<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1991 to 2005.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy_uidfinancialinclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/finance-and-privacy.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/figi-symposium-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/firn-convening-design"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/feminist-information-infrastructure-workshop-with-blank-noise-and-sangama"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-new-icann-bylaws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/privacy_uidfinancialinclusion">
    <title>Financial Inclusion and the UID</title>
    <link>https://cis-india.org/internet-governance/privacy_uidfinancialinclusion</link>
    <description>
        &lt;b&gt;Since 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project,
the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Why the UID could bring financial inclusion&lt;/h3&gt;
&lt;p&gt;In their strategy document “Exclusion to Inclusion with Micro payments” the UIDAI argues that a few&amp;nbsp;of many challenges to successful financial inclusion in India for the poor have been: lack of identity,&amp;nbsp;lack of accessibility of financial outlets, unreliability of infrastructure, high costs of banking, and the&amp;nbsp;common presence of a middle man. For Indian banks the UID sites challenges such as: the high cost of&amp;nbsp;transactions for banks servicing clients in rural areas, lack of infrastructure, costly processes of cash&amp;nbsp;management, and high costs of IT.(UIDAI, 2010)The UID's solution to these obstacles is a system of&amp;nbsp;financial services and micro payments based off of an individuals UID number, in which an individual&amp;nbsp;with a UID number would be able to: open a bank account, make a payment, withdraw money, deposit&amp;nbsp;money, and send remittances. The hope is that this system will allow banks to scale up their branch&amp;nbsp;less banking, and reach out to larger populations. Residents having a bank account linked to their UID&amp;nbsp;number is also key to the UID's larger scheme for subsidy delivery to the poor. Until all consumers who&amp;nbsp;rely on government subsidies have a bank account linked to their UID number, the UID will not be&amp;nbsp;able to implement a system of direct transfer of cash subsidies.(CNBC-TV18, 2011) For example, the&amp;nbsp;UIDAI has started conducting a pilot disbursement of funds under the Mahatma Gandhi National Rural&amp;nbsp;Employment Guarantee Scheme (MNREGS) to Jharkhand through Union Bank, ICICI Bank and Bank&amp;nbsp;of India branches.(IBN-Live, 2011)&lt;/p&gt;
&lt;h3&gt;How the UID will bring financial inclusion&lt;/h3&gt;
&lt;p&gt;In their vision, the UIDAI has designed a system that involves bank branches enrolling individuals,&amp;nbsp;bank branches establishing relationships with BC organizations, the use of Micro ATM's, and the use of&amp;nbsp;the UID numbers for authentication in all financial transactions. In short the system of financial&amp;nbsp;inclusion would work as follows:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 1. Enroll and obtain UID number&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An individual enrolls for a UID number. During enrollment an individual shares his/her KYC&amp;nbsp;information with the UIDAI. The UIDAI verifies the individuals KYC information, along with their&amp;nbsp;other information, and issues the individual a UID number. If an individual already has a bank account&amp;nbsp;at the time of enrollment they have the option to link their UID number to their bank account [1]&lt;/p&gt;
&lt;p&gt;In India every bank must verify and confirm an individuals KYC information. This is to help reduce&amp;nbsp;tax evasion and fraud. In December 2011, India's Ministry of Finance recognized the Aadhaar number&amp;nbsp;has an officially valid identification to satisfy the KYC norms for opening bank accounts. By verifying&amp;nbsp;an individuals KYC information at the enrollment stage the UIDAI is hoping reduce the amount of&amp;nbsp;paperwork and time needed for an individual to open a bank account. In addition to satisfying KYC&amp;nbsp;norms, the Government of India has also recognized the Aadhaar number as an acceptable form of&amp;nbsp;identity for the purpose of obtaining a mobile connection. By having the UID number accepted for&amp;nbsp;establishing both mobile connections and bank accounts, financial inclusion through mobile banking is&amp;nbsp;encouraged as it allows for individuals who previously had no identity, to join the financial system and&amp;nbsp;mobile network – thus allowing bank accounts to be more accessible than before, and aiding banks by&amp;nbsp;simplifying the process of account opening.(Akhand Tiawari, Anurodh Giri, 2011)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 2. Open UID Enabled Bank Account&lt;/strong&gt;&lt;br /&gt;Now that the individual has a UID number they can open a bank account by presenting their UID&amp;nbsp;number and thumb print to the bank branch for authentication. Currently the one bank enrolling citizens&amp;nbsp;and issuing UID numbers and UID based ATM cards is the Bank of India.(Aggarwal, 2011) Bank of&amp;nbsp;Maharashtra, State Bank of India and Indian Overseas Bank are currently waiting for approval from the&amp;nbsp;UIDAI.(Chavan, 2011) In this scenario the UID number will be the only form of identification needed&amp;nbsp;to open a bank account.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.Make financial transactions with UID number&lt;/strong&gt;&lt;br /&gt;Once a UID Enabled Bank Account (UEBA) is opened, individuals can begin making financial&amp;nbsp;transactions using their UID number and fingerprint. Individuals can access their UEBA through BC&amp;nbsp;institutions. With a UEBA individuals have the option of using four basic banking services:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Store cash for savings through electronic deposits and withdraw only small amounts of cash&lt;/li&gt;&lt;li&gt;Make payments&lt;/li&gt;&lt;li&gt;Send and receive remittances&lt;/li&gt;&lt;li&gt;Acquire balance and transaction history&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Transactions completed through the UID-enabled bank account work similarly to a prepaid mobile&amp;nbsp;system. BC organizations, or Bank Correspondents, are organizations such as SHGs, kirana stores,&amp;nbsp;dairy agents that larger banks develop a business relationship with. The BC organizations handle all&amp;nbsp;transactions at the local level. Using BC organizations as financial outlets is meant to increase the&amp;nbsp;penetration of financial outlets and make financial services more accessible in rural areas. How the&amp;nbsp;process works is: a BC institution begins by depositing a certain amount of money with a larger&amp;nbsp;banking institution. This ‘ prepaid balance’ paid by the BC institution changes with every transaction&amp;nbsp;the BC institution makes. For example, when an individual makes a deposit it decreases as that money&amp;nbsp;is then transferred into an individuals account, and increases when an individual withdraws money,&amp;nbsp;because of the transaction fee that is charged to the individual. When the individual is making a&amp;nbsp;deposit, he pays physical cash to the BC, who in turn makes an electronic transfer from the BC account&amp;nbsp;to the individual's account. When making a withdrawal, the electronic transfer is made from the&amp;nbsp;individual's account to the BC account, and the BC hands out physical cash to the customer, (UIDAI,&amp;nbsp;2010).&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;The micro ATM that is to be used at BC institutions is a hand held device, in this case a mobile phone,&amp;nbsp;attached to a finger print reader. The micro ATM is meant to replace larger ATM’s and reduce the cost&amp;nbsp;that banks incur when establishing full fledged ATM machines. The hand held device will be remotely&amp;nbsp;accessed to the central server of the bank. Currently Italian tech company Telit Communication SpA, is&amp;nbsp;hoping to provide the GSM wireless M2M modules that will allow the wireless device and the wired&amp;nbsp;server to communicate with each other. (Kanth, 2011) The most significant difference between the&amp;nbsp;micro ATM system and the traditional ATM system is that the BC employee executes the transaction.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Though having BC employees carry out financial transactions might eliminate the possibility of a&amp;nbsp;fraudulent ATM being set up, it opens many possibly corrupt doors. How will it be ensured that the&amp;nbsp;transaction is completed without fraud, and how can it be ensured that the Micro-ATM is not&amp;nbsp;fraudulent, or that the BC organization itself is not fraudulent. Though this scenario might sound&amp;nbsp;unlikely, the UID has already experienced difficulties with fake enrollment centers being set up, such as&amp;nbsp;in Pune. (Gadkari, 2011), fake UID papers being issued, as was done in Patna(Tripathi, 2011) and&amp;nbsp;enrollment centers illegally outsourcing work, as the IT company Tera Software was found doing&amp;nbsp;(Prajakta, 2011). If these scenarios have all been tried, it is not unreasonable to see the same being tried&amp;nbsp;with financial institutions.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Challenges to a system of authentication for financial transactions with the biometric based UID number&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Not withstanding the fact that financial inclusion cannot be achieved only through an identity, focusing&amp;nbsp;on the identity component of financial inclusion - in the report Low Cost Secure Transaction Model for&amp;nbsp;Financial Services, published by Nitin Munjal, Ashish Paliwal, and Rajat Moona, from the Indian&amp;nbsp;Institute of Technology, the authors note that present challenges in India to financial inclusion through&amp;nbsp;access to financial institutions include(Munjal, Nitin Paliwal, Ashish Moona, 2011):&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Currently financial transactions require network connectivity to take place. For financial transactions made in rural areas this has lead to both high costs for each transaction and to high fixed IT costs.&lt;/li&gt;&lt;li&gt;Current financial schemes such as mobile banking depend on network connectivity, making the network indispensable, yet 70% of the Indian population is rurally located with limited or no network connectivity.&lt;/li&gt;&lt;li&gt;Current financial service outlets are densely located in urban areas and not rural areas. Rural populations are financially excluded, as in most cases the completion of financial transaction require the presence of financial outlets.&lt;/li&gt;&lt;li&gt;Currently there are no easy safeguards to protect against fake ATMS or fraud, because the current Financial Service Model is based on blind trust of the service outlet – this allows for high rates of fake ATM’s being installed and fraud.&lt;/li&gt;&lt;li&gt;For an individual to access financial services, an identity is required. In most cases the poor lack an identity.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Clearly there are many obstacles that the UID identity card must overcome to successfully authenticate&amp;nbsp;individuals in financial transactions and facilitate financial inclusion. For the system to be successful&amp;nbsp;the UID must at the minimum do the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Accurately generate unique numbers&lt;/li&gt;&lt;li&gt;Capture accurate personal information&lt;/li&gt;&lt;li&gt;Ensure security of the database&lt;/li&gt;&lt;li&gt;Ensure that the technology is secure and accurate&lt;/li&gt;&lt;li&gt;Ensure that only necessary information is collected&lt;/li&gt;&lt;li&gt;Verify BC centers&lt;/li&gt;&lt;li&gt;Provide a secure network that can handle large numbers of transactions&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Possible ways in which the system can go wrong include:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Inaccurate authentication&lt;/li&gt;&lt;li&gt;Delays in authentication&lt;/li&gt;&lt;li&gt;Fraud at the level of the BC institution&lt;/li&gt;&lt;li&gt;Over collection of personal information by banks&lt;/li&gt;&lt;li&gt;Linking of databases by banks, or other agencies&lt;/li&gt;&lt;li&gt;Network failure&lt;/li&gt;&lt;li&gt;Down time of the database&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Though UID enabled bank accounts have yet to be officially established the UID is already&amp;nbsp;experiencing many of the listed difficulties. For instance, in an Indian Express article published on June&amp;nbsp;15th, it was reported that banks are issuing additional UID forms that ask if individuals have credit&amp;nbsp;cards, operate mobile or internet banking accounts, own a two wheeler or four wheeler, or live in a&amp;nbsp;rented or personally owned accommodation. (Indian Express, 2011) Even more alarming is a recent&amp;nbsp;news item from the Deccan Herald, which details the efforts that have been taken by NATGRID to&amp;nbsp;access banking clients personal information, and NATGRID's proposal to tie banking information to a&amp;nbsp;linked database containing information from bank accounts, railways, airlines, stock exchanges,&amp;nbsp;income tax, credit card, immigration records, and telecom service providers. (Arun, 2011)The banks&lt;br /&gt;have refused to give NATGRID access to clients personal information, but the ease at which NATGRID&amp;nbsp;could track and collect information about individuals with the UID is chilling – especially if the UID is&amp;nbsp;linked to almost every bank account in India. Several news reports have also shared experiences of&amp;nbsp;confusion, inconsistent requirements, and unorganized enrollment centers, which place doubt in the&amp;nbsp;accuracy of the information collected and the accuracy of the UID numbers issued.(Tripathi, 2011).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Looking at the technology and operational design of the UEBA system, though the scheme relies on&amp;nbsp;mobile networks, it fails to eliminate the need for connectivity to the central server, because&amp;nbsp;authentication of individuals biometric must be done through comparison of one fingerprint to the&amp;nbsp;central server of all fingerprints. This will not only complicate the effectiveness of delivery of services,&amp;nbsp;as it is possible for connectivity to be limited and slow, but it will also incur large network overhead&amp;nbsp;costs for each transaction that is verified. Furthermore, even though the use of BC institutions as&amp;nbsp;financial service outlets is meant to increases the availability of financial outlets, a dependency is&amp;nbsp;created on BC institutions – as they must be present for any financial transaction to take place.&lt;br /&gt;Additionally, individuals have no way of authenticating and verifying BC institutions. As mentioned&amp;nbsp;earlier this allows for possible scenarios of fraud. Additionally, the UID has not provided any&amp;nbsp;alternative method of identification in the case that the network or technology fails, or if an individuals&amp;nbsp;biometrics are incorrectly rejected.&lt;/p&gt;
&lt;h3&gt;Could the SCOSTA standard be an option?&lt;/h3&gt;
&lt;p&gt;Many developing countries, like Kenya and Brazil, that face similar challenges to financial inclusion&amp;nbsp;have looked towards smart cards as secure methods for authenticating individuals. In 2003 India also&amp;nbsp;implemented a smart card approach to identity management. The SCOSTA standard smart card was&amp;nbsp;introduced with the MNIC national identification scheme. Though the scheme was eventually dropped&amp;nbsp;by the Indian Government, the SCOSTA smart card standard is still a valid option for authentication&amp;nbsp;of individuals in financial transactions. A SCOSTA standard based approach for financial inclusion&amp;nbsp;would include:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Authentication of an individuals key, pass-phrase, and pin. This is known as public keyinfrastructure. This will allow a person to protect their password and easily replace it if stolen.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Authentication through public key infrastructure would not depend on connectivity to thenetwork. This would allow for financial inclusion of populations not connected to networks and not be fully dependent on working networks.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Authentication through public key infrastructure establishes mutual trust of user and institution. This would lower the presence of fraudulent institutions and corrupt transactions.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Connection to a central server is not required for the authentication of an individual in a financial transaction. This will lower the cost of transactions and lower IT overhead costs (ibid Munjal, Nitin Paliwal, Ashish Moona, 2011)&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;Though it is hard to say that a fool proof system of authentication can easily be made, and that system&amp;nbsp;will indeed promote financial inclusion, when comparing the biometric UID number with the SCOSTA&amp;nbsp;standard smart card, there are many benefits to the SCOSTA standard such as ability of individuals to&amp;nbsp;verify banking institutions, no need for connectivity to the central server, and the ability to easily&amp;nbsp;replace lost or stolen pins and passwords. No matter what standard is implemented though, it is&amp;nbsp;important to clearly look at the current implementation, technological, and operational challenges that&amp;nbsp;identification schemes face and the possible ramifications of such challenges before adapting it as a&amp;nbsp;ubiquitous system.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy_uidfinancialinclusion'&gt;https://cis-india.org/internet-governance/privacy_uidfinancialinclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-23T10:36:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate">
    <title>Financial Express hosts #NetNeutralityDebate: ‘Price discrimination can be allowed, but not for the same packet of data’</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate</link>
    <description>
        &lt;b&gt;Trying to cut through the noise on Net Neutrality in India, FICCI in partnership with Financial Express is hosting a panel discussion titled ‘Decoding Net Neutrality’ in New Delhi on Wednesday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://www.financialexpress.com/article/tech/financial-express-to-host-netneutralitydebate/65828/"&gt;published in the Financial Express&lt;/a&gt; on April 24, 2015. Pranesh Prakash participated in the discussion.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Moderated by Sunil Jain, the guests on the Net Neutrality debate  panel are Rajya Sabha MP Rajeev Chandrasekhar, Lok Sabha MP Baijayant  Jay Panda along with ICRIER chief executive Dr Rajat Kathuria, IAMAI  president Dr Subho Ray, Facebook’s head of public policy for South and  Central Asia Ankhi Das, COAI director general Rajan S Mathew, Com First  director Dr Mahesh Uppal and Policy Director of the Centre for Internet  and Society  Pranesh Prakash.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Highlights of the debate:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Starting off the discussion, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said that this issue is all about market abuse and market power and not  as utopian as it sounds. He said that this debate is nothing new as  regulators identified the problem long ago. Chandarasekhar added, “TRAI  had recognized in 2006 that there is an opportunity to abuse by access  providers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Joining the conversation, COAI director general &lt;b&gt;Rajan S Mathew&lt;/b&gt; said, “We have put the cart before the horse. What needs to be addressed first is online governance.”&lt;/p&gt;
&lt;p&gt;Looking forward, ICRIER chief executive &lt;b&gt;Rajat Kathuria&lt;/b&gt; said that we need to figure out the best way to use this privately funded public good. He added, “We still haven’t so far.”&lt;/p&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/-kTsnxtboSU" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;Com First director &lt;b&gt;Dr Mahesh Uppal&lt;/b&gt; tries to find a common ground and said, “Everyone is against ‘arbitrary commercial’ prioritisation or throttling.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Subho Ray&lt;/b&gt; agreed and said, “There should be no blocking, throttling and preferential treatment.”&lt;/p&gt;
&lt;p&gt;Facebook India’s&lt;b&gt; Ankhi Das&lt;/b&gt; said that Internet.org is  not for people who are already on the Internet. She explained, “Our  objective is that it should be free and non-exclusive.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Watch video: It’s free, no one has to pay to join the app, says Ankhi Das, Facebook India, on internet.org&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/3z70Q1-p7Xw" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash,&lt;/b&gt; Policy Director of the Centre  for Internet and Society intervened to add, “An universally affordable  model is important. We must ensure that the diversity that Internet  provides is not lost.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking the conversation further, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said, “I don’t believe data packets can be discriminated except in terms of speed and bandwidth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; interjected, “We do not discriminate, we differentiate. And all businesses differentiate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this point, &lt;b&gt;Rajat Kathuria&lt;/b&gt; said, “Price discrimination is something that should be allowed within boundaries of regulation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Express New Media Editor &lt;b&gt;Nandagopal Rajan&lt;/b&gt; said that, “#NetNeutralityDebate panel agrees that price discrimination can be allowed, but not for the same packet of data.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Jay Panda&lt;/b&gt;, Lok Sabha MP now also joins the  discussion and says, “I have come out in favour of net neutrality  despite the fact that my family will be benefiting from the lack of it.  Whether fragmentation is desirable on the Internet or not, it needs to  be debated. I am not in favour of fragmented access to the Internet.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Watch video: There should be no prioritisation of one brand over another, says Baijayant Jay Panda on Net Neutrality&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/TIN0jiXtVPY" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Underlining his views, &lt;b&gt;Jay Panda&lt;/b&gt; reiterated, “Spectrum may be limited but access won’t be in the future. I am against prioritizing packets over others.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash&lt;/b&gt; gave an overarching view and said,  “Everyone benefits from Internet. What we need to figure out is whether  everyone is getting paid enough.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; said, “It is possible for access providers to make money.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; said, “I think it is not fair to say that telcos can influence the govt.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this &lt;b&gt;Jay Panda&lt;/b&gt; quipped, “The govt has to chip in its share to make the Internet accessible to all.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; says govts have been behind the curve in #NetNeutralityDebate and telcos have benefitted from it.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate'&gt;https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-04-27T02:18:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate">
    <title>Financial Express hosts #NetNeutralityDebate: ‘Price discrimination can be allowed, but not for the same packet of data’</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate</link>
    <description>
        &lt;b&gt;Trying to cut through the noise on Net Neutrality in India, FICCI in partnership with Financial Express is hosting a panel discussion titled “Decoding Net Neutrality” in New Delhi on Wednesday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.financialexpress.com/article/tech/financial-express-to-host-netneutralitydebate/65828/"&gt;published in Financial Express&lt;/a&gt; on April 24, 2015. Pranesh Prakash participated in the discussion.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Trying to cut through the noise on &lt;a href="http://www.financialexpress.com/article/industry/tech/be-neutral-on-the-net/64791/" target="_blank"&gt;Net Neutrality&lt;/a&gt; in India, FICCI in partnership with Financial Express is hosting a  panel discussion titled ‘Decoding Net Neutrality’ in New Delhi on  Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moderated by Sunil Jain, the guests on the Net Neutrality debate  panel are Rajya Sabha MP Rajeev Chandrasekhar, Lok Sabha MP Baijayant  Jay Panda along with ICRIER chief executive Dr Rajat Kathuria, IAMAI  president Dr Subho Ray, Facebook’s head of public policy for South and  Central Asia Ankhi Das, COAI director general Rajan S Mathew, Com First  director Dr Mahesh Uppal and Policy Director of the Centre for Internet  and Society  Pranesh Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Highlights of the debate:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Starting off the discussion, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said that this issue is all about market abuse and market power and not  as utopian as it sounds. He said that this debate is nothing new as  regulators identified the problem long ago. Chandarasekhar added, “TRAI  had recognized in 2006 that there is an opportunity to abuse by access  providers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Joining the conversation, COAI director general &lt;b&gt;Rajan S Mathew&lt;/b&gt; said, “We have put the cart before the horse. What needs to be addressed first is online governance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Looking forward, ICRIER chief executive &lt;b&gt;Rajat Kathuria&lt;/b&gt; said that we need to figure out the best way to use this privately funded public good. He added, “We still haven’t so far.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Com First director &lt;b&gt;Dr Mahesh Uppal&lt;/b&gt; tries to find a common ground and said, “Everyone is against ‘arbitrary commercial’ prioritisation or throttling.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Subho Ray&lt;/b&gt; agreed and said, “There should be no blocking, throttling and preferential treatment.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook India’s&lt;b&gt; Ankhi Das&lt;/b&gt; said that Internet.org is  not for people who are already on the Internet. She explained, “Our  objective is that it should be free and non-exclusive.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash,&lt;/b&gt; Policy Director of the Centre  for Internet and Society intervened to add, “An universally affordable  model is important. We must ensure that the diversity that Internet  provides is not lost.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking the conversation further, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said, “I don’t believe data packets can be discriminated except in terms of speed and bandwidth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; interjected, “We do not discriminate, we differentiate. And all businesses differentiate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this point, &lt;b&gt;Rajat Kathuria&lt;/b&gt; said, “Price discrimination is something that should be allowed within boundaries of regulation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Express New Media Editor &lt;b&gt;Nandagopal Rajan&lt;/b&gt; said that, “#NetNeutralityDebate panel agrees that price discrimination can be allowed, but not for the same packet of data.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt;, Lok Sabha MP now also joins the  discussion and says, “I have come out in favour of net neutrality  despite the fact that my family will be benefiting from the lack of it.  Whether fragmentation is desirable on the Internet or not, it needs to  be debated. I am not in favour of fragmented access to the Internet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Underlining his views, &lt;b&gt;Jay Panda&lt;/b&gt; reiterated, “Spectrum may be limited but access won’t be in the future. I am against prioritizing packets over others.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash&lt;/b&gt; gave an overarching view and said,  “Everyone benefits from Internet. What we need to figure out is whether  everyone is getting paid enough.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; said, “It is possible for access providers to make money.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; said, “I think it is not fair to say that telcos can influence the govt.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this &lt;b&gt;Jay Panda&lt;/b&gt; quipped, “The govt has to chip in its share to make the Internet accessible to all.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; says govts have been behind the curve in #NetNeutralityDebate and telcos have benefitted from it.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate'&gt;https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-05-09T10:05:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs">
    <title>Financial CERT to combat cyber threats, says MoS home affairs</title>
    <link>https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs</link>
    <description>
        &lt;b&gt;To tackle cyber threats to India’s financial institutions, the central government is mulling to establish a financial Computer Emergency Response Team (CERT).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://www.cisomag.com/financial-cert-combat-cyber-threats-says-mos-home-affairs/"&gt;CISO MAG&lt;/a&gt; on November 17, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Addressing the 15th Asia Pacific Computer Emergency Response Team (APCERT) Open Conference in New Delhi on November 15, 2017, IT Secretary Ajay Prakash Sawhney said, “right now, the one which is directly being worked on is the financial CERT. We are getting the framework in place and once that is there, we will look at other sectors. It will oversee the entire financial sector including banks and financial institutions.”&lt;br /&gt;&lt;br /&gt;In March this year, the power ministry had announced to create four sectoral CERTs for cybersecurity in power systems: CERT (Transmission), CERT (Thermal), CERT (Hydro), and CERT (Distribution).&lt;br /&gt;&lt;br /&gt;Udbhav Tiwari, program manager at the Centre for Internet and Society, a Bengaluru-based think tank, highlighted the responsibilities of the financial CERT in a conversation with Live Mint.  “The biggest task of sectoral CERT is to share information with the others in the industry. For example, if a bank undergoes an attack, normally the bank will perform all the necessary actions to limit the attack and to prevent it from happening in the future. But the obligation of sharing how the attack happened with all the other banks in India to make sure that they can protect their respective systems from such an attack, can be carried out by a financial CERT,” he said.&lt;br /&gt;&lt;br /&gt;Cybersecurity Chief Gulshan Rai, who was also present at the event, said “from April to October 2017, around 50,000 cyber security incidents have been handled by CERT-In; including phishing, malware attacks, attacks on digital payments and targeted attacks on some of the critical industries.”&lt;br /&gt;&lt;br /&gt;On August 1, 2017, MoS home affairs Hansraj Gangaram Ahir had said “as per the information by the Indian computer emergency response team (CERT-In), 50 incidents affecting 19 financial organizations have been reported during the period of November, 2016 to June, 2017.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs'&gt;https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-23T16:07:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/finance-and-privacy.pdf">
    <title>Finance and Privacy</title>
    <link>https://cis-india.org/internet-governance/finance-and-privacy.pdf</link>
    <description>
        &lt;b&gt;Financial privacy involves the protection of consumers from unlawful access to financial accounts by private and public bodies, and the unlawful disclosure, sharing, or commercial use of financial information.
&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/finance-and-privacy.pdf'&gt;https://cis-india.org/internet-governance/finance-and-privacy.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-28T04:40:27Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet">
    <title>Filtering content on the internet</title>
    <link>https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The op-ed was &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-opinion/filtering-content-on-the-internet/article5967959.ece"&gt;published in the Hindu&lt;/a&gt; on May 2, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;On May 5, the Supreme Court will hear Kamlesh Vaswani’s infamous anti-pornography petition again. The petition makes some rather outrageous claims. Watching pornography ‘puts the country’s security in danger’ and it is ‘worse than Hitler, worse than AIDS, cancer or any other epidemic,’ it says. This petition has been pending before the Court since February 2013, and seeks a new law that will ensure that pornography is exhaustively curbed.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Disintegrating into binaries&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The petition assumes that pornography causes violence  against women and children. The trouble with such a claim is that the  debate disintegrates into binaries; the two positions being that  pornography causes violence or that it does not. The fact remains that  the causal link between violence against women and pornography is yet to  be proven convincingly and remains the subject of much debate.  Additionally, since the term pornography refers to a whole range of  explicit content, including homosexual adult pornography, it cannot be  argued that all pornography objectifies women or glamorises violent  treatment of them.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Allowing even for the petitioner’s legitimate concern about  violence against women, it is interesting to note that of all the  remedies available, he seeks the one which is authoritarian but may not  have any impact at all. Mr. Vaswani could have, instead, encouraged the  state to do more toward its international obligations under the  Convention on the Elimination of Discrimination against Women (CEDAW).  CEDAW’s General Recommendation No. 19 is about violence against women  and recommends steps to be taken to reduce violence against women. These  include encouraging research on the extent, causes and effects of  violence, and adopting preventive measures, such as public information  and education programmes, to change attitudes concerning the roles and  status of men and women.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Child pornography&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Although different countries disagree about the necessity  of banning adult pornography, there is general international consensus  about the need to remove child pornography from the Internet. Children  may be harmed in the making of pornography, and would at the very  minimum have their privacy violated to an unacceptable degree. Being  minors, they are not in a position to consent to the act. Each act of  circulation and viewing adds to the harmful nature of child pornography.  Therefore, an argument can certainly be made for the comprehensive  removal of this kind of content.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Indian policy makers have been alive to this issue. The  Information Technology Act (IT Act) contains a separate provision for  material depicting children explicitly or obscenely, stating that those  who circulate such content will be penalised. The IT Act also  criminalises watching child pornography (whereas watching regular  pornography is not a crime in India).&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Intermediaries are obligated to take down child pornography  once they have been made aware that they are hosting it. Organisations  or individuals can proactively identify and report child pornography  online. Other countries have tried, with reasonable success, systems  using hotlines, verification of reports and co-operation of internet  service providers to take down child pornography. However, these systems  have also sometimes resulted in the removal of other legitimate  content.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Filtering speech on the Internet&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Child pornography can be blocked or removed using the IT  Act, which permits the government to send lists of URLs of illegal  content to internet service providers, requiring them to remove this  content. Even private parties can send notices to online intermediaries  informing them of illegal content and thereby making them legally  accountable for such content if they do not remove it. However, none of  this will be able to ensure the disappearance of child pornography from  the Internet in India.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Technological solutions like filtering software that  screens or blocks access to online content, whether at the state,  service provider or user level, can at best make child pornography  inaccessible to most people. People who are more skilled than amateurs  will be able to circumvent technological barriers since these are  barriers only until better technology enables circumvention.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Additionally, attempts at technological filtering usually  even affect speech that is not targeted by the filtering mechanism.  Therefore, any system for filtering or blocking content from the  Internet needs to build in safeguards to ensure that processes designed  to remove child pornography do not end up being used to remove political  speech or speeches that are constitutionally protected.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In the Vaswani case, the government has correctly explained  to the Supreme Court that any greater attempt to monitor pornography is  not technologically feasible. It has pointed out that human monitoring  of content will delay transmission of data substantially, will slow down  the Internet, and will also be ineffective, since the illegal content  can easily be moved to other servers in other countries.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Making intermediaries liable for the content they host will  undo the safe harbour protection granted to them by the IT Act. Without  it, intermediaries like Facebook will actually have to monitor all the  content they host, and the resources required for such monitoring will  reduce the content that makes its way online. This would seriously  impact the extensiveness and diversity of content available on the  Internet in India. Additionally, when demands are made for the removal  of legitimate content, profit-making internet companies will be  disinclined to risk litigation much in the same way as Penguin was  reluctant to defend Wendy Doniger’s book.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;If the Supreme Court makes the mistake of creating a  positive obligation to monitor Internet content for intermediaries, it  will effectively kill the Internet in India.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;i&gt;(Chinmayi Arun &lt;/i&gt;is &lt;i&gt;research director, Centre for  Communication Governance, National Law University, Delhi, and fellow,  Centre for Internet and Society, &lt;/i&gt;Bangalore)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet'&gt;https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-06T09:33:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/figi-symposium-2017">
    <title>FIGI Symposium 2017</title>
    <link>https://cis-india.org/internet-governance/news/figi-symposium-2017</link>
    <description>
        &lt;b&gt;Innovative Approaches to Digital Financial Inclusion Challenges. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The        &lt;strong&gt;first edition of the Financial Inclusion Global Initiative (FIGI) Symposium &lt;/strong&gt;was held in Bangalore, India, from 29 November to 1 December 2017. The Symposium was organized jointly by the Telecommunication Standardization Bureau (TSB) of the International Telecommunication Union (ITU), jointly with  the Bill &amp;amp; Melinda Gates Foundation, the World Bank and the Committee on Payments and Market Infrastructure (CPMI) and the kind support of the Government of India. ​​​​​​​​​​​​​​​​​​&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok participated in the symposium and spoke in the "Security, Infrastructure, and Trust" working group on big data and privacy in DFS. For more info on the symposium, &lt;a class="external-link" href="https://www.itu.int/en/ITU-T/extcoop/figisymposium/2017/Pages/default.aspx"&gt;see here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/figi-symposium-2017'&gt;https://cis-india.org/internet-governance/news/figi-symposium-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-01T16:29:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online">
    <title>Fighting battles online</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online</link>
    <description>
        &lt;b&gt;Internet policy maverick Sunil Abraham feels that accessibility is key to democratising the Internet space.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nikhil Varma was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/internet/internet-policy-maverick-feels-that-accessibility-is-key-to-democratising-the-internet-space/article6369766.ece"&gt;published in the Hindu&lt;/a&gt; on September 2, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Forty-year-old Sunil Abraham essays many roles, of a social  entrepreneur, free software advocate and as policy director of the  Bangalore-based Centre for Internet and Society that focuses on  accessibility, access to knowledge, internet governance, telecom and  digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When he finished his engineering degree and was job hunting in  Bangalore, the internet was an entity he had heard about, but never  worked on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Family constraints meant that I had to look for jobs that paid me more  than the salaries offered by industries for a 9 to 6 job. I decided to  knock doors in the non profit sector. I met T. Pradeep, who ran Samuha,  an NGO in Northern Karnataka that focused on integrated rural  development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil says, “He offered me a job provided I learnt to work on the  Internet. My job was to set up the organisation’s website. By 1998, I  became the head of the IT department. Many spinoffs from Samuha were  also becoming very successful. Pradeep gave us Rs.14 lakh and asked us  to spin off and create a new organisation called Mahiti, with a mandate  to serve non profits and provide them with affordable IT services. I  just came into the picture to fulfil someone else’s dream. We provided  email services to non-profit organisations at affordable rates. We ran a  bulletin board service and also offered a free webpage for select  NGOs.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 99, Sunil was offered an Ashoka fellowship. “It is a US non-profit  that that supports social entrepreneurs. The idea that won me the  fellowship was exploring the democratic potential of the internet. It is  very similar to the work that I do at the CIS. The internet remains a  tool that can be used for empowering and disempowering purposes that  could have hegemonic implications for society. I also worked with the  UNDP, after giving a speech about free and open software at one of their  meetings. I was hired as a consultant.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Till June 07’, Sunil worked with the UNDP, managing the open-source  network spanning 42 countries. “I cut my policy teeth in the UN and  learnt to work with governments and had a better idea of free software  and open content. I made a lot of contacts in the course of my work.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was at the end of the UN stint that philanthropist Anurag Dikshit  decided to set up the Centre for Internet and society in India and Sunil  decided to take up the assignment. “Anurag has been a great help from  the start. His funds have been very vital for the organization.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS deals with a host of issues, ranging from making the internet and  mobile phones disabled friendly to creating more Wikipedia pages in  Indic languages and enhancing internet penetration in rural India. The  organization is also&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With government surveillance taking on newer dimensions in the internet  Sunil says, “Surveillance is like adding salt in cooking. It is  essential in small quantities, but counter productive even if it is  slightly in excess. While surveillance may be a good idea to keep public  servants occupying high office under scrutiny, employing mass  surveillance on everybody may not work well.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He adds, “A rational approach is needed. We believe that privacy is  inversely proportional to the power a person yields, while transparency  is directly proportional to the power a person yields.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil is deeply apprehensive about some of the steps governments take to  stem the flow of information. “A couple of years ago, the government  had banned text messages beyond a certain limit to prevent rumours from  circulating. This resulted in people moving to Whatsapp, which is more  difficult to monitor. The government agencies ended up being the actual  losers. The more unrestricted surveillance, better chances that it could  be compromised.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another vital issue that plagues our times are the limits to free speech  and expression. “Different countries have different sets of laws and  traditions that govern all aspects of life. We have not managed to  arrive on a consensus on food habits, mankind is a long way from  developing a uniform policy about internet usage. In India, there are  some limits on free speech.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He says, “If something is illegal offline, it is bound to illegal  online. I do not think we need specific laws to police the internet. If  you try to ban something, it may end up getting more consumed. It  happened in the case of Wendy Doniger’s book being withdrawn by Penguin.  The sales of the book skyrocketed when it was published by another  publisher.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil adds, “It is an important that good laws are made and these laws  have been enforced properly. Enforceability must also be taken into  account during framing laws.”&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A scanned version of the article published in the newspaper can be found below:&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/CIS.png" alt="CIS" class="image-inline" title="CIS" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online'&gt;https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-09-16T04:19:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy">
    <title>Fifth Meeting of the two Sub-Groups on Privacy Issues under the Chairmanship of Justice AP Shah</title>
    <link>https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy</link>
    <description>
        &lt;b&gt;The fifth meeting of the two sub-groups on privacy issues will be held on July 22, 2012 under the chairmanship of Justice AP Shah, former chief justice of Delhi High Court.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The next meeting of the two Sub-Groups (5th Meeting) on privacy issues under the Chairmanship of Justice A.P. Shah, former Chief Justice of Delhi High Court is scheduled to be held on July 22, 2012 at 11.00 a.m. This was announced vide notice No. M-13040/47/2011-CIT&amp;amp;I, dated the 10th June, 2012.&lt;/p&gt;
&lt;p&gt;A copy of the notice was sent to the following individuals:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Justice AP Shah, Chairman&lt;/li&gt;
&lt;li&gt;Dr. Kamlesh Bajaj&lt;/li&gt;
&lt;li&gt;Usha Ramanathan&lt;/li&gt;
&lt;li&gt;Sunil Abraham&lt;/li&gt;
&lt;li&gt;Prashant Reddy&lt;/li&gt;
&lt;li&gt;Prof. Arghya Sengupta&lt;/li&gt;
&lt;li&gt;Shri Som Mittal&lt;/li&gt;
&lt;li&gt;Shri Gulshan Rai&lt;/li&gt;
&lt;li&gt;Mala Dutt&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy'&gt;https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Meeting</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-08-07T10:11:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media">
    <title>Festival scan on social media</title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media</link>
    <description>
        &lt;b&gt;Authorities in a south Karnataka district have started keeping tighter watch on rumour-mongering and hate messages on social media platforms ahead of religious festivals.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published &lt;a class="external-link" href="http://www.telegraphindia.com/1160826/jsp/nation/story_104570.jsp#.V7-0ANeE3oM"&gt;in the Telegraph&lt;/a&gt; on August 26, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Police in the communally sensitive Dakshina Kannada district have cautioned people not to start or circulate any hate message or rumours that could affect law and order.&lt;br /&gt;&lt;br /&gt;"Anyone spreading rumours or hate messages can be charged under IPC Section 505 as we have all the technical capability to find out the origins of such messages," said Mangalore city police commissioner M. Chandra Sekhar.&lt;br /&gt;&lt;br /&gt;This section is applied in the event of any statement or rumour with the intent to cause alarm among the public. "We do get several messages that later turn out to be a hoax," the officer said, citing instances of false rumours.&lt;br /&gt;&lt;br /&gt;The officer exhorted citizens to alert the police the moment they get any such messages so that it could minimise or even prevent any damage, especially if the content is communally sensitive.&lt;br /&gt;&lt;br /&gt;The district authorities have already ramped up police presence to prevent anything untoward in view of the activities of cow vigilantes who recently lynched a BJP worker for transporting calves in neighbouring Udupi district.&lt;br /&gt;&lt;br /&gt;A source in the state police department hinted the measure could be replicated across the state, although other districts are not as communally sensitive like Dakshina Kannada.&lt;br /&gt;&lt;br /&gt;The district - Mangalore is its administrative headquarters - had been in the thick of communal tension for decades.&lt;br /&gt;&lt;br /&gt;Bhushan Gulabrao Borase, superintendent of police in charge of the Dakshina Kannada rural district, that is the rest of the district except Mangalore city, said keeping a watch on social media had become imperative. "Rural people may be using social media less frequently. But even then we need to be careful," he said.&lt;br /&gt;&lt;br /&gt;Cow vigilantism by Hindutva groups is a major concern.&lt;br /&gt;&lt;br /&gt;He said people could land in trouble for a seemingly harmless message if it causes some serious issue. "It is better not to start such messages. But it's also important not to forward if one receives them," said Borase.&lt;br /&gt;&lt;br /&gt;Sunil Abraham, executive director of The Centre for Internet and Society, had a word of caution, although he appreciated the intent behind the police move.&lt;br /&gt;&lt;br /&gt;"It's a reasonable approach if they stick to the scope of the law (Section 505). The problem is only if police overstep their limits, like we have seen on several occasions."&lt;br /&gt;&lt;br /&gt;But he agreed there was a need to keep an eye on what goes on in social media since many users abuse messaging platforms like WhatsApp.&lt;br /&gt;&lt;br /&gt;"What we don't want is a Nazi Germany where the wife is asked to spy on her husband and the son on the father. But we also don't want the opposite when citizens just ignore everything," he said, asserting that it was the duty of civil society to inform the police if they found anything dangerous being circulated.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media'&gt;https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-26T03:20:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research">
    <title>Feminist Methodology in Technology Research: A Literature Review</title>
    <link>https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research</link>
    <description>
        &lt;b&gt;This literature review has been authored by Ambika Tandon, with contributions from Mukta Joshi. Research assistance was provided by Kumarjeet Ray and Navya Sharma. The publication has been designed by Saumyaa Naidu.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Abstract&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Feminist research methodology is a vast body of knowledge, spanning across multiple disciplines including sociology, media studies, and critical legal studies. This literature review aims to understand key aspects of feminist methodology across these disciplines, with a particular focus on research on technology and its interaction with society. Stemming from the argument that the ontological notion of objectivity effaces power relations in the process of knowledge production, feminist research is critical of the subjects, producers, and nature of knowledge. Section I of the literature review explores this argument along with a range of theoretical concepts, such as standpoint theory and historical materialism, as well as principles of feminist research derived from these, such as intersectionality and reflexivity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given its critique of the "god's eye view" (Madhok and Evans, 2014) of objectivist research, feminist scholars have largely developed qualitative methods that are more conducive to acknowledgement of power hierarchies. Additionally, some scholars have recognised the political value in quantification of inequalities such as the wage gap, and have developed intersectional quantitative methods that aim at narrowing down measurable inequalities. Both sets of methods are explored in Section II of the literature review, interspersed with examples from research focused on technology.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;According to authoritative accounts on the subject, while research focused on gender or women predates its arrival, the field of ‘feminist methodology’ explores questions of epistemology and ontology of research and knowledge. Initiated in scholarship arising out of the second wave of North American feminism, it theoretically anchors itself in the post-modernist and post-structuralist traditions. It additionally critiques positivism for being a project furthering patriarchal oppression. North American feminist scholars critique traditional methods within the social sciences from an epistemological perspective, for producing acontextual and ahistorical knowledge, replicating the tendency of positivist science to enumerate and measure subjective social phenomena. This, according to them, leads to the invisiblising of the web of power relations within which the ‘known’ and ‘knower’ in knowledge production are placed. This is then used to devise methods and underlying principles and ethics for conducting more egalitarian research, aimed at achieving goals of social justice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second wave feminist movement was itself critiqued by Black and other feminists from the global South for being exclusionary of non-white and heterosexual identities. Given its origins in the global North, scholars from the South have interrogated the meaning of feminism and feminist research in their context. Some African scholars even detail difficulty in disclosing a project as feminist publicly due to popular resistance to the term feminism, which stems from it being rejected by certain social groups as an alien social movement that’s antithetical to their “African cultural values." Their own critique of “White feminism” comes from its essentialization of womanhood and the resultant negation of the (neo)colonial and racialised histories of African women. This has led scholars from the global South to critically interrogate feminism and feminist methods. They acknowledge the multiplicity of feminisms, and initiate creative inquiries into different forms of feminist methodology. Feminist researchers that work in contexts of political violence, instability, repression, scarcity of resources, poor infrastructure, and/or lack of social security, have pointed out that traditional research methods assume conditions that are largely absent in their realities, leading them to experiment with feminist research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Feminist research across these variety of contexts raises ontological and epistemological concerns about traditional research methods and underlying assumptions about what can be known, who can know, and the nature of knowledge itself. It argues that knowledge production has historically led to the creation of epistemic hierarchies, wherein certain actors are designated as ‘knowers’ and others as the ‘known’. Such hierarchies wreak epistemic violence upon marginalised subjects by denying them the agency to produce knowledge, and delegitimize forms of knowledge that aren’t normative. Acknowledging the role of power in knowledge production has the radical implication that the subjectivities of the researchers and the researched inherently find their way into research and more broadly, knowledge production. This challenges the objectivity and “god’s eye view” of traditional humanistic knowledge and its processes of production. Feminist research eschews scientifically orthodox notions of how “valid knowledge will look”, and creates novel resources for understanding epistemic marginalization of various kinds. It then provides a myriad of tools to disrupt structural hierarchies through and within knowledge production and dissemination.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Feminist research, given its evolution from living movements and theoretical debates, remains a contested domain. It has reformulated a range of qualitative and quantitative research methods, and also surfaced its own, such as experimental and action-based. What these have in common are theoretical dispositions to identify, critique, and ultimately dismantle power relations within and through research projects. It is thus “critical, political, and praxis oriented. Several disciplines with the social sciences, such as feminist technology studies, cyberfeminism, and cultural anthropology, have built feminist approaches to the study of technology and technologically mediated social relations. However, this continues to remain a minor strand of research on technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This literature review aims to address that gap through scoping of such methods and their application in technological research. Feminist methodology provides a critical lens that allows us to explore questions and areas in technology-based research that are inaccessible by traditional methods. This paper draws on examples from technology-focused research, covering key interdisciplinary feminist methods across fields such as gender studies, sociology, development, and ICT for development. In doing so, it actively constructs a history of feminist methodology through authoritative sources of knowledge.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Read the &lt;a href="https://cis-india.org/internet-governance/feminist-methodoloty-in-technology-research.pdf" class="internal-link"&gt;full paper here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research'&gt;https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ambika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-25T15:18:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/firn-convening-design">
    <title>Feminist Internet Research Network (FIRN) Convening Design </title>
    <link>https://cis-india.org/internet-governance/news/firn-convening-design</link>
    <description>
        &lt;b&gt;Ambika Tandon attended a workshop organized by Association for Progressive Communications for grantees of the Feminist Internet Research Network as a panelist on a session on feminist research methods.. The workshop was held from 27 February to 1 March, in Malaysia. Represented from 8 organizations attended the workshop.&lt;/b&gt;
        &lt;h3&gt;Objectives of the convenining&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;To inaugurate a network of feminist researcher in the field of digital technology for ongoing collaboration, advice and active solidarity.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To start trust building within the network through shared values and plot how it will work and how it will expand.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To facilitate exchange of learnings and capacity building among the network members and other resource persons, in particular.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To facilitate peer-feedback, collaboration and interdisciplinary discussions on research design, methodologies and research plans of the selected projects and other resource persons.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To get feedback on overall FIRN project research methodology/design.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To explore new and innovative methods, as well as get understand key developments and challenges in more established ways of collecting and analysing data in the four areas of the research initiative.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;For more information &lt;a class="external-link" href="https://www.apc.org/en/feminist-internet-research-network-call-research-proposals"&gt;click here&lt;/a&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/firn-convening-design'&gt;https://cis-india.org/internet-governance/news/firn-convening-design&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-03-01T01:08:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/feminist-information-infrastructure-workshop-with-blank-noise-and-sangama">
    <title>Feminist Information Infrastructure Workshop with Blank Noise and Sangama</title>
    <link>https://cis-india.org/internet-governance/news/feminist-information-infrastructure-workshop-with-blank-noise-and-sangama</link>
    <description>
        &lt;b&gt;Akriti Bopanna, Swaraj Paul Barooah and Ambika Tandon as part of the project on Feminist Information Infrastructure, conducted a full-day workshop with Sangama and Blank Noise on August 8, 2018 at CIS, Bangalore.&lt;/b&gt;
        &lt;p&gt;The workshop focused around fleshing out the research projects that interns at Blank Noise and Sangama will be undertaking, and going over ethical guidelines for feminist research for interviews.&lt;/p&gt;
&lt;p&gt;There will be three projects across the two organizations, looking at&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The identification process and challenges therein for the trans community,&lt;/li&gt;
&lt;li&gt;The impact of mobile phone usage on sex work, and&lt;/li&gt;
&lt;li&gt;Impact of social media on the lives of sexual minorities (specifically gay men), focusing on pleasure, social interaction, safety, and peerveillance.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/feminist-information-infrastructure-workshop-with-blank-noise-and-sangama'&gt;https://cis-india.org/internet-governance/news/feminist-information-infrastructure-workshop-with-blank-noise-and-sangama&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ambika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-13T15:21:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-new-icann-bylaws">
    <title>﻿Submission by the Centre for Internet and Society on Draft New ICANN By-laws </title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-new-icann-bylaws</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society sent its comments on the Draft New ICANN Bylaws. The submission was prepared by Pranesh Prakash, Vidushi Marda, Udbhav Tiwari and Swati Muthukumar. Special thanks to Sunil Abraham for his input and feedback.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We at the Centre for Internet and Society are grateful for the opportunity to comment on the draft new ICANN by-laws. Before we comment on specific aspects of the Draft by-laws, we would like to make a few general observations:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadly, there are significant differences between the final form of the by-laws and that which has been recommended by the participants in the IANA transition process through the ICG and the CCWG. They have been shown to be unnecessarily complicated, lopsided, and skewed towards U.S.-based businesses in their past form, which continues to reflect in the current form of the draft by-laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft by-laws are overwrought, but some of that is not the fault of the by-laws, but of the CCWG process itself.  Instead of producing a broad constitutional document for ICANN, the by-laws read like the worst of governmental regulations that go into unnecessary minutiae and create more problems than they solve. Things that ought not to be part of fundamental by-laws — such as the incorporating jurisdiction of PTI, on which no substantive agreement emerged in the ICG — have been included as such.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Simplicity has been seen as a sin and has made participation in this complicated endeavour an even more difficult proposition for those who don’t choose to participate in the dozens of calls held every month. On specific substantive issues, we have the following comments:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jurisdiction of ICANN’s Principal Office&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Maintaining by-law Article XVIII, which states that ICANN has its principal office in Los Angeles, California, USA, these Draft by-laws make an assumption that ICANN’s jurisdiction will not change post transition, even though the jurisdiction of ICANN and its subsidiary bodies is one of the key aspects of post transition discussion to be carried out in Work Stream 2 (WS2). Despite repeated calls to establish ICANN as an international community based organisation (such as the International Red Cross or International Monetary Fund), the question of ICANN's future jurisdiction was deferred to WS2 of the CCWG-Accountability process. All of the new proposed by-laws have been drafted with certainty upon ICANN's jurisdiction remaining in California. Examples of this include the various references to the California Civil Code in the by-laws and repeated references to entities and structures (such as public benefit corporations) in the fundamental by-laws of the ICANN that can only be found in California.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This would make redundant any discussion in WS2 regarding jurisdiction, since they cannot be implemented without upending the decisions relating to accountability structures made in WS1, and embedded in the by-laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS suggests an provision expressly be inserted in the by-laws to allow changes to the by-laws in WS2 insofar as matters relating to jurisdiction and other WS2 issues are concerned, to make it clear that there is a shared understanding that WS2 decisions on jurisdiction are not meant to be redundant.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jurisdiction of the Post-Transition IANA Authority (PTI)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The structure of the by-laws and the nature of the PTI in Article 16 make its Californian jurisdiction integral to the very organisation as a whole and control all its operations, rights and obligations. This is so despite this issue not having been included in the CWG report (except for footnote 59 in the CWG report, and as a requirement proposed by ICANN’s lawyers, to be negotiated with PTI’s lawyers, in Annex S of the CWG report).  The U.S. government’s requirement that the IANA Functions Operator be a U.S.-based body is a requirement that has historically been a cause for concern amongst civil society and governments.  Keeping this requirement in the form of a fundamental by-law is antithetical to the very idea of internationalizing ICANN, and is not something that can be addressed in Work Stream 2.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS expressed its disagreement with the inclusion of the U.S-jurisdiction requirement in Annex S in its comments to the ICG. Nothing in the main text of the CWG or ICG recommendations actually necessitate Californian jurisdiction for the PTI.  Thus, clearly the draft by-laws include this as a fundamental by-law despite it not having achieved any form of documented consensus in any prior process. This being a fundamental by-law would make shifting the PTI’s registered and principal office almost impossible once the by-laws are passed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No reasoning or discussion has been provided to justify the structure, location and legal nature of the PTI. The fact that the revenue structure, by-laws and other details have not even been hinted at in the current document, indicate that the true rights and obligations of PTI have been left at the sole discretion of the ICANN while simultaneously granting it fundamental by-law protection. This is not only deeply problematic on front of delegation of excessive responsibility for a key ICANN function without due oversight but also leads to situation where the community is agreeing to be bound to a body whose fundamental details have not even been created yet, and yet is a fundamental by-law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS would therefore suggest that the PTI related clauses in the by-laws be solely those on which existing global Internet community consensus can be shown, and the PTI’s jurisdiction is not something on which such consensus can be shown to exist.  Therefore the by-laws should be rewritten to make them agnostic to PTI’s jurisdiction. Further, CIS suggests that the law firm appointed for PTI be non-American, since U.S.-based law firms capable law firms in Brazil, France, and India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We would also like to note that we have previously proposed that PTI’s registered office and ICANN’s registered office be in different jurisdictions to increase jurisdictional resilience against governmental and court-based actions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Grandfathering Agreements Clause&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A fair amount of discussion has taken place both in the CCWG mailing list about Section 1.1 (d)(ii), which concerns the inclusion of certain agreements into the scope of protection granted to ICANN from its Mission and Objective statement goals. CIS largely agrees with the positions taken by the IAB and CCWG in their comments of demanding the removal of parts B, C, D E and F of Section 1.1(d)(ii) as all of these are agreements that were not included in the scope of the CCWG Proposal and a fair few of these agreements (such as the PTI agreement) have not even been created yet. This leads to practical and legal issues for the ICANN as well as the community as it restricts possible accountability and transparency measures that may be taken in the future.&lt;br /&gt;CIS as its suggestion therefore agrees with the IAB and CCWG in this regard and supports the request by them that demand by these grandfathering provisions be removed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inspection Rights&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 22.7 severely limits the transparency of ICANN’s functioning, and we believe it should be amended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) It limits Inspection Requests to Decisional Participants and does not allow for any other interested party to make a request for inspection.  While the argument has been made that Californian law requires inspection rights for decisional participants, neither the law nor CCWG’s recommendations require restricting the inspection rights to decisional participants. CIS’s suggestion is to allow for any person in the public to make a request for examination, but to have to declare the nature of the public interest behind requests for non-decisional participants, so that an undue number of requests are not made for the purpose of impairing the operations of the organisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) The unclear but extremely limited definition of ‘permitted scope’, which does not allow one to question any ‘small or isolated aspect’ of ICANN’s functioning, where there is no explicit definition of what constitutes the scope of matters relevant to operation of ICANN as a whole, leaving a loophole for potential exploitation. CIS suggests the removal of this statement and to allow only for limitations listed in Section 22.7 (b) for Inspection Requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) There is no hard deadline provided for the information to be made available to the querying body, thus allowing for inordinate delays on the part of the ICANN, which is open to abuse. CIS suggests the removal of the clause ‘or as soon as reasonably practicable thereafter’ in this section.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The need for insisting that the material be used only for restricted purposes. CIS suggests that as a step towards ICANN’s transparency, it is essential that they allow the use of the information for any reason deemed necessary by the person demanding inspection. There is no clear reason to require restriction to EC proceedings for non-confidential material.  This requirement should be removed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Work Stream 2 Topics&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 27.2, which covers necessary topics for WS2, currently does not include key aspects such as PTI documents, jurisdictional issues, etc. In this light, we suggest that they be included and a clause be inserted to indicate that this list of topics is indicative and the CCWG can expand the scope of items to be worked on in WS2 as well as make changes to work completed in WS1 (such as these by-laws) to meet WS2 needs as well.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;FOI-HR&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 27.3 (a) requires the FOI-HR to be approved by "(ii) each of the CCWG-Accountability’s chartering organizations..” which is inconsistent with the CCWG proposal that forms the basis for these by-laws. The requirement of formal approval from every Chartering Organisation in the current draft is inconsistent with Annex 6 of the CCWG proposal, that has no such requirement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS strongly advocates for a change in the bylaw text to align with the intent of the CCWG Accountability report, and to reflect that the process of developing the FOI-HR shall follow the same procedure as Work Stream 1.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Contracts with ICANN&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 27.5 currently states that “Notwithstanding the adoption or effectiveness of the New by-laws, all agreements, including employment and consulting agreements, entered by ICANN shall continue in effect according to their terms.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the section currently stands, there is a possibility that prior to the creation of by-laws, agreements that may be in contravention of the by-laws may be brought forth intentionally before the commencement of the operation of ICANN’s Mission statement in the said by-laws. The clause may be updated as follows to avoid this —&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Notwithstanding the adoption or effectiveness of the New by-laws, all agreements, including employment and consulting agreements, entered by ICANN shall continue in effect according to their terms, provided that they are in accordance with ICANN’s Mission Statement.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-new-icann-bylaws'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-new-icann-bylaws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-31T02:49:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill">
    <title>Feedback to the NIA Bill</title>
    <link>https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill</link>
    <description>
        &lt;b&gt;Malavika Jayaram and Elonnai Hickok introduce the formal submission of CIS to the proposed National Identification Authority of India (NIA) Bill, 2010, which would give every resident a unique identity. The submissions contain the detailed comments on the draft bill and the high level summary of concerns with the NIA Bill submitted to the UIDAI on 13 July, 2010.&lt;/b&gt;
        
&lt;p&gt;The UID draft bill is a proposed legislation that authorizes the creation of a centralized database of unique identification numbers that will be issued to every resident of India.&amp;nbsp; The purpose of such a database is characterized as ensuring that every resident is provided services and benefits. The UID project was first set up and introduced to the public in February 2009 by the planning committee.&amp;nbsp;&amp;nbsp;&amp;nbsp; In June 2010, a draft bill was proposed which attracted public debates and opinions for over two weeks. Currently the bill is being considered by Parliament in the winter session (July-August 2010). If the Parliament of India approves the bill, it may be enacted during Winter 2010.&lt;/p&gt;
&lt;p&gt;CIS has closely followed the UID project and reviewed the bill right from the time when it was first issued. and has worked to initiate and contribute to a public debate including attending of workshops in Delhi on 6 May, 2010 and in Bangalore on 16 May, 2010.&lt;/p&gt;
&lt;p&gt;We respect the fact that civil society has many voices. That said, in our criticisms, suggestions, and analysis of the UID draft bill, we are asking for a simple, well-defined document, the language and structure of which expressly precludes abuse of a centralized identification database. The document should provide solely for its stated purpose of enabling the provision of benefits to the poor. Along with this mandate we believe the document should give clear rights of choice, control, and privacy to the &lt;em&gt;Aadhaar&lt;/em&gt; number holder. Below is a summary of our general comments with citations to specific sections of the draft bill. A &lt;a href="https://cis-india.org/internet-governance/letter-to-uid-authority" class="internal-link" title="Feedback on the NIA Bill 2010"&gt;detailed&lt;/a&gt; section by section critique is attached along with our &lt;a href="https://cis-india.org/internet-governance/high-level-summary" class="internal-link" title="High Level Summary"&gt;high level summary&lt;/a&gt; of concerns. The compilation and synthesis of detailed critiques was done by Malavika Jayaram.&lt;/p&gt;
&lt;h2&gt;Summary of High Concerns&amp;nbsp;&lt;/h2&gt;
&lt;h3&gt;Clarity of Definition and Purpose&lt;/h3&gt;
&lt;p&gt;Most importantly we find that in order to adhere to the stated purpose of the bill there is a need to limit and better define language in the relevant sections of the bill. This includes the powers and purpose of the Authority and the overarching scheme of the bill. We are concerned that the over-breadth and generality of the language will open up the opportunity for more information to be collected than originally stated. Further, definition will act to prevent uncontrolled or unwanted change in the project’s scope, and will clearly limit the usage of the &lt;em&gt;Aadhaar&lt;/em&gt; numbers to the facilitation of the delivery of social welfare programs.&lt;br /&gt;&lt;br /&gt;For the bill to be in line with its original purpose of reaching out to the poor, we also believe the issue of fees must be addressed. We find that there is an inadequate definition in the bill of what fees shall be applied for authentication of &lt;em&gt;Aadhaar&lt;/em&gt; numbers.&amp;nbsp; Also we find that it is incompatible with the bill’s stated purpose to require an individual to pay to be authenticated. The bill should provide that no charges will be levied for authentication by registrars and other service providers for certain categories of &lt;em&gt;Aadhaar&lt;/em&gt; number holders (BPL, disabled, etc.), and that charges will be limited/capped in other cases. This will bring the bill in line with the statement in Chapter II 3 (1) “Every resident shall be entitled to obtain an &lt;em&gt;Aadhaar&lt;/em&gt; number on providing his demographic information and biometric information to the Authority in such a manner as may be specified by regulations”&amp;nbsp; and Chapter 3 (10 ) “The Authority shall take special measures to issue &lt;em&gt;Aadhaar&lt;/em&gt; numbers to women, children, senior citizens, persons with disability, migrant unskilled and unorganized workers, nomadic tribes or such other persons who do not have any permanent dwelling house and such other categories of individuals as may be specified by regulations. If a fee must be permitted, a cap/safeguard should be put in place to ensure that the fee does not become a mechanism of abuse.&lt;/p&gt;
&lt;h3&gt;Protection of the Citizen&lt;/h3&gt;
&lt;p&gt;The bill should ensure the protection of&amp;nbsp; citizens’ rights to privacy and freedom of choice. To do this it is important that the bill is voluntary, allows for the protection of anonymity, and is clear on how data will be collected, stored and deleted. Measures should be taken towards ensuring that the &lt;em&gt;Aadhaar&lt;/em&gt; number is truly voluntary. Accordingly, a prohibition against the denial of goods, services, entitlements and benefits (private or public) for lack of a UID number – provided that an individual furnishes equivalent ID is necessary.&amp;nbsp; The bill should also spell out the situations in which anonymity will be preserved and/or an &lt;em&gt;Aadhaar&lt;/em&gt; number should not be requested such as a person’s sexuality/sexual orientation and marital status/history. Furthermore, the bill should require the Authority, registrars, enrolling agencies and service providers to delete/anonymize/obfuscate transaction data according to defined principles after appropriate periods of time in order to protect the privacy of citizens.&lt;/p&gt;
&lt;h3&gt;Motivations of the UID Bill&lt;/h3&gt;
&lt;p&gt;Since the submission of the high level summary, we note that a list of 221 agencies empanelled by the UIDAI has been uploaded onto the website (by a memo dated 15 July, 2010). A swift reading reveals that most of the agencies who are going to help enroll people into the UIDAI system are not NGOs, CSOs or other welfare oriented not-for-profit entities; rather, they are largely IT companies and commercial enterprises. This begs the question as to whether the UID scheme/&lt;em&gt;Aadhaar&lt;/em&gt; is truly geared towards delivery of benefits and inclusivity of the poor and marginalized. Already concerns have been voiced that the “ecosystem” of registrars and enrolling agencies contemplated by the scheme, to the extent that it envisages a public-private partnership, could firstly, be “hijacked” or “captured” by commercial motives and result in sharing of data, security breaches, compromised identities, loss of privacy, data mining and customer profiling, and secondly, end up neglecting the very sections of society that the scheme allegedly most wants to help. The list of empanelled companies makes this even more likely and imminent a concern. Without casting aspersions on any of those entities, we would like to highlight that this sort of delegated structure raises several concerns.&lt;/p&gt;
&lt;p&gt;Additionally, we find the speed and efficiency with which the UIDAI juggernaut is signing MoUs with states, banks and government agencies on the one hand, and issuing tenders, RFPs, RFQs and otherwise seeking proposals and awarding contracts to private entities – in the absence of any Parliament-sanctioned law (the bill is still a draft, and yet to even be placed before the Parliament) to be alarming. Along with news of the increasing costs of the project and doubts about how foolproof the technology will be, it is staggering to imagine that something that raises so many concerns is being pushed through without a more serious debate. The lack of formal procedures and open debates makes one wonder how democratic the actual process is.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;To conclude, CIS believes that the UID bill threatens the rights of citizens in India, and appeals to the citizen to think critically of its implications and consequences.&lt;/p&gt;
&lt;p&gt;1. &lt;a href="https://cis-india.org/internet-governance/letter-to-uid-authority" class="internal-link" title="Feedback on the NIA Bill 2010"&gt;Detailed Summary pdf (159kb)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-summary" class="internal-link" title="High Level Summary"&gt;2. High Level Summary (77kb)&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill'&gt;https://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Submissions</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:14:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
