<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2071 to 2085.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/forbesindia-article-real-issue-july9-2013-rohin-dharmakumar-is-cms-a-compromise-of-your-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/policies/website-use"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/policies/privacy-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/policies/non-discrimination-equal-opportunities-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/policies/ethical-research-guidelines"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/forbesindia-article-real-issue-july9-2013-rohin-dharmakumar-is-cms-a-compromise-of-your-security">
    <title>Is CMS a Compromise of Your Security?</title>
    <link>https://cis-india.org/news/forbesindia-article-real-issue-july9-2013-rohin-dharmakumar-is-cms-a-compromise-of-your-security</link>
    <description>
        &lt;b&gt;By secretly monitoring and recording all Indians through a Central Monitoring System, our government will end up making citizens and businesses less safe.

&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This &lt;a class="external-link" href="http://forbesindia.com/article/real-issue/is-cms-a-compromise-of-national-security/35543/1#ixzz2YX7nI92k"&gt;article appeared in the Forbes India magazine&lt;/a&gt; of 12 July, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Are you reading this article on your PC or smartphone? No? Do you own a smartphone? Surely a phone then?&lt;br /&gt;&lt;br /&gt;If you also happen to live in Delhi, Haryana or Karnataka, then from  April this year nearly all your electronic communication—telephony,  emails, VOIP, social networking—has been sucked up under an innocuous  sounding programme called the Central Monitoring System, or CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There’s no way to tell if you are being watched really, because telecom service providers aren’t part of the set-up. In most cases, they may not even be aware which of their users is being monitored. Neither can you approach a government agency or court to find out more, because there’s practically very little oversight or disclosure. What the government does with the data—how it is stored, secured, accessed or deleted—we don’t know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike the US and other Western democracies where even for a large scale programme like Prism (leaked recently by 29-year-old whistleblower and now fugitive Edward Snowden), surveillance orders need to be signed by a judge. But in India most orders are signed by either the Central or state home secretary, says Sunil Abraham, executive director for Centre for Internet and Society, Bangalore. This leads to a conflict of interest as the executive branch is both undertaking law enforcement and providing oversight on its own work.&lt;br /&gt;&lt;br /&gt;In most cases, the officials are overwhelmed with other work, and don’t have the time to apply their minds to each request. “There is supposed to be an oversight committee that reviews the decisions of home secretaries, but we don’t have any idea about that committee either,” says Abraham.&lt;br /&gt;&lt;br /&gt;Meanwhile, government bodies like the R&amp;amp;AW, Central Bureau of Investigation, National Investigation Agency, Central Board of Direct Taxes, Narcotics Control Bureau and the Enforcement Directorate will have the right to look up your data. Starting next year, all mobile telephony operators will also need to track and store the geographical location from which subscribers make or receive calls.&lt;br /&gt;&lt;br /&gt;“I see it as the rise of techno-determinism in our security apparatus. Previously, our philosophy was to avoid infringing on individual privacy, and monitor a small set of individuals directly suspected of engaging in illegal activities. Now, thanks to the Utopianism being offered up by ‘Big Data’ infrastructure, putting everybody under blanket surveillance seems like a better way to serve our security and law enforcement agendas more effectively,” says Abraham.&lt;br /&gt;&lt;br /&gt;There is a real risk that CMS and the numerous other monitoring programmes that will subsequently connect to it will end up harming more Indians than protecting them.&lt;br /&gt;&lt;br /&gt;The biggest risk is that these programmes will turn into lucrative ‘honey pots’ for hackers, criminals and rival countries. Why bother hacking individuals and companies if you can attack the CMS? We’ve seen private corporations and government agencies in the US, Israel and the UK getting hacked. So let’s not have any illusions that India is going to fare much better.&lt;br /&gt;&lt;br /&gt;Another consequence is that sooner or later innocent citizens will be wrongly accused of being criminals based on mistaken data patterns. While searching for matches in any database with hundreds of millions of records, the risk of a ‘false positive’ increases disproportionately because there are exponentially more innocents than there are guilty. And in the near-Dystopian construct of the CMS, it will take months or years for such errors to be rectified.&lt;br /&gt;&lt;br /&gt;As more Indians become aware of these programmes, they will adopt encryption and masking tools to hide their digital selves. In the process, numerous ‘unintended consequences’ of failing to differentiate law-abiding citizens from criminals will be created. What answer will a normal citizen offer to a law enforcement official who wants to know why he or she has encrypted all communications and hosted a personal server in, say, Sweden?&lt;br /&gt;&lt;br /&gt;But arguably the biggest threat of 24x7 surveillance is to businesses. Security and trust are the foundations atop which most modern businesses are built. From your purchase of a gadget on an ecommerce site to a large conglomerate’s secret bid in a government auction to discussions within a company on future business strategies to patent applications—everything requires secrecy and security. All an unscrupulous competitor, whether it be a company or a country, has to do to go one-up on you is to attack the CMS and other central databases.&lt;br /&gt;&lt;br /&gt;“The reason why the USA historically decided not to impose blanket surveillance wasn’t because of human rights, but to protect its businesses and intellectual property. Because while we may be able to live in a society without human rights, we cannot be in one without functional markets,” says Abraham.&lt;br /&gt;&lt;br /&gt;He goes on to say that the recent disclosures around the various spying programmes run by the US have made the private surveillance and security industry very happy. “Each incident becomes a case-study to pit one country against another, forcing each one to cherry-pick the worst global practices in a dangerous race to the bottom. Civil society and privacy activists don’t have the resources to fight large vendors and so the only thing that will stop this is the leak of large databases, like that of 9 million Israeli biometric records a few years back.”&lt;br /&gt;&lt;br /&gt;Recollecting the news about a family-business break-up some years ago, where two brothers agreed to split their businesses, the net result was one brother opted out of telephony services offered by the other. All of that is now moot. “There are no more shadows now. Nobody will have refuge and everybody will be exposed,” says Abraham.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/forbesindia-article-real-issue-july9-2013-rohin-dharmakumar-is-cms-a-compromise-of-your-security'&gt;https://cis-india.org/news/forbesindia-article-real-issue-july9-2013-rohin-dharmakumar-is-cms-a-compromise-of-your-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T06:27:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state">
    <title>Moving Towards a Surveillance State</title>
    <link>https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state</link>
    <description>
        &lt;b&gt;The cyberspace is a modern construct of communication and today, a large part of human activity takes place in cyberspace. It has become the universal platform where business is executed, discourse is conducted and personal information is exchanged.  However, the underbelly of the internet is also seen to host activities and persons who are motivated by nefarious intent. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Note: The original tender document of the Assam Police dated 28.02.2013  along with other several other tender documents for procurement of  Internet and Voice Monitoring Systems &lt;a href="https://cis-india.org/internet-governance/blog/tenders-eoi-press-release.zip" class="internal-link"&gt;is attached as a zip folder&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As highlighted in the &lt;a href="http://necessaryandproportionate.net/#_edn2"&gt;&lt;i&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/i&gt;&lt;/a&gt;&lt;i&gt;, &lt;/i&gt;logistical barriers to surveillance have decreased in recent decades and the application of legal principles in new technological contexts has become unclear. It is often feared that in light of the explosion of digital communications content and information about communications, or "communications metadata," coupled with the decreasing costs of storing and mining large sets of data and the provision of personal content through third party service providers make State surveillance possible at an unprecedented scale. Communications surveillance in the modern environment encompasses the monitoring, interception, collection, preservation and retention of, interference with, or access to information that includes, reflects, arises from or is about a person's communications in the past, present or future.&lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt; These fears are now turning into a reality with the introduction of mass surveillance systems which penetrate into the lives of every person who uses any form of communications. There is ample evidence in the form of tenders for Internet Monitoring Systems (IMS) and Telecom Interception Systems (TCIS) put out by the Central government and various state governments that the Indian state is steadily turning into an extensive surveillance state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While surveillance and intelligence gathering is essential for the maintenance of national security, the creation and working of a mass surveillance system as it is envisioned today may not necessarily be in absolute conformity with the existing law. A mass surveillance system like the &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central Monitoring System&lt;/a&gt; (CMS) not only threatens to completely eradicate any vestige of the right to privacy but in the absence of a concrete set of procedural guidelines creates a tremendous risk of abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although information regarding the Central Monitoring System is quite limited on the public forum at the moment it can be gathered that a centralized system for monitoring of all communication was first proposed by the Government of India in 2009 as indicated by the &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=54679"&gt;press release&lt;/a&gt; of the Ministry of Communications &amp;amp; Information. Implementation of the system started subsequently as indicated by another government &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=70747"&gt;press release&lt;/a&gt; and the Center for Development of Telematics (C-DOT) was entrusted with the responsibility of implementing the system. As per the C-DOT &lt;a href="http://www.cdot.in/media/publications.htm"&gt;annual report&lt;/a&gt; 2011-12, research, development, trials and progressive scaling up of a Central Monitoring System were conducted by the organization in the past 4 years and the requisite hardware and CMS solutions which support voice and data interception have been installed and commissioned at various Telecom Service Providers (TSP) in Delhi and Haryana as part of the pilot project. &lt;a href="http://articles.economictimes.indiatimes.com/2013-05-07/news/39091148_1_single-window-pranesh-prakash-internet"&gt;Media reports&lt;/a&gt; indicate that the project will be fully functional by 2014. While an extensive surveillance system is being stealthily introduced by the state, several concerns with regard to its extent of use, functioning, and real world impact have been raised owing to ambiguities and &lt;a href="https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy"&gt;wide gaps in procedure and law&lt;/a&gt;. Moreover, the lack of a concrete privacy legislation coupled with the absence of public discourse indicates the lack of interest of the state over the rights of an ordinary citizen. It is under these circumstances that awareness must first be brought regarding &lt;a href="https://www.eff.org/deeplinks/state-surveillance-%26-human-rights"&gt;the risks of the mass surveillance&lt;/a&gt; on civil liberties which in the absence of established procedures protecting the rights of the citizens of the state can result in the abuse of powers by the state or its agencies and lead to the demise of civil freedoms even in democratic states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The architecture and working of a &lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;proposed Internet Monitoring System&lt;/a&gt; must be examined in an attempt to better understand the functioning, capabilities and possible impact of a Central Monitoring System on our society and lives. This can perhaps allow more open discourse and a committed effort to preserve the rights of the citizens especially the right to privacy can be made while allowing for the creation of strong procedural guidelines which will help maintain legitimate intelligence gathering and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Monitoring System: Setup and Working&lt;/b&gt;&lt;br /&gt;Very broadly, The Internet Monitoring System enables an agency of the state to intercept and monitor all content which passes through the Internet Service Provider’s (ISP) server which includes all electronic correspondence (emails, chats or IM’s, transcribed call logs), web forms, video and audio files, and other forms of internet content. The electronic data is stored and also subject to various types of analysis. While Internet Monitoring Systems are installed locally and their function is limited to specific geographic region, the Central Monitoring System will consolidate the data acquired from the different voice and data interception systems located across the country and create a centralized architecture for interception, monitoring and analysis of communications. Although the exact specifications and functions of the central monitoring system still remain unclear and ambiguous, some parallels regarding the functioning of the CMS can be drawn from the the specifications revealed in the Assam Police &lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;tender document&lt;/a&gt; for the procurement of an Internet Monitoring System.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Setup&lt;/b&gt;&lt;br /&gt;The deployment architecture of an Internet Monitoring System (IMS) contains probe servers which are installed at the Internet Service Provider’s (ISP) premises and the probes are installed at various tapping points within the entire ISP network.  A collection server is also installed and hosted at the site of the ISP. The collection server is used to either collect, analyze, filter or simple aggregate the data from the ISP servers and the data is transferred to a master aggregation server located a central data center. The central data center may also contain more servers specifically for analysis and storage. This type of architecture is being referred to as a ‘high availability clustered setup’ which is supposed to provide security in case of a failure or outage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Assam Police Internet Monitoring System tender document specifically indicates that the deployment in the state of Assam shall require 8 taps or probes to be installed at different ISPs, out of which 6 taps/probes shall be of 10 GBPS and 2 taps are of 1 GBPS. The document however mentions that the specifications are preliminary and subject to change.&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Types of data&lt;/b&gt;&lt;br /&gt;The proposed internet monitoring system of the Assam state can provide network traffic interception and a variety of internet protocols including Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol (IMAP) and Session Initiation Protocol (SIP), Voice over Internet Protocol (VoIP) can be intercepted and monitored. The system can also support monitoring of Internet Relay Chat and various other messaging applications (such as Google Talk, Yahoo Chat, MSN Messenger, ICQ, etc.).  The system can be equipped to capture and display multiple file types like text (.doc, .pdf), zipped (.zip) and executable applications (.exe). Further, information regarding login details, login pattern, login location, DNS address, routing address can be acquired along with the IP address and other details of the user.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Web crawling capabilities can be installed on the system which can provide data from various data sources like social networking sites, web based communities, wikis, blogs and other forms of web content. Social media websites (such as Twitter, Facebook, Orkut, MySpace etc.), web pages and data on hosted applications can also be intercepted, monitored and analyzed.  The system also allows capture of additional pages if updated; log periodical updates and other changes. This allows the monitoring agencies the capability of gathering internet traffic based on several parameters like Protocols, Keywords, Filters and Watch lists. Keyword matching is achieved by including phonetically similar words in various languages including local languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More specific functions of the IMS can include complete email extraction which will disclose the address book, inbox, sent mail folder, drafts folder, personal folders, delete folders, custom folders etc. and can also provide identification of dead drop mails. The system can also be equipped to allow country wise tracking of instant messages, chats and mails.&lt;/p&gt;
&lt;p&gt;Regarding retention and storage of data, the tender document specifies that the system shall be technically capable of retaining the metadata of Internet traffic for at least one year and the defined traffic/payload/content is to be retained in the storage server at least for a week.  However, the data may be retained for a longer period if required. The metadata and qualified data after analysis are integrated to a designated main intelligence repository for storage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Types of Analysis&lt;/b&gt;&lt;br /&gt;The Internet Monitoring System apart from intercepting all the data generated through the Internet Service Providers is essentially equipped for various types of data analysis. The solutions that are installed in the internet monitoring system provide the capability for real time as well as historical analysis of network traffic, network perimeter devices and internal sniffers.  The kinds of analysis based on ‘slicing and dicing of data’ range from text mining, sentiment analysis, link analysis, geo-spatial analysis, statistical analysis, social network analysis, transaction analysis, locational analysis and fusion based analysis, CDR analysis, timeline analysis and histogram based analysis from various sources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The solutions installed in the IMS can enable monitoring of specific words or phrases (in various languages) in blogs, websites, forums, media reports, social media websites, media reports, chat rooms and messaging applications, collaboration applications and deep web applications. Phone numbers, addresses, names, locations, age, gender and other such information from content including comments and such can also be monitored. Specifically with regard to social media, the user’s profile and information related to it can be extracted and a detailed ontology of all the social media profiles of the user can be created.&lt;br /&gt;&lt;br /&gt;Based on the information, the analysis supposed to provide the capability to identify suspicious behavior based on existing and new patterns as they emerge and are continuously applied to combine incoming and existing information on people, profiles, transactions, social network, type of websites visited, time spent on websites, type of content download or view and any other type of gatherable information. The solutions on the system are also supposed to create single or multiple or parallel scenario build-ups that may occur in blogs, social media forums, chat rooms, specific web hosting server locations or URL, packet route that may be defined from time to time and such scenario build-ups can be based on parameters like sentiments, language or expressions purporting hatred or anti-national expressions, and even emotions like expression of joy, compassion and anger, which as may be defined by the agency depending on operational and intelligence requirement. Based on these parameters, automated alerts can be generated relating to structured or unstructured data (including metadata of contents), events, pattern discovery, phonetically similar words or phrases or actions from users. &lt;br /&gt;&lt;br /&gt;Based on the data analysis, reports or dossiers can be generated and visual analysis allowing a wide variety of views can be created.  Further, real time visualization showing results from real-time data can be generated which allows alerts, alert categories or discoveries to be ranked (high, medium, and low priority, high value asset, low value asset, moderate value asset, verified information, unverified information, primary evidence, secondary evidence, circumstantial evidence, etc.) based on criteria developed by the agency. The IMS solutions can also be capable of offering web-intelligence and open source intelligence and allow capabilities like simultaneous search capabilities which can be automated providing a powerful tool for exploration of the intercepted data.&lt;br /&gt;&lt;br /&gt;Another important requirement mentioned in the tender document is the systems capability to integrate with other interception and monitoring systems for 2G, 3G/UMTS and other evolving mobile carrier technologies including fixed line and Blackberry services and encrypted IP services like Skype services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;It is clear that a system like IMS with its extensive interception and analysis capabilities gives complete access to an agency or authority of all information that is accessed or transmitted by a person on the internet including information which is private and confidential such as email and instant messages. Although the state has the power to issue directions for interception or monitoring of information under the Information Technology Act, 2000 and certain rules are prescribed under section 69B, they are wholly inadequate compared to the scope and extent of the Internet Monitoring System and its scale of operations. The interception and monitoring systems that are either proposed or already in place effectively bypass the existing procedures prescribed under the Information Technology Act. &lt;br /&gt;&lt;br /&gt;The issues, concerns and risks are only compounded when it comes to the Central Monitoring System. The solutions installed in present day interception and monitoring systems give the state unprecedented powers to intercept, monitor and analyze all the data of any person who access the internet. Tools like deep packet inspection and extensive data mining solutions in the absence of concrete safeguards and when deployed through a centralized system can be misused to censor any content including legitimate discourse. Also, the perception that access to a larger amount of data or all data can help improve intelligence can also be sometimes misleading and it must be asked whether the fundamental rights of the citizens of the state can be traded away under the pretext of national security. Furthermore, it is essential for the state to weigh the costs of such a project both economically and morally and balance it with sufficient internal measures as well as adequate laws so that the democratic values are persevered and not endangered by any act of reckless force.&lt;br /&gt;&lt;br /&gt;Reiterating what has been said earlier, while it is important for the state to improve its intelligence gathering tools and mechanisms, it must not be done at the cost of a citizen’s fundamental right. It is the duty of the democratic state to endure and maintain a fine balance between national interest and fundamental rights through timely creation of equitable laws.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;]. &lt;a class="external-link" href="http://necessaryandproportionate.net/#_edn2"&gt;http://necessaryandproportionate.net/#_edn2&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state'&gt;https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>atreya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T05:57:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india">
    <title>RTI on Officials and Agencies Authorized to Intercept Telephone Messages in India</title>
    <link>https://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india</link>
    <description>
        &lt;b&gt;In an RTI mailed on April 17, 2013, the Centre for Internet and Society sought comprehensive information on the officials and agencies authorized to intercept telephone messages in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;A portion of the RTI still awaits response, as it was &lt;a href="https://cis-india.org/internet-governance/blog/redirected-to-deity.pdf" class="internal-link"&gt;redirected to the Department of Electronics and Information Technology&lt;/a&gt;. But on May 23, 2013 &lt;/span&gt;&lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/response-from-ministry-of-home-affairs.pdf" class="internal-link"&gt;Rakesh Mittal of the Ministry of Home Affairs responded in brief and directed us to the 2007 Amendment to the 1885 Indian Telegraph Act&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Referring to rule 419-A of the amendment and the Ministry of Home Affairs website, we find that within central government the power to order communications surveillance is normally reserved for Union Home Secretary, a position held by Shir Anil Goswami as of June 30, 2013 (previously R.K. Singh). The amendment goes on to say,  “In unavoidable circumstances,” however, such an order can be commanded by a Joint Secretary who has been authorized by Union Home Secretary Goswami. On the federal level, the Ministry of Home Affairs includes nearly 20 such Joint Secretaries able to be authorized for making interception commands.&lt;/p&gt;
&lt;p&gt;A listing of the original question requests are given below:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list containing name, rank and office address of the      officers/agencies authorized by the Central Government to issue an order      for interception under section 5(2) of the Telegraph Act, 1885&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list containing name, rank and office address of the officers      authorized to issue interception orders under Rule 419A(1) of the      Telegraph Rules, 1951 in unavoidable circumstances when such orders cannot      be issued by the secretary to the Government of India, Ministry of Home      Affairs.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list containing the name, rank and office address of the      officers/agencies designated as “competent authority” in terms of the Rule      419A(1) proviso of the Telegraph Rules, 1951.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list of the agencies authorized by the Central Government to      intercept, monitor, decrypt any information generated, transmitted,      received or stored in any computer resource under section 69(1) of the      Information Technology Act, 2000.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list of the agencies authorized by the Central Government to      monitor and collect traffic data or information generated, transmitted,      received or stored in any computer resource under section 69-B of the      Information Technology Act, 2000.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list containing name, rank and office address of the      officers/agencies authorized to issue interception orders under Rule 3,      first proviso, of the Information Technology (Procedure and Safeguards for      Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please provide a list of the agencies authorised to intercept, monitor, decrypt any information generated, transmitted, received or stored in any computer resource under Rule 4 of the Information Technology (Procedure and Safeguards for Interception, Monitoring, and Decryption of Information) Rules, 2009.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india'&gt;https://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T05:23:54Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril">
    <title>India:Privacy in Peril</title>
    <link>https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril</link>
    <description>
        &lt;b&gt;The danger of mass surveillance in India is for real. The absence of a regulating law is damning for Indians who want to protect their privacy against the juggernaut of state and private surveillance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was originally &lt;a class="external-link" href="http://www.frontline.in/cover-story/india-privacy-in-peril/article4849211.ece"&gt;published in the Frontline&lt;/a&gt; on July 12, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;At the concluding scene of his latest movie, Superman disdainfully flings a  surveillance drone down to earth in front of a horrified general. “You  can’t control me,” he tells his military minder. “You can’t find out  where I hang up my cape.” This exchange goes to the crux of  surveillance: control. Surveillance is the means by which nation-states  exercise control over people. If the logical basis of the nation-state  is the establishment and maintenance of homogeneity, it is necessary to  detect and interdict dissent before it threatens the boundedness and  continuity of the national imagination. This imagination often cannot  encompass diversity, so it constructs categories of others that include  dissenters and outsiders. Admittedly, this happens less in India because  the foundation of the Indian nation-state imagined a diverse society  expressing a plurality of ideas in a variety of languages secured by a  syncretic and democratic government that protected individual freedoms.  Unfortunately, this vision is still to be realised, and the foundational  idea of India continues to be challenged by poor governance, poverty,  insurgencies and rebellion. Consequently, surveillance is, for the  modern nation-state, a &lt;i&gt;condicio sine qua non&lt;/i&gt;—an essential element  without which it will eventually cease to exist. The challenge for  democratic nation-states is to find the optimal balance between  surveillance and the duty to protect the freedoms of its citizens.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;History of wiretaps&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some countries, such as the United States, have assembled a vast  apparatus of surveillance to monitor the activities of their citizens  and foreigners. Let us review the recent controversy revealed by the  whistle-blower Edward Snowden. In 1967, the U.S. Supreme Court ruled in &lt;i&gt;Katz vs United States&lt;/i&gt; that wiretaps had to be warranted, judicially sanctioned and supported  by probable cause. This resulted in the passage of the Wiretap Act of  1968 that regulated domestic surveillance. Following revelations that  Washington was engaging in unrestricted foreign surveillance in the  context of the Vietnam war and anti-war protests, the U.S. Congress  enacted the Foreign Intelligence Surveillance Act (FISA) in 1978. FISA  gave the U.S. government the power to conduct, without judicial  sanction, surveillance for foreign intelligence information; and, with  judicial sanction from a secret FISA court, surveillance of anybody if  the ultimate target was a foreign power. Paradoxically, even a U.S.  citizen could be a foreign power in certain circumstances. Domestically,  FISA enabled secret warrants for specific items of information such as  library book borrowers and car rentals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the 9/11 World Trade Centre attacks, Congress enacted the Patriot Act of 2001, Section 215 of which dramatically expanded the scope of FISA to allow secret warrants to conduct surveillance in respect of “any tangible thing” that was relevant to a national security investigation. In exercise of this power, a secret FISA court issued secret warrants ordering a number of U.S. companies to share, in real time, voice and data traffic with the National Security Agency (NSA). We may never know the full scope of the NSA’s surveillance, but we know this: (a) Verizon Communications, a telecommunications major, was ordered to provide metadata for all telephone calls within and without the U.S.; (b) the NSA runs a clandestine programme called PRISM that accesses Internet traffic, such as e-mails, web searches, forum comments and blogs, in real time; and (c) the NSA manages a comprehensive data analysis system called Boundless Informant that intercepts and analyses voice and data traffic around the world and subjects them to automated pattern recognition. The documents leaked by Snowden allege that Google, Facebook, Apple, Dropbox, Microsoft and Yahoo! participate in PRISM, but these companies have denied their involvement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India fifth-most monitored&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;How does this affect India? The Snowden documents reveal that India is the NSA’s fifth-most monitored country after Iran, Pakistan, Jordan and Egypt. Interestingly, China is monitored less than India. Several billion pieces of data from India, such as e-mails and telephone metadata, were intercepted and monitored by the NSA. For Indians, it is not inconceivable that our e-mails, should they be sent using Gmail, Yahoo! Mail or Hotmail, or our documents, should we be subscribing to Dropbox, or our Facebook posts, are being accessed and read by the NSA. Incredibly, most Indian governmental communication, including that of Ministers and senior civil servants, use private U.S. e-mail services. We no longer enjoy privacy online. The question of suspicious activity, irrespective of the rubric under which suspicion is measured, is moot. Any use of U.S. service providers is potentially compromised since U.S. law permits intrusive dragnet surveillance against foreigners. This clearly reveals a dichotomy in U.S. constitutional law: the Fourth Amendment’s guarantees of privacy, repeatedly upheld by U.S. courts, protect U.S. citizens to a far greater extent than they do foreigners. It is natural for a nation-state to privilege the rights of its citizens over others. As Indians, therefore, we must clearly look out for ourselves.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy and personal liberty&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, India does not have a persuasive jurisprudence of privacy protection. In the Kharak Singh (1964) and Gobind (1975) cases, the Supreme Court of India considered the question of privacy from physical surveillance by the police in and around homes of suspects. In the latter case, the court found that some of the Fundamental Rights “could be described as contributing to the right to privacy”, which was subject to a compelling public interest. This insipid inference held the field until 1994 when, in the Rajagopal (“Auto Shankar”, 1994) case, the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty recognised by Article 21 of the Constitution. However, Rajagopal dealt specifically with the publication of an autobiography, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the People’s Union for Civil Liberties (PUCL) case. While finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards which continue to be routinely ignored. A more robust statement of the right to privacy was made by the Delhi High Court in the Naz Foundation case (2011) that decriminalised consensual homosexual acts; however, there is an appeal against the judgment in the Supreme Court.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Legislative silence&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Judicial vagueness has been compounded by legislative silence. India does not have a law to operationalise a right to privacy. Consequently, a multitude of laws permit daily infractions of privacy. These infractions have survived because they are diverse, dissipated and quite disorganised. However, the technocratic impulse to centralise and consolidate surveillance and data collection has, in recent years, alarmed many citizens. The state hopes to, through enterprises such as the Central Monitoring System (CMS), the Crime and Criminals Tracking Network and System (CCTNS), the National Intelligence Grid (NATGRID), the Telephone Call Interception System (TCIS) and the Unique Identification Number (UID), replicate the U.S. successes in surveillance and monitoring and profiling all its citizens. However, unlike the U.S., India proposes to achieve this without an enabling law. Let us consider the CMS. No documents have been made available that indicate the scope and size of the CMS.&lt;br /&gt;&lt;br /&gt;From a variety of police tenders for private equipment, it appears that the Central government hopes to put in place a system that will intercept, in real time, all voice and data traffic originating or terminating in India or being carried by Indian service providers. This data will be subject to pattern recognition and other automated tests to detect emotional markers, such as hate, compassion or intent. The sheer scale of this enterprise is intimidating; all communications in India’s many languages will be subject to interception and testing designed to detect different forms of dissent. This mammoth exercise in monitoring is taking place—it is understood that some components of the CMS are already operational—without statutory sanction. No credible authorities exist to supervise this exercise, no avenues for redress have been identified and no consequences have been laid down for abuse.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Statutory Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a recent interview, Milind Deora, Minister of State for Communications and Information Technology, dismissed public scepticism of the CMS saying that direct state access to private communications was better for privacy since it reduced dependence on the interception abilities of private service providers. This circular argument is both disingenuous and incorrect. No doubt, trusting private persons with the power to intercept and store the private data of citizens is flawed. The leaking of the Niira Radia tapes, which contain the private communications of Niira Radia taped on the orders of the Income Tax Department, testifies to this flaw. However, bypassing private players to enable direct state access to private communications will preclude leaks and, thereby, remove from public knowledge the fact of surveillance. This messy situation may be obviated by a regime of statutory regulation of warranted surveillance by an independent and impartial authority. This system is favoured by liberal democracies around the world but conspicuously resisted by the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of privacy legislation was recently considered by a committee chaired by Justice Ajit Prakash Shah, a former judge of the Delhi High Court who sat on the Bench that delivered the Naz Foundation judgment. The Shah Committee was constituted by the Planning Commission for a different reason: the need to protect personal data that are outsourced to India for processing. The lack of credible privacy law, it is foreseen, will result in European and other foreign personal data being sent to other attractive processing destinations, such as Vietnam, Israel or the Philippines, resulting in the decline of India’s outsourcing industry. However, the Shah Committee also noted the absence of law sufficient to protect against surveillance abuses. Most importantly, the Shah Committee formulated nine national privacy principles to inform any future privacy legislation (see story on page 26). In 2011, the Department of Personnel and Training (DoPT) of the Ministry of Human Resource Development, the same Ministry entrusted with implementing the Right to Information Act, 2005, leaked a draft privacy Bill, marked ‘Secret’, on the Internet. The DoPT Bill received substantive criticism from the Attorney General and some government Secretaries for the clumsy drafting. A new version of the DoPT Bill is reported to have been drafted and sent to the Ministry of Law for consideration. This revised Bill, which presumably contains chapters to regulate surveillance, including the interception of communications, has not been made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for privacy legislation cannot be overstated. The Snowden affair reveals the extent of possible state surveillance of private communications. For Indians who must now explore ways to protect their privacy against the juggernaut of state and private surveillance, the absence of regulatory law is damning. Permitting, through public inaction, unwarranted and non-targetted dragnet surveillance by the Indian state without reasonable cause would be an act of surrender of far-reaching implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information, they say, is power. Allowing governments to exercise this power over us without thought for the rule of law constitutes the ultimate submission possible in a democratic nation-state. And, since superheroes are escapist fantasies, without the prospect of good laws we will all be subordinate to a new national imagination of control and monitoring, surveillance and profiling. If allowed to come to pass, this will be a betrayal of the foundational idea of India as a free and democratic republic tolerant of dissent.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;i&gt;Bhairav Acharya is a constitutional lawyer practising in the Supreme Court of India. He advises the Centre for Internet &amp;amp; Society, Bangalore, on privacy law and other constitutional issues&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril'&gt;https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T09:56:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter">
    <title>CIS Cybersecurity Series (Part 5) - Amelia Andersdotter</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter</link>
    <description>
        &lt;b&gt;CIS interviews Amelia Andersdotter, member of the European parliament, as part of the Cybersecurity Series&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;"Normally a good security policy will also provide privacy to the citizen that is encompassed by the security policy. So things like encryption, for instance, bring a more secure communication, more private communication, where you are able to interact with other people on equal terms and you don't have to fear outside interference. And that is obviously good for both the individual and for security. But then of course, security policies can be framed in different ways. It depends on who you are trying to protect with the security policy. Are you trying to create a secure situation for a copyright holder, or are you trying to create a secure situation for a law enforcement officer, or for a private citizen?" - Amelia Andersdotter, member of European parliament.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its fifth installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;Amelia Andersdotter is a Member of the European Parliament for the Pirate Party in Sweden. She works with industrial policy in the parliamentary committee of Industry, Research and Energy and is a substitute member of the committees for international trade, INTA, and budget control, CONT. Amelia is the Patron of the European Parliament Free Software User Group (EPFSUG), and also works in the delegations for the Andean community and Korean peninsula.&lt;/p&gt;
&lt;p&gt;Amelia's website is: http://ameliaandersdotter.eu/&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/RPh7RF2dkcw" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-08-01T09:54:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin">
    <title>CIS Cybersecurity Series (Part 3) - Eva Galperin</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin</link>
    <description>
        &lt;b&gt;CIS interviews Eva Galperin, Global Policy Analyst at the Electronic Frontier Foundation (EFF).&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;"It is a vital tool for speaking truth to power. Unless you are able to speak anonymously, you are not really free to espouse unpopular ideas to people who have the power to do bad things to do... I think the value of anonymous speech vastly outweighs the difficulties that you can sometimes get into because people can speak anonymously. And on the whole, I think anonymity is worth protecting." - Eva Galperin, Global Policy Analyst at EFF. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its third installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS speaks to Eva Galperin, the Global Policy Analyst at the Electronic Frontier Foundation (EFF).She has worked for the EFF in various capacities for the last five years, applying the combination of her political science and technical background to organizing activism campaigns, and doing education and outreach on intellectual property, privacy, and security issues.&lt;/p&gt;
&lt;p&gt;EFF homepage: &lt;a href="https://www.eff.org/"&gt;https://www.eff.org/&lt;/a&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/BLtiuVX0nEM" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-08-01T09:55:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance">
    <title>The Difficult Balance of Transparent Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance</link>
    <description>
        &lt;b&gt;Is it too much to ask for transparency in data surveillance? On occasion, companies like Microsoft, Facebook, and the other silicon valley giants would say no. When customers join these services, each company provides their own privacy statement which assures customers of the safety and transparency that accompanies their personal data.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Google even publishes annual “Transparency Reports” which detail the data movement behind the scenes. Governments, too, are somewhat open about surveillance methods, for example with the public knowledge of the existence and role of institutions like America’s NSA and India’s CMS. These façades of assurance, however, never satisfy the public enough to protect them from feeling cheated and deceived when information leaks about surveillance practices. And in the face of controversy around surveillance, both service providers and governments scramble to provide explanations for discrepancies between their promises and their practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So it seems that transparency might not be too much to ask, but instead is perhaps more complicated of a request than imagined. For some citizens, nothing would be more satisfying than complete transparency on all data collection. For those who recognize surveillance as crucial for national security, however, complete transparency would mean undermining the very efficacy of surveillance practices. And data companies often find themselves caught between these two ends, simultaneously seeking profits by catering to the public, while also trying to abide by political and legal frameworks. Therefore, in the process of modern data surveillance, each attempt at resolution of the transparency issue will become a delicate balance between three actors: the government, the big data companies, and the people. As rightly stated on the Digital Due Process website, rules for surveillance must carefully consider “the individual’s constitutional right to privacy, the government’s need for tools to conduct investigations, and the interest of service providers in clarity and customer trust.”&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So we must unpack the idea of transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, there should be a distinction made between proactive transparency and reactive transparency, or, the announcement of surveillance practices versus the later access to surveillance records. The former is more risky and therefore more difficult to entertain, while the latter may lack any real substance beyond satisfying inquiries. Also consider the discrepancy in motivation for transparency between the actors. For the citizen, is transparency really an end goal, or is it only a stepping stone in the argument for eradication of surveillance practices in the name of rights to privacy? Here, we ascertain the true value of total transparency; will it ever please citizens to learn of a government’s most recent undermining of the private sphere?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reactive transparency has been achieved only in recent years in India, during a number of well publicized legal cases. In one of the earliest cases of reactive transparency, Reliance Communications made an affidavit in the Supreme Court over the exact number of surveillance directives given by the government. It was released that 151,000 Reliance accounts were monitored for a project between 2006 and 2010, with 3,588 tapped phones just from the Delhi region alone in 2005.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But also there has been controversy over the extent of reactive transparency, because it has been especially problematic to discern the point where transparency once again encroaches on privacy, both for government and the people’s sake. After gathering the data, its release could further jeopardize the citizens and the government. It is important to carefully consider the productive extent of reactive transparency: What will become of the information? Will one publicly reveal how many people were spied on? Who was spied on? What was found when through spying? Citizens must take all of this into consideration when requesting transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, service providers embrace transparency when it can benefit their corporation, or as a recent Facebook statement explained, “we’ve been in discussions with U.S. national security authorities urging them to allow more transparency, &lt;i&gt;so that our users around the world can understand how infrequently we are asked to provide user data on national security grounds&lt;/i&gt;.” &lt;a href="#fna" name="fra"&gt;[a]&lt;/a&gt; Many of the service providers mentioned in the recently leaked PRISM report have made well-publicized requests to the U.S. government for more transparency.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not only have they allegedly written requests to the government to allow them to disclose information, but the companies (including Facebook &lt;a href="#fna" name="fra"&gt;[a]&lt;/a&gt;, Apple &lt;a href="#fnb" name="frb"&gt;[b]&lt;/a&gt;, Microsoft&lt;a href="#fnc" name="frc"&gt;[c]&lt;/a&gt;, and Google &lt;a href="#fnd" name="frd"&gt;[d]&lt;/a&gt;) have all released explanatory statements in the wake of the June 2013 PRISM scandal. Although service providers claim that the request to release data about their cooperation is in the ‘interest of transparency,’ it instead seems that the motivation for this transparency is to ease consumers’ concerns and help the companies save face. The companies (and the government) will admit their participation in surveillance once it has become impossible to deny their association with the programs. This shrewd aspect of transparency can be seen most clearly in statements like those from Microsoft, who included in their statement on June 14&lt;sup&gt;th&lt;/sup&gt;, “We have not received any national security orders &lt;i&gt;of the type that Verizon was reported to have received&lt;/i&gt;.” &lt;a href="#fnc" name="frc"&gt;[c]&lt;/a&gt; Spontaneous allusions like this are meant to contrast guilt-conscious service providers favorably to telecom service providers such as AT&amp;amp;T and Verizon, who allegedly yielded the most communications data and who as of now have yet to release defensive public statements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, we find ourselves in a situation where entities admit to their collusion in snooping only once information has leaked, indignation has ignited, and scandal has erupted. A half-hearted proactive transparency leads to an outrage demanding reactive semi-transparency. These weak forms of transparency neither satisfy the public, nor allow governments and service providers to maintain dignity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But now is also a crucial moment for possible reevaluation and reformation of this system, especially in India. Not only is India enacting its own national security surveillance system, the CMS&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; but the recent NSA and PRISM revelations are still sending shockwaves throughout the world of cyber security and surveillance. Last week, a Public Interest Litigation (PIL) was sent to the Indian Supreme Court, arguing that nine foreign service providers (Facebook, Hotmail, Yahoo!, Google, Apple, Skype, Paltalk, AOL, YouTube) violated the trust and privacy of their Indian customers through their collusion with the US government’s surveillance programs.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among other things, the PIL emphatically sought prosecution of the mentioned corporations, demands for the service providers to establish servers in India, and also sought stricter rules to prevent Indian officials from using these foreign services for work involving national security. Ultimately, the PIL was rejected by the Supreme Court; although the PIL stated the grounds of Rule 6 of the Information Technology Rules 2011 for the guidelines in protecting sensitive Indian citizen information, the SC saw the PIL as addressing problems outside of SC jurisdiction, and was quoted as saying “we cannot entertain the &lt;a href="https://cis-india.org/internet-governance/blog/pil.pdf" class="internal-link"&gt;petition&lt;/a&gt; as an Indian agency is not involved.”&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The SC considered the PIL only partially, however, as certain significant parts of the petition were indeed within Indian domestic agency, for example the urge to prohibit federal officials from using the private email services such as Gmail, Hotmail, and Yahoo. And although the SC is not the correct place to push for new safeguard legislation, the ideas of the PIL are not invalid, as Indian leaders have long searched for ways of ensuring basic Indian privacy laws in the context of international service providers. This is also not a problem distinctive to India. International service providers have entered into agreements regarding the same problems of incorporating international customers’ rights, formal agreements which India could emulate if it wanted to demand greater privacy or transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, there is the Safe Harbor Framework, an institution in place to protect and mediate European Union citizens’ privacy rights within the servers of foreign (i.e. American) Internet companies. These regulations were established in 2000, and serve the purpose of adjusting foreign companies’ standards to incorporate E.U. privacy laws. In accordance with the agreement, E.U. data is only allowed to be sent to outside providers who maintain the seven Safe Harbor principles, several of which focus on transparency of data usage.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;India could enact a system similar to this, and it would likely alleviate some of the concerns raised in the most recent PIL. These frameworks, however, have not proven completely reliable safeguards either, especially when the service providers’ own government uses national security as a means to override the agreement. Although the U.S. government has yet to fully confirm or deny many of the NSA and PRISM allegations in regards to Europe, there is currently strong room to believe that the surveillance practices may have violated the Safe Harbor agreements by delivering sensitive E.U. citizen data to the U.S. government.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; It is uncertain how these revelations will impact the agreements made between the big Silicon-Valley companies and their E.U. customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recent PIL also strongly suggested establishing domestic data servers to keep Indian citizens’ information within the country and under the direct supervision of Indian entities. It strongly pushes for self-reliance as the best way to ensure both citizen and national security. The PIL assumes that domestic servers will not only offer better information protection, but also create much needed jobs and raise national tax revenue.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; If allegations about PRISM and the E.U. prove true, then the E.U. may also decide to support establishment of European servers as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several of the ideas outlined in the PIL have merit, but may not be as productive as the requesters assume. It is true that establishing servers and domestic regulators in India may temporarily protect from unwanted foreign, i.e. American, surveillance. But at the same time, this also increases likelihood of India’s own central government taking a stronger surveillance stance, more stringently monitoring their own servers and databases. It has not yet been described how the CMS will be operate its surveillance methods, but moving data to domestic servers may just result in shifting power from NSA to CMS. Rather than more privacy or transparency, the situation could easily become a matter of &lt;i&gt;who&lt;/i&gt; citizens prefer spying over them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if one government establishes rules which enforce transparency, this may clash with the laws of the service providers’ domestic government, i.e. confidentiality in surveillance. Considering all of this, rejection of foreign service providers and promotion of domestic self reliance may ultimately prove the most effective alternative for nations which are growing rapidly in both internet presence and internet consciousness. But that does not make this option the easiest. Facing the revelations and disillusionment of domestic (CMS) and international (PRISM) surveillance methods, countries like India are reaching an impeding critical juncture. Now is the most important time to establish new norms, while public sentiment is at its highest and transition is most possible, not only creating new laws which can safeguard privacy, but also strongly considering alternatives to foreign service providers like those outlined in June’s PIL. Privacy International’s guiding principles of communications surveillance also offer useful advice, urging for the establishment of oversight institutions which can access surveillance records and periodically publish aggregate data on surveillance methods.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Although the balance between security on the national level and security on the personal level will continue to be problematic for nations in the upcoming years, and even though service providers’ positions on surveillance usually seem contrived, Microsoft Vice President John Frank made a statement which deserves appreciation, rightly saying, “Transparency alone may not be enough to restore public confidence, but it’s a great place to start.”&lt;a href="#fnc" name="frc"&gt;[c]&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a href="http://digitaldueprocess.org/"&gt;http://digitaldueprocess.org/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/151Ue1H"&gt;http://bit.ly/151Ue1H&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/12XDb1Z"&gt;http://bit.ly/12XDb1Z&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;a class="external-link" href="http://ti.me/11Xh08V"&gt;http://ti.me/11Xh08V&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;a href="https://cis-india.org/internet-governance/blog/pil.pdf" class="internal-link"&gt;Copy of 2013 PIL to Supreme Court, Prof. S.N. Singh&lt;/a&gt; [attached]&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/1aXWdbU"&gt;http://bit.ly/1aXWdbU&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;a class="external-link" href="http://1.usa.gov/qafcXe"&gt;http://1.usa.gov/qafcXe&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/114hcCX"&gt;http://bit.ly/114hcCX&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/156wspI"&gt;http://bit.ly/156wspI&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fra" name="fna"&gt;a&lt;/a&gt;]. &lt;b&gt;Facebook Statement&lt;/b&gt;: &lt;a class="external-link" href="http://bit.ly/ZQDcn6"&gt;http://bit.ly/ZQDcn6&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#frb" name="fnb"&gt;b&lt;/a&gt;]. &lt;b&gt;Apple Statement&lt;/b&gt;: &lt;a class="external-link" href="http://bit.ly/1akaBuN"&gt;http://bit.ly/1akaBuN&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#frc" name="fnc"&gt;c&lt;/a&gt;]. &lt;b&gt;Microsoft Statement&lt;/b&gt;:&lt;a class="external-link" href="http://bit.ly/1bFIt31"&gt;http://bit.ly/1bFIt31&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#frd" name="fnd"&gt;d&lt;/a&gt;]. &lt;b&gt;Google Statement&lt;/b&gt;: &lt;a class="external-link" href="http://bit.ly/16QlaqB"&gt;http://bit.ly/16QlaqB&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance'&gt;https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>kovey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T04:23:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography">
    <title>dna exclusive: Geeks have a solution to digital surveillance in India: Cryptography</title>
    <link>https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography</link>
    <description>
        &lt;b&gt;While you were thinking of what next to post on Twitter, the government has stealthily put an ambitious surveillance programme in place that tracks your every move in the digital world — through voice calls, SMS and MMS, GPRS, fax communications on landlines, video calls and emails.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Joanna Lobo was &lt;a class="external-link" href="http://www.dnaindia.com/scitech/1857945/report-dna-exclusive-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography"&gt;published in DNA&lt;/a&gt; on July 7, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The programme, conceived in 2011, has now been brought under one umbrella referred to as the centralised monitoring system (CMS). It is the death of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But as concerned citizens argue for the need to formulate policies and laws to protect privacy, there's a simpler solution in sight for now: a CryptoParty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At this 'party', an informal gathering of people, non-geeks can learn how to legally encrypt their digital communications and how to store data without the fear of anyone snooping in. Encryption is a process of encoding messages so that it can only be read by authorised parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is it?&lt;/b&gt;&lt;br /&gt; "A CryptoParty educates people in the domain of cryptography. It's  usually about the basics: how to send encrypted email, how to protect  your hardware and how to use free and open source software," says  Satyakam Goswami, a free software consultant associated with the  Software Freedom Law Centre (SFLC), Delhi (remove this). Goswami was one  of the 72 participants at the CryptoParty organised on Saturday at  Institute of Informatics &amp;amp; Communication (IIC), Delhi University  South Campus  	On June 30, a CryptoParty organised at the Centre for Internet and  Society (CIS) in Bangalore had 30 people in attendance. "We were taught  about the what, how and who is watching us. We were also taught how to  encrypt emails, chat, video calls or instant messaging,” says Siddhart  Prakash Rao, a computer science graduate and a free software and open  source enthusiast who is about to pursue a Masters in Cryptography.&lt;br /&gt; &lt;br /&gt; The topics may be a mouthful for non-geeks but CryptoParty advocates  maintain that all this is taught in the simplest way possible. The  choice of subject depends on the composition of the group — if it is a  gathering of geeks, like at the Bangalore event, then the topics are  more technical.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How can it help?&lt;/b&gt;&lt;br /&gt; CryptoParties started in August 2012 by an Australian woman (who goes  by the pseudonym Asher Wolf) after a conversation on Twitter about The  Australian Parliament's new cybercrime bill that allowed law enforcement  to ask Internet Service Providers to monitor and store data. &lt;br /&gt; Attending a CryptoParty is a good way to learn how to overcome government snooping legally.&lt;br /&gt; &lt;br /&gt; “Citizens should use encryption to safeguard their private  communications against both corporations and the government. Encryption  is one of the best ways to react to CMS along with increased civic  vigilance and democratic questioning of our government and  parliamentarians,” says Pranesh Prakash, policy director, CIS, and one  of the frontrunners in the fight to formulate a policy to safeguard  privacy in India.&lt;br /&gt; &lt;br /&gt; "In India, people tend to be rather ignorant. They are not aware of the  kind of surveillance they are subjected to once online. It's a lack of  understanding," says Sumandro Chattapadhyay, a researcher with Sarai, a  programme of the Centre for the Study of Developing Societies, Delhi.&lt;br /&gt; &lt;br /&gt; Bernadette Langle, who also works at CIS has been instrumental in  organising the handful of CryptoParties in the country. When dna spoke  to her, she was on her way to Delhi after participating in the Bangalore  event. Langle will also be part of a CryptoParty being planned for  October in Mumbai. "Ten years ago, you had to be a geek to be able to  encrypt and protect yourself online. Now, you need software and it's  much easier," she says.&lt;br /&gt; &lt;br /&gt; The advantage is that the privacy tactics taught at such parties is  completely legal. All knowledge is in the public domain. “A government  will only deny its citizens basic communications privacy if it is  authoritarian,” says Pranesh. “So while it can try social engineering  and other means to gain access to what you've encrypted, it simply  cannot 'decode' it as long as you have chosen a strong pass phrase and  keep that protected, or they create quantum computers capable of  breaking your encryption.”&lt;br /&gt; &lt;br /&gt; The CIS is currently working on revisions of the Privacy (Protection)  Bill 2013 with the objective of contributing to privacy legislation in  India. Till that bill becomes an Act and till there's a better way to  overcome needless government surveillance, attending a CryptoParty could  possibly be the wisest solution for those concerned about privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(For more details on CryptoParties, visit www.cryptoparty.in)&lt;br /&gt; &lt;br /&gt; &lt;b&gt;How to encrypt:&lt;/b&gt;&lt;br /&gt; SMS: Make content secure by using software like TextSecure (Android) or  CryptoSMS (Symbian). However, SMS metadata (who you are sending the  message to and at what time) can still be tracked.&lt;br /&gt; &lt;br /&gt; Instead of Whatsapp, install Jabbir and add off the record encryption.&lt;br /&gt; &lt;br /&gt; For email, you can use OpenPGP in conjunction with Thunderbird to  encrypt mails you send from Gmail/Yahoo Mail/Live Mail accounts so that  even Google, Yahoo and Microsoft can't read them&lt;br /&gt; &lt;br /&gt; For web browsing, use a VPN (which will hide your traffic from your  ISP), or Tor (which will help anonymise your traffic, but will slow down  your connection slower).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography'&gt;https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T06:24:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis">
    <title>Biometrics or bust? India's Identity Crisis</title>
    <link>https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis</link>
    <description>
        &lt;b&gt;Malavika Jayaram is speaking at an event organized by the Oxford Internet Institute on July 2, 2013. The talk will be held at Oxford Internet Institute, University of Oxford, 1 St Giles Oxford OX1 3JS.&lt;/b&gt;
        &lt;hr /&gt;
&lt;div class="story" style="text-align: justify; "&gt;
&lt;p&gt;This info was &lt;a class="external-link" href="http://www.oii.ox.ac.uk/events/?id=602"&gt;published on the Oxford Internet Institute website&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;India's mammoth biometric ID project, which has  registered around 270 million people and is yet to be fully realized, is  already the worldís largest such endeavor. It is marketed as a  potential game-changer both domestically (where it is touted as a silver  bullet to solve most problems) and internationally (where countries  wait and watch this experiment before importing it into their own  jurisdictions). Alongside all the hype about the scale of the scheme,  its potential for transforming the delivery of services and the scope  for private participation in traditionally state-controlled functions,  there are fears of function creep, of subversion to create new types of  fraud and corruption, of increased profiling and targeting, and of a  citizenry becoming transparent to its government in an unprecedented  way, all in the name of ambiguous benefits and the rhetoric of  inclusion.&lt;/p&gt;
&lt;p&gt;The government praises the ease and efficiency of  centralized databases, the promise of technology (including the myth of  biometrics uniquely and unambiguously identifying people in a foolproof  way) and the construction of the identified self. However, there is  growing awareness of the dangers of joined-up databases resulting in  exclusion rather than inclusion, and persecution rather than  democratization.&lt;/p&gt;
&lt;p&gt;The scheme is technically voluntary, but with the  provision of benefits, goods and services being increasingly linked to  the scheme, it will soon become impossible to function in India without a  biometric ID. If every facet of everyday life is linked to this single  number, it renders all claims of voluntariness meaningless. The lack of  information self-determination in a biometrically mediated universe has  important ramifications for anonymity, free speech and the maintenance  of an essential private sphere.&lt;/p&gt;
&lt;p&gt;In this talk, Malavika will  provide an overview of the scheme as well as the debate around privacy  and autonomy that it has triggered, framed against the backdrop of a  larger civil liberties crisis. She will also describe Indiaís efforts to  craft new privacy and data protection legislation.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis'&gt;https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T09:49:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop">
    <title>Concerns over central snoop</title>
    <link>https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop</link>
    <description>
        &lt;b&gt;Eyebrows have been raised at the Centre’s single-window system to intercept phone calls and internet exchanges — the desi version of the US’s surveillance programme, PRISM — that is expected to roll out this year-end.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Aloke Tikku was &lt;a class="external-link" href="http://www.hindustantimes.com/India-news/NewDelhi/Concerns-over-central-snoop/Article1-1083658.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on June 28, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;span class="WebRupee"&gt; Rs. &lt;/span&gt;400-crore project — tentatively  called the Central Monitoring System (CMS) — will not only allow the  government to listen to a target’s phone conversation but also track  down a caller’s precise location, match his voice against known  suspects’ before the call is completed and see what people have been up  to on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And then, it can also use analytics to discover possible links — between  suspected terrorists, criminals or just about anybody — from the  internet and phone data. All this will be done from one place without  keeping the internet or phone service provider in the loop — something  the telecom and home ministries insist will enhance citizens’ privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both ministries also insist that the CMS won’t change the rules of the  game. “The process to seek authorisation for interception will not be  diluted,” a home ministry official promised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So is everything hunky dory?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hardly. But technology — in this case, the CMS — is a smaller part of the problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bigger chunk is the process of approving “lawful interception” orders and the lack of transparency around it.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;It was in December 1996 that the Supreme Court held that the State could  spy on its citizens in extraordinary circumstances but, as an interim  measure, made it mandatory for the home secretary to approve each and  every such request.&lt;/p&gt;
&lt;p&gt;Telecom minister Kapil Sibal, who appeared in this case in the  mid-1990s, convinced the court that it didn’t have the powers to order  that a judge decide each phone-tapping case. Instead, Sibal suggested  that this power remain with the executive on lines of the law in the UK.&lt;/p&gt;
&lt;p&gt;A former home secretary, however, conceded that they hardly have the time to apply their mind before signing a wiretap order.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Interest.png/@@images/9beb69be-db6c-45d6-9f70-4888deef3295.png" alt="Interest of State" class="image-inline" title="Interest of State" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;That isn’t surprising. The home secretary approves around 7,500-9,000  interception orders every month. That means he or she has to sign an  average of 300 orders every day without a break.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If he were to spend just 30 seconds on each case, he would have to  keep aside four-and-a-half hours just approving interception orders  every day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An official said the ministry was considering a suggestion to pick up  a fixed number of cases at random for closer scrutiny before approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many believe this might not be enough. It is argued that the  government — which was trying to replicate surveillance technology from  the west — needs to adopt their safeguards and transparency norms too.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of the Bangalore-based Centre for  Internet and Society, said he didn’t have a problem with CMS as long as  it didn’t go for blanket surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“But there is no reason why the executive — and not a judge — should  have the powers to decide on phone-tapping requests,” he said. Or for  that matter, why shouldn’t there be an independent audit of  phone-tapping decisions, their implementation and outcome?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The aggregated data should be put in the public domain,” Abraham  said. The US has such provisions. So does Britain, which inspired Sibal  to argue for retaining interception powers with the executive in the  mid-1990s. It is time to follow-up on that model.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop'&gt;https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T09:33:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring">
    <title>Technology, Power, and Revolutions in the Arab Spring</title>
    <link>https://cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS), Bangalore cordially invites you to a talk by Prof. Ramesh Srinivasan on technology, power and revolutions in the Arab Spring. The talk will be held in CIS office on July 2, 2013 from 6.00 p.m. onwards.&lt;/b&gt;
        &lt;h2&gt;Ramesh Srinivasan&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Ramesh  Srinivasan, Associate Professor at UCLA in Design and  Media/Information  Studies, studies and participates in projects focused  on how new media  technologies impact political revolutions, economic  development and  poverty reduction, and the future of cultural heritage.  He recently  wrote &lt;a href="http://www.washingtonpost.com/national/on-innovations/london-egypt-and-the-complex-role-of-social-media/2011/08/11/gIQAIoud8I_story.html"&gt;an op/ed at the Washington Post&lt;/a&gt; explaining the complex nature of social media in revolutions and riots,   such as those in Egypt and in London, and also a column for the Post’s   Sunday Outlook section on the &lt;a href="http://www.washingtonpost.com/national/on-innovations/five-myths-about-social-media/2011/09/15/gIQAr2BwAL_allComments.html#comments"&gt;5 Myths of Social Media&lt;/a&gt;.  Additionally, he has written multiple front page articles for the Huffington Post, including a &lt;a href="http://www.huffingtonpost.com/ramesh-srinivasan/the-net-worth-of-open-net_b_823570.html"&gt;piece&lt;/a&gt; on Internet Freedom for the Huffington Post. He has had his work  featured on the front page of the UCLA and USC websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recent public  outreach has built on his response in the New Yorker  (from his blog: &lt;a href="http://rameshsrinivasan.org/"&gt;http://rameshsrinivasan.org&lt;/a&gt;)   to Malcolm Gladwell’s writings critiquing the power of social media in   impacting revolutionary movements. He has worked with bloggers,   pragmatically studying their strengths and limitations, who were   involved in recent revolutions in Egypt and Kyrgyzstan, as discussed in a   recent &lt;a href="http://www.npr.org/2011/08/12/139570720/twitter-created-echo-chamber-during-egyptian-protests"&gt;NPR interview&lt;/a&gt;.   He has also collaborated with non-literate tribal populations in India   to study how literacy emerges through uses of technology, and   traditional Native American communities to study how non-Western   understandings of the world can introduce new ways of looking at the   future of the internet. His work has impacted contemporary   understandings of media studies, anthropology and sociology, design, and   economic and political development studies. He has given several major   invited talks, including recently at LIFT in 2009 (&lt;a href="http://vimeo.com/5520100"&gt;http://vimeo.com/5520100&lt;/a&gt;).   He holds an engineering degree from Stanford, a Masters degree from  the  MIT Media Lab, and a Doctorate from Harvard University. His full   academic CV can be found at &lt;a href="http://rameshsrinivasan.org/cv"&gt;http://rameshsrinivasan.org/cv&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;a class="external-link" href="http://rameshsrinivasan.org/"&gt;See Prof. Ramesh Srinivasan's blog page&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring'&gt;https://cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-01T08:36:57Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/policies/website-use">
    <title>Terms of Website Use</title>
    <link>https://cis-india.org/about/policies/website-use</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h2&gt;Parties and Ownership&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;These Terms of Website Use (&lt;b&gt;"Terms"&lt;/b&gt;) is made between the Centre for Internet &amp;amp; Society (&lt;b&gt;"CIS"&lt;/b&gt;) and you.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In these Terms, all references to "&lt;b&gt;you&lt;/b&gt;" or "&lt;b&gt;user&lt;/b&gt;" shall mean the end-user accessing the Website, its contents and using the services offered through the Website. "&lt;b&gt;Service providers&lt;/b&gt;" mean independent third party service providers. All references to "&lt;b&gt;we&lt;/b&gt;", "&lt;b&gt;us&lt;/b&gt;" and "&lt;b&gt;our&lt;/b&gt;" shall mean CIS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The domain name www.cis-india.org ("&lt;b&gt;Website&lt;/b&gt;") is owned by CIS. CIS offers this web site, including all information, tools and services available from this site, to you, the user, conditioned upon your acceptance of all the terms, conditions, policies and notices stated here. Your use of this site indicates that you have read, acknowledged and agreed to these Terms.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Due Diligence&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;These Terms are published in compliance with Rule 3(1) of the Information Technology (Intermediaries Guidelines) Rules, 2011 notified by the Central Government in the Gazette of India Extraordinary vide Notification GSR 314(E) on 11 April 2011 ("&lt;b&gt;Intermediaries Rules&lt;/b&gt;"). These Terms constitute an electronic record for the purposes of the Information Technology Act, 2000 ("&lt;b&gt;IT Act&lt;/b&gt;").&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;You agree that you will &lt;span style="text-decoration: underline;"&gt;not&lt;/span&gt; host, display, upload, modify, publish, transmit, update or share any information that:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;belongs to another person and to which you do not have any right to;&lt;/li&gt;
&lt;li&gt;is grossly harmful, harassing, blasphemous defamatory, obscene, pornographic, paedophilic, libellous, invasive of another's privacy, hateful, racially or ethnically objectionable, disparaging, relating or encouraging money laundering or gambling, or otherwise unlawful in any manner whatever;&lt;/li&gt;
&lt;li&gt;harms minors in any way;&lt;/li&gt;
&lt;li&gt;infringes any patent, trademark, copyright or other proprietary rights;&lt;/li&gt;
&lt;li&gt;violates any law for the time being in force;&lt;/li&gt;
&lt;li&gt;deceives or misleads the addressee about the origin of such messages or communicates any information which is grossly offensive or menacing in nature;&lt;/li&gt;
&lt;li&gt;impersonates another person;&lt;/li&gt;
&lt;li&gt;contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer resource; or,&lt;/li&gt;
&lt;li&gt;threatens the unity, integrity, defence, security or sovereignty of India, friendly relations with foreign states, or public order or causes incitement to the commission of any cognisable offence or prevents investigation of any offence or is insulting to any other nation.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;You agree that in the event of any non-compliance with these Terms, we have the right to immediately terminate your access or usage rights to this Website and our services and/or remove any information that is, or is deemed by us to be, non-compliant.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Use of this Website&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Unauthorised use of this Website, any information contained therein and unauthorised entry into our systems is strictly prohibited. You may not use contact information provided on this Website for unauthorized purposes, including marketing. You may not use any hardware or software intended to damage or interfere with the proper working of this Website or to surreptitiously intercept any system, data or personal information from this Website. You agree not to interrupt or attempt to interrupt the operation of this Website in any way.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We reserve the right, in our sole discretion, to limit or terminate your access to or use of this Website at any time without notice. Termination of your access or use will not waive or affect any other right or relief to which we may be entitled at law or in equity.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;You represent and warrant that you own or otherwise control all the rights to the content you supply; that the content is accurate; that use of the content you supply does not violate any provision herein and will not cause injury to any person or entity; and that you will indemnify us for all claims resulting from content you supply.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;You shall comply, and cause compliance, with all applicable provisions of any law, statute, ordinance, order, rule, regulation, bye-law, notification, custom, circular, press note, policy or other usage or mandatory requirement having, in the territory of India, the force of law.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Information on this Website&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;We are not responsible if information made available on this Website is not accurate, complete or current. The material on this Website is provided for general information only and should not be relied upon or used as the sole basis for making decisions without consulting primary, more accurate, more complete or timelier sources of information. Any reliance on the material on this Website is at your own risk. This Website may contain information that has typographical errors or inaccuracies. This Website may contain certain historical information. Historical information is provided for your reference only. We reserve the right to modify the contents of this Website at any time, but we have no obligation to update any information on this Website. You agree that it is your responsibility to monitor changes to this Website. Your use of this Website constitutes agreement to all such changes. We may discontinue or change any product or service described or offered on this Website at any time.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Trademarks, Copyright and Other Proprietary Rights&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;You or third parties acting on your behalf are not allowed to frame this site or use our proprietary marks as meta tags, without our written consent. These marks include, but are not limited to:&lt;br /&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_logo.jpg/@@images/6aeb5910-e761-415d-9df0-efe1d60a3c94.jpeg" alt="CIS Logo" class="image-inline" title="CIS Logo" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
You may not use frames or utilize framing techniques or technology to enclose any content included on the site without our express written consent. Further, you may not utilize any site content in any meta tags or any other "hidden text" techniques or technologies without our express written consent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Trademarks, logos and service marks displayed on this site are registered and unregistered trademarks of ours and our partners, sponsors, content providers, or other third parties. All of these trademarks, logos and service marks are the property of their respective owners. Nothing on this site shall be construed as granting, by implication, estoppel, or otherwise, any license or right to use any trademark, logo or service mark displayed on the site without the owner's prior written permission, except as otherwise described herein. We reserve all rights not expressly granted in and to the site and its content.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Disclaimer of Warranties&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Your use of this Website is at your sole risk. This Website is provided on an "as is" basis. We reserve the right to restrict or terminate your access to this Website or any feature or part thereof at any time. We expressly disclaim all warranties of any kind, whether express or implied, including but not limited to the implied warranties of merchantability and fitness for a particular purpose and any warranties that materials on this Website are non-infringing, as well as warranties implied from a course of performance or course of dealing; that access to this Website will be uninterrupted or error-free; that this Website will be secure; that the site or the server that makes this Website available will be virus-free; or that information on this Website will be complete, accurate or timely. If you download any materials from this Website, you do so at your own discretion and risk. You will be solely responsible for any damage to your computer system or loss of data that results from the download of any such materials. No advice or information, whether oral or written, obtained by you from us shall create any warranty of any kind. We do not make any warranties or representations regarding the use of the materials on this Website in terms of their completeness, correctness, accuracy, adequacy, usefulness, timeliness, reliability or otherwise.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Limitation of Liability&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;You acknowledge and agree that you assume full responsibility for your use of this Website. You acknowledge and agree that any information you send or receive during your use of this Website may not be secure and may be intercepted by unauthorized parties. You acknowledge and agree that your use of this Website is at your own risk. Recognizing such, you acknowledge and agree that, to the fullest extent permitted by applicable law, neither we, our partners, sponsors or content providers will be liable for any direct, indirect, punitive, exemplary, incidental, special, consequential or other damages arising out of or in any way related to this Website, or any other site you access through a link from this Website or from any actions we take or fail to take as a result of communications you send to us, or the delay or inability to use this Website, or for any information, products or services advertised in or obtained through this Website, removal or deletion of any materials submitted or posted on this Website, or otherwise arising out of the use of this Website, whether based on contract, tort, strict liability or otherwise, even if we, our affiliates or any of our suppliers have been advised of the possibility of damages.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This disclaimer applies, without limitation, to any damages or injury arising from any failure of performance, error, omission, interruption, deletion, defects, delay in operation or transmission, computer viruses, file corruption, communication-line failure, network or system outage, your loss of profits, or theft, destruction, unauthorized access to, alteration of, loss or use of any record or data, and any other tangible or intangible loss. You specifically acknowledge and agree that neither we nor our suppliers shall be liable for any defamatory, offensive or illegal conduct of any user of this Website. Your sole and exclusive remedy for any of the above claims or any dispute with us is to discontinue your use of this Website. Subject to the terms of the Limitation Act, 1963, you agree that any cause of action arising out of or related to the site must commence within one (1) year after the cause of action accrues otherwise the cause of action is permanently barred.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Indemnification&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;You agree to indemnify us, defend us and hold us harmless, including our affiliates and our officers, members, directors, employees, consultants, contractors, agents, licensors, service providers, subcontractors and suppliers from and against any and all losses, liabilities, expenses, damages and costs, including reasonable attorneys' fees and court costs, arising or resulting from your use of this Website and any violation of these Terms. If you cause a technical disruption to this Website or the systems transmitting this Website to you or others, you agree to be responsible for any and all losses, liabilities, expenses, damages and costs, including reasonable attorneys' fees and court costs, arising or resulting from that disruption. We reserve the right to assume exclusive defence and control of any matter otherwise subject to indemnification by you and, in such an event, you agree to cooperate with us in the defence of such matter.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Governing Law, Jurisdiction and Definitive Agreement&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;This Website is controlled, operated and administered within India. We do not make any representation that materials on this Website are appropriate or available for use at other locations outside India and access to them from territories where their contents are illegal is prohibited. You may not use this Website in violation of Indian laws. If you access this Website from locations outside India, you are responsible for compliance with all local laws. These Terms shall be governed by the laws of India, without giving effect to its conflict of laws provisions. You agree that the courts at Bangalore shall have exclusive jurisdiction to settle any dispute or claim that arises out of or in connection with your use of this Website and these Terms.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;These Terms constitute the entire and definitive agreement between you and us with respect to your use of this Website. If for any reason a court of competent jurisdiction finds any provision of these Terms, or portion thereof, to be unenforceable, that provision shall be enforced to the maximum extent permissible so as to give effect to the intent of these Terms, and the remainder of these Terms shall continue in full force and effect.&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;div id="_mcePaste"&gt;﻿&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/policies/website-use'&gt;https://cis-india.org/about/policies/website-use&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-01T07:16:15Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/policies/privacy-policy">
    <title>Privacy Policy</title>
    <link>https://cis-india.org/about/policies/privacy-policy</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h2&gt;Preliminary&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;This Privacy Policy ("Policy") states the internal policy of the Centre for Internet &amp;amp; Society ("CIS") with regard to the collection, storage, security, processing and disclosure of personal data.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This Policy constitutes compliance with the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 313(E) on 11 April 2011.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Collection of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;CIS will not collect any personal data that is not necessary for the achievement of a purpose that is connected to a stated CIS function.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS will not collect any personal data without obtaining the prior consent of the person to whom it pertains. CIS may obtain such consent in any manner, and through any medium, but will not employ threats, duress or coercion to obtain such consent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Personal data collected in respect of a grant of consent by the person to whom it pertains will, if that consent is subsequently withdrawn for any reason, be destroyed or anonymised.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Storage of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;CIS will not store any personal data for a period longer than is necessary to achieve the purpose for which it was collected, or, if that purpose is achieved or ceases to exist for any reason, for any period following such achievement or cessation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Any personal data collected in relation to the achievement of a purpose will, if that purpose is achieved or ceases to exist for any reason, be destroyed or anonymised.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS may store personal data for a period longer than is necessary to achieve the purpose for which it was collected, or, if that purpose has been achieved or ceases to exist for any reason, for any period following such achievement or cessation, if – &lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;the person to whom it pertains grants consent to such storage;&lt;/li&gt;
&lt;li&gt;it is required to be stored under the provisions of applicable law; or&lt;/li&gt;
&lt;li&gt;it is the subject of a pending legal proceeding.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Processing of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS will not process any personal data that is not necessary for the achievement of the purpose for which it was collected unless the person to whom it pertains grants consent to such processing.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Security of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS will not collect, store or process any personal data in the absence of measures, including, but not restricted to, technological, physical and administrative measures, adequate to secure the confidentiality, secrecy, sanctity and safety of the personal data, including from theft, loss, damage or destruction.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;Any person who collects, stores or processes any personal data on behalf of CIS will be subject to a duty of confidentiality and secrecy in respect of it.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS will, if the confidentiality, secrecy, sanctity or safety of any personal data collected, stored or processed by CIS is violated by theft, loss, damage or destruction, or as a result of any disclosure contrary to the provisions of this Policy, notify, to the extent possible, the person to whom the personal data pertains.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Disclosure of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS will not disclose to any person to whom any personal data does not pertain, or otherwise cause any such a person to receive, the content or nature of that personal data, including any other details in respect thereof, unless the person to whom it pertains grants consent to such disclosure. CIS may obtain such consent in any manner, and through any medium, but will not employ threats, duress or coercion to obtain such consent.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS may disclose personal data with a person to whom it does not pertain, whether located in India or otherwise, for the purpose only of processing it to achieve the purpose for which it was collected, if such a disclosure is pursuant to an agreement that binds the person receiving it to same or stronger measures in respect of its storage, processing and disclosure as are contained in this Policy.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;If the disclosure of any personal data is necessary to –&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;prevent a reasonable threat to national security, defence or public order; or&lt;/li&gt;
&lt;li&gt;prevent, investigate or prosecute a cognisable offence;&lt;/li&gt;
&lt;/ul&gt;
CIS may, upon receiving an order in writing from a judicial authority or law enforcement officer, disclose the personal data that is the subject of the order without seeking the consent of the person to whom it pertains.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS may, to the extent possible, notify the person to whom any personal data pertains of its disclosure and the identity of the person it was disclosed to, and any other details in respect thereof.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Accuracy of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;CIS will reasonably afford any person whose personal data is collected, stored or processed by CIS the opportunity to review it and, where necessary, rectify anything that is inaccurate or not up to date.&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/policies/privacy-policy'&gt;https://cis-india.org/about/policies/privacy-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T06:25:37Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/policies/non-discrimination-equal-opportunities-policy">
    <title>Non-Discrimination and Equal Opportunities Policy</title>
    <link>https://cis-india.org/about/policies/non-discrimination-equal-opportunities-policy</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;h2&gt;Preliminary&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;This Non-Discrimination and Equal Opportunities Policy ("Policy") states the internal policy of the Centre for Internet &amp;amp; Society ("CIS") with regard to non-discrimination at the workplace and equal opportunities during recruitment.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;This Policy is internal to CIS and is meant to provide a safe, diverse and comfortable workplace at CIS. This Policy is not legally mandated and, therefore, is not judicially enforceable in India. This Policy is without prejudice to any anti-discrimination provisions of applicable law including, but not restricted to, the provisions of:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Article 17 of the Constitution of India;&lt;/li&gt;
&lt;li&gt;the Protection of Civil Rights Act, 1955,&lt;/li&gt;
&lt;li&gt;the Scheduled Castes and Scheduled Tribes (Prevention of Atrocities) Act, 1989;&lt;/li&gt;
&lt;li&gt;the Sexual Harassment of Women at the Workplace (Prevention, Prohibition and Redressal) Act, 2013;&lt;/li&gt;
&lt;li&gt;Sections 354 and 509 of the Indian Penal Code, 1860; and,&lt;/li&gt;
&lt;li&gt;the Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act, 1995.&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Non-discrimination&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;CIS will not adversely discriminate, and prohibits other adverse discrimination at the workplace, on the basis of religion, race, caste, sex, place of birth, descent, sexual orientation, gender identity, disability, age or any of them (&lt;strong&gt;"Discrimination Characteristics"&lt;/strong&gt;). CIS will not condone any adverse discrimination against any person on its premises, whether that person is in its employment or otherwise.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Any person who believes himself or herself to have been subjected to adverse discrimination on the basis of the Discrimination Characteristics is encouraged to bring the matter to the attention of the Diversity Committee of CIS at the earliest practical opportunity. No person will be punished, retaliated against, or limited in employment or other opportunity for exercising anything set out in this Policy, or for filing a complaint, furnishing information for, or participating in an investigation, or any other activity related to the administration of this Policy.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Any adverse discrimination or other action or behaviour that constitutes a violation of law will be reported to the police.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Equal Opportunities&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;CIS provides equal opportunities to its employment, consultancy or otherwise without regard for the Discrimination Characteristics. All actions of CIS with regard to its employees, consultants, advisors, interns and staff, including but not limited to those relating to compensation, benefits, transfers, leave, layoffs, training, education, and assistance, will be made without regard for the Discrimination Characteristics.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Notwithstanding anything contained in the previous paragraph, if CIS reasonably believes that its employment, workplace or premises do not adequately represent the balance of diversity of persons who share one or more of the Discrimination Characteristics, it may, with the aim only of redressing that imbalance, take positive discriminatory action in respect of persons who share that aspect, or those aspects, of the Discrimination Characteristics that are sought to be adequately represented.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Any person who believes himself or herself to have been subjected to adverse discrimination, or impermissible positive discrimination, on the basis of the Discrimination Characteristics is encouraged to bring the matter to the attention of the Diversity Committee of CIS at the earliest practical opportunity.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Diversity Committee&lt;/h2&gt;
&lt;p&gt;The Interim Diversity Committee of CIS is comprised of:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Pallavi Bedi&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Torsha Sarkar&lt;/li&gt;&lt;li&gt;Gurshabad Grover&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/policies/non-discrimination-equal-opportunities-policy'&gt;https://cis-india.org/about/policies/non-discrimination-equal-opportunities-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-07-29T06:59:09Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/policies/ethical-research-guidelines">
    <title>Ethical Research Guidelines</title>
    <link>https://cis-india.org/about/policies/ethical-research-guidelines</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society will endeavour to protect the physical, social and psychological well-being of those who participate in their research. The guidelines below state the necessary steps to follow while doing research.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The ethical research guideline requires CIS staff and consultants to consider and take the following steps while engaging in research.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Providing notice to the individual of the: Aims, methods, his/her right to abstain from participation in the research and his/her right to terminate at any time his/her participation; the confidential nature of his/her replies and any limits on such confidentiality.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Providing informants and other participants the right to remain anonymous.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Taking informed consent from the individual that he/she agrees to participate. If children are involved in the research, informed consent will be taken from the parents. Informed consent will entail communicating :&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Purpose(s) of the study, and the anticipated consequences of the research;&lt;/li&gt;
&lt;li&gt;Identity of funders and sponsors&lt;/li&gt;
&lt;li&gt;Anticipated uses of the data&lt;/li&gt;
&lt;li&gt;The degree of anonymity and confidentiality which may be afforded to informants and subjects.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ensuring that when audio/visual-recorders and photographic records are being used, participants that are being recorded will be made aware of the use of the devices, and have the option to request that they not be used.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Ensuring that the identity and identifying information of the participant (if not already in the public domain) is destroyed at the end of project, unless the individual has consented to otherwise.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;At public events organized by CIS, it will be announced and publicly posted that the event is being recorded. Individuals will be given the choice object to being recorded or their name and organization shared in conference reports, blogs, articles etc. If the individual does not object, it will be considered that they have given their consent.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The Centre for Internet and Society strictly follows a policy of &lt;strong&gt;No Plagiarism&lt;/strong&gt;.&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/policies/ethical-research-guidelines'&gt;https://cis-india.org/about/policies/ethical-research-guidelines&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-13T12:21:48Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
