<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1081 to 1095.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-wire-october-29-2016-sangeeta-barooah-pisharoty-behind-modis-heartwarming-diwal-ad-for-soldiers-an-app-that-is-primed-for-political-messaging"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-october-28-2016-kumkum-dasgupta-bridging-the-gap"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-october-23-2016-some-key-words-are-missing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/bloomberg-udbhav-tiwari-october-22-2016-how-long-have-banks-known-about-debit-card-fraud"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rbi-directions-on-account-aggregators"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-alex-mathew-october-20-2016-the-big-debit-card-breach"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-journal-vol-51-issue-36-september-3-2016-hans-varghese-mathews-request-for-specifics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hakon-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/digital-asia-hub-october-6-2016-vidushi-marda-iana-transition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-october-14-2016-surabhi-agarwal-tech-companies-like-gmail-whatsapp-may-be-asked-to-store-user-information"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-wire-october-29-2016-sangeeta-barooah-pisharoty-behind-modis-heartwarming-diwal-ad-for-soldiers-an-app-that-is-primed-for-political-messaging">
    <title>Behind Modi’s Heartwarming Diwali Ad for Soldiers, An App That’s Primed for Political Messaging</title>
    <link>https://cis-india.org/internet-governance/news/the-wire-october-29-2016-sangeeta-barooah-pisharoty-behind-modis-heartwarming-diwal-ad-for-soldiers-an-app-that-is-primed-for-political-messaging</link>
    <description>
        &lt;b&gt;The campaign, which allows users to send Modi quotes on themes like Ayodhya and the perfidy of the Opposition, raises questions about the boundaries between government, party and personal promotion.&lt;/b&gt;
        &lt;p align="justify"&gt;The article by Sangeeta Barooah Pisharoty was published in &lt;a href="http://thewire.in/76732/behind-modis-heartwarming-diwali-ad-soldiers-app-thats-primed-political-messaging/"&gt;the Wire&lt;/a&gt; on October 29, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr align="justify" size="2" width="100%" /&gt;
&lt;div align="justify"&gt;On October 22, Prime Minister Narendra Modi launched a public  campaign, Sandesh2Soldiers, urging the people to be a part of it. The  prime minister prodded people to express their gratitude to soldiers  guarding the borders through the campaign by sending them personalised  messages on the occasion of Diwali.&lt;/div&gt;
&lt;p align="justify"&gt;Such messages can be sent through the Narendra Modi mobile app, the “official app of the prime minister”, or by logging on to &lt;a href="http://www.mygov.in" rel="external nofollow" target="_blank" title="www.mygov.in"&gt;www.mygov.in&lt;/a&gt;,  a central government platform launched by the prime minister in 2014 to  facilitate participatory governance by engaging the public. One can  also send a message by recording it after dialing a 10-digit number –  which would then be aired by All India Radio (AIR).&lt;/p&gt;
&lt;p align="justify"&gt;Media reports said a special module had been created within the  mobile app to not only enable people to send text messages to soldiers  but also to upload handwritten letters, decorated cards and videos to  them expressing their Diwali wishes and feelings for the armed forces.&lt;/p&gt;
&lt;p align="justify"&gt;A special video that carried Modi’s appeal to the public to send  messages to the armed forces was shared on social media along with a few  other videos to promote the prime minister’s idea. One such video  features a child sending a ‘thank you rocket’ to soldiers for defending  the nation under hostile circumstances. That the call to send a personal  message has come from the  prime minister has upped the profile of this  campaign.&lt;/p&gt;
&lt;p align="justify"&gt;Bollywood stars like Akshay Kumar, Aamir Khan and Salman Khan, and  cricketers such as Virat Kohli, Virendra Sehwag and Mohammad Kaif have  also posted their messages to soldiers on Twitter by using the prime  minister’s campaign hashtag #Sandesh2Soldiers. Many Bharatiya Janata  Party (BJP) politicians and ministers have also joined in.&lt;/p&gt;
&lt;p align="justify"&gt;As per a tweet by AIR on October 26, “Around 9,800 persons sent their  good wishes to jawans of security forces so far during this festive  season”. Last checked, &lt;a href="http://www.mygov.in" rel="external nofollow" target="_blank" title="www.mygov.in"&gt;www.mygov.in&lt;/a&gt;,  run by the National Informatics Centre under the the Ministry of  Electronics and Information Technology, showed 13,000 messages and video  uploads recorded. The number is going up by the minute.&lt;/p&gt;
&lt;p align="justify"&gt;While the registration requirement at the government’s &lt;a href="http://www.mygov.in" rel="external nofollow" target="_blank" title="www.mygov.in"&gt;www.mygov.in&lt;/a&gt; portal only requires the sender to provide her or his  name and e-mail  address to be able to send a message or upload a video – a usual cyber  safety procedure – those who want to use the Modi app for the purpose  will have to do more: they will first have to agree to be personally  profiled by the prime minister’s “official” mobile application.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;b&gt;Personally identifiable information&lt;/b&gt;&lt;/p&gt;
&lt;p align="justify"&gt;This is how things work: to register oneself through the app and send  a message, a user not only has to disclose her name, mobile number and  email address but also profession, the state and the district  she belongs to, her voter identification card number, specific areas of  interests and a personal description within “500 characters”.&lt;/p&gt;
&lt;p align="justify"&gt;This has left many potential senders and experts flummoxed. Why does a  citizen, in order to express her gratitude to the armed forces on the  occasion of Diwali at the call of her prime minister need to share  additional information with the app, which amounts to profiling? At a  time when the Supreme Court is hearing a bunch of petitions on the  mandatory use of Aadhar cards by the government, some of which deal with  issues of privacy and the possible misuse of the collected data, this  is a relevant question.&lt;/p&gt;
&lt;p align="justify"&gt;“There was absolutely no need for the app to ask for additional  information from a user just to send a message to the armed forces. As  far as the additional information sought from a user is concerned, it  allows the data collector to build a profile of the user but it is not  profiling in the modern big data sense wherein multiple data sources are  combined to create a complete profile of the data subject,” says Sunil  Abraham, director of the Bangalore-based Centre for Internet and  Society.&lt;/p&gt;
&lt;p align="justify"&gt;Abraham adds, “There is no guarantee that the data collected (through  the app) won’t be used illegally by some commercial enterprise, etc.  because our data protection law, Section 43A of the Information and  Technology Act, doesn’t apply to the state but only to the private  sector. In other words, if the personal information is shared with the  government, then it is perfectly legal for the government to disclose  the personal information to other government or commercial entities.”&lt;/p&gt;
&lt;p align="justify"&gt;Unlike the MyGov portal, where a user can type or upload a message,  the Narendra Modi mobile app also automatically adds a quote from the  prime minister below the one typed by the user. It expresses the prime  minister’s pride over “the indomitable valour and supreme sacrifice of  our armed forces etched in the memory of every Indian”.&lt;/p&gt;
&lt;p align="justify"&gt;The prime minister launched his official mobile app in August last  year at a function reportedly organised by MyGov, thus making him the  first prime minister to have a mobile app named after him. Designed by a  team of six students from Delhi Technical University after winning a  two-phased contest launched by MyGov in March last year, the app has  been described as “a one-stop destination for knowing about all the  latest day-to-day activities of the prime minister.”As per media  reports, the app would correspond to the prime minister’s official  website, &lt;a href="http://www.pmindia.gov.in" rel="external nofollow" target="_blank" title="www.pmindia.gov.in"&gt;www.pmindia.gov.in&lt;/a&gt;.&lt;/p&gt;
&lt;p align="justify"&gt;Obviously then, information on how to access the app and take part in the campaign have been publicised through his portal, &lt;a href="http://www.pmindia.gov.in" rel="external nofollow" target="_blank" title="www.pmindia.gov.in"&gt;www.pmindia.gov.in&lt;/a&gt;.&lt;/p&gt;
&lt;p align="justify"&gt;This raises another question. Even though &lt;a href="http://www.pmindia.gov.in" rel="external nofollow" target="_blank" title="www.pmindia.gov.in"&gt;www.pmindia.gov.in&lt;/a&gt; is not directly accepting public messages for the armed forces but is  only promoting the campaign and giving information on how to download  the mobile app for it (thereby proving that it corresponds to the app),  it does direct an interested user to the prime minister’s personal  website, &lt;a href="http://www.narendramodi.in" rel="external nofollow" target="_blank" title="www.narendramodi.in"&gt;www.narendramodi.in&lt;/a&gt; on clicking its publicity window designed for the campaign.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;a href="http://i1.wp.com/thewire.in/wp-content/uploads/2016/10/Screen-Shot-2016-10-28-at-4.14.30-PM.png"&gt;&lt;img alt="screen-shot-2016-10-28-at-4-14-30-pm" class="wp-image-76750 size-full aligncenter" height="532" src="http://i1.wp.com/thewire.in/wp-content/uploads/2016/10/Screen-Shot-2016-10-28-at-4.14.30-PM.png?resize=584%2C532" width="584" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;The user can then download the Modi app from his personal website,  which was used extensively during the run-up to the 2014 parliamentary  elections by Modi to reach out to voters. So the app not only  corresponds to the official website of the prime minister but also with  his personal website through the official website. Curiously, it is not  possible to access the app from the MyGov portal even though the entity  under the Ministry of Electronics and Information launched the app at a  function on August 6 in New Delhi reportedly organised by it.&lt;/p&gt;
&lt;p align="justify"&gt;Thus, while the app that seemed to have been developed and launched  by a government department can’t be accessed directly through a  government portal, it can be accessed through the prime minister’s  personal portal. Also, features in the app like “forget password” are  handled by his personal website, which communicates with an app user as  its “Admin”.&lt;/p&gt;
&lt;p align="justify"&gt;So who runs the app? Is it not the official app of the prime minister  of the country? Who owns it? Is it his personal app that he considers  “official”? These are questions to which answers are not easily  available.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;b&gt;No answers&lt;/b&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;i&gt;The Wire&lt;/i&gt; made multiple attempts to get an official response,  both from the government and the BJP Cyber Cell, about these queries  but failed to get an answer. &lt;i&gt;The Wire&lt;/i&gt; also failed to get any  official clarification to why the app seeks personal details of a user  to just send messages to the armed forces.&lt;/p&gt;
&lt;p align="justify"&gt;Calls and text messages to the social media cell of the Press  Information Bureau (PIB) – the government’s media interface in the  digital space – the office of Anurag Jain, listed in the &lt;a href="http://www.pmindia.gov.in" rel="external nofollow" target="_blank" title="www.pmindia.gov.in"&gt;www.pmindia.gov.in&lt;/a&gt; as the “web information office”, and to MyGov, which launched the app  at the second anniversary function of the Modi government on August 6  last year in New Delhi, failed to receive a reply. All that a PIB  official was willing to say on condition of anonymity to this  correspondent, “I think it has been outsourced, we don’t deal with it.  May be you can contact the PMO.”&lt;/p&gt;
&lt;p align="justify"&gt;Anurag Jain’s office at the PMO said, “You won’t get any information  here on the app and the response of the people for the campaign through  it. Call the appointments section, it might know.” But that  section didn’t respond.&lt;/p&gt;
&lt;p align="justify"&gt;A mail sent to Arvind Gupta of the BJP’s Cyber Cell too has so far  remained unanswered. A BJP source, however, pointed out, “If you go to  @narendramodi_in, it clearly mentions that it is the twitter account of  narendramodi.in, the personal website of Narendra Modi and also of the  Narendra Modi mobile app. So it is his personal app.”&lt;/p&gt;
&lt;p align="justify"&gt;The question of why a personal app of the prime minister is then  called his “official” app remains unanswered. Also, why is it then that  the bulk text messages sent by a government entity, MyGov, direct the  public to the prime minister’s personal app to send a message to the  armed forces? Is it personal or official?&lt;/p&gt;
&lt;p align="justify"&gt;Meanwhile, the traffic directed by the prime minister’s official  website to his personal portal can make use of the e-greeting section in  it to send a Diwali e-card to family, relatives, colleagues, etc.&lt;/p&gt;
&lt;p align="justify"&gt;To send such an e-card, the user needs to follow four mandatory steps  – choosing a card from the available options, selecting a pre-written  Diwali message; selecting a quote of the prime minister from an  exhaustive list made available to the user, and adding the name,  salutation and email address of the recipient of the card.&lt;/p&gt;
&lt;p align="justify"&gt;The list of quotes – in English and Hindi – have been culled out of  the prime minister’s speeches that straddle a variety of categories  including Pakistan, terrorism, ASEAN, Nepal, Bhutan, Swacchh Bharat  mission, the idea of India, secularism, disability, caste, dalits,  governance, yoga, youth, et al.&lt;/p&gt;
&lt;p align="justify"&gt;It also has “motivation” as a category of prime minister’s sayings.  Clicking it will give a user the choice of a long list of the prime  minister’s quotes which begins with the need for the world to recognise  the sacrifice made by Indian soldiers in the two world wars and ends  with a quote on the 2010 judgment given by the Allahabad high court on  the disputed site at Ayodhya:&lt;/p&gt;
&lt;div align="justify" class="aligncenter wp-caption" id="attachment_76745"&gt;&lt;a href="http://i1.wp.com/thewire.in/wp-content/uploads/2016/10/Screen-Shot-2016-10-26-at-5.12.35-PM-1.png"&gt;&lt;img alt="Diwali greetings that can be sent along with the prime minister's quote on the Ayodhya judgement" class="wp-image-76745 size-full" height="838" src="http://i1.wp.com/thewire.in/wp-content/uploads/2016/10/Screen-Shot-2016-10-26-at-5.12.35-PM-1.png?resize=934%2C889" width="880" /&gt;&lt;/a&gt;
&lt;p class="wp-caption-text"&gt;Diwali  greetings that can be sent along with the prime minister’s quote on the  Ayodhya judgement which has been stayed by the Supreme Court&lt;/p&gt;
&lt;/div&gt;
&lt;p align="justify"&gt;The quote said, “The Ayodhya judgment will work as a catalyst to  maintain peace and unity in the country. This judgment has given a  respect to belief and self esteem of the people of India, and it should  be linked to self esteem of the country.”&lt;/p&gt;
&lt;p align="justify"&gt;Reacting to the judgment in 2010, the Rashtriya Swayamsevak Sangh  chief Mohan Bhagwat had expressed “satisfaction”, adding, “The judgment  has paved the way for the construction of Ram temple in Ayodhya. The  judgment is not a win or loss for anybody. We invite everybody,  including Muslims, to help build the temple.”&lt;/p&gt;
&lt;p align="justify"&gt;Constructing the Ram temple in Ayodhya was also in the manifesto of  the BJP for the 2014 Lok Sabha polls with Modi as the party’s prime  ministerial candidate.&lt;/p&gt;
&lt;p align="justify"&gt;So, even if the Supreme Court had put a stay on the judgment and has  been hearing some petitions for and against it, this Diwali, if you wish  to send an e-card using that quote of the prime minister to express his  mind on the issue, you can.&lt;/p&gt;
&lt;p align="justify"&gt;“I think it is not only improper of the prime minister to allow such a  quote to feature in an e-card with his name but it is also contempt of  court. Being the prime minister of the country, he has to maintain  neutrality. As per the constitution, there is separation of the state  from religion. So being the prime minister, he can’t possibly allow  someone to use that quote of him,” says well-known constitutional expert  and senior Supreme Court lawyer Rajeev Dhavan.&lt;/p&gt;
&lt;p align="justify"&gt;Dhavan points out a precedent: “In 1969, the Supreme Court held as  contempt a comment made by the then West Bengal chief minister P.C. Sen  in a speech aired by All India Radio. The speech was made at a time when  someone had challenged an order of the state government on milk  production. Sen’s adverse comment supporting the order was presented  first in front of the West Bengal High Court which took cognisance of it  and termed it contempt of court. Thereafter, the case came to the SC  which also termed it contempt of court as the comment was made while the  case was pending in the court.”&lt;/p&gt;
&lt;p align="justify"&gt;&lt;b&gt;Swaying public opinion&lt;/b&gt;&lt;/p&gt;
&lt;p align="justify"&gt;As per media reports, the comment on the September 30, 2010, HC order  was made by Modi, then the Gujarat chief minister, on the same day,  before the SC stayed that order in May, 2011.&lt;/p&gt;
&lt;p align="justify"&gt;Dhavan felt, “That he, as the prime minister, is now openly allowing a  user to circulate that quote after the SC has begun hearing the case  will attract criminal contempt of court as it can be seen as interfering  with the working of the judiciary. He can obviously affect public  opinion and can be seen as trying to decide the question. It can be seen  as usurping the function of the Judiciary by the Executive.”&lt;/p&gt;
&lt;p align="justify"&gt;The traffic directed by the prime minister’s official website to the  personal portal can also make use of any Diwali e-greeting card by  picking a quote from a category named “political-general”. Many of the  quotes under that category are from the prime minister’s multiple  attacks on the main opposition party, the Congress, some of which must  have been made before the 2014 Lok Sabha polls, such as this one: “The  UPA government is non-serious, it has taken the people for granted &amp;amp;  it is not bothered about the youth. Their approach shows lack of faith  in democracy. Our goal is to win the trust of the people &amp;amp; give  dignity to them…”&lt;/p&gt;
&lt;p align="justify"&gt;“That the prime minister’s official website links people to surf his  personal website where they can send e-cards using anti-opposition  quotes of the prime minister is extremely contentious. Whichever party  had come to power, there has always been a Chinese wall between the  institution of the prime minister and the politician. Unfortunately,  both have come together in the current dispensation. The common man  doesn’t understand it well, so it is taking advantage of technology to  erase that difference,” former Information and Broadcasting minister and  Congress spokesperson Manish Tiwari said.&lt;/p&gt;
&lt;p align="justify"&gt;Such e-cards are not restricted to Diwali. You can send them on  occasions like “Holi, Rakshabandhan, Navaratri, Christmas, Independence  Day, Gudi Padwa, Kite Festival, Namo Birthday, Ram Navami, Swami  Vivekananda Janma Jayanti” and at any other time by opting for the  “political (general)” category.&lt;/p&gt;
&lt;p align="justify"&gt;Narendra Modi implemented the idea of launching e-cards that could go  with his quotes in the run-up to the 2014 parliamentary elections. &lt;a href="http://www.dnaindia.com/india/report-narendra-modi-launches-e-cards-to-wish-people-on-holi-1969980" rel="external nofollow" target="_blank" title="Reports said"&gt;Reports said&lt;/a&gt; that “Narendra Modi E-cards” were used by the BJP as a “new marketing  strategy” to canvas for its prime ministerial candidate before Holi to  bypass the Election Commission of India’s model code of conduct as there  was “no mention of rules for social media usage by political parties”.&lt;/p&gt;
&lt;p align="justify"&gt;Meanwhile, those who have signed up for the Narendra Modi mobile app  only to send a message to the armed forces have begun receiving regular  “infographics” based on the prime minister’s speeches, and also data  culled out of news and study reports that are deemed favourable to him  and his government. A registered user can further pass on those  “infographics” by sharing them on her Facebook page and twitter handle.&lt;/p&gt;
&lt;p align="justify"&gt;The app, though termed “official”, also forwards to a registered user  tweets posted only from his personal twitter handle and not from his  official handle, @pmoindia. One such tweet that this correspondent  received through the app had little to do with the government and  entirely with the persona of the politician behind the prime minister.  The tweet said, “When @narendramodi demonstrated true leadership at the  Patna rally, on this day in 2013…”&lt;/p&gt;
&lt;p align="justify"&gt;Clicking on the link in the tweet takes you to a write-up that talks  of the “true grit” of the “BJP’s then prime ministerial candidate” by  addressing a rally after a bomb blast in Patna.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-wire-october-29-2016-sangeeta-barooah-pisharoty-behind-modis-heartwarming-diwal-ad-for-soldiers-an-app-that-is-primed-for-political-messaging'&gt;https://cis-india.org/internet-governance/news/the-wire-october-29-2016-sangeeta-barooah-pisharoty-behind-modis-heartwarming-diwal-ad-for-soldiers-an-app-that-is-primed-for-political-messaging&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-30T07:33:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-october-28-2016-kumkum-dasgupta-bridging-the-gap">
    <title>Bridging the gap: Tech giants bring the internet to women in rural India </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-october-28-2016-kumkum-dasgupta-bridging-the-gap</link>
    <description>
        &lt;b&gt;This Diwali is going to be a cracker of a festival for Nisha Chanderwal, a second year BA student.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by KumKum Dasgupta was &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/bridging-the-gap-tech-giants-bring-the-internet-to-women-in-rural-india/story-8ZGqNnNArjbWFQCiJ3sSgJ.html"&gt;published in the Hindustan Times&lt;/a&gt; on October 28, 2016. Pranesh Prakash and Rohini Lakshané were quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“I bought a bright red kurta with gold-colour zari dupatta from  Snapdeal, my first online purchase,” the 19-year-old resident of Alwar’s  Umren village told HT recently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“No courier service reaches my village. So I gave my aunt’s home  address in Alwar. They paid in cash…I paid her when I picked up the  parcel,” she added, explaining the circuitous delivery and payment  process that is common in rural India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nisha is elated for one more reason: She has finally got even with  her 20-year-old brother, Ashok. “He has a smartphone, but doesn’t even  let me touch it, saying girls should not use the Internet. But now  thanks to Google’s Internet Saathi Programme (ISP), I don’t need his  phone or his help,” said an elated Nisha.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In July 2015, technology giant Google launched ISP in partnership  with Tata Trusts, one of the country’s oldest philanthropic  organisations, to bring rural women online in India. Today, the  initiative is live in 25,000 villages across 10 states with 1,900  saathis. The final mission is to reach 300,000 villages. Google is  adding up to 500 additional ‘saathis’ per week. More than 100,000 women  have been trained so far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google started this programme because Internet usage by women in rural areas is low.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Only one in 10 Internet users in rural India is a woman,” Sapna  Chadha, marketing head, Google India, told HT. “With ISP, we are  creating an enabling environment that empowers them while also bridging  the technology gender divide. We believe that easy access to information  can transform lives. Our mission is to organise the world’s information  and make it universally accessible”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along with access to information, getting more and more women online  has other benefits: “If women are a minority online, they become  vulnerable to harassment and violence. Women can’t only be consumers of  the Internet but must contribute their views, and make the space  equitable,” said Rohini Lakshané of the Bangalore-based The Centre for  Internet and Society (CIS), which is funded by the Kusuma Trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google and Tata Trusts are leveraging their core strengths for ISP.  While Google provides the hardware (phones and tablets), training and  Internet connectivity. Tata Trusts does the identification of saathis  and the monitoring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We tie up with government departments to roll out the project. For  example, in Rajasthan and Andhra Pradesh, we are working with the rural  livelihood mission. The government helps us to identify villages, set  selection criteria and logistics such as venues,” explained Prabhat  Pani, project director, Tata Trusts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The programme first chooses a few women and trains them on how to use  a mobile phone, shoot photos and videos and the basics of Internet.  Then the women are sent out on bicycles with a smartphone and a tablet  to teach others in their villages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The programme has opened a new world for many. “Google is like a  book. You can get whatever information you need. I am illiterate but I  use voice search for information,” said Phoolwati, a 45-year-old  resident of Nangli Jamawat, Umren.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Her friend Manju is now the village’s undisputed ‘selfie queen’. “I  love taking videos and photos,” she said, adding that she also searches  for information on MGNREGA or education loans for her children.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Google, the new online entrants are searching for news,  recipes, designs for clothes, images and information on pilgrimages,  farming and cattle-related information and government schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For Google, it makes immense sense to get more people online. “The  company is targeting huge and untapped demographics who are entry-level  users. Going forward, they will have a huge first-mover advantage if  there is scope to monetise Google’s services,” explained Lakshané.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By 2020, about 315 million rural Indians will be connected to the  Internet, compared to around 120 million now. That’s about 36% of the  country’s online population. By 2020, this share of rural India will  jump to 48%, creating a huge opportunity for brands and marketers in  places where establishing stores is a challenge,” says a study by the  Boston Consulting Group, The Rising Connected Consumer in Rural India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first signs of this market potential were evident during the  pre-Diwali online festival season sale. E-tailers posted growth in sales  compared to last year thanks to growing smartphone penetration in small  towns and villages, cheaper data tariffs and free hotspots. While  Google did not divulge the exact revenues that it is spending on ISP,  Chadha said it has helped the company to understand the needs of users  in rural areas and what role the Internet can play.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along with ISP, Google is also working with the Indian government on  two projects that aims to give more people access to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, the Project Loon, which uses high-altitude balloons to create  an aerial wireless network with up to 4G speeds for providing Internet  access to rural and remote areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, the company is partnering with RailTel to provide free wi-fi access in stations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The ISP has no immediate profits for Google. The average revenue  Indian per user is less than say a user in US. But getting more people  online helps Google because its search engine is most used,” Pranesh  Prakash, policy director, CIS, told HT. “In the long run, the company  will earn when people access its services and also from advertising  revenue.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nevertheless, the ISP is addressing a major problem. “Many are afraid  to go online because they don’t know how they can benefit. While the  Saathi programme is not a philanthropic effort, it’s good that Google is  addressing this issue through its training programmes,” Prakash said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-october-28-2016-kumkum-dasgupta-bridging-the-gap'&gt;https://cis-india.org/internet-governance/news/hindustan-times-october-28-2016-kumkum-dasgupta-bridging-the-gap&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-30T07:23:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-october-23-2016-some-key-words-are-missing">
    <title>Some Key Words Are Missing</title>
    <link>https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-october-23-2016-some-key-words-are-missing</link>
    <description>
        &lt;b&gt;Google manipulating search results? The Competition Commission is on its case.&lt;/b&gt;
        &lt;p&gt;The article by Arindam Mukherjee was &lt;a class="external-link" href="http://www.outlookindia.com/magazine/story/some-key-words-are-missing/295301"&gt;published by Outlook&lt;/a&gt; on October 23, 2016. Nehaa Chaudhari was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;img height="277" src="http://www.outlookindia.com/resizer.php?src=http://photogallery.outlookindia.com/images/gallery/20150911/sundar_pichai_20150921.jpg&amp;amp;w=630" width="416" /&gt;&lt;/p&gt;
&lt;div class="mainContent"&gt;
&lt;div class="soda fontStyle" style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;G’s Global Woes&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Google’s problems aren’t restricted to India. It is facing similar cases around the world.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Europe:&lt;/b&gt; The search giant has been accused of  using its dominant position on the web to dominate the market for online  product searches. There’s another probe on possible abuse of dominant  position with Android.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Brazil:&lt;/b&gt; Is being investigated for favouring its own services over others on the internet&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Hong Kong &amp;amp; Argentina:&lt;/b&gt; Facing issues about collecting user data&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Spain:&lt;/b&gt; Had to shut down Google News over copyright issues.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Germany:&lt;/b&gt; Its Google Street View navigation service got into problems over privacy issues&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Mexico:&lt;/b&gt; The local regulator has brought up issues similar to those in Europe&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: center; "&gt;***&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is an uneasy calm at Google’s India offices these days.  Spokespersons are giving measured statements, watched over by an army of  lawyers who are busy looking at the finer points. A case against  Google’s advertising and search practices with the Competition  Commission of India (CCI) has the potential to derail the search giant’s  operations in India. Why, a nervous Google has even sought to make  hearings in this case in-camera to totally shut out the media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a lot at stake. An investigation report of the CCI has found  Google squarely guilty of abusing its dominant position to manipulate  search results on the internet and online advertising results to its own  advantage and to those of companies paying for it. Google was found to  “have abused its dominant position in the relevant markets of online  general web search service in India and online search advertising in  India in violation of the Competition Act 2002”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, the report (which has been reviewed by &lt;i&gt;Outlook&lt;/i&gt;) is  blunt on many of the issues: “Google is found to be indulging in  practices of search bias and by doing so it causes harm to its  competitors as well as users.... Google steers users to its own products  and services and produces biased results. This structure offers  abundant opportunities for leveraging and has also raised issues of  conflict of interest.” It says that through such practices Google was  adversely affecting the competitive landscape in the markets for online  general web search, search advertising as well as adjacent markets like  travel, maps, social networking and e-commerce.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The whole brouhaha started with complaints from two  parties—Chennai-based matchmaking portal Bharat­mat­ri­mony.com and  Jaipur-based cons­u­mer rights organisation CUTS International—in 2012.  “People who are subscribing to Google’s Adwords and are paying Goo­gle  or are buying keywords are getting preference in their search results.  Many of the search results on Google are eit­her ads or sponsored links  and not gen­uine search results. Google is pushing ads as news items  which normal users would be unable to distinguish,” says Sharad  Bhansali, managing partner, APJ SLG Law Offices which is representing  CUTS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CUTS also complained that Google was promoting its own products  through search. Says Udai Singh Mehta, CUTS director, “Preference was  being given by Google to its products and subsidiaries in search.” This,  being a dominant player in search and online advertising, amounts to  abusing its position. According to market estimates, Google enjoys a 93  per cent share of the search market and gets about 85 per cent of the  revenues of online advertising. Says Nikhil Pahwa, editor-in-chief of  Medianama: “In search cases, Google is clearly the dominant player in  the market. So when they start integrating content into search, there is  a problem and it becomes an issue.”&lt;/p&gt;
&lt;p&gt;&lt;span class="slig_ins_lft ftleft rtmrg20"&gt;&lt;img src="http://www.outlookindia.com/public/uploads/articles/2015/9/21/nikhil_pahwa_thumb.jpg" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div class="soda fontStyle" style="text-align: justify; "&gt;&lt;span class="rtmrg20 ftleft slig_ins_lft"&gt;“In search cases, Google is clearly the dominant player. So when they integrate content into search, it’s a problem.” &lt;br /&gt;&lt;span class="source"&gt;Nikhil Pahwa, Medianama&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="soda fontStyle" style="text-align: justify; "&gt;&lt;span class="rtmrg20 ftleft slig_ins_lft"&gt;&lt;span class="source"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;In the course of the investigation, the CCI D-G also  sought opinion from about 30 companies—most of them gave similar  feedback about Google’s practices. The list includes Flipkart,  mapmyindia.com, makemytrip.com, Microsoft and Nokia Maps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google will now have to appear before the full CCI bench on September  17 for a hearing based on the D-G report. After this, the CCI will take  a final call on the issue. Of course, Google can seek an extension of  this hearing. According to company insiders, they have not sought an  extension yet. Google will have the right to appeal any order the CCI  comes out with. The first appeal would be at the court of a competition  appellate tribunal headed by a retired SC judge. The final appeal can  happen only with the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As expected, Google den­ies any wrongdoing and says the abuse of  dominant position will need to be proved. Manas Chaudhuri, lawyer with  Khaitan &amp;amp; Co which deals with competition cases, told &lt;i&gt;Outlook&lt;/i&gt;,  “The report says that Google is dominant, which is correct. If it is  dominant, there is nothing wrong under the Competition Act. The issue is  whether or not it has abused its dom­inance. The ‘abuse’ is a  rule-of-reason argument and as such the CCI will have to assess quite a  few int­ernational best practices theories eg, ‘objective  justification’, ‘ana­ly­sing the sta­t­u­tory mandate of meeting the  competition in the relevant market’, ‘consumer harm’ and  ‘counterfactuals’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response to queries, a Google spokesperson said, “We’re currently  rev­i­ewing the report from the CCI’s ongoing investigation. We continue  to work closely with the CCI and remain confident that we comply fully  with Ind­ia’s competition laws. Regulators and courts around the world,  including in the US, Germany, Taiwan, Egypt and Brazil, have looked into  and found no concerns on many of the issues raised in this rep­ort.”  Act­ually, Google is facing a similar case in the EU, while similar  issues have been raised in Brazil, Hong Kong, Argentina and Mexico (see  box).&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table align="left"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="http://resize.outlookindia.com/images/coverpics/outlookindia/large/big_cover_20131028.jpg" target="_blank"&gt;&lt;img height="360" src="http://images.outlookindia.com/images/coverpics/outlookindia/large/big_cover_20131028.jpg" width="275" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center; "&gt;&lt;i&gt;Outlook&lt;/i&gt;’s cover from &lt;a href="http://www.outlookindia.com/content11203.asp" target="_blank"&gt;Oct 28, 2013&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div class="soda fontStyle" style="text-align: justify; "&gt;Sure, at first blush, the report appears tilted against Google. What may  go in its favour is the CCI’s dismal record in treating such cases.  Though it is the final investigation report, experts say it is not  sacrosanct: the CCI bench might not agree with it. In the last six  years, over 20 such investigation reports have been dismissed by the CCI  after the final hearing. And Google will try its best to bring forth  the fact that it has been exonerated in similar cases in the US, Germany  and Taiwan.&lt;/div&gt;
&lt;div class="soda fontStyle" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p&gt;But with the D-G’s final investigation report giving a clear verdict  against Google’s practices, it might not be so easy for the search giant  to come out cleanly from this one. Says Nehaa Chaudhari, lawyer with  the Centre for Internet and Society (cis), “Given that India is not the  only jurisdiction where Google is using its secret algorithm to promote  its own products, there is enough for the CCI to proceed on against it.”  What will also help is the testimony of several companies who have said  that they have suffered because of Google’s web practices.&lt;/p&gt;
&lt;p&gt;The entire world is watching India. Clearly, if the CCI upholds the  D-G report and pronounces Google guilty, it could seriously affect the  search giant’s growth in India, one of the fastest growing internet  markets for Google with over 300 million internet users and an even  faster growing Android landscape (where also it is a dominant player).  With the final EU verdict on the case yet to come out, will India set a  new example for the world to follow?&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-october-23-2016-some-key-words-are-missing'&gt;https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-october-23-2016-some-key-words-are-missing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-23T01:40:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/bloomberg-udbhav-tiwari-october-22-2016-how-long-have-banks-known-about-debit-card-fraud">
    <title>How Long Have Banks Known About The Debit Card Fraud?  </title>
    <link>https://cis-india.org/internet-governance/blog/bloomberg-udbhav-tiwari-october-22-2016-how-long-have-banks-known-about-debit-card-fraud</link>
    <description>
        &lt;b&gt;The recent security breach in an Indian payment switch provider, confirmed earlier this week by the National Payments Corporation of India Ltd (NPCIL), has forced domestic banks into damage control mode over the past few days.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://www.bloombergquint.com/opinion/2016/10/21/how-long-have-banks-known-about-the-debit-card-fraud"&gt;published by Bloomberg&lt;/a&gt; on October 22, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The breach was detected when various customers began to lodge complaints  with their banks about unauthorised transactions on their accounts,  which upon investigation were said to originate from a foreign location  such as China. The security breach has affected actively at least 641  customers to the tune of Rs 1.8 crore, with lakhs more being affected by  the pro-active measures (including card revocation) being taken by  banks to prevent further financial losses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surprisingly little is known, however, about the nature of the attack responsible for the breach, the extent or scope of damage it has caused and the sufficiency of the countermeasures being initiated by the banks against the attacks. This article will talk about these aspects of the attack and also suggest normative measures that can be carried out to minimize harm and prevent such attacks in the future.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Modus Operandi&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to reports, the compromise may have happened at the level of the Hitachi Payment Services, which is a payment services provider which operates, among other financial services, ATMs for a variety of banks across the country. One or a certain number of ATMs were apparently compromised by a malware, which then infected the payment services provider network, leading to a far larger potential target area than just the physical ATMs for malware to act against. The malware could have infected the payment switch provider via physically being uploaded onto vulnerable ATM machines, which are known to run out-dated embedded operating systems with various documented loopholes that are rarely patched. The malware then could have recorded the details of the cards used on the infected ATMs (or even in the network generally) and then, via the same compromised network, transmitted confidential details, including ATM pins and CVV numbers, to the operators of the malware.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Malware.jpg/@@images/13c6e6b2-e9be-4056-bd2d-ad540cff88dc.jpeg" alt="Malware" class="image-inline" title="Malware" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The attack could have also occurred from some other vulnerable part of the payment network, such as a payment switch within the bank itself, making it far more dangerous as it still maybe be active on parts of the network within the bank and would have access to a far wider range &amp;amp; variety of information than a mere ATM. There is no real way to know if the threat has been even contained, forget neutralised, as the audits being carried out by PCI-DSS authorised agencies have been on-going for the past month and their reports are not due at least another 15 days, as intimated by NPCIL.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Massive Financial Implications&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Bank.png/@@images/5a9bda35-ccdc-4895-a841-609c4c7c0958.png" alt="Bank" class="image-inline" title="Bank" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Policemen guard the banking hall of a State Bank of India branch in New Delhi. (Photographer: Sondeep Shankar/Bloomberg News) &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The compromise of these details, regardless of the source of the compromise, has massive financial implications. This is because various international services allow debit/credit cards to be used only with the card number, expiry date, name &amp;amp; CVV number. They do not require the use of ATM Pins or an OTP (one time password) sent to a mobile phone for online transactions. In fact, unlike India where the RBI mandates OTPs for debit cards, this CVV based simplified online usage is the standard practice of using ATM Cards digitally in most of the developed world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This would mean that merely changing ATM pins, something which SBI alleges less than 7 percent of its customers had done prior to all 6 lakh cards being blocked, would serve as almost no protection if the cards are enabled for international online transactions. The fact that most of the dubious, unauthorised financial transactions are occurring from foreign locations probably demonstrates that it is these kinds of internationally enabled cards that are being targeted for this sort of an attack.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Are Banks Concealing Information?&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Bank.png/@@images/0f5235cb-4909-4885-b12e-d83bb4202230.png" alt="Bank" class="image-inline" title="Bank" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;A customer exits a Yes Bank Ltd. automated teller machine (ATM) in Ahmedabad. (Photographer: Dhiraj Singh/Bloomberg)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The absence of data/security breach laws in India is being sharply felt as there as has been an abject lack of clarity and information from the banking sector and the government regarding the attack. Over 47 states in the USA and most of the countries in the EU have enacted strict data security breach laws that mandate public intimation &amp;amp; disclosure of key information pertaining to the attack along with detailed containment measures. The presence of such a law in India would have gone a long way in preventing the breach from being under the wraps for so long (it occurred at the bank level in September, almost a month ago) and also ensured far more vigilant active compliance by corporations &amp;amp; banks to international security standards and best practices. For now, the only true countermeasure to prevent future harm to affected card holders is for all affected cards to be revoked by the banks and new cards being issued to affected customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Constant vigilance &amp;amp; comprehensive security audits by banks to detect affected cards and active protection for customers, using financial and identity insurance services such as AllClear ID Plus (used by Sony in the 2011 Playstation Hack) will go a long way in mitigating the harm of the breach. The banking industry, government &amp;amp; security agencies should all learn from this breach and a combination of new legislation, updated industry practices and consumer awareness is necessary for proactive &amp;amp; reactive actions in the future.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/bloomberg-udbhav-tiwari-october-22-2016-how-long-have-banks-known-about-debit-card-fraud'&gt;https://cis-india.org/internet-governance/blog/bloomberg-udbhav-tiwari-october-22-2016-how-long-have-banks-known-about-debit-card-fraud&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-22T08:06:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rbi-directions-on-account-aggregators">
    <title>RBI Directions on Account Aggregators </title>
    <link>https://cis-india.org/internet-governance/blog/rbi-directions-on-account-aggregators</link>
    <description>
        &lt;b&gt;The Reserve Bank of India's (RBI) Directions for account aggregator services in India seem to lay great emphasis on data security by allowing only direct access between institutions and do away with data scraping techniques.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;These days’ people have access to various financial services and manage their finances in a diverse manner while dealing with a large number of financial service providers, each providing one or more services that the user may need such as banking, credit card services, investment services, etc. This multiplicity of financial service providers could make it inconvenient for the users to keep track of their finances since all the information cannot be provided at the same place. This problem is sought to be solved by the account aggregators by providing all the financial data of the user at a single place. Account aggregation is the consolidation of online financial account information (e.g., from banks, credit card companies, etc.) for online retrieval at one site. In a typical arrangement, an intermediary (e.g., a  portal) agrees with a third party service provider to provide the service to consumers, the intermediary would then generally privately label the service and offer consumers access to it at the intermediary’s website.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; There are two major ways in which account aggregation takes place, (i) &lt;i&gt;direct access&lt;/i&gt;: wherein the account aggregator gets direct access to the data of the user residing in the computer system of the financial service provider; and (ii) &lt;i&gt;scraping&lt;/i&gt;: where the user provides the account aggregator the username and password for its account in the different financial service providers and the account aggregator scrapes the information off the website/portal of the different financial service providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since account aggregation involves the use and exchange of financial information there could be a number of potential risks associated with it such as (i) loss of passwords; (ii) frauds; (iii) security breaches at the account aggregator, etc. It is for this reason that on the advice of the Financial Stability and Development Council,&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; the Reserve Bank of India (“&lt;b&gt;RBI&lt;/b&gt;”) felt the need to regulate this sector and on September 2, 2016 issued the Non-Banking Financial Company - Account Aggregator (Reserve Bank) Directions, 2016 to provide a framework for the registration and operation of Account Aggregators in India (the “&lt;b&gt;Directions&lt;/b&gt;”). The Directions provide that no company shall be allowed to undertake the business of account aggregators without being registered with the RBI as an NBFC-Account Aggregator. The Directions also specify the conditions that have to be fulfilled for consideration of an entity as an Account Aggregator such as:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;the company should have a net owned fund of not less than rupees two crore, or such higher amount as the Bank may specify;&lt;/li&gt;
&lt;li&gt;the company should have the necessary resources and wherewithal to offer account aggregator services;&lt;/li&gt;
&lt;li&gt;the company should have adequate capital structure to undertake the business of an account aggregator;&lt;/li&gt;
&lt;li&gt;the promoters of the company should be fit and proper individuals;&lt;/li&gt;
&lt;li&gt;the general character of the management or proposed management of the company should not be prejudicial to the public interest;&lt;/li&gt;
&lt;li&gt;the company should have a plan for a robust Information Technology system;&lt;/li&gt;
&lt;li&gt;the company should not have a leverage ratio of more than seven;&lt;/li&gt;
&lt;li&gt;the public interest should be served by the grant of certificate of registration; and&lt;/li&gt;
&lt;li&gt;Any other condition that made be specified by the Bank from time to time.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Direction further talk about the responsibilities of the Account Aggregators and specify that the account aggregators shall have the duties such as: (a) Providing services to a customer based on the customer’s explicit consent; (b) Ensuring that the provision of services is backed by appropriate agreements/ authorisations between the Account Aggregator, the customer and the financial information providers; (c) Ensuring proper customer identification; (d) Sharing the financial information only with the customer or any other financial information user specifically authorized by the customer; (e) Having a Citizen's Charter explicitly guaranteeing protection of the rights of a customer.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Account Aggregators are also prohibited from indulging in certain activities such as: (a) Support transactions by customers; (b) Undertaking any other business other than the business of account aggregator; (c) Keeping or “residing” with itself the financial information of the customer accessed by it; (d) Using the services of a third party for undertaking its business activities; (e) Accessing user authentication credentials of customers; (f) Disclosing or parting with any information that it may come to acquire from/ on behalf of a customer without the explicit consent of the customer.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; The fact that there is a prohibition on the information accessed from actually residing with the Account Aggregator will ensure greater security and protection of the information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Consent Framework&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions specify that the function of obtaining, submitting and managing the customer’s consent should be performed strictly in accordance with the Directions and that no information shall be retrieved, shared or transferred without the explicit consent of the customer.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; The consent is to be taken in a standardized artefact, which can also be obtained in electronic form,&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; and shall contain details as to (i) the identity of the customer and optional contact information; (ii) the nature of the financial information requested; (iii) purpose of collecting the information; (iv) the identity of the recipients of the information, if any; (v) URL or other address to which notification needs to be sent every time the consent artefact is used to access information; (vi) Consent creation date, expiry date, identity and signature/ digital signature of the Account Aggregator; and (vii) any other attribute as may be prescribed by the RBI.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; The account aggregator is required to inform the customer of all the necessary attributes to be contained in the consent artefact as well as the customer’s right to file complaints with the relevant authorities.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The customers shall also be provided an option to revoke consent to obtain information that is rendered accessible by a consent artefact, including the ability to revoke consent to obtain parts of such information.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Comments: While the Directions have specific provisions regarding how the financial data shall be dealt with, it is pertinent to note that the actual consent artefact also has personal information and it is not clear whether Account Aggregators are allowed disclose that information to third parties are not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure and sharing of financial information&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Financial information providers such as banks, mutual funds, etc. are allowed to share information with account aggregators only upon being presented with a valid consent artifact and also have the responsibility to verify the consent as well as the credentials of the account aggregator.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; Once the verification is done, the financial information provider shall digitally sign the financial information and transmit the same to the Account Aggregator in a secure manner in real time, as per the terms of the consent.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; In order to ensure smooth flow of data, the Directions also impose an obligation on financial information providers to:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;implement interfaces that will allow an Account Aggregator to submit consent artefacts, and authenticate each other, and enable secure flow of financial information;&lt;/li&gt;
&lt;li&gt;adopt means to verify the consent including digital signatures;&lt;/li&gt;
&lt;li&gt;implement means to digitally sign the financial information; and&lt;/li&gt;
&lt;li&gt;maintain a log of all information sharing requests and the actions performed pursuant to such requests, and submit the same to the Account Aggregator.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Comments: The Directions provide that the Account Aggregator will not support any transactions by the customers and this seems to suggest that in case of any mistakes in the information the customer would have to approach the financial information provider and not the Account Aggregator.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Use of Information&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions provide that in cases where financial information has been provided by a financial information provider to an Account Aggregator for transferring the same to a financial information user with the explicit consent of the customer, the Account Aggregator shall transfer the same in a secure manner in accordance with the terms of the consent artefact only after verifying the identity of the financial information user.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Such information, as well as information which may be provided for transferring to the customer, shall not be used or disclosed by the Account Aggregator or the Financial Information user except as specified in the consent artefact.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Security&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions specify that the business of an Account Aggregator will be entirely Information Technology (IT) driven and they are required to adopt &lt;b&gt;required IT framework&lt;/b&gt; and interfaces to ensure secure data flows from the financial information providers to their own systems and onwards to the financial information users.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; This technology should also be scalable to cover any other financial information or financial information providers as may be specified by the RBI in the future.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; The IT systems should also have adequate safeguards to ensure they are protected against unauthorised access, alteration, destruction, disclosure or dissemination of records and data.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; Information System Audit of the internal systems and processes should be in place and be conducted at least once in two years by CISA certified external auditors whose report is to be submitted to the RBI.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; The Account Aggregators are prohibited from asking for or storing customer credentials (like passwords, PINs, private keys) which may be used for authenticating customers to the financial information providers and their access to customer’s information will be based only on consent-based authorisation (for scraping).&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Grievance Redressal&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions require the Account Aggregator to put in place a policy for handling/ disposal of customer grievances/ complaints, which shall be approved by its Board and also have a dedicated set-up to address customer grievances/ complaints which shall be handled and addressed in the manner prescribed in the policy.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; The Account Aggregator also has to display the name and details of the Grievance Redressal Officer on its website as well as place of business.&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Supervision&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions require the Account Aggregators to put in place various internal checks and balances to ensure that the business of the Account Aggregator does not violate any laws or regulations such as constitution of an Audit Committee, a Nomination Committee to ensure the “fit and proper” status of its Directors, a Risk Management Committee and establishment of a robust and well documented risk management framework.&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; The Risk Management Committee is required to (a) give due consideration to factors such as reputation, customer confidence, consequential impact and legal implications, with regard to investment in controls and security measures for computer systems, networks, data centres, operations and backup facilities; and b) have oversight of technology risks and ensure that the organisation’s IT function is capable of supporting its business strategies and objectives.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt; Further the RBI also has the power to inspect any Account Aggregator at any time.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Penalties&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions themselves do not provide for any penalties for non compliance, however since the Directions are issued under Section 45JA of the Reserve Bank of India Act, 1934 (“&lt;b&gt;RBI Act&lt;/b&gt;”), this means that any contravention of these directions will be punishable under Section 58B of the RBI Act which provides for an imprisonment of upto 3 years as well as a fine for any contravention of such directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions by the RBI provide a number of regulations and checks on Account Aggregators with the view to ensure safety of customer financial data. These Directions appear to be quite trendsetting in the sense that in most other jurisdictions such as the United States or even Europe there are no specific regulations governing Account Aggregators but their activities are mainly being governed under existing privacy or consumer protection legislations.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The entire regulatory regime for Account Aggregators seems to suggest that the RBI wants Account Aggregators to be like funnels to channel information from various platforms right to the customer (or financial information user) and it does not want to take a chance with the information actually residing with the Account Aggregators. Further, by prohibiting Account Aggregators from accessing user authentication credentials, the RBI is trying to eliminate the possibility of this information being leaked or stolen. Although this may make it more onerous for Account Aggregators to provide their services, it is a great step to ensure the safety and security of customer data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent months the RBI has been trying to actively engage with the various new products being introduced in the financial sector owing to various technological advancements, be it the circular informing the public about the risks of virtual currencies including Bitcoin, the consultation paper on P2P lending platforms or these current guidelines on Account Aggregators. These recent actions of the RBI seem to suggest that the RBI is well aware of various technological advancements in the financial sector and is keeping a keen eye on these technologies and products, but appears to be taking a cautious and weighted approach regarding how to deal with them.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Ann S. Spiotto, &lt;i&gt;Financial Account Aggregation: The Liability Perspective&lt;/i&gt;, Fordham Journal of Corporate &amp;amp; Financial Law, 2006, Volume 8, Issue 2, Article 6, available at &lt;a href="http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1181&amp;amp;context=jcfl"&gt;http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1181&amp;amp;context=jcfl&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;a href="https://rbi.org.in/scripts/BS_PressReleaseDisplay.aspx?prid=34345"&gt;https://rbi.org.in/scripts/BS_PressReleaseDisplay.aspx?prid=34345&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Clause 4.2.2 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Clause 5 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Clause 5 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Clauses 6.1 and 6.2 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Clause 6.4 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Clause 6.3 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Clause 6.5 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Clause 6.6 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Clauses 7.1 and 7.2 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Clauses 7.3 and 7.4 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Clause 7.5 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Clause 7.6.1 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Clause 7.6.2 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Clause 9(a) of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Clause 9(c) of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Clause 9(d) of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Clause 9(f) of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Clause 9(b) of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Clauses 10.1 and 10.2 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Clause 10.3 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Clauses 12.2, 12.3 and 12.4 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Clause 12.4 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Clause 15 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; &lt;a href="http://www.canadiancybersecuritylaw.com/2016/07/german-regulator-finds-banks-data-rules-impede-non-bank-competitors/"&gt;http://www.canadiancybersecuritylaw.com/2016/07/german-regulator-finds-banks-data-rules-impede-non-bank-competitors/&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rbi-directions-on-account-aggregators'&gt;https://cis-india.org/internet-governance/blog/rbi-directions-on-account-aggregators&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vipul Kharbanda and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Banking</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-21T15:25:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-alex-mathew-october-20-2016-the-big-debit-card-breach">
    <title>The Big Debit Card Breach: Three Things Card Holders Need To Understand</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-alex-mathew-october-20-2016-the-big-debit-card-breach</link>
    <description>
        &lt;b&gt;A total of 32 lakh debit cards across 19 banks could have been compromised on account of a purported fraud, the National Payment Corporation of India said in a statement.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Alex Mathew was &lt;a class="external-link" href="http://www.bloombergquint.com/business/2016/10/20/indias-biggest-security-breach-32-lakh-debit-cards-across-19-banks-may-have-been-compromised"&gt;published by Bloomberg&lt;/a&gt; on October 20, 2016. Udbhav Tiwari was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The  issue was brought to light when State Bank of India blocked the debit  cards of 6 lakh customers on October 14. This was done after the bank  was alerted to a possible fraud by the National Payment Corporation of  India, MasterCard and Visa, said Managing Director Rajnish Kumar in a  telephonic interview with BloombergQuint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a statement released  on Thursday evening, the NPCI clarified that the problem was brought to  their attention when they received complaints from a few banks that  customers’ cards were used fraudulently, mainly in China and the U.S.,  while those cardholders were in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The complaints of  fraudulent withdrawal are limited to cards of 19 banks and 641  customers. The total amount involved is Rs 1.3 crore as reported by  various affected banks to NPCI,” the payments corporation said.&lt;/p&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__image story__element"&gt;&lt;figure&gt; &lt;img src="https://cis-india.org/home-images/Card.png" alt="Card" class="image-inline" title="Card" /&gt;&lt;br /&gt; &lt;/figure&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p style="text-align: justify; "&gt;SISA Security, a Bengaluru-based company is currently undertaking  a forensic study to identify the extent of the problem and will submit a  final report in November.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-blockquote"&gt;
&lt;div&gt;
&lt;blockquote&gt;Based on the advisory issued by NPCI and other schemes, it is gathered  that banks have advised their customers to change their debit card PIN.  In situations where customers could not be contacted, the cards have  been blocked and fresh cards are being issued by member banks.&lt;/blockquote&gt;
&lt;span class="attribution"&gt;NPCI statement&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p style="text-align: justify; "&gt;State Bank of India has blocked 6 lakh cards, while other banks  have sent notifications to customers advising them to change their  personal identification numbers.&lt;/p&gt;
&lt;h3&gt;How The Breach Could Have Occured&lt;/h3&gt;
&lt;p&gt;The breach that has apparently given hackers access to the PIN codes  of several bank customers is likely to be on account of a malware  attack. This attack is believed to have originated at an ATM.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  actual modus operandi of the hackers will only become clear once the  forensic audit is released in November, but BloombergQuint spoke to  cyber security expert Udbhav Tiwari to find out how the attack could  have been orchestrated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, the hacker would have had to gain  physical access to an ATM. The malware was then likely injected by  connecting a laptop or another special device to a port on the cash  disbursing machine, said Tiwari, a consultant at Centre For Internet  &amp;amp; Society in Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the malware is injected, it  automatically spreads across the network and infects other devices that  are not protected against it. In this case, the malware could have  infected a payment switch provider’s network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A payment switch  provider is an entity that facilitates a transaction either from an ATM  or an online payment gateway. The service provider decides to whom the  request for authorisation will be sent and then transmits the request  back to the merchant or the ATM where the transaction originated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  this case, one payment switch provider, Hitachi Payment Services, which  manages close to 50,000 ATMs across the country, was asked by banks to  investigate 30 of its ATMs on account of around 400 suspicious  transactions that took place outside India, Managing Director Loney  Antony told BloombergQuint in a telephonic interview.&lt;/p&gt;
&lt;p&gt;The company  had earlier said in a statement that an interim report by the audit  agency does not suggest any breach or compromise in its systems.&lt;/p&gt;
&lt;h3&gt;The Scale Of The Breach&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According  to a study conducted by NPCI in collaboration with the banks, the  number of debit cards that were infected by the malware has been set at  32 lakh. But Tiwari said this number could be higher.&lt;/p&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div&gt;
&lt;blockquote&gt;The hypothetical limit to how much the malware can spread is dependent  on the vulnerability of the systems, and if one of the payment switch  provider’s systems was vulnerable and they still haven’t decided how  many systems are vulnerable, it is quite possible that the malware is  spreading at this point.&lt;/blockquote&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="attribution"&gt;Udbhav Tiwari, Consultant, Centre For Internet &amp;amp; Society&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span class="attribution"&gt;What A Customer Should Do&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;The first, and most important step a customer should take is to immediately change their debit card PIN, Tiwari pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;State  Bank of India has said that its customers can opt to restrict the usage  of their debit cards, for example whether it can be used both  internationally and domestically or only domestically. Also, the daily  limit of the debit card can be changed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once these steps have been  taken, according to Tiwari, it is most important that customers stay  vigilant and keep monitoring their bank statements. If an unauthorised  transaction takes place, a customer should immediately contact their  bank and block their card.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-alex-mathew-october-20-2016-the-big-debit-card-breach'&gt;https://cis-india.org/internet-governance/news/bloomberg-alex-mathew-october-20-2016-the-big-debit-card-breach&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-21T13:43:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data">
    <title>Intelligence agencies will not have open access to Aadhaar data: UIDAI chief </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data</link>
    <description>
        &lt;b&gt;Intelligence agencies will not have free access to Aadhaar data, a top government official said on Thursday, looking to assuage fears of abuse of personal information.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aloke Tikku was &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/intelligence-agencies-will-not-have-open-access-to-aadhaar-data-uidai-chief/story-cAp5EEWA83IGRbbtGfMorN.html"&gt;published in the Hindustan Times&lt;/a&gt; on October 20, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI), which issued identity cards to 1.07 billion Indians, last month &lt;span class="st_readmore_sp"&gt;&lt;a href="http://www.hindustantimes.com/india-news/govt-to-keep-aadhar-record-for-7-years-activists-worried/story-jSY820Ee1ZnQNLL5vuWMOI.html" shape="rect" title="www.hindustantimes.com"&gt;decided to retain data&lt;/a&gt; &lt;/span&gt; related to the verification of Aadhaar-enabled transactions for seven years, leading to security concerns over data safety.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As reported by HT on Monday, privacy experts expressed concerns that  transaction data retained for so long could be accessed by the security  establishment for surveillance on individuals without sufficient  grounds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This fear is completely misplaced,” ABP Pandey, UIDAI’s chief executive officer told HT in an interview.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security agencies can access the data only in case of national security after they get the nod of an oversight committee headed by the cabinet secretary. This committee has to clear every order made by the designated joint secretary-level officer before the information is shared, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“You cannot have any legal protection stronger than this,” Pandey added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar transaction data is not only protected by the most powerful, contemporary law to restrict access but also by strong cryptography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Even if someone attempts, the 2048-bit encryption is so strong that it will take them millions of computers and billions of years to decrypt the data,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A vocal critic of Aadhaar’s design, Sunil Abraham of the Centre for Internet and Society (CIS) suggested he wouldn’t rely too much on the legal framework. “You cannot put a legal band-aid on a broken technological solution. You need to get privacy and security right by design,” the director of the Bengaluru-based research body said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham said the problem could have been averted if the UIDAI did not store the data in a centralised form. Instead, it could have used its digital signature to sign proof of authentication that could be stored by the authenticating agency and the citizen on a smart card.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-21T01:32:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act">
    <title>MLATs and the proposed Amendments to the US Electronic Communications Privacy Act</title>
    <link>https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act</link>
    <description>
        &lt;b&gt;In continuance of our blog post on mutual legal assistance treaties (MLATs), we examine a new approach to international bilateral cooperation being suggested in the United States, by creating a mechanism for certain foreign governments to directly approach the data controllers.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Published under Creative Commons License CC BY-SA. Anyone can distribute, remix, tweak, and build upon this document, even for commercial purposes, as long as they credit the creator of this document and license their new creations under the terms identical to the license governing this document&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a href="http://cis-india.org/internet-governance/blog/cross-border-cooperation-on-criminal-matters"&gt;previous article&lt;/a&gt; on MLATs we discussed, in some detail, what MLATs are and why they are needed.  One area which was briefly focused upon in that article was the limitations and criticisms of the MLAT mechanism, of which one of the main criticisms being the problems caused due to different legal standards in various jurisdictions as well as the time taken to process a request for information sent from one country to another. Talking specifically about the United States, where most internet companies are headquartered and hold large amounts of data, it typically takes months to process requests under MLATs and foreign governments often struggle to comprehend and comply with the legal standards in the United States for obtaining data for use in their investigations.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; The requirement that a foreign government should take permission from, and comply with the requirements of a foreign government simply because the data needed happens to be controlled by a service provider based in a foreign country strikes many foreign law enforcement officials as damaging to security and law enforcement efforts, especially when they are requesting data pertaining to a crime between two of their own citizens that primarily took place on their soil.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These inefficiencies of the MLAT process lead to further problems of foreign governments attempting to apply their search and surveillance laws in an extraterritorial manner for example in 2014 the UK passed the Data Retention and Investigatory Powers Act, 2014 with gives the government the power to directly access data from foreign service providers if sought for specific purposes and the request is approved by the Secretary of State or other specified executive branch official.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; Another response that may occur is if, frustrated by such inefficiencies of the existing systems, courts in foreign states start assuming extra territorial jurisdiction, as happened when a District Court in Vishakhapatnam restrained Google from complying with a subpoena issued by the Superior Court of California, ordering Google to share the password of the Gmail account belonging to an Indian citizen residing in Vishakhapatnam.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Solution proposed in the United States &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to overcome these inefficiencies, at least in the American context, the Department of Justice has proposed a legislation which seeks to make the process of foreign governments getting information from US based entities more streamlined by amending the provisions of the Electronic Communications Privacy Act (ECPA) of the United States (the “&lt;b&gt;Amendment&lt;/b&gt;”). These amendments have been proposed primarily for the US and UK to effectuate a proposed bilateral agreement whereby the UK government will be able to approach US companies directly with requests for information without going through the MLAT process or getting an order from a US court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Amendment seeks to ensure that requests from foreign governments for information from US entities get answered in a smooth manner by including those requests in the process for seeking information under the ECPA itself. This move would no doubt, make it easier for foreign governments to access data in the US, but such a move can be criticized on the ground that it would then allow all states, irrespective of their legal standards of privacy, etc. to get access to such information. This problem has been overcome in the amendment by adding a new section to Title 18 which would allow the Attorney General, with the concurrence of the Secretary of State to certify to the Congress that the legal standards in the contracting state which is being given access to the mechanism under the ECPA satisfies certain requirements specified in the chapter (and discussed below). Only after such a certification has been received by the Congress, a contracting state would be able to receive the benefits sought to be granted under the Amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is important to note that the US administration is looking to use the US-UK Agreement as a standard to be followed for similar potential agreements with a number of other countries wherein the agencies in those countries could request information from US based entities through court orders through a properly specified legal framework. Though to our knowledge India has not been formally approached by the US government to enter into such an agreement, it is important to ask the question &lt;i&gt;viz&lt;/i&gt;. if approached:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Does India's present legal system meet the standards laid down in the amendment to the ECPA?&lt;/li&gt;
&lt;li&gt;And if they do, should India also seek to enter into such an Agreement with the United States?&lt;/li&gt;
&lt;li&gt;And if India does, what could be the implications for citizens and for countries in a similar position as India?&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;We hope to be able to answer the above three questions, or at least throw some light on them, in the conclusion of this paper by relying upon the discussions contained herein.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Criticisms of the Amendment&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While such a mechanism may be very effective in addressing the needs of security agencies in investigation and prevention of criminal activities, one cannot accept such an overarching change in cross border enforcement without analyzing the consequences that such a proposal will have on the right to privacy. Some of these consequences have been highlighted by experts responding to the amendment:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Lack of Judicial Authorisation&lt;/i&gt;: The Amendment requires that the foreign governments have a process whereby a person could seek post-disclosure review by an independent entity instead of a warrant by a court.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; Although a court order is not the norm for interception even in Indian law, however under American law such protection is given to data held by American companies even though the data may belong to Indian citizens and this protection will no longer be available if the Amendment is passed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Vague Standard for requests&lt;/i&gt;: Under the domestic law of any state there is usually a large amount of jurisprudence regarding when search orders can be issued, such as the “probable cause” standard that is followed in the United States or similar standards that may be followed in other jurisdictions. This ensures that even when the wording of the law is not precise, which it cannot be for such a subjective issue, there is still some amount of clarity around when and under what circumstances such warrants may be issued. In contrast, the Amendment requires that the orders be based on “requirements for a reasonable justification based on articulable and credible facts, particularity, legality, and severity regarding the conduct under investigation.” Although the language here may seem reasonable but in the absence of any jurisprudence backing it, it becomes very vague and susceptible to misuse. &lt;i&gt;Disclosure without a Warrant&lt;/i&gt;: Under the current MLAT process as followed in the United States, a judge in the U.S. must issue a warrant based on probable cause in order for a U.S. company to turn over content to a foreign government. This requirement protects individuals abroad by requiring their governments to meet certain standards when seeking information held by U.S. companies. The Amendment seeks to remove this essential safeguard for a judicial warrant. The Amendment does not require requests from foreign governments to be based on a prior judicial authorization, since a large number of countries (including India) do not always require judicial orders for such orders.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Allows Real Time Surveillance by Foreign Governments&lt;/i&gt;: American privacy rights activists have raised the concern that the Amendment would allow foreign governments to conduct ongoing surveillance by asking American companies to turn over data in real time. The requirements that the foreign governments would have to fulfill to execute such an order are less stringent than those which have to be fulfilled by the American security agencies if they want to indulge in similar activities. When the U.S. government wants to conduct real-time surveillance, it must comply with the Wiretap Act, which imposes heightened privacy protections.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; The court orders for this purpose also require minimization of irrelevant information, are strictly time-limited, only available for certain serious crimes, etc.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; In Indian law any such request, apart from being time limited and being available only for certain specified purposes, also has to satisfy that interception is the only reasonable option to acquire such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Process to determine which countries can make demands is not credible&lt;/i&gt;: Under the Amendment, the Attorney General and the Secretary of State, would decide whether the laws and practices of the foreign government adequately meet the standards set forth in the legislation for entering into a bilateral agreement. Their decisions would not be liable to be reviewed by a court or in any administrative procedure. They could make their determinations based on information which is not available to the public and the criteria for making the decision are vague and flexible. Further these criteria have been described as “factors” and not “requirements”&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; so that even if some of them are not satisfied, the certification process can still be completed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Companies do not have the resources to determine if a request complies with the terms of the agreement&lt;/i&gt;: The Amendment does not provide any oversight to ensure that technology companies are only turning over information permitted in a specific bilateral agreement. For example, a bilateral agreement may permit disclosure of information only in response to orders that do not discriminate on the basis of religion, however, it may not be possible for the companies receiving the request to determine whether a particular request complies with that condition or not. The Amendment does not require that individual companies put in place requisite processes to weed out requests that may be non compliant with the provisions of the agreement; nor are there periodic audits to ensure that companies are properly responding to foreign government information requests.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Non compliance with Human Rights Standards&lt;/i&gt;: Under international human rights law, governments are allowed to conduct surveillance only based on individualized and sufficient suspicion; authorized by an independent and impartial decision-maker; necessary and proportionate to achieve a legitimate aim, including by being the least intrusive means possible.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; However the mechanism proposed by the Amendment falls woefully short of these standards.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One must not lose sight of the fact that most of the criticisms of the proposal that have been discussed above have been made in the context of, and based on the standards of privacy protection that are available to American citizens. If we look at it from an Indian perspective most of those protections are not available to Indian citizens in any case since independent judicial oversight is not a &lt;i&gt;sine qua non&lt;/i&gt; for access to information by the security agencies in India. Although the Amendment leaves open the question of how a request would be made by the foreign government to the individual Agreements, it may be safe to assume that were India to enter into such an Agreement with the United States, it would require the orders for access to comply with the standards laid down under Indian law before the relevant authorities send the request to the US based data controllers. At the least, this would ensure that the rights of Indian citizens currently guaranteed under Indian law, howsoever flawed they might be, would in all likelihood be safeguarded as per Indian law.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Certification from the Attorney General to the US Congress&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the above background if India were to enter into the agreement with the U.S Government   apart from actually negotiating and signing that Agreement, the Indian government will also have to ensure (if the Amendment is passed) that the Attorney General of the United States, with the concurrence of the Secretary of State gives a certificate to the Congress that Indian law satisfies the requirements set forth in the proposed section XXXX of Title 18.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be kept in mind that if the negotiations between India and the United States in this regard reach such a mature stage that the certification from the Attorney General is required, then that would mean that there is enough political will on both sides to ensure that such an arrangement actually comes to fruition. In this context it would not be unfair to assume that the Attorney General may have a slight bias towards opining that Indian laws do conform to the requirements of the Amendment, as the Attorney General would want to support the decision taken by the administration, and our analysis shall have a similar bias in order to be more contextual.&lt;/p&gt;
&lt;p&gt;The certification would, &lt;i&gt;inter alia&lt;/i&gt;, contain the determination of the Attorney General:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;That the domestic law of India affords robust substantive and procedural protections for privacy and civil liberties in light of the data collection and activities of the Indian government that will be subject to the agreement.It should be noted that the Amendment specifies various factors that should be taken into account to reach such a determination, which include whether the Indian government:&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;(i) has adequate substantive and procedural laws on cybercrime and electronic evidence, as demonstrated through accession to the Budapest Convention on Cybercrime, or through domestic laws that are consistent with definitions and the requirements set forth in Chapters I and II of that Convention; &lt;i&gt;Although India is not a signatory to the Budapest Convention the Information Technology Act, 2000 (which is the main legislation dealing with cybercrime) has penal provisions which have borrowed heavily from the provisions of the Budapest Convention.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;demonstrates respect for the rule of law and principles of nondiscrimination;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;The provisions of Article 14 as well as Article 21 of the Constitution of India demonstrates that the legal regime in India is committed to the rule of law and principles of non discrimination.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;adheres to applicable international human rights obligations and commitments or demonstrates respect for international universal human rights (including but not limited to protection from arbitrary and unlawful interference with privacy; fair trial rights; freedoms of expression, association and peaceful assembly; prohibitions on arbitrary arrest and detention; and prohibitions against torture and cruel, inhuman, or degrading treatment or punishment);&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;India is a signatory to a number of international human rights conventions and treaties, it has acceded to the International Covenant on Civil and Political Rights (ICCPR), 1966, International Covenant on Economic, Social and Cultural Rights (ICESCR), 1966, ratified the International Convention on the Elimination of All Forms of Racial Discrimination (ICERD), 1965, with certain reservations, signed the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW), 1979 with certain reservations, Convention on the Rights of the Child (CRC), 1989 and signed the Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (CAT), 1984. Further the right to life guaranteed under Article 21 of the Constitution takes within its fold a number of human rights such as the right to privacy. Freedom of expression, right to fair trial, freedom of assembly, right against arbitrary arrest and detention are all fundamental rights guaranteed under the Constitution of India. &lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;has clear legal mandates and procedures governing those entities of the foreign government that are authorized to seek data under the executive agreement, including procedures through which those authorities collect, retain, use, and share data, and effective of oversight of these activities;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;India has a number of legislations which govern the interception and request for information such as the Information Technology Act, 2000, the Indian Telegraph Act, 1885, Code of Criminal Procedure, 1973, etc. which put in place mechanisms governing the authorities and entities which can ask for information.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;has sufficient mechanisms to provide accountability and appropriate transparency regarding the government’s collection and use of electronic data; and&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Right to Information Act, 2005 provides the citizens the right to access any public document unless access to the same is prohibited due to the specific exemptions provided in the Act. It may be noted here that the provisions of the Right to Information Act are often frustrated by the bureaucracy by using exceptions such as “national security”, but for the purposes of this write up we are already assuming a bias towards fulfillment of these factors/conditions and therefore as long as there is even some evidence of compliance, the conditions will be considered as fulfilled by the Attorney General for the purposes of his certificate. &lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;demonstrates a commitment to promote and protect the global free flow of information and the open, distributed, and interconnected nature of the Internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Telecom Regulatory Authority of India, which regulates telecom services in India has also issued the Prohibition of Discriminatory Tariffs for Data Services Regulations, 2016 which prohibits service providers from charging discriminatory tariffs for data services on the basis of content.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Other than Indian law, the certificate from the Attorney General will also have to certify certain issues which would have to be addressed in the bilateral agreement itself, &lt;i&gt;viz&lt;/i&gt;.:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;That the Indian government has adopted appropriate procedures to minimize the acquisition, retention, and dissemination of information concerning United States persons subject to the agreement.&lt;/li&gt;
&lt;li&gt;That the agreement requires the following with respect to orders subject to the agreement:&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(i) The Indian government may not intentionally target a United States person or a person located in the United States, and must adopt targeting procedures designed to meet this requirement;&lt;/p&gt;
&lt;p&gt;(ii) The Indian government may not target a non–United States person located outside the United States if the purpose is to obtain information concerning a United States person or a person located in the United States;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) The Indian government may not issue an order at the request of or to obtain information to provide to the United States government or a third-party government, nor shall the Indian government be required to share any information produced with the United States government or a third-party government;&lt;/p&gt;
&lt;p&gt;(iv) Orders issued by the Indian government must be for the purpose of obtaining information relating to the prevention, detection, investigation, or prosecution of serious crime, including terrorism;&lt;/p&gt;
&lt;p&gt;(v) Orders issued by the Indian government must identify a specific person, account, address, or personal device, or any other specific identifier as the object of the Order;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Orders issued by the Indian government must be in compliance with the domestic laws of India, and any obligation for a provider of an electronic communications service or a remote computing service to produce data shall derive solely from Indian law;&lt;/p&gt;
&lt;p&gt;(vii) Orders issued by the Indian government must be based on requirements for a reasonable justification based on articulable and credible facts, particularity, legality, and severity regarding the conduct under investigation;&lt;/p&gt;
&lt;p&gt;(viii) Orders issued by the Indian government must be subject to review or oversight by a court, judge, magistrate, or other independent authority;&lt;/p&gt;
&lt;p&gt;(ix) Orders issued by the Indian government for the interception of wire or electronic communications, and any extensions thereof, must be for a fixed, limited duration; interception may last no longer than is reasonably necessary to accomplish the approved purposes of the order; and orders may only be issued where that same information could not reasonably be obtained by another less intrusive method;&lt;/p&gt;
&lt;p&gt;(x) Orders issued by the Indian government may not be used to infringe freedom of speech;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(xi) The Indian government must promptly review all material collected pursuant to the agreement and store any unreviewed communications on a secure system accessible only to those trained in applicable procedures;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(xii) The Indian government must segregate, seal, or delete, and not disseminate material found not to be information that is, or is necessary to understand or assess the importance of information that is, relevant to the prevention, detection, investigation, or prosecution of serious crime, including terrorism, or necessary to protect against a threat of death or seriously bodily harm to any person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(xiii) The Indian government may not disseminate the content of a communication of a U.S. person to U.S. authorities unless the communication (a) may be disseminated pursuant to Section 4(a)(3)(xii) and (b) relates to significant harm, or the threat thereof, to the United States or U.S. persons, including but not limited to crimes involving national security such as terrorism, significant violent crime, child exploitation, transnational organized crime, or significant financial fraud;&lt;/p&gt;
&lt;p&gt;(xiv) The Indian government must afford reciprocal rights of data access to the United States government;&lt;/p&gt;
&lt;p&gt;(xv) The Indian government must agree to periodic review of its compliance with the terms of the agreement by the United States government; and&lt;/p&gt;
&lt;p&gt;(xvi) The United States government must reserve the right to render the agreement inapplicable as to any order for which it concludes the agreement may not properly be invoked.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear from the discussion above that the proposed Amendment is a controversial piece of legislation which will affect the way law enforcement is carried out in the internet. While there is no doubt that proposing an alternate mechanism to the existing inefficient MLAT structure is definitely the need of the hour, whether the mechanism proposed in the proposed Amendment, with all the negative implications on privacy, is the right way forward is far from certain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for the three questions that we had sought out to answer in the beginning of this paper, we would not like to say that Indian law definitely conforms to all the requirements listed in the Amendments, but it can safely be said that it appears that if the governments of India and the United States so wish, it would not be difficult for the Attorney General of the United States to be able to give a certification to the Congress as required in the proposed Amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other two questions as to whether India should try to opt for such an arrangement if given a chance and what would be the consequence for its people are somewhat related, in the sense that it is only by examining the consequences on its citizens that we will arrive at an answer as to whether India should opt for such an arrangement or not. The level of protections offered to Indian citizens under India law in terms of protection of their private data from government surveillance is lower than that which is offered to American citizens under American law. The growing influence of the internet is changing the citizen-state dynamic giving rise to increasing incidents where the government has to approach private actors for permission in order to carry out their governmental functions of providing security. This is because more and more private data of individual citizens is being uploaded on to the internet and controlled by private actors such as telecom companies, social media sites, etc. and the governments have to approach these private actors in case they want access to this information. The fact that the government has to approach private actors to get access to data gives private citizens some leverage to ask for better privacy protections in the context of state surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although this proposed Amendment may not affect the local surveillance laws in India, however it would definitely have an effect on the way that citizens’ data is protected and accessed by the government.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Explanation by the Assistant Attorney General attached to the proposed Amendment.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/24145/u-s-u-k-data-sharing-treaty/"&gt;https://www.justsecurity.org/24145/u-s-u-k-data-sharing-treaty/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/24145/u-s-u-k-data-sharing-treaty/"&gt;https://www.justsecurity.org/24145/u-s-u-k-data-sharing-treaty/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="http://spicyip.com/2012/04/clash-of-courts-indian-district-court.html"&gt;http://spicyip.com/2012/04/clash-of-courts-indian-district-court.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/"&gt;https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/"&gt;https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/"&gt;https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; &lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; International Covenant on Civil and Political Rights, art. 17, Dec. 19, 1966, U.N.T.S 999, &lt;i&gt;cf. &lt;/i&gt;&lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act'&gt;https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vipul Kharbanda and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>MLATs</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-28T01:09:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre">
    <title>New regulations in place; Aadhaar Card records to be preserved for 7 yrs by Centre</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre</link>
    <description>
        &lt;b&gt;UIDAI chief executive office ABP Pandey said that the concerns regarding Aadhar card-related benefits were "exaggerated" and that the agency will keep the records in case any disputes arise in the future.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a href="http://www.financialexpress.com/economy/new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre/420633/"&gt;Financial Express&lt;/a&gt; on October 17, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;As per new regulations, the government will now keep a record for  seven years of all services and benefits that are availed using Aadhaar  number. Fearing that the database might be used for surveillance, the  Unique Identification Authority of India (UIDAI) will preserve the  records.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI chief executive office ABP Pandey said that the concerns  regarding Aadhar card-related benefits were “exaggerated” and that the  agency will keep the records in case any disputes arise in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pandey added that the information will be available online for two  years and shall be shifted to the offline archives for the next five  years. In that case, users will be able to check the records only for  two years. However, the rules won’t apply for security agencies and that  they will need a district judge’s permission to access the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;i&gt;HT&lt;/i&gt;, the rules allow designated joint  secretary-level officers at the Centre to order access to information on  the grounds of national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Talking about this Sunil Abraham, director of the Bengaluru-based  think tank, Centre for Internet and Society said that once Aadhar  becomes mandatory, it can be misused to conduct a 360-degree  surveillance on any person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every time a person fingerprints and quotes the Aadhaar number, the  agency concerned sends the data to UIDAI to crosscheck the particulars.&lt;br /&gt; The UIDAI authenticates about five million Aadhaar numbers, which are quoted to avail &lt;a href="http://www.financialexpress.com/tag/lpg-subsidy/"&gt;LPG subsidy&lt;/a&gt;, cheap ration and even passport, a day against a capacity to verify 100 million requests daily, reports &lt;i&gt;HT.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, The Unique Identification Authority of India (UIDAI) has  launched a drive to enrol any leftover population for Aadhaar in 22  states and UTs that have “statistically” hit 100 per cent coverage for  adults.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘Challenge drive’ starts from October 15 for a month, a UIDAI  statement said, adding that as of today, over 106.69 crore Aadhaar  numbers have been generated across the country.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre'&gt;https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-17T14:46:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried">
    <title>Govt to keep Aadhaar record for 7 years, activists worried</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried</link>
    <description>
        &lt;b&gt;The government will keep for seven years a record of all the services and benefits availed using the Aadhaar number, say new rules, prompting fears that the database could be used for surveillance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aloke Tikku was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/govt-to-keep-aadhar-record-for-7-years-activists-worried/story-jSY820Ee1ZnQNLL5vuWMOI.html"&gt;Hindustan Times&lt;/a&gt; on October 17, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI), which issues the 12-digit biometric identity to all Indian residents, will be required to preserve its record of verification of an Aadhaar number for the duration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is an unprecedented centralised data retention provision,” said Sunil Abraham, director of the Bengaluru-based think tank, Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;UIDAI chief executive officer ABP Pandey said the concerns were exaggerated. The agency was keeping records in case a dispute arose over a transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The information will be retained online for two years and another five years in the offline archives, say the rules notified in September.&lt;br /&gt;&lt;br /&gt;Users will be able to check the records but only for two years.&lt;br /&gt;&lt;br /&gt;This restriction won’t apply to security agencies. Pandey, however, said the records would not be available to them without a district judge’s permission.&lt;br /&gt;&lt;br /&gt;But, HT found that the rules allow designated joint secretary-level officers at the Centre to order access to information on the grounds of national security.&lt;br /&gt;&lt;br /&gt;“Once Aadhaar becomes mandatory for all services, it can be used by benign and malignant actors to conduct a 360-degree surveillance on any individual,” Abraham said.&lt;br /&gt;&lt;br /&gt;This is how the system, which will need millions of fingerprint-reading machines, works.&lt;br /&gt;&lt;br /&gt;Every time a person fingerprints and quotes the Aadhaar number, the agency concerned sends the data to UIDAI to crosscheck the particulars.&lt;br /&gt;&lt;br /&gt;The UIDAI authenticates about five million Aadhaar numbers, which are quoted to avail LPG subsidy, cheap ration and even passport, a day against a capacity to verify 100 million requests daily.&lt;br /&gt;&lt;br /&gt;“You can think of it as Natgrid Plus,” Abraham said, a reference to the National Intelligence Grid being built by the government.&lt;br /&gt;&lt;br /&gt;A one-stop database for counter-terrorism agencies, Natgrid will collate information real time from databases of various agencies such as bank, rail and airline networks.&lt;br /&gt;&lt;br /&gt;“…we do not record the purpose for which an authentication request was received but only the details of the agency that sent it,” UIDAI’s Pandey said.&lt;br /&gt;&lt;br /&gt;But seven years is a long time. Only a select category of government files are kept for longer than five years.&lt;br /&gt;&lt;br /&gt;Asked about two-year deadline for users, Pandey said it would have been a logistic nightmare to let people access the records once the information was offline.&lt;br /&gt;&lt;br /&gt;The Supreme Court has a ruled that Aadhaar is not a must for availing welfare schemes and is to decide if collecting biometric data for the 12-digit number infringed an individual’s privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-17T01:53:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-journal-vol-51-issue-36-september-3-2016-hans-varghese-mathews-request-for-specifics">
    <title>Request for Specifics: Rebuttal to UIDAI</title>
    <link>https://cis-india.org/internet-governance/blog/economic-and-political-weekly-journal-vol-51-issue-36-september-3-2016-hans-varghese-mathews-request-for-specifics</link>
    <description>
        &lt;b&gt;Responding to the Unique Identification Authority of India’s article that found “serious mathematical errors” in “Flaws in the UIDAI Process” (EPW 12 March 2016), the main mathematical argument used to arrive at the number of duplicates in the biometric database is explained.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-uidai.html"&gt;Economic &amp;amp; Political Weekly&lt;/a&gt; on September 3, 2016, Vol.51, Issue No.36.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The author of a technical paper will be alarmed when he is convicted of “serious mathematical errors” by someone who has not bothered himself with “going too deep into the mathematics” used. The man must possess miraculous powers of divination one feels: fears rather. The UIDAI seems to have even such formidable diviners in their employ: who have dismissed just so peremptorily, in their rebuttal, the calculations made in my paper titled Flaws in the UIDAI process. The paper appeared in the issue of this journal dated to February 27 of this year. The rebuttal was published in the issue dated to the 12th of March. The interested reader can confirm that I have only repeated what was said there. The rebuttal does not specify, in any way, the mathematical mistakes I am supposed to have made. So I shall rehearse the relevant calculations very broadly: and the experts of the UIDAI will then exhibit, I trust, the specific mistakes they impute to me.&lt;a href="#ftn*"&gt;[*]&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn*"&gt;[*]&lt;/a&gt;My reply to the UIDAIs attempted rebuttal was sent in to the EPW a few days after that appeared in print: and published as a “web exclusive” article in Volume 51, Issue Number 36 of the EPW, on 03/09/2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/requestForSpecifics.pdf"&gt;Read the Full Article&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-and-political-weekly-journal-vol-51-issue-36-september-3-2016-hans-varghese-mathews-request-for-specifics'&gt;https://cis-india.org/internet-governance/blog/economic-and-political-weekly-journal-vol-51-issue-36-september-3-2016-hans-varghese-mathews-request-for-specifics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>hans</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-30T15:06:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages">
    <title>Here is why government twitter handles have been posting offensive and partisan messages </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages</link>
    <description>
        &lt;b&gt;You have failed us big time Mr Kejriwal, for your petty political gains you can become headlines for Pakistani press,” read a tweet on October 5 from @IndiaPostOffice, the official twitter handle of the Indian postal service.&lt;/b&gt;
        &lt;div align="justify" id="div_storyContent"&gt;
&lt;p&gt;The article by Danish Raza was &lt;a href="http://www.hindustantimes.com/india-news/here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages/story-TETZblpE9F2JVzTYOALMjL.html"&gt;published in the Hindustan Times&lt;/a&gt; on October 15, 2016. Nishant Shah was quoted.&lt;/p&gt;
&lt;hr size="2" width="100%" /&gt;
&lt;p&gt;It was a reference to Delhi Chief Minister Arvind Kejriwal urging the  Prime Minister to counter Pakistan’s propaganda over surgical strikes.&lt;/p&gt;
&lt;p&gt;Within hours, India Post tweeted an apology saying that the account was hacked.&lt;/p&gt;
&lt;p&gt;This is the latest in a series of opinions and statements posted from  official twitter handles of government departments and bodies. Of late,  the Twitter handles meant to broadcast information related to  government programmes have appeared like personal accounts tweeting  slander and criticism.&lt;/p&gt;
&lt;p&gt;Last month, the Twitter handle of Digital India tweeted a poem in  Hindi calling on the Indian Army to persistently fire at protesters in  Kashmir.&lt;/p&gt;
&lt;p&gt;In August, the Twitter handle of Startup India retweeted a post  suggesting that the Indian Army should ‘take care’ of #Presstitutes, a  reference to sections of Indian media critical of the government.&lt;/p&gt;
&lt;p&gt;The tweets expose loopholes in the government’s social media policy  and raise questions about the norms followed in the recruitment of  social media professionals for ministries and government institutions.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Work in Progress&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The process of adopting new tools is work in progress. While the  government agencies are trying to leverage social media to enhance  citizen engagement, for the vast majority of government bodies, it is  unexplored territory. Babus who have traditionally been dealing in  paperwork and file notings are overwhelmed to see hash tags and trends.  With a tech- savvy Prime Minister at the helm, every government  department is trying to increase its digital footprint. At the same  time, they face the challenge of reinterpreting existing work ethics and  codes of conduct and applying them to the use of social media.  Ministries such as the Ministry of External Affairs, Information &amp;amp;  Broadcasting and the Prime Minister’s Office which have cohesive  programmes and big mandate, have separate social media wings of their  own with well- defined protocols. But these are exceptions.&lt;/p&gt;
&lt;p&gt;Overall, the government bodies lack social media guidelines for their  own efforts or which others can learn from. According to Chinmayi Arun,  executive director, Centre for Communication Governance, National Law  University, Delhi, mistakes are bound to happen given that everyone is  new to social media. But it should be non-negotiable that when anything  is said using an official governmental handle, the government should  take more responsibility than just saying ‘oops’. “One of course is a  clear and unequivocal statement apologising and taking back whatever was  said. However, it should take pro-active measures to train and test  people who handle its public-facing accounts and publish a clear  monitoring and accountability mechanism by which they can be called to  account. It should not be open to anyone to misuse the government’s  official handles in this manner,” said Arun.&lt;/p&gt;
&lt;p&gt;One of the areas where the lack of sensitisation is apparent is the  usage of the same mobile device for multiple twitter handles – the most  common reason for such goof-ups cited by social media consultants  attached to various government departments. “I believe these were  inadvertently posted by people handling these accounts. It may neither  have been their mandate nor their intention. It happens when the person  has configured multiple twitter handles from the same device and ends up  posting from the wrong account,” said Amit Malviya, BJP’s National  Convener, IT.&lt;/p&gt;
&lt;p&gt;The majority of ministries and government departments do not give  phones to members of the social media teams. It is up to the individual  to use his personal device or get an additional one to manage the  professional handle (s). A mistake will happen if a comment which was to  be posted from the personal handle is posted from the official handle.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Twitter Goof-ups from GoI Accounts&lt;/b&gt;&lt;/p&gt;
&lt;div class="wrapbox"&gt;&lt;img src="http://www.hindustantimes.com/static/ht2016/10/twitter_goofs.jpg" width="100%&amp;quot;/" /&gt;&lt;/div&gt;
&lt;p&gt;“Because of the personalised and individual nature of social media,  it is easy to forget that they are representing an institution and not  themselves when using these handles. This also suggests the lack of  public usage training in these organisations, and the need to educate  our public actors in using social media with more responsibility as  office bearers of an institution rather than a personal expression or an  opinion,” said Nishant Shah, co-founder of the Centre for Internet and  Society, Bangalore.&lt;/p&gt;
&lt;p&gt;Another issue is that access to the account is given to multiple  people. “Each one of them brings their individual personality and  politics to their operation of the handle,” said Shah.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Hiring Issues&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
Part of the problem lies in the fact that there is no standard  protocol on who can access the twitter handle of Indian government  bodies and how this person or team is hired.
&lt;p&gt;A few ministries (example: the ministry of railways) have a team  comprising of government employees and staff of private agencies  handling their account. Others have outsourced the job to agencies.&lt;/p&gt;
&lt;p&gt;During the campaigning for the 2009 election, political parties got  outside expertise to mark their presence online. The selection  parameters of social media consultants – established public relations  firms in some cases and individuals in others – was not uniform.&lt;/p&gt;
&lt;section class="story_top_news"&gt;
&lt;div class="news_photo"&gt;&lt;img src="http://www.hindustantimes.com/rf/image_size_800x600/HT/p2/2016/10/15/Pictures/16-10-ht-weup-1-15_636b22d4-92ec-11e6-b1ee-4de56c7571da.jpg" /&gt;&lt;/div&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;/section&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Unlike the traditional public relations officers who are from the  Indian Information Services cadre, the social media consultants were  selected based on their expertise in the field, political affiliation,  and proximity to a party or leader.&lt;/p&gt;
&lt;p&gt;Those who started handling social media accounts of political parties  and leaders included trolls and social media influencers. “Parties got  youngsters who were politically motivated and willing to work for  political parties. They became cheaper alternatives for social media  experts,” said Ishan Russel, political communication consultant.&lt;/p&gt;
&lt;p&gt;After the NDA came to power, almost every ministry outsourced its  digital expertise to agencies. Many individuals who were earlier  directly working with leaders and parties got back with them via  agencies. “If an agency is looking for people to handle the twitter  account or Facebook page of a certain ministry in the BJP government,  then those who are politically inclined towards the BJP will apply for  the vacancies and their chances of getting hired are also much higher  than someone who is neutral or known to be an AAP sympathiser,” said  Vikas Pandey, 32-year-old software engineer, who headed the “I Support  Namo” campaign on Facebook and Twitter, as a volunteer for the BJP.&lt;/p&gt;
&lt;p&gt;Last year, the Prime Minister felicitated more than a dozen social  media enthusiasts, including Vikas. The move raised eyebrows because  many felt that the government was encouraging trolls. “It illuminates  the fact that trolls have found gainful employment in the Government of  India. Also that the entire edifice of the centre is being taken over by  woefully undereducated bigots,” said Swati Chaturvedi, senior  journalist and author.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Agency, the Soft Target&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
Till the time the government staff is well versed with social media  tools, attributing the mistakes to an ‘outside agency’ appears to be the  norm.
&lt;p&gt;In the case of the twitter goof-up involving Startup India, Commerce  and Industry minister Nirmala Sitharaman blamed a private agency that  was managing the account of Startup India. “The retweets were done by an  employee of the agency hired by the department of industrial policy and  promotion. The person assigned by the agency for this particular job is  not decided by the department and is the sole prerogative of the  agency,” she said.&lt;/p&gt;
&lt;p&gt;S Radha Chauhan, CEO of National e-Governance Division, attributed  the controversial post from Digital India’s twitter handle to an agency  called Trivone. “The person responsible had mistakenly tweeted from the  official handle what he wanted to tweet from his personal account,” said  Chauhan.&lt;/p&gt;
&lt;p&gt;Those familiar with the functioning of the government’s social media  verticals say that agencies are mentioned to cover up for mistakes often  committed by someone from the government staff. “When in crisis, blame  the agency, is the thumbrule the government follows. The fact is that  each twitter post is approved by the client before it is posted,” said a  senior executive with a digital marketing firm attached to a ministry  which has recently earned lot of praise for its social media  initiatives.&lt;/p&gt;
&lt;p&gt;Nishtha Arora, social media and digital consultant in a reputed ad  agency, was handling a political account till very recently. She said  that the client required her to just randomly tweet or RT to be heard by  the followers of a tech-savvy minister and be his digital mouthpiece.  “I often had to draft tweets which looked like press releases,” she  said.&lt;/p&gt;
&lt;p&gt;“Digital faux pas is blamed on to someone who might be an expert in  the field but yet has to bow down to the client pressure so that their  agenda for the day is met and the said government body or ministry  remains in the news,” she added.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages'&gt;https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Twitter</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-16T03:24:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hakon-2016">
    <title>Hakon 2016</title>
    <link>https://cis-india.org/internet-governance/news/hakon-2016</link>
    <description>
        &lt;b&gt; Udbhav Tiwari attended attended Hakon 2016, a conference held between September 30 and October 2, 2016 at Indore, Madhya Pradesh, India,on behalf of CIS under the Hewlett Cyber Security Project. &lt;/b&gt;
        &lt;p dir="ltr" style="text-align: justify; "&gt;Hakon 2016 was the third edition of the conference which  has been organised by Ninja Information Security Systems, an ISO  27001:2013 &amp;amp; 9001:2008 certified training organisation and the  primary sponsor of the conference from Indore. The conference was  efficiently organised, had about 150 to  200 people attending overall  and provided an unique window into the non-tech hub/big city ethical  hacker ecosystem and their place within the cyber security setup in  India. The agenda of this year's conference was the Underground Digital  Black Market &amp;amp; Digital Terrorism, with a fair mix of participants  from the industry, academia and the government. The conference website  can be looked up at &lt;a href="http://www.hakonindia.org/"&gt;http://www.hakonindia.org/&lt;/a&gt; for further details, including a look at past editions of the conference.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The technical workshops held during the first two days of the conference were well organised and networking with the teachers during and mostly at the end of the conference was very helpful in understanding a practitioners perspective on cutting edge aspects of cyber security. This was particularly true for &lt;a class="external-link" href="http://www.chuckeasttom.com/"&gt;Chuck Easttom Williams&lt;/a&gt;, an accomplished cyber security expert from the USA who regularly trains government agencies and in a fairly reputed industry veteran who has been an invited speaker at DEFCON and even has a couple of patents to his name.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hakon-2016'&gt;https://cis-india.org/internet-governance/news/hakon-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-15T10:04:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/digital-asia-hub-october-6-2016-vidushi-marda-iana-transition">
    <title>IANA Transition: A Case of the Emperor’s New Clothes?</title>
    <link>https://cis-india.org/internet-governance/blog/digital-asia-hub-october-6-2016-vidushi-marda-iana-transition</link>
    <description>
        &lt;b&gt;Transparency is key to engaging meaningfully with ICANN. CIS has filed the most number of Documentary Information Disclosure Policy (DIDP) requests with ICANN, covering a range of subjects including its relationships with contracted parties, financial disclosure, revenue statements, and harassment policies. Asvatha Babu, an intern at CIS, analysed all responses to our requests and found that only 14% of our requests were answered fully.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The post was published by &lt;a class="external-link" href="https://www.digitalasiahub.org/2016/10/06/iana-transition-a-case-of-emperor-in-new-clothes/?utm_content=buffer48f31&amp;amp;utm_medium=social&amp;amp;utm_source=twitter.com&amp;amp;utm_campaign=buffer"&gt;Digital Asia Hub&lt;/a&gt; on October 6, 2016.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;p style="text-align: justify;"&gt;In March 2014, the US Government committed to ending its contract with ICANN to run the Internet Assigned Numbers Authority (IANA), and also announced that it would hand over control to the “global multistakeholder community”. The conditions for this handover were that the changes must be developed by stakeholders across the globe, with broad community consensus.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Further, it was indicated that any proposal must support and enhance the multistakeholder model; maintain the security, stability, and resiliency of the Internet Domain Name System (DNS);&amp;nbsp; meet the needs and expectation of the global customers and partners of the IANA services and maintain the openness of the Internet. Further, it must not replace the NTIA role with a solution that is government-led or by an inter-governmental organisation.&lt;/p&gt;
&lt;p style="text-align: justify;" class="p1"&gt;&lt;span class="s1"&gt;These conditions were met, ICANN’s  Supporting Organisations (SO’s) and Advisory Committees (ACs) accepted  transition proposals, and these proposals were then accepted by the  ICANN Board as well, putting the transition in motion. But not quite.  The “global multistakeholder community” still had to wait for approval  from the NTIA and the US government, both of whom eventually approved  the proposal. The latter’s approval was confirmed after considerable  uncertainty due to &lt;a href="http://www.theregister.co.uk/2016/04/05/cruz_slams_dns_overseer_icann_again/"&gt;&lt;span class="s2"&gt;Senator Ted Cruz&lt;/span&gt;&lt;span class="s3"&gt;’&lt;/span&gt;&lt;span class="s2"&gt;s efforts&lt;/span&gt;&lt;/a&gt; to stop the transition, due to his belief that the transition was an  exercise of the US government handing over control of the internet to  foreign governments. Notwithstanding this, on 29th September, the US  Senate passed a short term bill to keep the US Government funded till  the end of the year, without a rider on the IANA transition. The next  hurdle was a lawsuit filed in federal court in Texas by the attorney  generals of four states to stop the handover of the IANA contract. As on  the 30&lt;/span&gt;&lt;span class="s4"&gt;&lt;sup&gt;th&lt;/sup&gt;&lt;/span&gt;&lt;span class="s1"&gt; of September, the court &lt;a href="http://www.circleid.com/pdf/iana_hearing_minute_160930.pdf"&gt;&lt;span class="s5"&gt;denied&lt;/span&gt;&lt;/a&gt; the Plaintiffs’ Application, thus allowing the transition to proceed. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="p1"&gt;&lt;span class="s1"&gt;What does this transition mean? What does  it change? The transition, while a welcome step, leaves much to be  desired in terms of tangible change, primarily because it fails to  address the most important question, that of ICANN jurisdiction. It is  important to have the Internet’s core Domain Name System (DNS)  functioning free from the pressures and control of a single country or  even a few countries; the transition does not ensure this, as the Post  Transition IANA entity (PTI) will be under Californian jurisdiction,  just like ICANN was pre-transition. The entire ICANN community has been  witness to a single American political figure &lt;a href="https://www.cruz.senate.gov/?p=press_release&amp;amp;id=2795"&gt;&lt;span class="s5"&gt;almost derailing&lt;/span&gt;&lt;/a&gt; its meticulous efforts simply because he could; and in many ways these  events cemented the importance of having diversity in terms of legal  jurisdiction of ICANN, the PTI and the root zone maintainer.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;My colleague Pranesh Prakash has identified &lt;a href="http://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann"&gt;&lt;span class="s5"&gt;11 reasons&lt;/span&gt;&lt;/a&gt; why the question of jurisdiction is important to consider during the  IANA transition. Some of these issues depend on where ICANN, the PTI and  the root zone maintainer are situated, some depend on the location of  the office in question and still others depend on contracts that ICANN  enters into. ICANN’s new bylaws state that it &lt;em&gt;will be situated in California&lt;/em&gt;, the post transition IANA entities bylaws also make a Californian jurisdiction &lt;em&gt;integral&lt;/em&gt; to its functioning. As an alternative, the Centre for Internet &amp;amp;  Society has called for the “jurisdictional resilience” of ICANN,  encompassing three crucial points: legal immunity for core technical  operators of Internet functions (as opposed to policymaking venues) from  legal sanctions or orders from the state in which they are legally  situated, division of core Internet operators among multiple  jurisdictions, and jurisdictional division of policymaking functions  from technical implementation functions.&lt;/p&gt;
&lt;p style="text-align: justify;" class="p1"&gt;&lt;span class="s1"&gt;Transparency is also key to engaging  meaningfully with ICANN. CIS has filed the most number of Documentary  Information Disclosure Policy (DIDP) requests with ICANN, covering a  range of subjects including its relationships with contracted parties,  financial disclosure, revenue statements, and harassment policies.  Asvatha Babu, an intern at CIS, analysed all responses to our requests  and found that only 14% of our requests were answered fully. 40% of our  requests had no relevant answers disclosed at all (these were mostly to  do with complaints and contractual compliance). To illustrate the  importance of engaging with ICANN transparency, CIS has focused on  understanding ICANN’s sources of income since 2014. This is because we  believe that conflict of interest can only be properly understood by  following the money in a granular fashion. This information was not  publicly available, and in fact, it seemed like &lt;a href="http://cis-india.org/internet-governance/blog/where-does-icann2019s-money-come-from-we-asked-they-don2019t-know"&gt;&lt;span class="s2"&gt;ICANN didn&lt;/span&gt;&lt;span class="s3"&gt;’&lt;/span&gt;&lt;span class="s2"&gt;t know where it got its money from, either&lt;/span&gt;&lt;/a&gt;. It is only through the DIDP process that we were able to &lt;a href="http://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014"&gt;&lt;span class="s5"&gt;get ICANN to disclose&lt;/span&gt;&lt;/a&gt; sources of income, and figures along with those sources for a single financial year. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="p1"&gt;&lt;span class="s1"&gt;ICANN prides itself on being transparent  and accountable, but in reality it is not. The most often used exception  to avoid answering DIDP requests has been “Confidential business  information and/or internal policies and procedures”, which in itself is  a testament to ICANN’s opacity. Another condition for non-disclosure  allows ICANN to reject answering “Information requests: (i) which are  not reasonable; (ii) which are excessive or overly burdensome; (iii)  complying with which is not feasible; or (iv) are made with an abusive  or vexatious purpose or by a vexatious or querulous individual.”. These  exemptions are not only vague, they are also extremely subjective:  again, demonstrative of the need for enhanced accountability and  transparency within ICANN. Key issues have not been addressed even at  the time that the transition is formally underway. The grounds for  denying DIDP requests are still vague and wide, effectively giving ICANN  the discretion to decline answering difficult questions, which is  unacceptable from an entity that is at the center of the multi-billion  dollar domain name industry. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="p1"&gt;&lt;span class="s1"&gt;ICANN’s jurisdictional resilience and  enhanced accountability are particularly vital for countries in Asia.  Its policies, processes and functioning have historically been skewed  towards western and industry interests, and ICANN can neither be truly  global nor multistakeholder till such countries can engage meaningfully  with it in a transparent fashion. The IANA transition is, of course,  largely political, and may &lt;em&gt;symbolise &lt;/em&gt;a transition to the global multistakeholder community, but in reality, it changes very little, if anything. &lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/digital-asia-hub-october-6-2016-vidushi-marda-iana-transition'&gt;https://cis-india.org/internet-governance/blog/digital-asia-hub-october-6-2016-vidushi-marda-iana-transition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    

   <dc:date>2016-11-03T06:20:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-october-14-2016-surabhi-agarwal-tech-companies-like-gmail-whatsapp-may-be-asked-to-store-user-information">
    <title>Tech companies like Gmail, WhatsApp may be asked to store user information</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-october-14-2016-surabhi-agarwal-tech-companies-like-gmail-whatsapp-may-be-asked-to-store-user-information</link>
    <description>
        &lt;b&gt;The government is moving to formulate rules that will require technology ‘intermediaries’— including email services like Gmail, chat apps such as WhatsApp and Snapchat or even ecommerce firms like Amazon — to retain user information, a development that is expected to be met with determined opposition.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was &lt;a class="external-link" href="http://economictimes.indiatimes.com/tech/ites/tech-companies-like-gmail-whatsapp-may-be-asked-to-store-user-information/articleshow/54839888.cms"&gt;published in Economic Times&lt;/a&gt; on October 14, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;What the government is looking to do now is draft rules for Section 67C of the Information Technology Act, and this will be done by a committee that has been set up for the purpose. The rules — whose drafting has been waiting since 2008 — will spell out what type of data has to be stored, in which format, and for how long, according to three members of the newly-formed committee. All this so that law-enforcement agencies can access the information if they need it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sharing of information between foreign firms and the Indian government has been a contentious issue, and experts said the mandate may be impossible to implement for firms such as WhatsApp that promise end-to-end encryption. Or for Snapchat – a chat app where messages disappear within seconds and are not even stored on the company’s servers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firms may also oppose the diktat, especially since most of them are not governed by Indian laws and also due to the high cost of data retention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="gwt-Image" src="http://img.etimg.com/photo/54839953/.jpg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee is headed by additional secretary in the ministry of electronics and IT (MEITY), Ajay Kumar, and has one representative each from the ministry of home affairs, department of telecom, department of personnel and training, Nasscom, Internet Service Provider Association of India (ISPAI), along with an advocate specialising in cyber law and a few officers from MEITY. The first meeting of the committee took place in the last week of September.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is a fairly complex issue, compounded by the general lack of understanding of mobile apps and over the top service providers,” said a person on the committee who did not wish to be identified. This person said that most technology players are based in the United States and they have always been at loggerheads about sharing of information with the government. “Even if it is for national security reasons, how much are these companies answerable to the Indian security establishment? And we do know how Apple refused to unlock the phone even for FBI."&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Google and Facebook did not respond to requests for comment.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div&gt;&lt;b&gt;‘Huge balancing act’&lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Supreme Court lawyer and cyber law expert Pavan Duggal said the section has been drafted in very “broad” terms and the move may be driven by the realisation that these companies are huge data repositories – some of which might be relevant to law enforcement investigations. “It will have to be a huge balancing act and will be interesting to see what this committee decides,” added Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Section 67C refers to the obligation of the service providers to retain information, the nature of the data to be retained and the time period is not specified. Companies which do not comply with the law can be levied fine and its officers sent to jail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another member on the committee said the ambit of this task is huge. “In the last meeting we argued that the rules should be the same for everybody and there should be no differential treatment for foreign companies such as Google or Microsoft,” he said. This person said that ambiguity is rampant as various government arms have different sets of rules for data retention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the Department of Telecommunications (DoT) asks for data to be stored for six months, while the Registrar of Companies mandates some information to be retained for one year while the income-tax rules mandate data storage for six-seven years. “There has only been one meeting so far. It is a long procedure and will require several rounds of consultation,” said a third person on the committee.&lt;/p&gt;
&lt;p&gt;Privacy  activists like Pranesh Prakash of the Centre for Internet and Society  said that one of the principles that’s frequently cited while discussing  international practices on surveillance is that data retention should  not be required of service providers.&lt;/p&gt;
&lt;p&gt;And internationally too, there is no standard on this issue. “There were norms at the European Union-level regarding data retention, but they were struck down in 2014 by the European Court of Justice as being violative of human rights,” he said.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-october-14-2016-surabhi-agarwal-tech-companies-like-gmail-whatsapp-may-be-asked-to-store-user-information'&gt;https://cis-india.org/internet-governance/news/economic-times-october-14-2016-surabhi-agarwal-tech-companies-like-gmail-whatsapp-may-be-asked-to-store-user-information&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-14T01:12:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
