<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2021 to 2035.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/august-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-the-sixth-privacy-roundtable-meeting-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/digitization-and-its-impact-on-society"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/forbesindia-august-26-2013-india-internet-privacy-woes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-august-26-2013-venkatesh-upadhyay-election-campaign"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/forbesindia-august-13-2013-rohin-dharmakumar-how-nextgen-smartphone-users-are-being-bought-and-sold"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business">
    <title>Indian government to bar politicians from using Gmail for official business</title>
    <link>https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business</link>
    <description>
        &lt;b&gt;US-based email services seen as too risky.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This article by Neil McAllister was &lt;a class="external-link" href="http://www.theregister.co.uk/2013/08/30/india_government_gmail_ban/"&gt;published in the Register on August 30, 2013&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government of India is reportedly planning to bar its employees  from using Gmail and other foreign-based email services, amid concerns  over surveillance by US spy agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Gmail data of Indian users  resides in other countries as the servers are located outside," J  Satyanarayana, India's secretary of electronics and information  technology, &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Cyberspying-Government-may-ban-Gmail-for-official-communication/articleshow/22156529.cms" target="_blank"&gt;told&lt;/a&gt; the &lt;i&gt;Times of India&lt;/i&gt;. "Currently, we are looking to address this in the government domain, where there are large amounts of critical data."&lt;/p&gt;
&lt;div class="not_moved article_side_content" style="text-align: justify; "&gt;
&lt;div id="article-mpu-container"&gt;
&lt;div class="adu" id="ad-mu1-spot"&gt;
&lt;div id="ad-mu1-spot_ad_container"&gt;&lt;ins&gt;&lt;ins&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The Indian government currently employs some 500,000 people, many  of whom use Gmail for their primary email addresses. A quick glance at  the &lt;a href="http://deity.gov.in/content/people-and-offices" target="_blank"&gt;contact page&lt;/a&gt; for the country's Department of Electronics and Information Technology  reveals at least eight senior officials using Gmail, and still others  with Yahoo! addresses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the new directive, government  employees will be asked to stick to official email addresses provided by  India's National Informatics Centre (NIC). But an unnamed senior  government IT official told the &lt;i&gt;Times of India&lt;/i&gt; that many  government workers choose Gmail and other foreign services because they  are easier to use, and setting up accounts is much faster than working  within the bureaucratic process of the NIC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move toward  locally run email for Indian government workers comes in the wake of a  string of revelations from documents leaked by Edward Snowden. Among the  recent disclosures has been details of US electronic surveillance of  foreign governments on US soil, where the National Security Agency even  went as far as to snoop encrypted communications from &lt;a href="http://www.theregister.co.uk/2013/08/27/un_to_question_us_on_nsa/"&gt;United Nations headquarters&lt;/a&gt; in New York City.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No  doubt equally concerning was a motion filed by Google in a US district  court earlier this month, in which the Chocolate Factory &lt;a href="http://www.theregister.co.uk/2013/08/14/google_cloud_users_have_no_legitimate_expectation_of_privacy/"&gt;asserted&lt;/a&gt; that "a person has no legitimate expectation of privacy in information  he voluntarily turns over to third parties" such as Gmail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  Sunil Abraham of the Bangalore-based think tank the Centre for Internet  and Society said that foreign spying wasn't the only reason why  government officials should be required to use a homegrown email.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Use  of official government email would also make it easier to achieve  greater transparency and anti-corruption initiatives," Abraham told the  paper. "Ministers, intelligence and law enforcement officials should not  be allowed to use alternate email providers under any circumstance."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When  contacted for comment, a spokeswoman for Google India said the company  had not been informed of the proposed ban, adding, "Nothing is  documented so far, so for us, it is still speculation." ®&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business'&gt;https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2013-09-05T09:52:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/august-2013-bulletin">
    <title>August 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/august-2013-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of August 2013 can be accessed below. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet &amp;amp; Society (CIS) welcomes you to the eighth issue of its newsletter for the year 2013.  In this issue we are glad to bring you the final report on &lt;a href="https://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report"&gt;banking and accessibility&lt;/a&gt; submitted to the Ministry of Finance, Government of India, a &lt;a href="https://cis-india.org/a2k/blog/bilateral-inhibiting-treaty-investigating-challenges-that-bilateral-investment-treaties-pose-to-compulsory-licensing-of-pervasive-technology-patent-pools"&gt;research paper&lt;/a&gt; on India’s obligations under bilateral investment treaties, a &lt;a href="https://cis-india.org/openness/blog/konkani-wikipedia-advances-in-four-days"&gt;report from a Wikipedia workshop&lt;/a&gt; held at the Konkani Department in Goa University, a &lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-sixth-privacy-roundtable-meeting-new-delhi"&gt;report on the sixth privacy roundtable&lt;/a&gt; held in New Delhi,  recent &lt;a href="https://cis-india.org/news"&gt;news coverage&lt;/a&gt;, and updates on our upcoming events.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Archives of our newsletters are &lt;a href="https://cis-india.org/about/newsletters/"&gt;here&lt;/a&gt;. Our policies on Ethical Research Guidelines, Non-Discrimination and Equal Opportunities, Privacy, Terms of Website Use and Travel can be&lt;a href="https://cis-india.org/about/policies"&gt; accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;br /&gt; CIS is inviting applications for the posts of &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Screen Reader Project). To apply for this post, send in your resume to Nirmita Narasimhan (&lt;a href="mailto:nirmita@cis-india.org"&gt;nirmita@cis-india.org&lt;/a&gt;). CIS is also seeking applications for the post of &lt;a href="https://cis-india.org/jobs/policy-associate-internet-governance"&gt;Policy Associate&lt;/a&gt; (Internet Governance). To apply send your resume to Sunil Abraham (&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;) and Pranesh Prakash (&lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility" class="external-link"&gt;Accessibility&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of its project on creating a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India with the Hans Foundation, we bring you three new draft chapters on Assam, Manipur and Puducherry. With this we have completed compilation of draft chapters for 21 states and 3 union territories. Feedback and comments are invited from readers for the below chapters:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-assam-chapter-call-for-comments"&gt;The Assam Chapter&lt;/a&gt; (by CLPR, August 28, 2013)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-manipur-chapter-call-for-comments"&gt;The Manipur Chapter&lt;/a&gt; (by CLPR, August 29, 2013)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/ational-resource-kit-puducherry-chapter-call-for-comments"&gt;The Puducherry Chapter&lt;/a&gt; (by Anandhi Viswanathan, August 31, 2013)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note: &lt;i&gt;All the chapters published on the website are early drafts and will be reviewed and updated&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reports&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report"&gt;Banking and Accessibility in India: A Report by CIS&lt;/a&gt; (by Vrinda Maheshwari, August 12, 2013). This is the final report submitted to the Ministry of Finance, Government of India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/opening-new-avenues-for-empowerment"&gt;Opening New Avenues for Empowerment&lt;/a&gt; (by UNESCO, August 31, 2013). UNESCO has published a global report on higher education titled “Opening New Avenues for Empowerment”. Nirmita Narasimhan was the coordinating author for the Asia Pacific region.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt; and &lt;a href="https://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of its &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project on developing the growth of Indic language communities&lt;/a&gt; with Wikimedia Foundation, &lt;a href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Programme_Plan"&gt;CIS-A2K&lt;/a&gt; held six Wikipedia workshops. CIS is also doing a project (Pervasive Technologies) on examining the relationship between production of pervasive technologies and intellectual property. CIS also promotes openness including open government data, open standards, open access, and free/libre/open source software through its Openness programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k"&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/a&gt;&lt;b&gt;&lt;br /&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/bilateral-inhibiting-treaty-investigating-challenges-that-bilateral-investment-treaties-pose-to-compulsory-licensing-of-pervasive-technology-patent-pools"&gt;India's Obligations under Bilateral Investment Treaties (Part A): “Bilateral Inhibiting Treaty?” — Investigating the Challenges that Bilateral Investment Treaties pose to the Compulsory Licensing of Pervasive Technology Patent Pools&lt;/a&gt; (by Gavin Pereira, August 31, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Column&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/yojana-august-2013-pranesh-prakash-copyrights-and-copywrongs-why-the-govt-should-embrace-the-public-domain"&gt;Copyrights and Copywrongs Why the Government Should Embrace the Public Domain&lt;/a&gt; (by Pranesh Prakash, Yojana, Issue: August 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/livemint-august-26-2013-ch-unnikrishnan-dictionary-words-in-software-patent-guidelines-puzzle-industry"&gt;Dictionary words in software patent guidelines puzzle industry&lt;/a&gt; (by C.H. Unnikrishnan, Livemint, August 26, 2013). CIS work on Access to Knowledge is mentioned.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/are-indian-consumers-laws-ready-for-digital-age"&gt;Are Indian Consumer Laws Ready for the Digital Age?&lt;/a&gt; (by Vipul Kharbanda, August 8, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/do-you-have-right-to-unlock-your-smart-phone"&gt;Do You Have the Right to Unlock Your Smart Phone?&lt;/a&gt; (by Puneeth Nagaraj, August 7, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Access to Knowledge (Wikipedia)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of four members based in Bangalore: &lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and &lt;a href="https://cis-india.org/about/people/our-team"&gt;Syed Muzammiluddin&lt;/a&gt;, and one team member &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt; who works from Delhi.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Reports&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/a-kannada-wikipedia-workshop-at-krishnarajapet"&gt;A Kannada Wikipedia Workshop at Krishnarajapet&lt;/a&gt; (by Dr. U.B. Pavanaja, August 14, 2013). The workshop was co-organized by the CIS-A2K team along with Kannada Sahitya Parishat of KR Pet.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikipedia-workshop-sambalpur"&gt;An Odia Wikipedia Workshop at Sambalpur&lt;/a&gt; (by Gorvachove Pothal, August 27, 2013). This workshop was held at Veer Surendra Sai University of Technology, Burla, Sambalpur on July 26 and 27, 2013. Odia Wikipedian Gorvachove Pothal organized this workshop with financial support from the CIS-A2K programme.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/konkani-wikipedia-climbing-up-the-indian-language-ladder"&gt;Konkani Wikipedia — Climbing up the Indian Language Ladder?&lt;/a&gt; (by Subhashish Panigrahi, August 31, 2013). CIS-A2K team organized this event at the Konkani Department, Goa University from August 21 to 24, 2013.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/konkani-wikipedia-advances-in-four-days"&gt;Konkani Wikipedia Advances in 4 Days — From 90 Articles to 130 Articles!&lt;/a&gt; (by Nitika Tandon, August 31, 2013). CIS-A2K team organized this event at the Konkani Department, Goa University from August 21 to 24, 2013. Thirty-eight students took part in the wiki editing workshop.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/digitization-of-books-for-indic-language-wikisource"&gt;Digitization of Books for Indic Language WikiSource&lt;/a&gt; (organised by Wikimedia India and CIS-A2K, CIS, Bangalore, August 18, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/workshop-on-editing-wikipedia-in-mumbai"&gt;A Workshop on Editing Wikipedia in Mumbai&lt;/a&gt; (organised by the Centre for Indian Languages in Higher Education and CIS-A2K, Tata Institute of Social Sciences, Mumbai, August 24, 2013). The workshop was aimed at assisting students to take part in the Indian Languages Mela at the Tata Institute of Social Sciences (September 20-21, 2013) which is hosting a competition for best Indian language entries on Wikipedia.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Hosted&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/events/mobile-training-workshop"&gt;Mobile Training Workshop @ CIS&lt;/a&gt; (CIS, Bangalore, August 29, 2013). Rachita and Keerthana Chandrashekar gave a talk on mobile campaigns.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://wikimania2013.wikimedia.org/wiki/Main_page"&gt;Wikimania 2013: The International Wikimedia Conference&lt;/a&gt; (organised by Wikimedia Foundation, Hong Kong Polytechnic University, August 7 – 11, 2013). T. Vishnu Vardhan and Subhashish Panigrahi participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikimedia-asia-meeting"&gt;Wikimedia Asia Meeting&lt;/a&gt; (organised by Wikimedia community, Hong Kong, August 10, 2013). T. Vishnu Vardhan and Subhashish Panigrahi participated in the meeting. &lt;a href="https://cis-india.org/openness/blog/wikimedia-asia-meeting.txt"&gt;Unedited transcript&lt;/a&gt; of the entire conversation is posted online.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/telugu-wiki-meet-up-hyderabad-august-2013"&gt;వికీపీడియా:సమావేశం/హైదరాబాద్/ఆగష్టు&lt;/a&gt; (Hyderabad, August 25, 2013). T.Vishnu Vardhan participated for the meeting through Skype.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/beforeitnews-august-1-2013-wikipedia-gains-massive-traffic-thanks-to-vernacular-languages"&gt;Wikipedia Gains Massive Traffic Thanks To Vernacular Languages&lt;/a&gt; (Before It’s News, August 1, 2013). T. Vishnu Vardhan is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-august-1-2013-sandhya-soman-wikipedia-boom-in-marathi-malayalam-other-desi-languages"&gt;Wikipedia boom in Marathi, Malayalam and other desi languages&lt;/a&gt; (by Sandhya Soman, The Times of India, August 1, 2013). T. Vishnu Vardhan is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/dna-august-1-2013-divya-saboo-wikipedia-boom-in-vernacular-languages"&gt;Wikipedia boom in vernacular languages&lt;/a&gt; (by Divya Saboo, August 1, 2013). The Centre for Internet and Society is mentioned.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hindu-r-krishna-kumar-august-2-2013-stress-on-posting-articles-on-kannada-wikipedia"&gt;Stress on posting articles on Kannada Wikipedia&lt;/a&gt; (by R. Krishna Kumar, Hindu, August 2, 2013). Dr. U.B.Pavanaja is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/techcrunch-august-6-2013-mahesh-sharma-indias-indigenous-languages-drive-wikipedias-growth"&gt;India’s Indigenous Languages Drive Wikipedia’s Growth&lt;/a&gt; (by Mahesh Sharma, TechCrunch, August 6, 2013). T. Vishnu Vardhan is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/prajavani-august-12-2013-krishnarajapet-workshop"&gt;Krishnarajapet Wikipedia Workshop Coverage&lt;/a&gt; (Prajavani, August 12, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/vijaya-vani-august-12-2013-krishnarajapet-wikipedia-workshop"&gt;Krishnarajapet Wikipedia Workshop Coverage&lt;/a&gt; (Vijaya Vani, August 12, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/suvarna-times-of-karnataka-august-12-2013-krishnarajapet-workshop"&gt;Krishnarajapet Wikipedia Workshop Coverage&lt;/a&gt; (Suvarna Times of Karnataka, August 12, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/thegoan-joyce-dias-august-24-2013-wikipedia-writes-a-new-script"&gt;Wikipedia writes a new script&lt;/a&gt; (by Joyce Dias, August 24, 2013, The Goan). CIS-A2K workshop held in Goa is mentioned extensively. Nitika Tandon and Subhashish Panigrahi are quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/epaperoheraldo-august-24-2013-diana-fernandes-konkani-wikipedia-makes-headway-"&gt;Konkani Wikipedia makes headway&lt;/a&gt; (by Diana Fernandes, OHeraldO, August 24, 2013). Nitika Tandon is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.goanvoice.org.uk/?ref=Guzels.TV"&gt;Konkani Wikipedians Speak&lt;/a&gt; (Goan Voice Daily Newsletter, September 4, 2013). Konkani Wikipedia workshop organized in Goa from August 21 – 24, 2013 is mentioned in this newsletter.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Ongoing / Upcoming Events&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-training-in-telugu-for-b-r-ambedkar-open-university"&gt;Wikipedia Training in Telugu for Dr. B.R. Ambedkar Open University, Hyderabad&lt;/a&gt; (Dr. B.R. Ambedkar Open University, Hyderabad, September 5-6, 2013). T. Vishnu Vardhan is teaching a module on "Knowledge and Openness in the Digital Era".&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/you-too-can-write-on-wikipedia"&gt;You too can write on Wikipedia&lt;/a&gt;! — Orientation Workshop (co-organised by CIS-A2K and the Centre for Contemporary Studies, Indian Institute of Science, Bangalore, September 15, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/train-the-trainer"&gt;Train the Trainer — Four-day long Residential Training Workshop in Bangalore&lt;/a&gt; (organised by CIS-A2K, Bangalore, October 1 – 5, 2013). &lt;i&gt;The programme will be held in the first week of October&lt;/i&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/voices-from-goa"&gt;Voices from Goa: Frania Pereira tells Why She Writes Articles on Konkani Wikipedia&lt;/a&gt; (by Subhashish Panigrahi, August 27, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/voices-from-goa-wikipedia-editor-rusita-paryekar"&gt;Voices from Goa: Wikipedia Editor Rusita Paryekar&lt;/a&gt; (by Subhashish Panigrahi, August 27, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Openness&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Event Hosted &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/open-hardware-lab"&gt;Open Hardware Lab: Play &amp;amp; Invent + Bonus Film Screening&lt;/a&gt; (CIS, Bangalore, August 4, 2013). A hangout was done with CIS Lab Community and with members of the Computer Club of India and Arduino enthusiasts.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/e-dirap-google-hangout-on-open-government"&gt;e-DIRAP Google+ Hangout on Open Government&lt;/a&gt; (organised by Google, July 25, 2013). Sunil Abraham was a panelist. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness"&gt;Beyond Property Rights: Thinking About Moral Definitions of Openness&lt;/a&gt; (by David Eaves, Tech President, August 6, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/techdirt-august-14-2013-glyn-moody-extending-spectrum-openness-to-include-moral-right-to-share"&gt;Extending The Spectrum Of Openness To Include The Moral Right To Share&lt;/a&gt; (by Glyn Moody, Techdirt, August 19, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS began two projects earlier this year. The first one on facilitating research and events on surveillance and freedom of expression is with Privacy International and support from the International Development Research Centre, Canada. The second one on mapping cyber security actors in South Asia and South East Asia is with the Citizen Lab, Munk School of Global Affairs, University of Toronto and support from the International Development Research Centre, Canada:&lt;/p&gt;
&lt;h3&gt;SAFEGUARDS Project&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Event Report&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-sixth-privacy-roundtable-meeting-new-delhi"&gt;Sixth Privacy Roundtable&lt;/a&gt; (co-organised by CIS, FICCI and DSCI, New Delhi, August 24, 2013). Bhairav Acharya and Prachi Arya participated in this event. The discussions and recommendations from the six round table meetings will be presented at the Internet Governance meeting in October 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Newspaper / Magazine Columns&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"&gt;Freedom from Monitoring: India Inc Should Push For Privacy Laws&lt;/a&gt; (by Sunil Abraham, Forbes India Magazine, August 21, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom"&gt;Out of the Bedroom&lt;/a&gt; (by Nishant Shah, Indian Express, August 25, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/saket-modi-calls-for-stronger-cyber-security-discussions"&gt;'Ethical Hacker' Saket Modi Calls for Stronger Cyber Security Discussions&lt;/a&gt; (by Kovey Coles, August 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/ethical-issues-in-open-data"&gt;Ethical Issues in Open Data&lt;/a&gt; (by Kovey Coles, August 7, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata"&gt;FinFisher in India and the Myth of Harmless Metadata&lt;/a&gt; (by Maria Xynou, August 13, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/the-hackers-way-of-reshaping-policies"&gt;The Hackers Way of Reshaping Policies&lt;/a&gt; (CIS, Bangalore, August 2, 2013). Bernadette Langle gave a talk on different ways to reshape policies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/cryptoparty-chennai"&gt;Chennai: Learn to Protect your Online Activities!&lt;/a&gt; (Asian College of Journalism, Taramani, Chennai, August 7, 2013). A Crypto Party was organised.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/the-phishing-society-a-talk-by-maria-xynou"&gt;The Phishing Society: Why 'Facebook' is more dangerous than the Government Spying on You - A Talk by Maria Xynou&lt;/a&gt; (CIS, Bangalore, August 7, 2013). Maria Xynou gave a talk on phishing society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/cryptoparty-chennai"&gt;Learn to Protect your Online Activities!&lt;/a&gt; (ACJ - Asian College of Journalism, Second Main Road (Behind M.S. Swaminathan Research Foundation), Taramani, Chennai, August 7, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-meeting-brussels-bangalore"&gt;Privacy Meeting: Brussels – Bangalore&lt;/a&gt; (CIS, Bangalore, August 14, 2013). Gertjan Boulet and Dariusz Kloza gave a talk on privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/cryptoparty-bangalore"&gt;Learn to Protect your Online Activities!&lt;/a&gt; (CIS, Bangalore, August 17, 2013). A Crypto Party was held at CIS.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/repeat-remix-remediate-summer-school-2013"&gt;Summer School 2013&lt;/a&gt; (organized by the Research Center of Media and Communication at the University of Hamburg, Germany, July 29 – August 2, 2013). Dr. Nishant Shah was a panelist in the session on "Guilty until Proven Innocent: Pirates, Pornographers, Terrorists and the IT Act in India".&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/meeting-of-sub-committee-on-dna-profiling-bill"&gt;Meeting of a Sub-committee on DNA Profiling Bill&lt;/a&gt; (Hyderabad, August 6, 2013). Sunil Abraham participated in this meeting for discussing the draft bill.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security"&gt;Surveillance: Privacy Vs Security&lt;/a&gt; (organized by the Foundation for Media Professionals, India International Centre, New Delhi, August 17, 2013). Pranesh Prakash was a panelist.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night"&gt;Crypto Night&lt;/a&gt; (by Rahul M., Caravan, August 1, 2013). Pranesh Prakash and Bernadette Langle are quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-times-of-india-aug-1-2013-kim-arora-facebook-limiting-access-to-social-media-can-restrict-freedom-of-speech"&gt;Facebook: Limiting access to social media can restrict freedom of speech&lt;/a&gt; (by Kim Arora, The Times of India, August 1, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-august-4-2013-deepa-kurup-token-disclosures"&gt;Token disclosures?&lt;/a&gt; (by Deepa Kurup, The Hindu, August 4, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-times-of-india-august-4-2013-padmaparna-ghosh-memea-s-the-word-now"&gt;Memeâ€™s the word now&lt;/a&gt; (by Padmaparna Ghosh, The Times of India, August 4, 2013). Nishant Shah is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees"&gt;Chinese hackers baiting Indian govt, corporate employees: report&lt;/a&gt; (by Moulishree Srivastava and Anirban Sen, Livemint, August 9, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests"&gt;Mixed signals? Supreme Court notices to states on Facebook arrests&lt;/a&gt; (NDTV, August 16, 2013). Pranesh Prakash, Shreya Singhal and Faizal Farooqui discussed the grey areas of the IT Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy"&gt;Balancing vigilance and privacy&lt;/a&gt; (by Prashant Jha, The Hindu, August 18, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/forbesindia-august-13-2013-rohin-dharmakumar-how-nextgen-smartphone-users-are-being-bought-and-sold"&gt;How Next-Gen Smartphone Users are Being Bought and Sold&lt;/a&gt; (by Rohin Dharmakumar, &lt;a href="http://forbesindia.com/article/checkin/how-nextgen-smartphone-users-are-being-bought-and-sold/35859/1"&gt;Forbes India Magazine&lt;/a&gt;, August 13, 2013, and &lt;a href="http://ibnlive.in.com/news/how-nextgen-smartphone-users-are-being-bought-and-sold/415719-11.html"&gt;IBN Live&lt;/a&gt;, August 19, 2013). Sunil Abraham is quoted. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth"&gt;Dear Milind Deora, Prakash Javadekar Deserved The Truth&lt;/a&gt; (by Rohin Dharmakumar, Forbes India, August 22, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-august-26-2013-venkatesh-upadhyay-election-campaign"&gt;Election campaign: parties draw battle lines on media platforms&lt;/a&gt; (by Venkatesh Upadhyay, Livemint, August 26, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/forbesindia-august-26-2013-india-internet-privacy-woes"&gt;India's Internet Privacy Woes&lt;/a&gt; (by Rohin Dharmakumar, Forbes India Magazine, August 26, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication"&gt;Cyberspying: Government may ban Gmail for official communication&lt;/a&gt; (The Times of India, August 30, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business"&gt;Indian government to bar politicians from using Gmail for official business&lt;/a&gt; (by Neil McAllister, The Register, August 30, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cyber Stewards Project&lt;/b&gt;&lt;br /&gt;Laird Brown, a strategic planner and writer with core competencies on brand analysis, public relations and resource management and Purba Sarkar who in the past worked as a strategic advisor in the field of SAP Retail are working in this project.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Video Interview&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;Part 9: &lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-9-saikat-datta"&gt;Interview with Saikat Datta&lt;/a&gt; (August 5, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS has published one newspaper column in the Business Standard and also made a submission to TRAI:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-august-1-2013-domestic-high-tech-manufacturing-needs-access-to-markets"&gt;Breaking into the Closed Circle: Domestic High-Tech Manufacturing Needs Access To Markets&lt;/a&gt; (by Shyam Ponappa, originally published in the Business Standard, July 31, 2013 and also mirrored in Organizing India Blogspot, August 1, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/trai-consultation-paper-on-spectrum"&gt;TRAI Consultation Paper on Spectrum&lt;/a&gt; (by Shyam Ponappa and A.B. Beliappa, August 31, 2013). The submission was made to the Telecom Regulatory Authority of India on August 21, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new conversations and debates that shape the contours of Digital Humanities in Asia.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/digital-humanities-talk-at-cis"&gt;Digital Humanities Talk&lt;/a&gt; (by Sara Morais, August 1, 2013). Sara wrote about her talk in this blog entry.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/theorizing-the-digital-subaltern"&gt;Theorizing the Digital Subaltern&lt;/a&gt; (by Sara Morais, August 2, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/digital-humanities-for-indian-higher-education"&gt;Digital Humanities for Indian Higher Education&lt;/a&gt; (co-organised by CIS-A2K, HEIRA, CSCS, Tumkur University, Tata Institute of Social Sciences, Mumbai and CCS-Indian Institute of Science, Bangalore, July 13, 2013). &lt;i&gt;Errata&lt;/i&gt;: &lt;i&gt;We had got the name of one of the co-organisers wrong in our previous newsletter. We have corrected this now.&lt;/i&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/south-asia-conference-on-higher-education"&gt;South Asia Conference on Higher Education&lt;/a&gt; (organised by the Centre for Study of Culture and Society, Ford Foundation Office, New Delhi, August 5 – 7, 2013). Sunil Abraham participated in this conference.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;br /&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;*Support Us*&lt;/p&gt;
&lt;p&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/august-2013-bulletin'&gt;https://cis-india.org/about/newsletters/august-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-09-13T06:26:30Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013">
    <title>The Personal Data (Protection) Bill, 2013</title>
    <link>https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013</link>
    <description>
        &lt;b&gt;Below is the text of the Personal Data (Protection) Bill, 2013 as discussed at the 6th Privacy Roundtable, New Delhi held on 24 August 2013. 


Note: This version of the Bill caters only to the Personal Data regime. The surveillance and privacy of communications regime was not discussed at the 6th Privacy Roundtable. 
&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013'&gt;https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>prachi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-30T14:53:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-the-sixth-privacy-roundtable-meeting-new-delhi">
    <title>Report on the Sixth Privacy Roundtable Meeting, New Delhi</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-the-sixth-privacy-roundtable-meeting-new-delhi</link>
    <description>
        &lt;b&gt;In 2013 the Centre for Internet and Society (CIS) drafted the Privacy Protection Bill as a citizens' version of a privacy legislation for India. Since April 2013, CIS has been holding Privacy Roundtables in collaboration with Federation of Indian Chambers of Commerce and Industry (FICCI) and DSCI, with the objective of gaining public feedback to the Privacy Protection Bill and other possible frameworks for privacy in India. The following is a report on the Sixth Privacy Roundtable held in New Delhi on August 24, 2013.

&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h2&gt;Introduction&lt;b&gt; &lt;/b&gt;&lt;/h2&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;A series of seven multi-stakeholder roundtable meetings on "privacy" were conducted by CIS in collaboration with FICCI from April 2013 to August 2013 under the Internet Governance initiative. DSCI joined CIS and FICCI as a co-organizer on April 20, 2013.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;CIS was a member of the Justice A.P. Shah Committee which drafted the "&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of Groups of Experts on Privacy&lt;/a&gt;". CIS also drafted a &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft" class="external-link"&gt;Privacy (Protection) Bill 2013&lt;/a&gt; (hereinafter referred to as ‘the Bill’), with the objective of establishing a well protected privacy regime in India. CIS has also volunteered to champion the session/workshops on "privacy" in the final meeting on Internet Governance proposed for October 2013.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;At the roundtables the Report of the Group of Experts on Privacy and the text of the Privacy (Protection) Bill 2013 will be discussed. The discussions and recommendations from the six round table meetings will be presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p class="MsoNormalCxSpLast" style="text-align: justify; "&gt;The dates of the six Privacy Round Table meetings are enlisted below:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;New Delhi Roundtable: April 13, 2013&lt;/li&gt;
&lt;li&gt;Bangalore Roundtable: April 20, 2013&lt;/li&gt;
&lt;li&gt;Chennai Roundtable: May 18, 2013&lt;/li&gt;
&lt;li&gt;Mumbai Roundtable: June 15, 2013&lt;/li&gt;
&lt;li&gt;Kolkata Roundtable: July 13, 2013&lt;/li&gt;
&lt;li&gt;New Delhi Roundtable: August 24, 2013&lt;/li&gt;
&lt;li&gt;New Delhi Final Roundtable and National Meeting: October 19, 2013&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This Report provides an overview of the proceedings of the Sixth Privacy Roundtable (hereinafter referred to as 'the Roundtable'), conducted at FICCI, Federation House in Delhi on August 24, 2013. &lt;a href="https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013" class="internal-link" title="The Personal Data (Protection) Bill, 2013"&gt;The Personal Data (Protection) Bill, 2013 &lt;/a&gt;was discussed at the Roundtable.&lt;/p&gt;
&lt;p class="MsoNormalCxSpFirst" style="text-align: justify; "&gt;The Sixth Privacy Roundtable began with reflections on the evolution of the Bill. In its penultimate form, the Bill stands substantially changed as compared to its previous versions. For the purpose of this Roundtable, which entailed participation largely from industry organizations and other entities who handle personal data, only the personal data regime was discussed. This debate was distinguished from the general and specific discussion relating to privacy, surveillance and interception of communications as it was felt that greater expertise was required to deal adequately with such a vast and nuanced area. After further discussion with security experts, the provisions on surveillance and privacy of communications will be reincorporated resulting in omnibus privacy legislation. To reflect this alteration in the ambit of the Bill in its current form, its title was changed to &lt;a href="https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013" class="external-link"&gt;Personal Data (Protection) Bill&lt;/a&gt; from the more expansive – Privacy (Protection) Bill.&lt;/p&gt;
&lt;h2&gt;Chapter I – Preliminary&lt;/h2&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Section 2 of the first chapter enumerates various definitions including ‘personal data’, which is defined as any data that can lead to identification and ‘sensitive personal data’; a subset of personal data defined by way of a list. The main contentions arose in relation to the latter definition.&lt;/p&gt;
&lt;h3 class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Religion and Caste&lt;/h3&gt;
&lt;p class="MsoNormalCxSpLast" style="text-align: justify; "&gt;A significant modification is found in the definition of ‘sensitive personal data’, which has expanded to include two new categories, namely, (i) ethnicity, religion, race or caste, and (ii) financial and credit information. Although discussed previously, these two categories have hitherto been left out of the purview of the definition as they are fraught with issues of practicality. In the specific example of caste, the government has historically indulged in large-scale data collection for the purpose of census, for example as conducted by the Ministry of Rural Development and the Ministry of Social Justice and Empowerment, Government of India. Further, in the Indian scenario, various statutory benefits accrue from caste identities under the aegis of affirmative action policies. Hence, categorizing it as sensitive personal data may not be considered desirable. The problem is further exacerbated with respect to religion as even a person’s name can be an indicator. In light of this, some issues under consideration were –&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Whether religion and caste should be categorized as sensitive personal data or personal data?&lt;/li&gt;
&lt;li&gt;Whether it is impracticable to include it in either category?&lt;/li&gt;
&lt;li&gt;If included as sensitive personal data, how should it be implemented?&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="MsoNormalCxSpFirst" style="text-align: justify; "&gt;The majority seemed to lean towards including it under the category of sensitive personal data rather than personal data. It was argued that the categorization of some personal data as sensitive was done on the basis of higher potential for profiling or discrimination. In the same vein, caste and religious identities were sensitive information, requiring greater protection as provided under section 16 of the Bill. Regarding the difficulties posed by revealing names, it was proposed that since it was not an indicator by default, this consideration could not be used as a rationale to eliminate religion from the definition. Instead, it was suggested that programmes sensitizing the populous to the implications of names as indicators of religion/caste should be encouraged. With regard to the issue of census, where caste information is collected, it was opined that the same could be done in an anonymously as well. The maintenance of public databases including such information by various public bodies was considered problematic for privacy as they are often easily accessible and hence have a high potential for abuse. Overall, the conclusion was that the potential for abuse of such data could be better curtailed if greater privacy requirements were mandated for both private and public organizations. The collection of this kind of data should be done on a necessity basis and kept anonymous wherever possible. However, it was acknowledged that there were greater impracticalities associated with treating religion and caste as sensitive personal data. Further, the use and disclosure of indicative names was considered to be a matter of choice. Often caste information was revealed for affirmative action schemes, for example, rank lists for admissions or appointments. In such cases, it was considered to be counter-productive to discourage the beneficiary from revealing such information. Consequently, it was suggested that they could be regulated differently and qualified wherever required. The floor was then thrown open for discussing the other categories included under the definition of ‘sensitive personal data’.&lt;/p&gt;
&lt;h3 class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Political Affiliation&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Another contentious issue discussed at the Roundtable was the categorization of ‘political affiliation’ as ‘sensitive personal data’. A participant questioned the validity of including it in the definition, arguing that it is not an issue in India. Further, it was argued that one’s political affiliation was also subject to change and hence did not mandate higher protection as provided for sensitive personal data. Instead, if included at all, it should be categorized as ‘personal data’. This was countered by other participants who argued that revealing such information should be a matter of choice and if this choice is not protected adequately, it may lead to persecution. In light of this, changing one’s political affiliation particularly required greater protection as it may leave one more vulnerable. Everyone was in agreement that the aggregation of this class of data, particularly when conducted by public and private organizations, was highly problematic, as evidenced by its historic use for targeting dissident groups. Further, it was accepted unanimously that this protection should not extend to public figures as citizens had a right to know their political affiliation. However, although there was consensus on voting being treated as sensitive personal data, the same could not be reached for extending this protection to political affiliation.&lt;/p&gt;
&lt;h3 class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Conviction Data&lt;b&gt; &lt;br /&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;The roundtable also elicited a debate on conviction data being enumerated as sensitive personal data. The contention stemmed from the usefulness of maintaining this information as a matter of public record. Inter alia, the judicial practice of considering conviction history for repeat offenders, the need to consider this data before issuing passport and the possibility of establishing a sex offenders registry in India were cited as examples for the same.&lt;/p&gt;
&lt;h3 class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Financial and Credit Information&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;From the outset, the inclusion of Financial and Credit information as sensitive personal data was considered problematic as it would clash directly with existing legislations. Specifically, the Reserve Bank of India mandates on all issues revolving around this class of data. However, it was considered expedient to categorize it in this manner due to grave mismanagement associated with it, despite existing protections. In this regard, the handling of Credit Information was raised as an issue. Even though it is regulated under the Credit Information Companies (Regulation) Act, 2005, its implementation was found to be wanting by some participants. In this context, the harm sought to be prevented by its inclusion in the Bill was unregulated sharing of credit-worthiness data with foreign banks and organs of the state. Informed consent was offered as the primary qualifier. However, some participants proposed that extending a strong regime of protection to such information would not be economically viable for financial institutions. Thus, it was suggested that this category should be categorized as personal data with the aim of regulating unauthorized disclosures.&lt;/p&gt;
&lt;h3 class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p class="MsoNormalCxSpLast" style="text-align: justify; "&gt;The debate on the definition of sensitive personal data concluded with the following suggestions and remarks:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The categories included under sensitive personal data should be subject to contextual provisions instead of blanket protection.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sensitive personal data mandates greater protection with regard to storage and disclosure than personal data.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;While obtaining prior consent is important for both kinds of data, obtaining informed consent is paramount for sensitive personal data.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Both classes of data can be collected for legitimate purposes and in compliance with the protection provided by law. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter II – Regulation of Personal Data&lt;/h2&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;This chapter of the Bill establishes a negative statement of a positive right under Section 3 along with exemptions under Section 4, as opposed to the previous version of the Bill, discussed at the fifth Privacy Roundtable, which established a positive right. Thus, in its current form, the Bill provides a stronger regime for the regulation of personal data. The single exemption provided under this part is for personal or domestic use.&lt;/p&gt;
&lt;p class="MsoNormalCxSpLast" style="text-align: justify; "&gt;The main issues under consideration with regard to this part were –&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The scope of the protection provided&lt;/li&gt;
&lt;li&gt;Whether the exemptions should be expanded or diminished. &lt;/li&gt;
&lt;/ul&gt;
&lt;p class="MsoNormalCxSpFirst" style="text-align: justify; "&gt;A participant raised a doubt regarding the subject of the right. In response, it was clarified that the Bill was subject to existing Constitutional provisions and relevant case law. According to the apex court, in &lt;i&gt;Kharak Singh v. The State of U.P.&lt;/i&gt; (1964), the Right to Privacy arose from the Right to Life and Personal Liberty as enshrined under Article 21 of the Constitution of India. Since the Article 21 right is applicable to all persons, the Right to Privacy has to be interpreted in conjunction. Consequently, the Right to Privacy will apply to both citizens and non-citizens in India. It would also extend to information of foreigners stored by any entity registered in India and any other entity having an Indian legal personality irrespective of whether they are registered in India or not.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;The next issue that arose at the Roundtable stemmed from the exemption provided under Section 4 of the Bill. A participant opined that excluding domestic use of such data was unadvisable as often such data was used maliciously during domestic rows such as divorce. With regard to the how ‘personal and domestic use’ was to be defined it was proposed that the same had to cater existing cultural norms. In India, this entailed that existing community laws had to be followed which does not recognize nuclear families as a legal entity. It was also acknowledged that Joint Hindu Families had to be dealt with specially and their connection with large businesses in India would have to be carefully considered.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Another question regarding exemptions brought up at the Roundtable was whether they should be broadened to include the information of public servants and the handling of all information by intelligence agencies. Similarly, some participants proposed that exemptions or exceptions should be provided for journalists, private figures involved in cases of corruption, politicians, private detective agencies etc. It was also proposed that public disclosure of information should be handled differently than information handled in the course of business.&lt;/p&gt;
&lt;h3 class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p class="MsoNormalCxSpLast" style="text-align: justify; "&gt;The overall conclusion of the discussion on this Chapter was –&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All exemptions and exceptions included in this Chapter should be narrowly tailored and specifically defined.&lt;/li&gt;
&lt;li&gt;Blanket exemptions should be avoided. The specificities can be left to the Judiciary to adjudicate on as and when contentions arise. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 class="MsoNormalCxSpFirst" style="text-align: justify; "&gt;Chapter III – Protection of Personal Data&lt;/h2&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;This chapter seeks to regulate the collection, storage, processing, transfer, security and disclosure of personal data.&lt;/p&gt;
&lt;h3 class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Collection of Personal Data&lt;/h3&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Sections 5, 6 and 7 of the Bill regulate the collection of personal data. While section 5 establishes a broad bar for the collection of personal data, Section 6 and 7 provide for deviations from the same, for collecting data with and without prior informed consent respectively.&lt;/p&gt;
&lt;h3 class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Collection of Data with Prior Informed Consent&lt;/h3&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Section 6 establishes the obligation to obtain prior informed consent, sets out the regime for the same and by way of 2 provisos allows for withdrawal of consent which may result in denial of certain services.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;The main issues discerned from this provision involved (i) notice for obtaining consent, (ii) mediated data collection, and (iv) destruction of data.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Regarding notice, some participants observed that although it was a good practice it was not always feasible. A participant raised the issue of the frequency of obtaining consent. It was observed that services that allowed its users to stay logged in and the storage of cookies etc. were considered benefits which would be disrupted if consent had to be obtained at every stage or each time the service was used. To solve this problem, it was unanimously accepted that consent only had to be obtained once for the entirety of the service offered except when the contract or terms and conditions were altered by the service provider. It was also decided that the entity directly conducting the collection of data was obligated to obtain consent, even if the same was conducted on behalf of a 3&lt;sup&gt;rd&lt;/sup&gt; party.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Mediated date collection proved to be a highly contentious issue at the Roundtable. The issue was determining the scope and extent of liability in cases where a mediating party collects data for a data controller for another subject who may or may not be a user. In this regard, two scenarios were discussed – (i) uploading pictures of a 3&lt;sup&gt;rd&lt;/sup&gt; party by a data subject on social media sites like Facebook and (ii) using mobile phone applications to send emails, which involves, inter alia, the sender, the phone manufacturer and the receiver. The ancillary issues recognized by participants in this regard were – (i) how would data acquired in this manner be treated if it could lead to the identification of the 3&lt;sup&gt;rd&lt;/sup&gt; party?, and (ii) whether destruction of user data due to withdrawal of consent amount to destruction of general data, i.e. of the 3&lt;sup&gt;rd&lt;/sup&gt; party. The consensus was that there was no clarity on how such forms of data collection could be regulated, even though it seemed expedient to do so. The government’s inability to find a suitable solution was also brought to the table. In this regard it was suggested by some participants that the Principle of Collection Limitation, as defined in the A.P. Shah Committee Report, would provide a basic protection. Further the extent to which this would be exempted for being personal use was suggested as a threshold. A participant observed that it would be technically unfeasible for the service provider to regulate such collection, even if it involved illicit data such as pornographic or indecent photographs. Further, it was opined that such an oversight by the service provider could be undesirable since it would result in the violation of the user’s privacy. Thus, any proposal for regulation had to balance the data subject’s rights with that of the 3&lt;sup&gt;rd&lt;/sup&gt; party. In light of this, it was suggested that the mediating party should be made responsible for obtaining consent from the 3&lt;sup&gt;rd&lt;/sup&gt; party.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Another aspect of this provision which garnered much debate was the proviso mandating destruction of data in case of withdrawal of consent. A participant stated the need for including broad exceptions as it may not always be desirable. Regarding the definition of ‘destroy’, as provided for under Section 2, it was observed that it mandated the erasure/deletion of the data in its entirety. Instead, it was suggested, that the same could be achieved by merely anonymising the information.&lt;/p&gt;
&lt;h3 class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Collection of Data without Consent&lt;/h3&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Section 7 of the Bill outlines four scenarios which entail collection of personal data without prior consent, which are reproduced below -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;“(a) necessary for the provision of an emergency medical service to the data subject;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(b) required for the establishment of the identity of the data subject and the collection is authorised by a law in this regard;&lt;br /&gt;(c) necessary to prevent a reasonable threat to national security, defence or public order; or&lt;br /&gt;(d) necessary to prevent, investigate or prosecute a cognisable offence”&lt;/i&gt;&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Most participants at the Roundtable found that the list was too large in scope. The unqualified inclusion of prevention in that last two sub clauses was found to be particularly problematic. It was suggested that Section 7 (c) was entirely redundant as its provisions could be read into Section 7 (d). Furthermore, the inclusion of ‘national security’ as a basis for collecting information without consent was rejected almost unanimously. It was suggested that if it was to be included then a qualification was desirable, allowing collection of information only when authorized by law. Some participants extended this line of reasoning to Section 7 (c) as state agencies were already authorized to collect information in this manner. It was opined that including it under the Bill would reassert their right to do so in broader terms. For similar reasons, Section 7 (b) was found objectionable as well. It was further suggested that if sub clauses (b), (c) and (d) remained in the Bill, it should be subject to existing protections, for example those established by seminal cases such as &lt;i&gt;Maneka Gandhi v. Union of India&lt;/i&gt; (1978) and&lt;i&gt; PUCL v. Union of India&lt;/i&gt; (1997).&lt;/p&gt;
&lt;h3 class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Storage and Processing of Personal Data&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Section 8 of the Bill lays down a principle mandating the destruction of the information collected, following the cessation of the necessity or purpose for storage and provides exceptions to the same. It sets down a regime of informed consent, purpose specific storage and data anonymization.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;The first amendment suggested for this provision was regarding the requirement of deleting the stored information ‘forthwith’. It was proposed by a participant that deleting personal data instantaneously had practical constraints and a reasonability criteria should be added. It was also noticed that in the current form of the Bill, the exception of historical, archival and research purposes had been replaced by the more general phrase ‘for an Act of Parliament’. The previous definition was altered as the terms being used were hard to define. In response, a participant suggested a broader phrase which would include any legal requirement. Another participant argued that a broader phrase would need to me more specifically defined to avoid dilution.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Section 9 of the Bill sets out two limitations for processing data in terms of (i) the kind of personal data being processed and (ii) the purpose for the same. The third sub clause enumerates exceptions to the abovementioned principles in language similar to that found in Section 7.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;With regard to the purpose limitation clause it was suggested by many participants that the same should be broadened to include multiple purposes as purpose swapping is widespread in existing practice and would be unfeasible and undesirable to curtail. Sub clause 3 of this Section was critiqued for the same reasons as Section 7.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;Section 10 restricts cross-border transfer of data. It was clarified that different departments of the same company or the same holding company would be treated as different entities for the purpose of identifying the data processor. However, a concern was raised regarding the possibility of increased bureaucratic hurdles on global transfer of data in case this section is read too strictly. At the same time, to provide adequate protection of the data subject’s rights certain restrictions on the data controller and location of transfer.&lt;/p&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;The regime for disclosure of personal data without prior consent is provided for by Section 14. The provision did not specify the rank of the police officer in charge of passing orders for such disclosure. It was observed that a suitable rank had to be identified to ensure adequate protection. Further, it was suggested that the provision be broadened to include other competent agencies as well. This could be included by way of a schedule or subsequent notifications.&lt;/p&gt;
&lt;h3 class="MsoNormalCxSpLast" style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Mediated collection of data should be qualified on the basis of purpose and intent of collection.&lt;/li&gt;
&lt;li&gt;The issue of cost to company (C2C) was not given adequate consideration in the Bill.&lt;/li&gt;
&lt;li&gt;The need to lay down Procedures at all stages of handling personal data.&lt;/li&gt;
&lt;li&gt;Special exemptions need to be provided for journalistic sources. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 class="MsoNormalCxSpFirst" style="text-align: justify; "&gt;Meeting Conclusion&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;p class="MsoNormalCxSpMiddle" style="text-align: justify; "&gt;The Sixth Privacy Roundtable was the second to last of the stakeholder consultations conducted for the Citizens’ &lt;a href="https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013" class="external-link"&gt;Personal Data (Protection) Bill, 2013&lt;/a&gt;. Various changes made to the Bill from its last form were scrutinized closely and suitable suggestions were provided. Further changes were recommended for various aspects of it, including definitions, qualifications and procedures, liability and the chapter on offences and penalties. The Bill will be amended to reflect multi-stakeholder suggestions and cater to various interests.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-the-sixth-privacy-roundtable-meeting-new-delhi'&gt;https://cis-india.org/internet-governance/blog/report-on-the-sixth-privacy-roundtable-meeting-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>prachi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-30T15:04:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/digitization-and-its-impact-on-society">
    <title>International Summer School: "Digitization and its Impact on Society"</title>
    <link>https://cis-india.org/news/digitization-and-its-impact-on-society</link>
    <description>
        &lt;b&gt;Dr. Nishant Shah will be the key note speaker in the session "Social Networks and the Revolution of Political Communication". The event is being hosted by the Dresden Center for Digital Linguistics from September 29 to October 5, 2013. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://linguistik.zih.tu-dresden.de/digitization/wp-content/uploads/2013/08/Programme_summerschool_DigitizationV2.pdf"&gt;Click to read the full programme schedule published by the Dresden Center for Digital Linguistics&lt;/a&gt;. More details on the program &lt;a class="external-link" href="http://linguistik.zih.tu-dresden.de/digitization/wp-content/uploads/2013/05/Program_summerschool-Digitization1.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Summer School takes place on the TUD campus, mainly in the buildings of the Faculty of Computer Science (Nöthnitzer Straße 46) and the Max Planck Institute for the Physics of Complex Systems (Nöthnitzer Straße 38).&lt;/p&gt;
&lt;h3&gt;Co - Conveners and Scientific Committee&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Noah Bubenhofer, Dresden Center for Digital Linguistics, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Thomas Bürger, Saxon State and University Library Dresden (SLUB)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wolfgang Donsbach, Chair of Communication Studies I, Institute of Media and Communication, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Katrin Etzrodt, Institute of Media and Communication, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Horst - Peter Götting, Chair of Civil Law and Intellectual Property Law, Institute for Intellectual Property, Competition and Media Law, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Lutz Hagen, Chair of Communications Studies II, Institute of Media and Communication, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Thomas Köhler, Professorship for Educational Technology, Institute for Vocational Education, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Holger Kuße,Chair of Linguistics and History of Slavonic Languages, Institute of Slavonic Studies, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Claudia Lange, Chair of English Linguistics, Institute of English and American Studies, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rebecca Renatus, Institute of Media and Communication, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Anne Lauber-Rönsberg, Institute for Intellectual Property, Competition and Media Law, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Joachim Scharloth, Chair of Applied Linguistics, Institute of German Studies, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Eric Schoop, Chair of Business Informatics, esp Information Management, Faculty of Business and Economics&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Marcel Thum, Chair of Public Economics, TU Dresden&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Coordination:&lt;/b&gt; Dresden Center for Digital Linguistics, Joachim Scharloth, Noah Bubenhofer, Yvonne Krämer&lt;/p&gt;
&lt;p&gt;Website: &lt;a class="external-link" href="http://linguistik.zih.tu-dresden.de/digitization/"&gt;http://linguistik.zih.tu-dresden.de/digitization/&lt;/a&gt;&lt;br /&gt;Email: &lt;a class="mail-link" href="mailto:summerschool.gsw@tu-dresden.de"&gt;summerschool.gsw@tu-dresden.de&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/digitization-and-its-impact-on-society'&gt;https://cis-india.org/news/digitization-and-its-impact-on-society&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-20T10:00:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests">
    <title>Mixed signals? Supreme Court notices to states on Facebook arrests </title>
    <link>https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests</link>
    <description>
        &lt;b&gt;In wake of the recent arrests of UP-based scholar Kanwal Bharti and Andhra-based PUCL activist Jaya Vindhyala over their Facebook posts, NDTV aired a discussion on the grey areas of the IT Act. Pranesh Prakash, Shreya Singhal and Faizal Farooqui&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The video was&lt;a class="external-link" href="http://www.ndtv.com/video/player/the-social-network/mixed-signals-supreme-court-notices-to-states-on-facebook-arrests/287157?vod-related"&gt; published by NDTV on August 16, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The NDTV anchor asked Pranesh that this notice — the indicator coming from the government is that nobody seems to really know what section 66A is all about...and at the end of the day we are going to make a case by case decision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh said that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This not just about 66A. This is actually about rule of law. We see that the arrest of Kanwal Bharti is actually a legal arrest. It goes against a judgment of the Allahabad High Court saying that routine arrests shouldn't be made in cases where the imprisonment term is less than 7 years. He actually hasn't been charged under 66A, he was charged under the IPC. It is not just about Internet censorship. It also very much about the rule of law and that completely breaking down in India and ... people's persectives and government's perspectives many times  are withering away when it comes offensive content or what they deem offensive or communal content being posted online...and if  something like what  Kanwal Bharti posted is actually deemed to be illegal under those provisions then lots of statements that the Prime Minister  of India has said should also be deemed to be equally illegal."&lt;/p&gt;
&lt;p&gt;Watch the full video below:&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/oeN5HCvTCF8" width="420"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests'&gt;https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-08-28T08:42:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/forbesindia-august-26-2013-india-internet-privacy-woes">
    <title>India's Internet Privacy Woes</title>
    <link>https://cis-india.org/news/forbesindia-august-26-2013-india-internet-privacy-woes</link>
    <description>
        &lt;b&gt;“For the sake of national security and to protect the privacy of its citizens, India should develop its own social media platforms,” says Dr Kamlesh Bajaj, CEO of Data Security Council of India (DSCI), a Nasscom-promoted ‘self-regulatory’ organisation on data protection and privacy in India, in a blog post dated August 13.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Rohin Dharmakumar was &lt;a class="external-link" href="http://forbesindia.com/article/checkin/indias-internet-privacy-woes/35971/1"&gt;published in Forbes India&lt;/a&gt; on August 26, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Citing a litany of woes, including American control over internet  infrastructure, Bajaj makes the case for India to take a leaf out of  China’s playbook (“even though its reasons were different”) and  encourages the creation of “Indian” social media sites and search  engines.&lt;br /&gt;&lt;br /&gt;“Unfortunately, Dr Bajaj provides a wrong solution to a  correct diagnosis,” says Pranesh Prakash, a policy director with the  Centre for Internet and Society. “First, I can’t think of any  governmental intervention—short of a ban on existing foreign  services—that can make a new Indian service successful. Second, India’s  privacy laws are worse than those in the US. Nothing will stop the US  and Indian governments from coming after this company too.”&lt;br /&gt;&lt;br /&gt;The  problem arises because services like Facebook and Google store all your  data unencrypted on their servers, making it easy for them, or  governments and hackers, to monitor everything you do. The correct  solution, says Prakash, would be to encourage the creation and use of  de-centralised and end-to-end encrypted services that do not store all  your data in one place.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/forbesindia-august-26-2013-india-internet-privacy-woes'&gt;https://cis-india.org/news/forbesindia-august-26-2013-india-internet-privacy-woes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-05T11:09:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-august-26-2013-venkatesh-upadhyay-election-campaign">
    <title>Election campaign: parties draw battle lines on media platforms</title>
    <link>https://cis-india.org/news/livemint-august-26-2013-venkatesh-upadhyay-election-campaign</link>
    <description>
        &lt;b&gt;In the run-up to the 2014 polls, parties are drawing up media strategies that have a focus on young voters.&lt;/b&gt;
        &lt;p&gt;This article by Venkatesh Upadhyay was &lt;a class="external-link" href="http://www.livemint.com/Consumer/XU1EhHP3O5EYJRg3wQGD9M/Election-campaign-parties-draw-battle-lines-on-media-platfo.html"&gt;published in Livemint &lt;/a&gt;on August 26, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Major national political parties have begun to sharpen and tweak their  tools of public relations and media engagement in the run-up to the 2014  general election, with an eager nod towards a voters list that is  expected to be packed by the young.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;National parties currently in the process of shortlisting  their advertising, public relations and mobile marketing agencies  declined to share details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The advertising strategy will crystalize by January. We will go for multiple agencies,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Manish%20Tewari"&gt;Manish Tewari&lt;/a&gt;&lt;/span&gt;, spokesperson for the Congress as well as minister for information and broadcasting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to people familiar with the selection process, &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/JWT"&gt;JWT&lt;/a&gt;&lt;/span&gt;, &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Crayons%20Communications"&gt;Crayons Communications&lt;/a&gt;&lt;/span&gt; and &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Dentsu%20India"&gt;Dentsu India&lt;/a&gt;&lt;/span&gt;,  among others, are all in the race for the Congress business. Home-grown  Crayons has worked closely with the Delhi government and Congress in  the past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Refusing to confirm the names on the shortlist, Tewari said it was a line-up of the “usual suspects”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For social media, the Congress has engaged Delhi-based &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/OMLogic"&gt;OMLogic&lt;/a&gt;&lt;/span&gt;, an online media marketing company, which helped create the website &lt;i&gt;fekuexpress.com&lt;/i&gt; that seeks to highlight the supposedly braggart nature of the opposition Bharatiya Janata Party’s chief campaigner &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Narendra%20Modi"&gt;Narendra Modi&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The website ran contests in which winners received film  tickets. OMLogic was among three shortlisted agencies from 22 that  competed for the same account, a person familiar with the bid said.  According to others aware of the developments, senior Congress leaders  such as &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Digvijay%20Singh"&gt;Digvijay Singh&lt;/a&gt;&lt;/span&gt; and &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Deepender%20Singh%20Hooda"&gt;Deepender Singh Hooda&lt;/a&gt;&lt;/span&gt; helped select the agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;OMLogic helps clients enhance their brands across  platforms and creates social media applications for them. The company  declined to comment for this story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I believe these elections will represent the first time that political parties will have a conscious media strategy,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sanjaya%20Baru"&gt;Sanjaya Baru&lt;/a&gt;&lt;/span&gt;, communications advisor to Prime Minister &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Manmohan%20Singh"&gt;Manmohan Singh&lt;/a&gt;&lt;/span&gt; from 2004 to 2008.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/rigg4vKmrUs" width="420"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;“By conscious I mean that political parties have  acknowledged the role of mass media in getting their message across to  voters. TV has taken the space of political rallies.”
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;Baru said the media strategy for the coming elections was  essentially focused on TV and social media as “both these platforms  allow parties to reach out to large parts of the urban and semi-urban  demographic”.&lt;/div&gt;
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;Close to 60 million new voters have been enrolled for the  2014 election, of whom 17.6 million are 18-19 year-old first-timers. A  study by the Iris Knowledge Foundation and Internet and Mobile  Association of India (IAMAI) estimates the number of urban social media  users to be around 78 million. The main users were in the age groups of  18-24 and 25-34 years.&lt;/div&gt;
&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The Congress has already highlighted the role of social  media in its communication strategy. The party held a special session on  the use of social media by party members on 22 August that was  addressed by minister of state for human resources &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Shashi%20Tharoor"&gt;Shashi Tharoor&lt;/a&gt;&lt;/span&gt;, and &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Manish%20Tewari"&gt;Manish Tewari&lt;/a&gt;&lt;/span&gt;.  In a similar meeting last month, party members were briefed on how to  comment on key issues, including the state of the economy, and  personalities like Modi, who is also Gujarat chief minister.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;It also launched an intranet software called Khidki  (Hindi for window) for use by Congress members. According to party  politicians, another important part of last month’s exercise was to  identify young members who would make up a cadre of spokespersons that  would then participate across news channels.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The BJP, meanwhile, has drafted Internet entrepreneurs &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/B.G.%20Mahesh"&gt;B.G. Mahesh&lt;/a&gt;&lt;/span&gt; and &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Rajesh%20Jain"&gt;Rajesh Jain&lt;/a&gt;&lt;/span&gt; to help the party with its social media operations. Acknowledging the  role of social media in the party’s media strategy, BJP spokesperson &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Nirmala%20Seetharaman"&gt;Nirmala Seetharaman&lt;/a&gt;&lt;/span&gt; said, “Our exercise has already taken on board the position which the  party enjoys on various social media. We only emphasized the content  that such media ought to have,” she added.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Prominent members of the party, led by Modi, have large followings on social media. Modi’s &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Twitter"&gt;Twitter&lt;/a&gt;&lt;/span&gt; account is followed by close to 2.1 million people.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Last week, the BJP launched &lt;i&gt;india272.com&lt;/i&gt; that  would “crowd source” suggestions by the electorate. It also launched a  website where its members can upload “chargesheets” on the Congress-led  United Progressive Alliance. Visitors to &lt;i&gt;www.bjp.org/upachargesheet&lt;/i&gt; can also make use of different social media platforms such as &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Facebook"&gt;Facebook&lt;/a&gt;&lt;/span&gt;, &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Twitter"&gt;Twitter&lt;/a&gt;&lt;/span&gt;, &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/YouTube"&gt;YouTube&lt;/a&gt;&lt;/span&gt; and &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Flickr"&gt;Flickr&lt;/a&gt;&lt;/span&gt; to register their complaints.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Some Internet activists are sceptical about such  strategies. “The average Indian netizen is not that well equipped to  critically analyse the content coming from so-called crowdsourced  mechanisms,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;,  executive director of the Centre for Internet and Society, a  Bangalore-based Internet policy research organization. “I believe that  social media might be one step removed from actual voters and might be  more oriented towards opinion makers. In that sense social media (in  India) behaves very differently from the way it has been used in the  US.”&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;According to an online media expert familiar with the  BJP’s social media campaign, the interactive nature of social media  helps build up an image of transparency while making the party more  accessible to a young audience that has been switching off television  news.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;In addition, social media allows political leaders to gauge public response quickly.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Ajay%20Maken"&gt;Ajay Maken&lt;/a&gt;&lt;/span&gt;,  Congress general secretary and the man who heads the party’s  communication strategy, pointed out in an article published this month  that subjects that become influential on Twitter during the day tend to  turn into full-fledged TV debates by the evening.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;But political parties are not giving up on television channels just yet.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;According to a report by consulting firm KPMG, the number  of Indian households with TV sets is estimated to be 154 million, and  is expected to grow to 173 million by 2017. TAM Media research estimated  the number of TV households to be 123 million in 2009. Meanwhile,  cable- and satellite-owning TV households has in the period 2009-2012  ballooned from 90 million to 126 million, according to TAM.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The Congress has issued guidelines to its members on how  to behave on television. According to individuals familiar with the  move, the party has also set up a research cell that informs Congress  spokespersons about subjects that they are asked to speak on.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Congress members who participate in televised debates  have been given strict orders to not go on air without a thorough  understanding of the nuances of issues—provided to them by Congress  researchers. For instance, spokespersons have been advised to rely on  facts and be data-specific when confronted with the twin issues of  Gujarat’s high-growth economy and Modi’s governance record.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;In order to streamline the process, the party has come up  with lists of speakers who are focused on specific issues. It has also  constituted media cells in each state capitals with three  units—spokespersons, social media cell and research —and a social media  division for every urban centre with a population of at least a million.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The BJP has devised a similar strategy. Party  spokespersons have been asked to mention chief ministers other than Modi  if asked about the leadership for the 2014 elections. &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Arun%20Jaitley"&gt;Arun Jaitley&lt;/a&gt;&lt;/span&gt;, in a interview to&lt;i&gt; The Hindu&lt;/i&gt;, on 19 August had spoken about the possibility of there being close to 10 prime ministerial candidates in the BJP.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The BJP, which held a closed-door media workshop for  party members last week, is also keen on research. “A lot of policy  requires specialized understanding which is largely domain-specific. In  that regard, members of our party will need to be prepared when they  speak on such issues,” said spokesperson Seetharaman.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;The Congress has already begun a television  ads-blitzkrieg to trumpet its record in government. Begun in May, these  ads have sought to showcase the fruits of the welfare state, including  schemes aimed at the poor, such as theMahatma Gandhi National Rural  Employment Guarantee Act, as well a long list of rights-based laws. One  well-known ad tells the story of a fictional young woman named Priya who  lives in a village but makes use of opportunities in education and  improved electricity connections to become a successful entrepreneur.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-august-26-2013-venkatesh-upadhyay-election-campaign'&gt;https://cis-india.org/news/livemint-august-26-2013-venkatesh-upadhyay-election-campaign&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-05T10:23:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom">
    <title>Out of the Bedroom</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom</link>
    <description>
        &lt;b&gt;We have shared it with our friends. We have watched it with our lovers. We have discussed it with our children and talked about it with our partners. It is in our bedrooms, hidden in sock drawers. It is in our laptops, in a folder marked "Miscellaneous". It is in our cellphones and tablets, protected under passwords. It is the biggest reason why people have learned to clean their browsing history and cookies from their browsers. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://www.indianexpress.com/news/out-of-the-bedroom/1159657/0"&gt;article by Nishant Shah was published in the Indian Express&lt;/a&gt; on August 25, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Whether we go into surreptitious shops to buy unmarked CDs or trawl through Torrent and user-generated content sites in the quest of a video, there is no denying the fact that it has become a part of our multimedia life. Even in countries like India, where consumption and distribution of pornography are punished by law, we know that pornography is rampant. With the rise of the digital technologies of easy copy and sharing, and the internet which facilitates amateur production and anonymous distribution, pornography has escaped the industrial market and become one of the most intimate and commonplace practices of the online world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, if Google trend results are to be believed, Indians are among the top 10 nationalities searching for pornography daily. Even a quick look at our internet history tells us that it has all been about porn. The morphed pictures of a naked Pooja Bhatt adorned the covers of Stardust in the late 1990s, warning us that the true potential of Photoshop had been realised. The extraordinary sensation of the Delhi Public School MMS case which captured two underage youngsters in a grainy sexcapade announced the arrival of user-generated porn in a big way. The demise of Savita Bhabhi — India's first pornographic graphic novel — is still recent enough for us to remember that the history of the internet in India is book-ended by porn and censorship.&lt;br /&gt;&lt;br /&gt;Recent discussions on pornography have been catalysed by a public interest litigation requesting for a ban on internet pornography filed in April by Kamlesh Vaswani. Whether Vaswani's observations on what porn can make us do stem from his own personal epiphany or his self-appointed role as our moral compass is a discussion that merits its own special space. Similarly, a debate on the role, function, and use of pornography in a society is complex, rich and not for today.&lt;br /&gt;&lt;br /&gt;Instead, I want to focus on the pre-Web imagination of porn that Vaswani and his endorsers are trying to impose upon the rest of us. There is a common misunderstanding that all porn is the same porn, no matter what the format, medium and aesthetics of representations. Or in other words, a homogenising presumption is that erotic fiction and fantasies, pictures of naked people in a magazine, adult films produced by entertainment houses, and user-generated videos on the internet are the same kind of porn. However, as historical legal debates and public discussions have shown us, what constitutes porn is specific to the technologies that produce it. There was a time when DH Lawrence's iconic novel now taught in undergraduate university courses — Lady Chatterley's Lover — was deemed pornographic and banned in India. In more recent times, the nation was in uproar at the Choli ke peeche song from Khalnayak which eventually won awards for its lyrics and choreography.&lt;br /&gt;&lt;br /&gt;In all the controversy, there has so far been a "broadcast imagination" of how pornography gets produced, consumed and distributed. There is a very distinct separation of us versus them when it comes to pornography. They produce porn. They distribute porn. They push porn down our throats (that was probably a poor choice of words) by spamming us and buying Google adwords to infect our search results. We consume porn. And all we need to do is go and regulate, like we do with Bollywood, the central management and distribution mechanism so that the flow of pornography can be curbed. This is what I call a broadcast way of thinking, where the roles of the performers, producers, consumers and distributors of pornography are all distinct and can be regulated.&lt;br /&gt;&lt;br /&gt;However, within the murky spaces of the World Wide Web, the scenario is quite different. Internet pornography is not the same as availability of pornography on the internet. True, the digital multimedia space of sharing and peer-2-peer distribution has made the internet the largest gateway to accessing pornographic objects which are produced through commercial production houses. However, the internet is not merely a way of getting access to existing older forms of porn. The internet also produces pornography that is new, strange, unprecedented and is an essential part of the everyday experience of being digitally connected and networked into sociality.&lt;br /&gt;&lt;br /&gt;The recent controversies about the former congressman from New York, Anthony Weiner, sexting — sending inappropriate sexual messages through his cellphone — gives us some idea of what internet porn looks like. It is not just something captured on a phone-cam but interactive and collaboratively produced. Or as our own Porngate, where two cabinet ministers of the Karnataka legislative assembly were caught surfing some good old porn on their mobile devices while the legislature was in session, indicated, porn is not something confined to the privacy of our rooms. Naked flashmobs, young people experimenting with sexual identities in public, and sometimes bizarre videos of a bus-ride where the camera merely captures the banal and the everyday through a "pornographic gaze" are also a part of the digital porn landscape. The world of virtual reality and multiple online role-playing games offer simulated sexual experiences that allow for human, humanoid, and non-human avatars to engage in sexual activities in digital spaces. Peer-2-peer video chat platforms like Chatroulette, offer random encounters of the naked kind, where nothing is recorded but almost everything can be seen.&lt;br /&gt;&lt;br /&gt;The list of pornography produced by the internet — as opposed to pornography made accessible through the internet — is huge. It doesn't just hide in subcultural practices but resides on popular video-sharing sites like YouTube or Tumblr blogs. It vibrates in our cellphones as we connect to people far away from us, and pulsates on the glowing screens of our tablets as we get glimpses of random strangers and their intimate bodies and moments. An attempt to ban and censor this porn is going to be futile because it does not necessarily take the shape of a full narrative text which can be examined by others to judge its moral content. Any petition that tries to censor such activities is going to fall flat on its face because it fails to recognise that sexual expression, engagement and experimentation is a part of being human — and the ubiquitous presence of digital technologies in our life is going to make the internet a fair playground for activities which might seem pornographic in nature. In fact, trying to restrict and censor them, will only make our task of identifying harmful pornography — porn that involves minors, or hate speech or extreme acts of violence — so much more difficult because it will be pushed into the underbelly of the internet which is much larger than the searched and indexed World Wide Web.&lt;br /&gt;&lt;br /&gt;Trying to suggest that internet pornography is an appendage which can be surgically removed from everyday cyberspace is to not understand the integral part that pornography and sexual interactions play in the development and the unfolding of the internet. The more fruitful efforts would be to try and perhaps create a guideline that helps promote healthy sexual interaction and alerts us to undesirable sexual expressions which reinforce misogyny, violence, hate speech and non-consensual invasions of bodies and privacy. This blanket ban on trying to sweep all internet porn under a carpet is not going to work — it will just show up as a big bump, in places we had not foreseen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom'&gt;https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-09-06T08:32:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth">
    <title>Dear Milind Deora, Prakash Javadekar Deserved The Truth</title>
    <link>https://cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth</link>
    <description>
        &lt;b&gt;Milind Deora, the Minister of State for Communications, Information Technology and Shipping, isn’t your typical politician.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Rohin Dharmakumar was &lt;a class="external-link" href="http://forbesindia.com/blog/technology/dear-milind-deora-prakash-javadkar-deserved-the-truth/"&gt;published in Forbesindia Magazine &lt;/a&gt;on August 22, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;At just 36, he’s way younger than the average cabinet minister (&lt;a href="http://articles.timesofindia.indiatimes.com/2010-08-29/india/28316521_1_average-age-median-age-prime-minister"&gt;64&lt;/a&gt;) or Member of Parliament (&lt;a href="http://articles.timesofindia.indiatimes.com/2009-05-18/india/28196750_1_congress-mp-average-age-15th-lok-sabha"&gt;53&lt;/a&gt;). He’s also richer (&lt;a href="http://myneta.info/unionministers2011/candidate.php?candidate_id=76"&gt;Rs.17.5 crore&lt;/a&gt; compared to &lt;a href="http://www.firstpost.com/politics/parliament-at-60-how-rich-are-our-netas-311074.html"&gt;Rs.5.3 crore&lt;/a&gt; for the average M.P.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He’s got his own website - &lt;a href="http://www.milinddeora.in/"&gt;www.milinddeora.in&lt;/a&gt; -  which unlike most of his peer’s websites, is fairly well-designed and  constantly updated. He’s also an avid user of social networks like  Twitter (&lt;a href="https://twitter.com/milinddeora"&gt;@milinddeora&lt;/a&gt;) and &lt;a href="https://www.facebook.com/milind.deora.14"&gt;Facebook&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Oh, he’s also a Blues fan and a &lt;a href="http://blogs.wsj.com/indiarealtime/2011/05/11/mp-milind-deora-shreds-on-blues-guitar/"&gt;pretty good&lt;/a&gt; guitarist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, he’s the kind of politician or minister many Indians would like to vote for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And vote they do, in fact. Deora’s won the Mumbai (South) parliamentary constituency two times in a row, garnering &lt;a href="http://www.indian-elections.com/maharashtra/mumbai-south.html"&gt;nearly twice&lt;/a&gt; his next opponent’s votes during the 2009 elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which is why it’s surprising, and saddening, to see Deora trot out a  patently false set of answers to how America’s global dragnet of  Internet surveillance is affecting the privacy of Indians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 16th August Deora responded to &lt;a href="http://rajyasabha.nic.in/"&gt;a question from Rajya Sabha M.P.&lt;/a&gt; and BJP Spokesperson Prakash Javadekar, asking the following:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;(a) whether it is a fact that India was the fifth  most tracked country by the United States intelligence, particularly on  the internet;&lt;/i&gt;&lt;br /&gt; &lt;i&gt; (b) if so, the details thereof;&lt;/i&gt;&lt;br /&gt; &lt;i&gt; (c) the impact of USA”s surveillance program-Prism and Boundless Information on the country; and&lt;/i&gt;&lt;br /&gt; &lt;i&gt; (d) the steps Government intends to take to protect country”s interests and the privacy of its citizens?&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Javadekar’s question was sorely needed in light of the near-daily  disclosures being made about the scarily omnipresent extent to which the  US Government spies on global Internet users through a myriad of ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India, as Javadekar rightly pointed out, was indeed the &lt;a href="http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;fifth most monitored country&lt;/a&gt; under the “Boundless Informant” data mining tool that tracks the NSA’s  (the US’ lead communications spy agency) global surveillance efforts. In  just March 2013 alone, according to a leaked presentation on the tool,  the NSA collected 6.3 billion pieces of information from India. Suffice  it to say, the information would have come from Indian citizens,  businesses, ministries, bureaucrats and of course, members of Parliament  (most of who now use webmail and social network from the likes of  Google and Facebook).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The only countries that were spied upon more than us were Iran, Pakistan, Jordan and Egypt. Some sobering company, that!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One would thus expect Deora to be seized of the urgency and concern behind Javadekar’s questions. His answer was:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;(a) &amp;amp; (b) In June 2013, Media reports have  disclosed that India is the fifth largest target of United States  electronic surveillance programmes, in terms of interception of  communications on fibre cables and other infrastructure. As per media  reports, United States agencies used a number of methods to gather  intelligence including intercepting communication on fibre cables and  infrastructure, collecting information from servers of global internet  and Telecom Service Providers. Such companies include Google, Facebook,  Microsoft, Apple, Yahoo, AOL,Youtube, Paltalk and Skype.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Here we have a member of Parliament asks India’s Minister for  Communications &amp;amp; IT about the extent to which Indian citizens and  businesses are being spied upon by the US – ostensibly a friendly  country – and all the Minister could do was cite newspaper reports?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What about your own investigations Mr.Minister? What is the opinion  of your leading spy agencies like the NTRO, R&amp;amp;AW and IB? Are they  also relying on newspaper reports?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But wait, Deora does go on to provide a few more answers:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;(c) &amp;amp; (d) Government has expressed concerns over  reported United States monitoring of internet traffic from India.  Concerns with regard to violation of any Indian laws relating to privacy  of information of ordinary Indian citizen as well as intrusive data  capture deployed against Indian citizens or government infrastructure  have been conveyed to the United States. The issue of United States  Cyber surveillance activities was discussed during the Indo-US (India  United States ) strategic dialogue meeting held in New Delhi on  24.06.2013.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Whew. That was reassuring. We expressed “concerns with regard to  violation of any Indian laws relating to privacy of information” to the  US during a “strategic dialogue meeting”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let me guess what the US side responded: “Sure. We’ll do that. Come back to us when you have a privacy law. Ha ha!”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Sunil Abraham, the director for the Center for Internet &amp;amp; Society points out in Forbes India, India has &lt;a href="http://forbesindia.com/article/recliner/freedom-from-monitoring-india-inc-should-push-for-privacy-laws/35911/1"&gt;no modern and comprehensive privacy law&lt;/a&gt;. And the government is working on a new one for only &lt;b&gt;the last three years&lt;/b&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;What would an ideal privacy law for India look like?  For one, it would protect the rights of all persons, regardless of  whether they are citizens or residents. Two, it would define privacy  principles. Three, it would establish the office of an independent and  autonomous privacy commissioner, who would be sufficiently empowered to  investigate and take action against both government and private  entities. Four, it would define civil and criminal offences, remedies  and penalties. And five, it would have an overriding effect on previous  legislation that does not comply with all the privacy principles.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;The Justice AP Shah Committee report, released in October 2012,  defined the Indian privacy principles as notice, choice and consent,  collection limitation, purpose limitation, access and correction,  disclosure of information, security, openness and accountability. The  report also lists the exemptions and limitations, so that privacy  protections do not have a chilling effect on the freedom of expression  and transparency enabled by the Right to Information Act.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;The Department of Personnel and Training has been working on a  privacy bill for the last three years. Two versions of the bill had  leaked before the Justice AP Shah Committee was formed. The next version  of the bill, hopefully implementing the recommendations of the Justice  AP Shah Committee report, is expected in the near future. In a  multi-stakeholder-based parallel process, the Centre for Internet and  Society (where I work), along with FICCI and DSCI, is holding seven  round tables on a civil society draft of the privacy bill and the  industry-led efforts on co-regulation.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div style="text-align: justify; "&gt;Which brings me to the final part of Deora’s response to Javadekar:&lt;/div&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;United States official responded that PRISM dealt  only with Meta Data (related to the direction and the flow of the  traffic) and only broad patterns of telephony and internet traffic are  monitored. United States Officials maintained that data content/content  of emails are not accessed or not monitored under these surveillance  programmes; therefore, it is not a violation of privacy. It was stated  by United States that its agencies need to get separate authorization  from Foreign Intelligence Surveillance Act (FISA) court, if they want to  access the content of any of the data intercepted by these surveillance  programmes.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Dear Mr.Minister, either you have been lied to by your friendly “United States Official”, or, well…&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, by limiting the answer to only PRISM, which happens to be  just one of the NSA’s secret tools for online surveillance, you are  willfully or inadvertently narrowing down Javadekar’s question which  specifically mentions other tools like Boundless Informant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost all of the big Internet companies revealed to be part of the NSA’s global spying mechanism have also &lt;a href="http://www.theatlanticwire.com/technology/2013/06/prism-companies-start-denying-knowledge-nsa-program-collecting-their-users-data/65996/"&gt;used the same tactic to tailor their denials&lt;/a&gt;.  I suppose they got the cue from the NSA, which loves using the “Under  This Program” dodge to derail specific questions about its secret  programs, &lt;a href="https://www.eff.org/deeplinks/2013/08/guide-deceptions-word-games-obfuscations-officials-use-mislead-public-about-nsa"&gt;according to the Electronic Frontier Foundation&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;Another tried and true technique in the NSA  obfuscation playbook is to deny it does one invasive thing or another  “under this program.” When it’s later revealed the NSA actually does do  the spying it said it didn’t, officials can claim it was just part of  another program not referred to in the initial answer.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In case you weren’t aware of the NSA’s obfuscation tactics Mr.Minister, here is another great piece on it from the Slate – &lt;a href="http://www.slate.com/articles/news_and_politics/politics/2013/07/nsa_lexicon_how_james_clapper_and_other_u_s_officials_mislead_the_american.html"&gt;“How to Decode the True Meaning of What NSA Officials Say”&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus when your friendly US official tells you that “only meta data  (related to the direction and the flow of the traffic) and only broad  patterns of telephony and internet traffic are monitored” under PRISM,  not “data content/content of emails”, he or she is technically right.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Because the NSA has other programs that capture all of that. For  instance, XKeyscore, which according to leaked presentations, it can  capture &lt;a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data"&gt;“nearly everything a typical user does on the internet”&lt;/a&gt;. This includes emails, visits to websites, web searches and Facebook chats &amp;amp; private messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Did you also know, Mr. Minister, that the XKeyscore surveillance program has &lt;a href="http://www.thehindu.com/news/international/world/nsas-xkeyscore-surveillance-program-has-servers-in-india/article4978248.ece"&gt;servers located inside India&lt;/a&gt;?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, you make a statement that is patently false. You say that US  spy agencies need authorizations from the secret Foreign Intelligence  Surveillance Courts (FISC) in order to access the data collected by  various surveillance programs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FISA courts almost always approve &lt;i&gt;any request&lt;/i&gt; made to them (they apparently &lt;a href="http://www.motherjones.com/mojo/2013/06/fisa-court-nsa-spying-opinion-reject-request"&gt;rejected just 11 requests out of 33,900&lt;/a&gt; made by the US government in the last 33 years), so that’s that for oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And in the NSA’s Orwellian world of doublespeak, large scale interception and storage of Internet communications &lt;a href="https://www.eff.org/nsa-spying/wordgames#collect"&gt;isn’t considered “collected”&lt;/a&gt; till such time one of their agents has had a chance to look at it.  Which means if you’re reading this post – the NSA’s secret servers over  the world and in India can coolly capture that and store it in vast  databases for posterity – without it ever registering as a “collection”  or requiring any approval from FISA courts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fact is, Mr.Minister, we “foreigners” (unless you belong to one of the four other countries that are part of the &lt;a href="http://www.theatlantic.com/politics/archive/2013/06/is-the-five-eyes-alliance-conspiring-to-spy-on-you/277190/"&gt;“Five Eyes” alliance&lt;/a&gt;, in which case you’ll be treated with a wee bit more caution) , that is, us, &lt;a href="http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls"&gt;are fair game&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;The intelligence data is being gathered under Section  702 of the of the Fisa Amendments Act (FAA), which gives the NSA  authority to target without warrant the communications of foreign  targets, who must be non-US citizens and outside the US at the point of  collection.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;The communications of Americans in direct contact with foreign  targets can also be collected without a warrant, and the intelligence  agencies acknowledge that purely domestic communications can also be  inadvertently swept into its databases. That process is known as  “incidental collection” in surveillance parlance.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;We expected better answers from you Mr.Minister – sorry, &lt;i&gt;expect&lt;/i&gt; better.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alas your recent answers don’t inspire much trust, for instance when you tell us constant surveillance is &lt;a href="http://www.medianama.com/2013/06/223-prism-milind-deora-cms-central-monitoring-system/"&gt;“good for us”&lt;/a&gt; and &lt;a href="http://www.livemint.com/Politics/rpWFiDJroLgpLQ6yKdR3pJ/Telcos-to-soon-link-with-government-monitoring-system.html"&gt;“will enhance the privacy of citizens”&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Or when you tell us that “Google Hangouts” – a service provided by &lt;a href="http://forbesindia.com/article/real-issue/is-google-gobbling-up-the-indian-internet-space/35641/0"&gt;a company that looms over nearly everything Indians do online&lt;/a&gt; – is &lt;a href="http://businesstoday.intoday.in/story/elections-2014-google-hangouts-is-proving-especially-popular/1/197250.html"&gt;a better medium to reach out to people than Parliament or Television&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We deserve the truth from you Mr.Minister. Just like Prakash Javadekar.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth'&gt;https://cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-05T10:38:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring">
    <title>Freedom from Monitoring: India Inc Should Push For Privacy Laws</title>
    <link>https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring</link>
    <description>
        &lt;b&gt;More surveillance than absolutely necessary actually undermines the security objective.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Sunil Abraham was &lt;a class="external-link" href="http://forbesindia.com/article/recliner/freedom-from-monitoring-india-inc-should-push-for-privacy-laws/35911/1"&gt;published in Forbes India Magazine&lt;/a&gt; on August 21, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I think I understand why the average Indian IT entrepreneur or enterprise does not have a position on blanket surveillance. This is because the average Indian IT enterprise’s business model depends on labour arbitrage, not intellectual property. And therefore they have no worries about proprietary code or unfiled patent applications being stolen by competitors via rogue government officials within projects such as NATGRID, UID and, now, the CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A sub-section of industry, especially the technology industry, will always root for blanket surveillance measures. The surveillance industry has many different players, ranging from those selling biometric and CCTV hardware to those providing solutions for big data analytics and legal interception systems. There are also more controversial players who provide spyware, especially those in the market for zero-day exploits. The cheerleaders for the surveillance industry are techno-determinists who believe you can solve any problem by throwing enough of the latest and most expensive technology at it.&lt;br /&gt;&lt;br /&gt;What is surprising, though, is that other indigenous or foreign enterprises that depend on secrecy and confidentiality—in sectors such a banking, finance, health, law, ecommerce, media, consulting and communications—also don’t seem to have a public position on the growing surveillance ambitions of ‘democracies’ such as India and the United States of America. (Perhaps the only exceptions are a few multinational internet and software companies that have made some show of resistance and disagreement with the blanket surveillance paradigm.)&lt;br /&gt;&lt;br /&gt;Is it because these businesses are patriotic? Do they believe that secrecy, confidentiality and, most importantly, privacy, must be sacrificed for national security? If that were true then it would not be a particularly wise thing to do, as privacy is the precondition for security. Ann Cavoukian, privacy commissioner of Ontario, calls it a false dichotomy. Bruce Schneier, security technologist and writer, calls it a false zero sum game; he goes on to say, “There is no security without privacy. And liberty requires both security and privacy.”&lt;br /&gt;&lt;br /&gt;The reason why the secret recipe of Coca Cola is still secret after over 120 years is the same as the reason why a captured soldier cannot spill the beans on the overall war strategy. Corporations, like militaries, have layers and layers of privacy and secrecy. The ‘need to know’ principle resists all centralising tendencies, such as blanket surveillance. It’s important to note that targeted surveillance to identify a traitor or spy within the military, or someone engaged in espionage within a corporation, is pretty much an essential. However, any more surveillance than absolutely necessary actually undermines the security objective. To summarise, privacy is a pre-condition to the security of the individual, the enterprise, the military and the nation state.&lt;br /&gt;&lt;br /&gt;Most people complaining online about projects like the Central Monitoring System seem to think that India has no privacy laws. This is completely untrue: We have around 50 different laws, rules and regulations that aim to uphold privacy and confidentiality in various domains. Unfortunately, most of those policies are very dated and do not sufficiently take into account the challenges of contemporary information societies. These policy documents need to be updated and harmonised through the enactment of a new horizontal privacy law. A small minority will say that Section 43(A) of the Information Technology Act is the India privacy law. That is not completely untrue, but is a gross exaggeration. Section 43(A) is really only a data security provision and, at that, it does not even comprehensively address data protection, which is only a sub-set of the overall privacy regulation required in a nation. &lt;br /&gt;&lt;br /&gt;What would an ideal privacy law for India look like? For one, it would protect the rights of all persons, regardless of whether they are citizens or residents. Two, it would define privacy principles. Three, it would establish the office of an independent and autonomous privacy commissioner, who would be sufficiently empowered to investigate and take action against both government and private entities. Four, it would define civil and criminal offences, remedies and penalties. And five, it would have an overriding effect on previous legislation that does not comply with all the privacy principles. &lt;br /&gt;&lt;br /&gt;The Justice AP Shah Committee report, released in October 2012, defined the Indian privacy principles as notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, openness and accountability. The report also lists the exemptions and limitations, so that privacy protections do not have a chilling effect on the freedom of expression and transparency enabled by the Right to Information Act.&lt;br /&gt;&lt;br /&gt;The Department of Personnel and Training has been working on a privacy bill for the last three years. Two versions of the bill had leaked before the Justice AP Shah Committee was formed. The next version of the bill, hopefully implementing the recommendations of the Justice AP Shah Committee report, is expected in the near future. In a multi-stakeholder-based parallel process, the Centre for Internet and Society (where I work), along with FICCI and DSCI, is holding seven round tables on a civil society draft of the privacy bill and the industry-led efforts on co-regulation.&lt;br /&gt; &lt;br /&gt;The Indian ITES, KPO and BPO sector should be particularly pleased with this development. As should any other Indian enterprise that holds personal information of EU and US nationals. This is because the EU, after the enactment of the law, will consider data protection in India adequate as per the requirements of its Data Protection Directive. This would mean that these enterprises would not have to spend twice the time and resources ensuring compliance with two different regulatory regimes.&lt;br /&gt;&lt;br /&gt;Is the lack of enthusiasm for privacy in the Indian private sector symptomatic of Indian societal values? Can we blame it on cultural relativism, best exemplified by what Simon Davies calls “the Indian Train Syndrome, in which total strangers will disclose their lives on a train to complete strangers”? But surely, when email addresses are exchanged at the end of that conversation, they are not accompanied by passwords. Privacy is perhaps differently configured in Indian societies but it is definitely not dead. Fortunately for us, calls to protect this important human right are growing every day.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring'&gt;https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-21T07:04:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy">
    <title>Balancing vigilance and privacy</title>
    <link>https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy</link>
    <description>
        &lt;b&gt;As the government steps up its surveillance capabilities, the entire social contract between the state and citizens is being reformulated, with worrying consequences.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;This article by Prashant Jha was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/balancing-vigilance-and-privacy/article5037582.ece"&gt;published in the Hindu on August 18, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Indian state is arming itself with both technological capabilities  and the institutional framework to track the lives of citizens in an  unprecedented manner.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A new Centralised Monitoring System (CMS) is in the offing, which would build on the already existing mechanisms. As &lt;i&gt;The Hindu &lt;/i&gt;reported  on June 21, this would allow the government to access in real-time any  mobile and fixed line conversation, SMS, fax, website visit, social  media usage, Internet search and email, and will have ‘unmatched  capabilities of deep search surveillance and monitoring’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Civil society groups and citizens expressed concern about the  government’s actions, plans, and intent at a discussion organised by the  Foundation for Media Professionals, on Saturday.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The context&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Usha Ramanathan, a widely respected legal scholar, pointed to the larger  political context which had permitted this form of surveillance. It  stemmed, she argued, from a misunderstanding of the notion of  sovereignty. “It is not the government, but the people who are  sovereign.” Laws and the Constitution are about limiting the power of  the state, but while people were being subjected to these restrictions,  the government itself had found ways to remain above it – either by not  having laws, or having ineffective regulators. States knew the kind of  power they exercised over citizens, with the result that ‘impunity had  grown’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“There is also a complete breakdown of the criminal justice system,” Ms  Ramanathan said. This had resulted in a reliance on extra-judicial  methods of investigation, and ‘scape-goating’ had become the norm.  ‘National security’ had been emphasised, re-emphasised, and projected as  the central goal. “We haven’t paused to ask what this means, and the  extent to which we have been asked to give up personal security for the  sake of national security.” It was in this backdrop that technology had  advanced by leaps, and made extensive surveillance possible.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The implications are enormous. The data is often used for purposes it is  not meant for, including political vendetta, keeping track of rivals,  corporates, and digging out facts about a citizen when he may have  antagonised those in power.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Pranesh Prakash, director of the Centre of Internet and Society (CIS)  looked back at the killing of Haren Pandya, the senior Bharatiya Janata  Party (BJP) leader in Gujarat. Mr Pandya was using the SIM card of a  friend, and it was by tracking the SIM, and through it his location,  that the Gujarat government got to know that Mr Pandya had deposed  before a commission and indicted the administration for its role in the  riots. Eventually, he was found murdered outside a park in Ahmedabad.  The Gujarat Police had accessed call details of 90,000 phones.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It is also not clear whether mining this kind of data has been effective  for the national security purposes, which provide the reason for doing  it in the first place. Saikat Datta, resident editor of Daily News and  Analysis, and an expert on India’s intelligence apparatus, said a core  problem was the absence of any auditing and over sight. “There needs to  be a constant review of the number of calls, emails under surveillance,  with questions about whether it is yielding results. But this does not  happen, probably because a majority is not for counter-terrorism. There  would be trouble if you build accountability mechanisms.” When he sought  information under RTI around precisely such issues, he was denied  information on the grounds that it would strengthen ‘enemies of the  state’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Anja Kovacs, who works with the Internet Democracy Project, said this  form of “mass surveillance” criminalised everybody since it was based on  the assumption that each citizen was a “potential criminal”. She also  pointed out that having “more information” did not necessarily mean it  was easier to address security threats – there was intelligence  preceding the Mumbai attacks, but it was not acted upon. She added,  “Most incidents have been resolved by traditional intelligence.  Investing in agencies, training them better could be more effective.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Bring in the caveats&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Few argue that the state is not entitled to exercise surveillance at  all. In fact, a social contract underpins democratic states. Citizens  agree to subject some of their rights to restrictions, and vest the  state with the monopoly over instruments and use of violence. In turn,  the state – acting within a set of legal principles; being accountable  to citizens; and renewing its popular legitimacy through different  measures, including elections – provides order and performs a range of  developmental functions.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This framework, citizens and civil liberty groups worry, is under threat  with governments appropriating and usurping authority to conduct  unprecedented surveillance. Citizen groups, technology and privacy  experts came together globally to draft the International Principles on  the Application of Human Rights to Communication Surveillance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It prescribed that any restriction to privacy through surveillance must  be ‘legal’; it must be for a ‘legitimate aim’; it must be ‘strictly and  demonstrably necessary’; it must be preceded by showing to an  established authority that other ‘less invasive investigative  techniques’ have been used; it must follow ‘due process’; decisions must  be taken by a ‘competent judicial authority’; there must be ‘public  oversight’ mechanisms; and ‘integrity of communications and systems’  should be maintained. (Full text available on  www.necessaryandproportionate.org)Mr Prakash of CIS, which has done  extensive work on surveillance and privacy issues, said, “An additional  principle must be collection limitation or data minimisation.” Giving  the instance of Indian Railways seeking the date of birth from a  customer booking a ticket, Mr Prakash said this was not information  which was necessary. But it could be used by hackers and many other  agencies to access an individual’s private transactions in other areas.  The UPA government is finalising a privacy Bill, but its final version  is not yet public, and it is not clear how far the government would go  in protecting citizen rights.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy'&gt;https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-05T10:53:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/forbesindia-august-13-2013-rohin-dharmakumar-how-nextgen-smartphone-users-are-being-bought-and-sold">
    <title>How Next-Gen Smartphone Users are Being Bought and Sold</title>
    <link>https://cis-india.org/news/forbesindia-august-13-2013-rohin-dharmakumar-how-nextgen-smartphone-users-are-being-bought-and-sold</link>
    <description>
        &lt;b&gt;After facebook and google, Twitter became the latest to buy millions of Indian smartphone users in July.

&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Rohin Dharmakumar was published by &lt;a class="external-link" href="http://forbesindia.com/article/checkin/how-nextgen-smartphone-users-are-being-bought-and-sold/35859/1"&gt;Forbes India Magazine&lt;/a&gt; on August 13, 2013, and later mirrored in &lt;a class="external-link" href="http://ibnlive.in.com/news/how-nextgen-smartphone-users-are-being-bought-and-sold/415719-11.html"&gt;IBN Live&lt;/a&gt; on August 19, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Now, the actual announcement was about how Twitter had partnered with  Vodafone India to offer its services ‘free of cost’ to mobile  subscribers for three months. It had already inked similar deals with  Airtel and Reliance, according to Medianama, a digital media news site.  Google and Facebook, too, announced such agreements during the past  year, whereby mobile subscribers could use their service ‘free of cost’  through their phones.&lt;br /&gt;&lt;br /&gt;Nothing is really ‘free’ on the web, which  is why we have the adage: “If you’re not paying for it, you are the  product”. So these large web companies are actually buying millions of  first-time mobile internet users by paying off their respective mobile  operators. Of India’s 137 million internet users, roughly 120 million  access mobile internet. &lt;br /&gt;&lt;br /&gt;Sunil Abraham, director of the Centre  for Internet &amp;amp; Society in Bangalore, thinks India could be going  down the Indonesia route. “If you ask the average Indonesian mobile user  if he or she has internet access, they might say no. Ask them if they  have Facebook or Twitter, and they’ll say yes!” Incidentally, 96 percent  of Indonesians use social media, mostly from their phones. &lt;br /&gt;&lt;br /&gt;Smaller  competitors to Facebook, Google and Twitter who can’t afford to pay  mobile operators on similar terms will find their competitiveness  shrinking. Meanwhile, a large number of Indians will balk at paying for  internet usage on their phones because the social networks are all  ‘free’.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/forbesindia-august-13-2013-rohin-dharmakumar-how-nextgen-smartphone-users-are-being-bought-and-sold'&gt;https://cis-india.org/news/forbesindia-august-13-2013-rohin-dharmakumar-how-nextgen-smartphone-users-are-being-bought-and-sold&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-05T10:48:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security">
    <title>Surveillance: Privacy Vs Security </title>
    <link>https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security</link>
    <description>
        &lt;b&gt;The Foundation for Media Professionals is organizing a debate at the India International Centre, New Delhi on August 17, 2013. Shri Kapil Sibal will give the opening speech. Natgrid chief Raghu Raman is one of the debaters. Pranesh Prakash is participating in this event as a panelist.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://fmp.org.in/index.php/events"&gt;published by the Foundation for Media Professionals&lt;/a&gt; on their website. Also read the &lt;a class="external-link" href="http://fmp.org.in/index.php/events/eventDetail/51"&gt;blog post&lt;/a&gt; by Vivian Fernandes and Ninglun Hanghal.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the backdrop of the recent disclosures by US defense contractor Edward Snowden about the activity of the National Security Agency (NSA) and reports that NSA may have collaborated with India on surveillance program in the country that have raised concerns about privacy and right of citizens, Foundation for Media Professionals (FMP) in partnership with Friedrich Ebert Stiftung (FES) invited Pranesh Prakash to a panel discussion on "Surveillance: Privacy vs. Security".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Speaker&lt;/b&gt;&lt;br /&gt;Kapil Sibal, Union Minister for Communications and Information Technology, Govt. of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Panelists&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Dr. Usha Ramanathan, Independent Law Researcher&lt;/li&gt;
&lt;li&gt;Saikat Datta, Resident Editor, DNA&lt;/li&gt;
&lt;li&gt;Capt. Raghu Raman, National Intelligence Grid (Natgrid)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Moderator&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Paranjoy Guha Thakurta&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security'&gt;https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-19T05:32:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata">
    <title>FinFisher in India and the Myth of Harmless Metadata</title>
    <link>https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou argues that metadata is anything but harmless, especially since FinFisher — one of the world's most controversial types of spyware — uses metadata to target individuals. &lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;In light of PRISM, the Central Monitoring System (CMS) and other such surveillance projects in India and around the world, the question of whether the collection of metadata is “harmless” has arisen.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; In order to examine this question, FinFisher&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; — surveillance spyware — has been chosen as a case study to briefly examine to what extent the collection and surveillance of metadata can potentially violate the right to privacy and other human rights. FinFisher has been selected as a case study not only because its servers have been recently found in India&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; but also because its “remote monitoring solutions” appear to be very pervasive even on the mere grounds of metadata.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;FinFisher in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is spyware which has the ability to take control of target computers and capture even encrypted data and communications. The software is designed to evade detection by anti-virus software and has versions which work on mobile phones of all major brands.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In many cases, the surveillance suite is installed after the target accepts installation of a fake update to commonly used software.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Citizen Lab researchers have found three samples of FinSpy that masquerades as Firefox.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is a line of remote intrusion and surveillance software developed by Munich-based Gamma International. FinFisher products are sold exclusively to law enforcement and intelligence agencies by the UK-based Gamma Group.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; A few months ago, it was reported that command and control servers for FinSpy backdoors, part of Gamma International´s FinFisher “remote monitoring solutions”, were found in a total of 25 countries, including India.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The following map, published by the Citizen Lab, shows the 25 countries in which FinFisher servers have been found.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Map.png" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;The above map shows the results of scanning for characteristics of FinFisher command and control servers&lt;/i&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="JUSTIFY"&gt;FinFisher spyware was not found in the countries coloured blue, while the colour green is used for countries not responding. The countries using FinFisher range from shades of orange to shades of red, with the lightest shade of orange ranging to the darkest shade of red on a scale of 1-6,  and with 1 representing the least active servers and 6 representing the most active servers in regards to the use of FinFisher. On a scale of 1-6, India is marked a 3 in terms of actively using FinFisher.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Research published by the Citizen Lab reveals that FinSpy servers were recently found in India, which indicates that Indian law enforcement agencies may have bought this spyware from Gamma  Group and might be using it to target individuals in India.&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;According to the Citizen Lab, FinSpy servers in India have been detected through the HostGator operator and the first digits of the IP address are: 119.18.xxx.xxx. Releasing complete IP addresses in the past has not proven useful, as the servers are quickly shut down and relocated, which is why only the first two octets of the IP address are revealed.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Citizen Lab's research reveals that FinFisher “remote monitoring solutions” were found in India, which, according to Gamma Group's brochures, include the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy: &lt;/b&gt;hardware or software which monitors targets that regularly change location, use encrypted and anonymous communications channels and reside in foreign countries. FinSpy can remotely monitor computers and encrypted communications, regardless of where in the world the target is based. FinSpy is capable of bypassing 40 regularly tested antivirus systems, of monitoring the calls, chats, file transfers, videos and contact lists on Skype, of conducting live surveillance through a webcam and microphone, of silently extracting files from a hard disk, and of conducting a live remote forensics on target systems. FinSpy is hidden from the public through anonymous proxies.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy Mobile:&lt;/b&gt; hardware or software which remotely monitors mobile phones. FinSpy Mobile enables the interception of mobile communications in areas without a network, and offers access to encrypted communications, as well as to data stored on the devices that is not transmitted. Some key features of FinSpy Mobile include the recording of common communications like voice calls, SMS/MMS and emails, the live surveillance through silent calls, the download of files, the country tracing of targets and the full recording of all BlackBerry Messenger communications. FinSpy Mobile is hidden from the public through anonymous proxies.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly USB: &lt;/b&gt;hardware which is inserted into a computer and which can automatically install the configured software with little or no user-interaction and does not require IT-trained agents when being used in operations. The FinFly USB can be used against multiple systems before being returned to the headquarters and its functionality can be concealed by placing regular files like music, video and office documents on the device. As the hardware is a common, non-suspicious USB device, it can also be used to infect a target system even if it is switched off.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly LAN: &lt;/b&gt;software which can deploy a remote monitoring solution on a target system in a local area network (LAN). Some of the major challenges law enforcement faces are mobile targets, as well as targets who do not open any infected files that have been sent via email to their accounts. FinFly LAN is not only able to deploy a remote monitoring solution on a target´s system in local area networks, but it is also able to infect files that are downloaded by the target, by sending fake software updates for popular software or to infect the target by injecting the payload into visited websites. Some key features of the FinFly LAN include: discovering all computer systems connected to LANs, working in both wired and wireless networks, and remotely installing monitoring solutions through websites visited by the target. FinFly LAN has been used in public hotspots, such as coffee shops, and in the hotels of targets.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly Web:&lt;/b&gt; software which can deploy remote monitoring solutions on a target system through websites. FinFly Web is designed to provide remote and covert infection of a target system by using a wide range of web-based attacks. FinFly Web provides a point-and-click interface, enabling the agent to easily create a custom infection code according to selected modules. It provides fully-customizable web modules, it can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly ISP:&lt;/b&gt; hardware or software which deploys a remote monitoring solution on a target system through an ISP network. FinFly ISP can be installed inside the Internet Service Provider Network, it can handle all common protocols and it can select targets based on their IP address or Radius Logon Name. Furthermore, it can hide remote monitoring solutions in downloads by targets, it can inject remote monitoring solutions as software updates and it can remotely install monitoring solutions through websites visited by the target.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Although FinFisher is supposed to be used for “lawful interception”, it has gained notoriety for targeting human rights activists.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; &lt;span&gt;According to &lt;/span&gt;Morgan Marquis-Boire, a security researcher and technical advisor at the Munk School and a security engineer at Google, FinSpy has been used in Ethiopia to target an opposition group called Ginbot.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; Researchers have argued that FinFisher has been sold to Bahrain's government to target activists, and such allegations were based on an examination of malicious software which was emailed to Bahraini activists.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Privacy International has argued that FinFisher has been deployed in Turkmenistan, possibly to target activists and political dissidents.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Many questions revolving around the use of FinFisher and its “remote monitoring solutions” remain   vague, as there is currently inadquate proof of whether this spyware is being used to target individuals by law enforcement agencies in the countries where command and control servers have been found, such as India.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; However, FinFisher's brochures which were circulated in the ISS world trade shows and leaked by WikiLeaks do reveal some confirmed facts: Gamma International claims that its FinFisher products are capable of taking control of target computers, of capturing encrypted data  and of evading mainstream anti-virus software.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; Such products are exhibited in the world's largest surveillance trade show and probably sold to law enforcement agencies around the world.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;This alone unveils a concerning fact: spyware which is so sofisticated that it even evades encryption and anti-virus software is currently in the market and law enforcement agencies can potentially use it to target activists and anyone who does not comply with social conventions.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;A few months ago, two Indian women were arrested after having questioned the shutdown of Mumbai for Shiv Sena patriarch Bal Thackeray's funeral.&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;Thus, it remains unclear what type of behaviour is targeted by law enforcement agencies and whether spyware, such as FinFisher, would be used in India to track individuals without a legally specified purpose.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, India lacks privacy legislation which could safeguard individuals from potential abuse, while sections 66A and 69 of the Information Technology (Amendment) Act, 2008, empower Indian authorities with extensive surveillance capabilites.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;While it remains unclear if Indian law enforcement agencies are using FinFisher spy products to unlawfully target individuals, it is a fact that FinFisher control and command servers have been found in India and that, if used, they could potentially have severe consequences on individuals' right to privacy and other human rights.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;The Myth of Harmless Metadata&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;Over the last months, it has been reported that the Central Monitoring System (CMS) is being implemented in India, through which all telecommunications and Internet communications in the country are being centrally intercepted by Indian authorities. This mass surveillance of communications in India is enabled by the omission of privacy legislation and Indian authorities are currently capturing the metadata of communications.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Last month, Edward Snowden leaked confidential U.S documents on PRISM, the top-secret  National Security Agency (NSA) surveillance programme that collects metadata through telecommunications and Intenet communications. It has been reported that through PRISM, the NSA has tapped into the servers of nine leading Internet companies: Microsoft, Google, Yahoo, Skype, Facebook, YouTube, PalTalk, AOL and Apple.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; While the extent to which the NSA is actually tapping into these servers remains unclear, it is certain that the NSA has collected metadata on a global level.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; Yet, the question of whether the collection of metadata is “harmful” remains ambiguous.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to the National Information Standards Organization (NISO), the term “metadata” is defined as “structured information that describes, explains, locates or otherwise makes it easier to retrieve, use or manage an information resource”. NISO claims that metadata is “data about data” or “information about information”.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; Furthermore, metadata is considered valuable due to its following functions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Resource discovery&lt;/li&gt;
&lt;li&gt;Organizing electronic resources&lt;/li&gt;
&lt;li&gt;Interoperability&lt;/li&gt;
&lt;li&gt;Digital Identification&lt;/li&gt;
&lt;li&gt;Archiving and preservation&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Metadata can be used to find resources by relevant criteria, to identify resources, to bring similar resources together, to distinguish dissimilar resources and to give location information. Electronic resources can be organized through the use of various software tools which can automatically extract and reformat information for Web applications. Interoperability is promoted through metadata, as describing a resource with metadata allows it to be understood by both humans and machines, which means that data can automatically be processed more effectively. Digital identification is enabled through metadata, as most metadata schemes include standard numbers for unique identification. Moreover, metadata enables the archival and preservation of large volumes of digital data.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Surveillance projects, such as PRISM and India's CMS, collect large volumes of metadata, which include the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number, email addresses, IP addresses and browsed webpages.&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; However, the fact that such surveillance projects may not have access to content data might potentially create a false sense of security.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt; When Microsoft released its report on data requests by law enforcement agencies around the world in March 2013, it revealed that most of the  disclosed data was metadata, while relatively very little content data was allegedly disclosed.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;imilarily, Google's transparency report reveals that the company disclosed large volumes of metadata to law enforcement agencies, while restricting its disclosure of content data.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such reports may potentially provide a sense of security to the public, as they reassure that the content of  personal emails, for example, has not been shared with the government, but merely email addresses – which might be publicly available online anyway. However, is content data actually more “harmful” than metadata? Is metadata “harmless”? How much data does metadata actually reveal?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Guardian recently published an article which includes an example of how individuals can be tracked through their metadata. In particular, the example explains how an individual is tracked – despite using an anonymous email account – by logging in from various hotels' public Wi-Fi and by leaving trails of metadata that include times and locations. This example illustrates how an individual can be tracked through metadata alone, even when anonymous accounts are being used.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Wired published an article which states that metadata can potentially be more harmful than content data because “unlike our words, metadata doesn't lie”. In particular, content data shows what an individual says – which may be true or false – whereas metadata includes what an individual does. While the validity of the content within an email may potentially be debateable, it is undeniable that an individual logged into specific websites – if that is what that individuals' IP address shows. Metadata, such as the browsing habits of an individual, may potentially provide a more thorough and accurate profile of an individual than that individuals' email content, which is why metadata can potentially be more harmful than content data.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, voice content is hard to process and written content in an email or chat communication may not always be valid. Metadata, on the other hand, provides concrete patterns of an individuals' behaviour, interests and interactions. For example, metadata can potentially map out an individuals' political affiliation, interests, economic background, institution, location, habits and the people that individual interacts with. Such data can potentially be more valuable than content data, because while the validity of email content is debateable, metadata usually provides undeniable facts. Not only is metadata more accurate than content data, but it is also ideally suited to automated analysis by a computer. As most metadata includes numeric figures, it can easily be analysed by data mining software, whereas content data is more complicated.&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, provide solid proof that the collection of metadata can potentially be “harmful”. In particular, FinFly LAN can be deployed in a target system in a local area network (LAN) by infecting files that are downloaded by the target, by sending fake software updates for popular software or by infecting the payload into visited websites. The fact that FinFly LAN can remotely install monitoring solutions through websites visited by the target indicates that metadata alone can be used to acquire other sensitive data.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFly Web can deploy remote monitoring solutions on a target system through websites. Additionally, FinFly Web can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt; FinFly ISP can select targets based on their IP address or Radius Logon Name. Furthermore, FinFly ISP can remotely install monitoring solutions through websites visited by the target, as well as inject remote monitoring solutions as software updates.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; In other words, FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, can target individuals, take control of their computers and their data, and capture even encrypted data and communications with the help of metadata alone.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The example of FinFisher products illustrates that metadata can potentially be as “harmful” as content data, if acquired unlawfully and without individual consent.&lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; Thus, surveillance schemes, such as PRISM and India's CMS, which capture metadata without individuals' consent can potentially pose a major threat to the right to privacy and other human rights.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; Privacy can be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt; Furthermore, privacy is at the core of human rights because it protects individuals from abuse by those in power.&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt; The unlawful collection of metadata exposes individuals to the potential violation of their human rights, as it is not transparent who has access to their data, whether it is being shared with third parties or for how long it is being retained.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;It is not clear if Indian law enforcement agencies are actually using FinFisher products, but the Citizen Lab did find FinFisher command and control servers in the country which indicates that there is a high probability that such spyware is being used.&lt;a href="#fn49" name="fr49"&gt;[49] &lt;/a&gt;This probability is highly concerning not only because the specific spy products have such advanced capabilities that they are even capable of capturing encrypted data, but also because India currently lacks privacy legislation which could safeguard individuals.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Thus, it is recommended that Indian law enforcement agencies are transparent and accountable if they are using spyware which can potentially breach their citizens' human rights and that privacy legislation is enacted into law. Lastly, it is recommended that all surveillance technologies are strictly regulated with regards to the protection of human rights and that Indian authorities adopt the principles on communication surveillance formulated by the Electronic Frontier Foundation and Privacy International.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt; The above could provide a decisive first step in ensuring that India is the democracy it claims to be.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Robert Anderson (2013), &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;a class="external-link" href="http://bit.ly/fnkGF3"&gt;http://bit.ly/fnkGF3&lt;/a&gt;&lt;a href="http://www.finfisher.com/FinFisher/en/index.php"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Michael Lewis, &lt;i&gt;“FinFisher Surveillance Spyware Spreads to Smartphones”, &lt;/i&gt;&lt;span&gt;The Star: Business, 30 August 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sF2IQ"&gt;http://bit.ly/14sF2IQ&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Marcel Rosenbach, &lt;i&gt;“Troublesome Trojans: Firm Sought to Install Spyware Via Faked iTunes Updates”, &lt;/i&gt;&lt;span&gt;Der Spiegel, 22 November 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sETVV"&gt;http://bit.ly/14sETVV&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Intercept Review, &lt;i&gt;Mozilla to Gamma: stop disguising your FinSpy as Firefox, &lt;/i&gt;&lt;span&gt;02 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/131aakT"&gt;http://bit.ly/131aakT&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Intercept Review, &lt;i&gt;LI Companies Review (3) – Gamma, &lt;/i&gt;&lt;span&gt;05 April 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/Hof9CL"&gt;http://bit.ly/Hof9CL&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy Mobile: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19pPObx"&gt;http://bit.ly/19pPObx&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly USB: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cJSu4h"&gt;http://bit.ly/1cJSu4h&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Jeremy Kirk, &lt;i&gt;“FinFisher Spyware seen Targeting Victims in Vietnam, Ethiopia”, &lt;/i&gt;&lt;span&gt;Computerworld: IDG News, 14 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J8BwW"&gt;http://bit.ly/14J8BwW&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Reporters without Borders: For Freedom of Information (2012), &lt;i&gt;The Enemies of the Internet: Special Edition: Surveillance, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/10FoTnq"&gt;http://bit.ly/10FoTnq&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. Privacy International, &lt;i&gt;FinFisher Report, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/QlxYL0"&gt;http://bit.ly/QlxYL0&lt;/a&gt;&lt;span&gt;&lt;a href="https://www.privacyinternational.org/finfisherreport"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013,&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Adi Robertson, &lt;i&gt;“Paranoia Thrives at the ISS World Cybersurveillance Trade Show”, &lt;/i&gt;&lt;span&gt;The Verge, 28 December 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/tZvFhw"&gt;http://bit.ly/tZvFhw&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. BBC News, &lt;i&gt;“India arrests over Facebook post criticising Mumbai shutdown”, &lt;/i&gt;&lt;span&gt;19 November 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/WoSXkA"&gt;http://bbc.in/WoSXkA&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Indian Ministry of Law, Justice and Company Affairs, &lt;i&gt;The Information Technology (Amendment) Act, 2008, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/19pOO7t"&gt;http://bit.ly/19pOO7t&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Phil Muncaster, &lt;i&gt;“India introduces Central Monitoring System”, &lt;/i&gt;&lt;span&gt;The Register, 08 May 2013,&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt;http://bit.ly/ZOvxpP&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Glenn Greenwald &amp;amp; Ewen MacAskill, &lt;i&gt;“NSA PRISM program taps in to user data of Apple, Google and others”, &lt;/i&gt;&lt;span&gt;The Guardian, 07 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1baaUGj"&gt;http://bit.ly/1baaUGj&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. BBC News, &lt;i&gt;“Google, Facebook and Microsoft seek data request transparency”, &lt;/i&gt;&lt;span&gt;12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/14UZCCm"&gt;http://bbc.in/14UZCCm&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. National Information Standards Organization (2004), &lt;i&gt;Understanding Metadata, &lt;/i&gt;&lt;span&gt;NISO Press, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/LCSbZ"&gt;http://bit.ly/LCSbZ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. The Hindu, &lt;i&gt;“In the dark about 'India's PRISM'”, &lt;/i&gt;&lt;span&gt;16 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bJCXg3"&gt;http://bit.ly/1bJCXg3&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.thehindu.com/sci-tech/technology/in-the-dark-about-indias-prism/article4817903.ece"&gt;&lt;/a&gt; ; Glenn Greenwald, &lt;/span&gt;&lt;i&gt;“NSA collecting phone records of millions of Verizon customers daily”, &lt;/i&gt;&lt;span&gt;The Guardian, 06 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/16L89yo"&gt;http://bit.ly/16L89yo&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. Microsoft: Corporate Citizenship, &lt;i&gt;2012 Law Enforcement Requests Report,&lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/Xs2y6D"&gt;http://bit.ly/Xs2y6D&lt;/a&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Google, &lt;i&gt;Transparency Report&lt;/i&gt;&lt;span&gt;, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J7hKp"&gt;http://bit.ly/14J7hKp&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. Guardian US Interactive Team, &lt;i&gt;A Guardian Guide to your Metadata, &lt;/i&gt;&lt;span&gt;The Guardian, 12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZJLkpy"&gt;http://bit.ly/ZJLkpy&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. Matt Blaze, &lt;i&gt;“Phew, NSA is Just Collecting Metadata. (You Should Still Worry)”, &lt;/i&gt;&lt;span&gt;Wired, 19 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bVyTJF"&gt;http://bit.ly/1bVyTJF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files,&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Shalini Singh, &lt;i&gt;“India's surveillance project may be as lethal as PRISM”, &lt;/i&gt;&lt;span&gt;The Hindu, 21 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/15oa05N"&gt;http://bit.ly/15oa05N&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. Cyberspace Law and Policy Centre, &lt;i&gt;Privacy, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/14J5u7W"&gt;http://bit.ly/14J5u7W&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.cyberlawcentre.org/genl0231/privacy.htm"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. Bruce Schneier, &lt;i&gt;“Privacy and Power”, &lt;/i&gt;&lt;span&gt;Schneier on Security, 11 March 2008, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/i2I6Ez"&gt;http://bit.ly/i2I6Ez&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. Elonnai Hickok, &lt;i&gt;“Draft International Principles on Communications Surveillance and Human Rights”, &lt;/i&gt;&lt;span&gt;The Centre for Internet and Society, 16 January 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata'&gt;https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-13T11:30:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
