons for Mobile Users and Investigating Agencies

As mobile devices rise in popularity and sophistication, so does their use among people conducting illegal activities. For that reason, evidence from mobile devices is becoming increasingly important to law enforcement in fighting crime. In addition to no warrant being required to request a tower dump containing the mobile phone data of thousands of people to track down one or more criminals involved in a crime, privacy advocates also question what is being done to the data collected once an investigation is complete. In fact, digital evidence from a mobile phone led international police to the terrorists responsible for the Madrid train bombings that killed at least 190 people in 2004.
Digital forensics is a branch of science encompassing the recovery and investigation of material found in digital devices, including computers, cell phones, and digital cameras. Every time someone uses a cell phone, a signal is sent out that pinpoints where the user is. Cell towers and the GPS features in some smartphones track where a phone is at any moment. Cell phone carriers can provide authorities with a cell phone’s location via proper court documents.
By exporting information from multiple digital devices (such as call logs from multiple cellular phones or e-mails from computers) and importing that data into an analytical software package, investigators using data-mining techniques can diagram and visualize a criminal enterprise or a timeline of events. This graphical representation can make it easier for investigators to understand the complex relationships in a criminal enterprise or for a jury to understand criminal activity and the possible connections among offenders in a courtroom presentation.
The law enforcement agencies require basic knowledge of tools for collecting and analyzing digital evidence from mobile phones. They are also required the efficiency of assessment of the current knowledge level in the field like Identification of tools available to collect digital evidence from mobile devices; Identification of all the cell phones in use that may become evidence in an investigation and a determination of how many can be forensically acquired and analyzed with the existing cell phone forensic solutions; Identification of the gaps in the number of cell phones in use and the existing cell phone forensic solutions for future technology development project.
Now mobile network operators receive occasional requests from law-enforcement agencies to provide communications information from a specific tower. These requests usually cover short periods and the information provided is only metadata. Metadata is information about the time, duration and destination of calls but not their content. Metadata can also include location data about a mobile phone, even when it’s not on a call. To successfully collect and analyze evidence from mobile devices, law enforcement needs tools that can recover system files, operating system information, applications, deleted files and unallocated space. Some available tools capture the logical image (what users can see without using special tools), which is only a portion of the phone's data storage capacity. However, law enforcement needs more tools that capture the entire physical image including deleted files, messages, photos and call logs. Often, the deleted data is extremely valuable to the investigation and provides more comprehensive evidence for prosecution.
The law-enforcement agencies can also use a technique known as a "tower dump", which gives police data about the identity, activity and location of any phone that connects to targeted cell towers over a set span of time, generally an hour or two. A typical dump covers multiple towers, and mobile providers, and can net information about thousands of mobile phones. The dumps are usually used in circumstances when police have few leads and can be a useful, powerful tool in tracking down criminals. But privacy advocates say that while they may be helpful to police, they also target thousands of innocent people and don’t have any judicial oversight. A request for non-content information on the use of a particular tower during a specified period of time may be lawful under certain circumstances. What we need is transparency as to what's being done and who is doing it. But we need a well-defined law regarding this type of data. Considering thousands of users are affected by tower dumps,  they should count for the number of those who are affected. Around 330,000 requests for metadata were made by law-enforcement agencies in 2012-13, according to the latest report published by the Attorney-General’s Department of Australia.
Cell phones contain call history, contacts, text messages, web browser history, email, a Global Positioning System (GPS), and other location information that police and law enforcement agencies find valuable. Evidence from cell phones can help investigators piece together motives and events and provide new leads. Now Smartphones and cell phones have become a regular part of criminal investigations because they are now owned by most people and provide information about a person’s whereabouts and a person’s contacts.
Tracking subjects via their mobile devices has been utilized for many years and has become very much a part of many, if not all, investigations. Cell phone records can identify calls made and received. You also can obtain the cellular towers that were used in the conversation, SMS (short message service), or data communication. The cell phone records hold latitude and longitude information and can be used as a historical reference to where the mobile device was at a particular time. In addition to collecting cell phone communication records, police also encourage citizens to use their mobile devices to report crimes and send in tips. Police often reach out to the public and make it clear to them when they need help in an investigation.
People can send their digital photos and videos of crimes in progress to call centers in some cities. New technology allows sent images to be directly added to the record of a related call, and be forwarded to emergency responders on their way to the scene. An example of such technology is CrimePush, a multiplatform smartphone app that allows users to report crimes quickly and efficiently.  It also gives users the ability to send multiple, GPS-tagged distress messages to designated emergency contacts. High-profile incidents throughout the world have proven how valuable mobile phone images can be to crime investigations.
The London bombings in July 2005 marked a turning point in news coverage and the role of camera phone images. Witnesses to the attacks used their cell phone cameras to record their experiences in the aftermath. Not only did it signal a new era of citizen journalism, but police in London were able to use the cell phone photos as clues to find the terrorists behind the bombings. Just this April, 2014 investigators of the Boston Marathon bombings collected photos and video from cell phones and surveillance cameras to aid their investigation. Seconds after the bombs exploded at the marathon, Jacksonville Beach, Fla., businessman and marathon runner David Green pulled out his smartphone and took a photo of the chaos developing. He then put his phone away and helped the injured. After officials released a surveillance video of the two bombing suspects, Green realized he had a picture of suspect Dzhokhar A. Tsarnaev walking away from the scene. Editors of The Associated Press were able to establish the authenticity of Green’s photo and established an exclusive arrangement for distribution of the photograph. In addition to photos and video, text messages are proving to be helpful in investigations. Text messages are more discreet and safer in some circumstances, such as kidnappings or burglaries. Many police departments throughout the country have text-a-tip programs that allow people to send anonymous text messages from their cell phones. In order to provide people with a confidential means of communication, text messages are sent to a separate third-party server where identifying information is removed and assigned an encrypted alias to ensure callers’ anonymity. Identifying a phone from its radio frequency fingerprint is certainly not far-fetched. It is similar to identifying a digital camera where the image metadata does not provide a serial number. From underlying imperfections in the lens, which are detectable in the image, the source camera can be identified.
To keep from being tracked and getting caught, criminals use evasion tactics such as modifying the built-in ID code in their cell phone or swapping out SIM cards, making it impossible for law enforcement to track the criminals down by relying solely on cell phone signals. German engineers found, however, that the radio hardware in a cellphone — a collection of components like power amplifiers, oscillators, and signal mixers — all introduce radio signal inaccuracies. When these inaccuracies, or errors, are taken together, as seen in the digital signal sent to a cell tower, the result can be read as a unique digital signal –a digital fingerprint. These digital fingerprints do not change even if the built-in ID code has been modified, or the SIM card has been swapped out. Law enforcement agencies may soon have a new tool at their disposal — a device that which distinguishes between cell phones based on their digital signal. This new technology was developed by engineers at the Technische Universität Dresden in Germany.
A TU Dresden release reports that law enforcement officials can track criminals as they talk on their cell phones using triangulation of cell towers. To keep from being tracked and getting caught, however, criminals began using new evasion tactics such as modifying the built-in ID code in their cell phone or swapping out SIM cards – making it difficult, if not impossible, for law enforcement to track criminals down by relying solely on cell phone signals. The technology developed by the TU Dresden engineers would allow law enforcement to overcome the criminals’’ evasion tactics.
Identity theft, stalking, fraud, pornography, illegal electronic surveillance, and theft of intellectual property are just some of the examples of crimes committed every day on mobile devices. A mobile device is simply a portable computing device, so any crime that can be perpetuated on a computer can be committed via a mobile device. The portability of mobile devices makes it difficult, but not impossible, to identify the source of an electronic crime. If a user is using a public wi-fi, a ‘burner’ prepaid phone, cloud storage, or any other anonymizing agent, difficulties in identification is compounded not only in 2G phones — but also defects are present in every radio device and even 3G and 4G phones. Law enforcement agencies will continue to be challenged to obtain the tools and the training to perform competent digital forensics investigations and keep pace with criminal activity. 
Serious criminals are extremely adept in using single-use phones and dumping SIM cards so new capabilities should be developed to help law enforcement. As the radio hardware in a cellphone consists of a collection of components like power amplifiers, oscillators and signal mixers that can all introduce radio signal inaccuracies.
When these errors are taken together, as seen in the digital signal sent to a cell tower, the result can be read as a unique digital signal –a digital fingerprint. Thus, whatever criminals do to their cell phone — short replacing the internal components of one phone with those of another phone — the phone will continue to emit a unique signal which can be read by a device and used to separate the particular phone out from all the other cell phones. This allows the police to locate the phone, and the criminal using it, by triangulating cell towers.

Source:http://source.southuniversity.edu/fighting-crime-with-mobile-technology-Law-enforcement technology Locating criminals by tracking their cell phones’ digital fingerprints Published 5 August 2013.

Saturday, June 28, 2014

Challenges of Privacy and Information Technology

As the accelerating speed of technological advances is now an unquestioning reality. It is fundamentally transforming every aspect of our personal and business lives, every industry, and every country across the globe. However, it also has  the effect of fundamentally transforming the notion of privacy —  what it means to affected stakeholders (individuals, regulators,  organizations) and how each party can remain accountable in a  world that technology has turned on its head.

One of the most pressing privacy issues related to digital devices today is the increasing  ubiquity of bring your own device (BYOD) policies. According to Gartner, by 2018 up to 70% of mobile professionals will be using their smartphone to conduct work. As enticing as BYOD is for an increasing number of organizations, it is apparent that there are two sides to the BYOD coin: heads represents increased efficiencies; tails results in increased risk. And the risks are substantial. In 2014, we expect to see organizations continue to deal with a number of privacy challenges related to BYOD. Organizations need to maintain ownership of their information. With BYOD, this information is stored on devices that now sit outside the organization’s immediate control. To keep an eye on their data, organizations tend to install monitoring tools on employee smartphones. However, when implementing these tools, organizations need to be very careful that they are only monitoring the company’s data and not collecting personal information about their employees and others such as friends and family who may use the device.
The organizations can only collect personal information for a stated reason - and can use it only for that purpose. Among others things that mean a company that supplies a service can't sell its list of subscribers to another company's marketing department. Individuals must be informed, and give their consent, before personal information is collected, used or disclosed. But most firms are unaware of the new law and very few are prepared to comply. For any organization that already sends commercial electronic messages, they presumably comply with the privacy law, that requires organizations to obtain user consent, allow users to withdraw their consent, and provide the necessary contact information to do so.  Compliance with the new anti-spam law involves much the same obligations. While there are certainly some additional technical requirements and complications (along with tough penalties for failure to comply), the basics of the law involve consent, withdrawal of consent (ie. unsubscribe), and accessible contact information. 

While privacy does create some new obligations, what is not new is the claims that business is unaware and unprepared to address their privacy law obligations. The IT Act 2000 of India defines a ‘computer resource’; expansively as including a “computer, computer system, computer network, data, computer database or software”. As is evident, this definition is wide enough to cover most intrusions which involve any electronic communication devices or networks — including mobile networks. Briefly, then IT Act provides for both civil liability and criminal penalty for a number of specifically proscribed activities involving use of a computer — many of which impinge on privacy directly or indirectly as follows:  accessing; downloading/copying/extraction of data or extracts any data ; introduction of computer contaminant[3];or computer virus;  causing damage either to the computer resource or data residing on it; disruption; denial of access; facilitating access by an unauthorized person; charging the services availed of by a person to the account of another person; destruction or diminishing of value of information; stealing, concealing, destroying or altering source code with an intention.  The Act further provides for the civil remedy of “damages by way of compensation” for damages caused by any of these actions. In addition anyone who “dishonestly” and “fraudulently” does any of these specified acts is liable to be punished with imprisonment for a term of upto three years or with a fine which may extend to five lakh rupees, or with both.

In N G Arun Kumar case of November 2009, The Additional Chief Metropolitan Magistrate, Egmore, Chennai, sentenced N G Arun Kumar, a techie from Bangalore to undergo a rigorous imprisonment for one year with a fine of Rs 5,000 under section 420 IPC (cheating) and Section 66 of IT Act (hacking). Investigations had revealed that Kumar was logging on to the BSNL broadband Internet connection as if he was the authorised genuine user and ‘made alteration in the computer database pertaining to broadband Internet user accounts’ of the subscribers. The CBI registered a cyber crime case against Kumar and carried out investigations on the basis of a complaint by the Press Information Bureau, Chennai, which detected the unauthorised use of broadband Internet. The complaint also stated that the subscribers had incurred a loss of Rs 38,248 due to Kumar’s wrongful act. He used to ‘hack’ sites from Bangalore as also from Chennai and other cities.

In 2014, as organizations begin to think about the endless possibilities associated with the “internet of things” — nanotechnology, product sensors, sensor-driven analytics and sophisticated tracking capabilities — they also need to think about the privacy risks. There is a strong possibility, for example, that when an organization embeds a tracking mechanism into a product or service, it has not first sought the permission, either implicit or explicit, of the consumers being tracked. And when consumers find out, chances are they’re going to be irate. These kinds of privacy gaffes erode the very trust many organizations are attempting to cultivate to create the ultimate customer experience.
There is no question that the internet of things holds huge promise for an organization to vastly improve its strategic trajectories and business models, generate efficiencies and lower costs. However, this promise needs to be balanced against the privacy that consumers innately expect, and the privacy that they will demand alongside their customized customer experience. In 2013, participants at the 35th International Conference of Data Protection and Privacy Commissioners continued their progress by adopting eight new declarations and resolutions that delved deeper into the issues raised the year before. Four resolutions focused on technology challenges (appification, profiling, digital education and webtracking), two addressed better coordination among jurisdictions (enforcement coordination and international law), and one urged greater transparency on what data organizations are collecting and why (openness).
At a more granular level, many government bodies at federal and state levels are continuing to update their breach notification laws. Unfortunately, the massive intelligence leak by former US intelligence contractor Edward Snowden has cast a pall on the goals of cooperation. In fact, the Snowden affair has so eroded trust among nations that the European Union is considering a motion to suspend the US–EU Safe Harbor Framework. Once a respected guideline for US organizations to provide satisfactory protection for personal data of EU residents as required by the European Union’s Directive on Data Protection, the Framework now lies in limbo. This leaves Binding Corporate Rules (BCR) as one of the few frameworks available for global organizations to adhere to when seeking to transfer data of EU residents across borders.
In 2013, a number of jurisdictions around the world improved or expanded their privacy regulations. We expect similar progress to occur around the world in 2014. With the emerging global digital economy and the increasing popularity of cloud computing services, legislation which reinforces trust in the market will be a key driver for business growth as follows:
Brazil: Brazil seeks to mandate that global internet providers store data gathered from Brazilian users within Brazil.
Canada: Bill C-475, working its way through Parliament, would unify and strengthen the country’s approach to breach notification.
US: Although US lawmakers continue to push for a federal data breach notification law, Congress continues to debate whether federal law should supersede state laws.
Australia: In late 2012, the Australian Parliament passed the Enhancing Privacy Protection Act. The Act is set to take effect in 2014.
China: In late 2012, China’s standing committee of the National People’s Congress approved a directive that strengthened online personal data protection. That directive came into force in February 2013.
 Singapore: Singapore’s Personal Data Protection Act 2013 came into force in 2013.
EU: Under a policy implemented in August 2013, European communication services providers are now required to notify not only affected individuals but their respective national authority within 24 hours of detection. EU: Crafted in 2012 and expected to pass in 2014, the EU General Data Protection Regulation is designed to simplify and strengthen the European Union’s data protection framework. Instead of adhering to requirements from 27 individual data protection authorities, organizations will only have to address one set of data protection rules.

One solution, which is becoming more feasible as smartphones become more powerful, is the partitioning of the devices. This would allow employees to essentially operate two different desktops — one for work and one for personal. The other option is the use of a guest network that is separate from the main network. Organizations could create a “sandbox” where company data would reside, separated from any association with personal data, applications or online services. Organizations need to be vigilant when collecting data from social media. Consumers are voluntarily providing intimate details about themselves. Organizations need to respect their privacy, even when the consumers themselves aren’t, by anonymizing the data before using and sharing it. Anonymous data can still provide deep insights into trends and opportunities, but with a much smaller privacy impact. 

Friday, April 25, 2014

World IPR Day Celebration 2014 at IPR Cell College of Legal Studies, University of Petroleum & Energy Dehradun

It gives us immense pleasure to invite you to the World IP Day celebration, 28th April, 2014. The event is being organized by the IPR Cell of College of Legal Studies, UPES in association with UCOST (Uttrakhand State Council for Science & Technology) R & D (UPES) and Center for Innovation & Entrepreneurship (CIE). The celebrations will include IPR awareness, a brief video on intellectual property, Debate and Essay writing competition where any undergraduate and post graduate student is welcome to participate irrespective of the discipline. There will also be release of the draft UPES IPR policy, a poster presentation and exhibition highlighting creativity and innovation of the students.

In 2000, WIPO's member states designated April 26 – the day on which the WIPO Convention came into force in 1970 – as World IP Day with the aim of increasing general understanding of IP.  Since then, World IP Day has offered a unique opportunity each year to join with others around the globe to consider how IP contributes to the flourishing of music and the arts and to driving the technological innovation that helps shape our world.

It gives me immense pleasure in saying that the UPES has emerged as a premier institution and the first Indian Energy University, working towards building the nation by creating skilled professionals to drive the economy. Its College of Legal Studies (CoLS) is a unique domain-specific college with specialization in courses such as Energy Law, Corporate Law, Cyber Law and IPR. In furtherance to our objective of becoming a distinctive and successful institution in the domain specific sector, the College organized various events regularly. This World IP Day celebration aims to keep alive the importance of IP in the business world.

Your presence will not only be an honor for the College of Legal Studies, UPES but also will provide an opportunity for the students to get to know the values you cherish and practice in your life.

We look forward to be privileged by your presence at the IP Day celebration.

Thanking You,
With Best Regards,

Dr. Tabrez Ahmad
Chairman,
The World IP Day Celebrations 2014.
In-charge- UCOST IPR cell CoLS UPES


Professor & Associate Director, College of Legal Studies, UPES

Saturday, February 15, 2014

Challenges of Nuclear Energy

Due to the fast expanding requirements of every nation we cannot continue to rely primarily on fossil fuel for energy security. According to the Department of Nuclear Energy of the IAEA which makes two projections, one low and the other high, the world could see a significant shift in reliance to nuclear energy. It is revealed that the total production of electricity could vary from 447 GW(e) in 2030 (low projection) to 691 GW(e) in 2030 (high projection). Accordingly, by 2030, the increase in electricity production could be 25 percent or 93 percent respectively. Further, by this time, the number of countries generating nuclear energy could increase from the present 30 to 50.

The disastrous effect on climate that the use of fossil fuels and beget, their exhaustible nature and the absence of any other viable alternative that could satisfy the fast growing energy needs of the world striving to achieve economic growth have propelled the reversal of the policy of abandoning nuclear energy as the focus of the future. The decision by India govt. is also the same. But the greatest challenge is safety and security. Due to the increasing dependence on atomic energy, it would be imperative for both the operators and regulators to create a culture of highest levels of  energy management and safety.While operators have been entrusted with the responsibility of ensuring the highest safety standards, the regulators ensure that they are followed without any deviations and undertake their obligations. In order to operate at efficient level, it is must to have the required engineering, financial, and management capability to built, manage, operate and follow the highest safety standards.

The operators and regulators in the entire world function under a global nuclear safety regime. The regime is a collective international enterprise that sets safety parameters for all the operators and regulators, monitoring the progress and safety measures in place, and building competence among them. The adoption of higher safety standards by individual countries will not only enhance the credibility of the global regime but will also help in assuaging the fear of the civilian population to the establishment of nuclear plants. Now it is the need of hour that every nuclear power should ensure the adoption of safety measures.

As the technical assistance is provided by various international organizations like IAEA, NEA and WANO for the upgradation of safety standards. India requires to modify its regulatory structure and norms to make the generation of nuclear energy safe and viable. As the prospects for nuclear energy development in India and the possible trajectory India's civilian nuclear energy programme could take a survey of the best international practices relating to safety, security, liability, management and ENR transfer operations and suitable recommendations there for the existing legal and institutional structures in India and the need to build a nuclear regime in the country that would be more responsive and accountable to the concerns and needs of the public. Now there is great need that Indian government should enact a nuclear liability Law to make India a partner in the international nuclear energy regime.


Source: IDSA Task Force Report. Development of Nuclear Energy Sector in India (http://www.idsa.in )

4th Dr. Paras Diwan Memorial National Energy Law Moot Court Competition; 3 - 6 April 2014.

Dear Sir/Madam,
It gives us immense pleasure to invite your esteemed institution to participate in the 4th Dr. Paras Diwan Memorial National Energy Law Moot Court Competition 2014 which will be held from 3 - 6 April 2014.
This flagship Moot Court Competition is conducted every year to commemorate the legendary      Dr. Paras Diwan, a renowned legal luminary, acclaimed jurist, and a writer par excellence. The competition seeks to sensitize the law students to the developing domain in Energy Law and policy, both national and international and provide a platform to students to understand the complex and emerging issues involved therein.
We request you to kindly nominate a team of three students of the undergraduate law programme of your institution to participate in the competition.
You may confirm your participation by mailing us at mcc.upes.2014@gmail.com. The duly filled in registration forms should be sent by e-mail along with a scanned copy of the DD of Rs. 3500/- on or before 21 February 2014. In addition, kindly post (Speed/Registered) the original registration forms along with the DD which must reach us on or before 7 March 2014. The maximum number of teams that can be accommodated for the competition is 20 based on defined criteria.
For further details regarding the Moot Competition, Moot Problem and the rules, kindly visit the website of our university www.upes.ac.in (visit the Events page).
We look forward to your participation.

For any further queries you may contact:

Harsh Vardhan Singh:+ 91 9045452789

Aditya Prasad Palai: +91 7895181554


Thanking you,

Yours sincerely,
Dr. Tabrez Ahmad,
Professor & Associate Director,
Chairman-4th Dr. Paras Diwan

 National Energy Law Moot Court Competition