<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1431 to 1445.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-12-revenues"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-11-netmundial-principles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-on-ccwg-accountability-2nd-draft-proposal-on-work-stream-1-recommendations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-multi-stakeholder-cooperation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/august-2015-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/response-by-the-centre-for-internet-and-society-to-the-draft-proposal-to-transition-the-stewardship-of-the-internet-assigned-numbers-authority-iana-functions-from-the-u-s-commerce-department2019s-national-telecommunications-and-information-administration"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy">
    <title>Bowing to public pressure, govt withdraws draft encryption policy </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy</link>
    <description>
        &lt;b&gt;Bowing to pressure from the public, the government on Tuesday withdrew a draft policy that sought to control secured online communication, including through mass-use social media and web applications such as WhatsApp and Twitter.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by the &lt;a class="external-link" href="http://www.hindustantimes.com/tech/bowing-to-public-pressure-govt-withdraws-draft-encryption-policy/story-kOVNjpFZIuzyuQZGqv4JSN.html;jsessionid=C7FD668754FD1868D4BFE90D6D3C98B5"&gt;Hindustan Times&lt;/a&gt; on September 22, 2015. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Communications and information technology minister Ravi Shankar  Prasad announced the government’s decision at a news conference, saying  the draft National Encryption Policy will be reviewed before it is again  presented to the public for their suggestions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I read the draft. I understand that the manner in which it is  written can lead to misconceptions. I have asked for the draft policy to  be withdrawn and reworded,” Prasad said. He said the draft would be  re-released, but did not say when it would be made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Experts had framed a draft policy...This draft policy is not the  government’s final view,” he added. “There were concerns in some  quarters. There were some words (in the draft policy) that caused  concern.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft will be reviewed and experts will be asked to specify to  whom the policy will be applicable, Prasad said. He did not say when the  new draft will be made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those using social media platforms and web applications fell outside the scope of an encryption policy, Prasad said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several countries have felt the need for an encryption policy because  of the boom in e-commerce and e-governance, he remarked. “Cyber space  interactions are on the rise. There are concerns about security. We need  a sound encryption policy,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before Prasad announced the withdrawal of the draft policy, the  government had issued an addendum early on Tuesday to keep social media  and web applications like WhatsApp, Twitter and Facebook out of its  purview.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secure banking transactions and password protected e-commerce  businesses too will be kept out of the ambit of the proposed policy, the  addendum said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The climb down by the government came following a storm of protests  from users who objected to any stringent state controls on the use of  email, social media accounts and apps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the original draft, users of apps such as WhatsApp and  Snapchat would be required to save all messages for up to 90 days and be  able to produce them if asked by authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts told Hindustan Times the draft policy, if implemented in its  current form, could compromise the privacy of users and hamper the  functioning of several multi-national service providers in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikhil Pahwa, editor of the MediaNama website that tracks cyber  issues and tech news, said there were several problems even with the  addendum to the draft policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The usage of the phrase ‘currently in use’ renders the policy vague:  Firstly, when is ‘currently’?” he questioned in a post on his website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Will a new service that uses a different kind of encryption to  protect its users, still be covered? Why should users be ‘restricted to  encryption currently in use’? Why should services like Whatsapp,  Facebook and Twitter define our security standards?” said Pahwa, who  also volunteers for savetheinternet.in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director for The Centre for Internet and  Society, tweeted that even the addendum “does not clarify anything, but  further muddles the encryption policy”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media users called the draft “draconian” and “delusional”, and  Congress leader Manish Tewari too attacked the Union government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The encryption policy (draft) is a snooping and spying orgy. After  net chats, the government may want you to keep a video record of what  you do in your bedroom for 90 days,” the Congress spokesperson told  reporters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft policy had been posted online last week to seek suggestions from the public.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy'&gt;https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    

   <dc:date>2015-10-01T02:15:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash">
    <title>India encryption policy draft faces backlash</title>
    <link>https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash</link>
    <description>
        &lt;b&gt;The department of information technology is facing a backlash from industry experts, Internet watchers and netizens on its draft of the National Encryption Policy that it recently made public.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava was published in &lt;a class="external-link" href="http://www.livemint.com/Industry/3KK1XWztlnFyR10dffTWMM/India-encryption-policy-draft-faces-backlash.html"&gt;Livemint&lt;/a&gt; on September 22, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While the draft policy aims to enable a secure environment for both information and transactions in cyberspace for individuals, businesses and government, experts are concerned over privacy and outdated standards prescribed in the policy, among other things.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy puts the onus to produce encrypted information when demanded by government agencies on Indian citizens as well as on all the online service providers including instant messaging and e-commerce services that use encryption technology (to convert plain information to an unreadable format).&lt;br /&gt;&lt;br /&gt;The department put the policy online late last week and it came on the radar of industry watchers and experts over the weekend. The policy is open for comments from the public till 16 October.&lt;br /&gt;&lt;br /&gt;The policy, in its current form, is poorly drafted and the measures listed in it make Indian information systems vulnerable to cyber attacks, experts say.&lt;br /&gt;&lt;br /&gt;For instance, the policy has mandated the use of specific standards and algorithms for encryption.&lt;br /&gt;&lt;br /&gt;Encryption can be compared to the process of translating information in one language into a foreign language.&lt;br /&gt;&lt;br /&gt;“Specifying certain algorithms to be used for encryption, and restricting the key sizes is same as saying that you are only allowed to communicate using a language from a given set of government-specified languages and no other language can be used,” said Pranesh Prakash, policy director at the Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;However, the ones mentioned in the draft policy are outdated and unsafe to use, experts say. Another thing that weakens the security considerably is the req-uirement for businesses and citizens to keep the information (that was encrypted and sent over) for 90 days, in case law en-forcement agencies demand it. But that also means that for those 90 days, cyber criminals, too, can access it, warn experts.&lt;br /&gt;&lt;br /&gt;Another big gap in the policy is that it leaves out “sensitive departments/agencies of the government designated for performing sensitive and strategic roles”, said Prakash.&lt;br /&gt;&lt;br /&gt;“When the policy states its mission to be the enhancing of confidentiality of information and of security of critical networks by laying out information security best practices, how does it make any sense to keep sensitive or strategic government department and agencies outside its purview?” he asked. “After all, these are the organizations that most need to be kept secure to enhance national cybersecurity.”&lt;br /&gt;&lt;br /&gt;The draft is also ambiguous on which online services—be it shopping online or accessing email—people can use (in compliance with the law) and which online service providers will have to be registered with the government.&lt;br /&gt;&lt;br /&gt;The policy states that “service providers located within and outside India, using encryption technology for providing any type of services in India, must enter into an agreement with the government for providing such services in India”. Users can only use the services that are registered with the government.&lt;br /&gt;&lt;br /&gt;“This is the first time when users are actually being told what are the things they can and cannot do,” said Prakash.&lt;br /&gt;&lt;br /&gt;“The government must take note that the knowledge and expertise of common citizens may be inadequate to understand the nuances of encryption,” said cyber law expert Na Vijayashankar on his blog. “For example, if a citizen uses a service available on the Internet which uses, say, a higher level of encryption than what is appro-ved, then this policy may make him liable for the violation.”&lt;br /&gt;&lt;br /&gt;The problem is enhanced because all online services use some encryption technology. This means that practically all online activity will fall under this new policy.&lt;br /&gt;&lt;br /&gt;For instance, companies like Apple or Microsoft use encryption technologies at various levels of their operating systems; e-commerce services like Flipkart, Amazon and Snapdeal; web browsers like Mozilla Firefox and Google Chrome and mail services like Gmail, Yahoo and Rediff may be required to register with the government. The only way they may escape this requirement is if there is an exemption for products that are in use at a large scale. Network security service providers like Cisco Inc. will also need to comply. (Cisco declined to respond to a query.) Snapdeal said it is still examining the draft policy, while Amazon, Google, Microsoft did not reply to emails sent by Mint. Yahoo said its spokesperson was unavailable.&lt;br /&gt;&lt;br /&gt;One clause that is drawing a lot of ire from industry veterans and technology enthusiasts requires individual users and businesses to store all information that was sent in an encrypted form for 90 days from the date of transaction. The users would also be required to reproduce the plain text and the encrypted text, if demanded by law enforcement agencies.&lt;br /&gt;&lt;br /&gt;The draft policy also overlooks the privacy concerns of citizens and businesses. “It is clearly a violation of freedom of speech. A large part of the policy states how the government can interfere with users, like, by demanding their private messages. The policy is anti-privacy law,” said Prakash. “Privacy and security go hand in hand. So, as this policy weakens the security of the information, it puts the privacy at greater risk.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash'&gt;https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-22T01:59:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp">
    <title>Peering behind the veil of ICANN’s DIDP (I)</title>
    <link>https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp</link>
    <description>
        &lt;b&gt;One of the key elements of the process of enhancing democracy and furthering transparency in any institution which holds power is open access to information for all the stakeholders. This is critical to ensure that there is accountability for the actions of those in charge of a body which utilises public funds and carries out functions in the public interest. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As the body which “&lt;i&gt;...coordinates the Internet Assigned Numbers Authority (IANA) functions, which are key technical services critical to the continued operations of the Internet's underlying address book, the Domain Name System (DNS)&lt;/i&gt;”&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the centrality of ICANN in regulating the Internet (a public good if there ever was one) makes it vital that ICANN’s decision-making processes, financial flows, and operations are open to public scrutiny. ICANN itself echoes the same belief, and upholds “...&lt;i&gt;a proven commitment to accountability and transparency in all of its practices&lt;/i&gt;”&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which is captured in their By-Laws and &lt;a href="https://www.icann.org/resources/pages/affirmation-of-commitments-2009-09-30-en"&gt;Affirmation of Commitments&lt;/a&gt;. In furtherance of this, ICANN has created its own &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;Documentary Information Disclosure Policy&lt;/a&gt;, where it promises to “...&lt;i&gt;ensure that information contained in &lt;b&gt;documents concerning ICANN's operational activities&lt;/b&gt;, and within ICANN's possession, custody, or control, is &lt;b&gt;made available to the public &lt;/b&gt;unless there is a compelling reason for confidentiality.&lt;/i&gt;”&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN has a vast array of documents that are already in the public domain, listed &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;here&lt;/a&gt;. These include annual reports, budgets, registry reports, speeches, operating plans, correspondence, etc. However, their Documentary Information Disclosure Policy falls short of meeting international standards for information disclosure. In this piece, I have focused on an examination of their defined conditions for non-disclosure of information, which seem to undercut the entire process of transparency that the DIDP process aims towards upholding. The obvious comparison that comes to mind is with the right to information laws that governments the world over have enacted in furtherance of democracy. While ICANN cannot be equated to a democratically elected government, it nonetheless does exercise sufficient regulatory power of the functioning of the Internet for it to owe a similar degree of information to all the stakeholders in the internet community. In this piece, I have made an examination of ICANN’s conditions for non-disclosure, and compared it to the analogous exclusions in India’s Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;ICANN’ꜱ Defined Conditions for Non-Disclosure versus Exclusions in Indian Law :&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN, in its DIDP policy identifies a lengthy list of conditions as being sufficient grounds for non-disclosure of information. One of the most important indicators of a strong transparency law is said to be &lt;b&gt;&lt;i&gt;minimum exclusions&lt;/i&gt;&lt;/b&gt;.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, as seen from the table below, ICANN’s exclusions are extensive and vast, and this has been a barrier in the way of free flow of information. An analysis of their responses to various DIDP requests (available &lt;a href="https://www.icann.org/resources/pages/governance/transparency-en"&gt;here&lt;/a&gt;) shows that the conditions for non-disclosure have been invoked in over 50 of the 85 requests responded to (as of 11.09.2015); i.e., over two-thirds of the requests that ICANN receives are subjected to the non-disclosure policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, an analysis of India’s Right to Information Act, considered to be among the better drafted transparency laws of the world, reveals a much narrower list of exclusions that come in the way of a citizen obtaining any kind of information sought. The table below compares the two lists:&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;No.&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;ICANN&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;India&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Analysis&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information provided by or to a government or international organization&lt;/b&gt; which was to be kept confidential or would materially affect ICANN’s equation with the concerned body.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, disclosure of which would prejudicially affect the &lt;b&gt;sovereignty and integrity of India&lt;/b&gt;, the security, "strategic, scientific or economic" interests of the State, relation with foreign State or lead to incitement of an offense&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;/ information &lt;b&gt;received in confidence from foreign government&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The threshold for both the bodies is fairly similar for this exclusion.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internal (staff/Board) information &lt;/b&gt;that, if disclosed, would or would be likely to compromise the integrity of ICANN's deliberative and decision-making process&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cabinet papers including records of deliberations&lt;/b&gt; of the Council of Ministers, Secretaries and other officers, provided that such decisions the reasons thereof, and the material on the basis of which the decisions were taken &lt;b&gt;shall be made public after the decision has been taken&lt;/b&gt;, and the matter is complete, or over (unless subject to these exemptions)&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The Indian law is far more transparent as it ultimately allows for the records of internal deliberation to be made public after the decision is taken.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information related to the &lt;b&gt;deliberative and decision-making process between ICANN, its constituents, and/or other entities with which ICANN cooperates &lt;/b&gt;that, if disclosed, would or would be likely to compromise the integrity of the deliberative and decision-making process&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No similar provision in Indian Law.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is an additional restriction that ICANN introduces in addition to the one above, which in itself is quite broad.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Records relating to an individual's personal information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which relates to &lt;b&gt;personal information &lt;/b&gt;the disclosure of which has no relationship to any public activity or interest, or which would cause unwarranted invasion of the privacy of the individual (but it is also provided that the information which cannot be denied to the Parliament or a State Legislature shall not be denied by this exemption);&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Again, the Indian law contains a proviso for information with “&lt;i&gt;relationship to any public activity or interest&lt;/i&gt;”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Proceedings of internal appeal mechanisms and investigations.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which has been &lt;b&gt;expressly forbidden to be published by any court of law &lt;/b&gt;or tribunal or the disclosure of which may constitute contempt of court;&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;While ICANN prohibits the disclosure of all proceedings, in India, the exemption is only to the limited extent of information that the court prohibits from being made public.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information provided to ICANN by a party that, if disclosed, would or would be likely to &lt;b&gt;materially prejudice the commercial interests, financial interests, and/or competitive position &lt;/b&gt;of such party or was provided to ICANN pursuant to a nondisclosure agreement or nondisclosure provision within an agreement.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information including &lt;b&gt;commercial confidence, trade secrets &lt;/b&gt;or intellectual property, the &lt;b&gt;disclosure of which would harm the competitive position of a third party&lt;/b&gt;, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is fairly similar for both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Confidential business information &lt;/b&gt;and/or internal policies and procedures.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No similar provision in Indian Law. This is encapsulated in the abovementioned provision&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is fairly similar in both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information that, if disclosed, would or would be likely to &lt;b&gt;endanger the life, health, or safety &lt;/b&gt;of any individual or materially prejudice the administration of justice.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, the disclosure of which would &lt;b&gt;endanger the life or physical safety of any person &lt;/b&gt;or identify the source of information or assistance given in confidence for law enforcement or security purposes;&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar for both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information subject to any kind of privilege&lt;/b&gt;, which might prejudice any investigation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, the disclosure of which would cause a &lt;b&gt;breach of privilege of Parliament &lt;/b&gt;or the State Legislature&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;/Information which would &lt;b&gt;impede the process of investigation or apprehension or prosecution of offenders&lt;/b&gt;;&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar in both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Drafts of all correspondence, reports, documents, agreements, contracts, emails, or any other forms of communication.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This exclusion is not present in Indian law, and it is extremely broadly worded, coming in the way of full transparency.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information that relates in any way to the &lt;b&gt;security and stability of the Internet&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is perhaps necessary to ICANN’s role as the IANA Functions Operator. However, given the large public interest in this matter, there should be some proviso to make information in this regard available to the public as well.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Trade secrets and commercial and financial information &lt;/b&gt;not publicly disclosed by ICANN.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information including &lt;b&gt;commercial confidence, trade secrets &lt;/b&gt;or intellectual property, the disclosure of which would harm the competitive position of a third party, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar in both cases.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information requests:&lt;/p&gt;
&lt;p&gt;● which are not reasonable;&lt;/p&gt;
&lt;p&gt;● which are excessive or overly burdensome&lt;/p&gt;
&lt;p&gt;● complying with which is not feasible&lt;/p&gt;
&lt;p&gt;● which are made with an abusive or vexatious purpose or by a vexatious or querulous individual.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Of all the DIDP exclusions, this is the one which is most loosely worded. The terms in this clause are not clearly defined, and it can effectively be used to deflect any request sought from ICANN because of its extreme subjectivity. What amounts to ‘reasonable’? Whom is the process going to ‘burden’? What lens does ICANN use to define a ‘vexatious’ purpose? Where do we look for answers?&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in ICANN’s DIDP.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information available to a person in his &lt;b&gt;fiduciary relationship&lt;/b&gt;, unless the competent authority is satisfied that the larger public interest warrants the disclosure of such information;&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in ICANN’s DIDP.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which providing access to would involve an &lt;b&gt;infringement of copyright subsisting in a person other than the State&lt;/b&gt;.&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Thus, the net cast by the DIDP exclusions policy is more vast than even than that of a democratic state’s transparency law. Clearly, the exclusions above have effectively allowed ICANN to dodge answers to most of the requests floating its way. One can only hope that ICANN realises that these exclusions come in the way of the transparency that they are so committed to, and does away with this unreasonably wide range on the road to the IANA Transition.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/pages/welcome-2012-02-25-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/accountability&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Shekhar Singh, &lt;i&gt;India: Grassroot Initiatives&lt;/i&gt; in Tʜᴇ Rɪɢʜᴛ ᴛᴏ Kɴᴏᴡ 19, 44 (Ann Florin ed., 2007)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In a proviso, ICANN’s DIDP states that all these exemptions can be overridden if the larger public interest is higher. However, this has not yet been reflected in their responses to any DIDP requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(a), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(f), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(i), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(j), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(b), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section (1)(d), Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(g), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(c), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(h), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section (1)(d), Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(e), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 9, Right to Information Act, 2005.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp'&gt;https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-15T02:42:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore">
    <title>Sustainable Smart Cities India Conference 2015, Bangalore</title>
    <link>https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore</link>
    <description>
        &lt;b&gt;Nispana Innovative Platforms organized a Sustainable Smart Cities India Conference 2015, in Bangalore on 3rd and 4th September, 2015. The event saw participation from people across various sectors including Government Representatives from Ministries, Municipalities, Regulatory Authorities, as well as Project Management Companies, Engineers, Architects, Consultants, Handpicked Technology Solution Providers and Researchers. National and International experts and stakeholders were also present to discuss the opportunities and challenges in creating smart and responsible cities as well as citizens, and creating a roadmap for converting the smart cities vision into a reality that is best suited for India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The objective of the conference was to discuss the meaning of a smart city, the promises made, the challenges and possible solutions for implementation of ideas by transforming Indian Cities towards a Sustainable and Smart Future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Smart Cities Mission&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering the pace of rapid urbanization in India, it has been estimated that the urban population would rise by more than 400 million people by the year 2050&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and would contribute nearly 75% to India’s GDP by the year 2030. It has been realized that to foster such growth, well planned cities are of utmost importance. For this, the Indian government has come up with a Smart Cities initiative to drive economic growth and improve the quality of life of people by enabling local area development and harnessing technology, especially technology that leads to Smart outcomes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, the Mission aims to cover 100 cities across the countries (which have been shortlisted on the basis of a Smart Cities Proposal prepared by every city) and its duration will be five years (FY2015-16 to FY2019-20). The Mission may be continued thereafter in the light of an evaluation to be done by the Ministry of Urban Development (MoUD) and incorporating the learnings into the Mission. This initiative aims to focus on area-based development in the form of redevelopment, or developing new areas (Greenfield) to accommodate the growing urban population and ensure comprehensive planning to improve quality of life, create employment and enhance incomes for all, especially the poor and the disadvantaged.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is being done?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Smart City Mission will be operated as a Centrally Sponsored Scheme (CSS) and the Central Government proposes to give financial support to the Mission to the extent of Rs. 48,000 crores over five years i.e. on an average Rs. 100 crore per city per year.The Government has come up with 2 missions:Atal Mission for Rejuvenation and Urban Transformation (AMRUT) and Smart Cities Mission for the purpose of achieving urban transformation.The vision is to preserve India’s traditional architecture, culture &amp;amp; ethnicity while implementing modern technology to make cities livable, use resources in a sustainable manner and create an inclusive environment. Additionally, Foreign Direct Investment regulations have been relaxed to invite foreign capital and help into the Smart City Mission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is a Smart City?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the two-day conference, various speakers shared a common sentiment that the Governments’ mission does not clearly define what encompasses the idea of a Smart City. There is no universally accepted definition of a Smart City and its conceptualization varies from city to city and country to country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A global consensus on the idea of a smart city is a city which is livable, sustainable and inclusive. Hence, it would mean a city which has mobility, healthcare, smart infrastructure, smart people, traffic maintenance, efficient waste resource management, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, there is a global debate at United Nations regarding developmental goals. One of these goals is gender equality which is very important for the smart city initiative. According to this, a smart city must be such where the women have a life free from violence, must be made to participate and are economically empowered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Promises&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The promises of the Smart City mission include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Make a sustainable future, reduce carbon footprint, adequate water supply, assured electricity supply, proper sanitation, including solid waste management, efficient urban mobility and public transport, affordable housing especially for the poor, robust IT connectivity and digitalization, good governance, especially e-Governance and citizen participation, sustainable environment, safety and security of citizens, particularly women, children and the elderly, and health and education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The vision is to preserve country’s traditional architecture, culture &amp;amp; ethnicity while implementing modern technology. It was discussed how the Smart City Mission is currently attracting global investment, will create new job opportunities, improve communications and infrastructure, decrease pollution and ultimately improve the quality of living.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Challenges&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main challenges for implementation of these objectives are with respect to housing, dealing&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;with existing cities and adopting the idea of retro-fitting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, another challenge is that of eradicating urban poverty, controlling environment degradation, formulating a fool-proof plan, proper waste management mechanism, widening roads but not at the cost of pedestrians and cyclist and building cities which are inclusive and cater to the needs of women, children and disabled people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the top challenges will include devising a fool-proof plan to develop smart cities, meaningful public-private partnership, increasing the renewable energy, water supply, effective waste management, traffic management, meeting power demand, urban mobility, ICT connectivity, e-governance, etc., while preparing for new threats that can emerge with implementation of these new technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What needs to be done?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following suggestions were made by the experts to successfully implement government’s vision of creating successful smart cities in India.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Focus on the 4 P’s: Public-Private-People Partnership since people very much form a part of the cities.&lt;/li&gt;
&lt;li&gt;Integration of organizations, government bodies, and the citizens. The Government can opt for a sentiment analysis.&lt;/li&gt;
&lt;li&gt;Active participation by state governments since Land is a state subject under the Constitution. There must be a detailed framework to monitor the progress and the responsibilities must be clearly demarcated.&lt;/li&gt;
&lt;li&gt;Detailed plans, policies and guidelines&lt;/li&gt;
&lt;li&gt;Strengthen big data initiatives&lt;/li&gt;
&lt;li&gt;Resource maximization&lt;/li&gt;
&lt;li&gt;Make citizens smart by informing them and creating awareness&lt;/li&gt;
&lt;li&gt;Need for competent people to run the projects&lt;/li&gt;
&lt;li&gt;Visionary leadership&lt;/li&gt;
&lt;li&gt;Create flexible and shared spaces for community development.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National/International case studies&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several national and international case studies were discussed to list down practical challenges to enable the selected Indian cities learn from their mistakes or include successful schemes in their planning from its inception.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Amsterdam Smart City: It is said to be a global village which was transformed into a smart city by involving the people. They took views of the citizens to make the plan a success. The role of big data and open data was highly emphasized. Also, it was suggested that there must be alignment with respect to responsibilities with the central, state and district government to avoid overlap of functions. The city adopted smart grid integration to make intelligent infrastructure and subsidized initiatives to make the city livable.&lt;/li&gt;
&lt;li&gt;GIFT City, Gujarat: This is an ICT based sustainable city which is a Greenfield development. It is strategically situated. One of the major features of the City is a utility tunnel for providing repair services and the top of the tunnel can be utilized as a walking/jogging track. The city has smart fire safety measures, wide roads to control traffic, smart regulations.&lt;/li&gt;
&lt;li&gt;TEL AVIV Smart City, Israel: It has been named as the Mediterranean cool city with young and free spirted people. The city comprises of creative class with 3 T’s-talent, technology and tolerance. The city welcomes startups and focuses on G2G, G2C and C2C initiatives by adopting technologically equipped initiatives for effective governance and community building programmes.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event saw participation from people across various sectors including Government Representatives of Ministries, Municipalities, Regulatory Authorities, as well as Project Management Companies, Engineers, Architects, Consultants, Handpicked Technology Solution Providers and Researchers.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Foundation for Futuristic Cities:&lt;/b&gt; The conference saw participation from this think tank based out of Hyderabad working on establishing vibrant smart cities for a vibrant India. They are currently working on developing a "Smart City Protocol" for Indian cities collaborating with Technology, Government and Corporate partners by making a framework for Smart Cities, Big Data and predictive analytics for safe cities, City Sentiment Analysis, Situation Awareness Tools and mobile Apps for better city life by way of Hackathons and Devthons.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Centre for SMART cities, Bangalore:&lt;/b&gt; This is a research organization which aims to address the challenge of collaborating and sharing knowledge, resources and best practices that exist both in the private sector and governments/municipal bodies in a usable form and format.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;BDP – India (Studio Leader – Urbanism): &lt;/b&gt;The Organization is based out of Delhi and is involved in providing services relating to master planning, urbanism, design and landscape design. The team includes interior designers, engineers, urbanists, sustainability experts, lighting designers, etc. The vision is to help build and create high quality, effective and inspiring built spaces.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;UN Women: &lt;/b&gt;It is a United Nations Organization working on gender equality, women empowerment and elimination of discrimination. They strive to strengthen rights of women by working with women, men, feminists, women’s networks, governments, local authorities and civil society to create national strategies to advance gender equality in line with national and international priorities. The UN negotiated the 2030 Agenda for Sustainable Development in August 2015 (which would be formally adopted by World leaders in September 2015) and it feature 17 sustainable development goals, one of them being achievement of gender equality and empowerment of all women and girls.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Elematic India Pvt. Ltd.: &lt;/b&gt;The Company is a leading supplier of precast concrete technology worldwide providing smart solutions for concrete buildings to help enable build smart cities with safe infrastructure.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event discussed in great detail about what a smart city would look like in a country like India where every city has different demographics, needs and resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Participants had a mutual understanding that a city is not gauged by its length and width, but by the broadness of its vision and height of its dream. The initiative of creating smart cities would echo across the country as a whole and would not be limited to the urban centers. Hence, the plan must be inclusive in implementation and right from its inception, the people and their needs must be given due consideration to make it a success. The issue of the road ahead was resonating in the minds of many, as to how would this exactly happen. Hence, the first step, as was suggested by the experts, was to involve the citizens by primarily informing them, taking their suggestions and planning the project for every city accordingly. While focusing on cities which would be made better by human ingenuity and technology, along with building mechanism for housing, commerce, transportation and utilities, it must not be forgotten that technology is timely, but culture is timeless. The cities must not be faceless and community space must be built with walkable spaces with smart utilization of limited resources. Also, it must be ensured that the cities do not cater to the needs of the elite and skilled population, but also the less privileged community. Adequate urban mapping must be done to ensure placement for community facilities, such as restrooms, trash bins, and information kiosks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A story shared from personal experience by an expert Architect in building Green infrastructure was highly instrumental in setting the tone of the conference and is bound to stay with many of the participants. The son of the Architect, a small child from Baroda left his father speechless when he questioned him about the absence of butterflies from the Big City of Mumbai since he used to play with butterflies every morning in his hometown in Gujarat. The incident was genuinely thought provoking and left every architect, government representative and engineer thinking that before they step on to build a smart cities with technologically equipped infrastructure and utilities - can we, as a country, come together and ensure to build a smart city with butterflies? Can we pay equal attention to sustainability, environment and requirements of a community in the smart city that is envisioned by the Government to make the city livable and inclusive?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions that I, as a participant, am left with are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Building a Greenfield project is comparatively easier than upgrading the existing cities into Smart ones, which requires planning and optimum utilization of resources. The role of local bodies needs to be strengthened which would primarily require skilled workforce, beginning from planning to execution. Therefore, what must be done to make the current cities “Smarter” and how encourage and fund ordinary citizens to redefine and prioritize local needs?&lt;/li&gt;
&lt;li&gt;The conference touched upon the need for a well-planned policy framework to govern the smart cities; however, what was missing was a discussion on the kind of policies that would be required for every city to ensure governance and monitor the operations. Chalking out well thought of urban policies is the first step towards implementation of the Project and requires deliberation in this regard.&lt;/li&gt;
&lt;li&gt;The Government plans seem to cater to the needs of a handful of sections of the society and must focus on safety of women, chalk out initiatives to build basic utilities like public toilets, plan the infrastructure keeping in mind the disabled individuals, etc. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This is of paramount importance since it is necessary for the Government to consider who would be the potential inhabitants of these future smart cities and what would be their particular needs. Before the cities are made better by use of technology, there is a requirement of more toilets as a basic utility. Thus, instead of focusing on technological advancement as the sole foundation to make lives of the people easy, the cities must have provision of utilities which are accessible to develop livable smart cities. Hence, what measures would the Government and other bodies involved in the plan take to ensure that the urban enclaves would not oversee the under privileged class?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another issue that went unnoticed during the two-day event was pertaining to the Fundamental Rights of individuals within the city. For example, the right of privacy, right to access services and utilities, right to security, etc. These basic rights must be given due recognition by the smart city developers to uphold the spirit of these internationally accepted Human Rights principles. Therefore, it is important to ask how these future cities are going to address the rights of its people in the cities?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from plans of working on waste management, another important factor that must not be overlooked is sustainability in terms of maximization of the available resources in the best possible ways and techniques to be adopted to stop the fast paced degradation of the environment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conference could suggest more solutions to adopt measures like rain water harvesting, better sewage management in the existing cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, the importance of big data in building the smart cities was emphasized by many experts. However, the question of regulation of data being generated and released was not talked about. Use of big data analytics involves massive streaming of data which required regulation and control over its use and generation to ensure such information is not misutilised in any way. In such a scenario, how would these cities regulate and govern big data techniques to make the infrastructure and utilities technologically efficient on one hand, but also to use the large data sets in a monitored fashion on the other?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An answer to these crucial issues and questions would have brought about a lot of clarity in minds of all the officials, planners and the potential residents of the Smart Cities in India.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; 2014 revision of the World Urbanization Prospects, United Nations, Department of Economic and Social Affairs, July 2014, Available at : http://www.un.org/en/development/desa/publications/2014-revision-world-urbanization-prospects.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Smart Cities, Mission Statement and Guidelines, Ministry of Urban Development, Government of India, June 2015, Available at : http://smartcities.gov.in/writereaddata/SmartCityGuidelines.pdf&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore'&gt;https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-21T02:24:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing">
    <title>Outrage before sharing</title>
    <link>https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing</link>
    <description>
        &lt;b&gt;Has the social media converted people into a lynch mob that seeks out justice and passes judgement instantly, without bothering to hear both sides of the story? &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nikhil Varma was &lt;a class="external-link" href="http://m.thehindu.com/features/metroplus/outrage-before-sharing/article7633402.ece"&gt;published in the Hindu on September 9, 2015&lt;/a&gt;. Rohini Lakshané was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Internet has changed the way we communicate in more ways than we can  imagine. Apart from being a medium to share pictures and updates with  family and friends, social media has also become an arena where  political debates are a commonplace and people are quick to make  judgements. The social media space has become one where superlatives are  commonly used and videos or conversations about inappropriate behaviour  or even a tweet or Facebook post has a tendency to go viral and  snowball into a shaming of the individual or organisation in question,  without bothering to hear out the other side of the story. Outraging can  be over anything, from the faults of the Government, to lay people who  sometimes find themselves the subject of an online shaming campaign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, an FB user put up pictures of a person, who she claimed  misbehaved with her on a street in Delhi. Within a few hours, the man’s  picture went viral and he was arrested by the police, even as he was  called names and abused on social media networks. A few days later,  eyewitness accounts corroborated the man’s account of the incident. The  response online now put the girl at fault and blamed her for  politicising the issue. The initial response to the video of the Rohtak  sisters bashing up alleged molesters also saw the outrage shifting  sides.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How does one deal with people making judgements with a click of a  button? Does online shaming dent the chances of people getting justice  in genuine cases of assault?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohini Lakshané, a researcher at the Centre for Internet and Society  says, “Online, public shaming is a useful and often effective strategy  for calling out unacceptable behaviour when recourse to other remedies  is tedious, time-consuming, or non-existent. Its flipside is that  shaming online could lead to mob justice or a witch-hunt. The onus  should be on the viewers or readers of such an act of shaming to not  take the law into their own hands and on the news media to do their  basic duty of checking facts before publishing or broadcasting  anything.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She adds, “People use social networking sites, among other things, as  verandas where they can gather gossip, and talk about their interests.  If people jumping the gun and being judgemental offline isn’t a cause  for concern, I don’t see why it should be when it happens online.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On checks, Rohini contends, “They would not be in the interest of free  speech. It would, of course, make a difference if social media users  paused to think.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;V. Shakti, Social Media and Branding Professional, points out that the  mass adoption of social media platforms has had positive and negative  effects. “It has ensured that anyone can reach out and get any  information. The flip side is that this power to reach millions needs to  be handled with care and responsibility. The Jasleen Kaur incident is a  glaring reflection. Such is the mindset of people online that anyone  who is shamed is assumed guilty and derided. Sometimes the shaming does  permanent damage to the target and the effects are life-long. The minute  Jasleen posted a picture online, even the media jumped in calling the  guy a ‘pervert’, if this were some other country, they would be sued. We  need to understand that un-shaming is not an option and hence be  careful when throwing mud at someone online. Remember, it could be you  tomorrow. Think, verify and then act. Like I always say, there are three  sides to every story - yours, mine and the truth.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For psychiatrist and Integrative medicine specialist Shyam Bhatt, online  shaming is a combination of a sense of mob justice and the feeling of  participating in a cause. “It is easy to sign up for a cause online, you  can click share and feel good about yourself. People also tend to get  swayed by what their friend circles are talking about.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media user Praveen Rao feels an attempt to feel involved with causes is responsible for this phenomenon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is important for people to check the authenticity and wait for a  clear picture to emerge before talking about something. However, in the  rush to appear clued in, people tend to share anything that goes viral,  without pausing to think if someone’s life could be ruined. It is a good  tool to call out genuine cases of misbehaviour and assault, but mob  justice should be avoided.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing'&gt;https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-20T17:08:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-12-revenues">
    <title>DIDP Request #12: Revenues</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-12-revenues</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) sought information from ICANN on their revenue streams by sending them a second request under their Documentary Information Disclosure Policy. This request and their response have been described in this blog post.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;CIS Request&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;22 July 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Cherine Chalaby, Chair, Finance Committee of the Board&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Xavier Calvez, Chief Financial Officer&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Samiran Gupta, ICANN India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All other members of Staff involved in accounting and financial tasks&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Sub: Raw data with respect to granular income/revenue statements of ICANN from 1999-2011&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We  would  like  to  thank  ICAN  for  their  prompt  response  to  our  earlier  requests.  We appreciate that the granular Revenue Details  for FY14  have been  posted online.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; We also appreciate that a similar  document  has  been  posted  for  FY13.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And  we  hope  that  one  for  FY12  would  be  posted soon, as noted by you in your Response to our Request No. 20141222-1.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As also noted by you in the same request, similar reports cannot be prepared for FY99 to  FY11 since “[i]t would be extremely time consuming and overly burdensome to cull through the raw data in order to compile the reports for the prior years”.&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, it was also mentioned that the “relevant information is available in other public available documents”.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, we  would like to request  for the raw  data for years FY99 to FY11, for our research on accountability  and  transparency  mechanisms  in  Internet  governance,  specifically  of  ICANN. Additionally,  we  would  also  like  to  request  for  the links  to  such  public  documents where the information is available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We look forward to the receipt of this information within the stipulated period of 30 days. Please feel free to contact us in the event of any doubts regarding our queries. &lt;br /&gt;Thank you very much. &lt;br /&gt;Warm regards, &lt;br /&gt;Aditya Garg,  &lt;br /&gt;I Year, National Law University, Delhi &lt;br /&gt;For Centre for Internet &amp;amp; Society &lt;br /&gt;W: http://cis-india.org&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;ICANN Response&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;ICANN referred to our earlier DIDP request (see &lt;a href="https://www.icann.org/resources/pages/20141222-1-2015-01-22-en"&gt;here&lt;/a&gt;) where we had sought for a detailed report of their granular income and revenue statements from 1999-2014. They refused to disclose the data on grounds that it would be ‘time consuming’ and ‘overly burdensome’, which is a ground for refusal as per their exceptions to disclosure.&lt;/p&gt;
&lt;p&gt;Our request may be found &lt;a href="https://www.icann.org/en/system/files/files/didp-request-20150722-2-redacted-22jul15-en.pdf"&gt;here&lt;/a&gt;, and their response is linked to &lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150722-2-21aug15-en.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See &lt;i&gt;FY14 Revenue Detail By Source&lt;/i&gt;, https://www.icann.org/en/system/files/files/fy2014-revenue-source-01may15-en.pdf.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. See FY13 Revenue Detail By Source, https://www.icann.org/en/system/files/files/fy2013-revenue-source-01may15-en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;Response to Documentary Information Disclosure Policy Request No. 20141222-1&lt;/i&gt;, https://www.icann.org/en/system/files/files/cis-response-21jan15-en.pdf.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;i&gt;Id&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. See &lt;i&gt;Response to Documentary Information Disclosure Policy Request No. 20141222-1&lt;/i&gt;, https://www.icann.org/en/system/files/files/cis-response-21jan15-en.pdf.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-12-revenues'&gt;https://cis-india.org/internet-governance/blog/didp-request-12-revenues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditya Garg</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-14T15:32:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-11-netmundial-principles">
    <title>DIDP Request #11: NETmundial Principles</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-11-netmundial-principles</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) followed up on the implementation of the NETmundial Principles that ICANN has been endorsing by sending them a second request under their Documentary Information Disclosure Policy. This request and their response have been described in this blog post. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;22 July 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Fadi Chehade, CEO and President&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Steve Crocker, Chairman of the Board&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Cherine Chalaby, Chair, Finance Committee of the Board&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Xavier Calvez, Chief Financial Officer&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Sub: Details of documents within ICANN regarding implementation of NETmundial Principles and documents modified within ICANN as a result of the same&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It  is  our  understanding  that  ICANN  is  one  of  the founding  members  of  the  NETmundial Initiative. And hence, it has been credited in the public forum for championing the Initiative.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr.  Fadi  Chehade,  CEO  and  President  of  ICANN,  has  maintained  that  it  is  time  for  the  global community to act and implement the Principles set forth in the initiative.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN itself, in response to one of our earlier requests, has acknowledged that "NETmundial Principles are high-level statements that permeate through the work of any entity –particularly a multistakeholder entity like ICANN."&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We,  therefore,  request  for  all  existing  documents  within  ICANN  which  represent  its  efforts  to implement  the  NETmundial  Principles  within  its  working.  Additionally, we would  also  want  to request  for  all  the  documents  which  were  modified  as  the  result  of  ICANN’s support of the NETmundial Initiave, highlighting the modification so made.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We look forward to the receipt of this information within the stipulated period of 30 days. Please feel free to contact us in the event of any doubts regarding our queries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thank you very much.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Warm regards,&lt;br /&gt;Aditya Garg,&lt;br /&gt;1st Year, National Law University, Delhi for Centre for Internet &amp;amp; Society&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;ICANN Response&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;ICANN in their response pointed to an earlier DIDP request that we had sent in, and they replied along the same lines. They brought to our attention that ICANN was not responsible for the implementation of the NETMundial Principles, despite it being one of the founding members of the Initiative. They reiterated their earlier statement of ICANN not being the “…&lt;i&gt;home for implementation of the NETmundial Principles or the evolution of multistakeholder participation in Internet governance.&lt;/i&gt;”  They have failed to provide us with documentary proof of the implementation of these principles, and have only pointed to statements which indicate a potential prospective adoption of said the initiative &lt;a href="#fn4" name="fr4"&gt;[4]; &lt;/a&gt;the responses have been near identical to those for the earlier DIDP request, which you can find &lt;a href="https://www.icann.org/en/system/files/files/cis-netmundial-response-27jan15-en.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, ICANN claims that the information we seek falls within the scope of the exceptions to disclosure they lay down, as it is not within their operational activities, an explanation that fails to satisfy us. As always, they have used the wide scope of their non-disclosure policy to avoid providing us with the requisite information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The request can be found &lt;a href="https://www.icann.org/en/system/files/files/didp-request-20150722-1-redacted-22jul15-en.pdf"&gt;here&lt;/a&gt;, and ICANN’s response has been linked &lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150722-1-21aug15-en.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See McCarthy, I’m Begging You To Join, The Register (12 December 2014), http://www.theregister.co.uk/2014/12/12/im_begging_you_to_join_netmundial_initiative_gets_desperate/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. See NETmundial Initiative Goes Live, Gobal Internet Community Invited to Participate (Press Release), https://www.netmundial.org/press-release-1&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See Response to Documentary Information Disclosure Policy Request No. 20141228-1-NETmundial, https://www.icann.org/en/system/files/files/cis-netmundial-response-27jan15-en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Such as Objective 4.3 of their Strategic Five Year Plan. “&lt;i&gt;Demonstrate leadership by implementing best practices in multistakeholder mechanisms within the distributed Internet governance ecosystem while encouraging all stakeholders to implement the principles endorsed at NETmundial&lt;/i&gt;” at https://www.icann.org/en/system/files/files/strategic-plan-2016-2020-10oct14-en.pdf&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-11-netmundial-principles'&gt;https://cis-india.org/internet-governance/blog/didp-request-11-netmundial-principles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditya Garg</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-14T15:08:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-on-ccwg-accountability-2nd-draft-proposal-on-work-stream-1-recommendations">
    <title>CIS Submission on CCWG-Accountability 2nd Draft Proposal on Work Stream 1 Recommendations</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-on-ccwg-accountability-2nd-draft-proposal-on-work-stream-1-recommendations</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) submitted the below to ICANN's CCWG-Accountability.&lt;/b&gt;
        &lt;p&gt;The CCWG Accountability proposal is longer than many countries' constitutions.  Given that, we will keep our comments brief, addressing a very limited set of the issues in very broad terms.&lt;/p&gt;
&lt;h3&gt;Human Rights&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ICANN is unique in many ways.  It is a global regulator that has powers of taxation to fund its own operation.  ICANN is not a mere corporation. For such a regulator, ensuring fair process (what is often referred to as "natural justice") as well as substantive human rights (such as the freedom of expression, right against discrimination, right to privacy, and cultural diversity), are important.  Given this, the narrow framing of "free expression and the free flow of information" in Option 1, we believe Option 2 is preferable.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Diversity&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are glad that diversity is being recognized as an important principle.  As we noted during the open floor session at ICANN49: [We are] extremely concerned about the accountability of ICANN to the global community.  Due to various decisions made by the US government relating to ICANN's birth, ICANN has had a troubled history with legitimacy.  While it has managed to gain and retain the confidence of the technical community, it still lacks political legitimacy due to its history.  The NTIA's decision has presented us an opportunity to correct this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, ICANN can't hope to do so without going beyond the current ICANN community, which while nominally being 'multistakeholder' and open to all, grossly under-represents those parts of the world that aren't North America and Western Europe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the 1010 ICANN-accredited registrars, 624 are from the United States, and 7 from the 54 countries of Africa.  In a session yesterday, a large number of the policies that favour entrenched incumbents from richer countries were discussed.  But without adequate representation from poorer countries, and adequate representation from the rest of the world's Internet population, there is no hope of changing these policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is true not just of the business sector, but of all the 'stakeholders' that are part of global Internet policymaking, whether they follow the ICANN multistakeholder model or another.  A look at the board members of the Internet Architecture Board, for instance, would reveal how skewed the technical community can be, whether in terms of geographic or gender diversity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Without greater diversity within the global Internet policymaking communities, there is no hope of equity, respect for human rights — civil, political, cultural, social and economic — and democratic functioning, no matter how 'open' the processes seem to be, and no hope of ICANN accountability either.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, there are those who are concerned that diversity should not prevail over skill and experience.  Those who have the greatest skill and experience will be those who are insiders in the ICANN system.  To believe that being an insider in the ICANN system ought to be privileged over diversity is wrong.  A call for diversity isn't just political correctness.  It is essential for legitimacy of ICANN as a globally-representative body, and not just one where the developed world (primarily US-based persons) makes policies for the whole globe, which is what it has so far been.  Of course, this cannot be corrected overnight, but it is crucial that this be a central focus of the accountability initiative.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jurisdiction, Membership Models and Voting Rights&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Sole-Member Community Mechanism (SMCM) that has been proposed seems in large part the best manner provided under Californian law relating to public benefit corporations of dealing with accountability issues, and is the lynchpin of the whole accountability mechanism under workstream.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the jurisdictional analysis laid down in 11.3 will only be completed post-transition, as part of workstream. Thus the SMCM may not necessarily be the best model under a different legal jurisdiction. It would be useful to discuss the dependency between these more clearly.  In this vein, it is essential that the Article XVIII Section 1 not be designated a fundamental bylaw.  Further, it would be useful to add that for some limited aspects of the transition (such as IANA functioning), ICANN should seek to enter into a host country agreement to provide legal immunity, thus providing a qualification to para 125 ("ICANN accountability requires compliance with applicable legislation, in jurisdictions where it operates.") since the IANA functions operator ought not be forced by a country not to honour requests made by, for example, North Korea.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should also be noted that accountability needs independence, which may be of two kinds: independence of financial source, and independence of appointment.  From what one could gather from the CCWG proposal, the Independent Review Panel will be funded by the budget the ICANN Board prepares, while the appointment process is still unclear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the most important accountability mechanisms with regard to the IANA functions is that of changing the IANA Functions Operator.  As per the CWG Stewardship's current proposal, the "Post-Transition IANA" won't be an entity that is independent of ICANN.  If the PTI's governance is permanently made part of ICANN's fundamental bylaws (as an affiliate controlled by ICANN), how is it proposed that the IFO be moved from PTI to some other entity if the IANA Functions Review Team so decides? Additionally, for such an important function, the composition of the IFRT should not be left unspecified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is welcome that a separation is proposed between the IANA budget and budget for rest of ICANN's functioning, the current discussion around budgets seems to be based on the assumption that all IANA functions will be funded by ICANN, whereas if the IANA functions are separated, each community might fund it separately.  That provides two levels of insulation to IANA functions operator(s): separate sources of operational revenue, as well as separate budgets within ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should be noted that there have been some responses that express concern about the shifting of existing power structures within ICANN through some of the proposed alternative voting allocations in the SMCM. However, rather than present arguments as to why these shifts would be beneficial or harmful for ICANN's overall accountability, these responses seem to assume that shift from the current power structures are harmful.  This is an unfounded assumption and cannot be a valid reason, nor can speculation of how the United States Congress will behave be a valid reason for rejecting an otherwise valid proposal.  If there are harms, they ought to be clearly articulated: shifts from the status quo and fear of the US Congress aren't valid harms.  Thus, while it is important to consider how different voting rights models might change the status quo while arriving at any judgments, that cannot be the sole criterion for judgment of its merits.  Further, as the French government notes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[T]he French Government still considers that linking Stress Test 18 to a risk of capture of ICANN by governments and NTIA’s requirement that no “government-led or intergovernmental organization solution would be acceptable”, makes no sense. . . . Logically, the risk of capture of ICANN by governments in the future is as low as it is now and in any case, it cannot lead to a “government-led or intergovernmental organization solution”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While dealing with the question of relative voting proportions, the community must remembered that not all parts of the world are equally developed with regard to the domain name industry and with respect to civil society as those countries in North America, Western Europe, and other developed nations, and thus may not find adequate representation via the SOs.  In many parts of the world, civil society organizations — especially those focussed on Internet governance and domain name policies — are non-existent.  Thus a system that privileges the SOs to the exclusion of other components of a multistakeholder governance model would not be representative or diverse.  A multistakeholder model cannot disproportionately represent business interests over all other interests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this regard, the comments of former ICANN Chairperson, Rod Beckstrom, at ICANN43 ought to be recalled:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN must be able to act for the public good while placing commercial and financial interests in the appropriate context . . . How can it do this if all top leadership is from the very domain name industry it is supposed to coordinate independently?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Kieren McCarthy points out about ICANN:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Board does have too many conflicted members&lt;br /&gt;The NomCom is full of conflicts&lt;br /&gt;There are not enough independent voices within the organization&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reforms in these ought to be as crucial to accountability as the membership model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current mechanisms for ensuring transparency, such as the DIDP process, are wholly inadequate.  We have summarized our experience with the DIDP process, and how often we were denied information on baseless grounds in this &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/table-of-cis-didp-requests"&gt;table&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-on-ccwg-accountability-2nd-draft-proposal-on-work-stream-1-recommendations'&gt;https://cis-india.org/internet-governance/blog/cis-submission-on-ccwg-accountability-2nd-draft-proposal-on-work-stream-1-recommendations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-23T14:58:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-multi-stakeholder-cooperation">
    <title>Transnational Due Process: A Case Study in Multi-stakeholder Cooperation </title>
    <link>https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-multi-stakeholder-cooperation</link>
    <description>
        &lt;b&gt;The Internet &amp; Jurisdiction Project is organizing the workshop “Transnational due process: A case study in multi-stakeholder cooperation” at the Internet Governance Forum convened by the United Nations on November 10-13, 2015. Sunil Abraham will be a speaker in this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Multi-stakeholder cooperation is  necessary to develop and implement operational solutions to Internet  Governance challenges. One such challenge is the tension between the  cross-border nature of the Internet and diverse national jurisdictions.  As a result, direct requests are increasingly addressed by public  authorities and courts in one country to Internet platforms and DNS  operators in other jurisdictions for domain seizures, content takedowns  and user identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since 2012, the Internet &amp;amp;  Jurisdiction Project facilitates a multi-stakeholder dialogue process on  this issue. More than 80 entities have collaboratively produced a draft  transnational due process framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The roundtable at the Internet  Governance Forum 20125 will gather participants in the I&amp;amp;J Project  from different stakeholder groups to report on the progress of the  Internet &amp;amp; Jurisdiction process and talk about:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;the method employed to develop this framework, challenges encountered and solutions found&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;the potential distribution of roles among the respective stakeholders in the operation of the diverse framework components&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Participants&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;ANNE CARBLANC, Head of Division, Directorate for Science, Technology and Industry, OECD&lt;/li&gt;
&lt;li&gt;EILEEN DONAHUE, Director Global Affairs, Human Rights Watch&lt;/li&gt;
&lt;li&gt;BYRON HOLLAND, President and CEO, CIRA (Canadian ccTLD)&lt;/li&gt;
&lt;li&gt;CHRISTOPHER PAINTER, Coordinator for Cyber Issues, US Department of State&lt;/li&gt;
&lt;li&gt;SUNIL ABRAHAM, Executive Director, CIS India&lt;/li&gt;
&lt;li&gt;ALICE MUNYUA, Lead dotAfrica Initiative and GAC representative, African Union Commission&lt;/li&gt;
&lt;li&gt;Speaker tbc, Google&lt;/li&gt;
&lt;li&gt;FRANK LaRUE, Former UN Special Rapporteur for Freedom of Expression&lt;/li&gt;
&lt;li&gt;Speaker tbc, German Federal Foreign Office&lt;/li&gt;
&lt;li&gt;HARTMUT GLASER, Executive Secretary, Brazilian Internet Steering Committee&lt;/li&gt;
&lt;li&gt;MATT PERAULT, Head of Policy Development, Facebook&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://www.internetjurisdiction.net/ij-project-workshop-at-internet-governance-forum-2015/"&gt;published on the website of Internet &amp;amp; Jurisdiction&lt;/a&gt; Also see this on &lt;a class="external-link" href="http://igf2015.sched.org/event/c5aca9d5712654402e069bbe2dd97eb2?iframe=no&amp;amp;w=i:0;&amp;amp;sidebar=yes&amp;amp;bg=no#.Vj4RWl58hQo"&gt;IGF website&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-multi-stakeholder-cooperation'&gt;https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-multi-stakeholder-cooperation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-07T15:47:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015">
    <title>Bangalore Chapter Meet of DSCI</title>
    <link>https://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) will host the Bangalore Chapter Meeting of Data Security Council of India (DSCI) on September 26, 2015 at its Bangalore office in Domlur. The event will be held from 2.30 p.m. to 5.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;After the Nasscom cyber security task force meeting held at Wipro in June, followed by DSCI Best Practices meet in July, we now have the next chapter meeting at CIS.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Speakers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first speaker will be &lt;b&gt;Melissa Hathaway, Commissioner, Global Commission for Internet Governance&lt;/b&gt;. She is an internationally distinguished cyber security expert and has worked as cyber security adviser in two US Presidential Administrations, and is the former acting Senior Director for cyberspace at the National Security Council in the US. The topic she will be speaking on is "&lt;a href="https://cis-india.org/internet-governance/blog/connected-choices" class="external-link"&gt;Connected Choices&lt;/a&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second speaker will be &lt;b&gt;Sunil Abraham, Executive Director, CIS&lt;/b&gt; (Center for internet &amp;amp; Society). Sunil is a renowned thought leader when it comes to internet governance, cyber space &amp;amp; its interface with civil society and actively contributes to DSCI and other forums. He will  be presenting on "&lt;a href="https://cis-india.org/internet-governance/blog/anonymity-in-cyberspace" class="external-link"&gt;Anonymity in Cyberspace&lt;/a&gt;" - the SIG that he led over last 8 months along with a diverse group of members from the industry in Bangalore.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Topic&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.30 p.m. - 2.45 p.m.&lt;/td&gt;
&lt;td&gt;Recent Developments and Updates from DSCI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.45 p.m. - 4.00 p.m.&lt;/td&gt;
&lt;td&gt;Srinivas P. (Anchor): DSCI Bangalore Chapter&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.00 p.m. - 5.00 p.m.&lt;/td&gt;
&lt;td&gt;Melissa Hathaway: Connected Choices&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.00 p.m. - 5.30 p.m.&lt;/td&gt;
&lt;td&gt;Sunil Abraham: Anonymity in Cyberspace&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This will be followed by High Tea &amp;amp; Networking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For participation, please send your email confirmation to Rajesh of Infosys at &lt;a class="mail-link" href="mailto:Rajesh_K18@infosys.com"&gt;Rajesh_K18@infosys.com&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since seats are limited, the participation will be restricted to first 50 confirmations. We had to organize it on a Saturday, due to Melissa’s availability – I’m sure many of you who know about her as expert security speaker, will not see weekend as a constraint to attend. Look forward to meeting you at CIS.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015'&gt;https://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-09T01:40:56Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015">
    <title>Human DNA Profiling Bill 2012 v/s 2015 Bill</title>
    <link>https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015</link>
    <description>
        &lt;b&gt;This entry analyses the Human DNA Profiling Bill introduced in 2012 with the provisions of the 2015 Bill &lt;/b&gt;
        &lt;p&gt;A comparison of changes that have been introduced in the	&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;Human DNA Profiling Bill, June 2015.&lt;/a&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Definitions:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;1. 2012 Bill: The definition of "&lt;span style="text-decoration: underline;"&gt;analytical procedure&lt;/span&gt;" was included under clause 2 (1) (a) and was defined as an orderly step by step procedure 	designed to ensure operational uniformity.&lt;/p&gt;
&lt;p&gt;2015 Bill: This definition has been included under the Explanation under clause 22 which provides for measures to be taken by DNA Laboratory.&lt;/p&gt;
&lt;p&gt;2. 2012 Bill: The definition of "&lt;span style="text-decoration: underline;"&gt;audit&lt;/span&gt;" was earlier defined under clause 2 (1) (b) and was defined as an inspection used to evaluate, confirm or 	verify activity related to quality.&lt;/p&gt;
&lt;p&gt;2015 Bill: This definition has been included under the Explanation under clause 22 which provides for measures to be taken by DNA Laboratory.&lt;/p&gt;
&lt;p&gt;3. 2012 Bill: There was no definition of "&lt;span style="text-decoration: underline;"&gt;bodily substance&lt;/span&gt;".&lt;/p&gt;
&lt;p&gt;2015 Bill: Clause 2(1) (b) defines bodily substance to be any biological material of or from a body of the person (whether living or dead) and includes 	intimate/non-intimate body samples as well.&lt;/p&gt;
&lt;p&gt;4. 2012 Bill: The definition of "&lt;span style="text-decoration: underline;"&gt;calibration&lt;/span&gt;" was included under clause 2 (1) (d) in the previous Bill.&lt;/p&gt;
&lt;p&gt;2015 Bill: The definition has been removed from the definition clause and has been included as an explanation under clause 22.&lt;/p&gt;
&lt;p&gt;5. 2012 Bill: Previously "&lt;span style="text-decoration: underline;"&gt;DNA Data Bank&lt;/span&gt;" was defined under clause 2(1)(h) as a consolidated DNA profile storage and maintenance facility, whether in 	computerized or other form, containing the indices as mentioned in the Bill.&lt;/p&gt;
&lt;p&gt;2015 Bill: However, in this version, the definition has been briefed under clause 2(1) (f) to mean as a DNA Data Bank as established under clause 24.&lt;/p&gt;
&lt;p&gt;6. 2012 Bill: Previously a "&lt;span style="text-decoration: underline;"&gt;DNA Data Bank Manager&lt;/span&gt;" was defined clause 2(1) (i) as the person responsible for supervision, execution and maintenance 	of the DNA Data Bank.&lt;/p&gt;
&lt;p&gt;2015 Bill: In the new Bill, it is defined clause 2(1) (g) as a person appointed under clause 26.&lt;/p&gt;
&lt;p&gt;7. 2012 Bill: Under clause 2(1) (j), the definition of "&lt;span style="text-decoration: underline;"&gt;DNA laboratory&lt;/span&gt;" was defined to be any laboratory established to perform DNA procedures.&lt;/p&gt;
&lt;p&gt;8. 2015 Bill: Under clause 2(1) (h) "DNA laboratory" has been now defined to be any laboratory established to perform DNA profiling.&lt;/p&gt;
&lt;p&gt;9. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;DNA procedure&lt;/span&gt;" was defined under clause 2(1) (k) as a procedure to develop DNA profile for use in the applicable instances as 	specified in the Schedule.&lt;/p&gt;
&lt;p&gt;2015 Bill: This definition has been removed from the Bill.&lt;/p&gt;
&lt;p&gt;10. 2012 Bill: There was no definition of "&lt;span style="text-decoration: underline;"&gt;DNA Profiling&lt;/span&gt;".&lt;/p&gt;
&lt;p&gt;2015 Bill: DNA profiling has been defined under clause 2(1) (j) as a procedure to develop DNA profile for human identification.&lt;/p&gt;
&lt;p&gt;11. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;DNA testing&lt;/span&gt;" was defined under clause 2(1) (n) as the identification and evaluation of biological evidence using DNA technologies 	for use in the applicable instances.&lt;/p&gt;
&lt;p&gt;2015 Bill: This definition has been removed.&lt;/p&gt;
&lt;p&gt;12. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;forensic material&lt;/span&gt;" was defined under clause 2(1) (o) as biological material of or from the body of a person living or dead, and 	representing an intimate body sample or non-intimate body sample.&lt;/p&gt;
&lt;p&gt;2015 Bill: This definition has been included under the definition of "bodily substance" under clause 2(1) (b).&lt;/p&gt;
&lt;p&gt;13. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;intimate body sample&lt;/span&gt;" was defined under clause 2(1) (q).&lt;/p&gt;
&lt;p&gt;2015 Bill: This has been removed from the definitions clause and has been included as an explanation under clause 23 which addresses sources and manner of 	collection of samples for DNA profiling.&lt;/p&gt;
&lt;p&gt;14. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;intimate forensic procedure&lt;/span&gt;" was defined under 2(1) (r).&lt;/p&gt;
&lt;p&gt;2015 Bill: This has been removed from the definitions clause and has been included as an explanation under clause 23 which addresses sources and manner of 	collection of samples for DNA profiling.&lt;/p&gt;
&lt;p&gt;15. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;non-intimate body sample&lt;/span&gt;" was defined under clause 2(1) (v) in 2012 Bill.&lt;/p&gt;
&lt;p&gt;2015 Bill: The definition of "non-intimate body sample" has not been included in the definitions clause and has been included as an Explanation under 	clause 23 which addresses sources and manner of collection of samples for DNA profiling.&lt;/p&gt;
&lt;p&gt;16. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;non-intimate forensic procedure&lt;/span&gt;" was defined under clause 2(1) (w) in 2012 Bill.&lt;/p&gt;
&lt;p&gt;2015 Bill: The definition of "non-intimate forensic procedure" has not been included in the definitions clause and has been included as an Explanation 	under clause 23 which addresses sources and manner of collection of samples for DNA profiling.&lt;/p&gt;
&lt;p&gt;17. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;undertrial&lt;/span&gt;" was defined under clause 2(1) (zk) as a person against whom a criminal proceeding is pending in a court of law.&lt;/p&gt;
&lt;p&gt;2015 Bill: The definition now states such a person against whom charges have been framed for a specified offence in a court of law under clause 2(1) (zc).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;DNA Profiling Board:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;1. 2012 Bill: Under clause 4 (a), the Bill stated that a renowned molecular biologist must be appointed as the Chairperson.&lt;/p&gt;
&lt;p&gt;2015 Bill: Under clause 4 addressing Composition of the Board, the Bill states that the Board shall consist of a Chairperson who shall be appointed by the 	Central Government and must have at least fifteen years' experience in the field of biological sciences.&lt;/p&gt;
&lt;p&gt;2. 2012 Bill: Under clause 4 (i), the Chairman of National Bioethics Committee of Department of Biotechnology, Government of India was to be included as a 	member under the DNA Profiling Board.&lt;/p&gt;
&lt;p&gt;2015 Bill: This member has been removed from the composition.&lt;/p&gt;
&lt;p&gt;3. 2012 Bill: Under clause 4 (m), the term of 1 person from the field of genetics was not mentioned in the 2012 Bill.&lt;/p&gt;
&lt;p&gt;2015 Bill: In this Bill under clause 4 (m), it has been stated that such a person must have minimum experience of twelve years in the field.&lt;/p&gt;
&lt;p&gt;4. 2012 Bill: The term of 2 people from the field of biological sciences was not mentioned in the 2012 Bill under clause 4 (l).&lt;/p&gt;
&lt;p&gt;2015 Bill: Under clause 4 (l), it has been stated that such 2 people must have minimum experience of twelve years in the field.&lt;/p&gt;
&lt;p&gt;5. The following members have been included in the 2015 Bill-&lt;/p&gt;
&lt;p&gt;i. Chairman of National Human Rights Commission or his nominees, as an ex-officio member under clause 4 (a).&lt;/p&gt;
&lt;p&gt;ii. Secretary to Government of India, Ministry of Law and Justice or his nominees (not below rank of Joint Secretary), as an ex-officio member under clause 	4 (b).&lt;/p&gt;
&lt;p&gt;6. 2012 Bill: Under clause 5, the term of the members was not uniform and varied for all members.&lt;/p&gt;
&lt;p&gt;2015 Bill: The term of people from the field of biological sciences and the person from the field of genetics has been states to be five years from the 	date of their entering upon the office, and would be eligible for re-appointment for not more than 2 consecutive terms.&lt;/p&gt;
&lt;p&gt;Also, the age of a Chairperson or a member cannot exceed seventy years.&lt;/p&gt;
&lt;p&gt;The term of members under clauses (c), (f), (h), and (i) of clause 4 is 3 years and for others the term shall continue as long as they hold the office.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Chief Executive Officer:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;/b&gt; 2012 Bill: Earlier it was stated in the Bill under clause 10 (3) that such a person should be a scientist with understanding of genetics and molecular 	biology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The Bill states under clause 11 (3) that the CEO shall be a person possessing qualifications and experience in science or as specified under 	regulations. The specific experience has been removed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A new clause- 12(5) addresses power of the Board to co-opt the number of people for attending the meetings and take part in proceedings; however such a 	person shall be devoid of voting rights. Also, such a person shall be entitled to specified allowances for attending the meetings.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Officers and Other Employees of Board:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The Bill stated under clause 11 (3) that the Board may appoint consultants required to assist in the discharge of its functions on such terms 	and conditions as may be specified by the regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The 2015 Bill states under clause 12 (3) that the Board may appoint experts to assist for discharging its functions and may hold consultations 	with people whose rights may be affected by DNA profiling.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Functions of the Board:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;2012 Bill: 26 functions were stated in the 2012 Bill.&lt;/p&gt;
&lt;p&gt;2015 Bill: The number of the functions has been reduced to 22 with a few changes based on recommendations of Expert Committee.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Power of Board to withdraw approval:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The circumstances in which the Board could withdraw its approval have not been changed from the 2012 Bill (previously under clause 16). There's 	an addition to the list as provided under clause 17 (1) (d) wherein the Board can also withdraw its approval in case the DNA laboratory fails to comply 	with any directions issued by the DNA Profiling Board or any such regulatory Authority under any other Act.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Obligations of DNA Laboratory:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;2015 Bill: There is an addition to the list of obligations to be undertaken by a DNA laboratory under clause 19 (d). The laboratory has an additional 	obligation to share the DNA data prepared and maintained by it with the State DNA Data Bank and the National DNA Data Bank.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Qualification and experience of Head, technical and managerial staff and employees of DNA Laboratory:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The previous Bill clearly mandated under clause 19 (2) the qualifications of the Head of every DNA laboratory to be a person possessing 	educational qualifications of Doctorate in Life Sciences from a recognised University with knowledge and understanding of the foundation of molecular 	genetics as applied to DNA work and such other qualifications as may be specified by regulations made by the Board.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The provision has been generalized and provides under clause 20 (1) for a person to be possess the specified educational qualifications and 	experience.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Measures to be taken by DNA Laboratory:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: In the previous Bill, there were separate clauses with regard to security, minimization of contamination, evidence control system, validation 	process, analytical procedure, equipment calibration and maintenance, audits of laboratory to be followed by a DNA Laboratory.&lt;/p&gt;
&lt;p&gt;2015 Bill: In the 2015 Bill, these measures to be adopted by DNA Laboratory have been included under one clause itself-clause 22.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Infrastructure and training:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The specific provisions regarding infrastructure, fee, recruitment, training and installing of security system in the DNA Laboratory were 	present in the Bill under clauses 28-31.&lt;/p&gt;
&lt;p&gt;2015 Bill: These provisions have been removed from the 2015 Bill.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Sources and manner of collection of samples for DNA profiling:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;2012 Bill: Part II of the Schedule in the Bill provided for sources and manner of collection of samples for DNA Profiling.&lt;/p&gt;
&lt;p&gt;The sources include: Tissue and skeleton remains and Already preserved body fluids and other samples.&lt;/p&gt;
&lt;p&gt;Also, it provided for a list of the manner in which the profiling can be done:&lt;/p&gt;
&lt;p&gt;(1) Medical Examination (2) Autopsy examination (3) Exhumation&lt;/p&gt;
&lt;p&gt;Also, provision for collection of intimate and non-intimate body samples was provided as an Explanation.&lt;/p&gt;
&lt;p&gt;2015 Bill: Under Clause 23, the sources include bodily substances and other sources as specified in Regulations. The other sources remain unchanged.&lt;/p&gt;
&lt;p&gt;Also, provision for collection of intimate and non-intimate body samples is addressed in clause 23(2).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The explanation to the provision states what would be implied by the terms medical practitioner, intimate body sample, intimate forensic procedure, 	non-intimate body sample and non-intimate forensic procedure.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;DNA Data Bank:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;- Establishment:&lt;/p&gt;
&lt;p&gt;2012 Bill: The Bill did not specify any location for establishment of the National DNA Data Bank.&lt;/p&gt;
&lt;p&gt;2015 Bill: The Bill states under clause 24 (1) that the Central Government shall establish a National DNA Data Bank at Hyderabad.&lt;/p&gt;
&lt;p&gt;-Maintenance of indices of DNA Data Bank:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: Apart from the DNA profiles, every DNA Data Bank shall contain the identity of the person from whose body the substances are taken in case of a 	profile in the offenders' index as under clause 32 (6) (a).&lt;/p&gt;
&lt;p&gt;2015 Bill: Clause 25 (2) (a) states that the DNA Data Bank shall contain the identity for the suspects' or offenders' index.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; DNA Data Bank Manager: &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The Bill States under clause 33 (1) that a DNA Data Bank Manger shall be appointed for conducting all operations of the National DNA Data Bank. 	The functions were not specific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The Bill states under clause 26 (1) specifically that a DNA Data Bank Manger shall be appointed for the purposes of execution, maintenance and 	supervision of the National DNA Data Bank.&lt;/p&gt;
&lt;p&gt;- Qualification:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: In the previous Bill, it was stated under clause 33 (3) that the DNA Data Bank Manager must be a scientist with understanding of computer 	applications and statistics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015: The Bill states under clause 26 (2) that the DNA Data Bank Manager must possess educational qualification in science and any such experience as 	prescribed by the regulations.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Officers and other employees of the National DNA Data Bank:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The Bill stated under clause 34 (3) that the Board may appoint consultants required to assist in the discharge of the functions of the DNA Data 	Banks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The Bill provides under clause 27 (3) that the Board may appoint experts required to assist in the discharge of the functions of the DNA Data 	Banks&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Comparison and Communication of DNA profiles:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The New Bill specifically addresses comparison and communication the DNA profiles as that in the offenders' or crime scene index under clause 28 	(1). Also, there is an additional provision under clause 29 (3) which states that the National DNA Data Bank Manger may communicate a DNA profile through 	Central Bureau of Investigation on request of a court, tribunal, law enforcement agency or DNA laboratory to the Government of a foreign State, an 	international organization or institution of Government.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Use of DNA profiles and DNA samples and records:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The Bill provided under clause 39 that all DNA profiles, samples and records would be used solely for purpose of facilitating identification of 	perpetrator of an offence as listed under the Schedule. The proviso to this provision addressed the fact that such samples could be used to identify 	victims of accidents or disaster or missing persons, or any purpose of civil dispute.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The Bill restricts the use of all DNA profiles, samples and records solely for purpose of facilitating identification of a person under the Act 	under clause 32.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;DNA Profiling Board Fund:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The Bill stated under clause 47 (2) that the financial power for the application of monies of the Fund shall be delegated to the Board in such 	manner as may be prescribed and as may be specified by the regulations made by the Board.&lt;/p&gt;
&lt;p&gt;Also, the Bill stated that the Fund shall be applied for meeting remuneration requirements to be paid to the consultants under clause 47 (3) (c).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: This provision has not been included in the Bill. Also, the Bill does not include the provision of paying the remuneration to the experts from 	the Fund.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Delegation of Powers:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The Bill provided under clause 61 that The Board may delegate its powers and functions to the Chairperson or any other Member or officer of the 	Board subject to such conditions, if necessary.&lt;/p&gt;
&lt;p&gt;2015 Bill: This provision has not been included in the 2015 Bill.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Powers of Board to make rules:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;2012 Bill: The Bill provided for an exhaustive list consisting of 33 powers listed under clause 65.&lt;/p&gt;
&lt;p&gt;2015 Bill: The Bill provides for a list of 27 powers of the Board under clause 57.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Schedule:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: In the list of offense where human DNA profiling would be applicable, there was an inclusion of any law as may be specified by the regulations 	made by the Board.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: This provision has been removed from the 2015 Bill.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015'&gt;https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DNA Profiling</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-06T14:10:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india">
    <title>Data Flow in the Unique Identification Scheme of India</title>
    <link>https://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india</link>
    <description>
        &lt;b&gt;This note analyses the data flow within the UID scheme and aims at highlighting vulnerabilities at each stage. The data flow within the UID Scheme can be best understood by first delineating the organizations involved in enrolling residents for Aadhaar. The UIDAI partners with various Registrars usually a department of the central or state Government, and some private sector agencies like LIC etc– through a Memorandum of Understanding for assisting with the enrollment process of the UID project.&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;Many thanks to Elonnai Hickok for her invaluable guidance, input and feedback&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;These Registrars then appoint Enrollment Agencies that enroll residents by collecting the necessary data and sharing this with the UIDAI for de-duplication and issuance of an Aadhaar number, at enrolment centers that they set up. The data flow process of the UID is described below:&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;h3&gt;&lt;b&gt;Data Capture&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Filling out an enrollment form&lt;/i&gt; – To enroll for an Aadhaar number, individuals are required to provide proof of address and proof of identity. These documents are verified by an official at the enrollment center. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;Vulnerability: Though an official is responsible for verifying these documents, it is unclear how this verification is completed. It is possible for fraudulent proof of address and proof of identity to be verified and approved by this official.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;The 'introducer' system&lt;/i&gt;: For individuals who do not have a Proof of Identity, Proof of Address etc the UIDAI has established an 'introducer' system. The introducer verifies that the individual is who they claim to be and that they live where they claim to live.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: This introducer is akin to the introducer concept in banking; except that here, the introducer must be approved by the Registrar, and need not know the person bring enrolled. This leads to questions of authenticity and validity of the data collected and verified by an 'introducer'. The Home Ministry in 2012, indicated that this must be reviewed.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Categories of data for enrollment&lt;/i&gt;: The UIDAI has a standard enrollment form and list of documents required for enrollment. This includes: name, address, birth date, gender, proof of address and proof of identity. Some MoUs (Memorandum of Understanding) permit for the Registrars to collect additional information in addition to what is required by the UIDAI. This could be any information the Registrar deems necessary for any purpose.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;Vulnerability: The fact that a Registrar may collect any information they deem necessary and for any purpose leads to concerns regarding (1) informed consent – as individuals are in placed in a position of having to provide this information as it is coupled with the Aadhaar enrollment process (2) unauthorized collection - though the MOU between the UIDAI and the Registrar has authorized the Registrar to collect additional information – if the information is personal in nature and the Registrar is a body corporate it must be collected as per the Information Technology Rules 2011 under section 43A. It is unclear if Registrars that are body corporates are collecting data in accordance to these rules. (3) As Registrars are permitted to collect any data they deem necessary for any purpose – this leads to concerns regarding misuse of this data..&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;Verification of Resident’s Documents&lt;/i&gt;: true copies of original  documents, after verification are sent to the Registrar for “permanent storage.”&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: It is unclear as to what extent and form this storage takes place. There is no clarity on who is responsible for the data once collected, and the permissible uses of such data are also unclear. The contracts between the UID and Registry claim that guidelines must be followed, while the guidelines state that, “&lt;i&gt;The documents are required to be preserved by Registrar till the UIDAI finalizes its document storage agency”&lt;/i&gt; and states that the &lt;i&gt;“Registrars must ensure that the documents are stored in a safe and secure manner and protected from unauthorized access.”&lt;/i&gt; &lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; The question of what is “unauthorized access”, “secure storage”, when is data transferred to the UIDAI and when the UIDAI will access it and why remain unanswered. Moreover, there is nothing about deleting documents once the MoU lapses. The guidelines in question were also developed post facto.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Data collection for enrollment&lt;/i&gt;: After verification of proof of address and proof of identity, operators at the enrolling the agency will be enrolling individuals.  Data Collection is completed by operators at the enrolling agency. This includes the digitization of enrollment forms and collection of biometrics. Enrollment information is manually collected and entered into computers operating software provided by the UIDAI and then transferred to the UIDAI. Biometrics are collected through devices that have been provided by third parties such as Accenture and L1Identity Solutions.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;Vulnerability: After data is collected by enrollment operators it is  possible for data leakage to occur at the point of collection or during transfer to the Registrar and UIDAI. Data operators, are therefore not answerable to the UIDAI, but to a private agency; a fact which has been the cause of concern even within the government.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; There have also been instances of sub contracting which leads to more complications in respect of accountability. Misuse&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; and loss of data is a very real possibility, and irregularities have been reported as well.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; By relying on technology that is provided by third parties (in many cases foreign third parties) data collected by these devices is also available to these companies while at the same time the companies are not regulated by Indian law.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Import pre-enrolment data into Aadhaar enrollment client&lt;/i&gt;, &lt;i&gt;Syncing NPR/census data into the software&lt;/i&gt;: The National Population Register (NPR) enrolls usual residents, and is governed by the Citizenship Rules, which prescribe a penalty for non disclosure of information.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: Biometrics does not form part of the Rules that govern NPR data collection; the Citizenship Rules, 2003. In many ways, collection of biometrics without amending the citizenship laws amounts to a worrying situation. The NPR hands over information that it collects to UIDAI, biometrics collected as part of the UIDAI is included in the NPR, leading to concerns surrounding legality and security of such data.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;i&gt; Resident’s consent&lt;/i&gt;: for “whether the resident has agreed to &lt;b&gt;share the captured information&lt;/b&gt; with organizations engaged in delivery of welfare services.”&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: This allows the UIDAI to use data in an almost unfettered fashion. The enrolment form reads, “&lt;i&gt;‘‘I have no objection to the UIDAI sharing information provided by me to the UIDAI with agencies engaged in delivery of welfare services.” &lt;/i&gt;Informed consent, Vague. What info and with whom. Why is necessary for the UIDAI to share this information, when the organization is only supposed to be a passive intermediary? Does beyond the mandate of the UIDAI, which is only to provide and authenticate the number.&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Biometric exceptions&lt;/i&gt;: The operator checks if the resident’s eyes/hands are amputated/missing, and after the Supervisor verifies the same, the record is made as an exception and only the individuals photograph is recorded.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: There has widespread misuse of this clause, with data being fabricated to fall into this category, making it unreliable as a whole. In March 2013, 3.84 lakh numbers were cancelled as they were based on fraudulent use of the exception clause. &lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Operator checks if resident wants Aadhaar enabled bank account&lt;/i&gt;: The UID project was touted to be a scheme that would ensure access to benefits and subsidies that are provided through cash transfers as well as enabling financial inclusion. Subsequently, the need for a Aadhaar embedded bank account was made essential to avail of these benefits. The operator at this point checks whether the resident would like to open such a bank account.&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;span&gt; Vulnerability&lt;/span&gt;: The data provided at the time of linking UID with a bank account cannot be corrected or retracted. Although this has the vision of financial inclusion, it is now a threat of exclusion.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Capturing biometrics- &lt;/i&gt;The UIDAI scheme includes assigning each individual a unique identification number after collecting their demographic and biometric information. One Time Passwords are used to manually override a situation in which biometric identification fails.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The UIDAI data collection process was revamped in 2012 to include best finger detection and multiple try method.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerabilities&lt;/span&gt;: The collection process is not always accurate, in fact, 70% of the residents who enrolled in Salt Lake, will have to re-enroll due to discrepancies at the time of enrollment.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; Further, a large number of people in India are unable to give biometric information due to manual labour, or cataracts etc.&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;After such data is entered, the Operator shows such data to the Resident or Introducer or Head of the Family (as the case may be) for validation.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;Operator Sign off&lt;/i&gt; – Each set of data needs to be verified by an Operator whose fingerprint is already stored in the system.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerability:&lt;/span&gt;&lt;i&gt; Vesting authority to sign off in an operator allows for  signing off on inaccurate or fraudulent data. &lt;/i&gt;For example, the issuance of aadhaar numbers to biometric exceptions highlight issues surrounding misuse and unreliability of this function.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;After this, the Enrolment operator gets supervisor’s sign off for any exceptions that might exist, Acknowledgement and consent for enrolment is stored. Any correction to specified data can be made within 96 hours.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Document Storage, Back up and Sync&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;After gathering and verifying all the information about the resident, the Enrolment Agency Operator will store photocopies of the documents of the resident. These Agencies also backup data “from time to time” (recommended to be twice a day), and maintain it for a minimum of 60 days. They also sync with the server every 7-10 days.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: The security implications of third party operators storing information is greatly exacerbated by the fact that these operators use technology and devices from companies have close ties to intelligence agencies in other countries; L-1 Identity Solutions have close ties with America’s CIA, Accenture with French intelligence etc. &lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;h3&gt;&lt;b&gt;Transfer of Demographic and Biometric Data Collected to CIDR&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;“First mile logistics” include transferring data by using Secure File Transfer Protocol) provided by UIDAI or through a “suitable carrier” such as India Post.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: There is no engagement between the UIDAI and the enrolling agencies; the registrars engage private enrolment agencies, and not the UIDAI. Further, the scope of people authorized to collect information, the information that can be collected, how such information is stored etc are all vague. In 2009, there was a notification that claimed that the UIDAI owns the database&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; but there is no indication on how it may be used, how this might react to instances of identity fraud, etc.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;h3&gt;&lt;b&gt;Data De-duplication and Aadhar Generation at CIDR&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;On receiving biometric information, the de-duplication is done to ensure that each individual is given only one UID number.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Vulnerability&lt;/span&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This de-duplication is carried out by private companies, some of which are not of indian origin and thus are also not bound by Indian law. Also, the volume of Aadhaar numbers rejected due to quality or technical reasons is a cause of worry; the count reaching 9 crores in May 2015.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The MoUs promise registrars access to information contained in the Aadhaar letter, although individuals are ensured that such letter is only sent to them. &lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;General compliance and de-duplication has been an issue, with over 34,000 people being issued more than one Aadhaar number,&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; and innumerable examples of faulty Aadhaar cards being issued.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Enrolment Process Essentials : UIDAI , (December 13,2012), http://nictcsc.com/images/Aadhaar%20Project%20Training%20Module/English%20Training%20Module/module2_aadhaar_enrolment_process17122012.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;i&gt;UIDAI to review biometric data collection process of 60 crore resident Indians: P Chidambaram&lt;/i&gt;, Economic Times, (Jan 31, 2012), &lt;a href="http://articles.economictimes.indiatimes.com/2012-01-31/news/31010619_1_biometrics-uidai-national-population-register"&gt;http://articles.economictimes.indiatimes.com/2012-01-31/news/31010619_1_biometrics-uidai-national-population-register&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt;See: an MoU signed between the UIDAI and the Government of Madhya Pradesh. Also see: Usha Ramanathan, “&lt;i&gt;States as handmaidens of UIDAI&lt;/i&gt;”, The Statesman (August 8, 2013).&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt;http://nictcsc.com/images/Aadhaar%20Project%20Training%20Module/English%20Training%20Module/module2_aadhaar_enrolment_process17122012.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Document Storage Guidelines for Registrars – Version 1.2, https://uidai.gov.in/images/mou/D11%20Document%20Storage%20Guidelines%20for%20Registrars%20final%2005082010.pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Arindham Mukherjee, Lola Nayar, &lt;i&gt;Aadhaar,A Few Basic Issues&lt;/i&gt;, Outlook India, (December 5, 2011)&lt;i&gt;, &lt;/i&gt;&lt;a href="http://dataprivacylab.org/TIP/2011sept/India4.pdf"&gt;http://dataprivacylab.org/TIP/2011sept/India4.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;i&gt;Aadhaar: UIDAI probing several cases of misuse of personal data, &lt;/i&gt;The Hindu, (April 29, 2012), http://www.thehindubusinessline.com/economy/aadhar-uidai-probing-several-cases-of-misuse-of-personal-data/article3367092.ece.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Harsimran Julka, &lt;i&gt;UIDAI wins court battle against HCL technologies, &lt;/i&gt;The Economic Times, (October 4, 2011), &lt;a href="http://articles.economictimes.indiatimes.com/2011-10-04/news/30242553_1_uidai-bank-guarantee-hp-and-ibm"&gt;http://articles.economictimes.indiatimes.com/2011-10-04/news/30242553_1_uidai-bank-guarantee-hp-and-ibm&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Chetan Chauhan, &lt;i&gt;UIDAI cancels 3.84 lakh fake Aadhaar numbers&lt;/i&gt;, The Hindustan Times, (December 26, 2012), &lt;a href="http://www.hindustantimes.com/newdelhi/uidai-cancels-3-84-lakh-fake-aadhaar-numbers/article1-980634.aspx"&gt;http://www.hindustantimes.com/newdelhi/uidai-cancels-3-84-lakh-fake-aadhaar-numbers/article1-980634.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Usha Ramanathan, “&lt;i&gt;Inclusion project that excludes the poor&lt;/i&gt;”, The Statesman (July 4, 2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; UIDAI to Refresh Data Collection Process, Zee News, (February 7, 2012) &lt;a href="http://zeenews.india.com/news/delhi/uidai-to-refresh-data-collection-process_757251.html"&gt;http://zeenews.india.com/news/delhi/uidai-to-refresh-data-collection-process_757251.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Snehal Sengupta, &lt;i&gt;Queue up again to apply for Aadhaar&lt;/i&gt;, The Telegraph, (February 27, 2015), http://www.telegraphindia.com/1150227/jsp/saltlake/story_5642.jsp#.VayjDZOqqko&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Chauhan, &lt;i&gt;supra &lt;/i&gt;note 7.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Usha Ramanathan, &lt;i&gt;Three Supreme Court Orders Later, What’s the Deal with Aadhaar? &lt;/i&gt;Yahoo News, (April 13, 2015), &lt;a href="https://in.news.yahoo.com/three-supreme-court-orders-later--what-s-the-deal-with-aadhaar-094316180.html"&gt;https://in.news.yahoo.com/three-supreme-court-orders-later--what-s-the-deal-with-aadhaar-094316180.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Usha Ramanathan, “&lt;i&gt;Threat of Exclusion and of Surveillance&lt;/i&gt;”&lt;i&gt;,&lt;/i&gt; The Statesman (July 2, 2013).&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;i&gt;Over 9 Crore Aadhaar enrolments rejected by UIDAI, &lt;/i&gt;Zee News (May 8, 2015).&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Usha Ramanathan, “&lt;i&gt;States as handmaidens of UIDAI&lt;/i&gt;”, The Statesman (August 8, 2013).&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Surabhi Agarwal, &lt;i&gt;Duplicate Aadhar numbers within estimate, &lt;/i&gt;Live Mint (March 5, 2013).&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Usha Ramanathan, “&lt;i&gt;Outsourcing enrolment, gathering dogs and trees&lt;/i&gt;”, The Statesman (August 7, 2013).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india'&gt;https://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-03T17:02:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/august-2015-bulletin">
    <title>August 2015 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/august-2015-bulletin</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;We are happy to share with you the eighth issue of the Centre for Internet and Society (CIS) newsletter (August 2015). The past editions of the newsletter 	can be accessed at &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Highlights&lt;/h2&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Researchers at Work programme has published a book titled &lt;a href="http://cis-india.org/raw/digital-activism-in-asia-reader"&gt;&lt;em&gt;Digital Activism in Asia Reader&lt;/em&gt;&lt;/a&gt; exploring in detail digital activism in Asia. The Reader was edited by Nishant Shah, P.P. Sneha, and Sumandro Chattapadhyay with support from  Anirudh Sridhar, Denisse Albornoz, and Verena Getahun.&lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;The &lt;a class="external-link" href="http://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-india-open-review"&gt;pre-publication drafts of two sections&lt;/a&gt; written by Sumandro Chattapadhyay for the third volume (2000-2010) of the &lt;em&gt;Asia Internet History&lt;/em&gt; series edited by Prof. Kilnam Chon have been posted for open-review process.&lt;/li&gt;
&lt;li&gt;As part of the 'Studying Internets in India' series, RAW published blog entries on &lt;a href="http://cis-india.org/raw/blog_governing-speech-on-the-internet"&gt;Governing Speech on the Internet&lt;/a&gt; and &lt;a href="http://cis-india.org/raw/blog_mock-calling"&gt;Mock-Calling - Ironies of Outsourcing and the Aspirations of an Individual&lt;/a&gt;. &lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li style="text-align: justify;"&gt;NVDA team &lt;a href="http://cis-india.org/accessibility/blog/training-in-e-speak-hindi"&gt;conducted a workshop&lt;/a&gt; at Jeevan Jyoti School for the Blind, Varanasi from August 26 to 28,  2015. Eighty five students and 13 teachers took part in the training  programme. NVDA team had conducted another &lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-espeak-marathi"&gt;workshop&lt;/a&gt; earlier in Nashik. The workshop was conducted in June. A batch of 17  Special Educators and teachers of the blind attended the workshop.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Maggie Huang, Arpita Sengupta and Paavni Anand as part of the Pervasive Technologies project 	&lt;a href="http://cis-india.org/a2k/blogs/comparative-transparency-review-of-collective-management-organisations-in-india-uk-usa"&gt; co-authored a research paper &lt;/a&gt; that seeks to compare the publicly available information on the  websites of music collective management organizations ("CMOs") operating  within India, the 	United States, and the United Kingdom.&lt;/li&gt;
&lt;li style="text-align: left;"&gt;
Amulya Purushothama, Nehaa Chaudhari and Varun Baliga in a blog entry have delved into the question of
what the mandate of the &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/national-ipr-policy-series-what-have-sectoral-innovation-councils-been-doing-on-ipr"&gt;Sectoral Innovation Council&lt;/a&gt; is, what its activities are, and what vision for IPR development in India has it put forth. An RTI Application has been filed by CIS to attain information on these issues.&lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li style="text-align: justify;"&gt; &lt;a href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-introduction"&gt;In a blog post&lt;/a&gt;, Amulya Purushothama announced our new MHRD IPR Chair Series and has  charted the sequence of events, starting from the establishment of MHRD  IPR Chairs, to discussions surrounding their purpose and functioning,  to concerns surrounding the lack of information about the IPR Chairs,  the first round of RTIs that CIS had filed in regard to this and the responses it solicited. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Subhashish Panigrahi &lt;a href="http://cis-india.org/openness/blog-old/kisorachandrananachampu-on-odia-wikisource"&gt;interviewed Prateek Pattanaik&lt;/a&gt;.  		Prateek has not just digitized as many as 54 Odia-language poetry  dating early 18th century but has also annotated, both poetic and  prosaic translation 		in his blogs "Sri Jagannatha" and "Utkal Sangeet".  He has also published a complete book "Kisora chandranana champu" on  Odia Wikisource. A recent entrant 		into the Odia Wikimedia community,  Prateek is also the youngest Odia Wikimedian.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rohan George and Elonnai Hickok in a blog post &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/are-we-throwing-our-data-protection-regimes-under-the-bus"&gt;analyzed consent, big data and data protection&lt;/a&gt; that examines in detail why the principle of consent is providing us increasingly less of an aegis in protecting our data.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Elonnai Hickok, Vipul Kharbanda and Vanya Rakesh on behalf of CIS submitted a	&lt;a href="http://cis-india.org/internet-governance/blog/cis-comments-and-recommendations-to-human-dna-profiling-bill-2015"&gt;clause-by-clause comments&lt;/a&gt; on 	the Human DNA Profiling Bill that was circulated by the Department of Biotechnology on June 9, 2015.&lt;/li&gt;
&lt;li&gt;Sunil Abraham, Elonnai Hickok and Tarun Krishnakumar co-authored an article titled &lt;a href="http://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"&gt;Security: Privacy, Transparency and Technology&lt;/a&gt;. The article was published by Observer Research Foundation, Digital Debates 2015: CyFy Journal Volume 2.&lt;/li&gt;
&lt;li&gt;Elonnai Hickok in a blog post titled &lt;a href="http://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things"&gt; A Review of the Policy Debate around Big Data and Internet of Things &lt;/a&gt;has done an analysis as to how regulators and experts across jurisdictions are reacting to Big Data and Internet of Things.&lt;/li&gt;
&lt;li&gt;The Supreme Court of India has deemed it fit to refer the question  of the very existence of a fundamental right to privacy to a  Constitution Bench to finally decide the matter, and define the contours  of such right if it does exist. Vipul Kharbanda analyses this in a &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt;blog entry&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Experts and regulators across jurisdictions are examining the impact  of Big Data practices on traditional data protection standards and  principles. 	This will be a useful and pertinent exercise for India to  undertake as the government and the private and public sectors begin to  incorporate and rely on 	the use of Big Data in decision making  processes and organizational operations. Elonnai Hickok has &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011"&gt;provided an initial evaluation of how Big Data could impact India's current data protection standards&lt;/a&gt;. &lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt; Elonnai Hickok &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015"&gt;has provided a comparison of Human DNA Profiling Bill 2012 vs. the Human DNA Profiling Bill 2015&lt;/a&gt;,  CIS's main recommendations vs. the 2015 Bill, Sub-Committee  Recommendations vs. 		the 2015 Bill, and the Expert Committee  Recommendations vs. the 2015 Bill. &lt;/li&gt;
&lt;li&gt; CIS &lt;a href="http://cis-india.org/internet-governance/blog/cis-submission-to-unga-wsis-review"&gt;submitted its comments&lt;/a&gt; to the non-paper on the UNGA 		Overall Review of the Implementation of  the WSIS outcomes, evaluating the progress made and challenges ahead.&lt;/li&gt;
&lt;li&gt;In a policy brief, Vipul Kharbanda &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india"&gt;has  analyzed the different laws regulating surveillance at the state and  central level in India and calls out ways in which the provisions are  unharmonized&lt;/a&gt;. The brief then provides recommendations for the harmonization of surveillance law in India. &lt;/li&gt;
&lt;li&gt;Hardnews interviewed Sunil Abraham about the future of the internet in India. The &lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hardnewsmedia-august-10-2015-abeer-kapoor-net-neutrality-india-is-a-keybattle-ground"&gt;article was published in their August edition&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt; Shyam Ponappa in an 		&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-august-6-2015-shyam-ponappa-those-dropped-calls"&gt; Op-ed published by Business Standard &lt;/a&gt; has given an analysis on the reasons of the number of dropped calls on our mobile phones. &lt;/li&gt;&lt;/ul&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Under a grant from the Hans Foundation we are doing a project on developing text-to-speech software for 15 Indian languages. The progress made so far in 	the project can be accessed &lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;. The project on creating a 	national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India got over and the compilation has 	been printed.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;NVDA and eSpeak&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Monthly Updates&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/accessibility/blog/august-2015-nvda-report.pdf"&gt;August 2015 Report&lt;/a&gt; (Suman Dogra; July 31, 2015). &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Event Reports&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-espeak-marathi"&gt;Training in eSpeak Marathi&lt;/a&gt; (Organized by NVDA team; National Association for the Blind; Nashik; June 22 - 23, 2015).		&lt;em&gt;The workshop was held in the month of June but the report got published later in August.&lt;/em&gt; &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/training-in-e-speak-hindi"&gt;Training in eSpeak Hindi&lt;/a&gt; (Organized by NVDA team; Jeevan Jyoti School for the Blind; Varanasi; August 26 - 28, 2015). &lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Pervasive Technologies&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="https://cis-india.org/a2k/blogs/patent-landscaping-in-the-indian-mobile-device-market"&gt;&lt;strong&gt; &lt;/strong&gt;Methodology: Patent Landscaping in the Indian Mobile Device Market &lt;/a&gt; (Rohini Lakshané; November 10, 2014). &lt;em&gt;This blog post published last year has been recently updated&lt;/em&gt;. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/comparative-transparency-review-of-collective-management-organisations-in-india-uk-usa"&gt; Comparative Transparency Review of Collective Management Organisations in India, United Kingdom and the United States &lt;/a&gt; (Maggie Huang, Arpita Sengupta and Paavni Anand; August 1, 2015). &lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;Other (Copyright and Patent)&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li style="text-align: justify;"&gt;&lt;a href="https://cis-india.org/a2k/blogs/cci-participation-at-the-upcoming-3rd-international-conference-on-ipr-and-competition" class="external-link"&gt;CCI Participation at the Upcoming 3rd International Conference on IPR and Competition&lt;/a&gt; (Amulya Purushothama; August 5, 2015). CIS wrote to the Competition Commission of India Chairman on August 5, 2015 about participation at a conference organised by Ericsson and concerns regarding conflict of interest. We also had several other NGOs sign on to the letter. &lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-introduction"&gt;MHRD IPR Chair Series: Introduction&lt;/a&gt; (Amulya Purushothama; August 10, 2015). Aditya Garg assisted in research and writing. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/national-ipr-policy-series-what-have-sectoral-innovation-councils-been-doing-on-ipr"&gt; National IPR Policy Series: What Have the Sectoral Innovation Councils Been Doing on IPR &lt;/a&gt; (Nehaa Chaudhari and Varun Baliga; August 13, 2015). Amulya Purushothama assisted with research and writing. &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Media Coverage&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/times-of-india-rema-nagarajan-august-6-2015-competition-commission-of-india-chairman-participation-in-assocham-conference-raises-conflict-of-interests"&gt;Competition Commission of India chariman's participation in Assocham conference raises conflict of interests&lt;/a&gt; (Rema Nagarajan; The Times of India; August 6, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/business-standard-august-6-2015-dilasha-seth-and-deepak-patel-assocham-event-sparks-row-over-conflict-of-interest-by-cci"&gt;Assocham event sparks row over conflict of interest by CCI&lt;/a&gt; (Dilasha Seth and Deepak Patel; Business Standard; August 6, 2015).&lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/openness/blog-old/kisorachandrananachampu-on-odia-wikisource"&gt;&lt;strong&gt; &lt;/strong&gt;Odia Wikisource has a new Wikisourcer, and he is the youngest in the Odia Wikimedia community! &lt;/a&gt; (Subhashish Panigrahi; August 21, 2015). &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Events Co-organized&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/openness/events/rare-telugu-religious-and-historical-work-preserved-at-annamacharya-library-to-come-on-wikisource"&gt;&lt;strong&gt; &lt;/strong&gt;Annamaya Library edit-a-thon &lt;/a&gt; (Organized by CIS-A2K and Telugu Wikipedia Community; August 6, 2015; Andhra Loyola College; Vijaywada). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://meta.wikimedia.org/wiki/International_workshop_on_digitization_and_archiving,_Jadavpur_University"&gt; International Workshop on Digitization and Archiving &lt;/a&gt; (Organized by CIS-A2K and Wikipedia Community; August 19 - 21, 2015). Rahmanuddin Shaik was one of the trainers. &lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;FOSS&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/openness/events/workshop-on-digital-collaborations-in-tamil-language-tamil-virtual-university-chennai"&gt;Workshop on digital collaborations in Tamil-language, Tamil Virtual Chennai&lt;/a&gt; (Organized by Tamil Virtual University, Anna University Campus, Chennai; August 8 - 9, 2015). Dr. U.B. Pavanaja atttended this event. &lt;/li&gt;
&lt;li&gt;&lt;a href="http://pn.ispirt.in/event/open-innovation-entrepreneurship-and-our-digital-future/"&gt;Open Innovation, entrepreneurship, and our digital future &lt;/a&gt; (Organized by iSpirit; Bangalore; August 13, 2015). Rohini Lakshané attended the event. Rohini wrote a 		&lt;a href="https://cis-india.org/a2k/blogs/we-need-to-proactively-ensure-that-people-cant-file-representatives-of-the-creativity-of-a-foss-community"&gt; report on this &lt;/a&gt; . &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Media Coverage&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS gave its inputs to the following:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/telugu-wiki-edit-a-thon-at-alc"&gt;Telugu Wikipedia Edit-a-thon at ALC&lt;/a&gt; (Eenadu; August 6, 2015)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/telugu-wiki-editathon-alc"&gt;Telugu Wiki Edit-a-thon in ALC&lt;/a&gt; (Eenadu; August 6, 2015)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.thehansindia.com/posts/index/2015-08-07/Rare-Telugu-religious-and-historical-work-preserved-at-Annamacharya-library-to-come-on-Wikisource-168454"&gt;Rare Telugu religious and historical work preserved at Annamacharya library to come on Wikisource! &lt;/a&gt; (The Hans India; August 7, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/mangalorean-dotcom-august-13-2015"&gt; ಗ್ರಾಮೀಣ ಪ್ರದೇಶದ ಆರ್ಥಿಕ 			ಪ್ರಗತಿಯಿಂದ ದೇಶದ ಆರ್ಥಿಕ 			ಪ್ರಗತಿ ಸಾಧ್ಯವಾಗುತ್ತದೆ. &lt;/a&gt; (Mangalorean.com; August 13, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/karavali-karnataka-august-14-2015"&gt; ವಿಕಿಪಿಡಿಯ ಮುಕ್ತವಾಗಿ 			ಬಳಸಿ: ಡಾ.ಪವನಜ &lt;/a&gt; (Karavali Karnataka; August 14, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/sahil-online-august-14-2015"&gt; ಬೆಳ್ತಂಗಡಿ:ಎಲ್ಲಾ 			ಕಾಲಕ್ಕೂ ಲಭ್ಯ ಇರುವ 			ಸ್ವತಂತ್ರ ಹಾಗೂ ಮುಕ್ತ 			ವಿಶ್ವಕೋಶ 			ವಿಕಿಪೀಡಿಯಾ-ಪವನಜ &lt;/a&gt; (SahilOnline; August 14, 2015). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/the-hindu-august-23-2015-talamaddale-on-august-23"&gt;Talamaddale on August 23&lt;/a&gt; (Hindu; August 16, 2015).&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and 	International Development Research Centre (IDRC)) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur 	Foundation) is on studying the restrictions placed on freedom of expression online by the Indian government.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"&gt;Security: Privacy, Transparency and Technology&lt;/a&gt; (Sunil Abraham, Elonnai Hickok and Tarun Krishnakumar; Observer Research Foundation,		&lt;a href="http://cis-india.org/internet-governance/blog/security-privacy-transparency-technology.pdf"&gt;Digital Debates 2015: CyFy Journal Volume 2&lt;/a&gt; ; 		August 19, 2015). &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Submission&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/internet-governance/blog/cis-comments-and-recommendations-to-human-dna-profiling-bill-2015"&gt;&lt;strong&gt; &lt;/strong&gt;CIS Comments and Recommendations to the Human DNA Profiling Bill, June 2015 &lt;/a&gt; (Elonnai Hickok, Vipul Kharbanda and Vanya Rakesh; August 27, 2015). &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india"&gt;Policy Paper on Surveillance in India&lt;/a&gt; (Vipul Kharbanda; August 3, 2015). &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; &lt;a href="http://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015"&gt; Comparison of the Human DNA Profiling Bill 2012 with: CIS recommendations, Sub-Committee Recommendations, Expert Committee Recommendations, and the 			Human DNA Profiling Bill 2015 &lt;/a&gt; (Elonnai Hickok; August 10, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt;Right to Privacy in Peril&lt;/a&gt; (Vipul Kharbanda; August 13, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/responsible-data-forum"&gt; Responsible Data Forum: Discussion on the Risks and Mitigations of releasing Data &lt;/a&gt; (Vanya Rakesh; August 26, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/are-we-throwing-our-data-protection-regimes-under-the-bus"&gt; Are we Throwing our Data Protection Regimes under the Bus? &lt;/a&gt; (Elonnai Hickok and Rohan George; August 29, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary"&gt; Supreme Court Order is a Good Start, but is Seeding Necessary? &lt;/a&gt; (Elonnai Hickok and Rohan George; August 29, 2015). &lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;Big Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011"&gt;&lt;strong&gt; &lt;/strong&gt;Big Data and the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011 &lt;/a&gt; (Elonnai Hickok; August 11, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things"&gt; A Review of the Policy Debate around Big Data and Internet of Things &lt;/a&gt; (Elonnai Hickok; August 17, 2015). &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-changing-landscape-of-ict-governance-and-practice-convergence-and-big-data"&gt;&lt;strong&gt; &lt;/strong&gt;The Changing Landscape of ICT Governance and Practice - Convergence and Big Data &lt;/a&gt; (Co-organized by Innovation Center for Big Data and Digital Convergence, Yuan Ze University, Taiwan; August 24 - 25, 2015). Sharat Chandra Ram was granted the &lt;a href="http://www.cprsouth.org/2015/02/call-for-applications-2015-young-scholar-awards/"&gt;Young Scholar Award 2015&lt;/a&gt; to attend the&lt;em&gt;Young Scholar Workshop&lt;/em&gt; followed by main		&lt;a href="http://www.cprsouth.org/"&gt;&lt;em&gt;CPRSouth2015 conference&lt;/em&gt; (Communication Policy Research South) conference&lt;/a&gt;. &lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;Free Speech and Expression&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Submission&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/internet-governance/blog/cis-submission-to-unga-wsis-review"&gt;CIS submission to the UNGA WSIS+10 Review&lt;/a&gt; (Jyoti Panday; August 9, 2015), &lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;Cyber Security&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Upcoming Event&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015"&gt;Bangalore Chapter Meet of DSCI&lt;/a&gt; (Co-organized by DSCI and CIS; September 26, 2015). Melissa Hathaway, Commissioner, Global Commission for Internet Governance and Sunil Abraham will be 		speaking at this event. &lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;CIS is involved in promoting access and accessibility to  telecommunications services and resources and has provided inputs to  ongoing policy discussions 	and consultation papers published by TRAI.  It has prepared reports on unlicensed spectrum and accessibility of  mobile phones for persons with disabilities 	and also works with the  USOF to include funding projects for persons with disabilities in its  mandate:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Op-ed&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-august-6-2015-shyam-ponappa-those-dropped-calls"&gt;Those Dropped Calls&lt;/a&gt; (Shyam Ponappa; Business Standard; August 5, 2015 and Organizing India Blogspot; August 6, 2015). &lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by contemporary concerns to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It is interested in producing local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Books&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/digital-activism-in-asia-reader"&gt;Digital Activism in Asia Reader&lt;/a&gt; (edited by Nishant Shah, P.P. Sneha, and Sumandro Chattapadhyay, with support from Anirudh Sridhar, Denisse Albornoz, and Verena Getahun; August 8, 2015).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Books Chapters&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-open-review"&gt;Civil Society Organisations and Internet Governance in Asia - Open Review &lt;/a&gt; (Sumandro Chattapadhyay; Asia Internet History Vol. 3, edited by Prof. Kilnam Chon). Comments are invited.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-india-open-review"&gt;Civil Society Organisations and Internet Governance in India - Open Review &lt;/a&gt; (Sumandro Chattapadhyay; Asia Internet History Vol. 3, edited by Prof. Kilnam Chon). Comments are invited.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Accepted Paper Abstract&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/raw/studying-the-emerging-database-state-in-india-accepted-abstract"&gt;&lt;strong&gt; &lt;/strong&gt;Studying the Emerging Database State in India: Notes for Critical Data Studies &lt;/a&gt; (Sumandro Chattapadhyay; August 2, 2015). &lt;em&gt;The paper has been provisionally accepted&lt;/em&gt;. &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;li&gt;&lt;strong&gt; &lt;/strong&gt;&lt;a href="http://cis-india.org/raw/blog_mock-calling"&gt;Mock-Calling - Ironies of Outsourcing and the Aspirations of an Individual&lt;/a&gt; (Sreedeep; August 6, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/raw/blog_governing-speech-on-the-internet"&gt; Governing Speech on the Internet: From the Free Marketplace Policy to a Controlled 'Public Sphere' &lt;/a&gt; (Smarika Kumar; August 28, 2015). &lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-kanika-datta-august-1-2015-why-the-dna-bill-is-open-to-misuse-sunil-abraham"&gt;Why the DNA Bill is open to misuse: Sunil Abraham&lt;/a&gt; (Kanika Datta; Business Standard; August 1, 2015) &lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-times-of-india-august-2-2015-karthikeyan-hemalatha-porn-ban"&gt;Porn ban: People will soon learn to circumvent ISPs and govt orders, expert says &lt;/a&gt; (Karthikeyan Hemalatha; The Times of India; August 2, 2015). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/idg-news-service-august-2-2015-indian-govt-orders-isps-to-block-857-porn-websites"&gt;Indian government orders ISPs to block 857 porn websites&lt;/a&gt; (John Ribeiro; IDG News and PC World; August 2, 2015)&lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites"&gt; India blocks access to 857 porn sites &lt;/a&gt; (BBC; August 3, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/financial-times-james-crabtree-august-3-2015-india-launches-crackdown-on-online-porn"&gt; India launches crackdown on online porn &lt;/a&gt; (James Crabtree; Financial Times; August 3, 2015). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindustan-times-august-3-2015-siladitya-ray-proxies-and-vpns"&gt;Proxies and VPNs: Why govt can't ban porn websites?&lt;/a&gt; (Siladitya Ray; August 3, 2015; Hindustan Times)&lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-times-of-india-august-4-2015-anahita-mukherji-nanny-state-rules-porn-bad-for-you"&gt; Nanny state rules porn bad for you &lt;/a&gt; (Anahita Mukherji; The Times of India; August 4, 2015). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-august-4-2015-ban-on-pornography-temporary-says-government"&gt;Ban on pornography temporary, says government&lt;/a&gt; (Business Standard; August 4, 2015)&lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-australian-news-august-5-2015-amanda-hodge-porn-block-in-india-sparks-outrage"&gt; Porn block in India sparks outrage &lt;/a&gt; (Australian; August 5, 2015). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-wall-street-journal-august-5-2015-sean-mclain-indian-porn-ban-is-partially-lifted-but-sites-remain-blocked"&gt;Indian Porn Ban is Partially Lifted But Sites Remain Blocked&lt;/a&gt; (Sean Mclain; Wall Street Journal; August 5, 2015)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling"&gt;Genetic Profiling: Is it all in the DNA?&lt;/a&gt; (Ullekh N.P.; The Open Magazine; August 7, 2015)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/desi-blitz-august-7-2015-nazhat-khan-india-partially-lifts-porn-ban"&gt;India partially lifts Porn Ban?&lt;/a&gt; (Nazhat Khan; DESI blitz; August 7, 2015)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hardnewsmedia-august-10-2015-abeer-kapoor-net-neutrality-india-is-a-keybattle-ground"&gt;Net Neutrality: India is a Key Battleground&lt;/a&gt; (Abeer Kapoor; Hardnews; August 10, 2015)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act"&gt;Stats from 2014 reveal horror of scrapped section 66A of IT Act&lt;/a&gt; (Aloke Tikku; Hindustan Times; August 20, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-times-of-india-sandhya-soman-august-23-2015-the-seedy-underbelly-of-revenge-porn"&gt;The seedy underbelly of revenge porn&lt;/a&gt; (Sandhya Soman; The Times of India; August 23, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-hindu-businessline-august-28-p-anima-the-new-tattler-in-town"&gt;The new tattler in town&lt;/a&gt; (P. Anima; Hindu Businessline; August 28, 2015).&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and Society (CIS) is a non-profit organisation  that undertakes interdisciplinary research on internet and digital  technologies from policy and academic perspectives. The areas of focus  include digital accessibility for persons with diverse abilities, access  to knowledge, intellectual property rights, openness (including open  data, free and open source software, open standards, open access, open  educational resources, and open video), internet governance,  telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the mediation and reconfiguration of social and cultural processes and structures by the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;CIS - Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Access to Knowledge - Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Access to Knowledge - Facebook:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Access to Knowledge - E-Mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Researchers at Work - E-Mail: &lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Researchers at Work - Mailing List: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;br /&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We invite researchers, practitioners, artists, and theoreticians, both  organisationally and as individuals, to engage with us on topics related  internet and society, and improve our collective understanding of this  field. To discuss such possibilities, please write to Sunil Abraham,  Executive Director, at &lt;a class="moz-txt-link-abbreviated" href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; (for policy research), or Sumandro Chattapadhyay, Research Director, at &lt;a class="moz-txt-link-abbreviated" href="mailto:sumandro@cis-india.org"&gt;sumandro@cis-india.org&lt;/a&gt; (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, Access to Knowledge, at &lt;a class="moz-txt-link-abbreviated" href="mailto:tanveer@cis-india.org"&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/august-2015-bulletin'&gt;https://cis-india.org/about/newsletters/august-2015-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-10-27T00:25:02Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/response-by-the-centre-for-internet-and-society-to-the-draft-proposal-to-transition-the-stewardship-of-the-internet-assigned-numbers-authority-iana-functions-from-the-u-s-commerce-department2019s-national-telecommunications-and-information-administration">
    <title>Response by the Centre for Internet and Society to the Draft Proposal to Transition the Stewardship of the Internet Assigned Numbers Authority (IANA) Functions from the U.S. Commerce Department’s National Telecommunications and Information Administration </title>
    <link>https://cis-india.org/internet-governance/blog/response-by-the-centre-for-internet-and-society-to-the-draft-proposal-to-transition-the-stewardship-of-the-internet-assigned-numbers-authority-iana-functions-from-the-u-s-commerce-department2019s-national-telecommunications-and-information-administration</link>
    <description>
        &lt;b&gt;This proposal was made to the Global Multistakeholder Community on August 9, 2015. The proposal was drafted by Pranesh Prakash and Jyoti Panday. The research assistance was provided by Padmini Baruah, Vidushi Marda, and inputs from Sunil Abraham.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;For more than a year now, the customers and operational communities performing key internet functions related to domain names, numbers and protocols have been negotiating the transfer of IANA stewardship. India has dual interests in the ICANN IANA Transition negotiations: safeguarding independence, security and stability of the DNS for development, and promoting an effective transition agreement that internationalizes the IANA Functions Operator (IFO). Last month the IANA Stewardship Transition Coordination Group (ICG) set in motion a public review of its combined assessment of the proposals submitted by the names, numbers and protocols communities. In parallel to the transition of the NTIA oversight, the community has also been developing mechanisms to strengthen the accountability of ICANN and has devised two workstreams that consider both long term and short term issues. This 2 is our response to the consolidated ICG proposal which considers the proposals for the transition of the NTIA oversight over the IFO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-response-to-draft-proposal-to-transition-the-stewardship-of-the-internet-assigned-numbers-authority-iana-functions-from-the-u-s-commerce-department2019s-national-telecommunications-and-information-administration" class="internal-link"&gt;Click to download&lt;/a&gt; the submission.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/response-by-the-centre-for-internet-and-society-to-the-draft-proposal-to-transition-the-stewardship-of-the-internet-assigned-numbers-authority-iana-functions-from-the-u-s-commerce-department2019s-national-telecommunications-and-information-administration'&gt;https://cis-india.org/internet-governance/blog/response-by-the-centre-for-internet-and-society-to-the-draft-proposal-to-transition-the-stewardship-of-the-internet-assigned-numbers-authority-iana-functions-from-the-u-s-commerce-department2019s-national-telecommunications-and-information-administration&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    

   <dc:date>2015-11-29T06:35:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary">
    <title>Supreme Court Order is a Good Start, but is Seeding Necessary?</title>
    <link>https://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary</link>
    <description>
        &lt;b&gt;This blog post seeks to unpack the ‘seeding’ process in the UIDAI scheme, understand the implications of the Supreme Court order on this process, and identify questions regarding the UID scheme that still need to be clarified by the court in the context of the seeding process.&lt;/b&gt;
        &lt;div&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;On August 11th 2015, in the writ petition Justice K.S Puttaswamy (Retd.) &amp;amp; Another vs. Union of India &amp;amp; Others1, the Supreme Court of India 		issued an interim order regarding the constitutionality of the UIDAI scheme. In response to the order, Dr. Usha Ramanathan published an article titled 		 'Decoding the Aadhaar judgment: No more seeding, not till the privacy issue is settled by the court' which, among other points, highlights 		concerns around the seeding of Aadhaar numbers into service delivery databases. She writes that "seeding' is a matter of grave concern in the UID 		project. This is about the introduction of the number into every data base. Once the number is seeded in various databases, it makes convergence of 		personal information remarkably simple. So, if the number is in the gas agency, the bank, the ticket, the ration card, the voter ID, the medical 		records and so on, the state, as also others who learn to use what is called the 'ID platform', can 'see' the citizen at will."2&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;Building off of this statement, this article seeks to unpack the 'seeding' process in the UIDAI scheme, understand the implications of the Supreme 		Court order on this process, and identify questions regarding the UID scheme that still need to be clarified by the Court in the context of the seeding 		process.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;h3&gt;What is Seeding?&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;In the UID scheme, data points within databases of service providers and banks are organized via individual Aadhaar numbers through a process known as 		'seeding'. The UIDAI has released two documents on the seeding process - "Approach Document for Aadhaar Seeding in Service Delivery Databases version 		1.0" (Version 1.0)3 and "Standard Protocol Covering the Approach &amp;amp; Process for Seeding Aadhaar Number in Service Delivery Databases June 2015 		Version 1.1" (Version 1.1)4&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;According to Version 1.0 "Aadhaar seeding is a process by which UIDs of residents are included in the service delivery database of service providers 		for enabling Aadhaar based authentication during service delivery."5 Version 1.0 further states that the "Seeding process typically involves data 		extraction, consolidation, normalization, and matching".6 According to Version 1.1, Aadhaar seeding is "a process by which the Aadhaar numbers of 		residents are included in the service delivery database of service providers for enabling de-duplication of database and Aadhaar based authentication 		during service delivery".7 There is an extra clause in Version 1.1's definition of seeding which includes "de-duplication" in addition to 		authentication.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;Though not directly stated, it is envisioned that the Aadhaar number will be seeded into the databases of service providers and banks to enable 		cash transfers of funds. This was alluded to in the Version 1.1 document with the UIDAI stating "Irrespective of the Scheme and the geography, as the 		Aadhaar Number of a given Beneficiary finally has to be linked with the Bank Account, Banks play a strategic and key role in Seeding."8&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;h3&gt;How does the seeding process work?&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;The seeding process itself can be done through manual/organic processes or algorithmic/in-organic processes. In the inorganic process the Aadhaar 		database is matched with the database of the service provider - namely the database of beneficiaries, KYR+ data from enrolment agencies, and the 		EID-UID database from the UIDAI. Once compared and a match is found - for example between KYR fields in the service delivery database and KYR+ fields 		in the Aadhaar database - the Aadhaar number is seeded into the service delivery database.9&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;Organic seeding can be carried out via a number of methods, but the recommended method from the UIDAI is door to door collection of Aadhaar numbers 		from residents which are subsequently uploaded into the service delivery database either manually or through the use of a tablet or smart phone. 		Perhaps demonstrating the fact that technology cannot be used as a 'patch' for a broken or premature system, organic (manual) seeding is suggested as 		the preferred process by the UIDAI due to challenges such as lack of digitization of beneficiary records, lack of standardization in Name and Address 		records, and incomplete data.10&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;According to the 1.0 Approach Paper, to facilitate the seeding process, the UIDAI has developed an in house software known as Ginger. Service providers 		that adopt the Aadhaar number must move their existing databases onto the Ginger platform, which then organizes the present and incoming data in the 		database by individual Aadhaar numbers. This 'organization' can be done automatically or manually. Once organized, data can be queried by Aadhaar 		number by person's on the 'control' end of the Ginger platform.11&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;In practice this means that during an authentication in which the UIDAI responds to a service provider with a 'yes' or 'no' response, the UIDAI 		would have access to at least these two sets of data: 1.) Transaction data (date, time, device number, and Aadhaar number of the individual 		authenticating) 2.) Data associated to an individual Aadhaar number within a database that has been seeded with Aadhaar numbers (historical and 		incoming). According to the Approach Document version 1.0, "The objective here is that the seeding process/utility should be able to access the service 		delivery data and all related information in at least the read-only mode." 12 and the Version 1.1 document states "Software application users with 		authorized access should be able to access data online in a seamless fashion while providing service benefit to residents." 13&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;h3&gt;What are the concerns with seeding?&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;With the increased availability of data analysis and processing technologies, organisations have the ability to link disparate data points stored 		across databases in order that the data can be related to each other and thereby analysed to derive holistic, intrinsic, and/or latent assessments. 		This can allow for deeper and more useful insights from otherwise standalone data. In the context of the government linking data, such "relating" can 		be useful - enabling the government to visualize a holistic and more accurate data and to develop data informed policies through research14. Yet, 		allowing for disparate data points to be merged and linked to each other raises questions about privacy and civil liberties - as well as more intrinsic 		questions about purpose, access,  consent and choice.  To name a few, linked data can be used to create profiles of individuals, it can 		facilitate surveillance, it can enable new and unintended uses of data, and it can be used for discriminatory purposes.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;The fact that the seeding process is meant to facilitate extraction, consolidation, normalization and matching of data so it can be queried by Aadhaar 		number, and that existing databases can be transposed onto the Ginger platform can give rise to Dr. Ramanthan's concerns. She argues that anyone having 		access to the 'control' end of the Ginger platform can access all data associated to a Aadhaar number, that convergence can now easily be initiated 		with databases on the Ginger platform,  and that profiling of individuals can take place through the linking of data points via the Ginger 		platform.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;h3&gt;How does the Supreme Court Order impact the seeding process and what still needs to be clarified?&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;In the interim order the Supreme Court lays out four welcome clarifications and limitations on the UID scheme:&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&lt;ol&gt;
&lt;li&gt;The Union of India shall give wide publicity in the electronic and print media including radio and television networks that it is not mandatory for 		a citizen to obtain an Aadhaar card;&lt;/li&gt;
&lt;li&gt;The production of an Aadhaar card will not be condition for obtaining any benefits otherwise due to a citizen;&lt;/li&gt;
&lt;li&gt;The Unique Identification Number or the Aadhaar card will not be used by the respondents for any purpose other than the PDS Scheme and in particular 		for the purpose of distribution of foodgrains, etc. and cooking fuel, such as kerosene. The Aadhaar card may also be used for the purpose of the LPG 		Distribution Scheme;&lt;/li&gt;
&lt;li&gt;The information about an individual obtained by the Unique Identification Authority of India while issuing an Aadhaar card shall not be used for any 		other purpose, save as above, except as may be directed by a Court for the purpose of criminal investigation."15 &lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;In some ways, the court order addresses some of the concerns regarding the seeding of Aadhaar numbers by limiting the scope of the seeding process 			to the PDS scheme, but there are still a number of aspects of the scheme as they pertain to the seeding process that need to be addressed by the 			court.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;These include:&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;b&gt;The Process of Seeding &lt;/b&gt;&lt;/p&gt;
&lt;b&gt; &lt;/b&gt;&lt;/div&gt;
&lt;b&gt; &lt;/b&gt;
&lt;div&gt;&lt;b&gt; &lt;/b&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;Prior to the Supreme Court interim order, the above concerns were quite broad in scope as Aadhaar could be adopted by any private or public entity 			- and the number was being seeded in databases of banks, the railways, tax authorities, etc. The interim order, to an extent, lessens these 			concerns by holding that  "The Unique Identification Number or the Aadhaar card will not be used by the respondents for any purpose other 			than the PDS Scheme…".&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;However, the Court could have perhaps been more specific regarding what is included under the PDS scheme, because the scheme itself is broad. That 			said, the restrictions put in place by the court create a form of purpose limitation and a boundary of  proportionality on the UID scheme. By 			limiting the purpose of the Aadhaar number to use in the PDS system, the  Aadhaar number can only be seeded into the databases of entities 			involved in the PDS Scheme, rather than any entity that had adopted the number. Despite this, the seeding process is an issue in itself for the 			following reasons:&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Access&lt;/b&gt;: Embedding service delivery databases and bank databases with the Aadhaar number allows for the UIDAI or authorized users to access 				information in these databases. According to version 1.1 of the seeding document from the UIDAI - the UIDAI is carrying out the seeding process 				through 'seeding agencies'. These agencies can include private companies, public limited companies, government companies, PSUs, semi-government 				organizations, and NGOs that are registered and operating in India for at least three years.16 Though under contract by the UIDAI, it is 				unclear what information such organizations would be able to access. This ambiguity leaves the data collected by UIDAI open to potential abuse 				and unauthorized access. Thus, the Court Ruling fails to provide clarity on the access that the seeding process enables for the UIDAI and for 				private parties.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;br /&gt;&lt;b&gt;Consent&lt;/b&gt;: Upon enrolling for an Aadhaar number, individuals have the option of consenting to the UIDAI sharing information in three instances:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;"I have no objection to the UIDAI sharing information provided by me to the UIDAI with agencies engaged in delivery of welfare services."&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;"I want the UIDAI to facilitate opening of a new Bank/Post Office Account linked to my Aadhaar Number. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;"I have no objection to sharing my 				information for this purpose""I have no objection to linking my present bank account provided here to my Aadhaar number"17 &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;Aside for the vague and sweeping language of actions users provide consent for, which raises questions about how informed an individual is of the 			information he consents to share, at no point is an individual provided the option of  consenting  to the UIDAI accessing data - 			historic or incoming - that is stored in the database of a service provider in the PDS system seeded with the Aadhaar number. Furthermore, as noted 			earlier, the fact that the UIDAI concedes that a beneficiary has to be linked with a bank account raises questions of consent to this process as 			linking one's bank account with their Aadhaar number is an optional part of the enrollment process. Thus, even with the restrictions from the court 			order, if individuals want to use their Aadhaar number to access benefits, they must also seed their number with their bank accounts. On this 			point, in an order from the Finance Ministry it was clarified that the seeding of Aadhaar numbers into databases is a voluntary decision, but if a 			beneficiary provides their number on a voluntary basis - it can be seeded into a database.18&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;b&gt;Withdrawing Consent&lt;/b&gt;: The Court also did not directly address if individuals could withdraw consent after enrolling in the UID scheme - and if 			they did - whether Aadhaar numbers should be 'unseeded' from PDS related databases. Similarly, the Court did not clarify whether services that have 			seeded the Aadhaar number, but are not PDS related, now need to unseed the number. Though news items indicate that in some cases (not all) 			organizations and government departments not involved in the PDS system are stopping the seeding process19, there is no indication of departments 			undertaking an 'unseeding' process. Nor is there any indication of the UIDAI allowing indivduals enrolled to 'un-enroll' from the scheme. In being 			silent on issues around consent, the court order inadvertently overlooks the risk of function creep possible through the seeding process, which 			"allows numerous opportunities for expansion of functions far beyond those stated to be its purpose"20.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;b&gt;Verification and liability&lt;/b&gt;: According to Version 1.0 and Version 1.1 of the Seeding documents, "no seeding is better than incorrect seeding". 			This is because incorrect seeding can lead to inaccuracies in the authentication process and result in individuals entitled to benefits being 			denied such benefits. To avoid errors in the seeding process the UIDAI has suggested several steps including using the "Aadhaar Verification 			Service" which verifies an Aadhaar number submitted for seeding against the Aadhaar number and demographic data such as gender and location in the 			CIDR. Though recognizing the importance of accuracy in the seeding process, the UIDAI takes no responsibility for the same. According to Version 			1.1 of the seeding document, "the responsibility of correct seeding shall always stay with the department, who is the owner of the database."21 			This replicates a disturbing trend in the implementation of the UID scheme - where the UIDAI 'initiates' different processes through private sector 			companies but does not take responsibility for such processes. 22&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;b&gt;The Scope of the UIDAI's mandate and the necessity of seeding &lt;/b&gt;&lt;/p&gt;
&lt;b&gt; &lt;/b&gt;&lt;/div&gt;
&lt;b&gt; &lt;/b&gt;
&lt;div&gt;&lt;b&gt; &lt;/b&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;Aside from the problems within the seeding process itself, there is a question of the scope of the UIDAI's mandate and the role that seeding plays 			in fulfilling this. This is important in understanding the necessity of the seeding process.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;On the official website, the UIDAI has stated that its mandate is "to issue every resident a unique identification number linked to the resident's 		demographic and biometric information, which they can use to identify themselves anywhere in India, and to access a host of benefits and services." 23 		Though the Supreme Court order clarifies the use of the Aadhaar number, it does not address the actual legality of the UIDAI's mandate - as there is no 		enabling statute in place -and it does not clarify or confirm the scope of the UIDAI's mandate.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;In Version 1.0 of the Seeding document the UIDAI has stated the "Aadhaar numbers of enrolled residents are being 'seeded' ie. included in the databases 		of service providers that have adopted the Aadhaar platform in order to enable authentication via the Aadhaar number during a transaction or service 		delivery."24 This statement is only partially correct. For only providing and authenticating of an Aadhaar number - seeding is not necessary as the 		Aadhaar number submitted for verification alone only needs to be compared with the records in the CIDR to complete authentication of the same. Yet, in 		an example justifying the need for seeding in the Version 1.0 seeding document the UIDAI states "A consolidated view of the entire data would 		facilitate the social welfare department of the state to improve the service delivery in their programs, while also being able to ensure that the same 		person is not availing double benefits from two different districts."25 For this purpose, seeding is again unnecessary as it would be simple to 		correlate PDS usage with a Aadhaar number within the PDS database. Even if limited to the PDS system,  seeding in the databases of service 		providers is only necessary for the creation and access to comprehensive information about an individual in order to determine eligibility for a 		service. Further, seeding is only necessary in the databases of banks if the Aadhaar number moves from being an identity factor - to a transactional 		factor - something that the UIDAI seems to envision as the Version 1.1 seeding document states that Aadhaar is sufficient enough to transfer payments 		to an individual and thus plays a key role in cash transfers of benefits.26&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;Despite the fact that adherence to the interim order from the Supreme Court has been adhoc27, the order does provide a number of welcome limitations 		and clarifications to the UID Scheme. Yet, despite limited clarification from the Supreme Court and further clarification from the Finance Ministry's 		Order, the process of seeding and its necessity remain unclear. Is the UIDAI taking fully informed consent for the seeding process and what it will 		enable? Should the UIDAI be liable for the accuracy of the seeding process? Is seeding of service provider and bank databases necessary for the UIDAI 		to fulfill its mandate? Is the UIDAI's mandate to provide an identifier and an authentication of identity mechanism or is it to provide authentication 		of eligibility of an individual to receive services? Is this mandate backed by law and with adequate safeguards? Can the court order be interpreted to 		mean that to deliver services in the PDS system, UIDAI will need access to bank accounts or other transactions/information stored in a service 		provider's database to verify the claims of the user?&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;Many news items reflect a concern of convergence arising out of the UID scheme.28 To be clear, the process of seeding is not the same as convergence. 		Seeding enables convergence which can enable profiling, surveillance, etc. That said, the seeding process needs to be examined more closely by the 		public and the court to ensure that society can reap the benefits of seeding while avoiding the problems it may pose.&lt;/p&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Justice K.S Puttaswamy &amp;amp; Another vs. Union of India &amp;amp; Others. Writ Petition (Civil) No. 494 of 2012. Available at:  http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Usha Ramanthan. Decoding the Aadhaar judgment: No more seeding, not till the privacy issues is settled by the court. The Indian Express. August 12&lt;sup&gt;th&lt;/sup&gt; 2015. Available at: http://indianexpress.com/article/blogs/decoding-the-aadhar-judgment-no-more-seeding-not-till-the-privacy-issue-is-settled-by-the-court/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. UIDAI. Approach Document for Aadhaar Seeding in Service Delivery Databases. Version 1.0. Available at: https://authportal.uidai.gov.in/static/aadhaar_seeding_v_10_280312.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. UIDAI. Standard Protocol Covering the Approach &amp;amp; Process for Seeding Aadhaar Numbers in Service Delivery Databases. Available at: https://uidai.gov.in/images/aadhaar_seeding_june_2015_v1.1.pdf&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Version 1.0 pg. 2&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Version 1.0 pg. 19&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Version 1.1 pg. 3&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Version 1.1 pg. 7&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Version 1.1 pg. 5 -7&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Version 1.1 pg. 7-13&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Version 1.0 pg 19-22&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Version 1.0 pg. 4&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Version 1.1 pg. 5, figure 3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. David Card, Raj Chett, Martin Feldstein, and Emmanuel Saez. Expanding Access to Adminstrative Data for Research in the United States. Available at: http://obs.rc.fas.harvard.edu/chetty/NSFdataaccess.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Justice K.S Puttaswamy &amp;amp; Another vs. Union of India &amp;amp; Others. Writ Petition (Civil) No. 494 of 2012. Available at:  http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Version 1.1 pg. 18&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Aadhaar Enrollment Form from Karnataka State. http://www.karnataka.gov.in/aadhaar/Downloads/Application%20form%20-%20English.pdf&lt;i&gt;&lt;br /&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Business Line. Aadhaar only for foodgrains, LPG, kerosene, distribution. August 27&lt;sup&gt;th&lt;/sup&gt; 2015. Available at: http://www.thehindubusinessline.com/economy/aadhaar-only-for-foodgrains-lpg-kerosene-distribution/article7587382.ece&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Bharti Jain. Election Commission not to link poll rolls to Aadhaar. The Times of India. August 15&lt;sup&gt;th&lt;/sup&gt; 2015. Available at: http://timesofindia.indiatimes.com/india/Election-Commission-not-to-link-poll-rolls-to-Aadhaar/articleshow/48488648.cms&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Graham Greenleaf. “Access all areas': Function creep guaranteed in Australia's ID Card Bill (No.1) Computer Law &amp;amp; Security Review. Volume 23, Issue 4. 2007. Available at:  http://www.sciencedirect.com/science/article/pii/S0267364907000544&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Version 1.1 pg. 3&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. For example, the UIDAI depends on private companies to act as enrollment agencies and collect, verify, and enroll individuals in the UID scheme. Though the UID enters into MOUs with these organizations, the UID cannot be held responsible for the security or accuracy of data collected, stored, etc. by these entities. See draft MOU for registrars: https://uidai.gov.in/images/training/MoU_with_the_State_Governments_version.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Justice K.S Puttaswamy &amp;amp; Another vs. Union of India &amp;amp; Others. Writ Petition (Civil) No. 494 of 2012. Available at:  http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Version 1.0 pg.3&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Version 1.0  pg.4&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Version 1.1 pg. 3&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. For example, there are reports of Aadhaar being introduced for different services such as education. See: Tanu Kulkarni. Aadhaar may soon replace roll numbers. The Hindu. August 21&lt;sup&gt;st&lt;/sup&gt;, 2015. For example: http://www.thehindu.com/news/cities/bangalore/aadhaar-may-soon-replace-roll-numbers/article7563708.ece&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. For example see: Salil Tripathi. A dangerous convergence. July 31&lt;sup&gt;st&lt;/sup&gt;. 2015. The Live Mint. Available at: http://www.livemint.com/Opinion/xrqO4wBzpPbeA4nPruPNXP/A-dangerous-convergence.html&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary'&gt;https://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Rohan George</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-07T13:21:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
