<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1691 to 1705.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/report-on-cis-workshop-at-igf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/re-wiring-women-rights-debates-in-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-economic-times-varun-aggarwal-september-11-2014-google-aims-to-win-india-with-android-one"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-at-igf-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-aadhaar-case"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mobile-trust-and-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility">
    <title>Centre for Internet and Society joins the Dynamic Coalition for Platform Responsibility</title>
    <link>https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) has joined the multistakeholder cooperative engagement amidst stakeholders towards creating Due Diligence Recommendations for online platforms and Model Contractual Provisions to be enshrined in ToS. This blog provides a brief background of the role of dynamic coalitions within the IGF structure, establishes the need for the coalition and provides an update on the action plan and next steps for interested stakeholders.&lt;/b&gt;
        &lt;p class="callout" style="text-align: justify; "&gt;"Identify emerging issues, bring them to the attention of the relevant bodies and the general public, and, where appropriate, make recommendations."&lt;br /&gt;Tunis Agenda (Para 72.g)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first United Nations Internet Governance Forum (IGF), in 2006 saw the emergence of the concept of Dynamic Coalition and a number of coalitions have been established over the years. The IGF is structured to bring together multistakeholder groups to,&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"Discuss public policy issues related to key elements of Internet governance in order to foster the sustainability, robustness, security, stability and development of the Internet."&lt;br /&gt;Tunis Agenda (Para 72.a)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While IGF workshops allow various stakeholders to jointly analyse "hot topics" or to examine progress that such issues have undertaken since the previous IGF, dynamic coalitions are informal, issue-specific groups comprising members of various stakeholder groups. With no strictures upon the objects, structure or processes of dynamic coalitions claiming association with the IGF, and no formal institutional affiliation, nor any access to the resources of the IGF Secretariat, IGF Dynamic Coalitions allow collaboration of anyone interested in contributing to their discussions. Currently, there are eleven active dynamic coalitions at the IGF and can be divided into three distinct types—networks, working groups and Birds of Feather (BOFs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Workshops at the IGF are content specific events that, though valuable in informing participants, are limited in their impact by being confined to the launch of a report or by the issues raised within the conference room. The coalitions on the other hand are expected to have a broader function, acting as a coalescing point for interested stakeholders to gather and analyse progress around identified issues and plan next steps. The coalitions can also make recommendations around issues, however, no mechanism has been developed so far, by which the recommendations can be considered by the plenary body. The long-term nature of coalition is perhaps, most suited to engage stakeholders in heterogeneous groups, towards understanding and cooperating around emerging issues and to make recommendations to inform policy making.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Platform Responsibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Social networks and other interactive online services, give rise to 'cyber-spaces' where individuals gather, express their personalities and exchange information and ideas. The transnational and private nature of such platforms means that they are regulated through contractual provisions enshrined in the platforms' Terms of Service (ToS). The provisions delineated in the ToS not only extend to users in spite of their geographical location, the private decisions undertaken by platform providers in implementing the ToS are not subject to constitutional guarantees framed under national jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While ToS serve as binding agreement online, an absence of binding international rules in this area despite the universal nature of human rights represented is a real challenge, and makes it necessary to engage in a multistakeholder effort to produce model contractual provisions that can be incorporated in ToS. The concept of 'platform responsibility' aims to stimulate behaviour in platform providers to provide intelligible and solid mechanisms, in line with the principles laid out by the UN Guiding Principles on Business and Human Rights and equip platform users with common and easy-to-grasp tools to guarantee the full enjoyment of their human rights online. The utilisation of model contractual provisions in ToS may prove instrumental in fostering trust in online services for content production, use and dissemination, increasing demand of services and ultimately consumer demand may drive the market towards human rights compliant solutions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Dynamic Coalition on Platform Responsibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To nurture a multi-stakeholder endeavour aimed at the elaboration of model contractual-provisions, Mr. Luca Belli, Council of Europe / Université Paris II, Ms Primavera De Filippi, CNRS / Berkman Center for Internet and Society and Mr Nicolo Zingales, Tilburg University / Center for Technology and Society Rio, initiated and facilitated the creation of the Dynamic Coalition on Platform Responsibility (DCPR). DCPR has over fifty individual and organisational members from civil society organisations, academia, private sector organisations and intergovernmental organisations and held its first meeting at the IGF in Istanbul. The meeting began with an overview of the concept of platform responsibility, highlighting relevant initiatives from Council of Europe, Global Network Initiative, Ranking Digital Rights and the Center for Democracy and Technology have undertaken in this regard. Existing issues such as difficulty in comprehension and lack of standardization of redress across rights were raised along with the fundamental lack of due process in terms of transparency across existing mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online platforms compliance to human rights is often framed around the duty of States to protect human rights and often, Internet companies do not sufficient consideration of the effects of their  business practices on users fundamental rights undermining trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting focused it efforts with a call to identify issues of process and substance and specific rights and challenges to be addressed by the DCPR. The procedural issues raised concerned  'responsibility' in decision-making e.g., giving users the right to be heard and an effective remedy before an impartial decision-making body, and obtaining their consent for changes in the contractual terms.  The concerns raised around substantive rights such as privacy and freedom of expression eg., disclosure of personal information and content removal and need to promote 'responsibility' through establishing concrete mechanisms to deal with such issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was suggested that concept of responsibility including in case of conflict between different rights could be grounded in Human Rights case law eg., from European Court of Human Rights jurisprudence. It was also established that any framework that would evolve from this coalition would consider the distinction between users (eg., adults, children, and people with or without continuous access to the Internet) and platforms (eg., in terms of size and functionality).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Action Plan&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The participants at the DCPR meeting agreed to establish a multistakeholder cooperative engagement amidst stakeholders that will go beyond dialogue and produce concrete proposals. Particularly, participants suggested developing:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Due Diligence Recommendations: Recommendations to online platforms with regard to processes of compliance with internationally agreed human rights standards.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Model Contractual Provisions: Elaboration of a set of principles and provisions protecting platform users’ rights and guaranteeing transparent mechanisms to seek redress in case of violations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;DCPR will ground the development of these frameworks in the preliminary step of compilation of existing projects and initiatives dealing with the analysis of ToS compatibility with human rights  standards. Members, participants and interested stakeholders are invited to highlight and share relevant initiatives by 10th October regarding:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Processes of due diligence for human rights compliance;&lt;/li&gt;
&lt;li&gt;The evaluation of ToS cocompliance with human rights standards;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Further to this compilation, a first recommendation draft regarding online platforms' due diligence will be circulated on the mailing list by 30th October 2014. CIS will be contributing to the drafting which will be led and elaborated by the DCPR coordinators. This draft will be open for comments via the DCPR mailing list until 30th November 2014 and we encourage you to sign up to the mailing list (&lt;a class="external-link" href="http://lists.platformresponsibility.info/listinfo/dcpr"&gt;http://lists.platformresponsibility.info/listinfo/dcpr&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;A second draft will be developed compiling the comments expressed via the mailing-list and shared for comments by 10 December 2014. The final version of the recommendation will be drafted by 30 December. Subsequently, the first set of model contractual provisions will be elaborated  building upon such recommendation. A call for inputs will be issued in order to gather suggestions on the content of these provisions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility'&gt;https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Human Rights</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Terms of Service</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Platform Responsibility</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2014-10-07T10:54:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/report-on-cis-workshop-at-igf">
    <title>Report on CIS' Workshop at the IGF:'An Evidence Based Framework for Intermediary Liability'</title>
    <link>https://cis-india.org/internet-governance/report-on-cis-workshop-at-igf</link>
    <description>
        &lt;b&gt;An evidence based framework for intermediary liability' was organised to present evidence and discuss ongoing research on the changing definition, function and responsibilities of intermediaries across jurisdictions.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The discussion from the workshop will contribute to a comprehensible framework for liability, consistent with the capacity of the intermediary and with international human-rights standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Electronic Frontier Foundation (USA), Article 19 (UK) and Centre for Internet and Society (India) have come together towards the development of best practices and principles related to the regulation of online content through intermediaries. The nine principles are: Transparency, Consistency, Clarity, Mindful Community Policy Making, Necessity and Proportionality in Content Restrictions, Privacy, Access to Remedy, Accountability, and Due Process in both Legal and Private Enforcement. The workshop discussion will contribute to a comprehensible framework for liability that is consistent with the capacity of the intermediary and with international human-rights standards. The session was hosted by Centre for Internet and Society (India) and Centre for Internet and Society, Stanford (USA) and attended by 7 speakers and 40 participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jeremy Malcolm, Senior Global Policy Analyst EFF kicked off the workshop highlighting the need to develop a liability framework for intermediaries that is derived out of an understanding of their different functions, their role within the economy and their impact on human rights. He went on to structure the discussion which would follow to focus on ongoing projects and examples that highlight central issues related to gathering and presenting evidence to inform the policy space.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Martin Husovec from the International Max Planck Research School for Competition and Innovation, began his presentation, tracking the development of safe harbour frameworks within social contract theory. Opining that safe harbour was created as a balancing mechanism between a return of investments of the right holders and public interest for Internet as a public space, he introduced emerging claims that technological advancement have altered this equilibrium. Citing injunctions and private lawsuits as instruments, often used against law abiding intermediaries, he pointed to the problem within existing liability frameoworks, where even intermediaries, who diligently deal with illegitimate content on their services, can be still subject to a forced cooperation to the benefit of right holders. He added that for liability frameworks to be effective, they must keep pace with advances in technology and are fair to right holders and the public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also pointed that in any liability framework because the ‘law’ that prescribes an interference, must be always sufficiently clear and foreseeable, as to both the meaning and nature of the applicable measures, so it sufficiently outlines the scope and manner of exercise of the power of interference in the exercise of the rights guaranteed. He illustrated this with the example of the German Federal Supreme Court attempts with Wi-Fi policy-making in 2010. He also raised issues of costs of uncertainty in seeking courts as the only means to balance rights as they often, do not have the necessary information. Similarly, society also does not benefit from open ended accountability of intermediaries and called for a balanced approach to regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for consistency in liability regimes across jurisdictions, was raised by Giancarlo Frosio, Intermediary Liability Fellow at Stanford's Centre for Internet and Society. He introduced the World Intermediary Liability Map, a project mapping legislation and case law across 70 countries towards creating a repository of information that informs policymaking and helps create accountability. Highlighting key takeaways from his research, he stressed the necessity of having clear definitions in the field of intermediary liability and the need to develop taxonomy of issues to deepen our understanding of the issues at stake towards an understanding of type of liability appropriate for a particular jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nicolo Zingales, Assistant Professor of Law at Tilburg University highlighted the need for due process and safeguards for human rights and called for more user involvement in systems that are in place in different countries to respond to requests of takedown. Presenting his research findings, he pointed to the imbalance in the way notice and takedown regimes are structured, where content is taken down presumptively, but the possibility of restoring user content is provided only at a subsequent stage or not at all in many cases. He cited several examples of enhancing user participation in liability mechanisms including notice and notice, strict litigation sanction inferring the knowledge that the content might have been legal and shifting the presumption in favor of the users and the reverse notice and takedown procedure. He also raised the important question, if multistakeholder cooperation is sufficient or adequate to enable the users to have a say and enter as part of the social construct in this space? Reminding the participants of the failure of the multistakeholder agreement process regarding the cost for the filters in the UK, that would be imposed according to judicial procedure, he called for strengthening our efforts to enable users to get more involved in protecting their rights online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gabrielle Guillemin from Article 19 presented her research on the types of intermediaries and models of liability in place across jurisdictions. Pointing to the problems associated with intermediaries having to monitor content and determine legality of content, she called for procedural safeguards and stressed the need to place the dispute back in the hands of users and content owners and the person who has written the content rather than the intermediary. She goes on to provide some useful and practically-grounded solutions to strengthen existing takedown mechanisms including, adding details to the notices, introducing fees in order to extend the number of claims that are made and defining procedure regards criminal content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok introduced CIS' research to the UNESCO report Fostering Freedom Online: the Role of Internet Intermediaries, comparing a range of liability models in different stages of development and provisions across jurisdictions. She argued for a liability framework that tackles procedural and regulatory uncertainty, lack of due process, lack of remedy and varying content criteria.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Francisco Vera, Advocacy Director, Derechos Digitales from Chile raised issues related to mindful community policy-making expounding on Chile's implementation of intermediary liability obligation with the USA, the introduction of judicial oversight under Chilean legislation which led to US objection to Chile on grounds of not fulfilling their standards in terms of Internet property protection. He highlighted the tensions that arise in balancing the needs of the multiple communities and interests engaged over common resources and stressed the need for evidence in policy-making to balance the needs of rights holders and public interest. He stressed the need for evidence to inform policy-making and ensure it keeps pace with technological developments citing the example of the ongoing Transpacific Partnership Agreement negotiations that call for exporting provisions DMCA provisions to 11 countries even though there is no evidence of the success of the system for public interest. He concluded by cautioning against the development of frameworks that are or have the potential to be used as anti-competitive mechanisms that curtail innovation and therby do not serve public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Malcolm Hutty associated with the European Internet Service Providers Association, Chair of the Intermediary Reliability Committee and London Internet Exchange brought in the intermediaries' perspective into the discussion. He argued for challenging the link between liability and forced cooperation, understated the problems arising from distinction without a difference and incentives built in within existing regimes. He raised issues arising from the expectancy on the part of those engaged in pre-emptive regulation of unwanted or undesirable content for intermediaries to automate content. Pointing to the increasing impact of intermediaries in our lives he underscored how exposing vast areas of people's lives to regulatory enforce, which enhances power of the state to implement public policy in the public interest and expect it to be executed, can have both positive and negative implications on issues such as privacy and freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He called out practices in regulatory regimes that focus on one size fits all solutions such as seeking automating filters on a massive scale and instead called for context and content specific solutions, that factor the commercial imperatives of intermediaries. He also addressed the economic consequences of liability frameworks to the industry including cost effectiveness of balancing rights, barriers to investments that arise in heavily regulated or new types of online services that are likely to be the targeted for specific enforcement measures and the long term costs of adapting old enforcement mechanisms that apply, while networks need to be updated to extend services to users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The workshop presented evidence of a variety of approaches and the issues that arise in applying those approaches to impose liability on intermediaries. Two choices emerged towards developing frameworks for enforcing responsibility on intermediaries. We could either rely on a traditional approach, essentially court-based and off-line mechanisms for regulating behaviour and disputes. The downside of this is it will be slow and costly to the public purse. In particular, we will lose a great deal of the opportunity to extend regulation much more deeply into people's lives so as to implement the public interest.&lt;br /&gt;&lt;br /&gt;Alternatively, we could rely on intermediaries to develop and automate systems to control our online behaviour. While this approach does not suffer from efficiency problems of the earlier approach it does lack, both in terms of hindering the developments of the Information Society, and potentially yielding up many of the traditionally expected protections under a free and liberal society. The right approach lies somewhere in the middle and development of International Principles for Intermediary Liability, announced at the end of the workshop, is a step closer to the developing a balanced framework for liability.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;See the &lt;a class="external-link" href="http://www.intgovforum.org/cms/174-igf-2014/transcripts/1968-2014-09-03-ws206-an-evidence-based-liability-policy-framework-room-5"&gt;transcript on IGF website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/report-on-cis-workshop-at-igf'&gt;https://cis-india.org/internet-governance/report-on-cis-workshop-at-igf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2014-09-24T10:47:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/re-wiring-women-rights-debates-in-digital-age">
    <title>Re-Wiring Women's Rights Debates in the Digital Age</title>
    <link>https://cis-india.org/internet-governance/news/re-wiring-women-rights-debates-in-digital-age</link>
    <description>
        &lt;b&gt;IT for Change in partnership with Kutch Mahila Vikas Sangathan and ANANDI organized this event on September 13 and 14, 2014. Rohini Lakshane participated as a speaker.
&lt;/b&gt;
        &lt;p&gt;Website:&lt;br /&gt; &lt;a class="moz-txt-link-freetext" href="http://www.itforchange.net/ITfC_Course_Re-wiring_womens_rights/index.php/Agenda"&gt;http://www.itforchange.net/ITfC_Course_Re-wiring_womens_rights/index.php/Agenda&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; Speakers List:&lt;br /&gt; &lt;a class="moz-txt-link-freetext" href="http://www.itforchange.net/ITfC_Course_Re-wiring_womens_rights/index.php/Session_speakers"&gt;http://www.itforchange.net/ITfC_Course_Re-wiring_womens_rights/index.php/Session_speakers&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/vjSY1WUlLRw" width="560"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/re-wiring-women-rights-debates-in-digital-age'&gt;https://cis-india.org/internet-governance/news/re-wiring-women-rights-debates-in-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2015-02-12T17:07:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation">
    <title>Biometrics: An ‘Angootha Chaap’ nation? </title>
    <link>https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation</link>
    <description>
        &lt;b&gt;This blog post throws light on the inconsistencies in biometric collection under the UID and NPR Schemes. &lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Fingerprints and iris scans. The Unique Identification (UID) Number aims to serve as a proof of identity that can be easily verified and linked to subsidies and to bank accounts. Four years into its implementation, the UID Scheme seems to have the vote of confidence of the public. More than 65 Crore Indians have been granted UID Numbers,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and only a few have been concerned enough to seek clarity through Right to Information Requests to the UIDAI about the finances and legal authority backing the scheme.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Parallel to the UID scheme, the National Population Register scheme is also under way, with enrolment in some areas, such as Srinagar, Shimla and Panchkula, having reached 100% of the estimated population.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NPR scheme is an offshoot of the census. It began in census cycle 2010-11, pursuant to the amendment of the Citizenship Act in 2004, under which national identity cards are to be issued. The desired outcome of the NPR scheme is an NPR card with a chip embedded with three bits of information built into a card: (i) biometric information, (ii) demographic information and (iii) UID Number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both the UID and NPR schemes aspire to be conduits that subsidies, utilities, and other benefits are routed through. While the UID and NPR schemes are distinct in terms of their legal sanctity, purpose and form, the harmonization of these two schemes is one of the UIDAI’s functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are substantial overlaps in the information collected and the purpose they serve leading to the argument that having two schemes is redundant. The compatibility of the two schemes was questioned and it was initially thought that a merger would be unreasonable. While there has been speculation that the UID scheme may terminate, or that it would be taken over by the Home Ministry, it has been reported that the new government has directed expedited enrolments through the UID scheme. &lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both schemes are incomplete and suffer from vagaries, including, but not limited to: their legality, safeguards against misuse of the data, the implementation of the schemes – including the collection and storage of biometric information and their convergence or divergence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This blog will focus on understanding the process of collecting biometric data in each scheme – calling out similarities and differences – as well as areas in which data collected under one scheme is incompatible with the other scheme. It will look at existing and missing safeguards in the collection of biometrics, overlap in the collection of biometrics by the two schemes, and existing practice in the collection of biometrics. In doing so the blog will highlight the lack of privacy safeguards for the biometric information and conclude that since the policies for data collection and use policy are unclear, the data subjects do not know how their data is being collected, used, and shared between the UID and the NPR schemes.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Unreliability of Biometric Data&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Biometric data has been qualified as being unreliable.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; It cannot always be successfully used to identify a person, especially in India, where manual labour degrades the fingerprint&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; and nutritional deficiencies mar the iris. Even experts working with the UIDAI&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; admit that fingerprints are not always good indicators of identity. If the very identification of a person fails, which is what the UID seeks to do, then the purpose of the UID is defeated.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Biometric Data Collection under the UID Scheme&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In the current structure of the scheme, collected biometric information is stored by, and vests with the UIDAI for an undefined period. The data if used only for identification and authentication purposes, as originally intended, could very well fail to serve its intended purpose. But amassing the personal data of the entire country is lucrative, particularly to the service providers who collect the information and are mandated with the task to manually collect the data before it is fed into the UID system and encrypted. Most of the service providers that collect information, including biometric data, for the UID are engaged in information services such as IT or online marketing service providers.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The below chart delineates the process followed for the collection of biometrics under the UID Scheme:&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_c1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Under the NIAI Bill, all data collected or authenticated by the UIDAI, until the Bill is enacted and the National Identification Authority of India is created, vests with the UIDAI. In practice this means that the UIDAI owns the biometric data of the data-subject, without clear safeguards against misuse of the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the UID scheme, the collection of biometrics at the time of enrollment by the UIDAI is severely flawed for a number of reasons:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Lack of clear legal authority and procedure for collection of biometrics:&lt;/b&gt; The only legal authority the UIDAI has to collect biometric information is via the notification of its constitution. Even then, the powers of the UIDAI are vague and broad. Importantly, the notification tells us nothing of how biometric data is to be collected and how it is to be used. These standards have only been developed by the UIDAI in an &lt;i&gt;ad-hoc manner &lt;/i&gt;when the need arises or after a problem is spotted. The lack of purpose-specification is in violation of the law&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; and prevents the data subject from giving informed consent to data collection. This is discussed at a later stage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. The collection of Biometrics is regulated through only a Bill, which delegates the development of safeguards to Rules:&lt;/b&gt; The National Identification Authority of India (NIAI) Bill&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; confers the National Information Authority of India (NOT THE UIDAI) with the power to pass rules to collect biometric data and to prescribe standards for collection.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; This is a rule-making power, which is conferred under a Bill. Neither has the Bill been enacted, nor have rules for the collection of biometrics been framed and notified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Collection&lt;/b&gt; &lt;b&gt;of&lt;/b&gt; &lt;b&gt;biometric&lt;/b&gt; &lt;b&gt;data only with implied consent:&lt;/b&gt; Though collection of biometrics is mentioned in the enrolment form, explicit consent for the collection of biometrics is not collected and only implied consent may be inferred. The last line in the enrollment form is titled ‘CONSENT’ and is a declaration that all data, including biometric information, is true.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. Collection of biometric data outsourced to third party:&lt;/b&gt; Collection of biometric information in the UID scheme is outsourced to third parties through tenders. For instance, Accenture has been declared a biometric service provider under a contract with the UID.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; The third party may be a company, firm, educational institution or an accreditation agency. The eligibility criteria are quite straightforward, they relate to the entity’s structure and previous experiences with small projects.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Since the ability to protect privacy of the data subject is entirely absent from the eligibility criteria, a successful bidder may not have adequate procedure in place or sufficient experience in managing confidential data, to ensure the privacy of the data subject. By outsourcing the data collection, the UIDAI has arguably delegated a function it never had the legal authority to perform. Thus, the agency of the data collection is equally defective. To heighten the irregularity, these contract agents can sub-contract the job of physical data collection.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; This means that the data operator and the ground supervisors, who come into direct contact with the raw data, including biometric data, are not appointed by the government, or the UIDAI, but by a private agency, who is further removed from the chain. The data operator scans the documents submitted for verification and has physical access to the document.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Biometric data is admittedly vulnerable to sale and leakage: &lt;/b&gt;In an ongoing case in the Supreme Court of India, the national Capital Territory of Delhi has, in its counter-affidavit, admitted that data collected under the UID is vulnerable to sale and leakage.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; To quote from the counter-affidavit ‘&lt;i&gt;..in any exercise of gathering identities whether it is by census authority… or through the present process… there is always a possibility of leakage. Enumerators can scan and keep copies of all the forms and sell them for a price.- this (sic) it can never be said that the data gathered… is safe.’&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;b&gt;[18]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; Anyone who has registered for either UID is therefore a candidate for identity theft or unsolicited commercial information. This is also true for the NPR, as census data is the basis for the NPR.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Data collection under the NPR Scheme&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The declaration of courts that it is unnecessary to link the UID number for public utilities and the admission by Delhi in the case that a data subject cannot be compelled to provide biometrics or to obtain a UID Number under the Aadhaar scheme&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; are steps forward in ensuring the voluntariness of UID. However, the UID Number is mandatory by implication. It is a pre-requisite for registration under the National Population Register, which is compulsory, pursuant to S. 14-A of the Citizenship Act. The below diagram delineates the collection of biometric information under the NPR scheme:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;DATA FLOW PROCESS&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_c2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;Flaws in the collection of biometric data under the NPR scheme&lt;b&gt; &lt;/b&gt;&lt;/h2&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Compulsion:&lt;/b&gt; Registration in the NPR is legally mandated and individuals who fail to do so can face penalty. As a note, arguably, the compulsion to register for the NPR is untenable, as the Rules prescribe penalty, whereas the Act does not. &lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; A word of caution is appropriate here. The penalty under the Rules stands till it is deleted by the legislature or declared void by courts and one may be held liable for refusing to register for the NPR, though the above argument may be a good defense.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Duplicity: &lt;/b&gt;Duplicity is a problem under the NPR Scheme. Biometric data is collected twice before the NPR exercise is completed. Even if one has registered under the UID scheme, they have to give their biometric information again under the NPR scheme. The first instance of collection of biometric information is for the UID number and the second, under the NPR scheme. The latter is necessary even if the data has already been collected for the UID number. Since the parties collecting biometric information for NPR are empanelled by the UIDAI and the eligibility is the same, the data is subject to the same or similar threats of data leakage that may arise when registering for the UID. The multi-level data collection only amplifies the admitted vulnerability of data as unauthorized actors can unlawfully access the data at any stage. This, coupled with the fact that UIDAI has to harmonize the NPR and UID schemes, and that the data comes to the UIDAI for de-duplication, means that the NPR data could be used by the UIDAI, but it may not result in a UID Number. There is no data that disproves this potential. This is a matter of concern, as one who wishes not to register for a UID number, in protection of their privacy, is at peril for their data falls into the hands of the UIDAI.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Biometric data collectors under the NPR scheme empanelled by the UIDAI:&lt;/b&gt; The service providers collecting biometric data under the NPR are selected through bids and need to be empanelled with the UIDAI.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; Most enrolment agencies that are empanelled with the UIDAI are either IT or online marketing companies&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;, making the fear of targeted marketing even more likely.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Public display and verification: &lt;/b&gt;Under the NPR scheme, the biometric and demographic information and UID number of registrants is publicly displayed in their local area for verification.&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; However, it is a violation of privacy to have sensitive personal data, such as biometrics put up publicly. Not only will the demographic information be readily accessible, nothing will prohibit the creation of a mailing list or collection of data for either data theft or for sending unsolicited commercial communication. The publicly available information is the kind of information that can be used for verification (Know Your Customer) and to authorize financial transactions. Since the personal information is displayed in the data subject’s local area, it is arguably a more invasive violation of privacy, since the members of the local area can make complex connections between the data subject and the data.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Smart Card: &lt;/b&gt;The desired outcome of the NPR scheme is an NPR card. This card is to contain a chip, which is embedded with information such as the UID Number, biometrics and the demographic information. It is still unclear as to whether this information will be machine-readable. If so, this information may be just a swipe away. However, this cannot be confirmed without information on the level encryption and how the data will be stored on the chip.&lt;/li&gt;
&lt;/ol&gt;&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;‘Privacy safeguards available under the UID and NPR schemes are ad-hoc and incomplete&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The safeguards under both the UID and NPR schemes are quite similar, since the UIDAI and its empanelled biometric service providers are involved in collecting biometric information for both the UID and the NPR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pilot studies for the UID scheme, including the use of biometrics, were not conducted in advance to implementation. In line with this, the enactment of a legislation governing the UID and the implementation of policies with respect to data handling and use will be made as and when the need arises. The development of safeguards in relation to the NPR will also be ad-hoc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, the data standards for one will potentially influence that of the other scheme. For instance, the change in privacy standards for handling biometrics under the UID may affect the empanelment of biometric service providers. This will automatically affect the data security level the NPR can seek to achieve.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Being developed ad-hoc and after the fact, there is a risk that these regulations may unreasonably curtail the rights of data subjects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The existing Indian laws on data protection and privacy are not comprehensive. Certain laws protect privacy only in specific situations. For instance, the IT Act and related rules protect privacy in relation to digital information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any body that collects sensitive personal data such as biometric data, or any other data for processing and storage has a legal mandate under the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal data or Information) Rules, 2011 to make certain disclosures BEFORE OR WHILE THE DATA IS COLLECTED. This includes, &lt;i&gt;inter-alia,&lt;/i&gt; disclosures of (i) the purpose of information collection, (ii) the intended recipients of the information and (iii) name and addresses of the collector and of the party retaining the data.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Rules, the data collector has a duty to give the data subject an option to withhold personal sensitive information.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt; A conversation with a data subject shows that this safeguard has not been upheld. The subject also conveyed a lack of knowledge of who the collection agency was. This is a problem of lack of accountability, as the data path cannot be traced and the party responsible for misuse or breach of security cannot be held liable.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The data collection under the NPR and UID schemes shows several vulnerabilities. Apart from the vulnerabilities with biometric information, there is a real risk of misuse of the data and documents submitted for enrolment under these schemes. Since the data collectors are primarily online marketing or IT service providers, there is likelihood that they will use this data for marketing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We can only hope that in time, data subjects will be able to withdraw their personal data from the UID database and surrender their UID number. We can only wait and watch to see whether (i) the UID Number is a legal prerequisite for the NPR Card and (ii) whether the compulsion to register for NPR is done away with.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; &lt;a href="https://portal.uidai.gov.in/uidwebportal/dashboard.do"&gt;https://portal.uidai.gov.in/uidwebportal/dashboard.do&lt;/a&gt; accesed: 21 August, 2014&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; As of January 2013, only 25 RTI requests were made to the UIDAI &lt;a href="http://uidai.gov.in/rti/rti-requests.html"&gt;http://uidai.gov.in/rti/rti-requests.html&lt;/a&gt; accessed: 21 August, 2014&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; DIT-NPR Management Information System accessed: 22 August, 2014 &lt;a href="http://nprmis.nic.in/NPRR33_DlyDigitPrgGraph.aspx"&gt;http://nprmis.nic.in/NPRR33_DlyDigitPrgGraph.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Cloud Still Hangs Over Aadhaar’s Future, Business Standard, accessed 28 August, 2014. &lt;a href="http://www.business-standard.com/article/current-affairs/cloud-still-hangs-over-aadhaar-s-future-114081401131_1.html"&gt;http://www.business-standard.com/article/current-affairs/cloud-still-hangs-over-aadhaar-s-future-114081401131_1.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Frost &amp;amp; Sullivan, Best Practices Guide to Biometrics, accessed: 13 August, 2014 &lt;a class="external-link" href="http://www.google.co.in/url?sa=t&amp;amp;amp;rct=j&amp;amp;amp;q=&amp;amp;amp;esrc=s&amp;amp;amp;source=web&amp;amp;amp;cd=5&amp;amp;amp;cad=rja&amp;amp;amp;uact=8&amp;amp;amp;ved=0CD8QFjAE&amp;amp;amp;url=http%3A%2F%2Fwww.frost.com%2Fprod%2Fservlet%2Fcpo%2F240303611&amp;amp;amp;ei=6VbsU4m8HcK58gWx64DYDQ&amp;amp;amp;usg=AFQjCNGqan81fX6qtG0S4VV6oh_B5R_QYg&amp;amp;amp;sig2=cOOPm1JJ79AcJq2Gfq1_3Q&amp;amp;amp;bvm=bv.73231344,d.dGc"&gt;http://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=5&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0CD8QFjAE&amp;amp;url=http%3A%2F%2Fwww.frost.com%2Fprod%2Fservlet%2Fcpo%2F240303611&amp;amp;ei=6VbsU4m8HcK58gWx64DYDQ&amp;amp;usg=AFQjCNGqan81fX6qtG0S4VV6oh_B5R_QYg&amp;amp;sig2=cOOPm1JJ79AcJq2Gfq1_3Q&amp;amp;bvm=bv.73231344,d.dGc&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Malavika Jayaram, “India’s Identity Crisis”, Internet Monitor 2013, reflections of a digital world, accessed: 13 August, 2014 &lt;a href="http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2366840_code727672.pdf?abstractid=2366840&amp;amp;mirid=1"&gt;http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2366840_code727672.pdf?abstractid=2366840&amp;amp;mirid=1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt;M. Vatsa, et.al, “Analyzing Fingerprints of Indian Population Using Image Quality: A UIDAI Case Study” , accessed: 13 August, 2014 &lt;a href="https://research.iiitd.edu.in/groups/iab/ICPR2010-Fingerprint.pdf"&gt;https://research.iiitd.edu.in/groups/iab/ICPR2010-Fingerprint.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Prakash Chandra Sao, The Unique ID Project in India: An Exploratory Study, accessed: 21 August, 2014 &lt;a href="http://subversions.tiss.edu/the-unique-id-project-in-india-an-exploratory-study/"&gt;http://subversions.tiss.edu/the-unique-id-project-in-india-an-exploratory-study/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; R. 5(3) of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal data or Information) Rules, 2011, accessed: 20 August, 2013 &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; National Identification Authority of India Bill, 2010 (Bill No. LXXV of 2010), accessed: 26 August,2014 http://164.100.24.219/BillsTexts/RSBillTexts/asintroduced/national%20ident.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Clause 23 of the NIAI Bill, 2010&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt;The UID Enrollment form, accessed: 26 August, 2014 &lt;a href="http://uidai.gov.in/images/uid_download/enrolment_form.pdf"&gt;http://uidai.gov.in/images/uid_download/enrolment_form.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Documents filed and relied on in Puttuswamy v Union of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Request for empanelment, accessed: 28 August, 2014. &lt;a href="http://uidai.gov.in/images/tenders/rfe_for_concurrent_evaluation_of_processoperation_at_enrolment_centers_13082014.pdf"&gt;http://uidai.gov.in/images/tenders/rfe_for_concurrent_evaluation_of_processoperation_at_enrolment_centers_13082014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; This information is available from the documents filed and relied on in Puttuswamy v Union Of India, which is being heard in the Supreme Court of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; An anonymous registrant observes that the data was scanned behind a screen and was not visible from the registered counter. The registrant is concerned that, in addition to collection of information for the UID, photocopies or digital copies could be taken for other uses and the registrant would not know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Counter Affidavit filed in the Supreme Court of India on behalf on New Delhi in K. Puttuswamy v Union of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is also admitted that the census is equally vulnerable. The information collected through census is used for the NPR exercise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Para. 48 in the Counter Affidavit filed by NCR Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Affidavit in K. Puttuswamy v Union of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;See also: &lt;/i&gt;FAQs: Enrollment Agencies, accessed 22 August, 2014 &lt;a href="http://uidai.gov.in/faq.html?catid=37"&gt;http://uidai.gov.in/faq.html?catid=37&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Usha Ramanathan, A Tale of Two Turfs, The Statesman, accessed: 20 August, 2014 &lt;a href="http://www.thestatesman.net/news/10497-a-tale-of-two-turfs-npr-and-uid.html?page=3"&gt;http://www.thestatesman.net/news/10497-a-tale-of-two-turfs-npr-and-uid.html?page=3&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; RFQ for Engaging MSP for Biometric Enrolment for the Creation of NPR, accessed: 26 August, 2014 http://ditnpr.nic.in/pdf/120102_RFQBiometricUrban_rebidding-Draft.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Prakash Chandra Sao, The Unique ID Project in India: An Exploratory Study, accessed: 21 August, 2014 &lt;a href="http://subversions.tiss.edu/the-unique-id-project-in-india-an-exploratory-study/"&gt;http://subversions.tiss.edu/the-unique-id-project-in-india-an-exploratory-study/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; &lt;a href="http://censusindia.gov.in/2011-Common/IntroductionToNpr.html"&gt;http://censusindia.gov.in/2011-Common/IntroductionToNpr.html&lt;/a&gt;, accessed: 26 August, 2014&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; R. 5(3) of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal data or Information) Rules, 2011, accessed: 20 August, 2013 &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; R. 5(7) of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal data or Information) Rules, 2011.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation'&gt;https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Mukta Batra</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-19T06:12:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground">
    <title>UID and NPR: Towards Common Ground</title>
    <link>https://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground</link>
    <description>
        &lt;b&gt;The UID (Unique Identification) and NPR (National Population Register) are both government identity schemes that aggregate personal data, including biometric data for the provision of an identification factor, and aim to link them with the delivery of public utility services.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The differences between the two exist in terms of collection of data, the type of identification factor issued, authorities involved and the outcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite the differences, there has been talk of combining the two schemes because of the overlap.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; In the same breath, it has been argued that the two schemes are incompatible. &lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the UIDAI’s (Unique Identification Authority of India) functions is to harmonize the two schemes. &lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As it stands, the schemes are distinct. Enrolment for a UID does not lead to automatic enrolment in the NPR. The NPR website expressly states that even if a data subject has undergone census or has been granted a UID Number, it is necessary to visit a data collection centre to provide biometric data for the NPR.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;UID and NPR: The Differences&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;The Basis of identity/ Unit of Survey&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The most striking difference between the UID and NPR Schemes is their notion of identity. The UID is individual based, whereas the NPR scheme focuses on the household or the family as a composite unit. Thus, the UID seeks to enroll individuals while the NPR seeks to gather data of the members of a household or family as a composite unit during the census and later register each person for an NPR Card, on the basis of the census data. To this extent, analysis of the data gathered from the two schemes will be different and will require differing analytical tools. The definition of the data subject and the population is different. In one scheme, the unit is an individual; in the other it is the household/family. Though the family is the composite unit in the NPR, the data is finally extracted it is unpaired to provide individuals NPR cards, but the family based association is not lost and it is argued that this household association of NPR should be used to calculate and provide subsidies. Some states have put on hold transfer of cooking gas subsidy, which is calculated for each household, through Aadhar-linked bank accounts.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; If both schemes were merged, the basis for determining entitlement to subsidies would be non-uniform.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Differences in Information Collection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The UID and NPR have different procedures for collection of information. In the UID scheme, all data is collected in data collection centres whereas NPR data is collected door to door in part and in collection centres for the other part.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UID data is collected by the UIDAI themselves or by private parties, under contract. These contractors are private parties: often, online marketing service providers.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; The data subjects were initially allowed registration through an introducer and without any documentation. This was replaced with the verification system where documents were to be produced for registration for UID.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NPR involves a dual collection process- the first stage is the door-to-door collection of data as part of the Census. This information is collected through questionnaire. No supporting documents/ proof is produced to verify this data. The verification happens at a later stage, through public display of the information. This data is digitized. The data subjects are then to give their biometric data at the data collection centres, on the production of the census slip. The biometric data collectors are parties who are empanelled by the UIDAI and are eligible to collect data under the UID Scheme. A subject’ s data is aggregated and then de-duplicated by the UIDAI. &lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This shows two points of merger. It can be suggested that when data is collected for the UID number, then the subject should not have to give their biometrics for the NPR Scheme again. The sharing of biometrics across the schemes will reduce cost and redundancy. While sharing of UID data with NPR is feasible, the reverse is not true, since UID is optional and NPR is not. If NPR data is to be shared with UID, then the subject has the right to refuse. However, the consent for using NPR data for the UID is a default YES in the UID form. &lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; Prohibiting the information sharing is no option.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Differences in Stated Purposes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The NPR is linked to citizenship status. The NPR exercise is being conducted to create a national citizen register and to assist in identifying and preventing illegal immigration. The NPR card, a desired outcome, is aimed to be a conduit for transactions relating to subsidies and public utilities.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; So is the UID Number, which was created to provide the residents of India an identity. The linkage and provision of subsidies through the NPR and UID cards have not taken off on a large scale and there is a debate as to which will be more appropriate for direct benefit transfer, with some leaders proclaiming that the NPR scheme is more suited to direct benefit transfer.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; Since the UID Number is linked to direct benefit transfer, but not to citizenship, benefits such as those under the MNREGA scheme, may be availed by non-citizens as well, though only citizens are eligible for the scheme.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;C. Chandramouli, the Registrar General and Census Commissioner of India, states that the conflict between the two schemes is only perceived, and results from a poor understanding of the differences in objective. The NPR, he states is created to provide national security through the creation of a citizen register, starting with a register of residents after authentication and verification of the residence of the subjects. On the other hand, the UID exercise is to provide a number that will be used to correctly identify a person.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Difference in Legal Sanctity&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI was set up through an executive notification, which dictates a few of its responsibility, including: assigning a UID number, collating the UID and NPR schemes, laying down standards for interlinking with partner databases and so on. However, the UIDAI has not expressed responsibility to collect, or authorize collection of data under this scheme. The power to authorize the collection of biometrics is vested with the National Identification Authority of India (NIAI), which will be set up under the National Identification Authority of India Bill, (NIAI Bill, which is at times referred to as the UID Bill).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NPR Scheme has been created pursuant to the 2004 Amendment of the Citizenship Act. Under S. 14A of the Citizenship Act, the central government has the power to compulsorily register citizens for an Identity Card. This gives the NPR exercise sanctity. However, no authority to collect biometric information has been given either under this Act or Rules framed under it.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Future of Aadhaar&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The existence of both the UID and NPR Schemes leads to redundancy. Therefore, many have advocated for their merger. This seems impractical, as the standards in collection and management of data are not the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For some time, it was thought that the Aadhaar Scheme would be scrapped. This belief was based on the present government’s opposition to the scheme during and before the election. This was further strengthened by the fact that they did not expressly mention the continuance of the scheme in their manifesto. The Cabinet Committee on UIDAI was disbanded and the enrolment for the UID Number was stopped, only to be resumed a short while later.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, recent events show that the Aadhaar scheme will continue. First, the new government has stated that the UID scheme will continue. In support of the UID Scheme, the government has made budgetary allocation for the scheme to enable, &lt;i&gt;inter-alia,&lt;/i&gt; it being sped-up. The Government even intends to enact a law to give the scheme sanctity. &lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, the Government is assigning the UID Number new uses. To track attendance of government employees, the Government shall use a biometric attendance system, which is linked to the employees UID Number. &lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; The attendance will be uploaded onto a website, to boost transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, direct benefit transfers under the UID will become more vigorous.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID is already necessary for registration under the NPR, which is compulsory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Providing one’s UID Number for utilities such as cooking gas is also compulsory in several areas, despite the Courts diktat that it should not be so.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The government is in favour of continuing both the schemes. Therefore, it is unlikely that either scheme will be scrapped or that the two schemes will be combined. The registration for UID is becoming compulsory by implication as it is required for direct benefit transfers and for utilities. Data collected under NPR is being shared with the UIDAI by default, when one registers for a UID number. However, the reverse is unlikely, as the UID collects secondary data, whereas NPR requires primary data, which it collects through physical survey and authentication. Perhaps the sharing of data could be incorporated when one goes to the data collection centre to submit biometrics for the NPR. The subject could fill in the UID form and submit verification documents at this stage, completing both exercises in one go. This will drastically reduce the combined costs of the two exercises.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Rajesh Aggarwal, Merging UID and NPR???, Igovernment, accessed 5 September, 2014 &lt;a href="http://www.igovernment.in/igov/opinion/41631/merging-npr-uid"&gt;http://www.igovernment.in/igov/opinion/41631/merging-npr-uid&lt;/a&gt;; Bharti Jain, Rajnath Hints at Merger of NPR and Aadhar, Times of India, accessed 5 September, 2014 &lt;a href="http://timesofindia.indiatimes.com/india/Rajnath-hints-at-merger-of-NPR-and-Aadhaar/articleshow/35740480.cms"&gt;http://timesofindia.indiatimes.com/india/Rajnath-hints-at-merger-of-NPR-and-Aadhaar/articleshow/35740480.cms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Raju Rajagopal, The Aadhar-NPR Conundrum, Mint, accessed 5 September, 2014 &lt;a href="http://www.livemint.com/Opinion/tvpoCYeHxrs2Z7EkAAu7bP/The-AadhaarNPR-conundrum.html"&gt;http://www.livemint.com/Opinion/tvpoCYeHxrs2Z7EkAAu7bP/The-AadhaarNPR-conundrum.html&lt;/a&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Cl, 4 of the Notification on the creation o fthe UIDAI, No. A-43011/02/2009-Admin.1 of the Planning Commission of India, dated 28 January, 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; FAQ for NPR, accessed: 3 September, 2014. &lt;a href="http://censusindia.gov.in/2011-Common/FAQs.html"&gt;http://censusindia.gov.in/2011-Common/FAQs.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; A Jolt for Aadhar: UPA Shouldn’t Have to Put on Hold its Only Good Idea,Business Standard, accessed 5 September, 2014 &lt;a href="http://www.business-standard.com/article/opinion/a-jolt-for-aadhaar-114020301243_1.html"&gt;http://www.business-standard.com/article/opinion/a-jolt-for-aadhaar-114020301243_1.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Prakash Chandra Sao, The Unique ID Project in India: An Exploratory Study, accessed: 21 August, 2014 &lt;a href="http://subversions.tiss.edu/the-unique-id-project-in-india-an-exploratory-study/"&gt;http://subversions.tiss.edu/the-unique-id-project-in-india-an-exploratory-study/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; NPR Activities, accessed 5 September, 2014, &lt;a class="external-link" href="http://ditnpr.nic.in/NPR_Activities.aspx"&gt;http://ditnpr.nic.in/NPR_Activities.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; R. Dinakaran, NPR and Aadhar- A Confused Process, The Hindu BusinessLine, accessed: 4 September, 2014 &lt;a href="http://www.thehindubusinessline.com/blogs/blog-rdinakaran/npr-and-aadhaar-a-confused-process/article4940976.ece"&gt;http://www.thehindubusinessline.com/blogs/blog-rdinakaran/npr-and-aadhaar-a-confused-process/article4940976.ece&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; More than sixty-five thousand NPR cards have been issued and biometric data of more than twenty-five lakh people has been captured, as on 28 August, 2014 &lt;a href="http://censusindia.gov.in"&gt;http://censusindia.gov.in&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; NPR, not Aadhaar, best tool for cash transfer: BJP's Sinha, accessed: 3 September, &lt;a class="external-link" href="http://www.moneycontrol.com/master_your_money/stocks_news_consumption.php?autono=1035033"&gt;http://www.moneycontrol.com/master_your_money/stocks_news_consumption.php?autono=1035033&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Bharati Jain, NDA's national ID cards may kill UPA's Aadhaar, accessed 3 September, 2014 &lt;a href="http://timesofindia.indiatimes.com/india/NDAs-national-ID-cards-may-kill-UPAs-Aadhaar/articleshow/36791858.cms"&gt;http://timesofindia.indiatimes.com/india/NDAs-national-ID-cards-may-kill-UPAs-Aadhaar/articleshow/36791858.cms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Aadhar Enrolment Drive Begins Again, accessed 3 Spetember, 2014 &lt;a href="http://timesofindia.indiatimes.com/city/gurgaon/Aadhaar-enrolment-drive-begins-again/articleshow/38280932.cms"&gt;http://timesofindia.indiatimes.com/city/gurgaon/Aadhaar-enrolment-drive-begins-again/articleshow/38280932.cms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Mahendra Singh, Modi govt to give legal backing to Aadhaar, Times of India, &lt;a href="http://timesofindia.indiatimes.com/india/Modi-govt-to-give-legal-backing-to-Aadhaar/articleshow/38336812.cms"&gt;http://timesofindia.indiatimes.com/india/Modi-govt-to-give-legal-backing-to-Aadhaar/articleshow/38336812.cms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Narendra Modi Government to Launch Website to Track Attendance of Central Government Employees, DNA, accessed: 4 September, 2014 &lt;a href="http://www.dnaindia.com/india/report-narendra-modi-government-to-launch-website-to-track-attendance-of-central-government-employees-2014684"&gt;http://www.dnaindia.com/india/report-narendra-modi-government-to-launch-website-to-track-attendance-of-central-government-employees-2014684&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; No gas supply without Aadhaar card, Deccan Chronicle, accessed: 4 September, 2014, &lt;a href="http://www.deccanchronicle.com/140829/nation-current-affairs/article/no-gas-supply-without-aadhaar-card"&gt;http://www.deccanchronicle.com/140829/nation-current-affairs/article/no-gas-supply-without-aadhaar-card&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Note: This is an anonymous post.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground'&gt;https://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Mukta Batra</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-10-15T13:06:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online">
    <title>Fighting battles online</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online</link>
    <description>
        &lt;b&gt;Internet policy maverick Sunil Abraham feels that accessibility is key to democratising the Internet space.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nikhil Varma was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/internet/internet-policy-maverick-feels-that-accessibility-is-key-to-democratising-the-internet-space/article6369766.ece"&gt;published in the Hindu&lt;/a&gt; on September 2, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Forty-year-old Sunil Abraham essays many roles, of a social  entrepreneur, free software advocate and as policy director of the  Bangalore-based Centre for Internet and Society that focuses on  accessibility, access to knowledge, internet governance, telecom and  digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When he finished his engineering degree and was job hunting in  Bangalore, the internet was an entity he had heard about, but never  worked on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Family constraints meant that I had to look for jobs that paid me more  than the salaries offered by industries for a 9 to 6 job. I decided to  knock doors in the non profit sector. I met T. Pradeep, who ran Samuha,  an NGO in Northern Karnataka that focused on integrated rural  development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil says, “He offered me a job provided I learnt to work on the  Internet. My job was to set up the organisation’s website. By 1998, I  became the head of the IT department. Many spinoffs from Samuha were  also becoming very successful. Pradeep gave us Rs.14 lakh and asked us  to spin off and create a new organisation called Mahiti, with a mandate  to serve non profits and provide them with affordable IT services. I  just came into the picture to fulfil someone else’s dream. We provided  email services to non-profit organisations at affordable rates. We ran a  bulletin board service and also offered a free webpage for select  NGOs.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 99, Sunil was offered an Ashoka fellowship. “It is a US non-profit  that that supports social entrepreneurs. The idea that won me the  fellowship was exploring the democratic potential of the internet. It is  very similar to the work that I do at the CIS. The internet remains a  tool that can be used for empowering and disempowering purposes that  could have hegemonic implications for society. I also worked with the  UNDP, after giving a speech about free and open software at one of their  meetings. I was hired as a consultant.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Till June 07’, Sunil worked with the UNDP, managing the open-source  network spanning 42 countries. “I cut my policy teeth in the UN and  learnt to work with governments and had a better idea of free software  and open content. I made a lot of contacts in the course of my work.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was at the end of the UN stint that philanthropist Anurag Dikshit  decided to set up the Centre for Internet and society in India and Sunil  decided to take up the assignment. “Anurag has been a great help from  the start. His funds have been very vital for the organization.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS deals with a host of issues, ranging from making the internet and  mobile phones disabled friendly to creating more Wikipedia pages in  Indic languages and enhancing internet penetration in rural India. The  organization is also&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With government surveillance taking on newer dimensions in the internet  Sunil says, “Surveillance is like adding salt in cooking. It is  essential in small quantities, but counter productive even if it is  slightly in excess. While surveillance may be a good idea to keep public  servants occupying high office under scrutiny, employing mass  surveillance on everybody may not work well.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He adds, “A rational approach is needed. We believe that privacy is  inversely proportional to the power a person yields, while transparency  is directly proportional to the power a person yields.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil is deeply apprehensive about some of the steps governments take to  stem the flow of information. “A couple of years ago, the government  had banned text messages beyond a certain limit to prevent rumours from  circulating. This resulted in people moving to Whatsapp, which is more  difficult to monitor. The government agencies ended up being the actual  losers. The more unrestricted surveillance, better chances that it could  be compromised.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another vital issue that plagues our times are the limits to free speech  and expression. “Different countries have different sets of laws and  traditions that govern all aspects of life. We have not managed to  arrive on a consensus on food habits, mankind is a long way from  developing a uniform policy about internet usage. In India, there are  some limits on free speech.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He says, “If something is illegal offline, it is bound to illegal  online. I do not think we need specific laws to police the internet. If  you try to ban something, it may end up getting more consumed. It  happened in the case of Wendy Doniger’s book being withdrawn by Penguin.  The sales of the book skyrocketed when it was published by another  publisher.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil adds, “It is an important that good laws are made and these laws  have been enforced properly. Enforceability must also be taken into  account during framing laws.”&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A scanned version of the article published in the newspaper can be found below:&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/CIS.png" alt="CIS" class="image-inline" title="CIS" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online'&gt;https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-09-16T04:19:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy">
    <title>Roundtable on Indian Privacy Law and Policy</title>
    <link>https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy</link>
    <description>
        &lt;b&gt;This event was hosted by the Centre for Law and Development of the National University of Advanced Legal Studies (NUALS) in Kochi. It was attended by members of the faculty of NUALS, some students from the 2nd year, 3rd year, 4th year, and 5th year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The meeting began with a talk by Bhairav Acharya on the origin of privacy law, its jurisprudential evolution, and the current context in which privacy is being debated in India and around the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav began by talking about the nature of privacy law around the world. Privacy has, until recently, never been a right in English common law. Indeed, the tort of invasion of privacy is also relatively incomplete. Privacy is protected through other torts, including the torts of nuisance, trespass, and others. European treaty requirements have foisted a right to privacy upon the British legal system; the contours of this right remain unclear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;American courts, on the other hand, have been more receptive to claims of the right to privacy. There is much in the American political and legal tradition that has contributed to the easy acceptability of privacy claims. Not least among these are the strong emphasis on the individual as the fundamental unit of governance and sovereignty, and the American libertarian tradition of autonomy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav then spoke of the right to privacy in India. Early cases in the Supreme Court of India see privacy as a negotiation between the liberties of citizens and the power of the state. In a legal tradition deeply influenced by colonialism, Indian courts readily accepted claims against physical police surveillance and other related rights in the criminal justice process – public rights against the state that were once denied to Indian subjects of colonial rule, but held short of viewing privacy as a necessary individual protection against society. This has resulted in dichotomous privacy jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav then talked about the contexts in which privacy claims arise in India today. Specifically, he spoke about increasingly sophisticated surveillance techniques and large-scale personal data collection and processing. There are many complexities in both these fields and a lot of time and questions were spent going over them. Surveillance is older than the nation-state; privacy law does not seek the end of surveillance, but only its optimal use. There are many kinds of surveillance, the contemporary debate deals solely with wiretapping and electronic surveillance. Privacy law cannot be blind to the many other kinds of surveillance, including old-fashioned physical surveillance on the road.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data collection, too, cannot be ended, nor should it for it forms the basis of modern commerce and is tied to India’s economic growth. There were questions and discussion on ‘big data’, data mining, analytics, business models, and other related areas. In India, however, in the absence of an innovative IT industry, the dominant business model is of receiving foreign personal data, usually of Europeans and Americans, to provide cheap processing services. This model depends entirely on comparatively lower Indian wages. Hence, it is not surprising that the first personal data protection rules issued by the Indian government in 2011 applied solely to foreign data that was outsourced to India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav then introduced the 2011 draft Right to Privacy Bill that was proposed by the Department of Personnel and Training of the Indian government, as well as the Personal Data Protection Rules issued under the Information Technology Act, 2000. These measures were studied clause-by-clause.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Indian law in respect of communications surveillance was analysed in detail. The Indian Telegraph Act 1885, the Indian Telegraph Rules 1951 (including the amendments of 1961, 1999, 2007, and 2014) were looked at in detail. These laws were compared to the Indian Post Office Act 1898 and the Information Technology Act 2000. The 1968 report of the Law Commission of India that examined the wiretapping power and suggested possible overreach was also examined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav reviewed Indian law in respect of wiretapping. All Supreme Court case law, especially the cases of &lt;i&gt;Hukum Chand&lt;/i&gt; and &lt;i&gt;Peoples Union for Civil Liberties&lt;/i&gt;, were analysed. Finally, the group looked at how the legal principles applicable to wiretapping have been extended to electronic and Internet surveillance. Over here, the group studied the two sets of 2011 Rules under the IT Act that enable Internet and email surveillance of both content and metadata.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a lunch break, the group spoke about possible models for privacy regulation and protection in India. In respect of surveillance, a lot of time was spent discussing the merits and demerits of judicial warranting of surveillance, as opposed to executive authorisations. The consensus of the group, with a few exceptions, was that judicial warranting would not be a suitable model for Indian surveillance, due to several systemic weaknesses. The group also rejected several of the principles proposed by Justice A. P. Shah in the 2012 Report that was commissioned by the Planning Commission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a discussion on legislative models, the group discussed, clause-by-clause, the CIS proposal on privacy that was read through by Bhairav. This discussion lasted several hours, and covered many areas.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy'&gt;https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-27T14:18:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-economic-times-varun-aggarwal-september-11-2014-google-aims-to-win-india-with-android-one">
    <title>Google aims to win 40% of India with Android One</title>
    <link>https://cis-india.org/internet-governance/news/the-economic-times-varun-aggarwal-september-11-2014-google-aims-to-win-india-with-android-one</link>
    <description>
        &lt;b&gt;When Google launches its low-cost Android One devices next Monday, Indian users will be able to give voice commands, type messages and use almost all major mobile applications in Hindi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Varun Aggarwal was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2014-09-11/news/53811437_1_android-one-mobile-association-google"&gt;published in the Economic Times&lt;/a&gt; on September 11, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;This is because the California, US based internet giant is hoping that  the devices, which have been tailor-made for emerging markets, will help  it capture the non-English speaking user base in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over 40 per cent of the population in India lists Hindi as its first  language. Android One will come bundled with local language support and  users will not have to download any external application to access their  smartphone in Hindi, a person with knowledge of the development told  ET.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Google has been constantly working on developing more salience around  Indic computing, providing regional language support to users for its  various products and services," a Google spokesman said in an email.  Internet users in India could increase by nearly a fourth if local  language content is provided, according to a 2014 report from &lt;a href="http://economictimes.indiatimes.com/topic/Internet%20and%20Mobile%20Association%20of%20India"&gt;Internet and Mobile Association of India&lt;/a&gt; and IMRB International.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In rural India, 43 per cent said they would adopt the Internet if they  had content in their local language. Local language consumption growth  is estimated to be more than four times that of English, according to  Google. The company is trying to take a lead over its competitors by  taking advantage of this trend.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google is working to create more Hindi content online through local  partnerships and is expected to launch more products keeping the Indic  audience in mind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"So far different vendors were offering different ingredients of the  Indian language meal and users were expected to cook it themselves,"  said Venkatesh Hariharan, founder of Alchemy Business Solutions, a  company which works on Indic computing and technology for development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If Google offers a comprehensive experience that works out-of-the-box  in Indian languages that could attract millions of new users." Indic  computing has so far been limited to enthusiasts who had to download a  keyboard from one site, a local language dictionary from another and  fonts from a third.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If we really want widespread adoption, then  using a mobile phone in Indian languages should be as easy as using it  in English," Hariharan said. This is what Google hopes to achieve by  introducing devices in partnership with Indian handset makers Micromax,  Spice and Karbonn, which will launch the Android One devices for Rs  5,000 to Rs 7,000 next week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The availability of such devices will also help internet companies such as Facebook and &lt;a href="http://economictimes.indiatimes.com/topic/Yahoo"&gt;Yahoo&lt;/a&gt; promote their products in Indian languages. Facebook currently supports  13 Indian languages. "We are focused on enabling all major Indic  languages and on actively promoting them on various platforms," a  Facebook spokesperson said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, Yahoo shifted its  multilingual support from websites to only mobile apps. For instance,  the Yahoo Mail mobile app supports eight Indian languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We  can confirm we recently closed down the Indian language sites to better  focus on our core offerings," a Yahoo representative said. While experts  welcomed Google's push towards Hindi, some want the technologies to be  open source.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Now you'll have some people who will specialise on building Indic  computing tools on Google and others doing the same on some other  platform," said Sunil Abraham, executive director of Bangalore based  research organisation, The Centre for Internet and Society. "At least  Google, which seems to have understood and taken advantage of free  software, should give back to the free software movement."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-economic-times-varun-aggarwal-september-11-2014-google-aims-to-win-india-with-android-one'&gt;https://cis-india.org/internet-governance/news/the-economic-times-varun-aggarwal-september-11-2014-google-aims-to-win-india-with-android-one&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-09-12T05:50:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue">
    <title>Social Media Aids Rescue Efforts in Flood-Hit Kashmir </title>
    <link>https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue</link>
    <description>
        &lt;b&gt;As flood-ravaged Indian Kashmir faces a communication blackout, social media posts on Facebook and Twitter are playing a huge role in tracing people stranded in the region.&lt;/b&gt;
        &lt;p&gt;The article by &lt;span&gt;Anjana Pasricha was &lt;a class="external-link" href="http://www.voanews.com/content/kashmir-flood-social-media-aids-rescue/2445235.html"&gt;published in Voice of America&lt;/a&gt; on September 10, 2014. Sunil Abraham gave his inputs.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;More than 400 people in India and Pakistan have been killed in the  floods which have engulfed the mountainous region, and tens of thousands  are waiting to be rescued.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aijaz Qaisar, who works in Bangalore, is desperate for news of his  ailing, elderly parents and his brother’s family. They had to scramble  to the third floor of their home in Kashmir’s summer capital, Srinagar,  after floodwaters inundated the lower two floors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s a kind of attic, they are in an attic. It was again through  Facebook, my brother, youngest brother, he had posted pictures of water  all around…and after that no communication at all," he said. "[I am]  completely, completely helpless.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Qaisar has posted an SOS plea on Facebook, “please rescue Mr.  Qaisar-ud-Din’s family” and given their address. Until Wednesday  afternoon, he was still waiting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I am hoping, I am hoping that somebody would respond," he said. "I  am hoping one call back telling me that water has not gone beyond, and  there is food being supplied or at least water being supplied.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Like Qaisar, tens of thousands of distressed relatives have flooded  Facebook and Twitter with cries for help, urging rescuers and army  personnel working in Indian Kashmir to reach their loved ones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With phone and power lines down, those stranded are unable to call  for help. And so such posts are helping to point rescue teams in the  right direction. At the moment rescuers have virtually no way of  identifying victims most urgently in need of help - the sick, the  elderly and children.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Qaisar has not yet been lucky, many others have. A Facebook  exchange between the army and the sister of a woman, who is nine months  pregnant, shows that soldiers responded to her plea on social media and  rescued the stranded woman.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Army officials say all messages for help being received on its  website are being forwarded to a group that includes senior commanders  in the region. Starting Monday, the army also began putting up a list of  rescued people on one of its Facebook accounts to keep relatives  informed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Self-help groups have also sprung up on Facebook sharing information  on missing people. Google has allied with the National Disaster Response  Force to create a &lt;a href="https://google.org/personfinder/2014-jammu-kashmir-floods" target="_blank"&gt;database of stranded and missing people. &lt;/a&gt;People wanting to donate are connecting on the hashtag &lt;a href="https://twitter.com/hashtag/kashmirfloods" target="_blank"&gt;#Kashmirfloods&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham at the Center of Internet and Society says social media  can be a powerful tool for collaboration in situations like the ones  faced by Kashmir.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Through features like hashtag, you can form dynamic, express  community,' he said. "Here social media has a marked advantage because  an express platform for collaboration can be set up instantaneously.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;About 50,000 people have been rescued so far - 40,000 of them by the  armed forces.  But tens of thousands are still trapped in their homes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The army, posted in huge numbers in the Himalayan region that borders  Pakistan, is at the forefront of the massive rescue effort.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Atul Bhatia, an army official in Jammu region who turned a generator  on an army truck into a mobile recharge point, told an Indian television  channel that lack of communication is the biggest problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The connect with relatives of theirs outside this area was the most  important thing for the relatives and them to be assured that everything  is fine," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"With no electricity for five days out here, it was important their mobiles start working.”&lt;/p&gt;
&lt;p&gt;The floods engulfed the region a week ago, devastating villages and  towns, and destroying roads and bridges in the scenic mountain region.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue'&gt;https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-09-12T05:10:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2014-bulletin">
    <title>September 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2014-bulletin</link>
    <description>
        &lt;b&gt;Welcome you to the ninth issue of the newsletter (September 2014).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We at the Centre for Internet &amp;amp; Society (CIS) welcome you to the ninth issue of the newsletter (September 2014). Archives of our newsletters can be 	accessed at: &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Nishant Shah was part of a working group writing a white paper on big data and social change, over the last six months. This	&lt;a href="http://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world"&gt;white paper&lt;/a&gt; produced by a group of 	activists, researchers and data experts was published by Oxford.&lt;/li&gt;
&lt;li&gt;As part of the Pervasive Technologies project Maggie Huang interviewed Semiconductor Industry Professionals in Taiwan on the	&lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-professionals-in-taiwan-1"&gt;trends and changes in technology&lt;/a&gt; and 	&lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-professionals-in-taiwan-2"&gt; understanding mobile chip manufacturing&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS entered into a		&lt;a href="http://cis-india.org/openness/blog/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands"&gt;memorandum of understanding&lt;/a&gt; with the 		Andhra Loyola College for a period of 5 years to enhance Telugu Wikipedia through increased contributions to Wikipedia and make it available under free 		license. &lt;/li&gt;
&lt;li&gt; CIS-A2K &lt;a href="http://cis-india.org/openness/blog/nie-steps-in-to-grow-konkani-wikipedia"&gt;signed a memorandum of understanding&lt;/a&gt; with Nirmala 		Institute of Education, Goa to enhance digital literacy in Konkani in the education sector across Goa.&lt;/li&gt;
&lt;li&gt;Tejaswini Niranjana and Tanveer Hasan wrote a report on the workshop 	&lt;a href="http://cis-india.org/openness/blog/report-on-developing-digital-open-knowledge-resources-in-indian-languages"&gt; Developing Digital Open Knowledge Resources in Indian Languages &lt;/a&gt; for which CIS-A2K was one of the organizers. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS 		&lt;a href="http://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility"&gt; joined the Dynamic Coalition for Platform Responsibility &lt;/a&gt; towards creating due diligence recommendations for online platforms. &lt;/li&gt;
&lt;li&gt; CIS organized a 		&lt;a href="https://cis-india.org/internet-governance/report-on-cis-workshop-at-igf"&gt; workshop on an evidence-based framework for intermediary liability &lt;/a&gt; at the IGF held in Istanbul on September 3, 2014. Jyoti Panday coordinated the workshop in collaboration with Stanford Centre for Internet &amp;amp; 		Society. &lt;/li&gt;
&lt;li&gt; Elonnai Hickok contributed a thematic chapter on 		&lt;a href="http://www.giswatch.org/en/communications-surveillance/intermediary-liability-and-state-surveillance"&gt; Intermediary Liability and Surveillance &lt;/a&gt; in the GISWatch Report.&lt;/li&gt;
&lt;li&gt;The Supreme Court of India revised the law on electronic evidence in the case of &lt;i&gt;Anvar v. P. K. Basheer&lt;/i&gt;. Bhairav Acharya has	&lt;a href="http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt;done an analysis on this&lt;/a&gt;. It was published 	by Law and Policy in India and subsequently mirrored on our website.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and 	programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 	National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The updated draft is being reviewed by the Office of the Chief Commissioner for Persons with Disabilities. The draft chapters and the quarterly reports can be accessed on the	&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NVDA and eSpeak&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Update&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/september-2014-nvda-report.pdf"&gt;Work Report for September&lt;/a&gt; (Suman Dogra; August 31, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/study-on-budget-allocation-and-expenditure-by-states-on-schemes-for-persons-with-disabilities"&gt; Study on Budget Allocation and Expenditure by States on Schemes for Persons with Disabilities &lt;/a&gt; (Anandhi Viswanathan; September 29, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Pervasive Technologies&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-professionals-in-taiwan-1"&gt; Interviews with Semiconductor Industry Professionals in Taiwan: Trends and Changes in Technology &lt;/a&gt; (Maggie Huang; September 26, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-professionals-in-taiwan-2"&gt; Interviews with Semiconductor Industry Professionals in Taiwan: Understanding Mobile Chip Manufacturing &lt;/a&gt; (Maggie Huang; September 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Report&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/report-on-developing-digital-open-knowledge-resources-in-indian-languages"&gt; Developing Digital Open Knowledge Resources in Indian Languages &lt;/a&gt; (Tejaswini Niranjana and Tanveer Hasan; September 30, 2014). The workshop was organized by Krantijyoti Savitribai Phule Women's Studies Centre, 		University of Pune (KSPWSC), Centre for Indian Languages in Higher Education (CILHE), Tata Institute of Social Sciences, Mumbai and CIS-A2K. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/nie-steps-in-to-grow-konkani-wikipedia"&gt;NIE Steps in to Grow Konkani Wikipedia&lt;/a&gt; (T. Vishnu Vardhan; September 6, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands"&gt; Expanding the World of Telugu Wikipedia - CIS-A2K and ALC join hands &lt;/a&gt; (T. Vishnu Vardhan and Rahmanuddin Shaik; September 17, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The following were published in August and mirrored on our website in September:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/open-glam-august-27-2014-subhashish-panigrahi-open-glam-at-wikimania-2014"&gt; OpenGLAM at Wikimania 2014 &lt;/a&gt; (Subhashish Panigrahi; OpenGLAM; August 27, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/we-are-wikipedia"&gt;We are Wikipedia&lt;/a&gt; (By Subhashish Panigrahi; Wikimedia Deutschland; August 25, 2014). Wikimedia Deutchland has included a paragraph about WeAreWikipedia on their blog. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://commons.wikimedia.org/wiki/Category:Kannada_Wikipedia_Workshop_at_Tumkur_%28Sep_27_2014%29"&gt;Kannada Wikipedia Workshop for Students&lt;/a&gt; (Tumkur University; Tumkur; September 27, 2014). Dr. U.B.Pavanaja conducted the workshop. Fifty people participated in the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://commons.wikimedia.org/wiki/Category:Kannada_Wikipedia_Workshop_at_Bagalkot"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (Organized by Basaveshwara Science College and CIS-A2K; September 20, 2014). Dr. U.B.Pavanaja conducted the workshop. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;News and Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K team gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/kannada-wikipedia-workshop-bagalkot"&gt;Implementation of IT in Kannada&lt;/a&gt; (Prajavani; September 21, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/bangalore-mirror-shyam-prasad-105-kannada-books-released-under-creative-commons"&gt; 105 Kannada books released under Creative Commons &lt;/a&gt; (Shyam Prasad S; Bangalore Mirror; September 29, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/odia-alphabet-and-order-teaching-in-primary-education"&gt; State Level Seminar on "Odia alphabet and order teaching in primary education" &lt;/a&gt; (Co-organized by Institute of Odia Studies and Research and Odia Bhasa Pratisthan, Bhubaneswar; September 14, 2014). Subhashish Panigrahi participated 		in the event and discussed about the applied aspects of Odia language in the context of primary education and need for reforms in the total number and 		order in the character-set citing problems with computer and internet. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/publishing-next"&gt;Publishing Next&lt;/a&gt; (Organized by CinnamonTeal Publishing; Goa; September 19 - 20, 2014). T. Vishnu Vardhan was a panelist at the 5th edition of Publishing Next the annual 		conference on the future of publishing. He spoke on Open Access, Copyright and Copyleft. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of our Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project with Privacy International we are engaged in 	enhancing respect for the right to privacy in developing countries. We have produced the following outputs during the month:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Note: The White Paper below is not a part of the SAFEGUARD project&lt;/i&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;White Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world"&gt; Big Data and Positive Social Change in the Developing World: A White Paper for Practitioners and Researchers &lt;/a&gt; (Nishant Shah; Oxford: Oxford Internet Institute; September 30, 2014). Nishant Shah was part of a group of activists, researchers and data experts in 		producing this white paper. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Analysis&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt; Anvar v. Basheer and the New (Old) Law of Electronic Evidence &lt;/a&gt; (Bhairav Acharya; September 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcement&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility"&gt; CIS joins the Dynamic Coalition for Platform Responsibility &lt;/a&gt; (Jyoti Panday; September 23, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/the-aadhaar-case"&gt;The Aadhaar Case&lt;/a&gt; (Vipul Kharbanda; September 5, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale"&gt;UID: A Data Subject's Registration Tale&lt;/a&gt; (Mukta Batra; September 11, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation"&gt;Biometrics: An 'Angootha Chaap' nation?&lt;/a&gt; (Mukta Batra; September 19, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground"&gt;UID and NPR: Towards Common Ground&lt;/a&gt; (September 19, 2014): &lt;i&gt;This is an anonymous post&lt;/i&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;CIS @ IGF&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ninth Internet Governance Forum ("IGF2014") was hosted by Turkey in Istanbul from September 2 to 5, 2014. A BestBits pre-event, which saw robust 	discussions on renewal of the IGF mandate, the NETmundial Initiative and other live Internet governance processes, flagged off a week of many meetings and 	sessions. CIS participated in multiple workshops and panels:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://www.youtube.com/watch?v=Nu3GycFBLoo"&gt;WS112: Implications of post-Snowden Internet localization proposals&lt;/a&gt; (Organized by Center for Democracy and Technology, Istanbul, September 2, 2014). Sunil Abraham was a speaker at this IGF workshop. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/preserving-a-universal-internet"&gt; WS63: Preserving a universal Internet: Costs of fragmentation &lt;/a&gt; (Organized by OECD and Centre for International Governance Innovation; September 3, 2014). Sunil Abraham was a speaker at this IGF workshop. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://www.youtube.com/watch?v=uwtQ18KzeiY"&gt;WS2 Mobile, Trust and Privacy&lt;/a&gt; (Organized by GSM Association; September 4, 2014). Sunil Abraham was a speaker. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://www.youtube.com/watch?v=Us4BW1Sw4Vo"&gt;Transparency reporting as a tool for Internet governance&lt;/a&gt; (Organized by Global Network Initiative; September 3, 2014). Pranesh Prakash was a panelist. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://www.youtube.com/watch?v=v5tx-TBMm8E&amp;amp;list=PLediVl9G3xdMoSTKB3sFw0aszfwLgsqoV&amp;amp;index=105"&gt; WS149: Aligning ICANN policy with the privacy rights of users &lt;/a&gt; (Organized by Yale ISP; September 5, 2014). Pranesh Prakash was a moderator. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Participation&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/cis-at-igf-2014"&gt;Launch of the GISWatch Report&lt;/a&gt; (Association for Progressive Communications and the Humanist Institute for Cooperation with Developing Countries (Hivos). Elonnai Hickok contributed a 		thematic chapter on Intermediary Liability and Surveillance to this report. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/re-wiring-women-rights-debates-in-digital-age"&gt; Re-Wiring Women's Rights Debates in the Digital Age &lt;/a&gt; (Organized by IT for Change in partnership with Kutch Mahila Vikas Sangathan and ANANDI; September 13 - 14, 2014). Rohini Lakshane was a speaker. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/workshop-on-enabling-information-systems-for-local-governance"&gt; Workshop on Enabling Information Systems for Local Governance &lt;/a&gt; (Organized by Jamia Milla Islamia, Tagore Hall; New Delhi; September 18, 2014). Sunil Abraham was a participant. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/national-consultation-on-media-law"&gt;National Consultation on Media Law&lt;/a&gt; (Organized by Law Commission of India and the National University, Delhi; India Habitat Centre, New Delhi; September 27 - 28, 2014). Nehaa Chaudhari, 		Jyoti Panday and Anubha Sinha participated in the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/cpdp-2015"&gt;CPDP 2015&lt;/a&gt; : The eighth international conference on computers, privacy and data protection will be held in Brussels from January 21 to 23, 2015. CIS is a moral 		supporter of CPDP. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online"&gt; Fighting battles online &lt;/a&gt; (Nikhil Varma; The Hindu; September 2, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance"&gt; Colonial yoke or bureaucratic insouciance? &lt;/a&gt; (Vidya Venkat with additional reporting by K.T. Sangameswaran in Chennai; The Hindu; September 7, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue"&gt; Social Media Aids Rescue Efforts in Flood-Hit Kashmir &lt;/a&gt; (Anjana Pasricha, September 10, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/the-economic-times-varun-aggarwal-september-11-2014-google-aims-to-win-india-with-android-one"&gt; Google aims to win 40% of India with Android One &lt;/a&gt; (Varun Aggarwal; Economic Times; September 11, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social 	sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new 	conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/raw/events/consultation-on-new-figures-of-learning-in-digital-context"&gt; Consultation on New Figures of Learning in the Digital Context &lt;/a&gt; (CIS, Bangalore, September 22, 2014). P.P. Sneha		&lt;a href="https://cis-india.org/raw/digital-humanities/consultation-new-figures-of-learning-in-digital-context"&gt;wrote a report&lt;/a&gt; on the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 	accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and 	engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director - Research, at	&lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, 	Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding 		and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 		Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2014-bulletin'&gt;https://cis-india.org/about/newsletters/september-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2015-01-02T01:26:03Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale">
    <title>UID: A Data Subject's Registration Tale</title>
    <link>https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale</link>
    <description>
        &lt;b&gt;A person who registered for UIDAI shares their experience of registering for the UID Number, on the condition of anonymity.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The registration process begins with filling a form, which has a verification clause at the end. This is a statement that the data, including biometric     data, is correct and is that of the registrant. The presence of the word ‘biometric’ in relation to the verification creates tacit consent in the     collection of biometric data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data subject registered for the UID number as several utilities were being linked to the UID number at that time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data subject pointed out three areas for concern: (i) optional data was being collected under protest; (ii) the subjects documents were being taken out     of their sight for scanning; (iii) the ownership of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While registering for the UID number, data subjects have a choice not to link their bank numbers to bank accounts and to utilities such as gas connections.     This data subject noticed that the data operator linked these by default and the data subject had to specifically request the de-linking. The data operator     did not inform the data subject of the choice not to link the UID with these services. If this is the state of affairs for the conscious registrant, it is     unlikely that those who cannot read will be informed of their right to choice. Their information will then be inadvertently linked and they will be denied     the right to opt out of the linkage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This data subject additionally noted that their right to refuse to provide optional data on the registration form was blatantly disregarded by the     enrolling agency. Despite protests against providing this information, the enroller forcibly entered information such as ‘ward number’, which was optional.     The enroller justified these actions - stating: the company will cut our salary. Unfortunately, registrants do not know who the data collection company is.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where the data subjects do not know who collects their data and where it is going, there can be no accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This incident seems to show that the rules on personal information are being violated. The right to know: the identity and address of the entity collecting     the data,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; the purpose of data collection,&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; the restrictions on data use&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; and the right not to disclose sensitive personal data    &lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; are all granted by the Information Technology Rules. Data subjects also have the right to be informed about the intended recipients&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; and the entities that will retain the data.    &lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; The data collector has failed to perform its corresponding duty to make such disclosures and has arguably     limited the control of data subjects over their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If this is what other UID registrations are like, then perhaps it is time to modify the process of data handling and processing. The law should be     implemented better and amended to enable better implementation either through greater state intervention or severe liability when personal information is     improperly handled.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; R.4(3)(d) of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; R. 4(3)(b) Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; R. 4(7) Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; R. 4 (7) Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; R. 4 (3) (c) Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; R.4(3)(d) Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale'&gt;https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Mukta Batra</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-11T09:05:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance">
    <title>Colonial yoke or bureaucratic insouciance?</title>
    <link>https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance</link>
    <description>
        &lt;b&gt;‘Blame the British’ is an oft-invoked argument when the subject of India’s outdated laws comes up for discussion. But 68 years since Independence, can we still afford to parrot that old line? &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Vidya Venkat &lt;i&gt;(With additional reporting by K.T. Sangameswaran in Chennai) &lt;/i&gt;was &lt;a class="external-link" href="http://www.thehindu.com/sunday-anchor/sunday-anchor-colonial-yoke-or-bureaucratic-insouciance/article6386714.ece"&gt;published in the Hindu&lt;/a&gt; on September 7, 2014. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Moiz Tundawala, a doctoral researcher in law at the London School of  Economics and Political Science, feels that it is unfair to blame just  the colonial hangover when several opportunities for reforming the legal  system in India have been wasted by bureaucrats and judges. He points  to Section 377 of the Indian Penal Code (IPC) as an example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This law pronounces illegal carnal intercourse against the order of  nature, making criminals of gays and transgender persons. But why was a  progressive judgment of the Delhi High Court, which struck off this  section, upturned later by the Supreme Court? If we continue to bear the  burden of colonial era laws, we only have ourselves to blame,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the Constitution-making exercise in India was inspired by the British and other western systems, it was nevertheless an independent process. But the same did not happen with the laws in India that were handed down from the British, Mr. Tundawala said. He felt that several laws enacted in the post-colonial era smacked of a colonial mindset. “Take for instance laws such as the Terrorist and Disruptive Activities (Prevention) Act, the Unlawful Activities Prevention Act, or the Armed Forces Special Powers Act. All of them aim to control and subjugate a population with little regard for their democratic aspirations. So what this country needs is a radical overhaul of the judicial and criminal justice system.”&lt;/p&gt;
&lt;blockquote class="pullquote" style="text-align: justify; "&gt;If we continue to bear the burden of colonial era laws, we only have ourselves to blame.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The Indian Telegraph Act, 1885, continues to presume the state to be the primary owner of telecommunications networks, though the sector was privatised long ago. “The provisions on surveillance in this Act are from a colonial era and are heavy-handed, allowing for spying even without a court warrant. Up until 1998, it spoke of ‘the Provinces’ in some provisions instead of ‘India,’” Pranesh Prakash, Policy Director, Centre for Internet and Society, said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Police Act, 1861, is another law that has often been criticised for  perpetuating colonial-era institutional practices. Despite numerous  commissions and Supreme Court orders advocating reform measures,  progress in changing this law has been slow. Lawyer-activist Maja  Daruwala, who heads the Commonwealth Human Rights Initiative, New Delhi,  said those in establishment were very comfortable with the policing law  and the power that it gave them. “When governments find it convenient  to use policing as a means to hold down the population, why would they  bother to amend it?”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Ms. Daruwala said the main fault lay with the definition of police  duties and the overall structure and the spirit of the law itself. “The  police in India are often accused of bias against certain communities,  such as Dalits and tribal people. This is because the issue of need for  diversity in policing in a democratic country such as India has not been  addressed by the law. In the U.K., the design of the policing law  changed gradually with the changing needs of the population, but this  has not been the case here,” she said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Section 124-A of the IPC on sedition is another provision in the statute  book that is seen as promoting the colonial mindset. Several instances  of the abuse of sedition law exist in independent India. In 2010, for  instance, the BJP government in Chhattisgarh used the law against  activist Binayak Sen for which he was imprisoned, only to be let off by  the Supreme Court later which found him innocent. S. Prabakaran, Member,  Bar Council of India, and president of the Tamil Nadu Advocates’  Association, said it was shameful that India continued to keep the law  that was decried by none other than Mahatma Gandhi. “This law was  brought in by the British to quell the Independence movement in India.  Why have we not bothered to repeal it?”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Efforts to reform the criminal justice system have been fraught with  challenges. The Justice Malimath committee, set up in 2000, had  recommended reforms in the system, which were met with resistance from  the human rights lobby. Cautioning the present government against any  sweeping changes that would tinker with the basic structure of the law,  V. Suresh, national general secretary, People’s Union for Civil  Liberties, said: “The Malimath committee failed in its mission because  it involved an effort to change the entire structure of the law itself,  which upholds presumption of innocence, burden of proof on the state,  and rules on admissible evidence, in order to improve conviction rates.  No doubt, it was met with resistance by the legal fraternity as the idea  was to do away with essential checks and balances in the legal system.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance'&gt;https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-09-08T04:21:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-at-igf-2014">
    <title>CIS@IGF 2014</title>
    <link>https://cis-india.org/internet-governance/blog/cis-at-igf-2014</link>
    <description>
        &lt;b&gt;The ninth Internet Governance Forum (“IGF2014”) was hosted by Turkey in Istanbul from September 2 to 5, 2014.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;A BestBits pre-event, which saw robust discussions on renewal of the IGF mandate, the NETmundial Initiative and other live Internet governance processes, flagged off a week of many meetings and sessions. At IGF2014, the ICANN-led processes of IANA transition and ICANN accountability found strong presence. Human rights online, access and net neutrality were also widely discussed. Centre for Internet and Society, India participated in multiple workshops and panels.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Workshops and Panel Discussions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WS206: An evidence-based framework for intermediary liability&lt;/b&gt;&lt;br /&gt;CIS organized a workshop on developing an evidence-based framework for intermediary liability in collaboration with the Stanford Center for Internet and Society.  By connecting information producers and consumers, intermediaries serve as valuable tool for growth and innovation, and also a medium for realisation of human rights. The workshop looked to a concerted approach to understanding intermediaries’ impact on human rights demands our urgent attention. Jyoti Panday of CIS was contributed to the workshop’s background paper and organisation. Elonnai Hickok of CIS was a speaker.  At this workshop, a zero-draft of international principles for intermediary liability was released. The zero-draft is the interim outcome of an ongoing, global intermediary liability project, undertaken by CIS in collaboration with Article 19 and Electronic Frontier Foundation. See the &lt;a href="http://www.youtube.com/watch?v=TpBYbwBBHBQ"&gt;video&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WS112: Implications of post-Snowden Internet localization proposals&lt;/b&gt;&lt;br /&gt;Organised by ISOC and Center for Democracy and Technology, this panel questioned the distinctions between Internet-harmful and Internet-beneficial Internet and data localization. As a speaker at this workshop, Sunil Abraham of CIS identified state imperatives for Internet localization, such as taxation, network efficiency and security. See &lt;a href="http://www.youtube.com/watch?v=Nu3GycFBLoo"&gt;video&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WS63: Preserving a universal Internet: Costs of fragmentation&lt;br /&gt;&lt;/b&gt;Internet and Jurisdiction Project organized this workshop to explore potential harms to Internet architecture, universality and openness as a result of Internet balkanisation. Sunil Abraham was one of the speakers.&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WS2: Mobile, trust and privacy&lt;/b&gt;&lt;br /&gt;Organised by GSMA, this panel discussed methods, benefits and harms of use of mobile transaction generated information and data. Sunil Abraham was a speaker. See &lt;a href="http://www.youtube.com/watch?v=uwtQ18KzeiY"&gt;video&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WS188: Transparency reporting as a tool for Internet governance&lt;/b&gt;&lt;br /&gt;This GNI workshop examined transparency reporting by Internet intermediaries and companies, and sought to identify its strengths and shortcomings as a tool for Internet governance. Pranesh Prakash of CIS was a speaker. See &lt;a href="http://www.youtube.com/watch?v=Us4BW1Sw4Vo"&gt;video&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WS149: Aligning ICANN policy with the privacy rights of users&lt;br /&gt;&lt;/b&gt;This Yale ISP panel examined ICANN’s obligations for data protection, in light of international standards and best practices. This discussion is particularly relevant as ICANN’s WHOIS policy, Registrar Accreditation Agreement, and other policies have attained the status of a global standard for the handling of personal data. Pranesh Prakash moderated this panel.&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Other Participation&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Launch of the GISWatch Report&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Association for Progressive Communications (APC) and the Humanist Institute for Cooperation with Developing Countries (Hivos) released the Global Information Society Watch Report (&lt;i&gt;GISWatch&lt;/i&gt;) on national and global mass surveillance. The report “&lt;i&gt;explores the surveillance of citizens in today's digital age by governments with the complicity of institutions and corporations&lt;/i&gt;”. Elonnai Hickok of CIS contributed a thematic chapter on Intermediary Liability and Surveillance to this report.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-at-igf-2014'&gt;https://cis-india.org/internet-governance/blog/cis-at-igf-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-10-08T10:31:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-aadhaar-case">
    <title>The Aadhaar Case</title>
    <link>https://cis-india.org/internet-governance/blog/the-aadhaar-case</link>
    <description>
        &lt;b&gt;In 2012 a writ petition was filed by Justice K.S. Puttaswamy in the Supreme Court of India challenging the policy of the government in making an Aadhaar card for every person in India and its later plans to link various government benefit schemes to the same.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Over time a number of other cases have been filed in the Supreme Court challenging the Aadhaar mechanism and/or its procedure most of which have now been 	linked to the main petition filed by Justice Puttaswamy.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; This means that the Supreme Court now hears all 	these cases together (i.e. at the same time) since they throw up similar questions and involve the same or similar issues. The court while hearing the case 	made an interim order on September 23, 2013 whereby it ordered that no person should suffer on account of not having an Aadhaar card and that Aadhaar cards 	should not be issued to any illegal immigrants. The relevant extract from the Order of the court is reproduced below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"No person should suffer for not getting the Aadhaar card in spite of the fact that some authority had issued a circular making it mandatory and when any 	person applies to get the Aadhaar card voluntarily, it may be checked whether that person is entitled for it under the law and it should not be given to any 	illegal immigrant."&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be noted that the above order was only an interim measure taken by the Supreme Court till the time it finally decided all the issues involved in 	the case, which is still pending in the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In November 2013 during one of the hearings of the matter, the Supreme Court came to the conclusion that it was an important enough matter for all the states and union territories to be impleaded as parties to the case and passed an order to this effect.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; This was probably because the Aadhaar cards will be issued in the entire country and this is a national issue and therefore it is possible that the court 	thought that if any of the states have any concerns regarding the issue they should have the opportunity to present their case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another petition filed by the Unique Identification Authority of India (UIDAI), the Supreme Court on March 24, 2014 reiterated its earlier order and held that no 	person shall be deprived of any service just because such person lacked an aadhaar number if he/she was otherwise eligible for the service. A direction was 	issued to all government authorities and departments to modify their forms/circulars, etc., so as to not compulsorily require an aadhaar number. In the same 	order the Supreme Court also restrained the UIDAI from transferring any biometric data to any agency without the consent of the person in writing as an 	interim measure.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; After passing these orders the Supreme Court linked this case as well to the petition 	filed by Justice Puttaswamy on which final arguments were being heard in February 2014 which so far do not seem to have concluded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Note&lt;/b&gt; : Please note that the case is still being heard by the Supreme Court and the orders given so far and explained in this blog are all interim measures till 	the case is finally disposed off. The status of the cases can be seen on the following link:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://courtnic.nic.in/supremecourt/casestatus_new/caseno_new_alt.asp"&gt;http://courtnic.nic.in/supremecourt/casestatus_new/caseno_new_alt.asp&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The names and number of the cases that have been covered in this blog are given below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;W.P(C) No. 439 of 2012 titled &lt;i&gt;S. Raju &lt;/i&gt;v. &lt;i&gt;Govt. of India and Others &lt;/i&gt; pending before the D.B. of the High Court of Judicature at Madras.&lt;/li&gt;
&lt;li&gt;PIL No. 10 of 2012 titled &lt;i&gt;Vickram Crishna and Others&lt;/i&gt; v. &lt;i&gt;UIDAI and Others&lt;/i&gt; pending before the High Court of Judicature at Bombay.&lt;/li&gt;
&lt;li&gt;W.P. No. 833 of 2013 titled &lt;i&gt;Aruna Roy &amp;amp; Anr&lt;/i&gt; v. &lt;i&gt;Union of India &amp;amp; Ors&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;W.P. No. 829 of 2013 titled &lt;i&gt;S.G. Vombatkere &amp;amp; Anr&lt;/i&gt; v. &lt;i&gt;Union of India &amp;amp; Ors.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Petition(s) for Special Leave to Appeal (Crl) No(s).2524/2014 titled &lt;i&gt;Unique Identification Authority of India &amp;amp; another&lt;/i&gt; v.	&lt;i&gt;Central Bureau of Investigation&lt;/i&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;All the above cases have now been linked with the ongoing Supreme Court case of &lt;i&gt;K. Puttaswamy&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; W.P(C) No. 439 of 2012 titled &lt;i&gt;S. Raju &lt;/i&gt;v. &lt;i&gt;Govt. of India and Others &lt;/i&gt; pending before the D.B. of the High Court of Judicature at 			Madras and PIL No. 10 of 2012 titled &lt;i&gt;Vickram Crishna and Others&lt;/i&gt; v. &lt;i&gt;UIDAI and Others&lt;/i&gt; pending before the High Court of Judicature 			at Bombay were transferred to the Supreme Court vide Order dated September 23, 2013. Also W.P. No. 833 of 2013 titled Aruna Roy &amp;amp; Anr Vs Union 			of India &amp;amp; Ors, W.P. No. 829 of 2013 titled S G Vombatkere &amp;amp; Anr Vs Union of India &amp;amp; Ors and Petition(s) for Special Leave to Appeal 			(Crl) No(s).2524/2014 titled &lt;i&gt;Unique Identification Authority of India &amp;amp; another&lt;/i&gt; v. &lt;i&gt;Central Bureau of Investigation&lt;/i&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;a href="http://judis.nic.in/temp/494201232392013p.txt"&gt;http://judis.nic.in/temp/494201232392013p.txt&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; &lt;a href="http://judis.nic.in/temp/4942012326112013p.txt"&gt;http://judis.nic.in/temp/4942012326112013p.txt&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="http://courtnic.nic.in/supremecourt/temp/sr%20252414p.txt"&gt;http://courtnic.nic.in/supremecourt/temp/sr%20252414p.txt&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-aadhaar-case'&gt;https://cis-india.org/internet-governance/blog/the-aadhaar-case&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-05T09:12:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mobile-trust-and-privacy">
    <title>Mobile, Trust and Privacy</title>
    <link>https://cis-india.org/internet-governance/news/mobile-trust-and-privacy</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at the event organized by GSM Association on September 4, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;More consumers now use their mobiles to go online to access information  and services. Mobile plays a central role in driving economic growth and  social opportunities. However, it is important that people can interact  and access services in a trusted and secure environment that protects  their online privacy.&lt;br /&gt; Increasingly, mobile ecosystems acquire  consumers’ data by default, while smartphones broadcast data by default.  These ‘default’ positions challenge current data protection and privacy  legal frameworks, and consumers’ ability to manage their privacy and  online identities.&lt;br /&gt; A key ingredient for strengthening trust in a  mobile connected world is a user-centred privacy framework that applies  to all digital and identity services whether in retail, healthcare,  government, banking or any other sector.&lt;br /&gt; The GSMA recently published  global research showing trust matters and that mobile users want better  transparency and choice over how their personal data are used. They  also expect all companies accessing their data to treat their privacy  consistently.&lt;br /&gt; This workshop aims to bring together leading  representatives from a broad spectrum of stakeholder groups to discuss  privacy-related issues and ways to enhance mobile users’ trust. &lt;br /&gt; Questions to address include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; How can citizens – in both developed and developing countries – benefit from the responsible use of mobile-derived data?&lt;/li&gt;
&lt;li&gt;What are the key emerging issues and challenges of a mobile hyper-connected world?&lt;/li&gt;
&lt;li&gt;How can we ensure secure and trusted identities online?&lt;/li&gt;
&lt;li&gt;eds to be done to ensure consumers are able to access services in private, trusted and secure ways?&lt;/li&gt;
&lt;li&gt;What are the respective roles of law and industry self-regulation in enhancing trust?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;For full details &lt;a class="external-link" href="http://igf2014.sched.org/event/170880f1a2eb995fd2f61f7d9e37d28d#.VDERIVdIOo8"&gt;see the IGF website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mobile-trust-and-privacy'&gt;https://cis-india.org/internet-governance/news/mobile-trust-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-10-05T09:21:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
