<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1191 to 1205.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/internet-l-w"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-new-icann-bylaws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/voice-of-america-may-17-2016-anjana-pasricha-india-proposed-map-law-prompts-outcry"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-quint-rohit-pathak-may-21-2016-suckly-attacks-national-stock-exchange-tech-vendor-among-others"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/voice-of-america-may-27-2016-india-seeks-to-limit-use-of-maps-and-satellite-images"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-delhi-university"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-newsminute-may-6-2016-why-indias-attempt-to-polic-digital-maps-and-satellite-images-is-a-dumb-idea"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/internet-l-w">
    <title>Internet L@w</title>
    <link>https://cis-india.org/internet-governance/news/internet-l-w</link>
    <description>
        &lt;b&gt;Vanya Rakesh will attend the Internet law course organized by the University of Geneva from 20 June 2016 to 1 July 2016 as part of the Geneva Summer School. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Study Internet Law in Geneva, where the World Wide Web was born!&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Topics that will be covered include cybersecurity, digital privacy and online surveillance, free speech, consumer protection, legal issues of social media, dangers of cloud computing, Internet and telecom infrastructure, intellectual property, antitrust, and much more...&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a unique opportunity to gain hands-on experience in the framework of an Internet law clinic and to discuss cutting edge Internet law and policy issues with academics, practitioners, representatives of global policy makers, international organizations and leading institutions, including the &lt;a href="https://cyber.law.harvard.edu/" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Berkman Center for Internet and Society at Harvard University&lt;/span&gt;&lt;/a&gt;, the &lt;a href="http://www.itu.int/en/Pages/default.aspx" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;International Telecommunication Union&lt;/span&gt;&lt;/a&gt; (ITU) and the &lt;a href="http://www.wipo.int/portal/en/" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;World Intellectual Property Organization&lt;/span&gt;&lt;/a&gt; (WIPO).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For its first and second sessions (in June 2014 and 2015), the Internet l@w summer school welcomed participants from very diverse background and countries including Argentina, China, Egypt, Germany, India, Italy, Lithuania, Ukraine and the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Discover an international city in the heart of Europe. Participate in an exciting social programme, including excursions and social gatherings, and build a global network of new friends as well as of Internet law and policy experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A video testimony of participants to the 2014 edition &lt;a href="https://www.youtube.com/watch?v=wtXY7p6GEvg" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;is available here&lt;/span&gt;&lt;/a&gt;!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Equivalence of 6 ECTS credits.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Please note: Changes to the draft program may be made at any time prior to the start of the course.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More Info, &lt;a class="external-link" href="https://www.genevasummerschools.ch/courses/courses-2016/internet-law"&gt;click here&lt;/a&gt;.&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/internet-l-w'&gt;https://cis-india.org/internet-governance/news/internet-l-w&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-30T02:07:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme">
    <title>CPRsouth 2016 – Young Scholars Programme</title>
    <link>https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme</link>
    <description>
        &lt;b&gt;Rohini Lakshané, Amber Sinha and Vidushi Marda have been selected to attend the two-day Young Scholars' Programme to be held in Zanzibar, Tanzania in early September this year. The programme is a part of the CPRSouth conference.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original announcement published by CPRSouth &lt;a class="external-link" href="http://www.cprsouth.org/cprsouth-2016-young-scholars-programme/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following highly successful joint Afro-Asian CPR conferences in Mauritius in 2012, and India in 2013, CPRafrica and CPRsouth formally merged under the banner of CPRsouth in 2014. Since then, CPRsouth has hosted conferences in the Cradle of Humankind in South Africa (2014), and at the Innovation Center for Big Data and Digital Convergence at Yuan Ze University, Taiwan (2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year’s conference is co-hosted by&lt;em&gt; COSTECH &lt;/em&gt;and&lt;em&gt; TCRA &lt;/em&gt;in Zanzibar, and will include sessions on cutting-edge developments on ICT policy and regulation in the South and discussion of the research-policy interface.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30 Young Scholars from Africa and the Asia-Pacific region will be selected to participate in a tutorial programme taught by recognised scholars and practitioners from Africa and Asia, and they will attend the main conference thereafter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Tutorials are scheduled to be held on the 6&lt;sup&gt;th&lt;/sup&gt; and 7&lt;sup&gt;th&lt;/sup&gt; of September 2016, prior to the main CPR&lt;em&gt;south&lt;/em&gt; conference.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; Who will qualify?&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Masters/PhD students in Economics, Public policy, Communications and Journalism&lt;/li&gt;
&lt;li&gt;Officers of government/regulatory agencies undertaking ICT policy research, developing/gathering indicators (monitoring and evaluation)&lt;/li&gt;
&lt;li&gt;Staff of private companies in the communication industries working in regulatory affairs&lt;/li&gt;
&lt;li&gt;Officers in NGOs/INGOs working in policy and regulation&lt;/li&gt;
&lt;li&gt;Researchers from think tanks, university research centres&lt;/li&gt;
&lt;li&gt;Journalists covering communication public policy and regulation&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Seminar&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The seminar will cover a number of topics of the two days, such as:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;policy analysis using supply-side or demand-side data;&lt;/li&gt;
&lt;li&gt;ICT impact analysis;&lt;/li&gt;
&lt;li&gt;convergence, net neutrality;&lt;/li&gt;
&lt;li&gt;funding broadband network extension, open access networks, spectrum;&lt;/li&gt;
&lt;li&gt;sector and competition regulation;&lt;/li&gt;
&lt;li&gt;research to policy interventions;&lt;/li&gt;
&lt;li&gt;Internet governance – privacy, surveillance, human rights online; and&lt;/li&gt;
&lt;li&gt;introduction to big data, open data.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;(2016 tutorial programme still to be confirmed)&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous tutorial presentations can be accessed at &lt;a href="http://www.cprsouth.org/"&gt;&lt;span style="text-decoration: underline;"&gt;http://www.cprsouth.org/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Application deadline: 22 April 2016&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Application guidelines&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://form.myjotform.com/60813291616555" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Applications should be submitted via this link&lt;/span&gt;&lt;/a&gt; by 22 April 2016, and must contain the following:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;one-page curriculum vitae; and&lt;/li&gt;
&lt;li&gt;one-page write-up outlining why you wish to become an African or Asia-Pacific based expert capable of contributing to ICT related policy and regulatory reform in the region&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Applicants’ &lt;strong&gt;write-ups and biographies should be in a single word document&lt;/strong&gt;, and named: CPRsouth2016_YoungScholar_ApplicantLastName.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;em&gt;Kindly note:&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt; Late applications and applications that do not conform to the prescribed format above will automatically be disqualified.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Review Criteria&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Applications will be reviewed according to the following criteria:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;content of application;&lt;/li&gt;
&lt;li&gt;evidence of interest in, and commitment to, policy-relevant research for Africa or the Asia-Pacific region;&lt;/li&gt;
&lt;li&gt;quality of writing; and&lt;/li&gt;
&lt;li&gt;gender and country representation&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The selection committee may contact your supervisor or mentor before making the final selections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Candidates selected to participate in the tutorial programme must:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;provide a one-page research proposal &lt;em&gt;upon acceptance onto the tutorial programme&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;participate in all tutorial sessions&lt;/li&gt;
&lt;li&gt;participate in the entire CPR&lt;em&gt;south&lt;/em&gt; 2016 conference&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Funding&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Selected young scholars who are passport holders of, and travelling from, low and middle income countries within the Asia Pacific and Africa (as classified by the World Bank http://data.worldbank.org/about/country-classifications/country-and-lending-groups#Low_income) will be provided with:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;lowest-cost economy airfare to conference destination (less USD 150 registration fee);&lt;/li&gt;
&lt;li&gt;ground transfers between the conference venue and airport; and&lt;/li&gt;
&lt;li&gt;twin sharing accommodation on bed and breakfast basis, 5 lunches and 1 dinner for the duration of the conference and tutorials (6 – 10 September 2016). &lt;em&gt;Not all meals are covered.&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The registration fee for young scholars to attend the conference and tutorials is USD150, and airfares will be reimbursed less this registration fee.  Participants will be required to cover:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;transport to and from airports in their home countries;&lt;/li&gt;
&lt;li&gt;visa fees (if any);&lt;/li&gt;
&lt;li&gt;meals not provided; and&lt;/li&gt;
&lt;li&gt;any other incidental costs&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;As the registration fee is so low and should be met personally even if there is no institutional support for attendance of the course and conference, please note that only under exceptional circumstances of extreme financial hardship may the organisers consider a waiver of the conference registration fee. Such waivers will be considered on a case-by-case basis and only where a scholar would otherwise be prevented from attending the YS programme and conference.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Visas&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Letters of invitation will be provided for purposes of visa applications after participant selections have been made. Participants are responsible for securing their own visas to enter Tanzania, and are strongly advised to initiate visa approval procedures immediately on receipt of confirmation of their participation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kindly direct all enquiries to Ondine Bello: admin@researchictafrica.net  orinfo@CPRsouth.org&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme'&gt;https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2016-05-30T02:01:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-new-icann-bylaws">
    <title>﻿Submission by the Centre for Internet and Society on Draft New ICANN By-laws </title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-new-icann-bylaws</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society sent its comments on the Draft New ICANN Bylaws. The submission was prepared by Pranesh Prakash, Vidushi Marda, Udbhav Tiwari and Swati Muthukumar. Special thanks to Sunil Abraham for his input and feedback.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We at the Centre for Internet and Society are grateful for the opportunity to comment on the draft new ICANN by-laws. Before we comment on specific aspects of the Draft by-laws, we would like to make a few general observations:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadly, there are significant differences between the final form of the by-laws and that which has been recommended by the participants in the IANA transition process through the ICG and the CCWG. They have been shown to be unnecessarily complicated, lopsided, and skewed towards U.S.-based businesses in their past form, which continues to reflect in the current form of the draft by-laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft by-laws are overwrought, but some of that is not the fault of the by-laws, but of the CCWG process itself.  Instead of producing a broad constitutional document for ICANN, the by-laws read like the worst of governmental regulations that go into unnecessary minutiae and create more problems than they solve. Things that ought not to be part of fundamental by-laws — such as the incorporating jurisdiction of PTI, on which no substantive agreement emerged in the ICG — have been included as such.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Simplicity has been seen as a sin and has made participation in this complicated endeavour an even more difficult proposition for those who don’t choose to participate in the dozens of calls held every month. On specific substantive issues, we have the following comments:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jurisdiction of ICANN’s Principal Office&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Maintaining by-law Article XVIII, which states that ICANN has its principal office in Los Angeles, California, USA, these Draft by-laws make an assumption that ICANN’s jurisdiction will not change post transition, even though the jurisdiction of ICANN and its subsidiary bodies is one of the key aspects of post transition discussion to be carried out in Work Stream 2 (WS2). Despite repeated calls to establish ICANN as an international community based organisation (such as the International Red Cross or International Monetary Fund), the question of ICANN's future jurisdiction was deferred to WS2 of the CCWG-Accountability process. All of the new proposed by-laws have been drafted with certainty upon ICANN's jurisdiction remaining in California. Examples of this include the various references to the California Civil Code in the by-laws and repeated references to entities and structures (such as public benefit corporations) in the fundamental by-laws of the ICANN that can only be found in California.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This would make redundant any discussion in WS2 regarding jurisdiction, since they cannot be implemented without upending the decisions relating to accountability structures made in WS1, and embedded in the by-laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS suggests an provision expressly be inserted in the by-laws to allow changes to the by-laws in WS2 insofar as matters relating to jurisdiction and other WS2 issues are concerned, to make it clear that there is a shared understanding that WS2 decisions on jurisdiction are not meant to be redundant.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jurisdiction of the Post-Transition IANA Authority (PTI)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The structure of the by-laws and the nature of the PTI in Article 16 make its Californian jurisdiction integral to the very organisation as a whole and control all its operations, rights and obligations. This is so despite this issue not having been included in the CWG report (except for footnote 59 in the CWG report, and as a requirement proposed by ICANN’s lawyers, to be negotiated with PTI’s lawyers, in Annex S of the CWG report).  The U.S. government’s requirement that the IANA Functions Operator be a U.S.-based body is a requirement that has historically been a cause for concern amongst civil society and governments.  Keeping this requirement in the form of a fundamental by-law is antithetical to the very idea of internationalizing ICANN, and is not something that can be addressed in Work Stream 2.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS expressed its disagreement with the inclusion of the U.S-jurisdiction requirement in Annex S in its comments to the ICG. Nothing in the main text of the CWG or ICG recommendations actually necessitate Californian jurisdiction for the PTI.  Thus, clearly the draft by-laws include this as a fundamental by-law despite it not having achieved any form of documented consensus in any prior process. This being a fundamental by-law would make shifting the PTI’s registered and principal office almost impossible once the by-laws are passed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No reasoning or discussion has been provided to justify the structure, location and legal nature of the PTI. The fact that the revenue structure, by-laws and other details have not even been hinted at in the current document, indicate that the true rights and obligations of PTI have been left at the sole discretion of the ICANN while simultaneously granting it fundamental by-law protection. This is not only deeply problematic on front of delegation of excessive responsibility for a key ICANN function without due oversight but also leads to situation where the community is agreeing to be bound to a body whose fundamental details have not even been created yet, and yet is a fundamental by-law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS would therefore suggest that the PTI related clauses in the by-laws be solely those on which existing global Internet community consensus can be shown, and the PTI’s jurisdiction is not something on which such consensus can be shown to exist.  Therefore the by-laws should be rewritten to make them agnostic to PTI’s jurisdiction. Further, CIS suggests that the law firm appointed for PTI be non-American, since U.S.-based law firms capable law firms in Brazil, France, and India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We would also like to note that we have previously proposed that PTI’s registered office and ICANN’s registered office be in different jurisdictions to increase jurisdictional resilience against governmental and court-based actions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Grandfathering Agreements Clause&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A fair amount of discussion has taken place both in the CCWG mailing list about Section 1.1 (d)(ii), which concerns the inclusion of certain agreements into the scope of protection granted to ICANN from its Mission and Objective statement goals. CIS largely agrees with the positions taken by the IAB and CCWG in their comments of demanding the removal of parts B, C, D E and F of Section 1.1(d)(ii) as all of these are agreements that were not included in the scope of the CCWG Proposal and a fair few of these agreements (such as the PTI agreement) have not even been created yet. This leads to practical and legal issues for the ICANN as well as the community as it restricts possible accountability and transparency measures that may be taken in the future.&lt;br /&gt;CIS as its suggestion therefore agrees with the IAB and CCWG in this regard and supports the request by them that demand by these grandfathering provisions be removed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inspection Rights&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 22.7 severely limits the transparency of ICANN’s functioning, and we believe it should be amended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) It limits Inspection Requests to Decisional Participants and does not allow for any other interested party to make a request for inspection.  While the argument has been made that Californian law requires inspection rights for decisional participants, neither the law nor CCWG’s recommendations require restricting the inspection rights to decisional participants. CIS’s suggestion is to allow for any person in the public to make a request for examination, but to have to declare the nature of the public interest behind requests for non-decisional participants, so that an undue number of requests are not made for the purpose of impairing the operations of the organisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) The unclear but extremely limited definition of ‘permitted scope’, which does not allow one to question any ‘small or isolated aspect’ of ICANN’s functioning, where there is no explicit definition of what constitutes the scope of matters relevant to operation of ICANN as a whole, leaving a loophole for potential exploitation. CIS suggests the removal of this statement and to allow only for limitations listed in Section 22.7 (b) for Inspection Requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) There is no hard deadline provided for the information to be made available to the querying body, thus allowing for inordinate delays on the part of the ICANN, which is open to abuse. CIS suggests the removal of the clause ‘or as soon as reasonably practicable thereafter’ in this section.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The need for insisting that the material be used only for restricted purposes. CIS suggests that as a step towards ICANN’s transparency, it is essential that they allow the use of the information for any reason deemed necessary by the person demanding inspection. There is no clear reason to require restriction to EC proceedings for non-confidential material.  This requirement should be removed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Work Stream 2 Topics&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 27.2, which covers necessary topics for WS2, currently does not include key aspects such as PTI documents, jurisdictional issues, etc. In this light, we suggest that they be included and a clause be inserted to indicate that this list of topics is indicative and the CCWG can expand the scope of items to be worked on in WS2 as well as make changes to work completed in WS1 (such as these by-laws) to meet WS2 needs as well.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;FOI-HR&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 27.3 (a) requires the FOI-HR to be approved by "(ii) each of the CCWG-Accountability’s chartering organizations..” which is inconsistent with the CCWG proposal that forms the basis for these by-laws. The requirement of formal approval from every Chartering Organisation in the current draft is inconsistent with Annex 6 of the CCWG proposal, that has no such requirement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS strongly advocates for a change in the bylaw text to align with the intent of the CCWG Accountability report, and to reflect that the process of developing the FOI-HR shall follow the same procedure as Work Stream 1.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Contracts with ICANN&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 27.5 currently states that “Notwithstanding the adoption or effectiveness of the New by-laws, all agreements, including employment and consulting agreements, entered by ICANN shall continue in effect according to their terms.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the section currently stands, there is a possibility that prior to the creation of by-laws, agreements that may be in contravention of the by-laws may be brought forth intentionally before the commencement of the operation of ICANN’s Mission statement in the said by-laws. The clause may be updated as follows to avoid this —&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Notwithstanding the adoption or effectiveness of the New by-laws, all agreements, including employment and consulting agreements, entered by ICANN shall continue in effect according to their terms, provided that they are in accordance with ICANN’s Mission Statement.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-new-icann-bylaws'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-new-icann-bylaws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-31T02:49:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/voice-of-america-may-17-2016-anjana-pasricha-india-proposed-map-law-prompts-outcry">
    <title>India's Proposed Map Law Prompts Outcry</title>
    <link>https://cis-india.org/internet-governance/news/voice-of-america-may-17-2016-anjana-pasricha-india-proposed-map-law-prompts-outcry</link>
    <description>
        &lt;b&gt;In India, proposed legislation to ban use of maps or satellite images of the country without approval from the government has led to an outcry and triggered an online campaign called “Save The Map.”
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anjana Pasricha was &lt;a class="external-link" href="http://www.voanews.com/content/proposed-law-on-use-of-maps-satellite-images-prompts-outcry/3333805.html"&gt;published in Voice of America&lt;/a&gt; on May 17, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The controversy is not just over stiff penalties of up to $15 million for a wrong depiction of India’s borders, but that in a digital era, the law would potentially disrupt a host of businesses and start-ups such as taxi-hailing services.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Reasons&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The draft Geospatial Information Regulation Bill seeks to regulate the use of mapping and satellite data for two reasons: secure the country’s strategic installations from enemies and terrorists and ensure that its political boundaries are correctly depicted. The government says it will not create barriers to business.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;But Internet experts say the sweeping proposed law will affect ordinary people using mobiles and laptops, all new-age companies such as food-delivery and e-commerce, apps, as well as Apple and Google map products.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Nikhil Pahwa, founder of the website MediaNama, calls location data the core fabric of all digital services.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;“What the government has ended up doing is making pretty much every single app illegal because they all use geospatial data and they wont have a license. If you take a photograph, it has location data. If you use Uber to hail a cab, it uses maps and it shows taxi cabs on the map. If I WhatsApp my location to a friend to pick me from a particular location, I am generating geospatial information,” he said.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;But Internet experts say the sweeping proposed law will affect ordinary people using mobiles and laptops, all new-age companies such as food-delivery and e-commerce, apps, as well as Apple and Google map products.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikhil Pahwa, founder of the website MediaNama, calls location data the core fabric of all digital services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What the government has ended up doing is making pretty much every single app illegal because they all use geospatial data and they wont have a license. If you take a photograph, it has location data. If you use Uber to hail a cab, it uses maps and it shows taxi cabs on the map. If I WhatsApp my location to a friend to pick me from a particular location, I am generating geospatial information,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The draft Geospatial Information Regulation Bill seeks to regulate the use of mapping and satellite data for two reasons: secure the country’s strategic installations from enemies and terrorists and ensure that its political boundaries are correctly depicted. The government says it will not create barriers to business.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Internet experts say the sweeping proposed law will affect ordinary people using mobiles and laptops, all new-age companies such as food-delivery and e-commerce, apps, as well as Apple and Google map products.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikhil Pahwa, founder of the website MediaNama, calls location data the core fabric of all digital services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What the government has ended up doing is making pretty much every single app illegal because they all use geospatial data and they wont have a license. If you take a photograph, it has location data. If you use Uber to hail a cab, it uses maps and it shows taxi cabs on the map. If I WhatsApp my location to a friend to pick me from a particular location, I am generating geospatial information,” he said.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Complications for ordinary citizens&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The draft law requires anyone wanting to use, publish or own maps or geospatial data to apply for a license, which will be considered by a security vetting committee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Bangalore-based Center for Internet and Society (CIS) has also slammed the new bill, saying it takes India back more than three decades when businesses were governed by a maze of bureaucratic licenses and permits.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“What it does, it puts in place a license raj for all use of mapping technologies. That just does not make sense. No other country in the world has this regressive mapping law,” said Pranesh Prakash at CIS.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Internet opposition&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A volunteer-led internet campaign called “Save The Map” led by Bangalore-based tech experts, is steadily gathering momentum. It is calling on people to petition the government against the bill in its present form. It seeks to replicate an extremely successful campaign called “SavetheInternet” which built public opinion and put pressure on the government to ensure equal access to the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has sought to calm the growing concerns, saying the bill is only in a preliminary stage and it has invited feedback and suggestions from the public until June 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Officials point to India’s growing security concerns, specially since an armed attack at a strategic air base in Pathankot in northern India earlier this year, allegedly mounted by Pakistan-based terrorists. Speaking to an Indian newspaper, Junior Home Minister Kiren Rijiju said the bill is necessary because “India as a responsible country must have provisions to secure its boundary and territory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However Prakash of CIS points out that the new bill will not necessarily prevent terror groups from getting hold of geospatial data to target Indian installations because they don’t need maps generated inside India to access such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“They need satellite imagery and they need maps, period. Now this law does not actually prevent such maps from being created, it does not prevent satellite images of India being captured. What it does is prevent Indians from doing so. So it won't prevent foreign-based terrorists, especially state-backed terrorists, from attacking India,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet and public policy experts agree that the government could impose restrictions on mapping and satellite images of strategic and sensitive locations in the country.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Huge fines&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The eye-popping fines of up to $15 million and jail terms of up to seven years proposed for incorrect depiction of India’s borders have also caused surprise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;India has always insisted maps should show Kashmir in the north, which is claimed by both India and Pakistan and the state of Arunachal Pradesh in the northeast, which China claims, within Indian political boundaries.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Foreign magazines and newspapers which failed to do so were only allowed to circulate in the country after the words “Boundaries of India shown in this map are not correct” were stamped over maps that did not conform to India’s interpretations of its borders.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Google already offers slightly altered versions of its maps inside India, showing the disputed regions of Kashmir and Arunachal Pradesh as part of India.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Independent political analyst Ajoy Bose said New Delhi has long been very sensitive over how these two territories are depicted. “It has always been a source of annoyance to successive governments, but this government being ultranationalist in nature is very particular about India’s geographical boundaries being correctly shown, and therefore it is taking much more drastic action,” he said.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/voice-of-america-may-17-2016-anjana-pasricha-india-proposed-map-law-prompts-outcry'&gt;https://cis-india.org/internet-governance/news/voice-of-america-may-17-2016-anjana-pasricha-india-proposed-map-law-prompts-outcry&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-29T09:30:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-quint-rohit-pathak-may-21-2016-suckly-attacks-national-stock-exchange-tech-vendor-among-others">
    <title>Suckfly Attacks National Stock Exchange Tech Vendor, Among Others</title>
    <link>https://cis-india.org/internet-governance/news/the-quint-rohit-pathak-may-21-2016-suckly-attacks-national-stock-exchange-tech-vendor-among-others</link>
    <description>
        &lt;b&gt;A cyber espionage group attacked an Indian IT firm that provides support to India’s largest stock exchange. It’s one of many attacks in the recent past.
&lt;/b&gt;
        &lt;p&gt;The blog post by Rohit Pathak was &lt;a class="external-link" href="http://www.thequint.com/business/2016/05/21/suckfly-attacks-national-stock-exchange-tech-vendor-among-others"&gt;published in the Quint&lt;/a&gt; on May 21, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;For 24 months now, several Indian government and private organisations have been victims of highly-targeted and sustained cyberattacks by Suckfly. &lt;/span&gt;&lt;span style="text-align: justify; "&gt;Cyber security firm Symantec has been tracking Suckfly since April 2014 and believes it is a Chinese cyber-espionage group. According to Symantec, Suckfly uses stolen digital certificates to breach the internal networks of Indian organisations.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Infographic.jpg/@@images/7bae6498-baf6-4067-8933-f17182920bda.jpeg" alt="Infographic" class="image-inline" title="Infographic" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;p style="text-align: justify; "&gt;While Symantec has declined to name any of the victims, it says the high-profile targets include one of India’s largest financial institutions, an e-commerce company and its primary shipping vendor, a leading Indian IT company, two government organisations, and an American health care provider’s Indian business unit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So far, the highest infection rate has been at a government organisation responsible for implementing network software across various ministries and departments of the Indian central government. Symantec’s investigation report says Suckfly uses custom malware called Backdoor.Nidiran to orchestrate the attacks. While Suckfly had used the same backdoor in its previous campaigns in other countries, in India the post-infection activity was significantly higher.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We should be aware that this attack isn’t yet over. Suckfly has been targeting organisations since at least May 2014, and it very likely continues to have access to governmental and corporate servers in India thanks to the Nidiran backdoor,” says Pranesh Prakash, Policy Director, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that, “Depending on what access Suckfly got, the damage could be anything from them having conducted fraudulent financial transactions to obtaining classified governmental secrets.”&lt;/p&gt;
&lt;div class="story-element-wrapper" style="text-align: start; "&gt;
&lt;div style="text-align: justify; "&gt;
&lt;blockquote&gt;It is as yet unclear what data has been exfiltrated by Suckfly, but the fact that no organisations have reported this to their customers shows that the current laws with regard to data security and data breaches are inadequate.&lt;br /&gt;
&lt;div class="story-element-wrapper" style="text-align: start; "&gt;
&lt;div class="story-element story-element-text story-element-quote"&gt;&lt;span class="attribution" style="text-align: right; float: right; "&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: start; "&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;In a detailed email exchange with Bloomberg Quint, Symantec’s security experts describe how Suckfly operates, its motives, and what Indian entities can do to protect themselves.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;Suckfly’s Modus Operandi&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2015, between 22 April and 4 May, Suckfly conducted a multistage attack on an Indian e-commerce company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It first identified a user – an employee of the e-commerce company – to attempt its initial breach into the e-commerce company’s internal network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Symantec says, “We don’t have hard evidence of how Suckfly obtained information on the targeted user, but we did find a large open-source presence on the initial target. The target’s job function, corporate email address, information on work-related projects, and publicly accessible personal blog could all be freely found online.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suckfly then exploited a vulnerability in the employee’s operating system (Windows) that allowed it to bypass the User Account Control and install the malware. It’s likely that Suckfly used a spear-phishing email to gain entry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having entered the employee’s system, Suckfly gained access to the employee’s account credentials and then used them to access the victim’s account and navigate the e-commerce company’s internal corporate network as though it were the employee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suckfly’s final step was to exfiltrate data off the victim’s network and onto Suckfly’s infrastructure.&lt;/p&gt;
&lt;h3&gt;Weekends Off&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The attack took place over 13 days, but Symantec discovered that Suckfly was active only Monday to Friday. There was no activity from the group on weekends. This could be because the attackers’ hacktools are command line driven and can provide insight into when operators are behind keyboards actively working.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Suckfly’s Motives?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to Symantec, “Suckfly targeted one of India’s largest e-commerce companies, a major Indian shipping company, one of India’s largest financial organizations, and an IT firm that provides support for India’s largest stock exchange. All of these targets are large corporations that play a major role in India’s economy. By targeting all of these organisations together, Suckfly could have had a much larger impact on India and its economy. While we don’t know the motivations behind the attacks, the targeted commercial organisations, along with the targeted government organisations, may point in this direction. Symantec’s research shows that Suckfly is well-equipped to carry out targeted attacks for years while staying off the radar of security organisations.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Symantec refused to name the victims and when contacted, the National Stock Exchange (NSE) said its systems were secure and that it had not heard of any such attack on any of its tech vendors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the last two years, from 2013 to 2015, the total number of reported cyber breaches worldwide have increased 25%. India is amongst the most vulnerable – ranking third on the list of countries that have faced financial intrusion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Smokescreen is a cybersecurity firm and CEO Sahir Hidayatullah claims virtually every large company in India has been compromised to varying degrees already.&lt;/p&gt;
&lt;div class="story-element-wrapper"&gt;
&lt;div class="story-element story-element-text story-element-quote"&gt;
&lt;div&gt;
&lt;div&gt;
&lt;blockquote&gt;Strategic economic advantage and intellectual property theft are the primary motivators for nation state attackers targeting energy, pharma, and manufacturing. Attacks against the financial sector are more commonly done by financially-motivated cybercriminals, however, nation state attackers have an interest here as well – being deeply embedded into critical systems affords opportunities for both mass data collection as well as the ability to cripple financial systems if required. All major governments aspire to have this offensive capability and are in various stages of having developed it already.&lt;span style="text-align: right; "&gt;Sahir Hidayatullah, CEO, Smokescreen&lt;/span&gt;&lt;/blockquote&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story-element-wrapper"&gt;
&lt;div class="story-element story-element-text story-element-blockquote" style="padding-left: 1.5em; "&gt;
&lt;div&gt;
&lt;div&gt;
&lt;blockquote style="text-align: justify; "&gt;Over the last few months, our decoy detection network in India has seen an up-tick in targeted attacks specifically aimed at companies in banking, energy, pharmaceuticals and manufacturing. Manufacturing has seen the single largest increase in targeted attempts to compromise infrastructure. We have seen a large increase in ‘malware-less’ attacks including the use of stolen credentials on VPN systems.&lt;/blockquote&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story-element-wrapper" style="text-align: start; "&gt;
&lt;div class="story-element story-element-text story-element-blockquote"&gt;
&lt;div&gt;
&lt;div&gt;
&lt;blockquote&gt;More worrisome is that over the last year, we have conducted breach-readiness assessments for many of the large names in these verticals, and in every instance, the internal controls were unable to detect and respond to our simulated attacks in time. According to our assessment, none of them are prepared to withstand a targeted attack.&lt;/blockquote&gt;
&lt;span class="attribution" style="text-align: left; padding-left: 2em; "&gt; &lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;According to a 2015 survey conducted by PWC spanning 250 Indian companies, 72% of the respondents claimed they faced some sort of cyberattack over the last year. 63% claimed intrusions lead to financial losses and 55% claimed there was loss of sensitive information. But the worrying number is this – 78% have no cyber incident response plan. That’s good news for Suckfly and its comrades.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-quint-rohit-pathak-may-21-2016-suckly-attacks-national-stock-exchange-tech-vendor-among-others'&gt;https://cis-india.org/internet-governance/news/the-quint-rohit-pathak-may-21-2016-suckly-attacks-national-stock-exchange-tech-vendor-among-others&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-29T08:07:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/voice-of-america-may-27-2016-india-seeks-to-limit-use-of-maps-and-satellite-images">
    <title>India Seeks to Limit Use of Maps and Satellite Images </title>
    <link>https://cis-india.org/internet-governance/news/voice-of-america-may-27-2016-india-seeks-to-limit-use-of-maps-and-satellite-images</link>
    <description>
        &lt;b&gt;Indians are discussing a plan to ban use of maps or satellite images of the country without approval from the government.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The plan’s critics have launched an online campaign called “Save The Map.” They say the proposed ban could affect many new businesses and services that use technology. The Geospatial Information Regulation Bill would require anyone who wants to use, publish or own maps or geospatial data to seek official permission. A special security committee would consider such requests. Indian officials say the proposed law would help protect military bases from enemies and terrorists. They deny it would cause problems for businesses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Internet experts say the law would affect anyone who uses mobile phones, laptop computers and online companies, such as ride services. They also fear that the ban would affect computer software programs and Apple or Google Map products. The Center for Internet and Society (CIS) in Bangalore also has criticized the bill. It says the measure would return India to where it was more than 30 years ago -- when businesses were forced to get licenses from government officials before they could begin to operate. Pranesh Prakash works at the center.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What it does (is) it puts in place a license raj for all use of mapping technologies. That just does not make sense. No other country in the world has this regressive mapping law.” Technology experts from Bangalore launched the “Save The Map” campaign. It is calling on Indians to demand that the government change the planned law. The campaign is hoping to copy a successful campaign called “Save The Internet,” which pressured the government to ensure equal access to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian officials have sought to calm critics, saying the bill is not final. The government has asked people to give ideas on how it should be changed by June 4. Officials note the country is dealing with an increasing number of security issues, including an attack at an air base in northern India earlier this year. Terrorists based in Pakistan were said to have carried out the attack. Junior Home Minister Kiren Rijiju told a newspaper that the law is needed because India must have ways to “secure its boundary and territory.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Prakash notes that the measure would not stop terrorists from using geospatial data from sources outside India. “They need satellite imagery and they need maps, period. Now this law doesn’t actually prevent such maps from being created, it doesn’t actually prevent satellite images of India being captured. What it does is prevent Indians from doing so. So it actually won’t prevent foreign-based terrorists -- especially state-backed terrorists -- from attacking India.” Internet and policy experts say the government would not be able to stop others from creating maps or satellite images of sensitive locations in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I’m Anne Ball.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Anjana Pasricha reported this story from New Delhi for VOANews.com. Christopher Jones-Cruise adapted it for Learning English. George Grow was the editor. &lt;a class="external-link" href="http://learningenglish.voanews.com/a/india-seeks-to-limit-maps-and-satellite-images/3344303.html"&gt;Read the original published by Voice of America&lt;/a&gt; on May 27, 2016&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/voice-of-america-may-27-2016-india-seeks-to-limit-use-of-maps-and-satellite-images'&gt;https://cis-india.org/internet-governance/news/voice-of-america-may-27-2016-india-seeks-to-limit-use-of-maps-and-satellite-images&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-28T12:38:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards">
    <title>Comments on Draft Electronic Health Records Standards</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society submitted its comments on the Draft Electronic Health Records Standards to the Ministry of Health and Family Welfare.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To,&lt;br /&gt;Ministry of Health and Family Welfare,&lt;br /&gt;Room 307 D,&lt;br /&gt;Nirman Bhavan,&lt;br /&gt;New Delhi 110108&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Subject: Comments on the Electronic Health Record (EHR) Standards of India&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Electronic Health Record (EHR) Standards (hereinafter “EHR Standards”) were publicly circulated on March 18, 2016 seeking comments and views from stakeholders and the general public. Having reviewed the EHR Standards and referred to other robust standards dealing with the same subject matter, we wish to submit the following comments on the EHR Standards.&lt;/p&gt;
&lt;h4&gt;Standards and Interoperability&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The EHR Standards state that the "primary aim of interoperability standards is to ensure syntactic (structural) and semantic (inherent meaning) 	interoperability of data amongst systems at all times" &lt;a name="_ftnref1"&gt;[1]&lt;/a&gt;. It is mentioned that set of standards outlined in this document represents an incremental approach to adopting standards and that they need to be flexible and modifiable to adapt to the demographic and resource diversity in India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;The EHR Standards make a reference to syntactic and semantic interoperability without really defining these terms or stipulating clear steps for how 	they may be achieved. It is suggested that these terms are clearly defined. Syntactic interoperability can be defined as ensuring the preservation of the 	clinical purpose of the data during transmission among healthcare systems. Similarly, semantic interoperability can defined as enabling multiple systems to interpret the information that has been exchanged in a similar way through pre-defined shared meaning of concepts &lt;a name="_ftnref2"&gt;[2]&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Inadequate human resource capacity remains a critical challenge to the adoption of e-health standards. The WHO and ITU eHealth Strategy Toolkit &lt;a name="_ftnref3"&gt;[3]&lt;/a&gt; recommends the development of effective health ICT workforce, capable of designing, building, operating and supporting e-health services. This workforce could participate in standards development, as well as the localization of international standards to fit a country's specific need. The EHR Standards 	should also include mechanisms and solutions to address these issues.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Ownership of Data&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The physical or electronic records, which are generated by the healthcare provider are held in trust by them on behalf of the patient &lt;a name="_ftnref4"&gt;[4]&lt;/a&gt;. It is stated that the contained data which is sensitive personal data or personal information of the patient as per the Information Technology Act, 2000 is owned by the patients, however the medium for storage or transmission of such data is owned by the healthcare provider.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Currently, the EHR Standards state that the contained data which are the sensitive personal data of the patient is owned by the patient. While medical 	records and history is included within the scope of sensitive personal data under the Information Technology Act, 2000, the definition of "Personal Health 	Information" under the EHR Standards is more expansive. Therefore, it is recommended that all Personal Health Information is deemed to be owned by the patient.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Currently, the EHR Standards do not clearly specify the bodies and individuals who would be subject to the requirements under this document. A definition similar to that of "covered entities" under the US Health Insurance Portability and Accountability Act (HIPAA) could be used &lt;a name="_ftnref5"&gt;[5]&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Privileges of Patient&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Currently, the privileges of the patient include the rights to inspect and view their medical records. Further, the patient can request a healthcare organization that stores/maintains their medical records, to withhold specific information that they do not want disclosed to other&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;organizations or individuals. Also, patients can demand information from a healthcare provider on the details of disclosures performed on the patient's medical records &lt;a name="_ftnref6"&gt;[6]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Currently, the EHR Standards only refer to "medical records" as being available for inspection and review of the patients. This should be expanded to 	also include information about enrollment, payment, claims adjudication, case or medical management record systems maintained by or for a health plan; or 	Other records that are used, to make decisions about individuals by healthcare providers or other bodies &lt;a name="_ftnref7"&gt;[7]&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;The EHR standards do not currently stipulate that the upon request by a patient, healthcare providers must exercise timeliness in providing the 	information to them. A time-limit such 30 calendar days should be clearly stated within which the healthcare provider must process the request.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;The right of patients to request information from a healthcare provider on the details of disclosures should include within its scope the rights to 	receive the date of the disclosure; the name and address of the entity or person who received the information; a brief description of the medical 	information disclosed; and; a brief summary of the purpose of the disclosure &lt;a name="_ftnref8"&gt;[8]&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;A right to seek amendment of the one's medical records should also be provided to patients in cases where the information is incomplete.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Patient Identifying Information&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Under the Standards, Personal identifiers include the following: Name, Address (all geographic subdivisions smaller than street address, and PIN code) All 	elements (except years) of dates related to an individual (including date of birth, date of death, etc.), Telephone, cell (mobile) phone and/or Fax 	numbers, Email address, Bank Account and/or Credit Card Number, Medical record number, Health plan beneficiary number, Certificate/license number, Any vehicle or other any other device identifier or serial numbers, PAN number, Passport number, AADHAAR card, Voter ID card, Fingerprints/Biometrics, Voice 	recordings that are non-clinical in nature, Photographic images and that possibly can individually identify the person, Any other unique identifying number, characteristic, or code &lt;a name="_ftnref9"&gt;[9]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The above mentioned list is not adequate and exhaustive such as the definition and scope of Protected Health Information under the HIPAA &lt;a name="_ftnref10"&gt;[10]&lt;/a&gt;. The following identifiers must be included within the scope of Patient Identifying Information: Device identifiers and serial numbers, Web Universal Resource Locators (URLs), Internet Protocol (IP) address numbers.&lt;/p&gt;
&lt;h4&gt;Disclosure of Protected/Sensitive Information&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The EHR Standards state that disclosure of protected/sensitive information for use in treatment, payments and other healthcare operations must be only done after obtaining a general consent of the patient. On the other hand, disclosures for for non-routine and most non-health care purposes must be done only 	after obtaining the specific consent of the patient. Only for certain specified national priority activities, such as notifiable/communicable diseases, it is stated that "the health information may be disclosed to appropriate authority as mandated by law without the patient's prior authorization."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;The terms "specific consent" and "general consent" need to be clearly defined.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;In cases of disclosures for for non-routine and most non-health care purposes, a written authorisation should be mandatory. It should be clearly specified that a healthcare provider may not condition treatment, payment, enrollment, or benefits eligibility on an individual granting an authorization.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;There is confusion due to the use of numerous terms such as "health information", "protected health information", "sensitive personal data", "personal information" and "protected/sensitive information" in the EHR Standards for the same purpose. Some of these above terms are defined while the others are not. In order to remove the ambiguity caused due to this, it is recommended that the term "protected health information" is used throughout the document.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;All bodies dealing with medical data should be required to abide by the principle of "data minimisation" in use and disclosure. They must take 	reasonable efforts to use, disclose, and request only the minimum amount of protected health information needed to accomplish the intended purpose of the 	use, disclosure, or request.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;For internal uses, healthcare providers and other entities must develop and implement policies and procedures that restrict access and uses of protected 	health information based on the specific roles of the members of their workforce.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;br /&gt;Amber Sinha,&lt;br /&gt;Centre for Internet and Society,&lt;br /&gt;No. 194, 2nd 'C' Cross,&lt;br /&gt;Domlur, 2nd Stage,&lt;br /&gt;Bengaluru, 560071&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;[1]&lt;/a&gt; Page 7 of the EHR Standards.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;[2]&lt;/a&gt; Funmi Adebesin, Rosemary Foster, Paula Kotze, Darelle van Greunen, "A review of interoperability standards in e-Health and imperatives for their 			adoption in Africa", Research Article - SACJ No. 50, July 2013; L. E. Whitman and H. Panetto. "The missing link: Culture and language barriers to 			interoperability", Annual Reviews in Control, vol. 30, no. 2, 2006.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;[3]&lt;/a&gt; WHO and ITU. "National eHealth Strategy Toolkit", available at &lt;a href="http://goo.gl/uxMvE"&gt;http://goo.gl/uxMvE&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;[4]&lt;/a&gt; Page 19 of the EHR Standards.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;[5]&lt;/a&gt; Covered Entity includes a healthcare provider ( Doctors, Clinics, Psychologists, Dentists, Chiropractors, Nursing Homes, Pharmacies), a health plan 			(Insurance companies, HMOs, Company Health Plans, Government programs that pay for health care) and Healthcare Clearinghouse.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;[6]&lt;/a&gt; Page 20 of the EHR Standards.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;[7]&lt;/a&gt; Individuals' Right under HIPAA to Access their Health Information 45 CFR § 164.524, available at &lt;a href="http://www.hhs.gov/hipaa/for-professionals/privacy/guidance/access/"&gt; http://www.hhs.gov/hipaa/for-professionals/privacy/guidance/access/ &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;[8]&lt;/a&gt; Patient Rights Under HIPAA Accounting of Disclosures of Health Information, available at &lt;a href="http://uthscsa.edu/hipaa/patientrights/accountingofdisclosures.pdf"&gt;http://uthscsa.edu/hipaa/patientrights/accountingofdisclosures.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;[9]&lt;/a&gt; Page 21 of the EHR Standards.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;[10]&lt;/a&gt; See: &lt;a href="http://cphs.berkeley.edu/hipaa/hipaa18.html"&gt;http://cphs.berkeley.edu/hipaa/hipaa18.html&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards'&gt;https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2016-12-15T08:45:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016">
    <title>Understanding Aadhaar and its New Challenges, May 26-27, 2016</title>
    <link>https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016</link>
    <description>
        &lt;b&gt;A workshop on “Understanding Aadhaar and its New Challenges” is being organised by the Centre for Studies in Science Policy, Jawaharlal Nehru University, and the Centre for Internet and Society, during May 26-27. It is also supported by the Centre for Communication Governance at NLU Delhi, Free Software Movement of India, Knowledge Commons, PEACE, and Center for Advancement of Public Understanding of Science &amp; Technology. This is a legal and technical workshop to be attended by various key researchers and practitioners to discuss the current status of the implementation of the project, in the context of the passing of the Act and the various ongoing cases.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h1&gt;Workshop Programme&lt;/h1&gt;
&lt;h3&gt;First Day, May 26&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00-9:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-10:00&lt;/td&gt;
&lt;td&gt;Prof. Dinesh Abrol - &lt;em&gt;Welcome&lt;/em&gt;&lt;br /&gt;Self-introduction and expectations of participants&lt;br /&gt;Dr. Usha Ramanathan - &lt;em&gt;Overview of the Workshop&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Current Status of Aadhaar&lt;/strong&gt;&lt;br /&gt;Dr. Usha Ramanathan, Legal Researcher, New Delhi - &lt;em&gt;What the 2016 Law Says, and How it Came into Being&lt;/em&gt;&lt;br /&gt;S. Prasanna, Advocate, New Delhi - &lt;em&gt;Status and Force of Supreme Court Orders on Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Direct Benefits Transfers&lt;/strong&gt;&lt;br /&gt;Prof. Reetika Khera, Indian Institute of Technology, Delhi - &lt;em&gt;Welfare Needs Aadhaar like a Fish Needs a Bicycle&lt;/em&gt;&lt;br /&gt;Prof. Ram Kumar, Tata Institute of Social Sciences, Mumbai - &lt;em&gt;Aadhaar and the Social Sector: A critical analysis of the claims of benefits and inclusion&lt;/em&gt;&lt;br /&gt;Ashok Rao, Delhi Science Forum - &lt;em&gt;Cash Transfers Study&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Science, Technology, and Security&lt;/strong&gt;&lt;br /&gt;Prof. Subashis Banerjee, Deptt of Computer Science &amp;amp; Engineering, IIT, Delhi - &lt;em&gt;Privacy and Security Issues Related to the Aadhaar Act&lt;/em&gt;&lt;br /&gt;Pukhraj Singh, former National Cyber Security Manager, Aadhaar, New Delhi - &lt;em&gt;Aadhaar: Security and Surveillance Dimensions&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:00-16:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:30-17:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar - International Dimensions&lt;/strong&gt;&lt;br /&gt;Prof. Chinmayi Arun, Center for Communication Governance, National Law University, Delhi - &lt;em&gt;Biometrics and Mandatory IDs in other parts of the world&lt;/em&gt;&lt;br /&gt;Dr. Gopal Krishna, Citizens Forum for Civil Liberties - &lt;em&gt;International Dimensions of Aadhaar
&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:30-18:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;High Tea&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00-19:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Second Day, May 27&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy, Surveillance, and Ethical Dimensions of Aadhaar&lt;/strong&gt;&lt;br /&gt;Prabir Purkayastha, Free Software Movement of India, New Delhi - &lt;em&gt;Surveillance Capitalism and the Commodification of Personal Data&lt;/em&gt;&lt;br /&gt;Arjun Jayakumar, SFLC - &lt;em&gt;Surveillance Projects Amalgamated&lt;/em&gt;&lt;br /&gt;Col Mathew Thomas, Bengaluru
 - &lt;em&gt;The Deceit of Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - I&lt;/strong&gt;&lt;br /&gt;Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - &lt;em&gt;How to prevent linked data in the context of Aadhaar&lt;/em&gt;&lt;br /&gt;Dr. Anupam Saraph, Pune - &lt;em&gt;Aadhaar and Moneylaundering&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-15:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - II&lt;/strong&gt;&lt;br /&gt;Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - &lt;em&gt;Financial lnclusion&lt;/em&gt;&lt;br /&gt;Nikhil Dey, MKSS, Rajasthan (TBC) - &lt;em&gt;Field witness: Technology on the Ground&lt;/em&gt;&lt;br /&gt;Prof. Himanshu, Centre for Economic Studies &amp;amp; Planning, JNU - &lt;em&gt;UID Process and Financial Inclusion&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016'&gt;https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-05-26T10:29:43Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that">
    <title>Women's Safety? There is an App for That</title>
    <link>https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that</link>
    <description>
        &lt;b&gt;“After locking ourselves in a room for more than 6 days, this is what we came out [sic] with. Join us in helping make WOMEN feel SAFE,” read a gloating press release about a smartphone app for women to notify their near ones that they were in distress. It was one among many such PRs frequently landing in my mailbox after the rape and murder of a young student on board a private bus in Delhi in 2012. 
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rohini Lakshané was &lt;a class="external-link" href="http://www.genderit.org/node/4744/"&gt;published in Gender IT.org&lt;/a&gt; on May 19, 2016. This was also mirrored by &lt;a class="external-link" href="http://feminisminindia.com/2017/01/09/womens-safety-mobile-apps/"&gt;Feminism in India&lt;/a&gt; on January 9, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The incident had spurred protests across the country and made international headlines. Along with all this came a slew of new “women’s safety” apps. Existing ones, many of which had fizzled out, were conveniently relaunched. My own experience of user-testing such apps in India back then was that they were unreliable at best and dangerously counterproductive at worst. Some of them were endorsed by governments and celebrities and ended up being glorified despite their flaws, their technical and systemic handicaps never acknowledged at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are myriad mobile phone apps meant to be deployed for personal safety, but their basic functioning is more or less the same: the user activates the app (by pressing a button, shaking the device or similar cue), which sends a distress message containing the users’ location to pre-defined contacts. Some apps include additional artefacts such as a short audio or video recording of the situation. Some others augment this mechanism by alerting the police and other agencies best placed to respond to the emergency. For example, the Companion app for students living on campus notifies the university along with police. The &lt;a href="https://newsroom.uber.com/india/introducing-an-integrated-sos-alert-solution-for-law-enforcement/"&gt;&lt;span style="text-decoration: underline;"&gt;SOS buttons in taxi-hailing apps such as Uber&lt;/span&gt;&lt;/a&gt; enable the user’s contacts to follow the cab’s GPS trail and notify them and the cab company’s “incident response team” of emergencies. Apps such as Kitestring would treat the lack of the user’s response within a time-window as the trigger for a distress message. All their technical wizardry perhaps makes it easy to lose sight of the fact that technology is not a saviour but a tool or an enabler, that technology alone cannot be the panacea of a problem that is deeply complex and, in reality, rooted in society and governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government announced last month that every phone sold in the country from January 2017 should be equipped with a &lt;a href="http://www.bbc.com/news/technology-36139985"&gt;&lt;span style="text-decoration: underline;"&gt;panic button that sends distress flares to the police and a trusted set of contacts&lt;/span&gt;&lt;/a&gt;. Nearly half the phones sold in India &lt;a href="http://www.idc.com/getdoc.jsp?containerId=prSG25827215"&gt;&lt;span style="text-decoration: underline;"&gt;cost USD 100 or less&lt;/span&gt;&lt;/a&gt;. Prices are kept so low by sacrificing features and the quality of the hardware; there are a lot of phones with substandard GPS modules, poor touchscreens, slow processors, bad cameras, tiny memory, and dismal battery life. They run on different versions of different operating systems, some of them outdated. All of these factors would determine if someone is able to use the app at all and how quickly they and their phone would be able to respond to an emergency. Additionally, mobile phone signals become thin or shaky in areas with a high number of users and buildings located cheek-by-jowl. Even when the mobile hardware is good and the mobile signal usable, GPS accuracy can be spotty and constant location tracking would hog battery. These issues would affect the efficacy of any app. Besides, there is too much uncertainty for an app developer to factor in. (Two years ago, I learnt about an app called Pukar, then operational in collaboration with police departments in four cities in India. Pukar solved the problem of potential inaccuracy of the GPS location by getting the user’s contacts to tell the police where the person in distress might be.) Designing a one-size-fits-all safety app is almost impossible. The app that rings a loud alarm when triggered may save someone’s life or spoil the chances of someone who is trying to get help while hiding. Different people may be vulnerable to different kinds of distress situations and an app can at best be optimised for some target user groups.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;An app that does not work in tandem with existing machinery for law enforcement and public safety is a bad idea.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In the end, the “technical” problems may actually be problems of economic disparity. Making it mandatory for people to own phones equipped with certain hardware or requiring them to upgrade to more reliable devices would drive the phones out of the financial reach of many. Indian manufacturers have expressed concerns that the proposed &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Panic-button-GPS-feasible-within-the-deadline-but-will-raise-costs/articleshow/51998103.cms"&gt;&lt;span style="text-decoration: underline;"&gt;panic button would raise costs for them as well the end buyers&lt;/span&gt;&lt;/a&gt;. Popularising a downloadable app and informing its target users how to install and work it correctly needs a marketing blitzkrieg, which is something only the state or well-funded developers can afford. The New Delhi police department runs a dedicated control room for reports arriving from its safety app, Himmat (the word for courage in many Indian languages). It’s an expensive affair.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An app that does not work in tandem with existing machinery for law enforcement and public safety is a bad idea. It puts the onus of “keeping women safe” on members of their social circles or on intermediaries and private parties such as cab companies, while absolving law enforcement agencies of their failing to provide security. It opens doors to victim blaming in case someone is unable to use the app at the right time in the right way, or if the app fails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the contrary, an app that does loop in the police raises concerns about surveillance and protection of data available to the police, which is especially problematic in places such as India where there is no law for privacy or data protection. Alwar, one of the cities where Pukar was implemented, is super-populated with a large geographical area and a high crime rate. Police departments in such places tend to be overworked and understaffed. Without significant policing reforms, it is questionable whether they will be able to respond in time. A sting operation done by two media outlets on 30 senior officials of the New Delhi police department in 2012 showed the &lt;a href="http://www.ndtv.com/india-news/in-and-around-delhi-cops-blame-rapes-on-women-tehelka-investigation-with-ndtv-475442"&gt;&lt;span style="text-decoration: underline;"&gt;cops blaming victims of sexual violence with gay abandon&lt;/span&gt;&lt;/a&gt;. “If girls don't stay within their boundaries, if they don't wear appropriate clothes, then naturally there is attraction. This attraction makes men aggressive, prompting them to just do it [sexual assault]," reads one of their nuggets. “It's never easy for the victim [to complain to the police]. Everyone is scared of humiliation. Everyone's wary of media and society. In reality, the ones who complain are only those who have turned rape into a business," goes another. An app that lets known people monitor someone’s location also poses the risk of abuse, coercion and surveillance by intimate partners or members of the family.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, there is no app for reforming a morass in law enforcement or dismantling patriarchy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that'&gt;https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rohini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-01-10T02:48:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india">
    <title>Draft Law Would Prohibit Showing ‘Disputed Areas’ on Maps of India   </title>
    <link>https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india</link>
    <description>
        &lt;b&gt;Maps that label geographic areas of conflict as “disputed” territories in India could put one behind bars for seven years with 1B Indian Rupees (US$15M) penalty if a recently proposed bill becomes law.&lt;/b&gt;
        &lt;p&gt;The article was published in &lt;a class="external-link" href="https://globalvoices.org/2016/05/11/draft-law-would-prohibit-showing-disputed-areas-on-maps-of-india/"&gt;Global Voices&lt;/a&gt; on May 11, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Kisabur_Ohara_Europe_and_Asia_Octopus_Map_1904_Cornell_CUL_PJM_1145_01.jpg/@@images/6df7e103-7bad-43bd-9e15-5ff50cfb63ca.jpeg" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The controversial bill, also known as &lt;a href="http://mha.nic.in/sites/upload_files/mha/files/GeospatialBill_05052016_eve.pdf" target="_blank"&gt;Geospatial Information Regulation Bill 2016&lt;/a&gt; would make it illegal to “depict, disseminate, publish or distribute any wrong or false topographic information of India including international boundaries through internet platforms or online services or in any electronic or physical form.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If approved, it could put large corporations like Google (with its Google map), free and open source projects like Wikipedia and Open Street Map, and several other organizations in trouble for showing areas of conflict as disputed. Pakistan-Occupied Kashmir (PoK) and Arunachal Pradesh near the China border are two well-known examples of such areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Map.jpg/@@images/42979426-5f02-49c7-9ce4-ac439490abe0.jpeg" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;p&gt;The Indian government ruled by &lt;a href="https://en.wikipedia.org/wiki/Bharatiya_Janata_Party"&gt;Bharatiya Janata Part&lt;/a&gt;y (BJP) under the leadership of Prime Minister Narendra Modi has been quite &lt;a href="http://economictimes.indiatimes.com/news/politics-and-nation/7-year-jail-rs-100-crore-fine-soon-for-showing-pok-arunachal-as-disputed/articleshow/52117889.cms?utm_source=facebook.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=ETFBMain&amp;amp;fb_action_ids=10207845600891648&amp;amp;fb_action_types=og.shares" target="_blank"&gt;critical&lt;/a&gt; of the depiction of the PoK and China border in Arunachal Pradesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If passed in the parliament as law, it could prevent Indians and foreigners, government employees and people traveling in ships and aircrafts that are registered in India, to acquire geospatial imagery or data. To acquire such data, one needs to obtain &lt;a href="http://forum.openstreetmap.org/viewtopic.php?id=54512" target="_blank"&gt;permissions&lt;/a&gt; from the security vetting authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent years, the Indian government has targeted numerous foreign publications including &lt;a href="http://www.bbc.com/news/world-asia-india-32408547" target="_blank"&gt;Al Jazeera&lt;/a&gt; for showing distorted maps of India that excluded parts of the state of Jammu and Kashmir and even another state Arunachal Pradesh. While the bill does not explicitly mention these efforts, it seems to fall in line with these previous attempts to control the free flow of geospatial information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="http://www.medianama.com/2016/05/223-india-draft-mapping-bill/" target="_blank"&gt;news article&lt;/a&gt; about the proposed bill published on the portal &lt;em&gt;MediaNama&lt;/em&gt; explains how the potential law could affect map portals like Open Street Map and Google Maps, taxi, e-commerce and public safety sites and many other services that allow marking and sharing coordinates. “Most digital photographs contain location meta-data, and by sharing your photos online, you’re adding to a repository of data related to man-made phenomenon,” suggests the same article. Open data advocates also have published list of 25 different services, seven major news portals, and 14 nonprofits that would be &lt;a href="https://datameet.hackpad.com/The-Geospatial-Information-Regulation-Bill-2016-zJwgcQaIvBq" target="_blank"&gt;affected&lt;/a&gt; if the bill is approved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Open Data community of India also has come up with a campaign “&lt;a href="http://savethemap.in/" target="_blank"&gt;SaveTheMap&lt;/a&gt;” to draft a &lt;a href="https://datameet.hackpad.com/The-Geospatial-Information-Regulation-Bill-2016-zJwgcQaIvBq" target="_blank"&gt;request&lt;/a&gt; to the government to not pass the bill. The draft request states:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;span class="i author-p-203738"&gt;Request for comments / suggestions on draft “The Geospatial Information Regulation Bill, 2016” To regulate the acquisition, dissemination, publication and distribution of geospatial information of India which is likely to affect the security, sovereignty and integrity of India, a draft “The Geospatial Information Regulation Bill, 2016” has been prepared. Copy of the draft “The Geospatial Information Regulation Bill, 2016” is attached herewith for comments/suggestions. The comments/suggestions on the draft Bill may be forwarded to the Joint Secretary (Internal Security-I), Ministry of Home Affairs, North Block, New Delhi at email id: jsis@nic.in within 30 days.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There has been a lot of discussion with hashtag &lt;a href="https://twitter.com/hashtag/GeoSpatialBill?src=hash" target="_blank"&gt;#GeoSpatialBill&lt;/a&gt; and humorous comments on social media:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Tweet.png/@@images/19beaa80-8798-4cdd-bac1-57e3d3902f76.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p&gt;Many have already started tweeting with the hashtag &lt;a href="https://twitter.com/hashtag/savethemap?src=hash" target="_blank"&gt;#savethemap&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_Tweet.png/@@images/fdffb87a-15c9-4509-a6fd-3c679d104f12.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_Tweet.png/@@images/e8ac7b4c-2cf1-4f99-a7a9-59340749e155.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p&gt;Twitter user Prasanto Roy explained the implications of geospatial bill for various companies including Google, Uber and Open street maps:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_Tweet.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p&gt;Here's what other experts have to say:&lt;/p&gt;
&lt;p&gt;Arup. R writes in &lt;a href="http://geospatialworld.net/Professional/ViewBlog.aspx?id=477&amp;amp;utm_content=bufferfeba5&amp;amp;utm_medium=social&amp;amp;utm_source=twitter.com&amp;amp;utm_campaign=buffer" target="_blank"&gt;Geospatial World&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;Arup. R writes in &lt;a href="http://geospatialworld.net/Professional/ViewBlog.aspx?id=477&amp;amp;utm_content=bufferfeba5&amp;amp;utm_medium=social&amp;amp;utm_source=twitter.com&amp;amp;utm_campaign=buffer" target="_blank"&gt;Geospatial World&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify; "&gt;This Act needs to be dropped. In its attempt to cover all bases it has been made so broadband and all encompassing that it may actually impede the progress of work on Geospatial systems and therefore on key Government programmes and projects. The Act does not take into account the fact that with the advent of the Cloud, Data as a Service, Software as a Service and Platform as a Service there is no need for ‘persons’ to possess data. They can just access data, do their work and retain only the final results. This Act does not, in fact cannot, even begin to comprehend the paradigm shift in geospatial technologies which makes it a non-starter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India does need a Geospatial Information Act, but it has to be an enabling and encouraging Act that makes for faster and better implementation of programmes, not a regressive and punitive Act as the proposed one.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Devdutta Tengshe writes about the overreaching ambit of Geospatial bill on &lt;a href="https://medium.com/@devdattat/problems-with-the-geospatial-information-regulation-bill-a19fa810983c#.8ivc9a2j8" target="_blank"&gt;Medium&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify; "&gt;Worst of all, it (the bill) is trying to implement Security by Obscurity, which is expecting the country to become secure by hiding information from its citizens. This is dangerous, because the real mischief creators, be they terrorists, Foreign government agencies, or domestic criminals, will most likely have access to kind of data from foreign sources, and will not even think about getting permits and licenses from these Indian Authorities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Cyber law expert Pavan Duggal told &lt;em&gt;&lt;a href="http://thewire.in/2016/05/08/draft-geospatial-bill-criticised-by-cyber-law-experts-34616/" target="_blank"&gt;The Wire&lt;/a&gt;&lt;/em&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The draft legislation has the intrinsic problem that it has been given extra-territorial applicability in terms of jurisdiction. It is applicable to any person anywhere in the world. We have historically seen that such jurisdiction does not work well in practical terms. What if global players do not want to take your licence or subject themselves to your jurisdiction?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Duggal further spoke about how the law could impact the growth of e-commerce and m-commerce in India.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Under this law, Google Maps will be illegal without a licence, which means that all mobile or e-commerce applications working on Google Maps will also become illegal. The licence will also only be applicable to the concerned person. So if I am a taxi aggregator like Ola or Uber, I will have to get a separate licence over and above what Google Map has.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="http://indianexpress.com/article/opinion/editorials/india-map-100-crore-fine-7-years-jail-2790822/" target="_blank"&gt;&lt;em&gt;Indian Express&lt;/em&gt; &lt;/a&gt;calls the Geospatial bill a death note for Cartography:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify; "&gt;The draft Geospatial Information Regulation Bill of 2016 is so perfectly ridiculous that one can only hope that it falls off the map before it can be tabled in the House. Publishers the world over have learned, to their bewildered amusement, that India censors maps of itself. Now, to strike fear into their anti-national gizzards, the government has invoked an official map censor, a babu-led organisation whose prior permission will be required to publish geospatial information, which is newspeak for maps. Failure to correctly depict the borders of India could attract a fine of up to Rs 100 crore, before the poor offending bozo is dragged away to the cooler for seven years. With this draft, the government has embarked on a journey without maps, which must rapidly become directionless.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Not the first time around?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, this clearly isn't the first time that services such as Google Maps have come under the federal scanner in India. In 2014, India's prime investigation agency Central Bureau of Investigation (CBI) had launched a probe into Google Maps’ irregularities in &lt;em&gt;Mapathon 2013&lt;/em&gt; and had accused the company of running the competition without procuring proper governmental permissions. But the agency had called off the case citing lack of ‘adequate evidence to corroborate the allegations’.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india'&gt;https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-15T13:05:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-delhi-university">
    <title>MHRD IPR Chair Series: Information Received from Delhi University</title>
    <link>https://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-delhi-university</link>
    <description>
        &lt;b&gt;This post provides a factual description about the operation of Ministry of Human Resource Development IPR Chair’s Intellectual Property Education, Research and Public Outreach (IPERPO) scheme in Delhi University.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The author has analysed all the data received through which, the author seeks to trace the presence of unjustified underutilisation of funds by the aforementioned university as provided by the MHRD during the period of 2013-2014. To collect the information for the given study, an RTI application was filed to Delhi University on 09/02/2015 by the Centre for Internet and Society. The reply to RTI application was received on 25/02/2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are the documents received by CIS from Delhi University:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;For the response to the RTI application &lt;a href="https://cis-india.org/a2k/blogs/DU.pdf" class="external-link"&gt;click here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Hereinafter, in order to receive any information about Delhi School of Economics, Delhi University’s RTI reply, kindly refer to the above mentioned links. Following are the queries mentioned in the RTI application along with their replies.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Reports on the implementation of the IPERPO scheme of the Ministry of Human Resource Development and the implementation of the MHRD IPR Chair funded under the scheme at the Delhi School of Economics.&lt;br /&gt;Reply: The University submitted that there are no reports on the implementation of the IPERPO scheme or the MHRD IPR Chair funded under the same. Additionally, the implementation of the scheme commended at Delhi University w.e.f 20th Feb., 2014. Dr. Rekha Chaturvedi joined as the IPR Chair (Technical) on the same date. &lt;/li&gt;
&lt;li&gt;Documents on the release of grants to the MHRD IPR Chairs under the IPERPO scheme at the Delhi University, Delhi School of Economics for the year 2013-14.&lt;br /&gt;Reply: The University submitted that there has been no release of grants by the Human Resource and Development Ministry under the IPERPO Scheme.&lt;/li&gt;
&lt;li&gt;Documents relating to receipts of utilization certificates and audited expenditure statements and matters related to all financial sanctions with regard to funds granted to the MHRD IPR Chair established under the IPERPO Scheme for the year 2013-14 at the Delhi University, Delhi School of Economics.&lt;br /&gt;Reply: The University replied that as there has been no release of grants under the IPERPO scheme, the question of utilization certificates and audited expenditure or any other matter related to financial sanctions with regard to the funds does not arise.&lt;/li&gt;
&lt;li&gt;Documents regarding all matters related to finance and budget related to the MHRD IPR Chair under the IPERPO scheme 2013-14 established at Delhi University, Delhi School of Economics.&lt;br /&gt;Reply: The University did not submit any documents in this regard and asserted that the information sought is not specific.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Comparative Analysis between University Response and the guidelines of MHRD Scheme Document&lt;/strong&gt;&lt;br /&gt;The Scheme Document of MHRD (http://copyright.gov.in/Documents/scheme.pdf) is a comprehensive document which consists of guidelines regarding Intellectual Property Education, Research and Public Outreach. It talks about a list of objectives, purposes, conditions and eligibility criteria for a University to ensure in order to implement IPERPO in a truest sense. This document provides the procedural as well as qualifying conditions for an Institute to ensure or fulfil before applying for the MHRD grant. Some of these conditions include maintenance of utilization certificates, audit reports, expenditure statements and event information which would be open to access on demand by MDHR or Comptroller and Auditor General of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A. Objectives &lt;br /&gt;The University has not provided any documents detailing any activities undertaken to further the objectives of the IPERPO scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;B. Eligibility &lt;br /&gt;Delhi School of Economics, Delhi University is recognized by the University Grants Commission. Therefore, it fulfils the eligibility criteria mentioned in the scheme document.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Financial Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The University has not provided any documents on this subject.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-delhi-university'&gt;https://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-delhi-university&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-05-15T12:18:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women">
    <title>Why The New Government Policy Mandating Panic Buttons On Phones Isn’t Going To Protect Women</title>
    <link>https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women</link>
    <description>
        &lt;b&gt;Recently, the Union Minister for Communications and Information Technology Mr Ravi Shankar Prasad tweeted about new rules mandating a panic button in every cell phone sold in the country from January 2017. To keep ladies safe, of course.&lt;/b&gt;
        &lt;p&gt;The story by Madhura Kadaba was published in the &lt;a class="external-link" href="http://theladiesfinger.com/panic-buttons/"&gt;Ladies Finger&lt;/a&gt; on May 14, 2016. Rohini Lakshané was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/RaviShankarPrasad.png" alt="Ravi Shankar Prasad" class="image-inline" title="Ravi Shankar Prasad" /&gt;&lt;/p&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=142272"&gt;According to a statement released by the Telecommunications Ministry&lt;/a&gt;, the panic button will be activated by pressing a designated button on a smartphone or by holding down both ‘5’ and ‘9’ keys on a basic phone. Pressing the panic button is expected to alert police and designated friends or relatives, similar to apps launched previously by police departments like &lt;a href="https://play.google.com/store/apps/details?id=com.smartcloud.delhi&amp;amp;hl=en"&gt;Himmat&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It followed remarks from the Union Minister for Women and Child Development, Ms Maneka Gandhi, in the Lok Sabha in December 2015. “Every cell phone will have an in-built panic button. Now, all new cell phones will be made with panic buttons. But in case of all old cell phones, you can go to the person who owns the company or the dealer and they will adjust it for you. If a woman is in trouble, she can just press the button on the cell phone and she will immediately get help.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two days later, reacting to concerns that the mandate could increase mobile phone costs, Mr Ravi Shankar Prasad said, “&lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Panic-button-Ravi-Shankar-Prasad-to-discuss-mobile-price-hike/articleshow/52028900.cms"&gt;Manufacturers… have given their support. My expectation is that they will render their support in social justice and women security&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a point, it almost becomes a farce — the government’s continuous search for grand, one-stop solutions to dealing with sexual violence. We had the &lt;a href="https://in.news.yahoo.com/what-they-are-planning-to-do-with-the-rs-1-000-crore-nirbhaya-fund-050843333.html"&gt;vast coffers of the Nirbhaya fund&lt;/a&gt;, which went nowhere. It had tech solutions coming out of its 1000-crore ears. It included plans for setting up control rooms in 114 cities within 9 months back in 2014 and surveillance cameras in all public transport vehicles including autos! Who was going to be watching the feed of these cameras, if ever by some vast change in the face of humanity such a thing happened, you may wonder? Or as journalist Revati Laul wrote, “Given that police stations across the country are short staffed, given how many of them cannot even afford paper to file a first information report (FIR) or fuel for the police personnel’s motorbike, just how will the appearance of these control rooms change that? How will switchboards help if police stations in even big cities like Varanasi have too few vehicles to cater to the existing load of emergencies they have to deal with?” But hush, don’t interrupt when Daddy is talking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, we published an investigation into the &lt;a href="http://theladiesfinger.com/investigation-where-are-the-one-stop-centers-for-rape-victims-under-the-nirbhaya-fund/"&gt;one-stop centres&lt;/a&gt; promised by the Nirbhaya fund. These centres are supposed to provide services like assistance in lodging FIRs, medical assistance for medical examinations, and therapy. On paper, Delhi is supposed to have 6. Good luck locating them because they don’t exist. Most of the staff of the hospitals where the centers were to be located were clueless about the program.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But perhaps we should forget the tiresome past and move to the shiny button-filled future. We asked Rohini Lakshane, a technology expert and Program Officer at the Centre for Internet and Society what she thought of panic buttons. Recently she reviewed a &lt;a href="http://tech.firstpost.com/news-analysis/mobile-apps-for-personal-safety-64274.html"&gt;bunch&lt;/a&gt; of personal safety apps geared toward women and was very unimpressed. About the government’s new plan, she said, “GPS accuracy in India can sometimes be patchy and not very accurate, and continuous location tracking drains the battery, something that could be problematic for people with phones that do not have good GPS hardware or a long battery life.” Lakshane added, “The app would also enable tracking by family members, which can increase the chance of intimate partner abuse and violence. There have been instances in which apps that provide real-time location or periodic updates of the location of a person to a contact have enabled abuse by intimate partners or by members of the family.” In short, you are unlikely to get the help you need in case of stranger danger and continue to face whatever oppression you maybe facing from your ‘loved ones’.&lt;/p&gt;
&lt;p&gt;Which brings us to the biggest problem with panic buttons, the idea that what Indian women should live in fear of scary strangers outside the house.&lt;/p&gt;
The story by Madhura Kadaba was published in The Ladies Finger on May 14, 2016. Rohini Lakshane was quoted.  The story by Madhura Kadaba was published in the Ladies Finger on May 14, 2016. Rohini Lakshane was quoted.   
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In fact, carefully conducted research shows over and over again that Indian women are most likely to face violence from their families, within their homes. The Mumbai programme RAHAT’s report &lt;a href="http://theladiesfinger.com/whats-the-ratio-of-known-vs-stranger-rapists-take-a-wild-guess-that-and-other-highlights-from-the-2015-rahat-report-on-sexual-violence/"&gt;shows&lt;/a&gt; that 91 percent of the accused in reported cases of rape were by known persons. Add on the fact if you have even a fleeting acquaintance with a man who attacks you the police are additionally reluctant to &lt;span&gt;do anything&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;Not that the police like to file complaints if you have been raped by a &lt;a href="http://theladiesfinger.com/tag/ready-to-report/"&gt;stranger&lt;/a&gt;. That way they are quite equal opportunity about ignoring complaints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps we should have a panic button in our phones after all. A daily reminder that you should fear rape, in case for a moment you had decided to stop worrying. A daily reminder that if you do get raped you must remember to press a button that goes nowhere. A great metaphor for how we deal with victims of sexual violence in India.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women'&gt;https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-15T09:45:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms">
    <title>Geospatial Info Regulation Bill will hurt start-ups, small firms </title>
    <link>https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms</link>
    <description>
        &lt;b&gt;The Geospatial Information Regulation Bill, 2016, whose draft outlaws the acquisition of geospatial information without the government’s permission, is expected to impact smaller companies rather more than the large ones. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Varun Aggarwal was published in &lt;a class="external-link" href="http://www.thehindubusinessline.com/info-tech/geospatial-info-regulation-bill-will-hurt-startups-small-firms/article8580732.ece"&gt;Hindu BusinessLine&lt;/a&gt; on May 10, 2016. Sumandro Chattapadhyay was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Experts said that the law is being created to keep large corporates in check, but if implemented in its current form, its biggest impact would be on start-ups and smaller firms that use or create geospatial data.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“While companies such as Uber and Google can survive by getting all their maps vetted by the government, smaller companies will be impacted. This will act as a big entry barrier in favour of the dominant players such as Google and Microsoft,” said Sumandro Chattapadhyay, research director at Centre for Internet and Society.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Smaller companies have no means to know what kind of geospatial information they can store and what they cannot. Moreover, if a start-up requires three months to get approvals for your data before you can use it, it’ll be as good as dead,” Chattapadhyay said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Google declined to comment on the draft Bill.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;strong&gt;U-turn by Centre&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; Sanjay Kumar, president of the Association of Geospatial Industries, recalled that Prime Minister Narendra Modi had in a speech in September last highlighted the importance of geospatial data in everyday life of the common man. “But now, the government seems to be taking a U-turn,” he said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Association has hundreds of members, including Google, offering various geospatial services.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The PM’s campaigns on skill development, digital India and enhancement of the transport sector are heavily dependent on geospatial data. There are several private sector companies that provide services for these projects. If this Bill is passed as drafted, all this development process will be stalled,” said Kumar.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms'&gt;https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-13T15:46:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question">
    <title>Identity of the Aadhaar Act: Supreme Court and the Money Bill Question</title>
    <link>https://cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question</link>
    <description>
        &lt;b&gt;A writ petition has been filed by former Union minister Jairam Ramesh on April 6 challenging the constitutionality and legality of the treatment of this Act as a money bill. The Supreme Court heard the matter on April 25 and invited the Union government to present its view. It is our view that the Supreme Court can not only review the Lok Sabha speaker’s decision, but should also ask the government to draft the Aadhaar Bill again, this time with greater parliamentary and public deliberation. Vanya Rakesh and Sumandro Chattapadhyay wrote this article on The Wire.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Published by and cross-posted from &lt;a href="http://thewire.in/2016/05/09/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question-34721/"&gt;The Wire&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The Aadhaar Act 2016, passed in the Lok Sabha on March 16, 2016, &lt;a href="http://www.thehindu.com/news/national/opposition-picks-holes-in-aadhaar-bill/article8361213.ece"&gt;faced opposition&lt;/a&gt; ever since it was tabled in parliament. In particular, the move to introduce it as a money bill has been vehemently challenged on grounds of this being an attempt to bypass the Rajya Sabha completely. &lt;a href="http://www.thehindu.com/news/national/jairam-ramesh-moves-supreme-court-against-treating-aadhaar-bill-as-money-bill/article8446997.ece"&gt;A writ petition has been filed by former Union minister Jairam Ramesh on April 6&lt;/a&gt; challenging the constitutionality and legality of the treatment of this Act as a money bill. The Supreme Court heard the matter on April 25 and invited the Union government to present its view.&lt;/p&gt;
&lt;p&gt;It is our view that the Supreme Court can not only review the Lok Sabha speaker’s decision, but should also ask the government to draft the Aadhaar Bill again, this time with greater parliamentary and public deliberation.&lt;/p&gt;
&lt;h3&gt;The money bill question&lt;/h3&gt;
&lt;p&gt;M.R. Madhavan &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-bill-money-bill-name-of-the-bill-2754080/"&gt;has argued&lt;/a&gt; that the Aadhaar Act contains matters other than “only” those incidental to expenditure from the consolidated fund, as it establishes a biometrics-based unique identification number for beneficiaries of government services and benefits, but also allows the number to be used for other purposes beyond service delivery. While Pratap Bhanu Mehta &lt;a href="http://indianexpress.com/article/opinion/columns/privacy-after-aadhaar-money-bill-rajya-sabha-upa/"&gt;calls this a subversion&lt;/a&gt; of “the spirit of the constitution”, P.D.T. Achary, former secretary general of the Lok Sabha, &lt;a href="http://indianexpress.com/article/opinion/columns/show-me-the-money-4/"&gt;expressed concern&lt;/a&gt; about the attempts to pass off financial bills like Aadhaar as money bills as a means to &lt;a href="http://www.thehindu.com/opinion/lead/circumventing-the-rajya-sabha/article7531467.ece"&gt;circumvent&lt;/a&gt; and erode the supervisory role of the Rajya Sabha. Arvind Datar has further emphasised that when the primary purpose of a bill is not governed by Article 110(1), then certifying it as a money bill is &lt;a href="http://indianexpress.com/article/opinion/columns/making-a-money-bill-of-it/"&gt;an unconstitutional act&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Article 110(1) of the Constitution identifies a bill as a money bill if it contains “only” provisions dealing with the following matters, or those incidental to them:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;imposition and regulation of any tax,&lt;/li&gt;
&lt;li&gt;financial obligations undertaken by Indian Government,&lt;/li&gt;
&lt;li&gt;payment into or withdrawal from the Consolidated Fund of India (CFI) or Contingent Fund of India,&lt;/li&gt;
&lt;li&gt;appropriation of money and expenditure charged on the CFI or receipt, and&lt;/li&gt;
&lt;li&gt;custody, issue or audit of money into CFI or public account of India.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;However, the link of the Act with the Consolidated Fund of India is rather tenuous, since it depends on the Union or state governments declaring a certain subsidy to be available upon verification of the Aadhaar number. The objectives and validity of the Act would not actually change if the Aadhaar number no longer was directly connected to the delivery of services. The use of the word “if” in section 7 explicitly leaves scope for a situation where the government does not declare an Aadhaar verification as necessary for accessing a subsidy. In such a scenario, the Act will still be valid but without any formal connection with any charges on the Consolidated Fund of India.&lt;/p&gt;
&lt;h3&gt;A case of procedural irregularity?&lt;/h3&gt;
&lt;p&gt;The constitution of India borrows the idea of providing the speaker with the authority to certify a bill as money bill from British law, but operationalises it differently. In the UK, though the speaker’s certificate on a money bill is &lt;a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/480476/Money_Bills__12_Nov_2015___accessible_PDF_.pdf"&gt;conclusive&lt;/a&gt; for all purposes under section 3 of the Parliament Act 1911, the speaker is &lt;a href="http://www.publications.parliament.uk/pa/ld201011/ldselect/ldconst/97/9703.htm"&gt;required to consult&lt;/a&gt; two senior members, usually one from either side of the house, appointed by the committee from amongst those senior MPs who chair general committees. In India, the speaker makes the decision on her own.&lt;/p&gt;
&lt;p&gt;Although article 110 (3) of the Indian constitution states that the decision of the speaker of the Lok Sabha shall be final in case a question arises regarding whether a bill is a money bill or not, this does not restrict the Supreme Court from entertaining and hearing a petition contesting the speaker’s decision. As the Aadhaar Act was introduced in the Lok Sabha as a money bill even though it does not meet the necessary criteria for such a classification, this treatment of the bill may be considered as an instance of &lt;em&gt;procedural irregularity&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;There is ample jurisprudence on what happens when the Supreme Court’s power of judicial review comes up against Article 122 – which states that the validity of any proceeding in the parliament can (only) be called into question on the grounds of procedural irregularities. In the crucial judgment of &lt;a href="https://indiankanoon.org/doc/1757390/"&gt;&lt;em&gt;Raja Ram Pal vs Hon’ble Speaker, Lok Sabha and Others&lt;/em&gt;&lt;/a&gt; (2007), the court evaluated the scope of judicial review and observed that although parliament is supreme, unlike Britain, proceedings which are found to suffer from substantive illegality or unconstitutionality, cannot be held protected from judicial scrutiny by article 122, as opposed to mere irregularity. Deciding upon the scope for judicial intervention in respect of exercise of power by the speaker, in &lt;a href="https://indiankanoon.org/doc/1686885/"&gt;&lt;em&gt;Kihoto Hollohan vs Zachillhu and Ors.&lt;/em&gt;&lt;/a&gt; (1992), the Supreme Court held that though the speaker of the house holds a pivotal position in a parliamentary democracy, the decision of the speaker (while adjudicating on disputed disqualification) is subject to judicial review that may look into the correctness of the decision.&lt;/p&gt;
&lt;p&gt;Several past decisions of the Supreme Court discuss how the tests of legality and constitutionality help decide whether parliamentary proceedings are immune from judicial review or not. In &lt;a href="https://indiankanoon.org/doc/1249806/"&gt;&lt;em&gt;Ramdas Athawale vs Union of India&lt;/em&gt;&lt;/a&gt; (2010), the case of &lt;a href="https://indiankanoon.org/doc/638013/"&gt;&lt;em&gt;Keshav Singh vs Speaker, Legislative Assembly&lt;/em&gt;&lt;/a&gt; (1964) was referred to, in which the judges had unequivocally upheld the judiciary’s power to scrutinise the actions of the speaker and the houses. It was observed that if the parliamentary procedure is illegal and unconstitutional, it would be open to scrutiny in a court of law and could be a ground for interference by courts under &lt;a href="https://indiankanoon.org/doc/981147/"&gt;Article 32&lt;/a&gt;, though the immunity from judicial interference under this article is confined to matters of irregularity of procedure. These observations were reiterated in &lt;a href="https://indiankanoon.org/docfragment/108219590/?formInput=lokayukta"&gt;&lt;em&gt;Mohd. Saeed Siddiqui vs State of Uttar Pradesh&lt;/em&gt;&lt;/a&gt; (2014) and &lt;a href="https://indiankanoon.org/doc/199851373/"&gt;&lt;em&gt;Yogendra Kumar Jaiswal vs State of Bihar&lt;/em&gt;&lt;/a&gt; (2016).&lt;/p&gt;
&lt;p&gt;Thus, the decision of the Lok Sabha speaker to pass and certify a bill as a money bill is definitely not immune from judicial review. Additionally, the Supreme Court has the power to issue directions, orders or writs for enforcement of rights under Article 32 of the constitution, therefore, allowing the judiciary to decide upon the manner of introducing the Aadhaar Act in parliament.&lt;/p&gt;
&lt;h3&gt;National implications demand public deliberation&lt;/h3&gt;
&lt;p&gt;As the provisions of the Aadhaar Act have &lt;a href="http://indianexpress.com/article/opinion/columns/privacy-after-aadhaar-money-bill-rajya-sabha-upa/"&gt;far reaching implications&lt;/a&gt; for the fundamental and constitutional rights of Indian citizens, the Supreme Court should look into the matter of its identification and treatment as a money bill and whether such decisions lead to the thwarting of legislative and procedural justice.&lt;/p&gt;
&lt;p&gt;The Supreme Court may also take this opportunity to reflect on the very decision making process for classification of bills in general. As &lt;a href="http://www.thehoot.org/media-watch/law-and-policy/aadhar-why-classification-matters-in-law-making-9281"&gt;Smarika Kumar argues&lt;/a&gt;, experience with the Aadhaar Act reveals a structural concern regarding this classification process, which may have substantial implications in terms of undermining public and parliamentary deliberative processes. This “trend,” as &lt;a href="http://indianexpress.com/article/opinion/columns/making-a-money-bill-of-it/"&gt;Arvind Datar notes&lt;/a&gt;, of limiting legislative discussions and decisions of national importance within the space of the Lok Sabha must be swiftly curtailed.&lt;/p&gt;
&lt;p&gt;Apart from deciding upon the legality of the nature of the bill, it is vital that the apex court ask the government to categorically respond to the concerns red-flagged by the &lt;a href="http://164.100.47.134/lsscommittee/Finance/15_Finance_42.pdf"&gt;Standing Committee on Finance&lt;/a&gt;, which had taken great exception to the continued collection of data and issuance of Aadhaar numbers in its report, and to the recommendations &lt;a href="http://thewire.in/2016/03/16/three-rajya-sabha-amendments-that-will-shape-the-aadhaar-debate-24993/"&gt;passed in the Rajya Sabha recently&lt;/a&gt;. Further, the repeated violation of the Supreme Court’s interim orders – that the Aadhaar number cannot be made mandatory for availing benefits and services – in contexts ranging from &lt;a href="http://www.caravanmagazine.in/vantage/how-get-married-without-aadhaar-number"&gt;marriages&lt;/a&gt; to the &lt;a href="http://www.thehindu.com/news/national/payment-denied-for-nrega-workers-without-uidai-cards-in-jharkhand/article5674969.ece"&gt;guaranteed work programme&lt;/a&gt; should also be addressed and responses sought from the Union government.&lt;/p&gt;
&lt;p&gt;Evidently, the substantial implications of the Aadhaar Act for national security and fundamental rights of citizens, primarily privacy and data security, make it imperative to conduct a duly balanced public deliberation process, both within and outside the houses of parliament, before enacting such a legislation.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question'&gt;https://cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vanya Rakesh and Sumandro Chattapadhyay</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2016-05-09T11:52:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-newsminute-may-6-2016-why-indias-attempt-to-polic-digital-maps-and-satellite-images-is-a-dumb-idea">
    <title>Why India’s attempt to police digital maps and satellite images is a ‘dumb’ idea </title>
    <link>https://cis-india.org/internet-governance/news/the-newsminute-may-6-2016-why-indias-attempt-to-polic-digital-maps-and-satellite-images-is-a-dumb-idea</link>
    <description>
        &lt;b&gt;Are we back to the license raj?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The story was published by &lt;a class="external-link" href="http://www.thenewsminute.com/article/why-indias-attempt-police-digital-maps-and-satellite-images-dumb-idea-42805"&gt;the News Minute&lt;/a&gt; on May 6, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a move which is receiving widespread criticism from technology and policy experts, the Indian government has proposed the Geospatial Information Regulation Bill that seeks to regulate the use of ‘geospatial information’ of India. Any violation of the proposed act could attract a penalty of up to 7 years in prison and Rs. 1 crore in fines, and the extreme punishments proposed have also been criticised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So what is Geospatial information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Geospatial Information has been defined in the act as&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;any imagery or data acquired through space or aerial platforms such as satellites, aircrafts, airships, balloons, unmanned aerial - vehicles or graphical or digital data depicting natural or man-made physical features, phenomenon or boundaries of the earth or any information including surveys, charts, maps and terrestrial photos.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;To put it simply, any imagery of anything on earth (in India) recorded using machines in the sky will be under the purview of the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law forbids any ‘incorrect representation' of the Indian map. For instance, not showing Pakistan Occupied Kashmir as a part of India will now be illegal and attract a fine and jail-term.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here’s what the draft bill says,&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;"No person shall depict, disseminate, publish or distribute any wrong or false topographic information of India, including international boundaries through Internet platforms or online services or in any electronic or physical form."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;And further states,&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;"Whoever acquires any geospatial information of India in contravention of the law shall be punished with a fine ranging from Rs 1 crore to Rs 100 crore and/or imprisonment for a period up to seven years."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;And it doesn’t end here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In what is reminiscent of India’s license raj era, the law also mandates that any person or institution acquiring or disseminating any geospatial imagery will have to first seek permission and license from a government authority. So Google Maps, Wikipedia, OpenStreetMap and others can operate in India only with a specific license from the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government authority will also run “sensitivity checks” on the imagery to protect India’s security and sovereignty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technology and policy experts are openly gunning for the bill and are holding no punches back.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This proposed bill is as dumb as the draft encryption bill of last year which would have made WhatsApp illegal. It is unenforceable and will only serve to make India look like a backward, despotic country,” says Kiran Jonalgadda, founder of HasGeek and a social technologist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Director of the Centre for Internet and Society, is of the view that this bill goes against the philosophy of Digital India and is regressive in nature. “It bears semblance to the conditions that prevailed in the License Raj. The bill is a clear over-reaction to legitimate security concerns. The government ought to encourage open mapping and should have limited the security restrictions to a set of officially declared security installations across India,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government's motive may be in the best interest of maintaining national security in order to prevent the misuse of sensitive data, such stringent measures may hinder the operations of navigation services and other applications that rely on geospatial information, and it will be the smaller players who will be affected the most.  “Every map maker has to create different maps for different countries and hope they're not shown in the wrong country. Google Maps can afford to do this. OpenStreetMap and Wikipedia cannot. They will effectively become illegal,” adds Jonalgadda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These stringent rules are not entirely unexpected and the government has cracked down on institutions in the past for ‘wrong’ geographical depiction of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government had taken harsh rebuke against Twitter earlier this year for showing parts of Jammu and Kashmir in Pakistan and China. In another such instance, Al Jazeera was &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=6&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwjM6KPHqcXMAhWCU44KHf8OA4IQFggyMAU&amp;amp;url=http%3A%2F%2Ftime.com%2F3832585%2Findia-al-jazeera-suspended-kashmir-dispute-maps%2F&amp;amp;usg=AFQjCNGPWa0itfyNDEj1z8povvwm_0CmqQ&amp;amp;bvm=bv.121421273,d.c2E"&gt;&lt;span&gt;banned &lt;/span&gt;&lt;/a&gt;from broadcasting by the Information and Broadcasting Ministry because of repeatedly using a wrong map of India and was accused of cartographic aggression. The RSS too carried an &lt;a href="http://timesofindia.indiatimes.com/india/RSS-mouthpiece-Organiser-apologizes-for-PoK-map-error/articleshow/46566185.cms" target="_blank"&gt;&lt;span&gt;inaccurate&lt;/span&gt;&lt;/a&gt; map of India (without some parts of Jammu and Kashmir) in its mouthpiece, Organiser and later apologised for its inadvertent error.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikhil Pahwa of Medianama has an exhaustive explanation and critique of the bill, and tells you how you and your businesses will be affected if the law is enacted. Read his piece &lt;a href="http://www.medianama.com/2016/05/223-india-draft-mapping-bill/"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here are his final comments from his piece, and they are pretty scathing.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;This looks like a policy made for policing Google maps that has ended up throwing out the baby with the bathwater.&lt;/p&gt;
&lt;p&gt;The people involved in drafting this have absolutely no clue about how users and businesses use geospatial data to make users lives easier, and how integral it is to every day life. Data is changing and increasing every single minute, and it is impossible to police it.&lt;/p&gt;
&lt;p&gt;Collection and dissemination of realtime data and its utility is what makes location information useful and special. This kills realtime information.&lt;/p&gt;
&lt;p&gt;It looks at location information from the myopic viewpoint of businesses and platforms, and ignores crowdsourced information, and indeed, independent crowdsourced maps.&lt;/p&gt;
&lt;p&gt;A separate policy regarding just security establishments and their removal from mapping information, as well as the depiction of national boundaries of India was all that is needed.&lt;/p&gt;
&lt;p&gt;It’s hypocritical of a government that promised “maximum governance, miminum governance” to try and enforce a License-raj.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, even as the government wishes to impose punitive measures on erring private bodies, government organisations will not be regulated by the Geospatial Information Regulation Bill.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-newsminute-may-6-2016-why-indias-attempt-to-polic-digital-maps-and-satellite-images-is-a-dumb-idea'&gt;https://cis-india.org/internet-governance/news/the-newsminute-may-6-2016-why-indias-attempt-to-polic-digital-maps-and-satellite-images-is-a-dumb-idea&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-08T13:05:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
