<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1346 to 1360.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ground-zero-summit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/consultation-on-understanding-the-freedom-of-expression-online-and-offline"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-security-summit-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sectoral-privacy-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-policy-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dna-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them">
    <title>Facebook Shares 10 Key Facts about Free Basics. Here's What's Wrong with All 10 of Them.</title>
    <link>https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them</link>
    <description>
        &lt;b&gt;Shweta Sengar of Catch News spoke to Sunil Abraham about the recent advertisement by Facebook titled "What Net Neutrality Activists won't Tell You or, the Top 10 Facts about Free Basics". Sunil argued against the validity of all the 'top 10 facts'.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Facebook has rebranded internet.org as Free Basics. After suffering from several harsh blows from the net neutrality activists in India, the social media behemoth is positioning a movement in order to capture user attention.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Apart from a mammoth two page advertisement on Free Basics on 23 December in a leading English daily, we spotted a numerous hoardings across the capital.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Unlike Facebook, Wikipedia has a rather upfront approach for raising funds. You must have noticed a pop-up as you open Wikipedia when they are in need of funds. What Facebook has done is branded Free Basics as 'free' as the basic needs of life.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The newspaper advertisement by Facebook was aimed at clearing all the doubts about Free Basics. The 10 facts highlighted a connected India and urging users to take the "first step towards digital equality."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In an interview with &lt;em&gt;Catch&lt;/em&gt;, Sunil Abraham, Executive Director of Bangalore based research organisation, the Centre for Internet and Society, shared his thoughts on the controversial subject. Abraham countered each of Facebook's ten arguments. Take a look:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;01&lt;/strong&gt; Free basics is open to any carriers. Any mobile operator can join us in  connecting India.&lt;/blockquote&gt;
&lt;p&gt;Sunil Abraham: Free Basics was initially exclusive to only one telecom operator in most markets that it was available in.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The non-exclusivity was introduced only after activists in India complained. But now the arrangement is exclusive to Free Basics as a walled garden provider. But discrimination harms remain until other Internet services can also have what Facebook has from telecom operators ie. free access to their destinations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;02&lt;/strong&gt; We do not charge anyone anything for Free Basics. Period.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: As Bruce Schneier says "surveillance is the business model of the Internet". Free basics users are subject to an additional layer of surveillance ie. the data retention by the Facebook proxy server. Just as Facebook cannot say that they are ignoring Data Protection law because Facebook is a free product - they cannot say that Free Basics can violate network neutrality law because it is a free service. For ex. Flipkart should get Flipkart Basic on all Indian ISPs and Telcos.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;03&lt;/strong&gt; We do not pay for the data consumed in Free Basics. Operators participate  because the program has proven to bring more people online. Free Basics has brought new people onto mobile networks on average over 50% faster since launching the service.&lt;/blockquote&gt;
&lt;p&gt;SA: Facebook has been quoting statistics as evidence to influence the policy formulation process. But we need the absolute numbers and we also need them to be independently verifiable. At the very least we need the means to cross verify these numbers with numbers that telcos and ISPs routinely submit to TRAI.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Theoretical harms must be addressed through net neutrality regulation. For example, you don't have to build a single, centralised database of all Indian citizens to know that it can be compromised - from a security design perspective centralisation is always a bad idea. Gatekeeping powers given to any powerful entity will be compromised. While evidence is useful, regulation can already begin based on well established regulatory principles. After scientific evidence has been made available - the regulation can be tweaked.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;04&lt;/strong&gt; Any developer or publisher can have their content on Free Basics. There are  clear technical specs openly published here ... and we have never rejected an app or publisher who has me these tech specs.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Again this was only done as a retrospective fix after network neutrality activists in India complained about exclusive arrangements. For example, the music streaming service Hungama is not a low-bandwidth destination but since it was included the technical specifications only mentions large images and video files. Many of the other sites are indistinguishable from their web equivalents clearly indicating that this was just an afterthought. At the moment Free Basics has become controversial so most developers and publishers are not approaching them so there is no way for us to verify Facebook's claim.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;05&lt;/strong&gt; Nearly 800 developers in India have signed their support for Free Basics.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: I guess these are software developers working in the services industry who don't see themselves as potential competition to Facebook or any of the services within Free Basics. Also since Facebook as been completely disingenuous when it comes to soliciting support for their campaigns it is very hard to believe these claims. It has tried to change the meaning of the phrase "net neutrality" and has framed the debate in an inaccurate manner - therefore I could quite confidently say that these developers must have been fooled into supporting Free Basics.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;06&lt;/strong&gt; It is not a walled garden: In India, 40% of people who come online through Free  Basics are paying for data and accessing the full internet within the first 30 days. In the same time period, 8 times more people are paying versus staying on just&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Again, no absolute numbers and also no granularity in the data that makes it impossible for anyone to verify these numbers. Also there is no way to compare these numbers to access options that are respectful of network neutrality such as equal rating. If the numbers are roughly the same for equal rating and zero-rating then there is no strong case to be made for zero-rating.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;07&lt;/strong&gt; Free Basics is growing and popular in 36 other countries, which have welcomed  the program with open arms and seen the enormous benefits it has brought.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Free Basics was one of the most controversial topics at the last Internet Governance Forum. A gratis service is definitely going to be popular but that does not mean forbearance is the only option for the regulator. In countries with strong civil society and/or a strong regulator, Free Basics has ran into trouble. Facebook has been able to launch Free Basics only in jurisdictions where regulators are still undecided about net neutrality. India and Brazil are the last battle grounds for net neutrality and that is why Facebook is spending  advertising dollar and using it's infrastructure to win the global south.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;08&lt;/strong&gt; In a recent representative poll, 86% of Indians supported Free Basics by  Facebook, and the idea that everyone deserves access to free basic internet services.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: This is the poll which was framed in alarmist language where Indian were asked to choose between perpetuating or bridging the digital divide. This is a false choice that Facebook is perpetuating - with forward-looking positive Network Neutrality rules as advocated by Dr. Chris Marsden it should be possible to bridge digital divide without incurring any free speech, competition, innovation and diversity harms.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;09&lt;/strong&gt; In the past several days, 3.2 million people have petitioned the TRAI in  support of Free Basics.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Obviously - since Free Basics is better than nothing. But the real choice should have been - are you a) against network neutrality ie. would you like to see Facebook play gatekeeper on the Internet OR b) for network neutrality ie. would you like to see Free Basics forced to comply with network neutrality rules  and expand access without harms to consumers and innovators.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;10&lt;/strong&gt; There are no ads in the version of Facebook on Free Basics. Facebook produces  no revenue. We are doing this to connect India, and the benefits to do are clear.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: As someone who has watched the Internet economy since the first dot com boom - it is absolutely clear that consumer acquisition is as important as revenues. They are doing it to connect people to Facebook and as a result some people will also connect to the Internet. But India is the last market on the planet where the walled garden can be bigger than the Internet, and therefore Facebook is manipulating the discourse through it's dominance of the networked public sphere.&lt;/p&gt;
&lt;p&gt;Bravo to TRAI and network neutrality activists for taking Facebook on.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published by &lt;a href="http://www.catchnews.com/tech-news/should-facebook-become-internet-s-gatekeeper-or-free-basics-must-comply-with-net-neutrality-sunil-abraham-has-some-thoughts-1450954347.html" target="_blank"&gt;Catch News&lt;/a&gt;, on December 24, 2015.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them'&gt;https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-12-25T14:59:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ground-zero-summit">
    <title>Ground Zero Summit</title>
    <link>https://cis-india.org/internet-governance/blog/ground-zero-summit</link>
    <description>
        &lt;b&gt;The Ground Zero Summit which claims to be the largest collaborative platform in Asia for cyber-security was held in New Delhi from 5th to 8th November. The conference was organised by the Indian Infosec Consortium (IIC), a not for profit organisation backed by the Government of India. Cyber security experts, hackers, senior officials from the government and defence establishments, senior professionals from the industry and policymakers attended the event. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Keynote Address&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Union Home Minister, Mr. Rajnath Singh, inaugurated the conference. Mr Singh described cyber-barriers that impact the issues that governments face in ensuring cyber-security. Calling the cyberspace as the fifth dimension of security in addition to land, air, water and space, Mr Singh emphasised the need to curb cyber-crimes in India, which have grown by 70% in 2014 since 2013. He highlighted the fact that changes in location, jurisdiction and language made cybercrime particularly difficult to address. Continuing in the same vein, Mr. Rajnath Singh also mentioned cyber-terrorism as one the big dangers in the time to come. With a number of government initiatives like Digital India, Smart Cities and Make in India leveraging technology, the Home Minister said that the success of these projects would be dependent on having robust cyber-security systems in place.&lt;br /&gt;&lt;br /&gt;The Home Minister outlined some initiatives that Government of India is planning to take in order to address concerns around cyber security - such as plans to finalize a new national cyber policy. Significantly, he referred to a committee headed by Dr. Gulshan Rai, the National Cyber Security Coordinator mandated to suggest a roadmap for effectively tackling cybercrime in India. This committee has recommended the setting up of Indian Cyber Crime Coordination Centre (I-4C). This centre is meant to engage in capacity building with key stakeholders to enable them to address cyber crimes, and work with law enforcement agencies. Earlier reports about the recommendation suggest that the I-4C will likely be placed under the National Crime Records Bureau and align with the state police departments through the Crime and Criminal Tracking and Network Systems (CCTNS). I-4C is supposed to be comprised of high quality technical and R&amp;amp;D experts who would be engaged in developing cyber investigation tools. &lt;br /&gt;&lt;br /&gt;Other keynote speakers included Alok Joshi, Chairman, NTRO; Dr Gulshan Rai, National Cyber Security Coordinator; Dr. Arvind Gupta, Head of IT Cell, BJP and Air Marshal S B Dep, Chief of the Western Air Command.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Technical Speakers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There were a number of technical speakers who presented on an array of subjects. The first session was by Jiten Jain, a cyber security analyst who spoke on cyber espionage conducted by actors in Pakistan to target defence personnel in India. Jiten Jain talked about how the Indian Infosec Consortium had discovered these attacks in 2014. Most of these websites and mobile apps posed as defence news and carried malware and viruses. An investigation conducted by IIC revealed the domains to be registered in Pakistan. In another session Shesh Sarangdhar, the CEO of Seclabs, an application security company, spoke about the Darknet and ways to break anonymity on it. Sarangdhar mentioned that anonymity on Darknet is dependent on all determinants of the equation in the communication maintaining a specific state. He discussed techniques like using audio files, cross domain on tor, siebel attacks as methods of deanonymization. Dr. Triveni Singh. Assistant Superintendent of Police, Special Task Force, UP Police made a presentation on the trends in cyber crime. Dr. Singh emphasised the amount of uncertainty with regard to the purpose of a computer intrusion. He discussed real life case studies such as data theft, credit card fraud, share trading fraud from the perspective of law enforcement agencies.&lt;br /&gt;&lt;br /&gt;Anirudh Anand, CTO of Infosec Labs discussed how web applications are heavily reliant on filters or escaping methods. His talk focused on XSS (cross site scripting) and bypassing regular expression filters. He also announced the release of XSS labs, an XSS test bed for security professionals and developers that includes filter evasion techniques like b-services, weak cryptographic design and cross site request forgery. Jan Siedl, an authority on SCADA presented on TOR tricks which may be used by bots, shells and other tools to better use the TOR network and I2P. His presentation dealt with using obfuscated bridges, Hidden Services based HTTP, multiple C&amp;amp;C addresses and use of OTP. Aneesha, an intern with the Kerala Police spoke about elliptical curve cryptography, its features such as low processing overheads. As this requires elliptic curve paths, efficient Encoding and Decoding techniques need to be developed. Aneesha spoke about an algorithm called Generator-Inverse for encoding and decoding a message using a Single Sign-on mechanism. Other subjects presented included vulnerabilities that remained despite using TLS/SSL, deception technology and cyber kill-chain, credit card frauds, Post-quantum crypto-systems and popular android malware.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Panels&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There were also two panels organised at the conference. Samir Saran, Vice President of Observer Research Foundation, moderated the first panel on Cyber Arms Control. The panel included participants like Lt. General A K Sahni from the South Western Air Command; Lt. General A S Lamba, Retired Vice Chief Indian Army, Alok Vijayant, Director of Cyber Security Operation of NTRO and Captain Raghuraman from Reliance Industries. The panel debated the virtues of cyber arms control treaties. It was acknowledged by the panel that there was a need to frame rules and create a governance mechanism for wars in cyberspace. However, this would be effective only if the governments are the primary actors with the capability for building cyber-warfare know-how and tools. The reality was that most kinds of cyber weapons involved non state actors from the hacker community. In light of this, the cyber control treaties would lose most of their effectiveness. &lt;br /&gt;&lt;br /&gt;The second panel was on the Make for India’ initiatives. Dinesh Bareja, the CEO of Open Security Alliance and Pyramid Cyber Security was the moderator for this panel which also included Nandakumar Saravade, CEO of Data Security Council of India; Sachin Burman, Director of NCIIPC; Dr. B J Srinath, Director General of ICERT and Amit Sharma, Joint Director of DRDO. The focus of this session was on ‘Make in India’ opportunities in the domain of cyber security. The panelist discussed the role the government and industry could play in creating an ecosystem that supports entrepreneurs in skill development. Among the approaches discussed were: involving actors in knowledge sharing and mentoring chapters which could be backed by organisations like NASSCOM and bringing together industry and government experts in events like the Ground Zero Summit to provide knowledge and training on cyber-security issues.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Exhibitions&lt;/h3&gt;
&lt;p class="Normal1" style="text-align: justify; "&gt;The conference was accompanied by a exhibitions showcasing indigenous cybersecurity products. The exhibitors included Smokescreen Technologies, Sempersol Consultancy, Ninja Hackon, Octogence Technologies, Secfence, Amity, Cisco Academy, Robotics Embedded Education Services Pvt. Ltd., Defence Research and Development Organisation (DRDO), Skin Angel, Aksit, Alqimi, Seclabs and Systems, Forensic Guru, Esecforte Technologies, Gade Autonomous Systems, National Critical Information Infrastructure Protection Centre (NCIIPC), Indian Infosec Consortium (IIC), INNEFU, Forensic Guru, Event Social, Esecforte Technologies, National Internet Exchange of India (NIXI) and Robotic Zone.&lt;/p&gt;
&lt;p class="Normal1" style="text-align: justify; "&gt;The conference also witnessed events such Drone Wars, in which selected participants had to navigate a drone, a Hacker Fashion Show and the official launch of the Ground Zero’s Music Album.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ground-zero-summit'&gt;https://cis-india.org/internet-governance/blog/ground-zero-summit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-03T06:06:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview">
    <title>Smart Cities in India: An Overview</title>
    <link>https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview</link>
    <description>
        &lt;b&gt;The Government of India is in the process of developing 100 smart cities in India which it sees as the key to the country's economic and social growth. This blog post gives an overview of the Smart Cities project currently underway in India. The smart cities mission in India is at a nascent stage and an evolving area for research. The Centre for Internet and Society will continue work in this area.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Overview of the 100 Smart Cities Mission&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Government of India announced its flagship programme- the 100 Smart Cities mission in the year 2014 and was launched in June 2015 to achieve urban 	transformation, drive economic growth and improve the quality of life of people by enabling local area development and harnessing technology. Initially, 	the Mission aims to cover 100 cities across the countries (which have been shortlisted on the basis of a Smart Cities Proposal prepared by every city) and 	its duration will be five years (FY 2015-16 to FY 2019-20). The Mission may be continued thereafter in the light of an evaluation to be done by the 	Ministry of Urban Development (MoUD) and incorporation of the learnings into the Mission. The Mission aims to focus on area-based development in the form 	of redevelopment of existing spaces, or the development of new areas (Greenfield) to accommodate the growing urban population and ensure comprehensive planning to improve quality of life, create employment and enhance incomes for all - especially the poor and the disadvantaged.	&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; On 27th August 2015 the Centre unveiled 98 smart cities across India which were selected for this Project. Across the selected cities, 13 crore population ( 35% of the urban population will be included in the development plans.	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The mission has been developed for the purpose of achieving urban transformation. 	The vision is to preserve India's traditional architecture, culture &amp;amp; ethnicity while implementing modern technology to make cities livable, use 	resources in a sustainable manner and create an inclusive environment. &lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The promises of the Smart City mission include reduction of carbon footprint, adequate water and electricity supply, proper sanitation, including solid 	waste management, efficient urban mobility and public transport, affordable housing, robust IT connectivity and digitalization, good governance, citizen 	participation, security of citizens, health and education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why and How was the Smart Cities project conceptualized in India? What was the need for such a project in India?&lt;/li&gt;
&lt;li&gt;What was the role of the public/citizens at the ideation and conceptualization stage of the project?&lt;/li&gt;
&lt;li&gt;Which actors from the Government, Private industry and the civil society are involved in this mission? Though the smart cities mission has been 	initiated by the Government of India under the Ministry of Urban Development, there is no clarity about the involvement of the associated offices and 	departments of the Ministry.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;How are the Smart Cities being selected?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The 100 cities were supposed to be selected on the basis of Smart cities challenge&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; involving two stages. Stage I of the challenge involved Intra-State city selection on objective criteria to identify cities to compete in stage-II. In August 2015, The Ministry of Urban Development, Government of India announced 100 smart cities	&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; evaluated on parameters such as service levels, financial and institutional 	capacity, past track record, called as the 'shortlisted cities' for this purpose. The selected cities are now competing for selection in the Second stage 	of the challenge, which is an All India competition. For this crucial stage, the potential 100 smart cities are required to prepare a Smart City Proposal 	(SCP) stating the model chosen (retrofitting, redevelopment, Greenfield development or a mix), along with a Pan-City dimension with Smart Solutions. The 	proposal must also include suggestions collected by way of consultations held with city residents and other stakeholders, along with the proposal for 	financing of the smart city plan including the revenue model to attract private participation. The country saw wide participation from the citizens to 	voice their aspirations and concerns regarding the smart city. 15th December 2015 has been declared as the deadline for submission of the SCP, which must be in consonance with evaluation criteria set by The MoUD, set on the basis of professional advice.	&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; On the basis of this, 20 cities will be selected for the first year. According to 	the latest reports, the Centre is planning to fund only 10 cities for the first phase in case the proposals sent by the states do not match the expected quality standards and are unable to submit complete area-development plans by the deadline, i.e. 15th December, 2015.	&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Who would be undertaking the task of evaluating and selecting the cities for this project?&lt;/li&gt;
&lt;li&gt;What are the criteria for selection of a city to qualify in the first 20 (or 10, depending on the Central Government) for the first phase of 	implementation?&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;How are the smart cities going to be Funded?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Smart City Mission will be operated as a Centrally Sponsored Scheme (CSS) and the Central Government proposes to give financial support to the Mission to the extent of Rs. 48,000 crores over five years i.e. on an average Rs. 100 crore per city per year.	&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The additional resources will have to be mobilized by the State/ ULBs from 	external/internal sources. According to the scheme, once list of shortlisted Smart Cities is finalized, Rs. 2 crore would have been disbursed to each city 	for proposal preparation.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to estimates of the Central Government, around Rs 4 lakh crore of funds will be infused mainly through private investments and loans from multilateral institutions among other sources, which accounts to 80% of the total spending on the mission.	&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For this purpose, the Government will approach the World Bank and the Asian 	Development Bank (ADB) for a loan costing £500 million and £1 billion each for 2015-20. If ADB approves the loan, it would be it will be the 	bank's highest funding to India's urban sector so far.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Foreign Direct Investment regulations have been relaxed to invite foreign capital and help into the Smart City Mission.	&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Government notes on Financing of the project mentions PPPs for private funding and leveraging of resources from internal and external 	resources. There is lack of clarity on the external resources the Government has/will approach and the varied PPP agreements the Government is or is 	planning to enter into for the purpose of private investment in the smart cities.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;How is the scheme being implemented?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under this scheme, each city is required to establish a Special Purpose Vehicle (SPV) having flexibility regarding planning, implementation, management and 	operations. The body will be headed by a full-time CEO, with nominees of Central Government, State Government and ULB on its Board. The SPV will be a 	limited company incorporated under the Companies Act, 2013 at the city-level, in which the State/UT and the Urban Local Body (ULB) will be the promoters 	having equity shareholding in the ratio 50:50. The private sector or financial institutions could be considered for taking equity stake in the SPV, 	provided the shareholding pattern of 50:50 of the State/UT and the ULB is maintained and the State/UT and the ULB together have majority shareholding and 	control of the SPV. Funds provided by the Government of India in the Smart Cities Mission to the SPV will be in the form of tied grant and kept in a 	separate Grant Fund.&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the purpose of implementation and monitoring of the projects, the MoUD has also established an Apex Committee and National Mission Directorate for 	National Level Monitoring&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, a State Level High Powered Steering Committee (HPSC) for State Level Monitoring&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and a Smart City Advisory Forum at the City Level	&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, several consulting firms&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; have been assigned to the 100 cities to help them prepare action plans.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Some of them include CRISIL, KPMG, McKinsey, etc.	&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;What policies and regulations have been put in place to account for the smart cities, apart from policies looking at issues of security, privacy, 	etc.?&lt;/li&gt;
&lt;li&gt;What international/national standards will be adopted while development of the smart cities? Though the Bureau of Indian Standards is in the 	process of formulating standardized guidelines for the smart cities in India&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, yet 	there is lack of clarity on adoption of these national standards, along with the role of international standards like the ones formulated by ISO.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;What is the role of Foreign Governments and bodies in the Smart cities mission?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ever since the government's ambitious project has been announced and cities have been shortlisted, many countries across the globe have shown keen interest 	to help specific shortlisted cities in building the smart cities and are willing to invest financially. Countries like Sweden, Malaysia, UAE, USA, etc. 	have agreed to partner with India for the mission.&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For example, UK has partnered 	with the Government to develop three India cities-Pune, Amravati and Indore.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Israel's start-up city Tel Aviv also entered into an agreement to help with urban transformation in the Indian cities of Pune, Nagpur and Nashik to foster 	innovation and share its technical know-how.&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; France has piqued interest for 	Nagpur and Puducherry, while the United States is interested in Ajmer, Vizag and Allahabad. Also, Spain's Barcelona Regional Agency has expressed interest 	in exchanging technology with the Delhi. Apart from foreign government, many organizations and multilateral agencies are also keen to partner with the 	Indian government and have offered financial assistance by way of loans. Some of them include the UK government-owned Department for International 	Development, German government KfW development bank, Japan International Cooperation Agency, the US Trade and Development Agency, United Nations Industrial 	Development Organization and United Nations Human Settlements Programme. &lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Do these governments or organization have influence on any other component of the Smart cities?&lt;/li&gt;
&lt;li&gt;How much are the foreign governments and multilateral bodies spending on the respective cities?&lt;/li&gt;
&lt;li&gt;What kind of technical know-how is being shared with the Indian government and cities?&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;What is the way ahead?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the basis of the SCP, the MoUD will evaluate, assess the credibility and select 20 smart cities out of the short-listed ones for execution of the plan 	in the first phase. The selected city will set up a SPV and receive funding from the Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Will the deadline of submission of the Smart Cities Proposal be pushed back?&lt;/li&gt;
&lt;li&gt;After the SCP is submitted on the basis of consultation with the citizens and public, will they be further involved in the implementation of the 	project and what will be their role?&lt;/li&gt;
&lt;li&gt;How will the MoUD and other associated organizations as well as actors consider the implementation realities of the project, like consideration of 	land displacement, rehabilitation of the slum people, etc.&lt;/li&gt;
&lt;li&gt;How are ICT based systems going to be utilized to make the cities and the infrastructure "smart"?&lt;/li&gt;
&lt;li&gt;How is the MoUD going to respond to the concerns and criticism emerging from various sections of the society, as being reflected in the news items?&lt;/li&gt;
&lt;li&gt;How will the smart cities impact and integrate the existing laws, regulations and policies? Does the Government intend to use the existing legislations in entirety, or update and amend the laws for implementation of the Smart Cities Mission?&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Smart Cities, Mission Statement and Guidelines, Ministry of Urban Development, Government of India, June 2015, Available at : 			http://smartcities.gov.in/writereaddata/SmartCityGuidelines.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://articles.economictimes.indiatimes.com/2015-08-27/news/65929187_1_jammu-and-kashmir-12-cities-urban-development-venkaiah-naidu&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://india.gov.in/spotlight/smart-cities-mission-step-towards-smart-india&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/Process%20of%20Selection.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Full list : http://www.scribd.com/doc/276467963/Smart-Cities-Full-List&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/Process%20of%20Selection.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.ibtimes.co.in/modi-govt-select-only-10-cities-under-smart-city-project-this-year-report-658888&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/Financing%20of%20Smart%20Cities.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Smart Cities presentation by MoUD : http://smartcities.gov.in/writereaddata/Presentation%20on%20Smart%20Cities%20Mission.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://indianexpress.com/article/india/india-others/smart-cities-projectfrom-france-to-us-a-rush-to-offer-assistance-funds/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://indianexpress.com/article/india/india-others/funding-for-smart-cities-key-to-coffer-lies-outside-india/#sthash.5lnW9Jsq.dpuf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://india.gov.in/spotlight/smart-cities-mission-step-towards-smart-india&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/SPVs.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/National%20Level%20Monitoring.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/State%20Level%20Monitoring.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/City%20Level%20Monitoring.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/List_of_Consulting_Firms.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://pib.nic.in/newsite/PrintRelease.aspx?relid=128457&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://economictimes.indiatimes.com/articleshow/49242050.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt; http://economictimes.indiatimes.com/articleshow/49242050.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.business-standard.com/article/economy-policy/in-a-first-bis-to-come-up-with-standards-for-smart-cities-115060400931_1.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://accommodationtimes.com/foreign-countries-have-keen-interest-in-development-of-smart-cities/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://articles.economictimes.indiatimes.com/2015-11-20/news/68440402_1_uk-trade-three-smart-cities-british-deputy-high-commissioner&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.jpost.com/Business-and-Innovation/Tech/Tel-Aviv-to-help-India-build-smart-cities-435161?utm_campaign=shareaholic&amp;amp;utm_medium=twitter&amp;amp;utm_source=socialnetwork&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://indianexpress.com/article/india/india-others/smart-cities-projectfrom-france-to-us-a-rush-to-offer-assistance-funds/#sthash.nCMxEKkc.dpuf&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview'&gt;https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-11T01:30:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai">
    <title>RTI response regarding the UIDAI</title>
    <link>https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai</link>
    <description>
        &lt;b&gt;This is a response to the RTI filed regarding UIDAI&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Supreme Curt of India, by virtue of an order dated 11th August 2015, directed the Government to widely publicize in electronic and print media, including radio and television networks that obtaining Aadhar card is not mandatory for the citizens to avail welfare schemes of the Government. (until the matter is resolved). CIS filed an RTI to get information about the steps taken by Government in this regard, the initiatives taken, and details about the expenditure incurred to publicize and inform the public about Aadhar not being mandatory to avail welfare schemes of the Government. &lt;br /&gt;&lt;br /&gt;Response: It has been informed that an advisory was issued by UIDAI headquarters to all regional offices to comply with the order, along with several advertisement campaigns. The total cost incurred so far by UIDAI for this is Rs. 317.30 lakh.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/rti.pdf" class="internal-link"&gt;Download the Response&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai'&gt;https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-12-22T02:57:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/consultation-on-understanding-the-freedom-of-expression-online-and-offline">
    <title>Consultation on "Understanding the Freedom of Expression Online and Offline"</title>
    <link>https://cis-india.org/internet-governance/news/consultation-on-understanding-the-freedom-of-expression-online-and-offline</link>
    <description>
        &lt;b&gt;The event organized by Digital Empowerment Foundation and Association for Progressive Communications was held at YMCA, New Delhi on December 10, 2015. Jyoti Panday attended the event as a speaker. She covered imposition of legitimate expression specifically in the context of intermediary liability practices in India.&lt;/b&gt;
        &lt;p&gt;The sessions were divided as under:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Welcome &amp;amp; Overview of the consultation by Digital Empowerment Foundation&lt;/li&gt;
&lt;li&gt;Launch of the Country Research Report &amp;amp; Keynote Address&lt;/li&gt;
&lt;li&gt;Introducing the Country Research Report titled “Limited Access and Restricting Expression by Osama Manzar, Founder and Director, Digital Empowerment Foundation&lt;/li&gt;
&lt;li&gt;Working Session I: Understanding the “Freedom of Expression Online and Offline” in conversation with experts&lt;/li&gt;
&lt;li&gt;Working Session II: “Unboxing the Freedom of Expression Online &amp;amp; Offline”&lt;/li&gt;
&lt;li&gt;Sub-Group Presentations&lt;/li&gt;
&lt;li&gt;Concluding Remarks&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/understanding-the-freedom-of-expression-online-and-offline" class="internal-link"&gt;Download the Agenda here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/consultation-on-understanding-the-freedom-of-expression-online-and-offline'&gt;https://cis-india.org/internet-governance/news/consultation-on-understanding-the-freedom-of-expression-online-and-offline&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-03T10:27:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion">
    <title>Unbundling Issues of Privacy, Data Security, Identity Matrics, for Financial Inclusion</title>
    <link>https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion</link>
    <description>
        &lt;b&gt;This event was organized by Indicus Foundation and MicroSave on December 10, 2015 at the Metropolitan Hotel and Spa, New Delhi. Sunil Abraham was a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While the initiative towards financial inclusion has gathered new impetus with the PMJDY and the accelerated roll out of benefits, there is also a parallel narrative of concerns over the legality and fundamental constitutionality of identity verification, which is a centre piece for delivery of financial benefits and services. These divergent narratives have now reached the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At one end of the spectrum are the voices that avow the power of biometric technology to irrepudiately establish biological identity; at the other, the alarmism over targeting, concentration and misuse of personal information contained in the world’s biggest personal database. There is also a third extreme position of whether Indian citizens are entitled to the right to privacy constitutionally, and whether the right to privacy includes the right to refuse a national identity number or metric altogether. That India has yet to enact a Privacy Bill and the National Identity Authority Bill on which rests the statutory basis for UIDAI and Aadhaar only adds to the quagmire.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several issues lie intertwined in this miasma: Privacy as an absolute right; Definition and Limits of Personal Information and Sensitive Personal Information; Consent protocols over use of personal information; Data Security; Appropriate and inclusive technology platforms; and Responsibilities and Liabilities governing the use of personal information for bonafide purposes. These straddle multiple domains: data accuracy and irrepudiability; storage, security and encryption; and sharing of information for transaction processing including across national boundaries. Unfortunately, all of these tend to get lumped together in the public debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aim of this workshop is to unbundle the issues and understand each of them from the perspective of financial inclusion, to be able to answer these questions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How essential and critical is a unified Identity metric for digital financial transactions? How essential is that such a metric be biometric?&lt;/li&gt;
&lt;li&gt;To what extent does the centralised storage of biometric data represent risks of personal safety and national security, compared to the information on election voter lists, passport offices, census data, and bank accounts?&lt;/li&gt;
&lt;li&gt;What are the possible sources of transactional risk and security breaches in data sharing, and what are the international best practices?&lt;/li&gt;
&lt;li&gt;Is the present Aadhaar architecture robust enough to: address all the genuine and reasonable concerns over leakage and misuse of sensitive personal information; and to ensure that no genuine identity holder is turned away from a service, entitlement or benefit to which (s)he has a right or claim?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In this direction, we have the privilege to interact in this workshop with experts from The Centre for Internet and Society, and Data Security Council of India who have been at the forefront of the discussions on privacy and data security aspects of technology based innovations including for financial inclusion.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/icfi-workshop" class="internal-link"&gt;Download the Workshop Schedule here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion'&gt;https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T10:45:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-security-summit-2015">
    <title>Cyber Security Summit 2015</title>
    <link>https://cis-india.org/internet-governance/news/cyber-security-summit-2015</link>
    <description>
        &lt;b&gt;The Government of Karnataka in association with Biz Wingz Production House organized this Summit on November 27, 2015 at JW Marriott, Bangalore from 10.30 a.m. to 5.30 p.m. Sunil Abraham was a panelist. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Cloud-based applications are often the darling of the CFO and the  nemesis of the CISO &amp;amp; CIOs. How can an organization migrate to the  cloud, thus relinquishing control, but still maintain &lt;span class="highlightedSearchTerm"&gt;security&lt;/span&gt;? Are we sacrificing &lt;span class="highlightedSearchTerm"&gt;security&lt;/span&gt; and robustness in exchange for other priorities? How do ‘Snowden’  disclosures change the legal and risk nature of cloud decision making  and governance? What can proactive cloud providers do to capture the  opportunity in the disruption? The panel explored these topics and more  to provide the cutting edge thinking and perspectives you need to shape  your own cloud strategies in ways that balance multiple priorities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Panelists&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Parag Deodhar, Chief Risk Officer, Bharti AXA General Insurance &amp;amp; Chief Operational Risk Officer India&lt;/li&gt;
&lt;li&gt;Sunil Abraham, Executive Director, Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Atul kumar, GM IT, Syndicate Bank&lt;/li&gt;
&lt;li&gt;Lopa Mudra Basu, AVP &amp;amp; Head of Enterprise &lt;span class="highlightedSearchTerm"&gt;Security&lt;/span&gt; &amp;amp; Risk Governance, SLK Global&lt;/li&gt;
&lt;li&gt;Sagar Karan, Chief Information &lt;span class="highlightedSearchTerm"&gt;Security&lt;/span&gt; Officer, Fullerton India Credit Co. Ltd.&lt;/li&gt;
&lt;li&gt;R Vijay, CISO –Technology, Mahindra &amp;amp; Mahindra Financial Services Limited&lt;/li&gt;
&lt;li&gt;Sanjivan S Shirke, Senior Vice President-Information Technology, Head -Information &lt;span class="highlightedSearchTerm"&gt;Security&lt;/span&gt;, UTI Asset Management Company Limited.&lt;/li&gt;
&lt;li&gt;Sanjay Sahay, IPS, ADGP, Grievances &amp;amp; Human Rights, Police Dept, Govt of Karnataka (moderator).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="external-link" href="https://www.eventshigh.com/detail/Bangalore/f8cf8b1a68202dca7543ec973f7ae2c0-cyber-security-summit-2015"&gt;More information about this event&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-security-summit-2015'&gt;https://cis-india.org/internet-governance/news/cyber-security-summit-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-16T02:10:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project">
    <title>Kick Off Meeting for the Politics of Data Project</title>
    <link>https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project</link>
    <description>
        &lt;b&gt;Tactical Technology Collective (TTC) on December 7 and 8, 2015 organized this event in Phnom Penh. Amber Sinha participated in it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The areas TTC is planning to focus on in the Politics of Data project include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Politics of Data: exploring questions about what it means to live in a data society and how it impacts our autonomy and privacy. Me and My Shadow is one of the projects under Politics of Data that looks at the digital traces that we leave behind and how these pieces of information are created, stored and collected. It provides people with resources to learn about how these digital traces can create stories or profiles about you, and how to minimise your digital traces online.&lt;/li&gt;
&lt;li&gt;Digital Security and Privacy: through this programme, they intend to work with rights advocates, journalists, activists and others to build their digital security skills.&lt;/li&gt;
&lt;li&gt;Exposing and Shaping Issues: this part of the programme will explore new forms of finding, creating and representing evidence by advocacy and activist groups and individuals.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The meetings saw participation from a host of organisations in Asia including Bytes for All, Cambodian Center for Human Rights, OpenNet, Community Legal Education Center, Engage Media, iPlural and Mido.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project'&gt;https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-12T16:42:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality">
    <title>CIS's Position on Net Neutrality</title>
    <link>https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality</link>
    <description>
        &lt;b&gt;As researchers committed to the principle of pluralism we rarely produce institutional positions. This is also because we tend to update our positions based on research outputs. But the lack of clarity around our position on network neutrality has led some stakeholders to believe that we are advocating for forbearance. Nothing can be farther from the truth. Please see below for the current articulation of our common institutional position.&lt;/b&gt;
        &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;Net Neutrality violations can potentially have multiple categories of harms —&lt;strong&gt; competition harms, free speech harms, privacy harms, innovation and ‘generativity’ harms, harms to consumer choice and user freedoms, and diversity harms&lt;/strong&gt; thanks to unjust discrimination and gatekeeping by Internet service providers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Net Neutrality violations (including some those forms of zero-rating that violate net neutrality) can also have different kinds benefits — enabling the &lt;strong&gt;right to freedom of expression&lt;/strong&gt;, and the &lt;strong&gt;freedom of association&lt;/strong&gt;, especially when access to communication and publishing technologies is increased; &lt;strong&gt;increased competition&lt;/strong&gt; [by enabling product differentiation, can potentially allow small ISPs compete against market incumbents]; &lt;strong&gt;increased access&lt;/strong&gt; [usually to a subset of the Internet] by those without any access because they cannot afford it, increased access [usually to a subset of the Internet] by those who don't see any value in the Internet, &lt;strong&gt;reduced payments&lt;/strong&gt; by those who already have access to the Internet especially if their usage is dominated by certain services and destinations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Given the magnitude and variety of potential harms, &lt;strong&gt;complete forbearance from all regulation is not an option&lt;/strong&gt; for regulators nor is self-regulation sufficient to address all the harms emerging from Net Neutrality violations, since incumbent telecom companies cannot be trusted to effectively self-regulate. Therefore, &lt;strong&gt;CIS calls for the immediate formulation of Net Neutrality regulation&lt;/strong&gt; by the telecom regulator [TRAI] and the notification thereof by the government [Department of Telecom of the Ministry of Information and Communication Technology]. CIS also calls for the eventual enactment of statutory law on Net Neutrality.&amp;nbsp; All such policy must be developed in a transparent fashion after proper consultation with all relevant stakeholders, and after giving citizens an opportunity to comment on draft regulations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Even though some of these harms may be large, CIS believes that a government cannot apply the precautionary principle in the case of Net Neutrality violations. &lt;strong&gt;Banning technical innovations and business model innovations is not an appropriate policy option. &lt;/strong&gt;The regulation must toe a careful line &lt;strong&gt;to solve the optimization problem: &lt;/strong&gt;refraining from over-regulation of ISPs and harming innovation at the carrier level (and benefits of net neutrality violations mentioned above) while preventing ISPs from harming innovation and user choice.&amp;nbsp; ISPs must be regulated to limit harms from unjust discrimination towards consumers as well as to limit harms from unjust discrimination towards the services they carry on their networks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Based on regulatory theory, we believe that a regulatory framework that is technologically neutral, that factors in differences in technological context, as well as market realities and existing regulation, and which is able to respond to new evidence is what is ideal.&lt;br /&gt;&lt;br /&gt;This means that we need a framework that has some bright-line rules based, but which allows for flexibility in determining the scope of exceptions and in the application of the rules.&amp;nbsp; Candidate principles to be embodied in the regulation include: &lt;strong&gt;transparency, non-exclusivity, limiting unjust discrimination&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;harms emerging from walled gardens can be mitigated in a number of ways&lt;/strong&gt;.&amp;nbsp; &lt;strong&gt;On zero-rating the form of regulation must depend on the specific model and the potential harms that result from that model. &lt;/strong&gt;Zero-rating can be: paid for by the end consumer or subsidized by ISPs or subsidized by content providers or subsidized by government or a combination of these; deal-based or criteria-based or government-imposed; ISP-imposed or offered by the ISP and chosen by consumers; Transparent and understood by consumers vs. non-transparent; based on content-type or agnostic to content-type; service-specific or service-class/protocol-specific or service-agnostic; available on one ISP or on all ISPs.&amp;nbsp; Zero-rating by a small ISP with 2% penetration will not have the same harms as zero-rating by the largest incumbent ISP.&amp;nbsp; For service-agnostic / content-type agnostic zero-rating, which Mozilla terms ‘&lt;strong&gt;equal rating&lt;/strong&gt;’, CIS advocates for&lt;strong&gt; no regulation.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;CIS believes that &lt;strong&gt;Net Neutrality regulation for mobile and fixed-line access must be different&lt;/strong&gt; recognizing the fundamental differences in technologies.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;On specialized services CIS believes that there should be logical separation&lt;/strong&gt; and that all details of such specialized services and their impact on the Internet must be made transparent to consumers both individual and institutional, the general public and to the regulator.&amp;nbsp; Further, such services should be available to the user only upon request, and not without their active choice, with the requirement that the service cannot be reasonably provided with ‘best efforts’ delivery guarantee that is available over the Internet, and hence requires discriminatory treatment, or that the discriminatory treatment does not unduly harm the provision of the rest of the Internet to other customers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On incentives for telecom operators, CIS believes that the government should consider different models such as waiving contribution to the Universal Service Obligation Fund for prepaid consumers, and freeing up additional spectrum for telecom use without royalty using a shared spectrum paradigm, as well as freeing up more spectrum for use without a licence.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On reasonable network management CIS still does not have a common institutional position.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality'&gt;https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-09T13:06:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-research">
    <title>Security Research</title>
    <link>https://cis-india.org/internet-governance/blog/security-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives.&lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Research on the issue of privacy in different sectors in India.&lt;/li&gt;
&lt;li&gt;Monitoring projects, practices, and policies around those sectors.&lt;/li&gt;
&lt;li&gt;Raising public awareness around the issue of privacy, in light of varied projects, industries, sectors and instances.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;State surveillance in India has been carried out by Government agencies for many years. Recent projects include: NATGRID, CMS, NETRA, etc. which aim to overhaul the overall security and intelligence infrastructure in the country. The purpose of such initiatives has been to maintain national security and ensure interconnectivity and interoperability between departments and agencies. Concerns regarding the structure, regulatory frameworks (or lack thereof), and technologies used in these programmes and projects have attracted criticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance/Security Research -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Central Monitoring System -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Central Monitoring System or CMS is a clandestine mass electronic surveillance data mining program installed by the Center for Development of 	Telematics (C-DOT), a part of the Indian government. It gives law enforcement agencies centralized access to India's telecommunications network and the 	ability to listen in on and record mobile, landline, satellite, Voice over Internet Protocol (VoIP) calls along with private e-mails, SMS, MMS. It also 	gives them the ability to geo-locate individuals via cell phones in real time.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Central Monitoring System: Some Questions to be Raised in Parliament &lt;span&gt;http://bit.ly/1fln2vu&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India´s ´Big Brother´: The Central Monitoring System (CMS) &lt;a href="http://bit.ly/1kyyzKB"&gt;http://bit.ly/1kyyzKB&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India's Central Monitoring System (CMS): Something to Worry About? &lt;a href="http://bit.ly/1gsM4oQ"&gt;http://bit.ly/1gsM4oQ&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; C-DoT's surveillance system making enemies on internet 	&lt;a href="http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet"&gt; http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2. Surveillance Industry : Global And Domestic -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry is a multi-billion dollar economic sector that tracks individuals along with their actions such as e-mails and texts. With the 	cause for its existence being terrorism and the government's attempts to fight it, a network has been created that leaves no one with their privacy. All 	that an individual does in the digital world is suspect to surveillance. This included surveillance in the form of snooping where an individual's phone 	calls, text messages and e-mails are monitored or a more active kind where cameras, sensors and other devices are used to actively track the movements and 	actions of an individual. This information allows governments to bypass the privacy that an individual has in a manner that is considered unethical and 	incorrect. This information that is collected also in vulnerable to cyber-attacks that are serious risks to privacy and the individuals themselves. The 	following set of articles look into the ethics, risks, vulnerabilities and trade-offs of having a mass surveillance industry in place.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance Technologies http://bit.ly/14pxg74 &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;New Standard Operating Procedures for Lawful Interception and Monitoring &lt;span&gt;http://bit.ly/1mRRIo4&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Video Surveillance and Its Impact on the Right to Privacy 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy"&gt; http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;More than a Hundred Global Groups Make a Principled Stand against Surveillance 	&lt;a href="http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance"&gt; http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Models for Surveillance and Interception of Communications Worldwide 	&lt;a href="http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide"&gt; http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why 'Facebook' is More Dangerous than the Government Spying on You 	&lt;a href="http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you"&gt; http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Difficult Balance of Transparent Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance"&gt; http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; UK's Interception of Communications Commissioner - A Model of Accountability 		&lt;a href="http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"&gt; http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India 		&lt;a href="http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"&gt; http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; State Surveillance and Human Rights Camp: Summary &lt;a href="http://bit.ly/ZZNm6M"&gt;http://bit.ly/ZZNm6M&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis - It is Now Officially Confirmed		&lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Spy Files 3: WikiLeaks Sheds More Light on the Global Surveillance Industry &lt;a href="http://bit.ly/1d6EmjD"&gt;http://bit.ly/1d6EmjD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance Camp IV: Disproportionate State Surveillance - A Violation of Privacy &lt;a href="http://bit.ly/1ilTJts"&gt;http://bit.ly/1ilTJts&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Hacking without borders: The future of artificial intelligence and surveillance &lt;a href="http://bit.ly/1kWiwGv"&gt;http://bit.ly/1kWiwGv&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Driving in the Surveillance Society: Cameras, RFID tags and Black Boxes &lt;a href="http://bit.ly/1mr3KTH"&gt;http://bit.ly/1mr3KTH&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Brief: Oversight Mechanisms for Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance"&gt; http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;3. Judgements By the Indian Courts -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry in India has been brought before the court in different cases. The following articles look into the cause of action in these 	cases along with their impact on India and its citizens.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Anvar v. Basheer and the New (Old) Law of Electronic Evidence 	&lt;a href="http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt; http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Gujarat High Court Judgement on the Snoopgate Issue 	&lt;a href="http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue"&gt; http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;4. International Privacy Laws -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to the universality of the internet, many questions of accountability arise and jurisdiction becomes a problem. Therefore certain treaties, agreements 	and other international legal literature was created to answer these questions. The articles listed below look into the international legal framework which 	governs the internet.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Learning to Forget the ECJ's Decision on the Right to be Forgotten and its Implications 		&lt;a href="http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications"&gt; http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy and Security Can Co-exist		&lt;a href="http://cis-india.org/internet-governance/blog/privacy-and-security"&gt;http://cis-india.org/internet-governance/blog/privacy-and-security&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; European Union Draft Report Admonishes Mass Surveillance, Calls for Stricter Data Protection and Privacy Laws 		&lt;a href="http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance"&gt; http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Draft International Principles on Communications Surveillance and Human Rights &lt;a href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Indian Surveillance Framework -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government's mass surveillance systems are configured a little differently from the networks of many countries such as the USA and the UK. This 	is because of the vast difference in infrastructure both in existence and the required amount. In many ways, it is considered that the surveillance network 	in India is far worse than other countries. This is due to the present form of the legal system in existence. The articles below explore the system and its 	functioning including the various methods through which we are spied on. The ethics and vulnerabilities are also explored in these articles.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Paper-thin Safeguards and Mass Surveillance in India - 	&lt;a href="http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india"&gt; http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers! - 	&lt;a href="http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India - An Analysis of Indian Security Expos 	&lt;a href="http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos"&gt; http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;GSMA Research Outputs: different legal and regulatory aspects of security and surveillance in India	&lt;a href="http://cis-india.org/internet-governance/blog/gsma-research-outputs"&gt;http://cis-india.org/internet-governance/blog/gsma-research-outputs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Way to watch 		&lt;a href="http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch"&gt; http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Free Speech and Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/free-speech-and-surveillance"&gt; http://cis-india.org/internet-governance/blog/free-speech-and-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance rises, privacy retreats 		&lt;a href="http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats"&gt; http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Freedom from Monitoring: India Inc. should Push For Privacy Laws 	&lt;a href="http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"&gt; http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Surat's Massive Surveillance Network Should Cause Concern, Not Celebration 	&lt;a href="http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration"&gt; http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Vodafone Report Explains Government Access to Customer Data 	&lt;a href="http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data"&gt; http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Review of the Functioning of the Cyber Appellate Tribunal and Adjudicator officers under the IT Act 	&lt;a href="http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act"&gt; http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Comparison of Indian Legislation to Draft International Principles on Surveillance of Communications	&lt;a href="http://bit.ly/U6T3xy"&gt;http://bit.ly/U6T3xy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;SEBI and Communication Surveillance: New Rules, New Responsibilities? &lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Snooping Can Lead to Data Abuse		&lt;a href="http://cis-india.org/internet-governance/blog/snooping-to-data-abuse"&gt;http://cis-india.org/internet-governance/blog/snooping-to-data-abuse&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Big Brother is Watching You &lt;a href="http://bit.ly/1arbxwm"&gt;http://bit.ly/1arbxwm&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Moving Towards a Surveillance State 		&lt;a href="http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state"&gt; http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; How Surveillance Works in India 		&lt;a href="http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"&gt; http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Big Democracy, Big Surveillance: India's Surveillance State http://bit.ly/1nkg8Ho &lt;/li&gt;
&lt;li&gt; Can India Trust Its Government on Privacy? 		&lt;a href="http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy"&gt; http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Indian surveillance laws &amp;amp; practices far worse than US 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"&gt; http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Security, Surveillance and Data Sharing Schemes and Bodies in India 		&lt;a href="http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view"&gt; http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Paper on Surveillance in India 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp:/cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"&gt; http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Constitutionality of Indian Surveillance Law: Public Emergency as a Condition Precedent for Intercepting Communications 		&lt;a href="http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law"&gt; http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 1: Foundations http://bit.ly/1ntqsen &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 2: Gobind and the Compelling State Interest Test		&lt;a href="http://bit.ly/1dH3meL"&gt;http://bit.ly/1dH3meL&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 3: The Public/Private Distinction and the Supreme Court's Wrong Turn		&lt;a href="http://bit.ly/1kBosnw"&gt;http://bit.ly/1kBosnw&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Mastering the Art of Keeping Indians Under Surveillance 		http://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-research'&gt;https://cis-india.org/internet-governance/blog/security-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:55:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sectoral-privacy-research">
    <title>Sectoral Privacy Research</title>
    <link>https://cis-india.org/internet-governance/blog/sectoral-privacy-research</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, India has been researching privacy in India since the year 2010, with special focus on the following issues.&lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Research on the issue of privacy in different sectors in India.&lt;/li&gt;
&lt;li&gt;Monitoring projects, practices, and policies around those sectors.&lt;/li&gt;
&lt;li&gt;Raising public awareness around the issue of privacy, in light of varied projects, industries, sectors and instances.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Right to Privacy has evolved in India since many decades, where the question of it being a Fundamental Right has been debated many times in courts of Law. With the advent of information technology and digitisation of the services, the issue of Privacy holds more relevance in sectors like Banking, Healthcare, Telecommunications, ITC, etc., The Right to Privacy is also addressed in light of the Sexual minorities, Whistle-blowers, Government services, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sectors -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Consumer Privacy and other sectors -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consumer privacy laws and regulations seek to protect any individual from loss of privacy due to failures or limitations of corporate customer privacy 	measures. The following articles deal with the current consumer privacy laws in place in India and around the world. Also, privacy concerns have been 	considered along with other sectors like Copyright law, data protection, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Consumer Privacy - How to Enforce an Effective Protective Regime? &lt;a href="http://bit.ly/1a99P2z"&gt;http://bit.ly/1a99P2z&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Information Technology Act: Do we have the Safeguards for Electronic Privacy? &lt;a href="http://bit.ly/10VJp1P"&gt;http://bit.ly/10VJp1P&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Limits to Privacy http://bit.ly/19mPG6I &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;§ Copyright Enforcement and Privacy in India &lt;a href="http://bit.ly/18fi9fM"&gt;http://bit.ly/18fi9fM&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Privacy in India: Country Report http://bit.ly/14pnNwl &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;§ Transparency and Privacy &lt;a href="http://bit.ly/1a9dMnC"&gt;http://bit.ly/1a9dMnC&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Report of the Group of Experts on Privacy (Contributed by CIS) &lt;a href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The (In) Visible Subject: Power, Privacy and Social Networking &lt;a href="http://bit.ly/15koqol"&gt;http://bit.ly/15koqol&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and the Indian Copyright Act, 1857 as Amended in 2010 &lt;a href="http://bit.ly/1euwX0r"&gt;http://bit.ly/1euwX0r&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Should Ratan Tata be afforded the Right to Privacy? &lt;a href="http://bit.ly/LRlXin"&gt;http://bit.ly/LRlXin&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Comments on Information Technology (Guidelines for Cyber Café) Rules, 2011 &lt;a href="http://bit.ly/15kojJn"&gt;http://bit.ly/15kojJn&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Broadcasting Standards Authority Censures TV9 over Privacy Violations! &lt;a href="http://bit.ly/16L4izl"&gt;http://bit.ly/16L4izl&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Is Data Protection Enough? &lt;a href="http://bit.ly/1bvaWx2"&gt;http://bit.ly/1bvaWx2&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy, speech at stake in cyberspace	&lt;a href="http://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1"&gt;http://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Q&amp;amp;A to the Report of the Group of Experts on Privacy &lt;a href="http://bit.ly/TPhzQQ"&gt;http://bit.ly/TPhzQQ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy worries cloud Facebook's WhatsApp Deal 	&lt;a href="http://cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal"&gt; http://cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ GNI Assessment Finds ICT Companies Protect User Privacy and Freedom of Expression &lt;a href="http://bit.ly/1mjbpmL"&gt;http://bit.ly/1mjbpmL&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ A Stolen Perspective &lt;a href="http://bit.ly/1bWHyzv"&gt;http://bit.ly/1bWHyzv&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Is Data Protection enough? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough"&gt; http://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ I don't want my fingerprints taken &lt;a href="http://bit.ly/aYdMia"&gt;http://bit.ly/aYdMia&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Keeping it Private &lt;a href="http://bit.ly/15wjTVc"&gt;http://bit.ly/15wjTVc&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Personal Data, Public Profile &lt;a href="http://bit.ly/15vlFk4"&gt;http://bit.ly/15vlFk4&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Why your Facebook Stalker is Not the Real Problem &lt;a href="http://bit.ly/1bI2MSc"&gt;http://bit.ly/1bI2MSc&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Private Eye &lt;a href="http://bit.ly/173ypSI"&gt;http://bit.ly/173ypSI&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ How Facebook is Blatantly Abusing our Trust &lt;a href="http://bit.ly/OBXGXk"&gt;http://bit.ly/OBXGXk&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Open Secrets &lt;a href="http://bit.ly/1b5uvK0"&gt;http://bit.ly/1b5uvK0&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Big Brother is Watching You &lt;a href="http://bit.ly/1cGpg0K"&gt;http://bit.ly/1cGpg0K&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Banking/Finance -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy in the banking and finance industry is crucial as the records and funds of one person must not be accessible by another without the due 	authorisation. The following articles deal with the current system in place that governs privacy in the financial and banking industry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Banking: Do Indian Banking Standards Provide Enough Privacy Protection? &lt;a href="http://bit.ly/18fhsTM"&gt;http://bit.ly/18fhsTM&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Finance and Privacy &lt;a href="http://bit.ly/15aUPh6"&gt;http://bit.ly/15aUPh6&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Making the Powerful Accountable &lt;a href="http://bit.ly/1nvzSpC"&gt;http://bit.ly/1nvzSpC&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Telecommunications -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The telecommunications industry is the backbone of current technology with respect to ICTs. The telecommunications industry has its own rules and 	regulations. These rules are the focal point of the following articles including criticism and acclaim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Telecommunications: Do We Have the Safeguards? &lt;a href="http://bit.ly/10VJp1P"&gt;http://bit.ly/10VJp1P&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Media Law &lt;a href="http://bit.ly/18fgDfF"&gt;http://bit.ly/18fgDfF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ IP Addresses and Expeditious Disclosure of Identity in India &lt;a href="http://bit.ly/16dBy4N"&gt;http://bit.ly/16dBy4N&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Telecommunications and Internet Privacy Read more: &lt;a href="http://bit.ly/16dEcaF"&gt;http://bit.ly/16dEcaF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Encryption Standards and Practices &lt;a href="http://bit.ly/KT9BTy"&gt;http://bit.ly/KT9BTy&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Encryption Standards and Practices 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/privacy_encryption"&gt; http://cis-india.org/internet-governance/blog/privacy/privacy_encryption &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Security: Privacy, Transparency and Technology 	&lt;a href="http://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technolog"&gt; http://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technolog &lt;/a&gt; y&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Sexual Minorities -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the internet is a global forum of self-expression and acceptance for most of us, it does not hold true for sexual minorities. The internet is a place 	of secrecy for those that do not conform to the typical identities set by society and therefore their privacy is more important to them than most. When 	they reveal themselves or are revealed by others, they typically face a lot of group hatred from the rest of the people and therefore value their privacy. 	The following article looks into their situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;· Privacy and Sexual Minorities http://bit.ly/19mQUyZ&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Health -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy between a doctor and a patient is seen as incredibly important and so should the privacy of a person in any situation where they reveal more 	than they would to others in the sense of CT scans and other diagnoses. The following articles look into the present scenario of privacy in places like a 	hospital or diagnosis center.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Health and Privacy &lt;a href="http://bit.ly/16L1AJX"&gt;http://bit.ly/16L1AJX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy Concerns in Whole Body Imaging: A Few Questions &lt;a href="http://bit.ly/1jmvH1z"&gt;http://bit.ly/1jmvH1z&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. e-Governance -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main focus of governments in ICTs is their gain for governance. There have many a multiplicity of laws and legislation passed by various countries 	including India in an effort to govern the universal space that is the internet. Surveillance is a major part of that governance and control. The articles 	listed below deal with the issues of ethics and drawbacks in the current legal scenario involving ICTs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ E-Governance and Privacy &lt;a href="http://bit.ly/18fiReX"&gt;http://bit.ly/18fiReX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Governmental Databases &lt;a href="http://bit.ly/18fmSy8"&gt;http://bit.ly/18fmSy8&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Killing Internet Softly with its Rules &lt;a href="http://bit.ly/1b5I7Z2"&gt;http://bit.ly/1b5I7Z2&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Cyber Crime &amp;amp; Privacy &lt;a href="http://bit.ly/17VTluv"&gt;http://bit.ly/17VTluv&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Understanding the Right to Information &lt;a href="http://bit.ly/1hojKr7"&gt;http://bit.ly/1hojKr7&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy Perspectives on the 2012-2013 Goa Beach Shack Policy &lt;a href="http://bit.ly/ThAovQ"&gt;http://bit.ly/ThAovQ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Identifying Aspects of Privacy in Islamic Law 	&lt;a href="http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt; http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ What Does Facebook's Transparency Report Tell Us About the Indian Government's Record on Free Expression &amp;amp; Privacy? 	&lt;a href="http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"&gt; http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell &lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"&gt; -us-about-indian-government-record-on-free-expression-and-privacy &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India 	&lt;a href="http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"&gt; http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Internet Privacy in India 	&lt;a href="http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"&gt; http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-i &lt;/a&gt; &lt;a href="http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"&gt;ndia&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Internet-driven Developments - Structural Changes and Tipping Points &lt;a href="http://bit.ly/10s8HVH"&gt;http://bit.ly/10s8HVH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Data Retention in India &lt;a href="http://bit.ly/XR791u"&gt;http://bit.ly/XR791u&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ 2012: Privacy Highlights in India &lt;a href="http://bit.ly/1kWe3n7"&gt;http://bit.ly/1kWe3n7&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Big Dog is Watching You! The Sci-fi Future of Animal and Insect Drones &lt;a href="http://bit.ly/1kWee1W"&gt;http://bit.ly/1kWee1W&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Privacy Law in India: A Muddled Field - I 		&lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"&gt; http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-priv &lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"&gt; acy-law-in-india-a-muddled-field-1 &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Four Parts of Privacy in India 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india"&gt; http://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Right to Privacy in Peril 		&lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Microsoft Releases its First Report on Data Requests by Law Enforcement Agencies around the World		&lt;a href="http://bit.ly/1kWjylM"&gt;http://bit.ly/1kWjylM&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Criminal Law Amendment Bill 2013 - Penalising 'Peeping Toms' and Other Privacy Issues &lt;a href="http://bit.ly/1dO46o5"&gt;http://bit.ly/1dO46o5&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy vs. Transparency: An Attempt at Resolving the Dichotomy		&lt;a href="http://cis-india.org/openness/blog-old/privacy-v-transparency"&gt;http://cis-india.org/openness/blog-old/privacy-v-transparency&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to "Not" Recognize India as Data Secure Nation till Enactment of Privacy Legislation		&lt;a href="http://bit.ly/1sJME9j"&gt;http://bit.ly/1sJME9j&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to Prevent the Installation of RFID tags in Vehicles &lt;a href="http://bit.ly/1hxidzU"&gt;http://bit.ly/1hxidzU&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The National Privacy Roundtable Meetings &lt;a href="http://bit.ly/158ayNW"&gt;http://bit.ly/158ayNW&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Transparency Reports - A Glance on What Google and Facebook Tell about Government Data Requests		&lt;a href="http://bit.ly/19NYTal"&gt;http://bit.ly/19NYTal&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; CIS and International Coalition Calls upon Governments to Protect Privacy &lt;a href="http://bit.ly/18oOTDk"&gt;http://bit.ly/18oOTDk&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000 for Adjudication in the State of Maharashtra		&lt;a href="http://bit.ly/16dKyoo"&gt;http://bit.ly/16dKyoo&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee		&lt;a href="http://bit.ly/17eZntz"&gt;http://bit.ly/17eZntz&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; CIS Supports the UN Resolution on "The Right to Privacy in the Digital age" &lt;a href="http://bit.ly/1c2A89q"&gt;http://bit.ly/1c2A89q&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Brochures from Expos on Smart Cards, e-Security, RFID &amp;amp; Biometrics in India &lt;a href="http://bit.ly/1f714fN"&gt;http://bit.ly/1f714fN&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Electoral Databases - Privacy and Security Concerns &lt;a href="http://bit.ly/Mb4ktM"&gt;http://bit.ly/Mb4ktM&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Net Neutrality and Privacy &lt;a href="http://bit.ly/1khi1GQ"&gt;http://bit.ly/1khi1GQ&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Intermediary Liability Resources &lt;a href="http://bit.ly/1hRT8OD"&gt;http://bit.ly/1hRT8OD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Feedback to the NIA Bill &lt;a href="http://bit.ly/1ePhUeg"&gt;http://bit.ly/1ePhUeg&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India's Identity Crisis &lt;a href="http://bit.ly/1lTRuuz"&gt;http://bit.ly/1lTRuuz&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook, Privacy, and India &lt;a href="http://bit.ly/a2HzhT"&gt;http://bit.ly/a2HzhT&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Private censorship and the Right to Hear 		&lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear"&gt; http://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Your Privacy is Public Property (Rules issued by a control-obsessed government have armed officials with widespread powers to pry into your private 		life. &lt;a href="http://cis-india.org/news/privacy-public-property"&gt;http://cis-india.org/news/privacy-public-property&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The India Privacy Monitor Map &lt;a href="http://bit.ly/19A5mCZ"&gt;http://bit.ly/19A5mCZ&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy and Security can Co-Exist &lt;a href="http://bit.ly/193fPXi"&gt;http://bit.ly/193fPXi&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; A Street View of the Private and The Public (&lt;a href="http://bit.ly/15VKmdf"&gt;http://bit.ly/15VKmdf&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Sense and Censorship &lt;a href="http://bit.ly/14KFwyo"&gt;http://bit.ly/14KFwyo&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Government access to private sector data &lt;a href="http://bit.ly/18rjd1X"&gt;http://bit.ly/18rjd1X&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India: Privacy in Peril &lt;a href="http://bit.ly/1g5QbZj"&gt;http://bit.ly/1g5QbZj&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Big Democracy, Big Surveillance: India's Surveillance State &lt;a href="http://bit.ly/1nkg8Ho"&gt;http://bit.ly/1nkg8Ho&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Who Governs the Internet? Implications for Freedom and National Security &lt;a href="http://bit.ly/1hnnJ2a"&gt;http://bit.ly/1hnnJ2a&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;7. Whistle-blowers -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whistle-blowers are always in a difficult situation when they must reveal the misdeeds of their corporations and governments due to the blowback that is 	possible if their identity is revealed to the public. As in the case of Edward Snowden and many others, a whistle-blowers identity is to be kept the most 	private to avoid the consequences of revealing the information that they did. This is the main focus of the article below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Privacy Rights of Whistle-blowers &lt;a href="http://bit.ly/18GWmM3"&gt;http://bit.ly/18GWmM3&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. Cloud and Open Source -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cloud computing and open source software have grown rapidly over the past few decades. Cloud computing is when an individual or company uses offsite 	hardware on a pay by usage basis provided and owned by someone else. The advantages are low costs and easy access along with decreased initial costs. Open 	source software on the other hand is software where despite the existence of proprietary elements and innovation, the software is available to the public 	at no charge. These software are based of open standards and have the obvious advantage of being compatible with many different set ups and are free. The 	following article highlights these computing solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy, Free/Open Source, and the Cloud &lt;a href="http://bit.ly/1cTmGoI"&gt;http://bit.ly/1cTmGoI&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. e-Commerce -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the fastest growing applications of the internet is e-Commerce. This includes many facets of commerce such as online trading, the stock exchange 	etc. in these cases, just as in the financial and banking industries, privacy is very important to protect ones investments and capital. The following 	article's main focal point is the world of e-Commerce and its current privacy scenario.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Consumer Privacy in e-Commerce http://bit.ly/1dCtgTs&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sectoral-privacy-research'&gt;https://cis-india.org/internet-governance/blog/sectoral-privacy-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:46:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-policy-research">
    <title>Privacy Policy Research</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-policy-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives.&lt;/b&gt;
        &lt;ol&gt;
&lt;li&gt;Raising public awareness  and dialogue around privacy, &lt;/li&gt;
&lt;li&gt;Undertaking in depth research of domestic and international policy pertaining to privacy &lt;/li&gt;
&lt;li&gt;Driving comprehensive privacy legislation in India through research.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;India does not have a comprehensive legislation covering issues of privacy or establishing the right to privacy In 2010 an "Approach Paper on Privacy" was published, in 2011 the Department of Personnel and Training released a draft Right to Privacy Bill, in 2012 the Planning Commission constituted a group of experts which published The Report of the Group of Experts on Privacy, in 2013 CIS drafted the citizens Privacy Protection Bill, and in 2014 the Right to Privacy Bill was leaked. Currently the Government is in the process of drafting and finalizing the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/DraftRighttoPrivacyBill.png" alt="Draft Right to Privacy" class="image-inline" title="Draft Right to Privacy" /&gt;&lt;/p&gt;
&lt;p&gt;Privacy Research -&lt;/p&gt;
&lt;p&gt;1. Approach Paper on Privacy, 2010 -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following article contains the reply drafted by CIS in response to the Paper on Privacy in 2010. The Paper on Privacy was a document drafted by a group 	of officers created to develop a framework for a privacy legislation that would balance the need for privacy protection, security, sectoral interests, and 	respond to the domain legislation on the subject.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; CIS Responds to Privacy Approach Paper &lt;a href="http://bit.ly/16dEPB3"&gt;http://bit.ly/16dEPB3&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;2. Report on Privacy, 2012 -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report on Privacy, 2012 was drafted and published by a group of experts under the Planning Commission pertaining to the current legislation with 	respect to privacy. The following articles contain the responses and criticisms to the report and the current legislation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; The National Cyber Security Policy: Not a Real Policy &lt;a href="http://bit.ly/16yLYFq"&gt;http://bit.ly/16yLYFq&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Privacy Law Must Fit the Bill &lt;a href="http://bit.ly/19DNYjs"&gt;http://bit.ly/19DNYjs&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;3. Privacy Protection Bill, 2013 -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Protection Bill, 2013 was a legislation that aims to formulate the rules and law that governs privacy protection. The following articles refer 	to this legislation including a citizen's draft of the legislation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; The Privacy (Protection) Bill 2013: A Citizen's Draft &lt;a href="http://bit.ly/1bXYbL6"&gt;http://bit.ly/1bXYbL6&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Privacy Protection Bill, 2013 (With Amendments based on Public Feedback) &lt;a href="http://bit.ly/1efkgbe"&gt;http://bit.ly/1efkgbe&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Privacy (Protection) Bill, 2013: Updated Third Draft &lt;a href="http://bit.ly/14WAgI7"&gt;http://bit.ly/14WAgI7&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; The Privacy Protection Bill, 2013 &lt;a href="http://bit.ly/1g3TwIX"&gt;http://bit.ly/1g3TwIX&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; The New Right to Privacy Bill 2011: A Blind Man's View of the Elephant &lt;a href="http://bit.ly/17VSgCH"&gt;http://bit.ly/17VSgCH&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;4. Right to Privacy Act, 2014 (Leaked Bill) -&lt;/p&gt;
&lt;p&gt;The Right to Privacy Act, 2014 is a bill still under proposal that was leaked, linked below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Leaked Privacy Bill: 2014 vs. 2011 http://bit.ly/QV0Y0w &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-policy-research'&gt;https://cis-india.org/internet-governance/blog/privacy-policy-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:40:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dna-research">
    <title>DNA Research</title>
    <link>https://cis-india.org/internet-governance/blog/dna-research</link>
    <description>
        &lt;b&gt;In 2006, the Department of Biotechnology drafted the Human DNA Profiling Bill. In 2012 a revised Bill was released and a group of Experts was constituted to finalize the Bill. In 2014, another version was released, the approval of which is pending before the Parliament. This legislation will allow the government of India to Create a National DNA Data Bank and a DNA Profiling Board for the purposes of forensic research and analysis. Here is a collection of our research on privacy and security concerns related to the Bill.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, India has been researching privacy in India since the year 2010, with special focus on the following issues related to the DNA Bill:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Validity and legality of collection, usage and storage of DNA samples and information derived from the same.&lt;/li&gt;
&lt;li&gt;Monitoring projects and policies around Human DNA Profiling.&lt;/li&gt;
&lt;li&gt;Raising public awareness around issues concerning biometrics.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;In 2006, the Department of Biotechnology drafted the Human DNA Profiling Bill. In 2012 a revised Bill was released and a group of Experts was constituted to finalize the Bill. In 2014, another version was released, the approval of which is pending before the Parliament.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Bill seeks to establish DNA Databases at the state and regional level and a national level database. The databases would store DNA profiles of suspects, offenders, missing persons, and deceased persons. The database could be used by courts, law enforcement (national and international) agencies, and other authorized persons for criminal and civil purposes. The Bill will also regulate DNA laboratories collecting DNA samples. Lack of adequate consent, the broad powers of the board, and the deletion of innocent persons profiles are just a few of the concerns voiced about the Bill.&lt;/p&gt;
&lt;img src="https://github.com/cis-india/website/raw/master/img/CIS_DNA-Profiling-Bill_Web.jpg" alt="DNA Profiling Bill - Infographic" /&gt;
&lt;h6&gt;&lt;a href="https://github.com/cis-india/website/raw/master/img/CIS_DNA-Profiling-Bill_Web.jpg" target="_blank"&gt;Download the infographic.&lt;/a&gt; Credit: &lt;a href="https://twitter.com/Scott_Mason88" target="_blank"&gt;Scott Mason&lt;/a&gt; and CIS team.&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;1. DNA Bill&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The Human DNA Profiling bill is a legislation that will allow the government of India to Create a National DNA Data Bank and a DNA Profiling Board for the 	purposes of forensic research and analysis. There have been many concerns raised about the infringement of privacy and the power that the government will 	have with such information raised by Human Rights Groups, individuals and NGOs. The bill proposes to profile people through their fingerprints and retinal 	scans which allow the government to create different unique profiles for individuals. Some of the concerns raised include the loss of privacy by such 	profiling and the manner in which they are conducted. Unless strictly controlled, monitored and protected, such a database of the citizens' fingerprints 	and retinal scans could lead to huge blowbacks in the form of security risks and privacy invasions. The following articles elaborate upon these matters.&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;ul type="disc"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation"&gt;Biometrics - An 'Angootha Chaap' Nation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/re-the-human-dna-profiling-bill-2012"&gt;Re: The Human DNA Profiling Bill, 2012&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis"&gt;Human DNA Profiling Bill 2012 Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/indian-draft-dna-profiling-act"&gt;Overview and Concerns Regarding the Indian Draft DNA Act&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns"&gt;India's Biometric Identification Programs and Privacy Concerns&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/dna-dissent"&gt;A Dissent note to the Expert Committee for DNA Profiling&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/cis-comments-and-recommendations-to-human-dna-profiling-bill-2015"&gt;CIS Comments and Recommendations to the Human DNA Profiling Bill, June 2015&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/concerns-regarding-dna-law"&gt;Concerns regarding DNA Law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015"&gt;Human DNA Profiling Bill 2012 v/s 2015 Bill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-scariest-bill-in-parliament-is-getting-no-attention-2013-here2019s-what-you-need-to-know-about-it"&gt;The scariest Bill in the Parliament is getting no attention - Here's what you need to know about it&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/business-standard-kanika-datta-august-1-2015-why-the-dna-bill-is-open-to-misuse-sunil-abraham"&gt;Why the DNA Bill is open to misuse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/livemint-nikita-mehta-july-29-2015-regulation-misuse-concerns-still-dog-dna-profiling-bill"&gt;Regulation, misuse concerns still dog DNA Profiling Bill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling"&gt;Genetic profiling - Is it all in the DNA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015"&gt;Comparison of the Human DNA Profiling Bill 2012 with - CIS Recommendations, Sub-Committee Recommendations, Expert Committee Recommendations, and the Human DNA Profiling Bill 2015&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother"&gt;Very Big Brother&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;2. Comparative Analysis with other Legislatures&lt;/h2&gt;
&lt;p&gt;Human DNA Profiling is a system that isn't proposed only in India. This system of identification has been proposed and implemented in many nations. Each of 	these systems differs from the other on bases dependent on the nation's and society's needs. The risks and criticisms that DNA profiling has faced may be 	the same but the manner in which solutions to such issues are varying. The following articles look into the different systems in place in different 	countries and create a comparison with the proposed system in India to give us a better understanding of the risks and implications of such a system being 	implemented.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world"&gt;Comparative Analysis of DNA Profiling Legislations from Across the World&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions"&gt;Comparison of Section 35(1) of the Draft Human DNA Profiling Bill and Section 4 of the Identification Act Revised Statute of Canada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/comparison-of-draft-dna-profiling-bills"&gt;A Comparison of the Draft DNA Profiling Bill 2007 and the Draft Human DNA Profiling Bill 2012&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dna-research'&gt;https://cis-india.org/internet-governance/blog/dna-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-07-21T11:02:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-research">
    <title>UID Research</title>
    <link>https://cis-india.org/internet-governance/blog/uid-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives. &lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Researching the vision and implementation of the UID Scheme - both from a technical and regulatory perspective.&lt;/li&gt;
&lt;li&gt;Understanding the validity and legality of collection, usage and storage of Biometric information for this scheme.&lt;/li&gt;
&lt;li&gt;Raising public awareness around issues concerning privacy, data security and the objectives of the UID Scheme.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The UID scheme seeks to provide all residents of India an identity number based on their biometrics that can be used to authenticate individuals for the purpose of Government benefits and services. A 2015 Supreme Court ruling has clarified that the UID can only be used in the PDS and LPG Schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns with the scheme include the broad consent taken at the time of enrolment, the lack of clarity as to what happens with transactional metadata, the centralized storage of the biometric information in the CIDR, the seeding of the aadhaar number into service providers’ databases, and the possibility of function creep. Also, there are concerns due to absence of a legislation to look into the privacy and security concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UID Research -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Ramifications of Aadhar and UID schemes -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID and Aadhar systems have been bombarded with criticisms and plagued with issues ranging from privacy concerns to security risks. The following 	articles deal with the many problems and drawbacks of these systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID and NPR: Towards Common Ground 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground"&gt; http://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Public Statement to Final Draft of UID Bill &lt;a href="http://bit.ly/1aGf1NN"&gt;http://bit.ly/1aGf1NN&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID Project in India - Some Possible Ramifications	&lt;a href="http://cis-india.org/internet-governance/blog/uid-in-india"&gt;http://cis-india.org/internet-governance/blog/uid-in-india&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Aadhaar Number vs the Social Security Number 	&lt;a href="http://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number"&gt; http://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Feedback to the NIA Bill	&lt;a href="http://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill"&gt;http://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Unique ID System: Pros and Cons &lt;a href="http://bit.ly/1jmxbZS"&gt;http://bit.ly/1jmxbZS&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Submitted seven open letters to the Parliamentary Finance Committee on the UID covering the following aspects: SCOSTA Standards 	(http://bit.ly/1hq5Rqd), Centralized Database (http://bit.ly/1hsHJDg), Biometrics (http://bit.ly/196drke), UID Budget (http://bit.ly/1e4c2Op), Operational 	Design (http://bit.ly/JXR61S), UID and Transactions (http://bit.ly/1gY6B8r), and Deduplication (http://bit.ly/1c9TkSg)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Comments on Finance Committee Statements to Open Letters on Unique Identity: The Parliamentary Finance Committee responded to the open letters sent by CIS through an email on 12 October 2011. CIS has commented on the points raised by the Committee:	&lt;a href="http://bit.ly/1kz4H0F"&gt;http://bit.ly/1kz4H0F&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Unique Identification Scheme (UID) &amp;amp; National Population Register (NPR), and Governance 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note"&gt; http://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Financial Inclusion and the UID	&lt;a href="http://cis-india.org/internet-governance/privacy_uidfinancialinclusion"&gt;http://cis-india.org/internet-governance/privacy_uidfinancialinclusion&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Aadhaar Case	&lt;a href="http://cis-india.org/internet-governance/blog/the-aadhaar-case"&gt;http://cis-india.org/internet-governance/blog/the-aadhaar-case&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Do we need the Aadhaar scheme &lt;a href="http://bit.ly/1850wAz"&gt;http://bit.ly/1850wAz&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ 4 Popular Myths about UID &lt;a href="http://bit.ly/1bWFoQg"&gt;http://bit.ly/1bWFoQg&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Does the UID Reflect India? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/uid-reflects-india"&gt; http://cis-india.org/internet-governance/blog/privacy/uid-reflects-india &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Would it be a unique identity crisis?	&lt;a href="http://cis-india.org/news/unique-identity-crisis"&gt;http://cis-india.org/news/unique-identity-crisis&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID: Nothing to Hide, Nothing to Fear? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear"&gt; http://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Right to Privacy and UID -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID system has been hit by many privacy concerns from NGOs, private individuals and others. The sharing of one's information, especially fingerprints 	and retinal scans to a system that is controlled by the government and is not vetted as having good security irks most people. These issues are dealt with 	the in the following articles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ India Fears of Privacy Loss Pursue Ambitious ID Project	&lt;a href="http://cis-india.org/news/india-fears-of-privacy-loss"&gt;http://cis-india.org/news/india-fears-of-privacy-loss&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Analysing the Right to Privacy and Dignity with Respect to the UID &lt;a href="http://bit.ly/1bWFoQg"&gt;http://bit.ly/1bWFoQg&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Analysing the Right to Privacy and Dignity with Respect to the UID 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/privacy-uiddevaprasad"&gt; http://cis-india.org/internet-governance/blog/privacy/privacy-uiddevaprasad &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Supreme Court order is a good start, but is seeding necessary? 	&lt;a href="http://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary"&gt; http://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Right to Privacy in Peril 	&lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Data Flow in the UID -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The articles below deal with the manner in which data is moved around and handled in the UID system in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UIDAI Practices and the Information Technology Act, Section 43A and Subsequent Rules 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules"&gt; http://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Data flow in the Unique Identification Scheme of India 	&lt;a href="http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india"&gt; http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india &lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-research'&gt;https://cis-india.org/internet-governance/blog/uid-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:59:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia">
    <title>Net Neutrality across South Asia</title>
    <link>https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) and the Observer Research Foundation in association with Centre for Global Communication Studies, Annenberg School for Communication, University of Pennnsylvania and Internet Policy Observatory is organizing this event at the Observer Research Foundation's office in New Delhi from 10 a.m. to 5 p.m., on December 12, 2015.&lt;/b&gt;
        &lt;h3&gt;Context&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Net neutrality can broadly be understood as the principle of non-discrimination which in practice allows the internet to be free and open by preventing service providers from slowing or interfering with the transfer of data. Net neutrality has risen as a global policy issue, yet cultural, political, commercial, and economical factors influence how net neutrality is understood and addressed in a particular context. Indeed, the factors driving the net neutrality debate, the way in which governments are addressing net neutrality, the role and response of industry, the public response, and the role of civil society has been varied across contexts. The topic of net neutrality is not limited to a technical debate and brings together a number of issues including the right to access, the right to freedom of expression, fair competition practices, and privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This conference seeks to bring together domain experts, industry, government, and civil society across South Asia to understand how net neutrality is understood in different contexts, how it is being addressed from a policy point of view, what the varying public dialogues around net neutrality are, and what role civil society can play in influencing the debate.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/concept-note-network-neutrality-in-south-asia" class="internal-link"&gt;&lt;strong&gt;Download the Concept Note&lt;/strong&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/NN_Conference%20Report.pdf" class="internal-link"&gt;&lt;b&gt;Download Event Report &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia'&gt;https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-02-27T08:09:29Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
