<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1981 to 1995.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/first-meeting-of-mag-india-internet-governance-forum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/technology-business-incubators"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/finding-needles-in-haystacks-discussing-the-role-of-automated-filtering-in-the-new-indian-intermediary-liability-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy_uidfinancialinclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/finance-and-privacy.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs">
    <title>Five Frequently Asked Questions about the Amended ITRs</title>
    <link>https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs</link>
    <description>
        &lt;b&gt;This piece discusses the five major questions that have been the subject of debate after the World Conference on International Telecommunications 2012 (WCIT). The politics surrounding the WCIT are not discussed here but it must be kept in mind that they have played a significant role in the outcome of the conference and in some of the debates about it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Each question is discussed with reference to the text of the treaty, to the minutes of the plenary sessions (which are available via the &lt;a href="http://www.itu.int/en/pages/default.aspx"&gt;ITU website&lt;/a&gt;), a little international law and a few references to other people’s comments on the treaty.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. Do the ITRs apply to content on the internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 1.1 (a) has been amended to add the sentence “These Regulations do not address the content-related aspects of telecommunications”. Although some discussions about the &lt;a href="http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf"&gt;International Telecommunication Regulations (ITRs)&lt;/a&gt; and content have ignored this altogether, others seem concerned about its interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ITU Secretary General has issued &lt;a href="http://www.itu.int/en/wcit-12/Pages/statement-toure.aspx"&gt;a statement&lt;/a&gt; in which he has clarified that “The new ITR treaty does NOT cover content issues and explicitly states in the first article that content-related issues are not covered by the treaty”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commentators like &lt;a href="http://tryingtoreason.wordpress.com/2012/12/15/yes-the-new-itrs-do-cover-content-and-the-internet/"&gt;Chuan-Zheng Lee&lt;/a&gt; however, continue to view the treaty with suspicion, on the basis that it is necessary to examine content in order to tell whether it is spam (Lee and &lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt;Chaparro&lt;/a&gt; differ on this question). However, others like &lt;a href="http://www.nytimes.com/2012/12/15/technology/in-a-huff-a-telling-us-walkout.html?pagewanted=all&amp;amp;_r=0"&gt;Eric Pfanner&lt;/a&gt; have pointed to this paragraph in their skepticism about the US refusal to sign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman proposed the addition to Article 1.1(a) at the tenth plenary session. He did this to address concerns that the ITRs text could be interpreted to apply to content on the Internet. The original formulation that he proposed was ‘These regulations do not address and cannot be interpreted as addressing content’. This text was suggested in the middle of an extended discussion on Article 5A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many countries were skeptical of this insertion. Sudan argued that content could not be avoided in telecommunication networks “because it will always be in transit.” The United Arab Emirates seemed concerned about international interference in states’ existing regulation of content, and said “maybe we could actually say this in the minutes of the meeting that this regulation should not be interpreted as on alteration to Member States content regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns about what the term ‘content’ means and whether it would apply broadly were raised by more than one country, including Saudi Arabia. For instance, it was argued that the text proposed by the Chairman might interfere with parts of the treaty that require operators to send tariff information correspondence. More than one country that felt that the insertion of this text would impact several parts of the treaty, and that it would be difficult to determine what amounted to dealing with content. The primary issue appeared to be that the term ‘content’ was not defined, and it therefore remained unclear what was being excluded. In response to these concerns, the Chairman withdrew his proposal for the amendment excluding content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, several states then spoke up in favour of the Chairman’s proposal, suggesting that the proposed amendment to Article 1.1 influenced their acceptance of Article 5A (on security and robustness of networks – discussed in detail below). Brazil suggested that an answer to the definitional concerns may be found in the work by Study Group 17, which had a definition available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following this, the next day, at the twelfth plenary, the Chairman brought back the Article 1.1 amendment excluding content. He stated explicitly that this amendment might be the way to get Articles 5A and 5B approved. The text he read out was insertion of the words &lt;i&gt;“&lt;/i&gt;to the exclusion of their content”, after ‘’services’ at the end of 1.1A. Interestingly however, the term ‘content’ was never defined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the next plenary session, Iran raised the objection that this phrase was overbroad, and proposed the following formulation instead: “These Regulations do not address the content-related aspects of telecommunications”. This formulation found its way into the amended ITRs as the treaty stands today.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. Does Article 5A on network security legitimize surveillance of Internet content?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A deals with ‘security and robustness of networks’ and requires member states to “individually and collectively endeavour to ensure the security and robustness of international telecommunication networks...”.  This may have given rise to concerns about interpretations that may extend the security of networks to malware or viruses, and therefore to content on the Internet. However, Article 5A has to be read with Article 1.1(a), and therefore must be interpreted such that it does not ‘address the content-related aspects of telecommunications’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some commentators continue to see Article 5A as problematic. Avri Doria &lt;a href="http://avri.doria.org/post/38641776703/wcit"&gt;has argued&lt;/a&gt; that the use of the word ‘security’ in addition to ‘robustness’ of telecommunication infrastructure suggests that it means Internet security.   However Emma Llansó of the Centre for Democracy and Technology &lt;a href="https://www.cdt.org/blogs/emma-llanso/2012making-sense-wcit-it%E2%80%99s-complicated"&gt;has noted&lt;/a&gt; that the language used in this paragraph is “ far too vague to be interpreted as a requirement or even a recommendation that countries surveil users on their networks in order to maintain security”. Llansó  has suggested that civil society advocates make it clear to countries which attempt to use this article to justify surveillance, that it does not lend itself to such practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A was one of the most controversial parts of the ITRs and was the subject of much debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 11&lt;sup&gt;th&lt;/sup&gt;, in the Chairman’s draft that was being discussed, Article 5A was titled ‘security of networks’, and required members to endeavour to ensure the “security and robustness of international telecommunication networks”.  The Chairman announced that this was the language that came out of Committee 5’s deliberations, and that ‘robustness’ was inserted at the suggestion of CEPT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several countries like Poland, Australia, Germany and the United States of America were keen on explicitly stating that Article 5A was confined to the physical or technical infrastructure, and either wanted a clarification that to this effect or use of the term ‘robustness’ instead of security. Many other countries, such as Russia and China, were strongly opposed to this suggestion and insisted that the term security must remain in the document (India was one of the countries that preferred to have the document use the term ‘security’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was in the course of this disagreement, during the tenth plenary session, that the Chairman suggested his global solution for Article 1.1 – a clarification that this would not apply to content. This solution was contested by several countries, withdrawn and then reinstated (in the eleventh plenary) after many countries explained that their assent to Article 5A was dependant on the existence of the Article 1 clarification about content (see above for details).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was also some debate about whether Article 5A should use the term ‘robustness’ or the term ‘security’ (eg. The United States clarified that its preference was for the use of ‘resilience and robustness’ rather than security). The Secretary General referred to this disagreement, and said that he was therefore using both terms in the draft. The title of Article 5A was changed, in the eleventh plenary, to use both terms, instead of only referring to security.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. Does Article 5B apply to spam content on the Internet? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the amended treaty talks of ‘unsolicited bulk electronic communications’ and does not use the term ‘spam’[Article 5B says that ‘Members should endeavour to take necessary measures to prevent the propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services’].If this phrase is read in isolation, it may certainly be interpreted as being applicable to spam. Commentators like &lt;a href="http://avri.doria.org/tagged/WCIT/page/2"&gt;Avri Doria&lt;/a&gt; have pointed to sources like&lt;a href="http://www.itu.int/osg/csd/intgov/resoultions_2010/PP-10/RESOLUTION_130.pdf"&gt; Resolution 130 of the Plenipotentiary Conference of the International Telecommunication Union&lt;/a&gt; (Guadalajara, 2010) to demonstrate that ‘unsolicited bulk electronic communications’ ordinarily means spam.  However, others like&lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt; Enrique A. Chaparro&lt;/a&gt; argue that it cannot possibly extend to content on the Internet given the language used in Article 1.1(a). Chapparo has explained, that given the exclusion of content, Article 5B it authorizes anti-spam mechanisms that do not work on content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B, which discusses ‘unsolicited bulk electronic communications’, must be read with Article 1, which is the section on purpose and scope of the ITRS. Article 1.1 (a) specifies that the ITRs “do not address the content-related aspects of telecommunications”. Therefore it may be argued that ‘unsolicited bulk electronic communications’ cannot be read as being applicable to content on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, many continue to be concerned about Article 5B’s applicability to spam on the Internet. Although some of them that their fear is that some states may interpret Article 5B as applying to content, despite the contents of Article 1.1(a), many have failed to engage with the issue in the context of Article 1.1(a).&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B is inextricably linked with the amendment to Article 1.1. Mexico asked specifically about what the proposed amendment to Article 1.1 would mean for Article 5B: “I’m referring to the item which we’ll deal with later, namely unsolicited bulk electronic communications.  Could that be referred to as content, perhaps?”.  The Chairman responded saying, “This is exactly will solve the second Article 5B, that we are not dealing with content here.  We are dealing with measures to prevent propagation of unsolicited bulk electronic messages”.&lt;sup&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment to Article 1.1 was withdrawn soon after it was introduced. Before it was reintroduced, Sweden said (at the eleventh plenary) that it could not see how Article 5B could apply without looking into the content of messages. The United States agreed with this and went on state that the issue of spam was being addressed at the WTSA level, as well as by other organisations. It argued that the spam issue was better addressed at the technical level than by introducing it in treaty text.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment excluding content was reintroduced during the twelfth plenary. The Chairman explicitly stated that it might be the way to get Articles 5A and 5B approved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The word ‘spam’ was dropped from the ITRs in the eight plenary, and “unsolicited bulk electronic communications” was used instead.  However, in the eleventh plenary, as they listed their reasons for not signing the newly-amended ITRs, Canada and the United States of America referred to ‘spam’ which suggests that they may have viewed the change as purely semantic.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. Does the resolution on Internet Governance indicate that the ITU plans to take over the Internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much controversy has arisen over the plenary resolution ‘to foster an enabling environment for the greater growth of the Internet’. This controversy has arisen partly thanks to the manner in which it was decided to include the resolution, and partly over the text of the resolution. The discussion here focuses on the text of the resolution and then describes the proceedings that have been (correctly) criticized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The history of this resolution, as &lt;a href="http://www.circleid.com/posts/20121217_wcit_and_internet_governance_harmless_resolution_or_trojan_horse/"&gt;Wolfgang Kleinwächter&lt;/a&gt; has explained, is that it was part of a compromise to appease the countries which were taking positions on the ITU’s role in Internet governance, that were similar to the &lt;a href="http://files.wcitleaks.org/public/Merged%20UAE%20081212.pdf"&gt;controversial Russian proposal&lt;/a&gt;. The controversial suggestions about Internet governance were excluded from the actual treaty and included instead in a non-binding resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the resolution instructs the Secretary General to “to continue to take the necessary steps for ITU to play an active and constructive role in the development of broadband and the multi-stakeholder model of the Internet as expressed in § 35 of the Tunis Agenda”. This paragraph is particularly controversial since of paragraph 35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt; says “Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues.” Kleinwächter has pointed out that this selection leaves out later additions that have taken place with progression towards a multi-stakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The resolution also resolves to invite member states to “to elaborate on their respective positions on international Internet-related technical, development and public-policy issues within the mandate of ITU at various ITU forums including, inter alia, the World Telecommunication/ICT Policy Forum, the Broadband Commission for Digital Development and ITU study groups”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A little after its introduction, people began expressing concerns such as the &lt;a href="https://www.accessnow.org/blog/2012/12/12/wcit-watch-just-taking-the-temperature-a-late-night-resolution-on-the-inter"&gt;Secretary General may treat the resolution as binding&lt;/a&gt;, While the language may raise cause for concern, it is important to note that resolutions of this nature are not binding and countries are free to opt out of them. Opinions vary about the intentions that have driven the inclusion of this resolution, and what it may mean for the future. However commentators like Milton Mueller have scoffed at these concerns, pointing out that the resolution is harmless and may have been a &lt;a href="http://www.internetgovernance.org/2012/12/13/what-really-happened-in-dubai/"&gt;clever political maneuver&lt;/a&gt; to resolve the basic conflict haunting the WCIT, and that &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;mere discussion of the Internet in the ITU harms no one&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Egypt and Bulgaria suggested that the resolution refer to paragraph 55 of the Tunis agenda instead of paragraph 35, by inserted the following text “”Recognizing that the existing arrangements for Internet Governance have worked effectively to make the Internet the highly robust, dynamic and geographically diverse medium it is today, with the private sector taking the lead in day-to-day operations and with innovation and value creation at the edges.” The US was also quite insistent on this language (although it did also argue that this was the wrong forum to discuss these issues).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman was willing to include paragraph 55 in addition to paragraph 35 but Saudi Arabia objected to this inclusion. Finland suggested that the resolution should be removed since it was not supported by all the countries present and was therefore against the spirit of consensus. The Secretary General defended the resolution, suggesting both that it was harmless and that since it was a key component of the compromise, eliminating it would threaten the compromise. South Africa and Nigeria supported this stand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was during this debate that the procedural controversy arose. Late into the night, the Chairman said there was a long list of countries that wished to speak and said “I just wanted to have the feel of the room on who will accept the draft resolution”. He proceeded to have countries indicate whether they would accept the draft resolution or not, and then announced that the majority of the countries in the room were in favour of retaining the resolution. The resolution was then retained. Upon Spain’s raising the question, the Chairman clarified that this was not a vote. The next day, other countries raised the same question and the Chairman, while agreeing that the resolution was adopted on the basis of the ‘taking of temperature’ insisted that it was not a vote so much as an effort to see what majority of the countries wanted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Does the human rights language used in the preamble, especially the part about states’ access to the Internet, threaten the Internet in any way?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The preamble says “Member States affirm their commitment to implement these Regulations in a manner that respects and upholds their human rights obligations”, and “These Regulations recognize the right of access of Member States to international telecommunication services”. The text of the preamble can be used as an interpretation aid since it is recognized as providing context to, and detailing the object and purpose of, a treaty. However if the meaning resulting from this appears to be ambiguous, obscure, absurd or unreasonable, then supplementary means such as the preparatory work for the treaty and the circumstances for its conclusion may also be taken into account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore anyone who is concerned about the impact of the text inserted in the preamble must (a) identify text within the main treaty that could be interpreted in an undesirable manner using the text in the preamble; and (b) consider preparatory work for the treaty and see whether it supports this worrying interpretation. For example, if there were concerns about countries choosing to interpret the term ‘human rights’ as subordinating political rights to economic rights, it would be important to take note of the Secretary General’s emphasis on the &lt;a href="http://www.un.org/en/documents/udhr/index.shtml"&gt;UDHR&lt;/a&gt; being applicable to all member states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, only the first insertion about ‘human rights obligations’ was part of the draft treaty. The second insertion, recognizing states’ rights followed after the discussion about human rights language. Some states argued that it was inconsistent to place human rights obligations on states towards their citizens, but to leave out their cross-border obligations. It was immediately after this text was voted into the draft, that the United States, the United Kingdom and other countries refused to sign the ITRs. This particular insertion is phrased as a right of states rather than that of individuals or citizens, which does not align with the language of international human rights. While it may not be strictly accurate to say that human rights have traditionally been individual centric (since collective rights are also recognized in certain contexts), it is certainly very unusual to treat the rights of states or governments as human rights.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States of America and the Netherlands wanted to include language to state explicitly that states’ international human rights obligations are not altered in anyway. This was to clarify that the inclusion of human rights language was not setting the ITU up as a forum in which human rights obligations are debated. Malaysia objected to the use of human rights language in the preamble right at the outset, on the grounds that the ITRs are the wrong place for this, and that the right place is the ITU Constitution. It even pointed to the fact that jurisprudence is ever-evolving, to suggest that the meaning of human rights obligations might change over time. These were the two major perspectives offered towards the beginning of the discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman underlined the fact that the Universal Declaration of Human Rights is already applicable to all UN countries. He argued that reflection of these principles in the ITRs would help build universal public faith in the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first traces of the states’ access rights can be seen in Cuba’s intervention at the ninth plenary – Cuba argued that limiting states’ access to public information networks amounted to infringement of human rights. At the fourteenth plenary, Nigeria proposed on behalf of the African group that the following text be added to the preamble “And recognize the right of access of all Member States to international telecommunication networks and services." Countries like China which had been ambivalent about the human rights language in the preamble, were happy with this move away from an individual-centric understanding of human rights, to one that sees states as representative of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States was express in its dissent, and said “human rights obligations go to the individual”. Sweden was also not happy with the proposal and argued that it moved away from well-established human rights language that affirmed existing commitments to drafting new human rights language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was an amended version of the African group proposal that finally found its way into the preamble. It was supported by many countries such as China, Nigeria and Sudan, who took the position that group rights are included within human rights, and that governments represent their citizens and therefore have rights on their behalf. This position was strenuously disputed by states like the USA, Switzerland, United Kingdom and Canada.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs'&gt;https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2013-01-30T05:36:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai">
    <title>First Privacy and Surveillance Roundtable</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai</link>
    <description>
        &lt;b&gt;The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI), as well as local partners.  From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The Roundtables will be closed-door deliberations involving multiple stakeholders.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Through the course of these discussions we aim to deliberate upon the current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India. The provisions of the draft CIS Privacy Bill 2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on Privacy will be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled and submitted to the Department of Personnel and Training.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first of seven proposed roundtable meetings on “Privacy and Surveillance” conducted by the Centre for Internet and Society in collaboration with the Cellular Operators Association of India and the Council for Fair Business Practices was held in Mumbai on the 28th of June, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The roundtable’s discussion centered on the &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf"&gt;Draft Privacy Protection Bill&lt;/a&gt; formed by CIS in 2013, which contains provisions on the regulation of interception and surveillance and its implications on individual privacy. Other background documents to the event included the &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;, and the &lt;a href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights to Communications Surveillance.&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Background and Context&lt;/h2&gt;
&lt;p&gt;The Chair of the Roundtable began by giving a brief background of Surveillance regulation in India, focusing its scope to primarily telegraphic, postal and electronic surveillance.&lt;/p&gt;
&lt;h3&gt;Why a surveillance regime now?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A move to review the existing privacy laws in India came in the wake of Indo-EU Fair Trade Agreement negotiations; where a Data Adequacy Assessment conducted by European Commission found India’s data protection policies and practices inadequate for India to be granted EU secure status. The EU’s data protection regime is in contrast, fairly strong, governed by the framework of the EU Data Protection Directive, 1995.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response to this, the Department of Personnel and Training, which drafted the Right to Information Act of 2005 and the Whistleblower’s Protection Act, 2011 was given the task of forming a Privacy Bill. Although the initial draft of the Bill was made available to the public, as per reports, the Second draft of the Bill has been shared selectively with certain security agencies and not with service providers or the public.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Discussion&lt;/h3&gt;
&lt;p&gt;The Chair began the discussion by posing certain preliminary questions to the Roundtable:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What should a surveillance law contain and how should it function?&lt;/li&gt;
&lt;li&gt;If the system is warrant based, who would be competent to execute it? &lt;/li&gt;
&lt;li&gt;Can any government department be allowed a surveillance request? &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;A larger question posed was whether the concerns and questions posed above would be irrelevant with the possible enforcement of a Central Monitoring System in the near future? As per reports, the Central Monitoring System would allow the government to intercept communications independently without using service providers and thus, in effect, shielding such information from the public entirely.&lt;/p&gt;
&lt;h2&gt;The CIS Privacy Protection Bill’s Regulatory Mechanism&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussion then focused on the type of regulatory mechanism that a privacy and surveillance regime in India should have in place. The participants did not find favour in either a quasi-judicial body or a self-regulatory system – instead opting for a strict regulatory regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS Draft Privacy Protection Bill proposes a regime that consists of a Data Protection Regulation Authority that is similar to the Telecom Regulatory Authority of India, including the provision for an appellate body. The Bill envisions that the Authority will act as an adjudicating body for all complaints relating to the handling of personal data in addition to forming and reviewing rules on personal data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although, the Draft Bill dealt with privacy and surveillance under one regulatory authority, the Chair proposes a division between the two frameworks, as the former is governed primarily by civil law, and the latter is regulated by criminal law and procedure. Though in a &lt;a href="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"&gt;2014 leaked version of the governments Privacy Bill,&lt;/a&gt; surveillance and privacy are addressed under one regulation, as per reports, the Department of Personnel and Training is also considering creating two separate regulations: one for data protection and one for surveillance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Authorities in Other Jurisdictions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussion then moved to comparing the regulatory authorities within other jurisdictions and the procedures followed by them. The focus was largely on the United States and the United Kingdom, which have marked differences in their privacy and surveillance systems. &lt;br /&gt;&lt;br /&gt;In the United Kingdom, for example, a surveillance order is reviewed by an Independent Commissioner followed by an Appellate Tribunal, which has the power to award compensation. In contrast, the United States follows a far less transparent system which governs foreigners and citizens under separate legislations. A secret court was set up under the FISA, an independent review process, however, exists for such orders within this framework.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The Authority for Authorizing Surveillance in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The authority for regulating requests for interceptions of communication under the Draft CIS Privacy Protection Bill is a magistrate. As per the procedure, an authorised officer must approach the Magistrate for approval of a warrant for surveillance. Two participants felt that a Magistrate is not the appropriate authority to regulate surveillance requests as it would mean vesting power in a few people, who are not elected via a democratic process.&lt;br /&gt;&lt;br /&gt;In the present regime, the regulation of interception of telecommunications under Indian Law is governed by the Telegraph Act,1885 and the Telegraph Rules,1951. Section 5(2) of the Act and Rule 419A of the Telegraph Rules, permit interception only after an order of approval from the Home Secretary of the Union Government or of the State Governments, which in urgent cases, can be granted by an officer of the Joint Secretary Level or above of the Ministry of Home Affairs of the Union or that State’s Government. &lt;br /&gt;&lt;br /&gt;Although most participants felt confident that a judicial authority rather than an executive authority would serve as the best platform for regulating surveillance, there was debate on what level of a Magistrate Judge would be apt for receiving and authorizing surveillance requests - or whether the judge should be a Magistrate at all. Certain participants felt that even District Magistrates would not have the competence and knowledge to adjudicate on these matters. The possibility of making High Court Judges the authorities responsible for authorizing surveillance requests was also suggested. To this suggestion participants noted that there are not enough High Court judges for such a system as of now. &lt;br /&gt;&lt;br /&gt;The next issue raised was whether the judges of the surveillance system should be independent or not, and if the orders of the Courts are to be kept secret, would this then compromise the independence of such regulators.  As part of this discussion, questions were raised about the procedures under the Foreign Intelligence Surveillance Act, the US regulation governing the surveillance of foreign individuals, and if such secrecy could be afforded in India. During the discussions, certain stakeholders felt that a system of surveillance regulation in India should be kept secret in the interests of national security. Others highlighted that this is the existing practice in India giving the example of the Intelligence Bureau and Research and Analysis Wing orders which are completely private, adding however, that none of these surveillance regulations in India have provisions on disclosure.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;When can interception of communications take place?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The interception of communications under the CIS Privacy Protection Bill is governed by the submission of a report by an authorised officer to a Magistrate who issues a warrant for such surveillance. Under the relevant provision, the threshold for warranting surveillance is suspicious conduct. Several participants felt that the term ‘suspicious conduct’ was too wide and discretionary to justify the interception of communication and suggested a far higher threshold for surveillance. Citing the Amar Singh Case, a participant stated that a good way to ensure ‘raise the bar’ and avoid frivolous interception requests would be to require officers submitting interception request to issue affidavits. A participant suggested that authorising officers could be held responsible for issuing frivolous interception requests. Some participants agreed, but felt that there is a need for a higher and stronger standard for interception before provisions are made for penalising an officer. As part of this discussion, a stakeholder added that the term “person” i.e. the subject of surveillance needed definition within the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion then moved to comparing other jurisdictions’ thresholds on permitting surveillance. The Chair explained here that the US follows the rule of probable cause, which is where a reasonable suspicion exists, coupled with circumstances that could prove such a suspicion true. The UK follows the standard of ‘reasonable suspicion’, a comparatively lesser degree of strength than probable cause. In India, the standard for telephonic interception under the Telegraph Act 1885 is the “occurrence of any public emergency or in the interest of public safety” on the satisfaction of the Home Secretary/Administrative Officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The participants, while rejecting the standard of ‘suspicious conduct’ and agreeing that a stronger threshold was needed, were unable to offer other possible alternatives.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Multiple warrants, Storing and sharing of Information by Governmental Agencies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The provision for interception in the CIS Privacy Protection Bill stipulates that a request for surveillance should be accompanied by warrants previously issued with respect to that individual. The recovery of prior warrants suggests the sharing of information of surveillance warrants across multiple governmental agencies which certain participants agree, could prevent the duplication of warrants.&lt;br /&gt;&lt;br /&gt;Participants briefly discussed how the Central Monitoring System will allow for a permanent log of all surveillance activities to be recorded and stored, and the privacy implications of this. It was noted that as per reports, the hardware purported to be used for interception by the CMS is Israeli, and is designed to store a log of all metadata. &lt;br /&gt;&lt;br /&gt;A participant stated that automation component of the Centralized Monitoring System may be positive considering that authentication of requests i.e. tracing the source of the interception may be made easier with such a system.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conditions prior to issuing warrant&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The CIS Privacy Protect Bill states that a Magistrate should be satisfied of either. A reasonable threat to national security, defence or public order; or a  cognisable  offence,  the  prevention,  investigation  or  prosecution  of  which  is necessary in the public interest. When discussing these standards, certain participants felt that the inclusion of ‘cognizable offences’ was too broad, whereas others suggested that the offences would necessarily require an interception to be conducted should be listed.  This led to further discussion on what kind of categorisation should be followed and whether there would be any requirement for disclosure when the list is narrowed down to graver and serious offences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The chair also posed the question as to whether the term ‘national security’ should elaborated upon, highlighting the lack of a definition in spite of two landmark Supreme Court judgments on national security legislations, Terrorist and Disruptive Activities Act,1985 and the Prevention of Terrorism Act,  i.e. Kartar Singh v Union of India &lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; and PUCL v Union of India.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Kinds of information and degree of control&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussion then focused on the kinds of information that can be intercepted and collected. A crucial distinction was made here, between content data and metadata, the former being the content of the communication itself and the latter being information about the communication.  As per Indian law, only content data is regulated and not meta-data. On whether a warrant should be issued by a Magistrate in his chambers or in camera, most participants agreed that in chambers was the better alternative. However, under the CIS Privacy Protection Bill, in chamber proceedings have been made optional, which stakeholders agreed should be discretionary depending on the case and its sensitivity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Evidentiary Value&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The foundation of this discussion, the Chair noted, is the evidentiary value given to information collected from interception of communications. For instance, the United States follows the exclusionary rule, also known as the “fruit of the poisonous tree rule”, where evidence collected from an improper investigation discredits the evidence itself as well as further evidence found on the basis of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian courts however, allow for the admission of evidence collected through improper collection, as does the UK.  In Malkani v State of Maharashtra&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; the Supreme Court stated that an electronically recorded conversation can be admissible as evidence, and stated that evidence collected from an improper investigation can be relied upon for the discovery of further evidence - thereby negating the application of the exclusionary rule.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Emergent Circumstances: who should the authority be?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The next question posed to the participants was who the apt authority would be to allow surveillance in emergent circumstances. The CIS Privacy Protection Bill places this power with the Home Secretary, stating that if the Home Secretary is satisfied of a grave threat to national security, defence or public order, he can permit surveillance. The existing law under the Telegraph Act 1885 uses the term ‘unavoidable circumstance’, though not elaborating on what this amounts to for such situations, where an officer not below the rank of a Joint Secretary evaluates the request. In response to this question, a stakeholder suggested that the issuing authority should be limited to the police and administrative services alone.  In the CIS Privacy Protection Bill - a review committee for such decisions relating to interception is comprised of senior administrative officials both at the Central and State Government level.  A participant suggested that the review committee should also include the Defence secretary and the Home secretary.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Sharing of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The CIS Privacy Protection Bill states that information gathered from surveillance should not be shared be shared amongst persons, with the exception that if the information is sensitive in terms of national security or prejudicing an investigation, an authorised officer can share the information with an authorised officer of any other competent organisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant highlighted that this provision is lacking an authority for determining the sharing of information. Another participant noted that the sharing of information should be limited amongst certain governmental agencies, rather than to ‘any competent organisation.’&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Proposals for Telecommunication Service Providers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the Indian interception regime, although surveillance orders are passed by the Government, the actual interception of communication is done by the service provider. Certain proposals have been introduced to protect service providers from liability. For example, an execution provision ensures that a warrant is not served on a service provider more than seven days after it is issued. In addition an indemnity provision prevents any action being taken against a service provider in a court of law, and indemnifies them against any losses that arise from the execution of the warrant, but not outside the scope of the warrant. During discussions, stakeholders felt that the standard should be a blanket indemnity without any conditions to assure service providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Indian interception regime, a service provider must also ensure confidentiality of the content and meta data of the intercepted communications. To this, a participant suggested that in situations of information collection, a service provider may have a policy for obtaining customer consent prior to the interception. The Information Technology (Reasonable security practices and procedures and sensitive personal information) Rules, 2011 are clearer in this respect, which allow for the disclosure of information to governmental agencies without consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another participant mentioned that the inconsistencies between laws on information disclosure and collection, such as the IT Act, the Right to Information Act and the recently enacted Whistleblower’s Protection Act, 2011 need to be harmonised. Other stakeholders agreed with this, though they stated that surveillance regulations should prevail over other laws in case of any inconsistency.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The inputs from the Bombay Roundtable seem to point towards a more regulated approach, with the addition of a review system to enhance accountability. While most stakeholders here agreed that national security is a criterion that takes precedence over concerns of privacy vis-à-vis surveillance, there is a concomitant need to define the limits of permissible interception. The view here is that a judicial model would prove to be a better system than the executive system; however, there is no clear answer as of yet on who would constitute this model. While the procedure for interception was covered in depth, the nature of the information itself was covered briefly and more discussion would be welcome here in forthcoming sessions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/bombay-report.pdf" class="internal-link"&gt;&lt;b&gt;Click to download the Report&lt;/b&gt;&lt;/a&gt; (PDF, 188 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. 1994 4 SCC 569.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. (1997) 1 SCC 301.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. [1973] 2 S.C.R. 417.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai'&gt;https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anandini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-09T04:13:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/first-meeting-of-mag-india-internet-governance-forum">
    <title>First Meeting of the Multistakeholder Advisory Group for India Internet Governance Forum</title>
    <link>https://cis-india.org/news/first-meeting-of-mag-india-internet-governance-forum</link>
    <description>
        &lt;b&gt;The Department of Electronics and Information Technology organized a meeting of the Multistakeholder Advisory Group (MAG) for India Internet Governance Forum (IIGF) at Electronics Niketan in New Delhi on February 10, 2014. Sunil Abraham participated in this meeting.&lt;/b&gt;
        &lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/MeetingNoticeMAG.pdf" class="internal-link"&gt;Meeting Notice&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/mag-order.pdf" class="internal-link"&gt;Order for Constitution of MAG&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/mag-feb-10-2014.pdf" class="internal-link"&gt;Minutes of the Meeting&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/first-meeting-of-mag-india-internet-governance-forum'&gt;https://cis-india.org/news/first-meeting-of-mag-india-internet-governance-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-06T05:28:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer">
    <title>First Look: CIS Cybersecurity documentary film</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer</link>
    <description>
        &lt;b&gt;CIS presents the trailer of its documentary film DesiSec: Cybersecurity &amp; Civil Society in India&lt;/b&gt;
        
&lt;p&gt;The Centre for Internet and Society is pleased to release the trailer of its first documentary film, on cybersecurity and civil society in India.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The documentary is part of the CIS Cybersecurity Series, a work in progress which may be found &lt;a class="external-link" href="http://cismetamedia.tumblr.com"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/3134xVvMmfc" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;strong&gt;DesiSec: Cybersecurity and Civil Society in India&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The trailer of&amp;nbsp;&lt;em&gt;DesiSec: Cybersecurity and Civil Society in India&lt;/em&gt;&amp;nbsp;was shown at the Internet Governance Forum in Bali on October 24. It was a featured presentation at the Citizen Lab workshop,&amp;nbsp;&lt;em&gt;Internet Governance For The Next Billion Users.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The transcript of the workshop is available here:&amp;nbsp;&lt;a href="http://www.intgovforum.org/cms/component/content/article/121-preparatory-process/1476-ws-344-internet-governance-for-the-next-billion-users"&gt;http://www.intgovforum.org/cms/component/content/article/121-preparatory-process/1476-ws-344-internet-governance-for-the-next-billion-users&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2013-12-17T08:16:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/technology-business-incubators">
    <title>First draft of Technology Business Incubators: An Indian Perspective and Implementation Guidance Report</title>
    <link>https://cis-india.org/internet-governance/blog/technology-business-incubators</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society presents the first draft of its analysis on technology business incubators("TBI") in India. The report prepared by Sunil Abraham, Vidushi Marda, Udbhav Tiwari and Anumeha Karnatak looks at operating procedures, success stories and lessons that can be learnt from TBIs in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;A technology business incubator (TBI) is an organisational setup that nurtures technology based and knowledge driven companies by helping them survive during the startup period in the company’s history, which lasts around the initial two to three years. Incubators do this by providing an integrated package of work space, shared office services, access to specialized equipment along with value added services like fund raising, legal services, business planning, technical assistance and networking support. The main objective of the technology business incubators is to produce successful business ventures that create jobs and wealth in the region, along with encouraging an attitude of innovation in the country as a whole.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The primary aspects that this report shall go into are the stages of a startup, the motivational factors behind establishing incubators by governments &amp;amp; private players, the process followed by them in selecting, nurturing talent as well as providing post incubation support. The report will also look at the role that incubators play in the general economy apart from their function of incubating companies, such as educational or public research roles. A series of case analysis of seven well established incubators from India shall follow which will look into their nurturing processes, success stories as well as lessons that can be learnt from their establishment. The final section shall look into challenges faced by incubators in developing economies and the measures taken by them to overcome these challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/technology-business-incubators.pdf" class="internal-link"&gt;&lt;b&gt;Download the full paper&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/technology-business-incubators'&gt;https://cis-india.org/internet-governance/blog/technology-business-incubators&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-07-25T16:14:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data">
    <title>Firms find wealth in your data</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data</link>
    <description>
        &lt;b&gt;Data collection and theft is quite prevalent and there is little an individual can do right now.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Data protection and  privacy are the new buzzwords in the corridors of power in India. While a  Ministry of Electronics and Technology committee led by retired Supreme  Court Justice B N Srikrishna is working on a draft Data Protection  Bill, the Telecom Regulatory Authority of  India (TRAI) has come out with its own recommendations regarding  privacy, security, and ownership of data in the telecom sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How is your data  collected? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every minute you spend online leads  to your data being generated,  collected and collated somewhere. “There  is data that we volunteer. If I  create an account for myself on any  website I will provide my name,  age, banking and so on,” says Amber Sinha, senior programme manager, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Then there is data which gets collected by telecom companies and companies which provide OTT (Over-The-Top) services, like Google Chrome. Much of this data is collected automatically — my browsing history, what links were open, what ads did I click on in Facebook etc. Most websites use trackers and cookies that continue working in the background. Even when you have closed the link and move on to another website, they still continue to collect data about you,” he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the method behind this?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In order to provide a service, there is some data that they need to collect. For example, a cab aggregator has to get my location in order to connect me to nearest cabs. Yet most companies collect data beyond what might be needed. Suppose you are availing an online service which involves a payment aspect. For authentication, an OTP is sent in the form of a text message. The online services will seek permission to read our messages so that they can automatically pull the OTP, saving us the trouble of having to key it in manually. But the system is designed in such a way that the permission they seek is for my entire message box,” explains Amber.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-bengaluru/firms-find-wealth-your-data-682471.html"&gt;Read the complete article by Rajitha Menon in Deccan Herald&lt;/a&gt; published on July 20, 2018. Amber Sinha has been quoted.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data'&gt;https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-07-25T16:06:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments">
    <title>FinTech in India: A Study of Privacy and Security Commitments</title>
    <link>https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments</link>
    <description>
        &lt;b&gt;The unprecedented growth of the fintech space in India has concomitantly come with regulatory challenges around inter alia privacy and security concerns. This report studies the privacy policies of 48 fintech companies operating in India to better understand some of these concerns. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Access the full report: &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/Hewlett%20A%20study%20of%20FinTech%20companies%20and%20their%20privacy%20policies.pdf"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;p&gt;The report by Aayush Rathi and Shweta Mohandas was edited by Elonnai Hickok. Privacy policy testing was done by Anupriya Nair and visualisations were done by Saumyaa Naidu. The project is supported by the William and Flora Hewlett Foundation.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In India, the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (subsequently referred to as SPD/I Rules) framed under the Information Technology Act, 2000 make privacy policies a ubiquitous feature of websites and mobile applications of firms operating in India. Privacy policies are drafted in order to allow consumers to make an informed choice about the privacy commitments being made vis-à-vis their information, and is often the sole document that lays down a companies’ privacy and security practices.In India, the Information Technology (Reasonable Security Practices andProcedures and Sensitive Personal Data or Information) Rules, 2011 (subsequently referred to as SPD/I Rules) framed under the Information Technology Act, 2000 make privacy policies a ubiquitous feature of websites and mobile applications of firms operating in India. Privacy policies are drafted in order to allow consumers to make an informed choice about the privacy commitments being made vis-à-vis their information, and is often the sole document that lays down a companies’ privacy and security practices.&lt;/p&gt;
&lt;p&gt;The objective of this study is to understand privacy commitments undertaken by fintech companies operating in India as documented in their public facing privacy policies. This exercise will be useful to understand what standards of privacy and security protection fintech companies are committing to via their organisational privacy policies. The research will do so by aiming to understand the alignment of the privacy policies with the requirements mandated under the SPD/I Rules. Contingent on the learnings from this exercise, trends observed in fintech companies’ privacy and security commitments will be culled out.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments'&gt;https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-05-02T11:20:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata">
    <title>FinFisher in India and the Myth of Harmless Metadata</title>
    <link>https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou argues that metadata is anything but harmless, especially since FinFisher — one of the world's most controversial types of spyware — uses metadata to target individuals. &lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;In light of PRISM, the Central Monitoring System (CMS) and other such surveillance projects in India and around the world, the question of whether the collection of metadata is “harmless” has arisen.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; In order to examine this question, FinFisher&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; — surveillance spyware — has been chosen as a case study to briefly examine to what extent the collection and surveillance of metadata can potentially violate the right to privacy and other human rights. FinFisher has been selected as a case study not only because its servers have been recently found in India&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; but also because its “remote monitoring solutions” appear to be very pervasive even on the mere grounds of metadata.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;FinFisher in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is spyware which has the ability to take control of target computers and capture even encrypted data and communications. The software is designed to evade detection by anti-virus software and has versions which work on mobile phones of all major brands.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In many cases, the surveillance suite is installed after the target accepts installation of a fake update to commonly used software.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Citizen Lab researchers have found three samples of FinSpy that masquerades as Firefox.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is a line of remote intrusion and surveillance software developed by Munich-based Gamma International. FinFisher products are sold exclusively to law enforcement and intelligence agencies by the UK-based Gamma Group.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; A few months ago, it was reported that command and control servers for FinSpy backdoors, part of Gamma International´s FinFisher “remote monitoring solutions”, were found in a total of 25 countries, including India.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The following map, published by the Citizen Lab, shows the 25 countries in which FinFisher servers have been found.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Map.png" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;The above map shows the results of scanning for characteristics of FinFisher command and control servers&lt;/i&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="JUSTIFY"&gt;FinFisher spyware was not found in the countries coloured blue, while the colour green is used for countries not responding. The countries using FinFisher range from shades of orange to shades of red, with the lightest shade of orange ranging to the darkest shade of red on a scale of 1-6,  and with 1 representing the least active servers and 6 representing the most active servers in regards to the use of FinFisher. On a scale of 1-6, India is marked a 3 in terms of actively using FinFisher.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Research published by the Citizen Lab reveals that FinSpy servers were recently found in India, which indicates that Indian law enforcement agencies may have bought this spyware from Gamma  Group and might be using it to target individuals in India.&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;According to the Citizen Lab, FinSpy servers in India have been detected through the HostGator operator and the first digits of the IP address are: 119.18.xxx.xxx. Releasing complete IP addresses in the past has not proven useful, as the servers are quickly shut down and relocated, which is why only the first two octets of the IP address are revealed.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Citizen Lab's research reveals that FinFisher “remote monitoring solutions” were found in India, which, according to Gamma Group's brochures, include the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy: &lt;/b&gt;hardware or software which monitors targets that regularly change location, use encrypted and anonymous communications channels and reside in foreign countries. FinSpy can remotely monitor computers and encrypted communications, regardless of where in the world the target is based. FinSpy is capable of bypassing 40 regularly tested antivirus systems, of monitoring the calls, chats, file transfers, videos and contact lists on Skype, of conducting live surveillance through a webcam and microphone, of silently extracting files from a hard disk, and of conducting a live remote forensics on target systems. FinSpy is hidden from the public through anonymous proxies.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy Mobile:&lt;/b&gt; hardware or software which remotely monitors mobile phones. FinSpy Mobile enables the interception of mobile communications in areas without a network, and offers access to encrypted communications, as well as to data stored on the devices that is not transmitted. Some key features of FinSpy Mobile include the recording of common communications like voice calls, SMS/MMS and emails, the live surveillance through silent calls, the download of files, the country tracing of targets and the full recording of all BlackBerry Messenger communications. FinSpy Mobile is hidden from the public through anonymous proxies.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly USB: &lt;/b&gt;hardware which is inserted into a computer and which can automatically install the configured software with little or no user-interaction and does not require IT-trained agents when being used in operations. The FinFly USB can be used against multiple systems before being returned to the headquarters and its functionality can be concealed by placing regular files like music, video and office documents on the device. As the hardware is a common, non-suspicious USB device, it can also be used to infect a target system even if it is switched off.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly LAN: &lt;/b&gt;software which can deploy a remote monitoring solution on a target system in a local area network (LAN). Some of the major challenges law enforcement faces are mobile targets, as well as targets who do not open any infected files that have been sent via email to their accounts. FinFly LAN is not only able to deploy a remote monitoring solution on a target´s system in local area networks, but it is also able to infect files that are downloaded by the target, by sending fake software updates for popular software or to infect the target by injecting the payload into visited websites. Some key features of the FinFly LAN include: discovering all computer systems connected to LANs, working in both wired and wireless networks, and remotely installing monitoring solutions through websites visited by the target. FinFly LAN has been used in public hotspots, such as coffee shops, and in the hotels of targets.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly Web:&lt;/b&gt; software which can deploy remote monitoring solutions on a target system through websites. FinFly Web is designed to provide remote and covert infection of a target system by using a wide range of web-based attacks. FinFly Web provides a point-and-click interface, enabling the agent to easily create a custom infection code according to selected modules. It provides fully-customizable web modules, it can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly ISP:&lt;/b&gt; hardware or software which deploys a remote monitoring solution on a target system through an ISP network. FinFly ISP can be installed inside the Internet Service Provider Network, it can handle all common protocols and it can select targets based on their IP address or Radius Logon Name. Furthermore, it can hide remote monitoring solutions in downloads by targets, it can inject remote monitoring solutions as software updates and it can remotely install monitoring solutions through websites visited by the target.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Although FinFisher is supposed to be used for “lawful interception”, it has gained notoriety for targeting human rights activists.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; &lt;span&gt;According to &lt;/span&gt;Morgan Marquis-Boire, a security researcher and technical advisor at the Munk School and a security engineer at Google, FinSpy has been used in Ethiopia to target an opposition group called Ginbot.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; Researchers have argued that FinFisher has been sold to Bahrain's government to target activists, and such allegations were based on an examination of malicious software which was emailed to Bahraini activists.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Privacy International has argued that FinFisher has been deployed in Turkmenistan, possibly to target activists and political dissidents.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Many questions revolving around the use of FinFisher and its “remote monitoring solutions” remain   vague, as there is currently inadquate proof of whether this spyware is being used to target individuals by law enforcement agencies in the countries where command and control servers have been found, such as India.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; However, FinFisher's brochures which were circulated in the ISS world trade shows and leaked by WikiLeaks do reveal some confirmed facts: Gamma International claims that its FinFisher products are capable of taking control of target computers, of capturing encrypted data  and of evading mainstream anti-virus software.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; Such products are exhibited in the world's largest surveillance trade show and probably sold to law enforcement agencies around the world.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;This alone unveils a concerning fact: spyware which is so sofisticated that it even evades encryption and anti-virus software is currently in the market and law enforcement agencies can potentially use it to target activists and anyone who does not comply with social conventions.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;A few months ago, two Indian women were arrested after having questioned the shutdown of Mumbai for Shiv Sena patriarch Bal Thackeray's funeral.&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;Thus, it remains unclear what type of behaviour is targeted by law enforcement agencies and whether spyware, such as FinFisher, would be used in India to track individuals without a legally specified purpose.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, India lacks privacy legislation which could safeguard individuals from potential abuse, while sections 66A and 69 of the Information Technology (Amendment) Act, 2008, empower Indian authorities with extensive surveillance capabilites.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;While it remains unclear if Indian law enforcement agencies are using FinFisher spy products to unlawfully target individuals, it is a fact that FinFisher control and command servers have been found in India and that, if used, they could potentially have severe consequences on individuals' right to privacy and other human rights.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;The Myth of Harmless Metadata&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;Over the last months, it has been reported that the Central Monitoring System (CMS) is being implemented in India, through which all telecommunications and Internet communications in the country are being centrally intercepted by Indian authorities. This mass surveillance of communications in India is enabled by the omission of privacy legislation and Indian authorities are currently capturing the metadata of communications.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Last month, Edward Snowden leaked confidential U.S documents on PRISM, the top-secret  National Security Agency (NSA) surveillance programme that collects metadata through telecommunications and Intenet communications. It has been reported that through PRISM, the NSA has tapped into the servers of nine leading Internet companies: Microsoft, Google, Yahoo, Skype, Facebook, YouTube, PalTalk, AOL and Apple.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; While the extent to which the NSA is actually tapping into these servers remains unclear, it is certain that the NSA has collected metadata on a global level.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; Yet, the question of whether the collection of metadata is “harmful” remains ambiguous.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to the National Information Standards Organization (NISO), the term “metadata” is defined as “structured information that describes, explains, locates or otherwise makes it easier to retrieve, use or manage an information resource”. NISO claims that metadata is “data about data” or “information about information”.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; Furthermore, metadata is considered valuable due to its following functions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Resource discovery&lt;/li&gt;
&lt;li&gt;Organizing electronic resources&lt;/li&gt;
&lt;li&gt;Interoperability&lt;/li&gt;
&lt;li&gt;Digital Identification&lt;/li&gt;
&lt;li&gt;Archiving and preservation&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Metadata can be used to find resources by relevant criteria, to identify resources, to bring similar resources together, to distinguish dissimilar resources and to give location information. Electronic resources can be organized through the use of various software tools which can automatically extract and reformat information for Web applications. Interoperability is promoted through metadata, as describing a resource with metadata allows it to be understood by both humans and machines, which means that data can automatically be processed more effectively. Digital identification is enabled through metadata, as most metadata schemes include standard numbers for unique identification. Moreover, metadata enables the archival and preservation of large volumes of digital data.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Surveillance projects, such as PRISM and India's CMS, collect large volumes of metadata, which include the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number, email addresses, IP addresses and browsed webpages.&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; However, the fact that such surveillance projects may not have access to content data might potentially create a false sense of security.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt; When Microsoft released its report on data requests by law enforcement agencies around the world in March 2013, it revealed that most of the  disclosed data was metadata, while relatively very little content data was allegedly disclosed.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;imilarily, Google's transparency report reveals that the company disclosed large volumes of metadata to law enforcement agencies, while restricting its disclosure of content data.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such reports may potentially provide a sense of security to the public, as they reassure that the content of  personal emails, for example, has not been shared with the government, but merely email addresses – which might be publicly available online anyway. However, is content data actually more “harmful” than metadata? Is metadata “harmless”? How much data does metadata actually reveal?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Guardian recently published an article which includes an example of how individuals can be tracked through their metadata. In particular, the example explains how an individual is tracked – despite using an anonymous email account – by logging in from various hotels' public Wi-Fi and by leaving trails of metadata that include times and locations. This example illustrates how an individual can be tracked through metadata alone, even when anonymous accounts are being used.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Wired published an article which states that metadata can potentially be more harmful than content data because “unlike our words, metadata doesn't lie”. In particular, content data shows what an individual says – which may be true or false – whereas metadata includes what an individual does. While the validity of the content within an email may potentially be debateable, it is undeniable that an individual logged into specific websites – if that is what that individuals' IP address shows. Metadata, such as the browsing habits of an individual, may potentially provide a more thorough and accurate profile of an individual than that individuals' email content, which is why metadata can potentially be more harmful than content data.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, voice content is hard to process and written content in an email or chat communication may not always be valid. Metadata, on the other hand, provides concrete patterns of an individuals' behaviour, interests and interactions. For example, metadata can potentially map out an individuals' political affiliation, interests, economic background, institution, location, habits and the people that individual interacts with. Such data can potentially be more valuable than content data, because while the validity of email content is debateable, metadata usually provides undeniable facts. Not only is metadata more accurate than content data, but it is also ideally suited to automated analysis by a computer. As most metadata includes numeric figures, it can easily be analysed by data mining software, whereas content data is more complicated.&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, provide solid proof that the collection of metadata can potentially be “harmful”. In particular, FinFly LAN can be deployed in a target system in a local area network (LAN) by infecting files that are downloaded by the target, by sending fake software updates for popular software or by infecting the payload into visited websites. The fact that FinFly LAN can remotely install monitoring solutions through websites visited by the target indicates that metadata alone can be used to acquire other sensitive data.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFly Web can deploy remote monitoring solutions on a target system through websites. Additionally, FinFly Web can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt; FinFly ISP can select targets based on their IP address or Radius Logon Name. Furthermore, FinFly ISP can remotely install monitoring solutions through websites visited by the target, as well as inject remote monitoring solutions as software updates.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; In other words, FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, can target individuals, take control of their computers and their data, and capture even encrypted data and communications with the help of metadata alone.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The example of FinFisher products illustrates that metadata can potentially be as “harmful” as content data, if acquired unlawfully and without individual consent.&lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; Thus, surveillance schemes, such as PRISM and India's CMS, which capture metadata without individuals' consent can potentially pose a major threat to the right to privacy and other human rights.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; Privacy can be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt; Furthermore, privacy is at the core of human rights because it protects individuals from abuse by those in power.&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt; The unlawful collection of metadata exposes individuals to the potential violation of their human rights, as it is not transparent who has access to their data, whether it is being shared with third parties or for how long it is being retained.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;It is not clear if Indian law enforcement agencies are actually using FinFisher products, but the Citizen Lab did find FinFisher command and control servers in the country which indicates that there is a high probability that such spyware is being used.&lt;a href="#fn49" name="fr49"&gt;[49] &lt;/a&gt;This probability is highly concerning not only because the specific spy products have such advanced capabilities that they are even capable of capturing encrypted data, but also because India currently lacks privacy legislation which could safeguard individuals.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Thus, it is recommended that Indian law enforcement agencies are transparent and accountable if they are using spyware which can potentially breach their citizens' human rights and that privacy legislation is enacted into law. Lastly, it is recommended that all surveillance technologies are strictly regulated with regards to the protection of human rights and that Indian authorities adopt the principles on communication surveillance formulated by the Electronic Frontier Foundation and Privacy International.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt; The above could provide a decisive first step in ensuring that India is the democracy it claims to be.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Robert Anderson (2013), &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;a class="external-link" href="http://bit.ly/fnkGF3"&gt;http://bit.ly/fnkGF3&lt;/a&gt;&lt;a href="http://www.finfisher.com/FinFisher/en/index.php"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Michael Lewis, &lt;i&gt;“FinFisher Surveillance Spyware Spreads to Smartphones”, &lt;/i&gt;&lt;span&gt;The Star: Business, 30 August 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sF2IQ"&gt;http://bit.ly/14sF2IQ&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Marcel Rosenbach, &lt;i&gt;“Troublesome Trojans: Firm Sought to Install Spyware Via Faked iTunes Updates”, &lt;/i&gt;&lt;span&gt;Der Spiegel, 22 November 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sETVV"&gt;http://bit.ly/14sETVV&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Intercept Review, &lt;i&gt;Mozilla to Gamma: stop disguising your FinSpy as Firefox, &lt;/i&gt;&lt;span&gt;02 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/131aakT"&gt;http://bit.ly/131aakT&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Intercept Review, &lt;i&gt;LI Companies Review (3) – Gamma, &lt;/i&gt;&lt;span&gt;05 April 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/Hof9CL"&gt;http://bit.ly/Hof9CL&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy Mobile: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19pPObx"&gt;http://bit.ly/19pPObx&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly USB: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cJSu4h"&gt;http://bit.ly/1cJSu4h&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Jeremy Kirk, &lt;i&gt;“FinFisher Spyware seen Targeting Victims in Vietnam, Ethiopia”, &lt;/i&gt;&lt;span&gt;Computerworld: IDG News, 14 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J8BwW"&gt;http://bit.ly/14J8BwW&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Reporters without Borders: For Freedom of Information (2012), &lt;i&gt;The Enemies of the Internet: Special Edition: Surveillance, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/10FoTnq"&gt;http://bit.ly/10FoTnq&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. Privacy International, &lt;i&gt;FinFisher Report, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/QlxYL0"&gt;http://bit.ly/QlxYL0&lt;/a&gt;&lt;span&gt;&lt;a href="https://www.privacyinternational.org/finfisherreport"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013,&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Adi Robertson, &lt;i&gt;“Paranoia Thrives at the ISS World Cybersurveillance Trade Show”, &lt;/i&gt;&lt;span&gt;The Verge, 28 December 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/tZvFhw"&gt;http://bit.ly/tZvFhw&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. BBC News, &lt;i&gt;“India arrests over Facebook post criticising Mumbai shutdown”, &lt;/i&gt;&lt;span&gt;19 November 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/WoSXkA"&gt;http://bbc.in/WoSXkA&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Indian Ministry of Law, Justice and Company Affairs, &lt;i&gt;The Information Technology (Amendment) Act, 2008, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/19pOO7t"&gt;http://bit.ly/19pOO7t&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Phil Muncaster, &lt;i&gt;“India introduces Central Monitoring System”, &lt;/i&gt;&lt;span&gt;The Register, 08 May 2013,&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt;http://bit.ly/ZOvxpP&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Glenn Greenwald &amp;amp; Ewen MacAskill, &lt;i&gt;“NSA PRISM program taps in to user data of Apple, Google and others”, &lt;/i&gt;&lt;span&gt;The Guardian, 07 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1baaUGj"&gt;http://bit.ly/1baaUGj&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. BBC News, &lt;i&gt;“Google, Facebook and Microsoft seek data request transparency”, &lt;/i&gt;&lt;span&gt;12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/14UZCCm"&gt;http://bbc.in/14UZCCm&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. National Information Standards Organization (2004), &lt;i&gt;Understanding Metadata, &lt;/i&gt;&lt;span&gt;NISO Press, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/LCSbZ"&gt;http://bit.ly/LCSbZ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. The Hindu, &lt;i&gt;“In the dark about 'India's PRISM'”, &lt;/i&gt;&lt;span&gt;16 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bJCXg3"&gt;http://bit.ly/1bJCXg3&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.thehindu.com/sci-tech/technology/in-the-dark-about-indias-prism/article4817903.ece"&gt;&lt;/a&gt; ; Glenn Greenwald, &lt;/span&gt;&lt;i&gt;“NSA collecting phone records of millions of Verizon customers daily”, &lt;/i&gt;&lt;span&gt;The Guardian, 06 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/16L89yo"&gt;http://bit.ly/16L89yo&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. Microsoft: Corporate Citizenship, &lt;i&gt;2012 Law Enforcement Requests Report,&lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/Xs2y6D"&gt;http://bit.ly/Xs2y6D&lt;/a&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Google, &lt;i&gt;Transparency Report&lt;/i&gt;&lt;span&gt;, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J7hKp"&gt;http://bit.ly/14J7hKp&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. Guardian US Interactive Team, &lt;i&gt;A Guardian Guide to your Metadata, &lt;/i&gt;&lt;span&gt;The Guardian, 12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZJLkpy"&gt;http://bit.ly/ZJLkpy&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. Matt Blaze, &lt;i&gt;“Phew, NSA is Just Collecting Metadata. (You Should Still Worry)”, &lt;/i&gt;&lt;span&gt;Wired, 19 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bVyTJF"&gt;http://bit.ly/1bVyTJF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files,&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Shalini Singh, &lt;i&gt;“India's surveillance project may be as lethal as PRISM”, &lt;/i&gt;&lt;span&gt;The Hindu, 21 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/15oa05N"&gt;http://bit.ly/15oa05N&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. Cyberspace Law and Policy Centre, &lt;i&gt;Privacy, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/14J5u7W"&gt;http://bit.ly/14J5u7W&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.cyberlawcentre.org/genl0231/privacy.htm"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. Bruce Schneier, &lt;i&gt;“Privacy and Power”, &lt;/i&gt;&lt;span&gt;Schneier on Security, 11 March 2008, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/i2I6Ez"&gt;http://bit.ly/i2I6Ez&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. Elonnai Hickok, &lt;i&gt;“Draft International Principles on Communications Surveillance and Human Rights”, &lt;/i&gt;&lt;span&gt;The Centre for Internet and Society, 16 January 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata'&gt;https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-13T11:30:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/finding-needles-in-haystacks-discussing-the-role-of-automated-filtering-in-the-new-indian-intermediary-liability-rules">
    <title>Finding Needles in Haystacks - Discussing the Role of Automated Filtering in the New Indian Intermediary Liability Rules </title>
    <link>https://cis-india.org/internet-governance/blog/finding-needles-in-haystacks-discussing-the-role-of-automated-filtering-in-the-new-indian-intermediary-liability-rules</link>
    <description>
        &lt;b&gt;On the 25th of February this year The Government of India notified the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021. The new Rules broaden the scope of which entities can be considered as intermediaries to now include curated-content platforms (Netflix) as well as digital news publications. This blogpost analyzes the rule on automated filtering, in the context of the growing use of automated content moderation. 
&lt;/b&gt;
        
&lt;p class="p1"&gt;&lt;span class="s1"&gt;This article first &lt;a class="external-link" href="https://www.law.kuleuven.be/citip/blog/finding-needles-in-haystacks/"&gt;appeared&lt;/a&gt; on the KU Leuven's Centre for IT and IP (CITIP) blog. Cross-posted with permission.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;----&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Mathew Sag in his 2018 &lt;a href="https://scholarship.law.nd.edu/cgi/viewcontent.cgi?article=4761&amp;amp;context=ndlr"&gt;&lt;span class="s2"&gt;paper&lt;/span&gt;&lt;/a&gt; on internet safe harbours discussed how the internet resulted in a shift from the traditional gatekeepers of knowledge (publishing houses) that used to decide what knowledge could be showcased, to a system where everybody who has access to the internet can showcase their work. A “&lt;em&gt;content creator&lt;/em&gt;” today ranges from legacy media companies to any person who has access to a smartphone and an internet connection. In a similar trajectory, with the increase in websites and mobile apps and the functions that they serve, the scope of what is an internet intermediary has widened all over the world.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;strong&gt;Who is an Intermediary?&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;In India the definition of “&lt;em&gt;intermediary&lt;/em&gt;” is found under Section 2(w) of the &lt;a href="https://www.meity.gov.in/writereaddata/files/itbill2000.pdf"&gt;&lt;span class="s2"&gt;Information Technology (IT) Act 2000&lt;/span&gt;&lt;/a&gt;, which defines an Intermediary as &lt;em&gt;“with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecoms service providers, network service providers, internet service providers, web-hosting service providers, search engines, online payment sites, online-auction sites, online-marketplaces and cyber cafes”.&lt;/em&gt; The all-encompassing nature of the definition has allowed the dynamic nature of intermediaries to be included under the definition of the Act, and the Guidelines that have been&amp;nbsp; published periodically (&lt;a href="https://www.meity.gov.in/writereaddata/files/GSR314E_10511%25281%2529_0.pdf"&gt;&lt;span class="s2"&gt;2011&lt;/span&gt;&lt;/a&gt;, &lt;a href="https://www.meity.gov.in/writereaddata/files/Draft_Intermediary_Amendment_24122018.pdf"&gt;&lt;span class="s2"&gt;2018&lt;/span&gt;&lt;/a&gt; and &lt;a href="https://www.meity.gov.in/writereaddata/files/Intermediary_Guidelines_and_Digital_Media_Ethics_Code_Rules-2021.pdf"&gt;&lt;span class="s2"&gt;2021&lt;/span&gt;&lt;/a&gt;). With more websites and social media companies, and even more content creators online today, there is a need to look at ways in which intermediaries can remove illegal content or content that goes against their community guidelines.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Along with the definition of an intermediary, the IT Act, under Section 79, provides exemptions which grant safe harbours to internet intermediaries, from liability from third-party content, and further empowers the central government to make Rules that act as guidelines for the intermediaries to follow. The Intermediary Liability Rules hence seek to regulate content and lay down safe harbour provisions for intermediaries and internet service providers. To keep up with the changing nature of the internet and internet intermediaries, India relies on the Intermediary Liability Rules to regulate and provide a conducive environment for intermediaries. In view of this provision India has as of now published three versions of the Intermediary Liability (IL) Rules. The first Rules came out in&lt;a href="https://www.meity.gov.in/writereaddata/files/GSR314E_10511%25281%2529_0.pdf"&gt;&lt;span class="s2"&gt; 2011&lt;/span&gt;&lt;/a&gt;, followed by the introduction of draft amendments to the law in&lt;a href="https://www.meity.gov.in/writereaddata/files/Draft_Intermediary_Amendment_24122018.pdf"&gt;&lt;span class="s2"&gt; 2018&lt;/span&gt;&lt;/a&gt; and finally the latest &lt;a href="https://www.meity.gov.in/writereaddata/files/Intermediary_Guidelines_and_Digital_Media_Ethics_Code_Rules-2021.pdf"&gt;&lt;span class="s2"&gt;2021 &lt;/span&gt;&lt;/a&gt;version, which would supersede the earlier Rules of 2011.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;strong&gt;The Growing Use of Automated Content Moderation&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;With each version of the Rules there seemed to be changes that ensured that they were abreast with the changing face of the internet and the changing nature of both content and content creator. Hence the 2018 version of the Rules showcase a push towards automated content filtering. The text of Rule 3(9) reads as follows: “&lt;em&gt;The Intermediary shall deploy technology based automated tools or appropriate mechanisms, with appropriate controls, for proactively identifying and removing or disabling public access to unlawful information or content&lt;/em&gt;”.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Under Rule 3(9), intermediaries were required to deploy automated tools or appropriate mechanisms to proactively identify, remove or disable public access to unlawful content. However, neither the 2018 IL Rules, nor the parent Act (the IT Act) specified which content can be deemed unlawful. The 2018 Rules also failed to establish the specific responsibilities of the intermediaries, instead relying on vague terms like “&lt;em&gt;appropriate mechanisms&lt;/em&gt;” and with “&lt;em&gt;appropriate controls&lt;/em&gt;”. Hence it can be seen that though the Rules mandated the use of automated tools, neither them nor the IT Act provided clear guidelines on what could be removed.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;The lack of clear guidelines and list of content that can be removed had&amp;nbsp; left the decision up to the intermediaries to decide which content, if not actively removed, could cost them their immunity. It has been previously documented that the lack of clear guidelines in the 2011 version of the &lt;a href="https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet"&gt;&lt;span class="s2"&gt;Rules&lt;/span&gt;&lt;/a&gt;, led to intermediaries over complying with take down notices, often taking down content that did not warrant it. The existing tendency to over-comply, combined&amp;nbsp; with automated filtering could have resulted in a number of &lt;a href="https://cis-india.org/internet-governance/how-india-censors-the-web-websci#:~:text=One%2520of%2520the%2520primary%2520ways,certain%2520websites%2520for%2520its%2520users."&gt;&lt;span class="s2"&gt;unwarranted take downs&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;While the 2018 Rules mandated the deployment of automated tools, the year 2020, (possibly due to the pandemic induced work from home safety protocols and global lockdowns) saw major social media companies announcing the move towards a fully automated system of content&lt;a href="https://www.medianama.com/2020/03/223-facebook-content-moderation-coronavirus-medianamas-take/"&gt;&lt;span class="s2"&gt; moderation&lt;/span&gt;&lt;/a&gt;. Though the use of automated content removal seems like the right step considering the &lt;a href="https://www.businessinsider.in/tech/news/facebook-content-moderator-who-quit-reportedly-wrote-a-blistering-letter-citing-stress-induced-insomnia-among-other-trauma/articleshow/82075608.cms"&gt;&lt;span class="s2"&gt;trauma &lt;/span&gt;&lt;/a&gt;that human moderators had to go through,&amp;nbsp; the algorithms that are being used now to remove content are relying on the parameters, practices and data from earlier removals made by the human moderators. More recently, in India with the emergence of the second wave of the COVID19&amp;nbsp; wave, the Ministry of Electronics and Information Technology has &lt;a href="https://www.thehindu.com/news/national/govt-asks-social-media-platforms-to-remove-100-covid-19-related-posts/article34406733.ece"&gt;&lt;span class="s2"&gt;asked &lt;/span&gt;&lt;/a&gt;social media platforms to remove “&lt;em&gt;unrelated, old and out of the context images or visuals, communally sensitive posts and misinformation about COVID19 protocols&lt;/em&gt;”.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;strong&gt;The New IL Rules - A ray of hope?&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s3"&gt;The 2021 version of the IL Rules provides a more nuanced approach to the use of automated content filtering compared to the earlier version. Rule 4(4) now requires only “&lt;/span&gt;&lt;span class="s1"&gt;significant social media intermediaries” to use automated tools to identity and take down content pertaining to “child sexual abuse material”, or “depicting rape”, or any information which is identical to a content that has already been removed through a take-down notice. The Rules define a social media intermediary as “&lt;em&gt;intermediary which primarily or solely enables interaction between two or more users and allows them to create, upload, share, disseminate, modify or access information using its services”&lt;/em&gt; .The Rules also go a step further to create another type of intermediary, the&amp;nbsp; significant social media intermediary. A significant social media intermediary is defined as one “&lt;em&gt;having a number of registered users in India above such threshold as notified by the Central Government&lt;/em&gt;''. Hence what can be considered as a social media intermediary that qualifies as a significant one could change at any time.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s4"&gt;Along with adding a new threshold (qualifying as a significant social media intermediary) the Rules, in contrast to the 2018 version, also emphasises the need of such removal to be &lt;/span&gt;&lt;span class="s1"&gt;proportionate to the interests of freedom of speech and expression and privacy of users. The Rules also call for “&lt;em&gt;appropriate human oversight&lt;/em&gt;” as well as a periodic review of the tools used for content moderation. The Rules by using the term “&lt;em&gt;shall endeavor&lt;/em&gt;” aids in reducing the pressure on the intermediary to set up these mechanisms. This also means&amp;nbsp; that the requirement is now on a best effort basis, as opposed to the word “&lt;em&gt;shall&lt;/em&gt;” in the 2018 version of the Rules, which made it mandatory.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Although the Rules now narrow down the instances where automated content removal can take place, the concerns around over compliance and censorship still loom. One of the reasons for concern is that the Rules still fail to require the intermediaries to set up a mechanism for redress or for appeals to such removal. Additionally, the provision that states that automated systems could remove content that have been previously taken down, creates a cause for worry as the propensity of the intermediaries to over comply and take down content has already been documented. This then brings us back to the previous issue where the social media company’s automated systems were removing legitimate news sources. Though the 2021 Rules tries to clarify certain provisions related to automated filtering, like the addition of the safeguards, the Rules also suffer from vague provisions that could cause issues related to compliance. The use of terms such as “&lt;em&gt;proportionate&lt;/em&gt;”, “&lt;em&gt;having regard to free speech&lt;/em&gt;” etc. fail to lay down definitive directions for the intermediaries (in this case SSMI) to comply with. Additionally, as earlier stated, being qualified&amp;nbsp; as a SSMI can change at any time, either based on the change in the number of users, or the change in the threshold of users, mandated by the government. The absence of human intervention during removal, vague guidelines and fear of losing out on safe harbour provisions, add to the already increasing trend of censorship in social media. With the use of automated means and the fast, and almost immediate removal of content would mean that certain content creators might not even be able to post their content &lt;a href="https://www.eff.org/wp/unfiltered-how-youtubes-content-id-discourages-fair-use-and-dictates-what-we-see-online"&gt;&lt;span class="s2"&gt;online.&lt;/span&gt;&lt;span class="s5"&gt; With the use of proactive filtering through automated means the content can be removed almost immediately.&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class="s6"&gt; &lt;/span&gt;&lt;span class="s1"&gt;With India’s current trend of new internet users, some of these creators would also be &lt;a href="https://timesofindia.indiatimes.com/business/india-business/for-the-first-time-india-has-more-rural-net-users-than-urban/articleshow/75566025.cms"&gt;&lt;span class="s2"&gt;first time users&lt;/span&gt;&lt;/a&gt; of the internet.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s1"&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s1"&gt;The need for automated removal of content is understandable, based not only on&amp;nbsp; the sheer volume of content but also&amp;nbsp; the nightmare stories of the toll it takes on human content moderators, who otherwise have to go through hours of disturbing content. Though the Indian Intermediary Liability Guidelines have improved from the earlier versions in terms of moving away from mandating proactive filtering, there still needs to be consideration of how these technologies are used, and the laws should understand the shift in the definition of who a content creator is. There needs to be ways of recourse to unfair removal of content and a means to get an explanation of why the content was removed, via notices to the user. In the case of India, the notices should be in Indian languages as well, so that the people are able to understand them.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s1"&gt;In the absence of further clear guidelines, the perils of over-censorship by the intermediaries in order to stay out of trouble could lead to further stifling of not just freedom of speech but also access to information. In addition, the fear of content being taken down or even potential prosecution could mean that people resort to self-censorship, preventing them from exercising their fundamental rights to freedom of speech and expression, as guaranteed by the Indian Constitution. We hope that the next version of the Rules take a more nuanced approach to automated content removal and ensure adequate and specific safeguards to ensure a conducive environment for both intermediaries and content creators.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/finding-needles-in-haystacks-discussing-the-role-of-automated-filtering-in-the-new-indian-intermediary-liability-rules'&gt;https://cis-india.org/internet-governance/blog/finding-needles-in-haystacks-discussing-the-role-of-automated-filtering-in-the-new-indian-intermediary-liability-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Torsha Sarkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2021-08-03T07:28:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp">
    <title>Find ways to trace origin of messages: Government to WhatsApp</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp</link>
    <description>
        &lt;b&gt;Unhappy with the steps taken so far by WhatsApp, the government plans to trace the origins of incendiary messages spread on its platform.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/find-ways-to-trace-origin-of-messages-government-to-whatsapp/articleshow/65880372.cms"&gt;Economic Times&lt;/a&gt; on September 20, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Electronics and IT (MeitY) is drafting a letter — its third since July to the Facebook-owned platform — asking it to design a technology-led solution to the issue that in the past has led to mob lynching or riots in the country. Since India first raising its concerns, WhatsApp has announced measures such as limiting forwards to five groups at a time from the earlier 250, identifying forwarded messages, and a publicity campaign against fake news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government says these measures may not be enough. “It’s a reasonable demand from us, and very much doable. The third letter will reiterate that WhatsApp is not meeting all our concerns,” said a top government official, who did not want to be identified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If WhatsApp feels the solution given by the government for traceability goes against its end-to-end encryption policy, then the company should be able to find a solution on its own which is technically feasible without compromising on its offering, the official said. “We are not asking them to look into the contents of the message, but if some message has been forwarded, say, 100 times and has caused some law and order problem, then they should be able to identify where it originated from,” he said, adding that WhatsApp cannot absolve itself from responsibility in the name of user privacy. “We are not being unfair since we can’t allow anonymous publishing.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp could not be immediately reached for comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some analysts say the government’s demand from WhatsApp is reasonable and the company could provide traceability using metadata without compromising on encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“For basic level of traceability, storing the metadata is enough,” said Sunil Abraham, executive director of Center of Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“For the kind of traceability that the Indian government is asking for, WhatsApp may have to break its end-toend encryption. But other kind of traceablity, such as who is messaging whom, how many times, who are the propagators of messages, and who are receivers, can all be seen through storing just metadata.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just like every organisation used to store copies of end-of-end encrypted emails on their own servers, similarly WhatsApp can either store copies of encrypted messages or the metadata, he said. Last month, at a meeting between Union minister for electronics and IT Ravi Shankar Prasad and WhatsApp CEO Chris Daniels, the government asked the company to appoint a grievance officer in India, set up an Indian entity, and ensure traceability of messages.&lt;br /&gt;While the company agreed to register a corporate entity and build a team here, a stalemate over the issue of traceability continues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“(WhatsApp) needs to find solutions to deal with sinister developments like mob lynching and revenge porn and has to follow Indian law,” Prasad said in August. “It does not take rocket science to locate a message being circulated in hundreds and thousands...&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(WhatsApp) must have a mechanism to find a solution.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp has maintained that people rely on the platform for all kinds of sensitive conversations, including with their doctors, banks and families. “Building traceability would undermine end-to-end encryption and the private nature of WhatsApp, creating the potential for serious misuse. WhatsApp will not weaken the privacy protections we provide,” the company’s spokesperson said in August after the demand from the Indian government on traceability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The official quoted earlier reiterated that the government is notasking the company to break its end-to-end encryption, adding that if the company could find ways to tag non-original content with ‘forward’ labels and flag some links as spurious, it could also find a way around this problem.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp'&gt;https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-24T02:53:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy_uidfinancialinclusion">
    <title>Financial Inclusion and the UID</title>
    <link>https://cis-india.org/internet-governance/privacy_uidfinancialinclusion</link>
    <description>
        &lt;b&gt;Since 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project,
the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Why the UID could bring financial inclusion&lt;/h3&gt;
&lt;p&gt;In their strategy document “Exclusion to Inclusion with Micro payments” the UIDAI argues that a few&amp;nbsp;of many challenges to successful financial inclusion in India for the poor have been: lack of identity,&amp;nbsp;lack of accessibility of financial outlets, unreliability of infrastructure, high costs of banking, and the&amp;nbsp;common presence of a middle man. For Indian banks the UID sites challenges such as: the high cost of&amp;nbsp;transactions for banks servicing clients in rural areas, lack of infrastructure, costly processes of cash&amp;nbsp;management, and high costs of IT.(UIDAI, 2010)The UID's solution to these obstacles is a system of&amp;nbsp;financial services and micro payments based off of an individuals UID number, in which an individual&amp;nbsp;with a UID number would be able to: open a bank account, make a payment, withdraw money, deposit&amp;nbsp;money, and send remittances. The hope is that this system will allow banks to scale up their branch&amp;nbsp;less banking, and reach out to larger populations. Residents having a bank account linked to their UID&amp;nbsp;number is also key to the UID's larger scheme for subsidy delivery to the poor. Until all consumers who&amp;nbsp;rely on government subsidies have a bank account linked to their UID number, the UID will not be&amp;nbsp;able to implement a system of direct transfer of cash subsidies.(CNBC-TV18, 2011) For example, the&amp;nbsp;UIDAI has started conducting a pilot disbursement of funds under the Mahatma Gandhi National Rural&amp;nbsp;Employment Guarantee Scheme (MNREGS) to Jharkhand through Union Bank, ICICI Bank and Bank&amp;nbsp;of India branches.(IBN-Live, 2011)&lt;/p&gt;
&lt;h3&gt;How the UID will bring financial inclusion&lt;/h3&gt;
&lt;p&gt;In their vision, the UIDAI has designed a system that involves bank branches enrolling individuals,&amp;nbsp;bank branches establishing relationships with BC organizations, the use of Micro ATM's, and the use of&amp;nbsp;the UID numbers for authentication in all financial transactions. In short the system of financial&amp;nbsp;inclusion would work as follows:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 1. Enroll and obtain UID number&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An individual enrolls for a UID number. During enrollment an individual shares his/her KYC&amp;nbsp;information with the UIDAI. The UIDAI verifies the individuals KYC information, along with their&amp;nbsp;other information, and issues the individual a UID number. If an individual already has a bank account&amp;nbsp;at the time of enrollment they have the option to link their UID number to their bank account [1]&lt;/p&gt;
&lt;p&gt;In India every bank must verify and confirm an individuals KYC information. This is to help reduce&amp;nbsp;tax evasion and fraud. In December 2011, India's Ministry of Finance recognized the Aadhaar number&amp;nbsp;has an officially valid identification to satisfy the KYC norms for opening bank accounts. By verifying&amp;nbsp;an individuals KYC information at the enrollment stage the UIDAI is hoping reduce the amount of&amp;nbsp;paperwork and time needed for an individual to open a bank account. In addition to satisfying KYC&amp;nbsp;norms, the Government of India has also recognized the Aadhaar number as an acceptable form of&amp;nbsp;identity for the purpose of obtaining a mobile connection. By having the UID number accepted for&amp;nbsp;establishing both mobile connections and bank accounts, financial inclusion through mobile banking is&amp;nbsp;encouraged as it allows for individuals who previously had no identity, to join the financial system and&amp;nbsp;mobile network – thus allowing bank accounts to be more accessible than before, and aiding banks by&amp;nbsp;simplifying the process of account opening.(Akhand Tiawari, Anurodh Giri, 2011)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 2. Open UID Enabled Bank Account&lt;/strong&gt;&lt;br /&gt;Now that the individual has a UID number they can open a bank account by presenting their UID&amp;nbsp;number and thumb print to the bank branch for authentication. Currently the one bank enrolling citizens&amp;nbsp;and issuing UID numbers and UID based ATM cards is the Bank of India.(Aggarwal, 2011) Bank of&amp;nbsp;Maharashtra, State Bank of India and Indian Overseas Bank are currently waiting for approval from the&amp;nbsp;UIDAI.(Chavan, 2011) In this scenario the UID number will be the only form of identification needed&amp;nbsp;to open a bank account.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.Make financial transactions with UID number&lt;/strong&gt;&lt;br /&gt;Once a UID Enabled Bank Account (UEBA) is opened, individuals can begin making financial&amp;nbsp;transactions using their UID number and fingerprint. Individuals can access their UEBA through BC&amp;nbsp;institutions. With a UEBA individuals have the option of using four basic banking services:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Store cash for savings through electronic deposits and withdraw only small amounts of cash&lt;/li&gt;&lt;li&gt;Make payments&lt;/li&gt;&lt;li&gt;Send and receive remittances&lt;/li&gt;&lt;li&gt;Acquire balance and transaction history&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Transactions completed through the UID-enabled bank account work similarly to a prepaid mobile&amp;nbsp;system. BC organizations, or Bank Correspondents, are organizations such as SHGs, kirana stores,&amp;nbsp;dairy agents that larger banks develop a business relationship with. The BC organizations handle all&amp;nbsp;transactions at the local level. Using BC organizations as financial outlets is meant to increase the&amp;nbsp;penetration of financial outlets and make financial services more accessible in rural areas. How the&amp;nbsp;process works is: a BC institution begins by depositing a certain amount of money with a larger&amp;nbsp;banking institution. This ‘ prepaid balance’ paid by the BC institution changes with every transaction&amp;nbsp;the BC institution makes. For example, when an individual makes a deposit it decreases as that money&amp;nbsp;is then transferred into an individuals account, and increases when an individual withdraws money,&amp;nbsp;because of the transaction fee that is charged to the individual. When the individual is making a&amp;nbsp;deposit, he pays physical cash to the BC, who in turn makes an electronic transfer from the BC account&amp;nbsp;to the individual's account. When making a withdrawal, the electronic transfer is made from the&amp;nbsp;individual's account to the BC account, and the BC hands out physical cash to the customer, (UIDAI,&amp;nbsp;2010).&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;The micro ATM that is to be used at BC institutions is a hand held device, in this case a mobile phone,&amp;nbsp;attached to a finger print reader. The micro ATM is meant to replace larger ATM’s and reduce the cost&amp;nbsp;that banks incur when establishing full fledged ATM machines. The hand held device will be remotely&amp;nbsp;accessed to the central server of the bank. Currently Italian tech company Telit Communication SpA, is&amp;nbsp;hoping to provide the GSM wireless M2M modules that will allow the wireless device and the wired&amp;nbsp;server to communicate with each other. (Kanth, 2011) The most significant difference between the&amp;nbsp;micro ATM system and the traditional ATM system is that the BC employee executes the transaction.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Though having BC employees carry out financial transactions might eliminate the possibility of a&amp;nbsp;fraudulent ATM being set up, it opens many possibly corrupt doors. How will it be ensured that the&amp;nbsp;transaction is completed without fraud, and how can it be ensured that the Micro-ATM is not&amp;nbsp;fraudulent, or that the BC organization itself is not fraudulent. Though this scenario might sound&amp;nbsp;unlikely, the UID has already experienced difficulties with fake enrollment centers being set up, such as&amp;nbsp;in Pune. (Gadkari, 2011), fake UID papers being issued, as was done in Patna(Tripathi, 2011) and&amp;nbsp;enrollment centers illegally outsourcing work, as the IT company Tera Software was found doing&amp;nbsp;(Prajakta, 2011). If these scenarios have all been tried, it is not unreasonable to see the same being tried&amp;nbsp;with financial institutions.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Challenges to a system of authentication for financial transactions with the biometric based UID number&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Not withstanding the fact that financial inclusion cannot be achieved only through an identity, focusing&amp;nbsp;on the identity component of financial inclusion - in the report Low Cost Secure Transaction Model for&amp;nbsp;Financial Services, published by Nitin Munjal, Ashish Paliwal, and Rajat Moona, from the Indian&amp;nbsp;Institute of Technology, the authors note that present challenges in India to financial inclusion through&amp;nbsp;access to financial institutions include(Munjal, Nitin Paliwal, Ashish Moona, 2011):&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Currently financial transactions require network connectivity to take place. For financial transactions made in rural areas this has lead to both high costs for each transaction and to high fixed IT costs.&lt;/li&gt;&lt;li&gt;Current financial schemes such as mobile banking depend on network connectivity, making the network indispensable, yet 70% of the Indian population is rurally located with limited or no network connectivity.&lt;/li&gt;&lt;li&gt;Current financial service outlets are densely located in urban areas and not rural areas. Rural populations are financially excluded, as in most cases the completion of financial transaction require the presence of financial outlets.&lt;/li&gt;&lt;li&gt;Currently there are no easy safeguards to protect against fake ATMS or fraud, because the current Financial Service Model is based on blind trust of the service outlet – this allows for high rates of fake ATM’s being installed and fraud.&lt;/li&gt;&lt;li&gt;For an individual to access financial services, an identity is required. In most cases the poor lack an identity.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Clearly there are many obstacles that the UID identity card must overcome to successfully authenticate&amp;nbsp;individuals in financial transactions and facilitate financial inclusion. For the system to be successful&amp;nbsp;the UID must at the minimum do the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Accurately generate unique numbers&lt;/li&gt;&lt;li&gt;Capture accurate personal information&lt;/li&gt;&lt;li&gt;Ensure security of the database&lt;/li&gt;&lt;li&gt;Ensure that the technology is secure and accurate&lt;/li&gt;&lt;li&gt;Ensure that only necessary information is collected&lt;/li&gt;&lt;li&gt;Verify BC centers&lt;/li&gt;&lt;li&gt;Provide a secure network that can handle large numbers of transactions&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Possible ways in which the system can go wrong include:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Inaccurate authentication&lt;/li&gt;&lt;li&gt;Delays in authentication&lt;/li&gt;&lt;li&gt;Fraud at the level of the BC institution&lt;/li&gt;&lt;li&gt;Over collection of personal information by banks&lt;/li&gt;&lt;li&gt;Linking of databases by banks, or other agencies&lt;/li&gt;&lt;li&gt;Network failure&lt;/li&gt;&lt;li&gt;Down time of the database&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Though UID enabled bank accounts have yet to be officially established the UID is already&amp;nbsp;experiencing many of the listed difficulties. For instance, in an Indian Express article published on June&amp;nbsp;15th, it was reported that banks are issuing additional UID forms that ask if individuals have credit&amp;nbsp;cards, operate mobile or internet banking accounts, own a two wheeler or four wheeler, or live in a&amp;nbsp;rented or personally owned accommodation. (Indian Express, 2011) Even more alarming is a recent&amp;nbsp;news item from the Deccan Herald, which details the efforts that have been taken by NATGRID to&amp;nbsp;access banking clients personal information, and NATGRID's proposal to tie banking information to a&amp;nbsp;linked database containing information from bank accounts, railways, airlines, stock exchanges,&amp;nbsp;income tax, credit card, immigration records, and telecom service providers. (Arun, 2011)The banks&lt;br /&gt;have refused to give NATGRID access to clients personal information, but the ease at which NATGRID&amp;nbsp;could track and collect information about individuals with the UID is chilling – especially if the UID is&amp;nbsp;linked to almost every bank account in India. Several news reports have also shared experiences of&amp;nbsp;confusion, inconsistent requirements, and unorganized enrollment centers, which place doubt in the&amp;nbsp;accuracy of the information collected and the accuracy of the UID numbers issued.(Tripathi, 2011).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Looking at the technology and operational design of the UEBA system, though the scheme relies on&amp;nbsp;mobile networks, it fails to eliminate the need for connectivity to the central server, because&amp;nbsp;authentication of individuals biometric must be done through comparison of one fingerprint to the&amp;nbsp;central server of all fingerprints. This will not only complicate the effectiveness of delivery of services,&amp;nbsp;as it is possible for connectivity to be limited and slow, but it will also incur large network overhead&amp;nbsp;costs for each transaction that is verified. Furthermore, even though the use of BC institutions as&amp;nbsp;financial service outlets is meant to increases the availability of financial outlets, a dependency is&amp;nbsp;created on BC institutions – as they must be present for any financial transaction to take place.&lt;br /&gt;Additionally, individuals have no way of authenticating and verifying BC institutions. As mentioned&amp;nbsp;earlier this allows for possible scenarios of fraud. Additionally, the UID has not provided any&amp;nbsp;alternative method of identification in the case that the network or technology fails, or if an individuals&amp;nbsp;biometrics are incorrectly rejected.&lt;/p&gt;
&lt;h3&gt;Could the SCOSTA standard be an option?&lt;/h3&gt;
&lt;p&gt;Many developing countries, like Kenya and Brazil, that face similar challenges to financial inclusion&amp;nbsp;have looked towards smart cards as secure methods for authenticating individuals. In 2003 India also&amp;nbsp;implemented a smart card approach to identity management. The SCOSTA standard smart card was&amp;nbsp;introduced with the MNIC national identification scheme. Though the scheme was eventually dropped&amp;nbsp;by the Indian Government, the SCOSTA smart card standard is still a valid option for authentication&amp;nbsp;of individuals in financial transactions. A SCOSTA standard based approach for financial inclusion&amp;nbsp;would include:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Authentication of an individuals key, pass-phrase, and pin. This is known as public keyinfrastructure. This will allow a person to protect their password and easily replace it if stolen.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Authentication through public key infrastructure would not depend on connectivity to thenetwork. This would allow for financial inclusion of populations not connected to networks and not be fully dependent on working networks.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Authentication through public key infrastructure establishes mutual trust of user and institution. This would lower the presence of fraudulent institutions and corrupt transactions.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Connection to a central server is not required for the authentication of an individual in a financial transaction. This will lower the cost of transactions and lower IT overhead costs (ibid Munjal, Nitin Paliwal, Ashish Moona, 2011)&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;Though it is hard to say that a fool proof system of authentication can easily be made, and that system&amp;nbsp;will indeed promote financial inclusion, when comparing the biometric UID number with the SCOSTA&amp;nbsp;standard smart card, there are many benefits to the SCOSTA standard such as ability of individuals to&amp;nbsp;verify banking institutions, no need for connectivity to the central server, and the ability to easily&amp;nbsp;replace lost or stolen pins and passwords. No matter what standard is implemented though, it is&amp;nbsp;important to clearly look at the current implementation, technological, and operational challenges that&amp;nbsp;identification schemes face and the possible ramifications of such challenges before adapting it as a&amp;nbsp;ubiquitous system.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy_uidfinancialinclusion'&gt;https://cis-india.org/internet-governance/privacy_uidfinancialinclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-23T10:36:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate">
    <title>Financial Express hosts #NetNeutralityDebate: ‘Price discrimination can be allowed, but not for the same packet of data’</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate</link>
    <description>
        &lt;b&gt;Trying to cut through the noise on Net Neutrality in India, FICCI in partnership with Financial Express is hosting a panel discussion titled ‘Decoding Net Neutrality’ in New Delhi on Wednesday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://www.financialexpress.com/article/tech/financial-express-to-host-netneutralitydebate/65828/"&gt;published in the Financial Express&lt;/a&gt; on April 24, 2015. Pranesh Prakash participated in the discussion.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Moderated by Sunil Jain, the guests on the Net Neutrality debate  panel are Rajya Sabha MP Rajeev Chandrasekhar, Lok Sabha MP Baijayant  Jay Panda along with ICRIER chief executive Dr Rajat Kathuria, IAMAI  president Dr Subho Ray, Facebook’s head of public policy for South and  Central Asia Ankhi Das, COAI director general Rajan S Mathew, Com First  director Dr Mahesh Uppal and Policy Director of the Centre for Internet  and Society  Pranesh Prakash.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Highlights of the debate:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Starting off the discussion, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said that this issue is all about market abuse and market power and not  as utopian as it sounds. He said that this debate is nothing new as  regulators identified the problem long ago. Chandarasekhar added, “TRAI  had recognized in 2006 that there is an opportunity to abuse by access  providers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Joining the conversation, COAI director general &lt;b&gt;Rajan S Mathew&lt;/b&gt; said, “We have put the cart before the horse. What needs to be addressed first is online governance.”&lt;/p&gt;
&lt;p&gt;Looking forward, ICRIER chief executive &lt;b&gt;Rajat Kathuria&lt;/b&gt; said that we need to figure out the best way to use this privately funded public good. He added, “We still haven’t so far.”&lt;/p&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/-kTsnxtboSU" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;Com First director &lt;b&gt;Dr Mahesh Uppal&lt;/b&gt; tries to find a common ground and said, “Everyone is against ‘arbitrary commercial’ prioritisation or throttling.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Subho Ray&lt;/b&gt; agreed and said, “There should be no blocking, throttling and preferential treatment.”&lt;/p&gt;
&lt;p&gt;Facebook India’s&lt;b&gt; Ankhi Das&lt;/b&gt; said that Internet.org is  not for people who are already on the Internet. She explained, “Our  objective is that it should be free and non-exclusive.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Watch video: It’s free, no one has to pay to join the app, says Ankhi Das, Facebook India, on internet.org&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/3z70Q1-p7Xw" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash,&lt;/b&gt; Policy Director of the Centre  for Internet and Society intervened to add, “An universally affordable  model is important. We must ensure that the diversity that Internet  provides is not lost.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking the conversation further, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said, “I don’t believe data packets can be discriminated except in terms of speed and bandwidth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; interjected, “We do not discriminate, we differentiate. And all businesses differentiate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this point, &lt;b&gt;Rajat Kathuria&lt;/b&gt; said, “Price discrimination is something that should be allowed within boundaries of regulation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Express New Media Editor &lt;b&gt;Nandagopal Rajan&lt;/b&gt; said that, “#NetNeutralityDebate panel agrees that price discrimination can be allowed, but not for the same packet of data.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Jay Panda&lt;/b&gt;, Lok Sabha MP now also joins the  discussion and says, “I have come out in favour of net neutrality  despite the fact that my family will be benefiting from the lack of it.  Whether fragmentation is desirable on the Internet or not, it needs to  be debated. I am not in favour of fragmented access to the Internet.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Watch video: There should be no prioritisation of one brand over another, says Baijayant Jay Panda on Net Neutrality&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/TIN0jiXtVPY" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Underlining his views, &lt;b&gt;Jay Panda&lt;/b&gt; reiterated, “Spectrum may be limited but access won’t be in the future. I am against prioritizing packets over others.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash&lt;/b&gt; gave an overarching view and said,  “Everyone benefits from Internet. What we need to figure out is whether  everyone is getting paid enough.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; said, “It is possible for access providers to make money.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; said, “I think it is not fair to say that telcos can influence the govt.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this &lt;b&gt;Jay Panda&lt;/b&gt; quipped, “The govt has to chip in its share to make the Internet accessible to all.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; says govts have been behind the curve in #NetNeutralityDebate and telcos have benefitted from it.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate'&gt;https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-04-27T02:18:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate">
    <title>Financial Express hosts #NetNeutralityDebate: ‘Price discrimination can be allowed, but not for the same packet of data’</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate</link>
    <description>
        &lt;b&gt;Trying to cut through the noise on Net Neutrality in India, FICCI in partnership with Financial Express is hosting a panel discussion titled “Decoding Net Neutrality” in New Delhi on Wednesday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.financialexpress.com/article/tech/financial-express-to-host-netneutralitydebate/65828/"&gt;published in Financial Express&lt;/a&gt; on April 24, 2015. Pranesh Prakash participated in the discussion.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Trying to cut through the noise on &lt;a href="http://www.financialexpress.com/article/industry/tech/be-neutral-on-the-net/64791/" target="_blank"&gt;Net Neutrality&lt;/a&gt; in India, FICCI in partnership with Financial Express is hosting a  panel discussion titled ‘Decoding Net Neutrality’ in New Delhi on  Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moderated by Sunil Jain, the guests on the Net Neutrality debate  panel are Rajya Sabha MP Rajeev Chandrasekhar, Lok Sabha MP Baijayant  Jay Panda along with ICRIER chief executive Dr Rajat Kathuria, IAMAI  president Dr Subho Ray, Facebook’s head of public policy for South and  Central Asia Ankhi Das, COAI director general Rajan S Mathew, Com First  director Dr Mahesh Uppal and Policy Director of the Centre for Internet  and Society  Pranesh Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Highlights of the debate:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Starting off the discussion, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said that this issue is all about market abuse and market power and not  as utopian as it sounds. He said that this debate is nothing new as  regulators identified the problem long ago. Chandarasekhar added, “TRAI  had recognized in 2006 that there is an opportunity to abuse by access  providers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Joining the conversation, COAI director general &lt;b&gt;Rajan S Mathew&lt;/b&gt; said, “We have put the cart before the horse. What needs to be addressed first is online governance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Looking forward, ICRIER chief executive &lt;b&gt;Rajat Kathuria&lt;/b&gt; said that we need to figure out the best way to use this privately funded public good. He added, “We still haven’t so far.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Com First director &lt;b&gt;Dr Mahesh Uppal&lt;/b&gt; tries to find a common ground and said, “Everyone is against ‘arbitrary commercial’ prioritisation or throttling.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Subho Ray&lt;/b&gt; agreed and said, “There should be no blocking, throttling and preferential treatment.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook India’s&lt;b&gt; Ankhi Das&lt;/b&gt; said that Internet.org is  not for people who are already on the Internet. She explained, “Our  objective is that it should be free and non-exclusive.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash,&lt;/b&gt; Policy Director of the Centre  for Internet and Society intervened to add, “An universally affordable  model is important. We must ensure that the diversity that Internet  provides is not lost.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking the conversation further, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said, “I don’t believe data packets can be discriminated except in terms of speed and bandwidth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; interjected, “We do not discriminate, we differentiate. And all businesses differentiate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this point, &lt;b&gt;Rajat Kathuria&lt;/b&gt; said, “Price discrimination is something that should be allowed within boundaries of regulation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Express New Media Editor &lt;b&gt;Nandagopal Rajan&lt;/b&gt; said that, “#NetNeutralityDebate panel agrees that price discrimination can be allowed, but not for the same packet of data.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt;, Lok Sabha MP now also joins the  discussion and says, “I have come out in favour of net neutrality  despite the fact that my family will be benefiting from the lack of it.  Whether fragmentation is desirable on the Internet or not, it needs to  be debated. I am not in favour of fragmented access to the Internet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Underlining his views, &lt;b&gt;Jay Panda&lt;/b&gt; reiterated, “Spectrum may be limited but access won’t be in the future. I am against prioritizing packets over others.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash&lt;/b&gt; gave an overarching view and said,  “Everyone benefits from Internet. What we need to figure out is whether  everyone is getting paid enough.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; said, “It is possible for access providers to make money.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; said, “I think it is not fair to say that telcos can influence the govt.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this &lt;b&gt;Jay Panda&lt;/b&gt; quipped, “The govt has to chip in its share to make the Internet accessible to all.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; says govts have been behind the curve in #NetNeutralityDebate and telcos have benefitted from it.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate'&gt;https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-05-09T10:05:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs">
    <title>Financial CERT to combat cyber threats, says MoS home affairs</title>
    <link>https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs</link>
    <description>
        &lt;b&gt;To tackle cyber threats to India’s financial institutions, the central government is mulling to establish a financial Computer Emergency Response Team (CERT).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://www.cisomag.com/financial-cert-combat-cyber-threats-says-mos-home-affairs/"&gt;CISO MAG&lt;/a&gt; on November 17, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Addressing the 15th Asia Pacific Computer Emergency Response Team (APCERT) Open Conference in New Delhi on November 15, 2017, IT Secretary Ajay Prakash Sawhney said, “right now, the one which is directly being worked on is the financial CERT. We are getting the framework in place and once that is there, we will look at other sectors. It will oversee the entire financial sector including banks and financial institutions.”&lt;br /&gt;&lt;br /&gt;In March this year, the power ministry had announced to create four sectoral CERTs for cybersecurity in power systems: CERT (Transmission), CERT (Thermal), CERT (Hydro), and CERT (Distribution).&lt;br /&gt;&lt;br /&gt;Udbhav Tiwari, program manager at the Centre for Internet and Society, a Bengaluru-based think tank, highlighted the responsibilities of the financial CERT in a conversation with Live Mint.  “The biggest task of sectoral CERT is to share information with the others in the industry. For example, if a bank undergoes an attack, normally the bank will perform all the necessary actions to limit the attack and to prevent it from happening in the future. But the obligation of sharing how the attack happened with all the other banks in India to make sure that they can protect their respective systems from such an attack, can be carried out by a financial CERT,” he said.&lt;br /&gt;&lt;br /&gt;Cybersecurity Chief Gulshan Rai, who was also present at the event, said “from April to October 2017, around 50,000 cyber security incidents have been handled by CERT-In; including phishing, malware attacks, attacks on digital payments and targeted attacks on some of the critical industries.”&lt;br /&gt;&lt;br /&gt;On August 1, 2017, MoS home affairs Hansraj Gangaram Ahir had said “as per the information by the Indian computer emergency response team (CERT-In), 50 incidents affecting 19 financial organizations have been reported during the period of November, 2016 to June, 2017.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs'&gt;https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-23T16:07:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/finance-and-privacy.pdf">
    <title>Finance and Privacy</title>
    <link>https://cis-india.org/internet-governance/finance-and-privacy.pdf</link>
    <description>
        &lt;b&gt;Financial privacy involves the protection of consumers from unlawful access to financial accounts by private and public bodies, and the unlawful disclosure, sharing, or commercial use of financial information.
&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/finance-and-privacy.pdf'&gt;https://cis-india.org/internet-governance/finance-and-privacy.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-28T04:40:27Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
