<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2301 to 2315.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cybersecurity-the-intersection-of-policy-and-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cybersecurity-workshop-spotlight-on-gccs-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cybersecurity-compilation-indian-context"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/talk-on-cybersecurity-and-internet-of-things"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/cyberscholars-working-group-mit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-ita2008"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition">
    <title>CYFY 2016 - The India Conference on Cyber Security and Internet Governance</title>
    <link>https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition</link>
    <description>
        &lt;b&gt;Sunil Abraham will participate as a panelist at CYFY 2016 event organized by Observer Research Foundation in New Delhi from September 28 to 30, 2016. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Into  its  fourth  edition  this  year,  CyFy:  The  India  Conference  on  Cyber  Security  and  Internet Governance  has  emerged  as  a global platform to discuss, debate and  deliver digital policy solutions. CyFy  2015   featured  nearly   110  participants  from  over  33  countries,  with  nearly  800   delegates  in attendance.  Prominently,  the  conference  sessions  featured  several  experts  from Africa  and  the  Asia Pacific, who addressed  the  policy  priority of connecting  the next  billion. The 2016 iteration of CyFy will highlight the political, economic and strategic questions that underpin this imperative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyfy-2016-agenda/view"&gt;Download the Agenda &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;See the announcement on &lt;a class="external-link" href="http://cyfy.org/"&gt;CYFY website&lt;/a&gt; or write to Samir Saran at &lt;a class="mail-link" href="mailto:ssaran@orfonline.org?subject=CyFy 2016"&gt;ssaran@orfonline.org&lt;/a&gt; or Arun at &lt;a class="mail-link" href="mailto:arun.sukumar@orfonline.org?subject=CyFy 2016"&gt;arun.sukumar@orfonline.org&lt;/a&gt; for more details on the conference.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition'&gt;https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-13T15:23:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance">
    <title> Cyfy 2015: The India Conference on Cyber Security and Internet Governance</title>
    <link>https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance</link>
    <description>
        &lt;b&gt;In its third year, Cyfy; South Asia’s biggest internet policy conference is being held in New Delhi, from 14-16 October, 2015. The event is organized by Observer Research Foundation at Hotel Taj Mansingh. Sunil Abraham is a panelist in the session "Protection of Intellectual Property and Business Secrets in the Knowledge Economy".&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Building on its scope and scale of the previous year — over 55 speakers, from 12 countries, with 350 attendees — the conference discusses issues that affect the emerging world and developed world alike. The conversations will further and widen the debate around internet governance, security, surveillance, freedom of expression, norms of state behaviour, technology and specific societal challenges that emerging and developing countries seek to address by the effective design and deployment on these technologies. In 2015, Cyfy will bring together more experts from South Asia, in order to present new thought on the specific challenges of internet access, policy and regulation, e-governance, financial inclusion, and bottom of the pyramid solutions.&lt;/p&gt;
&lt;p&gt;Along with its growing network of both Indian and international partners, ORF looking forward to hosting another thought-provoking and productive few days, and bridging some digital divides in contemporary internet cyber policy debates.&lt;/p&gt;
&lt;h3&gt;Protection of Intellectual Property and Business Secrets in the Knowledge Economy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Over the past decade, there has been an exponential rise in cyber-enabled theft of intellectual property, and it has been recognized as an unfair predatory practice. With the rise of the globalized knowledge economy, the stability of open trading systems increasingly depends on cross-border IP protection. What is the relevance of the protection of intellectual property and business secrets for economic development and stability of the international trading system?&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cyfy-agenda" class="internal-link"&gt;&lt;b&gt;Download the agenda&lt;/b&gt; &lt;/a&gt;For more info visit &lt;a class="external-link" href="http://cyfy.org/"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance'&gt;https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-17T14:44:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance">
    <title>CYFY 2013: India Conference on Cyber Security and Cyber Governance</title>
    <link>https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance</link>
    <description>
        &lt;b&gt;The Observer Research Foundation in collaboration with the Federation of Indian Chambers of Commerce and Industry is holding the India Conference on Cyber Security and Cyber Governance at the Oberoi Hotel in New Delhi on October 14 and 15, 2013. Sunil Abraham will participate in this event as a speaker.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to download the full details in the &lt;a href="https://cis-india.org/internet-governance/blog/cyfy-brochure.pdf" class="internal-link"&gt;event brochure&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Shri Kapil Sibal, Minister of Communications &amp;amp; Technology will give the inaugural address. Shri Shivshankar Menon, National Security Advisor, Government of India will give the keynote address. Shri Shashi Tharoor, Minister of State, Human Resource Development, Government of India will give the dinner table address on October 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the second day, October 15, Minister Jaak Aaviksoo will give the keynote address and Shri Nehchal Sandhu, Deputy National Advisor, Government of India will give the valedictory address.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;List of Speakers&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Kapil Sibal, Minister for Communications and Information Technology, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shivshankar Menon, National Security Advisor, Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shashi Tharoor, Minister of State for Human Resource Development, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Nehchal Sandhu, Deputy National Security Advisor, Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A.P. Shah, Former Chief Justice, Delhi High Court&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Arvind Gupta, Director General, Institute for Defence Studies and Analyses, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ashish Chauhan, CEO, Bombay Stock Exchange&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;C. Raja Mohan, Distinguished Fellow, ORF&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Christopher Painter, Office of the Coordinator for Cyber Issues, Department Of State, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Dirk Brengelmann, Commissioner for International Cyber Policy, Federal Foreign Office, Germany&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Eric H. Loeb, Vice President, International External Affairs, AT&amp;amp;T&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Gabriel Siboni, Director, Cyber Warfare Program, Institute for National Security Studies, Tel Aviv University, Israel&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Jaak Aaviksoo, Minister of Education and Research of the Republic of Estonia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Jamie Shea, Deputy Assistant Secretary General, Emerging Security Challenges, NATO&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Joe Sullivan, CSO, Facebook&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;John Mallery, Research Scientist, MIT Computer Science &amp;amp; Artificial Intelligence Laboratory, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Maurizio Martellini, Secretary General, Landau Network-Centro Volta and IWG Executive Secretary, Italy&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Michael Cheatham, Head U.S. Representative Office, Indo-US Science and. Technology Forum, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;M.M.Oberoi, Indian Police Service, Joint commissioner of Police, Delhi Police, Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Oleg Demidov, The Russian Center for Policy Studies, Russia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Peter Grabosky, Researcher, Australian National University, Australia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Prakash Nagpal, Senior Vice President, Product Marketing and Marketing, Narus&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rajan Mathews, Director General, Cellular Operators Association of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ram Narain, Deputy Director General (Security), Department of Telecommunication (DoT), Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sandro Gaycken, Freie Universität Berlin, Institute of Computer Science, Germany&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sean Kanuck, National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, Bangalore&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vijay Madan, Chief Mentor, Tata Teleservices (former Director, C-DOT), India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vivke Lall, President &amp;amp; CEO, Reliance Industries Limited&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance'&gt;https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-26T06:50:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town">
    <title>Cyberstalkers, the new bullies in town</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town</link>
    <description>
        &lt;b&gt;The advent of social media and an increase in accessibility has led to increasing concerns with regard to cyber safety.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by S. Poorvaja was &lt;a class="external-link" href="http://www.thehindu.com/news/cities/chennai/cyberstalkers-the-new-bullies-in-town/article8806401.ece"&gt;published in the Hindu&lt;/a&gt; on July 4, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Bombarded with messages, poems and photographs from a cyber &lt;a href="http://www.thehindu.com/news/national/verma-committee-moots-severe-punishment-for-voyeurs-stalkers/article4369797.ece" target="_parent"&gt;&lt;b&gt;stalker&lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;across  multiple social networking platforms, Shradha Muralidharan, a  consultant in the city, said that being curt and asking the stalker to  stop bothering was of no use.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“I initially did not want to engage with him as I was afraid that it  would only provoke him more. But then ignoring him did not help as well  and I was forced to speak to him. He, however, went ahead and contacted a  host of my friends on these sites and asked them if they could  introduce me to him,” she recalled.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;a href="http://www.thehindu.com/news/cities/Kochi/beware-threeyear-term-in-jail-awaits-cyber-stalkers/article3417314.ece" target="_parent"&gt;&lt;b&gt;Cyberstalking&lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;is  now on the increase with people being flooded with messages and having  their information online manipulated and used to threaten them with.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Vandhana,* an engineer from the city, says she thinks twice before  posting content online — be it on her Instagram or her Facebook profile.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Despite having adequate privacy tools, I later found that my photos and  other information were being shared by a colleague who was on my  friends’ list to his friend, who then proceeded to cyberstalk me,” she  said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;What to share? &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While multiple tools that social media sites offer do allow people to  mute, block or even report people, Pranesh Prakash, Policy Director for  the Centre for Internet and Society, said technical restrictions didn’t  play much of a part in a situation where information one posts to a  private audience is shared further, without their consent.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Trust plays a large role in what you share online since someone can  find a way to get around technological restrictions. While there are  some violations that can be addressed by the law, a few cannot be, and  it is important for people to be aware of the legal provisions that  exist,” he added.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Be it social media meet-ups, Facebook friends catching up outside of the  virtual world or web writers meeting to brainstorm ideas, the last five  years have seen a gradual increase in such socialising and new safety  concerns have cropped up.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Karthika, a chartered accountant from the city who went through an  unpleasant experience of being stalked on social media sites and  cyber-bullied, said that while the police were helpful when she sought  them out, she was also constantly questioned as to why she was  befriending people online in the first place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“I tried not to keep mum about what was happening to me but was also  simultaneously told by people that it would seem like I was drawing  unnecessary attention to myself if I made public what was happening to  me. More people should come forward and support the person who is  getting stalked, rather than be intimidated,” she said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The use of internet, email or any form of electronic communication to  contact and harrass a person who has expressed disinterest, and to cause  them trauma is what qualifies as &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-newdelhi/cyberstalkers-at-large-law-order/article1889616.ece" target="_parent"&gt;&lt;b&gt;Cyberstalking&lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;To prevent misuse of information, social media users can use privacy  tools and settings that enable them have a control on who vies their  information&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With smartphone apps for social media sites that have access to the  user's location, caution must be exercised by the user in knowing who is  privy to such information&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With children being active online as well, the use of parental control  softwares that helps monitor the content they share is necessary as they  are vulnerable victims to stalking and cyber bullying&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Knowledge about the cyber crime laws and where/whom to report incidences of the same to.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town'&gt;https://cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-04T02:44:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication">
    <title>Cyberspying: Government may ban Gmail for official communication</title>
    <link>https://cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication</link>
    <description>
        &lt;b&gt;The government will soon ask all its employees to stop using Google's Gmail for official communication, a move intended to increase security of confidential government information after revelations of widespread cyberspying by the US.
&lt;/b&gt;
        &lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Cyberspying-Government-employees-may-face-Gmail-ban/articleshow/22156529.cms"&gt;published in the Times of India &lt;/a&gt;on August 30, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A senior official in the ministry of communications and information technology said the government plans to send a formal notification to nearly 5 lakh employees barring them from email service providers such as Gmail that have their servers in the US, and instead asking them to stick to the official email service provided by India's National Informatics Centre.&lt;br /&gt;&lt;br /&gt;"Gmail data of Indian users resides in other countries as the servers are located outside. Currently, we are looking to address this in the government domain, where there are large amounts of critical data," said J Satyanarayana, secretary in the department of electronics and information technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Snowden fallout&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT" style="float:left; "&gt;The move comes in the wake of revelations by former US  &lt;a href="http://timesofindia.indiatimes.com/topic/National-Security-Agency"&gt;National Security Agency&lt;/a&gt; contractor Edward  &lt;a href="http://timesofindia.indiatimes.com/topic/Snowden-%28musician%29"&gt;Snowden&lt;/a&gt; that the  &lt;a href="http://timesofindia.indiatimes.com/topic/US-Government"&gt;US government&lt;/a&gt; had direct access to large amounts of personal data on the internet  such as emails and chat messages from companies like Google, Facebook  and Apple through a programme called  &lt;a href="http://timesofindia.indiatimes.com/topic/PRISM"&gt;PRISM&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt; Documents leaked by Snowden showed that NSA may have accessed network  infrastructure in many countries, causing concerns of potential security  threats and data breaches. Even as the new policy is being formulated,  there has been no mention yet of how compliance will be ensured. &lt;br /&gt;&lt;br /&gt; Several senior government officials in India, including ministers of  state for communications &amp;amp; IT Milind Deora and Kruparani Killi, have  their Gmail IDs listed in government portals as their official email. &lt;br /&gt;&lt;br /&gt; A  &lt;a href="http://timesofindia.indiatimes.com/topic/Google-India"&gt;Google India&lt;/a&gt; spokeswoman said the company has not been informed about the ban, and  hence it cannot comment on speculation. "Nothing is documented so far,  so for us, it is still speculation," Google said in an email response. &lt;br /&gt;&lt;br /&gt; A senior official in the IT department admitted on condition of  anonymity that employees turn to service providers such as Gmail because  of the ease of use compared with official email services, as well as  the bureaucratic processes that govern creation of new accounts. &lt;br /&gt;&lt;br /&gt; "You can just go and create an account in Gmail easily, whereas for a  government account, you have to go through a process because we have to  ensure that he is a genuine government user." &lt;br /&gt;&lt;br /&gt; Last week, IT  Minister Kapil Sibal said the new policy would require all government  officials living abroad to use NIC servers that are directly linked to a  server in India while accessing government email services. Sibal said  there has been no evidence of the US accessing Internet data from India.  &lt;br /&gt;&lt;br /&gt; Sunil Abraham, executive director of Bangalore-based research  firm Centre for Internet and Society, said he agrees with the  government's decision to ban Gmail for official communication and that  any official violating this needs to be punished. &lt;br /&gt;&lt;br /&gt; "After  Snowden's revelations, we can never be sure to what extent foreign  governments are intercepting government emails," he said. Abraham,  however, called the government's decision a "late reaction", as the use  of Gmail and other free email services by bureaucrats has increased in  the past. &lt;br /&gt;&lt;br /&gt; "Use of official government email would also make it  easier to achieve greater transparency and anti-corruption initiatives.  Ministers, intelligence and law enforcement officials should not be  allowed to use alternate email providers under any circumstance." &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication'&gt;https://cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2013-09-02T04:19:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs">
    <title>Cyberspace and External Affairs:A Memorandum for India Summary</title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs</link>
    <description>
        &lt;b&gt;This memorandum seeks to summarise the state of the global debate in cyberspace; outline how India can craft it’s global strategic vision and finally, provides   a set of recommendations for the MEA as they craft their cyber diplomacy strategy.&lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;It limits itself to advocating certain procedural steps that the Ministry of External Affairs should take towards propelling  India forward as a leading voice in  the global cyber norms space and explains why occupying this leadership position should be a vital foreign policy priority. It does not delve into content-based recommendations at this stage.   Further, this memorandum is not meant to serve as exhaustive academic research on the subject but builds on previous research by the Centre for Internet &amp;amp; Society in this area to highlight key policy windows that can be driven by India.&lt;/p&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;This memorandum provides  a background to global norms formation focussing on key global developments over the past month; traces the opportunities s for India  to play a lead role in the global norms formulation debate and then charts out process related recommendations on next steps towards India taking this forward.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyberspace-and-external-affairs"&gt;Click here&lt;/a&gt; to read more&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T04:10:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cybersecurity-the-intersection-of-policy-and-technology">
    <title>Cybersecurity: The Intersection of Policy and Technology</title>
    <link>https://cis-india.org/internet-governance/news/cybersecurity-the-intersection-of-policy-and-technology</link>
    <description>
        &lt;b&gt;Sunil Abraham and Aayush Rathi attended a round-table on 'Cybersecurity: The Intersection of Policy and Technology'. The event was organised by Synergia Foundation, Bengaluru.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The speakers for the round-table were  Deborah Housen-Couriel, Professor at the Kennedy School of Government,  Gaurav Gupta - Principal Secretary for IT, BT, and S&amp;amp;T, Government of  Karnataka, and Dana Kursh, Consul General of Israel to South India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion at the round-table centred around developing approaches aimed at resolving the 'grand challenge' of cyber security. The role of deeper collaborations between various stakeholders such as academia, corporate enterprises, law enforcement and the government in arriving at cogent solutions was emphasised upon. For more on the discussion at the round-table, a press note can be found &lt;a class="external-link" href="https://www.synergiafoundation.in/news-analysis/cybersecurity-intersection-policy-technology"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cybersecurity-the-intersection-of-policy-and-technology'&gt;https://cis-india.org/internet-governance/news/cybersecurity-the-intersection-of-policy-and-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-03-25T03:24:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cybersecurity-workshop-spotlight-on-gccs-2017">
    <title>Cybersecurity Workshop: Spotlight On GCCS 2017</title>
    <link>https://cis-india.org/internet-governance/news/cybersecurity-workshop-spotlight-on-gccs-2017</link>
    <description>
        &lt;b&gt;Sunil Abraham, Udbhav Tiwari and Vidushi Marda attended this workshop which was held alongside the Asia Pacific Regional Internet Governance Forum (APrIGF) between the 25 - 27 July 2017 in Mahitaladhibesra Building, Chulalongkorn University, Bangkok, Thailand. It was organised by Global Partners Digital (GPD) and the Centre for Communication Governance at National Law University, Delhi, in collaboration with Digital Empowerment Foundation, Digital Asia Hub and Open Net Korea&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil was a speaker in one of the introductory sessions, while Udbhav was a  participant in the workshop.The workshop consisted of various  participants from the Asian region and the sessions concentrated on  cyber capacity building in the context of  the Global Conference on  Cyberspace 2017.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cybersecurity-workshop-spotlight-on-gccs-2017'&gt;https://cis-india.org/internet-governance/news/cybersecurity-workshop-spotlight-on-gccs-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-08-23T00:47:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event">
    <title>Cybersecurity Visuals Media Handbook: Launch Event</title>
    <link>https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event</link>
    <description>
        &lt;b&gt;6th December | 6 pm | Centre for Internet and Society, Bangalore&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The existing cybersecurity imagery in media publications has been observed to be limited in its communication of the discourse prevailing in cybersecurity policy circles, relying heavily on stereotypes such as hooded men, padlocks, and binary codes.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;In order to enable a clearer, more nuanced representation of cybersecurity concepts, we, at CIS, along with &lt;a class="external-link" href="http://designbeku.in/"&gt;Design Beku&lt;/a&gt; are launching the Cybersecurity Visuals Media Handbook. This handbook has been conceived to be a concise guide for media publications to understand the specific concepts within cybersecurity and use it as a reference to create visuals that are more informative, relevant, and look beyond stereotypes.&lt;/p&gt;
&lt;p&gt;We will be launching the interactive digital handbook on 6th December, 2019, at the Centre for Internet and Society, Bangalore, at 6 pm. The event would include a discussion on the purpose, process, and concepts behind this illustrated guide by CIS researchers and Design Beku.&lt;/p&gt;
&lt;p&gt;The launch will be followed by a panel discussion on  Digital Media Illustrations &amp;amp; the Politics of Technology. We will be joined by Padmini Ray Murray, Paulanthony George, and Kruthika N S in the panel. It will be moderated by Saumyaa Naidu.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Padmini Ray Murray&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Padmini founded the Design Beku collective in 2018 to help not-for-profit organisations explore their potential through research-led design and digital development. Trained as an academic researcher, Padmini currently as the head of communications at Obvious, a design studio. She regularly gives talks and publishes on the necessity of technology and design to be decolonial, local, and ethical. &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Paulanthony George&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Paulanthony hates writing bios in the third person.&lt;br /&gt;My research focuses on the relationships between made objects, the maker and the behaviour of making, in the context of spreadable digital media (and behaviours stemming from it). I study internet memes inside and outside of India and phenomenon such as dissent, satire, free expression and ambivalent behaviour fostered by them. The research is at the intersection of digital ethnography, culture studies, human-computer interaction, humour studies and critical theory. I spend my time watching people. I draw them, the way they are, the way some people want to be and sometimes I have interesting conversations with them.&lt;/p&gt;
&lt;p&gt;&lt;span id="gmail-docs-internal-guid-5cb9e515-7fff-777e-6b99-8a216379ee39"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Kruthika N S&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Kruthika NS is a lawyer at LawNK and researcher at the Sports Law &amp;amp; Policy Centre, Bengaluru. She uses art as a medium to explore the intersections of the law and society, with gender justice featuring as the central theme of her work. Her art has included subjects such as the #MeToo movement in India, and the feminist principles of the internet, among several other doodles.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Saumyaa Naidu&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Saumyaa is a designer and researcher at the Centre for Internet and Society.&amp;nbsp;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Agenda&lt;/strong&gt;&lt;br /&gt;6:00 - 6:15 pm - Introduction &lt;br /&gt;6:15 - 6:45 pm - Presentation on the Media Handbook by Paulanthony George&lt;br /&gt;6:45 - 7:00 pm - Tea/ Coffee &lt;br /&gt;7:00 - 8:00 pm - Panel discussion on Digital Media Illustrations &amp;amp; the Politics of Technology&lt;br /&gt;8:00 - 8:30 pm - Tea/ Coffee and Snacks&lt;/p&gt;
&lt;p&gt;The interactive version of handbook can be accessed &lt;a class="external-link" href="http://cis-india.github.io/cybersecurityvisuals/index"&gt;here&lt;/a&gt;. The print versions of the handbook can be accessed at: &lt;a class="external-link" href="https://drive.google.com/file/d/13Llq1vD5Eb-yo2YE3X6dRPaZ_WsMYhfa/view?usp=sharing"&gt;Single Scroll Printing&lt;/a&gt;, &lt;a class="external-link" href="https://drive.google.com/file/d/1mK_lxA0Eeb7GWxqZk4IM3cBxKdWakKS9/view?usp=sharing"&gt;Tiled-Paste Printing&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event'&gt;https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>saumyaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-12-06T09:27:37Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cybersecurity-compilation-indian-context">
    <title>Cybersecurity Compilation: Indian Context</title>
    <link>https://cis-india.org/internet-governance/blog/cybersecurity-compilation-indian-context</link>
    <description>
        &lt;b&gt;This document intends to serve as a comprehensive source compiling all the cyber-security related regulations, policies, guidelines, notifications, executive orders, court rulings, etc.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Ultimately, it attempts to collect all the cyber security initiatives that have been put out by Indian regulatory bodies and organizations. To approach this end, we identified they actors and institutions in cyber security and record their published guidelines, frameworks, ongoing projects and any policies released to strengthen cyber security. We have mostly followed a general framework in which, for each document found, we indicate the definition of cyber security (if stated), the objectives, recommendations/guidelines and scope. This format was sometimes difficult to follow for some types of initiatives in the documents. For example, a document of questions and answers to parliament could not be recorded in this fashion. As a result, the document is not entirely uniform in structure. This research compendium is in continuous progress, expanding along with the base of our knowledge and ongoing research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyber-security-compilation.pdf"&gt;&lt;b&gt;Download the Compendium&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cybersecurity-compilation-indian-context'&gt;https://cis-india.org/internet-governance/blog/cybersecurity-compilation-indian-context&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Leilah Elmokadem and edited by Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-18T13:16:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/talk-on-cybersecurity-and-internet-of-things">
    <title>Cybersecurity and the Internet of Things</title>
    <link>https://cis-india.org/internet-governance/events/talk-on-cybersecurity-and-internet-of-things</link>
    <description>
        &lt;b&gt;US Consulate Chennai formally Invite you for a talk by David F.Heyman on March 19, 2015 in Hotel Atria, Palace Road, Bangalore. The event is being organized by the US Consulate, Chennai, Cyber Security &amp; Privacy Foundation (CSPF) and the Centre for Internet &amp; Society (CIS).&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;Note: Please  register to come to the event, if you are not attending please inform us. &lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;David Heyman, former Assistant Secretary for Policy at the U.S. Department of Homeland Security and retired Software Engineer Reimagining and Transforming Cities, Governments, and Lives with the Internet of Things For the first time in human history more people live in cities than anywhere else.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By 2050 three-fourths of the world’s population will live in cities. As more and more people move to cities, more of the world’s challenges, from emerging infectious diseases, crime, economic growth, and environmental degradation, will be concentrated in cities. Citizens will expect and demand more from their leaders; and governments will face greater pressure to provide services better, faster, cheaper to more and more, potentially with less and less resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than any other force driving change over the horizon, the Internet of Things (IoT) holds the potential to connect and infuse devices, business assets, infrastructures, and other elements of a city with greater intelligence and efficiencies to drive a new era of innovation and performance. And yet, this potential is juxtaposed against a backdrop of an explosion in cybercrimes and threats facilitated by the increased linkages between the physical and cyber world that is at the heart of IoT, and which affords malicious actors anywhere in the world the potential to disrupt services and lives on a far more consequential level than ever before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In his remarks, David Heyman, former Assistant Secretary for Policy at the U.S. Department of Homeland Security, and retired software engineer, will discuss the extraordinary potential of the IoT, the barriers to adoption, and how governments and businesses can navigate this new frontier, work together, and re-imagine and transform cities—and nations—for tomorrow.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;David F. Heyman&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;David F. Heyman has over two decades of experience as a leader in spurring innovation, risk management, and strategy development in the public and private sector. He is a leading expert in national security and international affairs, counterterrorism, cybersecurity, building resilience, and critical infrastructure protection, with broad experience in the U.S., Europe, Middle East and Asia. Heyman’s career includes service at the highest levels of the U.S. government, working in senior positions at the White House, the U.S. Department of Energy, the U.S. Department of Homeland Security, as well as in the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most recently, Heyman concluded five years of service as Assistant Secretary of Policy (operating as an Under Secretary equivalent) at the U.S. Department of Homeland Security (DHS). As a member of the senior management team at DHS, Heyman was responsible for the Department’s strategic planning, risk and decision analysis, policy development, and thought leadership across all five departmental mission areas: counterterrorism, border security, immigration,&lt;br /&gt;cybersecurity, and building resilience to disasters. During his tenure, Heyman helped transform the Department from a budget-driven to a strategydriven organization, and instituted an enterprise risk-management architecture for managing the Department’s $60 billion budget. He oversaw and initiated the Department’s largest expansion in global engagement, and in this role, led efforts to build new strategic partnerships with the World Customs Organization, the World Economic Forum, and some of the most consequential and complicated geopolitical relationships facing the United Stated today, including China, India, the European Union, and others. Heyman designed and launched multiple domestic, bilateral, and global initiatives to bolster U.S. security and prosperity. He was the chief architect of the nation’s first National Strategy for Homeland Security—the Quadrennial Homeland Security Review—which elevated and established cyber security and building national resilience as core homeland security missions. He led efforts around five Presidential Initiatives&lt;br /&gt;to: empower communities to counter violent extremism; strengthen global supply chain security; expand travel and tourism to the United States; streamline and modernize the U.S. import and export system; and develop and implement a new perimeter approach to North American Security which resulted in the Beyond the Border Initiative signed by President Obama and Canadian Prime Minister Carper.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He led the creation of the Resilient STARTM program and the Rick Rescorla National Award for Resilience, and is wellknown for drafting the policy to eliminate the color-code Homeland Security Advisory System and replace it with a more disciplined National Terrorism Advisory System, now used by the U.S. government. Previously, Heyman founded and directed the Homeland Security Program at the Center for Strategic and International Studies (CSIS), one of the nation’s leading and most influential think tanks in international security and taught security studies and science and technology policy as an adjunct professor at Georgetown University. Heyman also served as a senior advisor to Energy Secretary Bill Richardson and oversaw development and implementation of a number of energy, infrastructure and technology initiatives, including leading and establishing a new portfolio approach to manage DOE’s $7 billion in research and development (R&amp;amp;D) investments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier in his career, Heyman was a senior policy advisor in national security and international affairs at the White House Office of Science and Technology Policy (OSTP), and was responsible for providing science, technology, and foreign policy advice to the President’s Science Advisor and the Vice President’s National Security Advisor. Before entering government, Heyman worked for nearly a decade as a computer systems software engineer, and head of international operations for a firm developing and deploying industrial automation, robotics, and supply-chain management systems for Fortune 100 companies. Heyman holds a Bachelor’s degree in biology from Brandeis University and a Master’s in international relations and economics from the Paul H. Nitze School of Advanced International Studies at Johns Hopkins University, where he graduated with the highest level of distinction. He is currently a member of the Aspen Homeland Security Strategy Group, Aspen’s U.S.-India Strategic Dialogue, and serves as co-chair of its Cyber Task Force.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/talk-on-cybersecurity-and-internet-of-things'&gt;https://cis-india.org/internet-governance/events/talk-on-cybersecurity-and-internet-of-things&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-13T02:14:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/cyberscholars-working-group-mit">
    <title>Cyberscholars Working Group at MIT</title>
    <link>https://cis-india.org/news/cyberscholars-working-group-mit</link>
    <description>
        &lt;b&gt;Malavika Jayaram is giving a talk on Biometrics or Bust - India’s Identity Crisis at this event organised by Berkman Center for Internet &amp; Society on December 12 at 6.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Read the original &lt;a class="external-link" href="https://cyber.law.harvard.edu/events/cyberscholars/12/mit"&gt;published by Harvard University here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Cyberscholar Working Group is a forum for fellows and affiliates of MIT, Yale Law School Information Society Project, Columbia University, and the Berkman Center for Internet &amp;amp; Society at Harvard University to discuss their ongoing research. Each session is focused on the peer review and discussion of current projects submitted by a presenter. Meeting alternatively at Harvard, MIT, Yale, the working group aims to expand the shared knowledge of young scholars by bringing together these preeminent centers of thought on issues confronting the information age. Discussion sessions are designed to facilitate advancements in the individual research of presenters and in turn encourage exposure among the participants to the multi-disciplinary features of the issues addressed by their own work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This month's presentations include:&lt;br /&gt; &lt;b&gt;(1) "Lines of Control: Networks of Imperialism and Independence in India (1840-1947)"&lt;/b&gt;&lt;br /&gt;Abstract: This paper examines the history of communications networks in India and the relationship between communications and second-order networks. It draws attention to the wave of colonial network development that took place in India between 1840 and 1948. During these years, Britain constructed a series shipping, rail and telegraph networks to achieve a set of military and commercial goals. This paper studies how first- and second-order networks developed, and the intended and unintended effects of these networks on Indiaʼs economics, politics, and identity. The paper draws on economic and social studies of colonial communications networks in India, original reports by British officials and the Colonial Office, and the literature focusing on the role of technology in British imperialism. It shows how Indiaʼs colonial communication networks, built to augment and extend British control over the subcontinent, became conduits for Indian resistance and nationalism.&lt;br /&gt;Keywords: shipping, telegraph, railroads, imperialism, nationalism, network theory, India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Colin Agur &lt;/b&gt;is a PhD candidate at Columbia University and Visiting Fellow at Yale Law School's Information Society Project. His research examines India's telecommunications, focusing on mobile network formation and second-order effects of network growth. He spent the 2012-13 academic year in Delhi and Chennai, conducting document analysis, interviews with industry figures and participant observation related to mobile phone usage. He has published articles about Indian media and culture in Harvard's Nieman Lab, the Journal of Asian and African Studies and Journalism (forthcoming), and about telecommunications history in Information and Culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(2) Big Data Dramas in the 1960s and 1970s&lt;/b&gt;&lt;br /&gt;Abstract: The recent frenzy in discussing NSA activities and the collecting of Big Data show a widespread critical concern for the current practice of gathering and using personal data. These concerns have their history. In my presentation, I track the beginnings of a growing public awareness and sensitivity towards the societal handling of personal data. I argue that the early computerization phase during the 1960s and 1970s played a crucial role in discussing these issues. Media reports, popular books, scientific publications, and political hearings all of a sudden began – often in quite different ways – to address and question contemporary practices of collecting, sharing, and storing of personal data. Their authors explored and negotiated all kind of societal settings where personal data played a significant role at that time. There have been concerns about these issues with personal data before, but – as I will show in my presentation – not on this broad societal level and to this extent as in the late 1960s and early 1970s. I argue that during that time, the usage of personal data became a highly controversial matter not only of public, but also of private interest.My inquiry examines how the term “data“ and in particular the collection of personal data became loaded with cultural and emotional significance in scientific and media discussions in the 1960s and 1970s in the United States and in Germany. Furthermore, it explores how the early computerization affected our societal handling of data long before the personal computer entered our private lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Julia Fleischhack&lt;/b&gt; is a visiting postdoctoral research fellow in the program in Science, Technology, and Society at the Massachusetts Institute of Technology. She holds a PhD in anthropology from Zürich University. Her current research is on data centers from the private sector and funded by the Fritz Thyssen foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(3) Biometrics or Bust - India’s Identity Crisis&lt;/b&gt;&lt;br /&gt;Abstract: India's identity juggernaut - the Unique Identity (UID) project that has registered around 500 million people and is yet to be fully realized - is already the world's largest ever biometrics identity scheme. Grounded in the premise that centralized de-duplication and authentication will uniquely identify people and eliminate fraud, it is hailed as a game changer and a silver bullet that will solve myriad socio-economic problems, yet its conception and architecture raise significant concerns. Its implementation as a techno-utopian project in a legal vacuum, despite the potential for abuse and exclusion, give pause to the much-vaunted claims of transforming welfare delivery and galvanizing financial inclusion. I will provide an overview of the identity project and highlight some of the key implications for privacy and free speech, and more broadly, democracy and openness. I will also unpack some of the narratives being constructed, describe the current public discourse and legal developments, and locate the project within the broader surveillance state and database nation that India is morphing into.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Malavika Jayaram&lt;/b&gt; is a Fellow at the Berkman Center for Internet and Society at Harvard, focusing on privacy, identity and free expression. A Fellow at the Centre for Internet and Society, Bangalore, she is one of 10 Indian lawyers in The International Who's Who of Internet e-Commerce &amp;amp; Data Protection directory. In August 2013, she was voted one of India's leading lawyers - one of only 8 women to be featured in the "40 under 45" survey conducted by Law Business Research, London.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/cyberscholars-working-group-mit'&gt;https://cis-india.org/news/cyberscholars-working-group-mit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-01-09T06:41:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-ita2008">
    <title>Cybercrime and Privacy </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-ita2008</link>
    <description>
        &lt;b&gt;Elonnai Hickok examines privacy in the context of India’s legal provisions on cybercrime. She picks up the relevant provisions of the Information Technology Act as amended in 2008 dealing with cyber crimes and provides a fair analysis of the pros and cons of the amended Act.  &lt;/b&gt;
        
&lt;h2&gt;What is Cybercrime?&lt;/h2&gt;
&lt;p&gt;Looking at the recent &lt;a class="external-link" href="http://www.bbc.co.uk/news/technology-10796584"&gt;Facebook ‘break in’ where 100,000 of users’ information was downloaded&lt;/a&gt; and made accessible through a simple search engine,&amp;nbsp;, and t&lt;a class="external-link" href="http://www.bbc.co.uk/news/10473495"&gt;he new Microsoft virus that attacked 10,000 machines&lt;/a&gt;, it is clear that cybercrime is no longer an issue to be taken lightly. Cybercrime is defined as an unlawful act committed using a computer either as a tool or as a target (or both) for facilitating a crime. Although there is an overlap, some are more likely to use the computer as a tool, and others use it as a target. Examples of the former include: fraud, forgery, DOS, consumption of limited resources, cyberterrorism, IPR violations, software piracy, copyright infringement, trademarks violations, patent violations, cyber squatting, credit card frauds, forgery, EFT frauds, pornography, banking/credit card related crimes, sale or purchase of illegal articles, cyberstalking, phishing, theft, and breaches in privacy, and gambling. Crimes where the computer is made a target include: computer theft, physical destruction or alteration of network components, theft of computer source code, hacking, defacing websites, creation of viruses, destruction or alteration of configuration information and email spamming.&lt;/p&gt;
&lt;h2&gt;What is India's current legislation on cybercrime?&lt;/h2&gt;
&lt;h3&gt;The Information Technology Act 2000 (amended in 2008)&lt;/h3&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://nicca.nic.in/pdf/itact2000.pdf"&gt;Information Technology Act&lt;/a&gt; was first drawn up in 2000, and has been &lt;a class="external-link" href="http://164.100.24.219/BillsTexts/LSBillTexts/PassedLoksabha/96-c%20of%202006.pdf"&gt;revised&lt;/a&gt; most recently 2008. The Information Technology (Amendment) Bill, 2008 amended sections 43 (data protection), 66 (hacking), 67 (protection against unauthorised access to data), 69 (cyberterrorism), and 72 (privacy and confidentiality) of the Information Technology Act, 2000, which relate to computer/cybercrimes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Section 43 [Penalty and Compensation for damage to computer, computer system, etc.] amended vide Information Technology Amendment Act 2008 reads as under:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If any person without permission of the owner or any other person who is in-charge of a computer, computer system or computer network:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;accesses or secures access to such computer, computer system or computer network or computer resource (ITAA2008)&lt;/li&gt;&lt;li&gt;downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium;&lt;/li&gt;&lt;li&gt;introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network;&lt;/li&gt;&lt;li&gt;damages or causes to be damaged any computer, computer system or computer &amp;nbsp;network, data, computer data base or any other programmes residing in such computer, computer system or computer network;&lt;/li&gt;&lt;li&gt;disrupts or causes disruption of any computer, computer system or computer network;&lt;/li&gt;&lt;li&gt;denies or causes the denial of access to any person authorized to access any computer, computer system or computer network by any means;&lt;/li&gt;&lt;li&gt;provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made there under;&lt;/li&gt;&lt;li&gt;charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network;&lt;/li&gt;&lt;li&gt;destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means (Inserted vide ITAA-2008); and&lt;/li&gt;&lt;li&gt;Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage, (Inserted vide ITAA 2008) he shall be liable to pay damages by way of compensation to the person so affected. (change vide ITAA 2008)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Critique:&lt;/strong&gt; In comparison to the laws enacted in other countries, this provision still falls short of a strong data protection law. In most other countries data protection laws specify:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;the definition and classification of data types;&lt;/li&gt;&lt;li&gt;the nature and protection of the categories of data;&lt;/li&gt;&lt;li&gt;that equal protection will be given to data stored offline and data stored manually;&lt;/li&gt;&lt;li&gt;that data controllers and data processors have distinct roles;&lt;/li&gt;&lt;li&gt;clear restrictions on the manner of data collection;&lt;/li&gt;&lt;li&gt;clear guidelines on the purposes for which the data can be put and to whom it can be sent;&lt;/li&gt;&lt;li&gt;standards and technical measures governing the collection, storage, access to, protection, retention, and destruction of data;&lt;/li&gt;&lt;li&gt;that providers of goods or services must have a clear opt - in or opt - out option; and&lt;/li&gt;&lt;li&gt;in addition, most countries provide strong safeguards and penalties against breaches of any of the above&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;&lt;br /&gt;Section 66 [Computer Related Offences] amended vide Information Technology Amendment Act 2008 reads as under:&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;
&lt;p&gt;Explanation: For the purpose of this section,-&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;the word "dishonestly" shall have the meaning assigned to it in section 24 of the Indian Penal Code;&lt;/li&gt;&lt;li&gt;the word "fraudulently" shall have the meaning assigned to it in section 25 of the Indian Penal Code.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;[Section 66 A] [Punishment for sending offensive messages through communication service, etc.]&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;(Introduced vide ITAA 2008):&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Any person who sends, by means of a computer resource or a communication device,-&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;any information that is grossly offensive or has menacing character; or&lt;/li&gt;&lt;li&gt;any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device;&lt;/li&gt;&lt;li&gt;any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages (Inserted vide ITAA 2008) shall be punishable with imprisonment for a term which may extend to three years and with fine.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Explanation: For the purposes of this section, terms "Electronic mail" and "Electronic Mail Message" means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, image, audio, video and any other electronic record, which may be transmitted with the message.&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;[Section 66 B] [Punishment for dishonestly receiving stolen computer resource or communication device] (Inserted Vide ITA 2008):&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both.&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;[Section 66C] [Punishment for identity theft] (Inserted Vide ITA 2008):&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[Section 66D] [Punishment for cheating by personation by using computer resource] (Inserted Vide ITA 2008):&lt;br /&gt;&lt;/strong&gt;Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[Section 66E] [Punishment for violation of privacy] (Inserted Vide ITA 2008):&lt;br /&gt;&lt;/strong&gt;Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both&lt;/p&gt;
&lt;p&gt;Explanation - For the purposes of this section--&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;“transmit” means to electronically send a visual image with the intent that it be viewed by a person or persons;&lt;/li&gt;&lt;li&gt;“capture”, with respect to an image, means to videotape, photograph, film or record by any means;&lt;/li&gt;&lt;li&gt;“private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast;&lt;/li&gt;&lt;li&gt;“publishes” means reproduction in the printed or electronic form and making it available for public;&lt;/li&gt;&lt;li&gt;“under circumstances violating privacy” means circumstances in which a person can have a reasonable expectation that:&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or&lt;/li&gt;&lt;li&gt;any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;[Section 66F] [Punishment for cyber terrorism]:&lt;br /&gt;&lt;/strong&gt;(1) Whoever,-&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;(A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people by –&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;denying or cause the denial of access to any person authorized to access computer resource; or&amp;nbsp;&lt;/li&gt;&lt;li&gt;attempting to penetrate or access a computer resource without authorisation or exceeding authorized access; or&lt;/li&gt;&lt;li&gt;introducing or causing to introduce any Computer Contaminant and by means of such conduct causes or is likely to cause death or injuries to persons or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect the critical information infrastructure specified under section 70, or&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;(B) knowingly or intentionally penetrates or accesses a computer resource without authorization or exceeding authorized access, and by means of such conduct obtains access to information, data or computer database that is restricted for reasons of the security of the State or foreign relations; or any restricted information, data or computer database, with reasons to believe that such information, data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, commits the offence of cyber terrorism.&lt;/div&gt;
&lt;div&gt;(2) Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life’.&lt;br /&gt;&lt;strong&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;Critique&lt;/strong&gt;: We find the terminology in multiple sections too vague to ensure consistent and fair enforcement. The concepts of ‘annoyance’ and ‘insult’ are subjective. Clause (d) makes it clear that phishing requests are not permitted, but it is not clear that one cannot ask for information on a class of individuals.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;Section 67 [Publishing of information which is obscene in electronic form] amended vide Information Technology Amendment Act 2008 reads as under:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to two three years and with fine which may extend to five lakh rupees and in the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to five years and also with fine which may extend to ten lakh rupees.&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;[Section 67 A] [Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form] (Inserted vide ITAA 2008):&lt;br /&gt;&lt;/strong&gt;Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees.&lt;/p&gt;
&lt;p&gt;Exception: This section and section 67 does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form-&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;the publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper, writing, drawing, painting, representation or figure is in the interest of science, literature, art, or learning or other objects of general concern; or&lt;/li&gt;&lt;li&gt;which is kept or used bona fide for religious purposes.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;[Section 67 B] Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Whoever,-&lt;/div&gt;
&lt;div&gt;(a) publishes or transmits or causes to be published or transmitted material in any electronic&lt;/div&gt;
&lt;div&gt;form which depicts children engaged in sexually explicit act or conduct or&lt;/div&gt;
&lt;div&gt;(b) creates text or digital images, collects, seeks, browses, downloads, advertises,&lt;/div&gt;
&lt;div&gt;promotes, exchanges or distributes material in any electronic form depicting children in&lt;/div&gt;
&lt;div&gt;obscene or indecent or sexually explicit manner or&lt;/div&gt;
&lt;div&gt;(c) cultivates, entices or induces children to online relationship with one or more children for&lt;/div&gt;
&lt;div&gt;and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource or&lt;/div&gt;
&lt;div&gt;(d) facilitates abusing children online or&lt;/div&gt;
&lt;div&gt;(e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with a fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees:&lt;/div&gt;
&lt;div&gt;Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form-&lt;/div&gt;
&lt;div&gt;(i) The publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper writing, drawing, painting, representation or figure is in the interest of science, literature, art or learning or other objects of general concern; or&lt;/div&gt;
&lt;div&gt;(ii) which is kept or used for bonafide heritage or religious purposes&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Explanation: For the purposes of this section, "children" means a person who has not completed the age of 18 years.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;[Section 67 C] [Preservation and Retention of information by intermediaries]:&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;(1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.&lt;/p&gt;
&lt;p&gt;(2) Any intermediary who intentionally or knowingly contravenes the provisions of sub section (1) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Critique&lt;/strong&gt;: This provision adequately protects both the corporate and the citizen in a positive way.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Section 69 [Powers to issue directions for interception or monitoring or decryption of any information through any computer resource] amended vide Information Technology Amendment Act 2008 reads as under:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;(1) Where the central Government or a State Government or any of its officer specially authorized by the Central Government or the State Government, as the case may be, in this behalf may, if is satisfied that it is necessary or expedient to do in the interest of the sovereignty or integrity of India, defense of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above or for investigation of any offence, it may, subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be&lt;/div&gt;
&lt;div&gt;intercepted or monitored or decrypted any information transmitted received or stored through any computer resource.&lt;/div&gt;
&lt;div&gt;(2) The Procedure and safeguards subject to which such interception or monitoring or decryption may be carried out, shall be such as may be prescribed.&lt;/div&gt;
&lt;div&gt;(3) The subscriber or intermediary or any person in charge of the computer resource shall, when called upon by any agency which has been directed under sub section (1), extend all facilities and technical assistance to –&lt;/div&gt;
&lt;div&gt;(a) provide access to or secure access to the computer resource generating, transmitting, receiving or storing such information; or&lt;/div&gt;
&lt;div&gt;(b) intercept or monitor or decrypt the information, as the case may be; or&amp;nbsp;&lt;/div&gt;
&lt;div&gt;(c) provide information stored in computer resource.&lt;/div&gt;
&lt;div&gt;(4) The subscriber or intermediary or any person who fails to assist the agency referred to in sub-section (3) shall be punished with an imprisonment for a term which may extend to seven years and shall also be liable to fine.&lt;/div&gt;
&lt;div&gt;[ Section 69B] Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security:&lt;/div&gt;
&lt;div&gt;(1) The Central Government may, to enhance Cyber Security and for identification, analysis and prevention of any intrusion or spread of computer contaminant in the country, by notification in the official Gazette, authorize any agency of the Government to monitor and collect traffic data or information generated, transmitted, received or stored in any computer resource.&lt;/div&gt;
&lt;div&gt;(2) The Intermediary or any person in-charge of the Computer resource shall when called upon by the agency which has been authorized under sub-section (1), provide technical assistance and extend all facilities to such agency to enable online access or to secure and provide online access to the computer resource generating, transmitting, receiving or storing such traffic data or information.&lt;/div&gt;
&lt;div&gt;(3) The procedure and safeguards for monitoring and collecting traffic data or information, shall be such as may be prescribed.&lt;/div&gt;
&lt;div&gt;(4) Any intermediary who intentionally or knowingly contravenes the provisions of subsection&lt;/div&gt;
&lt;div&gt;(2) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.&lt;/div&gt;
&lt;div&gt;Explanation: For the purposes of this section,&lt;/div&gt;
&lt;div&gt;(i) "Computer Contaminant" shall have the meaning assigned to it in section 43&lt;/div&gt;
&lt;div&gt;(ii) "traffic data" means any data identifying or purporting to identify any person, computer system or computer network or location to or from which the communication is or may be transmitted and includes communications origin, destination, route, time, date, size, duration or type of underlying service or any other information.&lt;/div&gt;
&lt;div&gt;Critique: Though we recognize how important it is for a government to protect its citizens against cyberterrorism, we are concerned at the friction between these provisions and the guarantees of free dialog, debate, and free speech that are Fundamental Rights under the Constitution of India.&lt;/div&gt;
&lt;div&gt;&lt;em&gt;Specifically:&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;a) there is no clear provision of a link between an intermediary and the information or resource that is to be monitored.&lt;/div&gt;
&lt;div&gt;c)the penalties laid out in the clause are believed to be too harsh, and when read in conjunction with provision 66, there is no distinction between minor offenses and serious offenses.&lt;/div&gt;
&lt;div&gt;e) the ITA is too broad in its categorization of acts of cyberterrorism by including information that is likely to cause: injury to decency, injury to morality, injury in relation to contempt of court, and injury in relation to defamation.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;Section 72 [Breach of confidentiality and privacy] amended vide Information Technology Amendment Act 2008 reads as under:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Save as otherwise provided in this Act or any other law for the time being in force, any person who, in pursuant of any of the powers conferred under this Act, rules or regulations made there under, has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book, register, correspondence, information, document or other material to any other person shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;[Section 72 A] Punishment for Disclosure of information in breach of lawful contract (Inserted vide ITAA-2008):&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to five lakh rupees, or with both.&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;General Notes and Critiques:&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;As general notes on the ITA and data protection we find that the Act is lacking in many ways, including:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;there is no definition of “sensitive personal data or information” and that term is used indiscriminately without.&lt;/li&gt;&lt;li&gt;the provisions and protections cover only electronic data and not stored data or non-electronic systems of media&lt;/li&gt;&lt;li&gt;in the absence of a data controller, liability is often imposed on persons who are not necessarily in a position to control data&lt;/li&gt;&lt;li&gt;civil liability for data breach arises where negligence is involved&lt;/li&gt;&lt;li&gt;criminal liability only applies to cases of information obtained in the context of a service contract.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-ita2008'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-ita2008&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2010-09-14T13:21:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi">
    <title>Cyberattacks a significant threat to democracy: Modi</title>
    <link>https://cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi</link>
    <description>
        &lt;b&gt;We have to ensure that cyberspace does not become a playground for dark horses of radicalism, says PM Narendra Modi at the fifth Global Conference on Cyber Space in Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was published in &lt;a class="external-link" href="http://www.livemint.com/Industry/S0TsLMI3yEzlc6XSxdUmtK/Cyberattacks-a-significant-threat-to-democracy-Narendra-Mod.html"&gt;Livemint&lt;/a&gt; on November 24, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister Narendra Modi on Thursday said creating a safe and  secure cyberspace is on the primary agenda of the government as  cyberattacks were a threat to democracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi’s assurance of  decisively dealing with cyberattacks comes at a time when policymakers  are making an unprecedented push to popularize digital transactions and  cut down use of cash in order to have a more transparent and accountable  economic environment. The government is at present working on a draft  policy for tackling ransomware, a malicious software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We have to  ensure that cyberspace does not become a playground for dark horses of  radicalism,” Modi said, while inaugurating the fifth Global Conference  on Cyber Space (GCCS) in the national capital.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A total of 50 incidents of cyberattacks affecting 19 financial organizations were reported from 2016 until June 2017, &lt;i&gt;PTI &lt;/i&gt;reported in August.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With  multiple cyberattacks affecting key infrastructure assets like ports  and major payment companies recently, the government has decided to come  out with a draft policy for tackling ransomware, a senior government  official told &lt;i&gt;Mint &lt;/i&gt;during the conference.  “CERT-In (The Indian  Computer Emergency Response Team) is working on a draft policy for  tackling ransomware which will be put up for consultation by various  stakeholders, including organized enterprise users of IT (Information  Technology), solution providers and internet service providers (ISPs),”  Ajay Kumar, additional secretary in the ministry of electronics and  information technology said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kumar said the draft policy  will focus on the proprietary steps the country will take in case of a  ransomware attack. This will include the steps for the sharing of  information to try and restrict the loss as much as possible. A centre  of excellence will be set up to find solutions to attacks or neutralise  the malware, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need to set up a safe and secure  cyberspace is one the major concerns of the government as it is moving  to create a ‘less-cash’ economy. Earlier this year, the government  announced the “DigiDhan Mission” to achieve a 25 billion digital  transactions target, outlined in the Union budget for this fiscal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi  said empowerment through digital access is the aim of the government  and digital technology has saved around $10 billion so far by  eliminating middlemen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MyGov platform is a prime example of  how technology strengthens offices. PRAGATI has resulted in faster  governance decisions through general consensus, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;PRAGATI  (Pro-Active Governance And Timely Implementation) is an interactive  platform aimed at addressing the common man’s grievances and monitoring  and reviewing programmes and projects of the central and state  governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Umang stands for Unified Mobile Application  for New-age Governance. It provides all pan India e-Gov services ranging  from central to local government bodies and other citizen-centric  services like Aadhaar and Digilocker on one single platform or mobile  app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi said, “the app will provide over hundred citizen-centric  services. It will automatically add pressure among peers and result in a  better performance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law and IT minister Ravi Shankar Prasad,  speaking at the event, said privacy of individuals was of utmost  importance but “privacy cannot withhold innovation.” He further said the  citizens’ right of accessing the internet is “non-negotiable” and the  government will not allow any company to restrict people’s entry to the  worldwide web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking on Facebook’s Free Basics programme,  Prasad said the government did not allow social networking giant’s  programme because it offered access to select internet services.  Facebook had introduced its Free Basics programme in India in 2015 to  offer free basic internet access to people in partnership with telecom  operators. Prasad said the idea behind Free Basics was that everything  will be free, namely eduction, health, entertainment and others, if one  enters the Net through one gate (Facebook’s).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I said India is a  democracy, we don’t believe in one gate. We believe in multiple gates.  Therefore, this gate locking for India will not be accepted and I did  not allow it. This stems (from) our commitment that internet must be  accessible to all,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sri Lankan Prime Minister Ranil  Wickremesinghe, who was present at the event, said there was no legal  framework on cyberspace and he hoped the conference would lead to a  consensus to finalize the terms of the framework. “Our government has a  lot more to do in net neutrality but we have taken progressive and  revolutionary step in this regard,” added Wickremesinghe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Wickremesinghe is on a four-day visit to India with the aim of boosting bilateral ties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the first day of the conference, India agreed to establish a joint working group with Iran to work in different IT areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India  will provide technical advice to Mauritius for setting up the  digilocker infrastructure. An MoU has been signed with Denmark for  future cooperation in the IT sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While a policy on ransomware  is welcome, there is much more to be done. Implementation of the 2014  National Cybersecurity Policy has been very slow. Even the simplest  bits, such as a secure process for receiving vulnerability disclosure  has been lacking,” said Pranesh Prakash, policy director at the Centre  for Internet and Society, a Bengaluru-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;PTI contributed to this story.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi'&gt;https://cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-24T13:29:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing">
    <title>Cyber-Security in the Age of Smart Manufacturing</title>
    <link>https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing</link>
    <description>
        &lt;b&gt;Arindrajit Basu attended the event 'Cyber-security in the age of Smart Manufacturing.' The event 'BTS - CyberComm 2018' was organised by  the Federation of Indian Chamber of Commerce &amp; industry (FICCI) in association with Karnataka Innovation and Technology Society, and Government of Karnataka at The Lalit Ashok, Bengaluru on September 26, 2018.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The event was aimed at understanding the cyber security threats revolving around Industry 4.0 and smart manufacturing. The speakers included Mr. Gaurav Gupta, Principal Secretary, IT, BT and S&amp;amp;T Department, Government of Karnataka;Mr. Sanjay Mujoo, Vice President, Pointnext Global Centre Bangalore, Hewlett Packard Enterprise, India;Mr. Yogesh Andlay, Founder, Nucleus Software &amp;amp; Polaris Financial Technology and  Mr. Ambrish Bakaya, Co-Chair, ICT and Digital Economy Committee FICCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from discussing how to cover the threat vectors as businesses increasingly become digitised and use digital supply chains,the event was also useful in terms of obtaining an understanding of how the Karnataka government is approaching the digital ecosystem. The Centres of Excellence aim to bring on board academics, industry bodies and practitioners to develop best practices. FICCI, which was co-hosting this event indicated  that they will continue to work with the government to further this agenda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing'&gt;https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-10-02T00:23:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
