<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1851 to 1865.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/bd-live-avantika-chilkoti-march-5-2014-mobile-voters-may-sway-polls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/data-guidance-march-3-2014-india-privacy-bill-will-likely-reflect-eu-directive"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ig-round-table-british-high-commission"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/rights-con-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/february-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/financial-times-february-26-2014-india-tea-parties-enable-politicians-to-woo-urban-youth-with-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/calcutta-hc-strengthens-whistle-blower-protection"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/bd-live-avantika-chilkoti-march-5-2014-mobile-voters-may-sway-polls">
    <title>‘Mobile’ voters may sway polls</title>
    <link>https://cis-india.org/news/bd-live-avantika-chilkoti-march-5-2014-mobile-voters-may-sway-polls</link>
    <description>
        &lt;b&gt;BABALAL Patel’s tiny tea stall in Mumbai is a long way from Silicon Valley. It is not even that close to Bangalore, the Indian equivalent.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Avantika Chilkoti was&lt;a class="external-link" href="http://www.bdlive.co.za/life/gadgets/2014/03/05/mobile-voters-may-sway-polls"&gt; published in BDlive&lt;/a&gt; on March 5, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;But one night this month, this ramshackle shop became the venue for a social media experiment that highlights the hi-tech face of electioneering in India, the world’s largest democracy. A crowd gathered outside to watch two television screens showing a live broadcast with politician Narendra Modi as he answered questions the audience submitted by text message.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar "tea parties" were held across India, designed to ram home Modi’s humble background as a tea seller and his technological credentials. The nationwide event, organised by using mobile technology more commonly seen in US presidential campaigns, signals a shift in Indian politics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For decades, political campaigns in India have centred around colossal rallies and billboard advertising. But a growing population of young people, rising internet use and the ubiquity of cellphones mean this year’s battle is playing out equally fiercely online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We are moving far ahead of saying that we are building ‘likes’ on social media," says Arvind Gupta, head of information technology and social media for the Bharatiya Janata Party (BJP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Organisation is being done using digital. So if I’m going to tell everybody there’s an event tomorrow, it can be posted on Facebook, websites, on SMS, on WhatsApp, though the real meeting is happening on the ground."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These techniques, which became familiar during the Arab uprisings of North Africa, are an increasingly important part of communication strategy ahead of a national election that must be held in the next three months, and of which the outcome many believe will be close.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gupta believes parties are fighting what he calls a "postmodern election" for up to 160 — largely urban — seats out of a total of 543. More than half the 50-strong team working on communications for the BJP are dedicated to digital campaigning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s internet user base reached a point of inflection last year, exceeded 200-million. While that is a fraction of the 1.3-billion population, prompting many to question the power of social media, use is far greater among urban and young voters, millions of whom will be eligible to vote for the first time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Social media is suddenly becoming important, not for all constituencies, but for urban constituencies, because for the first time the urban youth and the educated class are very much glued into the election and showing interest," says Rajeeva Karandikar, a statistician and election analyst.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi, chief minister of Gujarat, has adapted particularly quickly to the changing environment. He captured the public imagination by using holograms to address rallies and Google Hangouts to interact with the diaspora. He has 3.4-million Twitter followers and more than 10.6-million "likes" on his Facebook page, thanks in part to a slick social media team led by high-profile technology entrepreneurs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By contrast, Rahul Gandhi, the reticent, undeclared candidate for the incumbent Congress party, does not even have a verified Twitter account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some were disappointed by low attendance at the national "tea parties", but the events were lauded for being interactive and, perhaps most important in a country where newspaper readership remains high, grabbed column inches in the press. The audience could speak directly to Modi at venues with a two-way video link and the footage was immediately available on YouTube.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While answering each question, Modi has a point of view," says Pratik Patel, 28, a chartered accountant who organised the event at his grandfather’s tea shop. "He doesn’t have two ways of looking at the same thing — this helps him to be more decisive and forward thinking."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media provide swathes of information to India’s political parties, as they copy the sophisticated data analysis used by US President Barack Obama’s campaigns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From its offices in suburban Mumbai, digital marketing group Pinstorm tracks social media discussions at constituency level and identifies significant supporters or critics. It describes the service as an early warning system or "social radar", which allows parties to mobilise workers rapidly to oppose or support a point of view.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sceptics argue, however, that social media have insufficient traction in India to affect results of the coming poll. But the size of the user base does not reflect its full power. Educated, influential Indians use these digital networks and the online debate shapes views in traditional media that reach a wider audience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The theory is that since the elites are connected and have more time to spare on social media, let us use social media and the internet more generally to influence discourse through these elites," says Sunil Abraham, executive director for the Bangalore-based Centre for Internet and Society. "It’s an indirect route to the vote."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, an adviser to the Obama campaign warns that, given differences in funding and the environment, India’s politicians should be wary of using the US presidential race as a model. This year, a simpler technology may prove the best tool for campaigns in India: the cellphone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Folks look to the Obama campaign for this sort of stuff," says Ethan Roeder, who worked on data for the 2008 and 2012 US presidential campaigns. "But a lot of these international campaigns would do best looking elsewhere for a model.… No campaign in the history of the world has ever spent that much money to elect a single individual to a single office."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s version is markedly cheaper, thanks to the roadside chai wallahs and armies of volunteers, pulling in the new breed of voters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I have never attended a political rally in my entire life," says Patel, who helped to organise Modi’s nationwide "tea party". "If people want to connect with me they need to connect with me on social media or via e-mail."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/bd-live-avantika-chilkoti-march-5-2014-mobile-voters-may-sway-polls'&gt;https://cis-india.org/news/bd-live-avantika-chilkoti-march-5-2014-mobile-voters-may-sway-polls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-05T11:55:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook">
    <title>India’s ballot battle will also run through Facebook</title>
    <link>https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook</link>
    <description>
        &lt;b&gt;Facebook on Tuesday launched its widely awaited “election tracker” for the upcoming general elections, a move that signals the growing importance of social media as a political tool in a rapidly urbanizing India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Zia Haq was &lt;a class="external-link" href="http://www.hindustantimes.com/technology/socialmedia-updates/india-s-ballot-battle-will-also-run-through-facebook/article1-1190947.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on March 4, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India’s 2014 ballot battle will run through the social-media world, which could likely influence electoral outcomes by swinging 3-4% votes, as more and more young Indians go online to make sense of politics, according to two new surveys.&lt;br /&gt; &lt;br /&gt;In these mostly urbanising seats, social-media usage is now “sufficiently widespread” to influence politics, according to the Internet and Mobile Association of India (IAMAI). An offline study conducted by market research firm TNS and Google India suggested similar shifts.&lt;br /&gt; &lt;br /&gt;The Facebook tracker (&lt;a href="http://on.fb.me/1g6ZJ3k"&gt;http://on.fb.me/1g6ZJ3k&lt;/a&gt;) will help India’s 93 million Facebook users to see which parties and candidates as well as issues are trending.&lt;br /&gt; &lt;br /&gt;Social-media platforms are likely to be influential in 160 of India’s 543 Parliament constituencies, making Facebook and Twitter users the nation’s newest voting bloc, according to the IAMAI survey.&lt;br /&gt; &lt;br /&gt;These are constituencies where 10% of the voting population uses social media sites such as Facebook, or where the number of social media users is higher than the winning candidate’s margin of victory at the last election.&lt;br /&gt; &lt;br /&gt;Research shows that social media is more persuasive than television ads. Nearly 100 million Indians, or more than Germany’s population, use the Internet each day. Of this, 40 million have assured broadband, the ones most likely to have at least one social media account.&lt;br /&gt; &lt;br /&gt;“Unlike Obama who used social media directly for votes, Indian politicians have tended to use it more to mould public discourse,” says Sunil Abraham, the CEO of The Centre for Internet and Society.&lt;br /&gt; &lt;br /&gt;“I think these trends are over-hyped and the impact, if any, would only be marginal,” said Communist Party of India MP, Gurudas Dasgupta, who created a Facebook account only last month.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook'&gt;https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-05T11:49:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/data-guidance-march-3-2014-india-privacy-bill-will-likely-reflect-eu-directive">
    <title>India: Privacy Bill will likely reflect EU Directive</title>
    <link>https://cis-india.org/news/data-guidance-march-3-2014-india-privacy-bill-will-likely-reflect-eu-directive</link>
    <description>
        &lt;b&gt;The Indian Centre for Internet and Society (CIS) called for comments - on 25 February 2014 - on a draft Privacy Protection Bill ('the Bill'). The draft Bill comes after a series of roundtable discussions in 2013. The last CIS roundtable on the Bill, on 19 October 2013, included Jacob Kohnstamm, Chairman of the EU Article 29 Working Party and the Dutch data protection authority, and Christopher Graham, the UK Information Commissioner. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.dataguidance.com/dataguidance_privacy_this_week.asp?id=2233"&gt;published in DataGuidance&lt;/a&gt; on March 3, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"In its eventual form, I expect [the Bill] will be modelled to a great extent on the European Data Protection Directive (95/46/EC)," Rodney Ryder, Partner at Scriboard, told DataGuidance. "The European Directive is an important model as India moves forward." Data protection in India is currently regulated by the Information Technology Act 2011, however, if enacted, the Bill would introduce the country's first comprehensive privacy regime. In 2013, the European Commission assessed India's data protection regime and decided not to award adequacy recognition at that time.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"If the Bill is introduced in the Winter Session, […] it is likely to […] come into effect either at the end of the year or early in the next year"&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The draft Bill regulates collection, storage and processing of personal data, with both monetary and penal penalties yet to be determined for anyone who 'collects, receives, stores, processes or otherwise handles any personal data [except in conformity with the provisions of the Act].' It also establishes an Indian Data Protection Authority (DPA), with the power to investigate data processing and to 'give such directions or pass such orders as are necessary.'&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"[Moving forward,] we expect more clarity on the role and functioning of the DPA," Ryder stated. "In the past, the Government of India has not been clear on the role of the DPA. Will this 'authority' have the independent powers and stature of the European Privacy Commissioners? [Additionally,] the complaint mechanism under the Bill requires greater clarity, precision and structure."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Divya Sharma, Legal Director at Bird and Bird LLP, commented, "Considering that India has parliamentary elections scheduled to take place in April 2014, this bill is unlikely to progress further until a new Government takes office in May 2014. […] Any legislation of this nature is unlikely to progress during this Government's tenure."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If the Bill is introduced in the Winter Session, after due consideration, it is likely to be passed by the end of the Year and come into effect either at the end of the year or early in the next year," said Ryder.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/data-guidance-march-3-2014-india-privacy-bill-will-likely-reflect-eu-directive'&gt;https://cis-india.org/news/data-guidance-march-3-2014-india-privacy-bill-will-likely-reflect-eu-directive&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-05T11:45:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ig-round-table-british-high-commission">
    <title>Internet Governance Round-table at British High Commission</title>
    <link>https://cis-india.org/news/ig-round-table-british-high-commission</link>
    <description>
        &lt;b&gt;A Internet Governance Round-table was hosted at the residence of the British High Commissioner in Delhi on March 4, 2014. Geeta Hariharan participated in the round-table.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The event aimed to bring together stakeholders from government, industry and the non-governmental sectors in India to discuss issues of Internet governance, and forms part of the UK’s commitment and interests in cyber-engagement with India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The panel included the following members:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Julian Evans, the Acting British High Commissioner to India&lt;/li&gt;
&lt;li&gt;Jonathan Cook, Second Secretary, Foreign Security Policy Team, British High Commission&lt;/li&gt;
&lt;li&gt;Kamlesh Bajaj, CEO, Data Security Council of India&lt;/li&gt;
&lt;li&gt;Rahul Jain, Principal Consultant, Data Security Council of India&lt;/li&gt;
&lt;li&gt;Vikram Tiwathia, Associate Director General, Cellular Operators Association of India&lt;/li&gt;
&lt;li&gt;Dr. Govind, Senior Director heading the E-Infrastructure &amp;amp; Internet Governance Division, Department of Electronics and Information Technology, Government of India&lt;/li&gt;
&lt;li&gt;Narayanan, NIXI&lt;/li&gt;
&lt;li&gt;Dr. Sundeep Oberoi, TCS&lt;/li&gt;
&lt;li&gt;M.P. Gupta, Professor &amp;amp; Chair, Information Systems and Centre for Excellence in E-Gov, IIT Delhi&lt;/li&gt;
&lt;li&gt;Somnath Mitra, Xchanging&lt;/li&gt;
&lt;li&gt;Mahima Kaul, Observer Research Foundation&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The British government’s views on cyber-engagement and Internet governance were touched upon, voicing their support for a free, open and secure Internet, upholding human rights. The UK supports a multi-stakeholder approach to Internet governance. However, their position on the Sao Paolo meeting is as yet not officially clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Five broad issues were raised for discussion:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Balancing the role of government and non-government stakeholders, and the limits of governmental regulation Internet for development&lt;/li&gt;
&lt;li&gt;Free speech and privacy v. security&lt;/li&gt;
&lt;li&gt;Practical model of Internet governance (multi-stakeholder or multilateral)&lt;/li&gt;
&lt;li&gt;India’s contribution, presence or expectations of the Sao Paolo meeting&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The speakers raised concerns about the effectiveness of the multi-stakeholder model in light of international law built on the Westphalian model, where governments are effectively the only real law-makers and regulators. In considering whether non-governmental stakeholders (such as NGOs and think-tanks, industry and corporations, individuals) should have an equal voice in IG, concerns were raised about the representativeness of such actors, and accountability that they would have. In this regard, the future and desirability of the ICANN (and the US’ stake in it), and fora like the IGF and the UN-WGEC as platforms for participation were discussed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While civil society involvement is imperative, government initiatives are necessary to create access to the Internet, and to ensure that the Internet is made safe and utilized for development. This obviously creates tensions between privacy and liberty, and security concerns; one of the speakers spoke of Snowden as the “elephant in the room”. Not only was a common concept of privacy non-existent at the international level, it would also be difficult to achieve (except a  namesake ‘lowest common denominator’ definition), as states must account for their experiences with terrorism as well as cultural differences. For instance, the way the UK deals with privacy/security concerns in comparison with India would be very different. Finally, the possibilities and potential outcomes of the Sao Paolo meeting were touched upon without elaborate discussion on the same.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ig-round-table-british-high-commission'&gt;https://cis-india.org/news/ig-round-table-british-high-commission&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-01T10:32:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/rights-con-2014">
    <title>RightsCon 2014</title>
    <link>https://cis-india.org/news/rights-con-2014</link>
    <description>
        &lt;b&gt;RightsCon Silicon Valley 2014 was an incredible mixture of more than 700 attendees from more than 65 countries and 375 institutions. Pranesh Prakash and Malavika Jayaram were speakers at this event organized by RightsCon at San Francisco on March 3 and 4, 2014.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This incredible union of expertise has led to real outcomes, many of which are viewable &lt;a href="https://www.rightscon.org/outcomes.php"&gt;here&lt;/a&gt; or as a PDF report &lt;a href="https://www.rightscon.org/_files/Rightscon%202014%20Outcome%20Report.pdf"&gt;here&lt;/a&gt;. Missed a session? A special thanks to all our &lt;a href="https://www.rightscon.org/speakers.php"&gt;speakers&lt;/a&gt; and &lt;a href="https://www.rightscon.org/sponsors.php"&gt;sponsors&lt;/a&gt; who made 2014 so smart and productive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Missed a session in San Francisco? Many of the videos are &lt;a class="redHyperlink" href="https://www.rightscon.org/highlights.php"&gt;available for viewing&lt;/a&gt;. To learn more about past RightsCon conferences, head &lt;a class="redHyperlink" href="https://www.rightscon.org/rightscon2014.php"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even as we continue to work diligently on the the work generated from  RightsCon Silicon Valley 2014, we are looking ahead to 2015 and  Southeast Asia, where we will convene civil society and key  decision-makers in this rapidly evolving region. Click  &lt;a class="redHyperlink" href="https://www.rightscon.org/southeastasia.php"&gt;here&lt;/a&gt; to learn more about the planning for  &lt;a class="redHyperlink" href="https://www.rightscon.org/southeastasia.php"&gt;RCSEA2015&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh was invited to be on five panels, and spoke in three.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He spoke in the following sessions:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;March 3 from 14:00-15:15 - Nicolas Seidler's panel on "Localizing the  Global Internet: Data Centers, Traffic Rerouting, and the Implications  of Post-Surveillance Policy Proposals" &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;March 4 from 12:00-13:15 - Paul &amp;amp; Bertrand's panel on "Internet and  Jurisdiction: How Can Heterogenous Laws Coexist in Cross-Border Online  Spaces?" &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;March 4 from 14:30-15:45 - Amie Stepanovich's panel on "The NSA Strikes  Back: Who Really Won the Crypto Wars?" &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;He was also invited to the following panels:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;"Toward Accountability: Reflecting on ICT Industry Action To Protect User Rights"&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;"Policy Laundering: Hacking the International Innovation Policy Machine" &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more info on the conference, &lt;a class="external-link" href="https://www.rightscon.org/index.php"&gt;click here&lt;/a&gt;. For the full list of speakers, &lt;a class="external-link" href="https://www.rightscon.org/speakers.php#completeSpeakerList"&gt;see here&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/XtwtNvuOUCI" width="400"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/rights-con-2014'&gt;https://cis-india.org/news/rights-con-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-08T05:04:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions">
    <title>Comparison of Section 35(1) of the Draft Human DNA Profiling Bill and Section 4 of the Identification Act Revised Statute of Canada</title>
    <link>https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions</link>
    <description>
        &lt;b&gt;A comparison of section 35(1) of the Draft Human DNA Profiling Bill, section 4 of the Identification Act, Revised Statute of Canada, and a review of international best practices. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In continuance of research around the &lt;a href="https://cis-india.org/internet-governance/blog/draft-human-dna-profiling-bill-april-2012"&gt;Draft Human DNA Profiling Bill&lt;/a&gt; that has been drafted the Department of Biotechnology, this blog entry reviews best practices for the communication of DNA profiles from the DNA Bank Manager to law enforcement and the police, compares the section 35(1) of the Draft Human DNA Profiling Bill and section 4 of the Identification Act Revised Statute of Canada, and recommends a revision of the present provision in the Draft Human DNA Profiling Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Indian Provision&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;35 (1) “&lt;i&gt;On receipt of a DNA profile for entry in the DNA Data Bank, the DNA Bank Manager shall cause it to be compared with the DNA profiles in the DNA Data Bank in order to determine whether it is already contained in the DNA Data Bank and shall communicate, for the purposes of the investigation or prosecution in a criminal offence, the following information to a court, tribunal, law enforcement agency or DNA laboratory in India which the DNA Data Bank Manager considers is concerned with it, appropriate, namely – &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a) &lt;/i&gt;&lt;i&gt;As to whether the DNA profile received is already contained in the Data Bank; and &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b) &lt;/i&gt;&lt;i&gt;Any information, other than the DNA profile received, is contained in the Data Bank in relation to the DNA profile received. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) The information as to whether a person’s DNA profile is contained in the offenders’ index may be communicated to an official who is authorized to receive the same as prescribed.”&lt;/i&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Canadian Provision vs. Indian Provision&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the Draft Human DNA Profiling Bill 35(1) was adopted from the DNA Identification Act Revised Statute of Canada section 4. The provision found in the Draft Human DNA Profiling Bill is different in three ways:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The Canadian statute limits the communication of whether a DNA profile is contained in the Data Bank or not to law enforcement agencies or other DNA laboratories, where as the provision in the Draft Human DNA Profiling Bill allows the communication to law enforcement agencies, other DNA data banks, and courts and tribunals. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Canadian statute limits the comparison of any DNA profile to that as entered in the convicted offenders index or the crime scene index with those DNA profiles that are already contained in the databank, where as the Draft Human DNA Profiling Bill allows for any received profile to be compared with the other profiles in the DNA Data Bank. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Canadian statute defines four types of information that may be communicated to law enforcement or another DNA databank including: &lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;ol&gt;
&lt;li&gt;(&lt;i&gt;a&lt;/i&gt;) if the DNA profile is not       already contained in the data bank, the fact that it is not;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;(&lt;i&gt;b&lt;/i&gt;) if the DNA profile is already       contained in the data bank, the information contained in the data bank in       relation to that DNA profile;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;(&lt;i&gt;c&lt;/i&gt;) if the DNA profile is, in the       opinion of the Commissioner, similar to one that is already contained in       the data bank, the similar DNA profile; and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;(&lt;i&gt;d&lt;/i&gt;) if a law enforcement agency       or laboratory advises the Commissioner that their comparison of a DNA       profile communicated under paragraph (&lt;i&gt;c&lt;/i&gt;) with one that is       connected to the commission of a criminal offence has not excluded the       former as a possible match, the information contained in the data bank in       relation to that profile.&lt;/li&gt;
&lt;/ol&gt;&lt;/ol&gt;
&lt;p&gt;While the Draft Human DNA Profiling Bill provides for communication of only (a) and (b) by the DNA Data Bank Manager.&lt;/p&gt;
&lt;h3&gt;Concerns with 35(1) and Best Practices&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society finds 35(1) problematic because a  DNA profile is never a complete match, and is instead a scientific and statistical based probability. There are a number of steps that go into the analysis of a DNA profile. According to the US National Institute of Justice, these include: “&lt;i&gt;1) the isolation of the DNA from an evidence sample containing DNA of unknown origin, and generally at a later time, the isolation of DNA from a sample (e.g., blood) from a known individual; 2) the processing of the DNA so that test results may be obtained; 3) the determination of the DNA test results (or types), from specific regions of the DNA; and 4) the comparison and interpretation of the test results from the unknown and known samples to determine whether the known individual is not the source of the DNA or is included as a possible source of the DNA.&lt;/i&gt;”&lt;a name="fr1"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though it is common for DNA Banks to communicate responses such as “match”,  “no match”, or “partial match” or “inclusion”, “exclusion”, or “inconclusive” to inquiries received from law enforcement and other DNA Banks, this is not the case for communications to courts and tribunals. For example in England and Wales guidelines for presenting DNA evidence in court were laid out in the rule Rv. Dohemy and Adams (1997) 1 Cr. App. R. 396. Along with comprehensive guidelines on how experts should conduct themselves in court to prevent bias, the guidelines require the following information to be presented when DNA material is used as evidence in a case:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;“The scientist should adduce the evidence of the DNA comparisons between the crime stain and the defendant’s sample together with the calculations of the Random Match Probability. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Whenever DNA evidence is adduced the Crown should serve on the defence details as to how the calculations have been carried out which are sufficient to enable the defence to scrutinize the basis of the calculations. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Forensic Science Service should make available to a defence expert, if requested, the databases upon which the calculations have been made. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The expert will, on the basis of empirical statistical data, five the jury the random occurrence rations - the frequency with which the matching DNA characteristics are likely to be found in the population at large. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Provided that the expert has the necessary data, it may then be appropriate for him to indicate how many people with the matching characteristics are likely to be found in the United Kingdom...”&lt;a name="fr2"&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Given the influential weight that DNA evidence can have in a case, it is critical that the evidence is accurately presented to the court and other key stakeholders. The  Centre for Internet and Society recommends that the Bill should distinguish the DNA Bank Manager’s response to law enforcement and other DNA Laboratory’s and the DNA Bank Manger’s response to courts and tribunals as below:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Response to Law enforcement agency and DNA Laboratory:&lt;/strong&gt; The DNA Bank Manger should respond to a request from law enforcement or a DNA laboratory with either: "match" or "partial match" .&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Response to Court and tribunal:&lt;/strong&gt; When DNA evidence is used in a court of law, the Bill should provide that the presentation should include:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The random match probability: The probability that the profile is in the sample from the individual tested if the individual tested has been selected at random. &lt;/li&gt;
&lt;li&gt;The frequency with which the matching DNA characteristics are likely to be found in the population at large.&lt;/li&gt;
&lt;li&gt;The probability of contamination. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Bill should also provide for the database upon which the calculations were based to be made available when requested.  In addition, the Bill should provide for rules to be made prescribing the procedure for presentation.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1"&gt;&lt;/a&gt;]. &lt;a class="external-link" href="http://nij.gov/topics/forensics/evidence/dna/basics/Pages/analyzing.aspx"&gt;http://nij.gov/topics/forensics/evidence/dna/basics/Pages/analyzing.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://nij.gov/topics/forensics/evidence/dna/basics/Pages/analyzing.aspx"&gt;[&lt;span&gt;2&lt;/span&gt;].&lt;/a&gt; &lt;a class="external-link" href="http://www.medicalgenomics.co.uk/pdf/Barrister_vol32-2007.pdf"&gt;http://www.medicalgenomics.co.uk/pdf/Barrister_vol32-2007.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions'&gt;https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-03T08:20:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies">
    <title>Spreadsheet data on sample of 50 security companies</title>
    <link>https://cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies'&gt;https://cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2014-02-28T16:13:39Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state">
    <title>Big Democracy, Big Surveillance: India's Surveillance State</title>
    <link>https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state</link>
    <description>
        &lt;b&gt;In India, surveillance is on the rise by the state to tackle crime and terrorism, and private companies are eager to meet the demand.&lt;/b&gt;
        &lt;p&gt;This article by Maria Xynou was&lt;a class="external-link" href="http://www.opendemocracy.net/opensecurity/maria-xynou/big-democracy-big-surveillance-indias-surveillance-state"&gt; published by OpenDemocracy&lt;/a&gt; on 10 February 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Worried about the secret, mass surveillance schemes being carried out by the NSA? While we should be, some of the surveillance schemes in the world's largest democracy, India, are arguably&lt;/span&gt;&lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt; in the same league&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="http://www.amazon.com/Globalization-Surveillance-Armand-Mattelart/dp/0745645119"&gt;Surveillance is being globalised&lt;/a&gt; to the extent that even India, a country with huge poverty issues, is investing millions of dollars in creating an &lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt;expansive surveillance regime&lt;/a&gt;. However, why would communications monitoring interest Indian authorities, when the majority of the population lives below the line of poverty and &lt;a href="http://wearesocial.net/tag/india/"&gt;only 17% of the population&lt;/a&gt;&lt;a href="http://wearesocial.net/tag/india/"&gt; has access to the Internet&lt;/a&gt;?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The official political motivation behind surveillance in India appears to be the government's &lt;a href="http://digitaljournal.com/article/268467"&gt;determination to tackle terrorism&lt;/a&gt; in the country. The &lt;a href="http://edition.cnn.com/2013/09/18/world/asia/mumbai-terror-attacks/"&gt;2008 Mumbai terrorist attacks&lt;/a&gt; were arguably a similar landmark to the 9/11 terrorist attacks in the US, and both governments officially announced their intention to carry out surveillance as a counter-terrorism measure. However, unlike in the west, terrorist attacks in India are much more common, and the National Security Adviser reported in 2008 that 800 terrorist cells were operational in the country. With India’s history of &lt;a href="http://www.thenews.com.pk/Todays-News-2-210676-Major-terror-attacks-in-India-during-last-25-years"&gt;major terror attacks in India over the last 25 years&lt;/a&gt;, it's easy for one to be persuaded that terrorism is actually a major threat to national security.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;India's surveillance schemes&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India’s surveillance programs mostly started following the 2008 Mumbai terror attacks. That was when the Ministry of Home Affairs first proposed the creation of a &lt;a href="http://www.pib.nic.in/newsite/erelease.aspx?relid=56395"&gt;National Intelligence Grid (NATGRID)&lt;/a&gt;, which will give &lt;a href="http://articles.economictimes.indiatimes.com/2013-09-10/news/41938113_1_executive-order-national-intelligence-grid-databases"&gt;11 intelligence and investigative agencies real-time access to 21 citizen data sources&lt;/a&gt; to track terror activities. These citizen data sources will be provided by various ministries and departments, otherwise called “provider agencies”, and will include &lt;a href="http://articles.economictimes.indiatimes.com/2013-09-10/news/41938113_1_executive-order-national-intelligence-grid-databases"&gt;bank account details, telephone records, passport data and vehicle registration details&lt;/a&gt;, among other types of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Home Affairs has &lt;a href="http://www.deccanherald.com/content/181065/mha-seeks-over-rs-3400.html"&gt;sought over Rs. 3,400 crore&lt;/a&gt; (around USD 540 million!) for the implementation of NATGRID, which aims to create comprehensive patterns of intelligence by collecting sensitive information from databases of departments like the police, banks, tax and telecoms to supposedly track any terror suspect and incident.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But NATGRID is far from India's only data sharing scheme. In 2009 the Cabinet Committee on Economic Affairs approved the creation and implementation of the &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=49261"&gt;Crime and Criminal Tracking Network &amp;amp; &lt;/a&gt;&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=49261"&gt;Systems&lt;/a&gt; (CCTNS), which would facilitate the sharing of databases among &lt;a href="http://ncrb.nic.in/AboutCCTNS.htm"&gt;14,000 police stations across all 35 states and Union Territories&lt;/a&gt; of India, excluding 6,000 police offices which are high in the police hierarchy. &lt;a href="http://www.thehindu.com/news/national/govt-launches-crime-tracking-pilot-project/article4272857.ece"&gt;Rs. 2,000 crore&lt;/a&gt; (around USD 320 million) have been allocated for the CCTNS, which is being implemented by the National Crime Records Bureau under the national e-governance scheme. The CCTNS not only increases transparency by automating the function of police stations, but also &lt;a href="http://ncrb.nic.in/AboutCCTNS.htm"&gt;provides the civil police with tools, technology and information&lt;/a&gt; to facilitate the investigation of crime and detection of criminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But apparently, sharing data and linking databases is not enough to track criminals and terrorists. As such, in the aftermath of the 2008 Mumbai terror attacks, the Indian government also implemented various interception systems. In September 2013&lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt; it was reported&lt;/a&gt; that the Indian government has been operating Lawful Intercept &amp;amp; Monitoring (LIM) systems, widely in secret. In particular, &lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt;mobile operators in India have deployed their own LIM systems&lt;/a&gt; allowing for the so-called “lawful interception” of calls by the government. And possibly to enable this, mobile operators are required to provide &lt;a href="http://telecomtalk.info/dot-tightens-norms-no-mobile-connection-without-physical-verification/102120/"&gt;subscriber verification&lt;/a&gt; to the Telecom Enforcement, Resource and Monitoring (TERM) cells of the Department of Telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of Internet traffic, the LIM systems are deployed at the &lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt;international gateways of large Internet Service Providers (ISPs) &lt;/a&gt;and expand to a broad search across all Internet traffic using “keywords” and “key-phrases”. In other words, security agencies using LIM systems are capable of launching a search for suspicious words, resulting in the indiscriminate monitoring of all Internet traffic, possibly without court oversight and without the knowledge of ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has also automated and centralized the interception of communications through the &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central Monitoring System (CMS)&lt;/a&gt;. This project was initially envisioned in 2009, following the 2008 Mumbai terror attacks and was approved in 2011.  The CMS intercepts all telecommunications in India and &lt;a href="https://cis-india.org/internet-governance/blog/india-central-monitoring-system-something-to-worry-about"&gt;centrally stores the data in national and regional databases&lt;/a&gt;. The CMS will be connected with the Telephone Call Interception System (TCIS) which will help monitor voice calls, SMS and MMS, fax communications on landlines, CDMA, video calls, GSM and 3G networks. &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Agencies&lt;/a&gt; which will have access to the CMS include the Intelligence Bureau (IB), the Central Bureau of Investigation (CBI), the Directorate of Revenue Intelligence (DRI), the Research and Analysis Wing (RAW) and the National Investigation Agency (NIA).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike mainstream interception, where service providers are required to intercept communications and provision interception requests to law enforcement agencies, the Central Monitoring System will automate the entire process of interception. This means that the CMS authority will have centralized access to all intercepted data and that the authority can also bypass service providers in gaining such access. Once security agencies have access to this data, they are equipped with &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Direct Electronic Provisioning, filters and alerts on the target numbers&lt;/a&gt;, as well as with Call Details Records (CDR) analysis and data mining tools to identify the personal information of target numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that roughly &lt;a href="http://wearesocial.net/tag/india/"&gt;73% of India's population uses mobile phones&lt;/a&gt;, this means that the Central Monitoring System can potentially affect about 893 million people, more than double the population of the United States! However, how is it even possible for Indian authorities to mine the data of literally millions of people? Who supplies Indian authorities with the technology to do this and what type of technology is actually being used?&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;India's surveillance industry&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has the world's second largest population, consisting of more than a billion people and an expanding middle class. Undoubtedly, India is a big market and many international companies aspire in investing in the country. Unfortunately though, along with everything else being imported into India, surveillance technologies are no exception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the biggest and most notorious surveillance technology companies in the world, such as ZTE, Utimaco and Verint, have offices in India. Even &lt;a href="https://citizenlab.org/2013/04/for-their-eyes-only-2/"&gt;FinFisher command and control servers&lt;/a&gt; have been found in India. However, in addition to allowing foreign surveillance technology companies to create offices and to sell their products and solutions in the country, local companies selling controversial spyware appear to be on the rise too.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kommlabs Dezign is an Indian company which loves to show off its Internet monitoring solutions at&lt;a href="http://www.kommlabs.com/events.asp"&gt; various ISS trade shows&lt;/a&gt;, otherwise known as &lt;a href="http://www.wired.com/beyond_the_beyond/2011/12/at-the-wiretappers-ball/"&gt;“the Wiretapper's Ball”&lt;/a&gt;. In particular, Kommlabs Dezign sells VerbaNET, an Internet Interception Solution, as well as VerbaCENTRE, which is a Unified Monitoring Centre that can even detect cognitive and emotional stress in voice calls and flag them! In other words, Kommlabs Dezign makes a point that not only should we worry about what we text and say over our phones, but that we should also worry about what we sound like when on the phone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vehere is another Indian company which sells various surveillance solutions and notably sells vCRIMES, which is a Call Details Records (CDR) analysis system. VCRIMES is used to analyse and gather intelligence and to unveil hidden interconnections and relations through communications. This system also includes a tool for detecting sleeper cells through advanced statistical analysis and &lt;a href="http://www.veheretech.com/products/vcrimes/"&gt;can analyse more than 40 billion records in less than 3 seconds&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.paladion.net/"&gt;Paladion Networks&lt;/a&gt; is headquartered in Bangalore, India and sells various Internet Monitoring Systems, Telecom Operator Interception Systems, SSL Interception and Decryption Systems and Cyber Cafe Monitoring Systems to law enforcement agencies in India and abroad. In fact, Paladion Networks even states in its website that its &lt;a href="http://www.paladion.net/client_list.html"&gt;customers include India's Ministry of Information Technology and the U.S Department of Justice&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ClearTrail Technologies is yet another Indian company which not only &lt;a href="http://www.issworldtraining.com/iss_europe/sponsors.html"&gt;sponsors global surveillance trade shows&lt;/a&gt; but also sells a wide range of monitoring solutions to law enforcement agencies in India and abroad. ComTrail is a solution for the &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;centralised mass interception and monitoring of voice and data networks&lt;/a&gt;, including Gmail, Yahoo, Hotmail, BlackBerry, ICQ and GSM voice calls. Furthermore, ComTrail is equipped to handle millions of communications per day, correlating identities across multiple networks, and can instantly analyse data across thousands of terabytes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ClearTrail also sells xTrail, which is a solution for the &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;targeted interception, decoding and analysis of data traffic over IP networks&lt;/a&gt; and which enables law enforcement agencies to intercept and monitor targeted communications without degrading the service quality of the IP network. Interestingly, xTrail can filter based on a “pure keyword”, a URL/Domain with a keyword, a mobile number or even with just a user identity, such as an email ID, chat ID or VoIP ID.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apparently, some the biggest challenges that law enforcement agencies face when monitoring communications include cases when targets operate from public Internet networks and/or use encryption. However, it turns out that ClearTrail's QuickTrail solution is designed to &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;gather intelligence from public Internet networks&lt;/a&gt;, when a target is operating from a cyber cafe, a hotel, a university campus or a free Wi-Fi zone. This device can remotely deploy spyware into a target's computer and supports protocol decoding, including HTTP, SMTP, POP3 and HTTPS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, QuickTrail can identify a target machine on the basis of metadata, such as an IP address, and can monitor Ethernet LANs in real time, as well as monitor Gmail, Yahoo and all other HTTPS-based communications. ClearTrail's mTrail is designed for the passive &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;'off-the-air' interception of GSM communications&lt;/a&gt;, including the interception of targeted calls from pre-defined suspect lists and the monitoring of SMS and protocol information. MTrail also identifies a target's location by using signal strength, target numbers, such as IMSI, TIMSI, IMEI or MSI SDN, which makes it possible to listen to the conversation of so-called “lawfully intercepted” calls in near real-time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, it looks like India is reaching the top league when it comes to surveillance technologies, especially since many of its companies and their products appear to be just as scary as some of the most sophisticated spying gear sold by the West. India may be the world's largest (by population) democracy, but that means that it has a huge population with way too many opinions...and apparently, the private and public sectors in India appear to be joining forces to do something about it.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;So do Indians have nothing to hide?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A very popular rhetoric in both India and the west is that citizens should &lt;i&gt;not&lt;/i&gt; be concerned about surveillance because, after all, if they are not terrorists, they should have nothing to hide. However, privacy advocate &lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;Caspar Bowden&lt;/a&gt; has rightfully stated that this rhetoric is fundamentally flawed and that we should all indeed “have something to hide”. But is privacy just about “having something to hide”? &lt;a href="http://www.youtube.com/watch?v=GMN2360LM_U"&gt;Jacob Appelbaum&lt;/a&gt; has stated that this rhetoric is merely a psychological copying mechanism when dealing with security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It's probably rather comforting and reassuring to think that we are not special or important enough for surveillance to affect us personally. But is that really up to us to decide? Unfortunately not. The very point of data mining is to match patterns, create profiles of individuals and to unveil hidden interconnections and relations. A data analyst can uncover more information about us than what we are even aware of and it is they who decide if our data is “incriminating” or not. Or even worse: in many cases it's up to &lt;i&gt;data mining software&lt;/i&gt; to decide how “special” or “important” we are. And unfortunately, technology is &lt;i&gt;not&lt;/i&gt; infallible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The world's largest democracy, which is also &lt;a href="http://www.hindustantimes.com/india-news/india-less-corrupt-than-pakistan-ranks-94th-in-world-survey/article1-1158513.aspx"&gt;one of the most corrupt countries in the world&lt;/a&gt;, is implementing many controversial surveillance schemes which lack transparency, accountability and adequate legal backing, and which are largely being carried out in secret. And to make matters worse, India lacks privacy legislation. Over a billion people in a democratic regime are exposed to inadequately regulated surveillance schemes, while a local surveillance industry is thriving without any checks or balances whatsoever. What will this mean for the global future of democracy?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state'&gt;https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2014-02-28T10:35:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/february-2014-bulletin">
    <title>February 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/february-2014-bulletin</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) welcomes you to the second issue of its newsletter (February) for the year 2014: &lt;/b&gt;
        &lt;p&gt;-------------------------------&lt;br /&gt;Highlights&lt;br /&gt;-------------------------------&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We published revised chapters for the states of Mizoram, Dadra and Nagar Haveli, Himachal Pradesh and Haryana, as part of our National Resource Kit project.&lt;/li&gt;
&lt;li&gt;In the concluding blog post of a three-part study Ananth Padmanabhan looks at the Indian law in the Copyright Act and the Information Technology Act, and concludes that both those laws restrain courts and private companies from ordering an ISP to block a website for copyright infringement.&lt;/li&gt;
&lt;li&gt;Telugu Wikipedia celebrated its 10&lt;sup&gt;th&lt;/sup&gt; anniversary. An event was co-organized in Vijaywada to celebrate the same.&lt;/li&gt;
&lt;li&gt;The second Institute on Internet and Society was held in Pune from February 11 to 17. The proceedings from the workshop are captured in a blog post. &lt;/li&gt;
&lt;li&gt;CIS announced an Open Call for Comments for the latest draft of the Privacy Bill, 2013 prepared by Bhairav Acharya.&lt;/li&gt;
&lt;li&gt;Forbes India published its “30 Under 30 List”. Pranesh Prakash is featured in the list.&lt;/li&gt;
&lt;li&gt;As part of the Making Change Project, Denisse Albornoz wrote a blog post that compares the production behind a performance with the process of storytelling.&lt;/li&gt;
&lt;li&gt;Beli gives an introduction to spectrum sharing. The post looks at GSM and CDMA, and touches upon LTE, and how they might share spectrum.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------&lt;a href="https://cis-india.org/jobs"&gt;&lt;br /&gt;Jobs&lt;br /&gt;&lt;/a&gt;-----------------------------------------------&lt;br /&gt;CIS is seeking applications for the post of Program Officer (Access to Knowledge): &lt;a href="http://bit.ly/1fnydB0"&gt;http://bit.ly/1fnydB0&lt;/a&gt;. There are two vacancies for this post and it is full-time based in Delhi. To apply, please send your resume to Sunil Abraham (&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;), Nirmita Narasimhan (&lt;a href="mailto:nirmita@cis-india.org"&gt;nirmita@cis-india.org&lt;/a&gt;) and Pranesh Prakash (&lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;) with three writing samples of which at least one demonstrates your analytic skills, and one that shows your ability to simplify complex policy issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------&lt;br /&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;br /&gt;&lt;/a&gt;----------------------------------------------&lt;br /&gt;As part of our project (under a grant from the Hans Foundation) on creating a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India, we bring you draft chapters for the states of Mizoram, Dadra and Nagar Haveli, Himachal Pradesh and Haryana. With this we have completed compilation of draft chapters for 35 states.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Based upon discussion with the office of the Chief Commissioner for Persons with Disabilities (CCPD) the following chapters were revised&lt;/i&gt;:&lt;/p&gt;
&lt;p&gt;► National Resource Kit Chapter&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Mizoram Chapter (by CLPR, February 5, 2014): &lt;a href="http://bit.ly/1eUSvxW"&gt;http://bit.ly/1eUSvxW&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;The Dadra &amp;amp; Nagar Haveli Chapter (by CLPR, February 6, 2014): &lt;a href="http://bit.ly/1mv3YhJ"&gt;http://bit.ly/1mv3YhJ&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;The Haryana Chapter (by Anandhi Viswanathan, February 10, 2014): &lt;a href="http://bit.ly/1dVOiKI"&gt;http://bit.ly/1dVOiKI&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;The Himachal Pradesh Chapter (by Anandhi Viswanathan, February 12, 2014): &lt;a href="http://bit.ly/1jSk03x"&gt;http://bit.ly/1jSk03x&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;► Other&lt;/p&gt;
&lt;p&gt;# Participation in Events&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;National Consultation on Inclusion of Persons with Disabilities in Development Process (organized by CBM India in collaboration with United Nations Solution Exchange for Gender Community, WHO Regional office for South-East Asia, New Delhi, February 12, 2014). Anandhi Viswanathan participated in a panel discussion. She made a presentation on the National Resource Kit project: &lt;a href="http://bit.ly/OlkHVq"&gt;http://bit.ly/OlkHVq&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Zero Project Conference on Accessibility: Innovative Policies and Practices for Persons with Disabilities (organized by Essl Foundation, the World Future Council and the European Foundation Centre, United Nations Office, Vienna, February 27 and 28, 2014). Pranesh Prakash spoke on Affordable Text-to-Speech Software from India: &lt;a href="http://bit.ly/1czo32s"&gt;http://bit.ly/1czo32s&lt;/a&gt;. Nominations on e-speak were recognised as examples of innovative practices and policies from India. Pranesh Prakash was also a speaker on Copyright Exception for Accessible Formats: &lt;a href="http://bit.ly/1l8HRth"&gt;http://bit.ly/1l8HRth&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------------------&lt;br /&gt;&lt;a href="https://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;br /&gt;-----------------------------------------------------------&lt;br /&gt;The Access to Knowledge programme addresses the harms caused to consumers and human rights, and critically examines Open Government Data, Open Access to Scholarly Literature, and Open Access to Law, Open Content, Open Standards, and Free/Libre/Open Source Software.&lt;/p&gt;
&lt;p&gt;# Analyses&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 2) (by Ananth Padmanabhan, February 5, 2014): &lt;a href="http://bit.ly/1cddoKm"&gt;http://bit.ly/1cddoKm&lt;/a&gt;. Analyses the law laid down by the U.S. Supreme Court and the Delhi High Court on secondary and contributory copyright infringement.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 3) (by Ananth Padmanabhan, February 5, 2014): &lt;a href="http://bit.ly/1g35mDg"&gt;http://bit.ly/1g35mDg&lt;/a&gt;. Analyses the Indian law in the Copyright Act and the Information Technology Act. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;# Participation in Events&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;2nd International Conference on Managing Intellectual Property Rights and Strategy (MIPS 2014) (organized by Shailesh J. Mehta School of Management, IIT Bombay with support from the Ministry of Human Resources Development IPR Chair Project, Government of India): &lt;a href="http://bit.ly/PsPEbq"&gt;http://bit.ly/PsPEbq&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Consultation on Institutional Arrangements for IP management under MHRD (organized by the Planning Commission and Ministry of Human Resource Development, New Delhi, February 21, 2014). Nehaa Chaudhari participated in this consultation: &lt;a href="http://bit.ly/1fTCoar"&gt;http://bit.ly/1fTCoar&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;National Conference on Use of Technology in Higher Education (organized by the Ministry of Human Resource and Development and Planning Commission in partnership with Microsoft Research and British Council, Indian Institute of Technology, Bombay, February 25, 2014): &lt;a href="http://bit.ly/P6u78i"&gt;http://bit.ly/P6u78i&lt;/a&gt;. Nehaa Chaudhari participated in the event as a panelist in the session on "Future of Content Creation". &lt;/li&gt;
&lt;/ul&gt;
&lt;p align="left"&gt;# Media Coverage&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Pranesh Prakash: Influencing India's IP Laws (by Samar Srivastava, Forbes India, February 15, 2014): &lt;a href="http://bit.ly/1kBzLMq"&gt;http://bit.ly/1kBzLMq&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The following has been done under grant from the Wikimedia Foundation (&lt;a href="http://bit.ly/SPqFOl"&gt;http://bit.ly/SPqFOl&lt;/a&gt;). As part this project (&lt;a href="http://bit.ly/X80ELd"&gt;http://bit.ly/X80ELd&lt;/a&gt;), we organised 4 workshops in the month of January, published an article in DNA, and signed a memorandum of understanding with KIIT University and Kalinga Institute of Social Sciences to further the development of Odia Wikipedia:&lt;/p&gt;
&lt;p&gt;►Wikipedia&lt;/p&gt;
&lt;p&gt;# Articles / Blog Entries&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Odia Language's Presence in Digital Media and Wikipedia's Role (by Subhashish Panigrahi, The Samaja, March 2, 2014): &lt;a href="http://bit.ly/1ieF3sC"&gt;http://bit.ly/1ieF3sC&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Indian Wikimedia community coordinates Women’s History Month (by Netha Hussain and Jeph Paul, Wikimedia Foundation, March 6, 2014): &lt;a href="http://bit.ly/1cyRfqf"&gt;http://bit.ly/1cyRfqf&lt;/a&gt;,&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;# Events Co-organized&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Cinemathon2014 Bangalore (organized by Pad.ma and CIS-A2K, CIS, Bangalore, February 8-9, 2014): &lt;a href="http://bit.ly/MRRkZz"&gt;http://bit.ly/MRRkZz&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Tewiki 10th Anniversary (organized by CIS-A2K and Telugu Wikipedia community, February 15, 2014): &lt;a href="http://bit.ly/1iI2Pxs"&gt;http://bit.ly/1iI2Pxs&lt;/a&gt;. T. Vishnu Vardhan and Rahmanuddin Shaikh were speakers at the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Cinemathon2014 Mumbai (organized by Pad.ma and CIS-A2K, CAMP Studio, Mumbai, February 15-16, 2014): &lt;a href="http://bit.ly/P5YGL8"&gt;http://bit.ly/P5YGL8&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Mangalore Workshop (organized by Roshini Nilaya and CIS-A2K, Mangalore, February 26, 2014). Dr. U.B.Pavanaja gave a presentation on Wikipedia with a special focus on students and women.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;p&gt;# Media Coverage&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Father-son duo promote Punjabi online (by Jatinder Preet, Sunday Guardian, February 1, 2014): &lt;a href="http://bit.ly/1l87b2h"&gt;http://bit.ly/1l87b2h&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;୧୦ ବର୍ଷରେ ଓଡ଼ିଆ ୱିକିପିଡିଆ (Rabibara Sambad (Sunday supplement of Odia newspaper The Sambad), February 9, 2014): &lt;a href="http://bit.ly/1igMynn"&gt;http://bit.ly/1igMynn&lt;/a&gt;. This is a feature about Odia Wikipedia's 10th anniversary and the story of a dead volunteer community reviving after 8 years.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Mangalore Workshop (Prajavani, February 27, 2014): &lt;a href="http://bit.ly/1gVMG6f"&gt;http://bit.ly/1gVMG6f&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;# Participation in Event&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Dynamics of Education to Employment Journey: Opportunities and Challenges (organized by KIIT School of Management, KIIT University, Bhubaneswar, February 21-22, 2014). T. Vishnu Vardhan gave a talk: &lt;a href="http://bit.ly/1ePwqHc"&gt;http://bit.ly/1ePwqHc&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Event Organized&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Wiki Women's Workshop (ICG – Dona Paula, Goa, March 9, 2014): &lt;a href="http://bit.ly/MRRJLy"&gt;http://bit.ly/MRRJLy&lt;/a&gt;. The event is being organized as part of the commemoration of the International Women's Day. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Openness&lt;/p&gt;
&lt;p&gt;# Event Organised&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bitcoin &amp;amp; Open Source with Aaron Koenig (CIS, Bangalore, February 7, 2014): &lt;a href="http://bit.ly/1fbN6mP"&gt;http://bit.ly/1fbN6mP&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------&lt;br /&gt;&lt;a href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;br /&gt;-----------------------------------------------&lt;br /&gt;CIS is doing a project (under a grant from Privacy International and International Development Research Centre (IDRC)) on conducting research on surveillance and freedom of expression (SAFEGUARDS). So far we have organised seven privacy round-tables and drafted the Privacy (Protection) Bill. Gautam Bhatia gives an analysis of the right to privacy from a constitutional perspective. Bhairav Acharya prepared an updated version of the Privacy Protection Bill which was published for comments.&lt;/p&gt;
&lt;p&gt;# Call for Comments&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Privacy Protection Bill, 2013 (by Bhairav Acharya, February 25, 2014): &lt;a href="http://bit.ly/1g3TwIX"&gt;http://bit.ly/1g3TwIX&lt;/a&gt;. CIS announced an Open Call for Comments to the latest version of the bill.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;# Articles&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Internet Way (by Nishant Shah, Biblio Vol. 19 No.8 (1&amp;amp;2), January – February 2014): &lt;a href="http://bit.ly/1kBp9gJ"&gt;http://bit.ly/1kBp9gJ&lt;/a&gt;. Dr. Nishant Shah's review of the book “The Everything Store: Jeff Bezos and the Age of Amazon” by Bantam Press/Random House Group, London can be found on page 16.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Surveillance and the Indian Constitution - Part 3: The Public/Private Distinction and the Supreme Court’s Wrong Turn (by Gautam Bhatia, Indian Constitutional Law and Philosophy Blog, February 25, 2014): &lt;a href="http://bit.ly/1kBosnw"&gt;http://bit.ly/1kBosnw&lt;/a&gt;. This was originally published on Indian Constitutional Law and Philosophy Blog.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Big Democracy, Big Surveillance: India's Surveillance State (by Maria Xynou, Open Democracy, February 28, 2014): &lt;a href="http://bit.ly/1nkg8Ho"&gt;http://bit.ly/1nkg8Ho&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Will You be Paid to Post a Picture? (by Nishant Shah, Indian Express, February 18, 2014): &lt;a href="http://bit.ly/P65d8L"&gt;http://bit.ly/P65d8L&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;# Blog Entries&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;February 11: The Day We Fight Back Against Mass Surveillance (by Divij Joshi, February 14, 2014): &lt;a href="http://bit.ly/1e7drCV"&gt;http://bit.ly/1e7drCV&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Calcutta High Court Strengthens Whistle Blower Protection (by Divij Joshi, February 24, 2014): &lt;a href="http://bit.ly/1cG8v7t"&gt;http://bit.ly/1cG8v7t&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS Welcomes 52nd Report on Cyber Crime, Cyber Security, and Right to Privacy (by Elonnai Hickok, February 24, 2014): &lt;a href="http://bit.ly/1oviMJ4"&gt;http://bit.ly/1oviMJ4&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;UIDAI Practices and the Information Technology Act, Section 43A and Subsequent Rules (by Elonnai Hickok, February 25, 2014): &lt;a href="http://bit.ly/1fbSfep"&gt;http://bit.ly/1fbSfep&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p align="left"&gt;# Events Organized&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Nullcon Goa Feb 2014 — International Security Conference (organised by Nullcon, Bogmallo Beach Resort, Goa, February 12 – 15, 2014). CIS is one of the sponsors for this event: &lt;a href="http://bit.ly/1lrBu5I"&gt;http://bit.ly/1lrBu5I&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Counter Surveillance Panel: DiscoTech &amp;amp; Hackathon (co-organized by CIS, MIT Centre for Civic Media Co-Design Lab, Tactical Technology Collective, Hackteria.org, and Shristi School of Art, Design and Technology, Bangalore, March 1, 2014): &lt;a href="http://bit.ly/NCGMyH"&gt;http://bit.ly/NCGMyH&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;# Participation in Events&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;First Meeting of the Multistakeholder Advisory Group for India Internet Governance Forum (organized by the Department of Electronics and Information Technology, New Delhi, February 10, 2014). Sunil Abraham participated in this meeting: &lt;a href="http://bit.ly/1fKu5xz"&gt;http://bit.ly/1fKu5xz&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Internet Intermediary Liability: Towards Evidence-based Policy and Regulatory Reform to Secure Human Rights on the internet (organized by Association for Progressive Communications, The Wedgewood, Melville, Johannesburg, February 10-11, 2014): &lt;a href="http://bit.ly/1fMAEK2"&gt;http://bit.ly/1fMAEK2&lt;/a&gt;. Elonnai Hickok was a speaker. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Towards an Equitable and Just Internet (organized by IT for Change, New Delhi, February 14-15, 2014). Bhairav Acharya was a speaker: &lt;a href="http://bit.ly/1cz9EDt"&gt;http://bit.ly/1cz9EDt&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Workshop on Media Law &amp;amp; Policy Curriculum Development (organized by the Centre for Communication Governance, National Law University, Delhi and University of Oxford in support with the International Higher Education-Knowledge Economy Partnerships Programme of the British Council, February 16, 2014, National Law University, Delhi): &lt;a href="http://bit.ly/1ovoT00"&gt;http://bit.ly/1ovoT00&lt;/a&gt;. Bhairav Acharya was a speaker. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Changing Role of the Media in India: Constitutional Perspectives (organized by School of Law, Christ University, February 28, 2014): &lt;a href="http://bit.ly/1lB2nTO"&gt;http://bit.ly/1lB2nTO&lt;/a&gt;. Snehashish Ghosh moderated a session at this conference. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;--------------------------------&lt;br /&gt;&lt;a href="https://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;br /&gt;CIS gave its inputs to the following recent media coverage:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Dangers of Birdsong (by Namrata Joshi, Outlook, January 25, 2014): &lt;a href="http://bit.ly/1kB8J7L"&gt;http://bit.ly/1kB8J7L&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;A Tale of Two Internet Campaigns (by Deepa Kurup, The Hindu, February 11, 2014): &lt;a href="http://bit.ly/1lDdRZy"&gt;http://bit.ly/1lDdRZy&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Dark days for the creative class in India: Siddiqui (by Haroon Siddiqui, thestar.com, February 16, 2014): &lt;a href="http://bit.ly/1gdtgbC"&gt;http://bit.ly/1gdtgbC&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;The Forbes India 30 Under 30 List (by Abhilasha Khaitan, Forbes India, February 21, 2014): &lt;a href="http://bit.ly/1ovnvKM"&gt;http://bit.ly/1ovnvKM&lt;/a&gt;. Pranesh Prakash features in the list. &lt;/li&gt;
&lt;li&gt;India ‘tea parties’ enable politicians to woo urban youth with technology (by Avantika Chilkoti, Financial Times, February 26, 2014): &lt;a href="http://bit.ly/1cGfOMm"&gt;http://bit.ly/1cGfOMm&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;br /&gt;&lt;a href="https://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;br /&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p&gt;# Blog Entries&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Defending the Humanities in the Digital Age (by Nishant Shah, DML Central, February 24, 2014): &lt;a href="http://bit.ly/1czdZqg"&gt;http://bit.ly/1czdZqg&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Digital Humanities in India- Mapping Changes at the Intersection of Youth, Technology and Higher Education (by Sneha PP, February 21, 2014): &lt;a href="http://bit.ly/1qd6xo4"&gt;http://bit.ly/1qd6xo4&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;br /&gt;&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;br /&gt;CIS is doing a research project titled “Making Change”. The project will explore new ways of defining, locating, and understanding change in network societies. Having the thought piece 'Whose Change is it Anyway' as an entry point for discussion and reflection, the project will feature profiles, interviews and responses of change-makers to questions around current mechanisms and practices of change in South Asia and South East Asia:&lt;/p&gt;
&lt;p&gt;►Making Change Project&lt;/p&gt;
&lt;p&gt;# Blog Entries&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Storytelling as Performance: The Ugly Indian and Blank Noise 1 (by Denisse Albornoz, February 24, 2014): &lt;a href="http://bit.ly/1jX4qBb"&gt;http://bit.ly/1jX4qBb&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Storytelling as Performance: The Ugly Indian and Blank Noise 2 (by Denisse Albornoz, February 27, 2014): &lt;a href="http://bit.ly/1fKwQil"&gt;http://bit.ly/1fKwQil&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;br /&gt;&lt;a href="https://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;br /&gt;Shyam Ponappa, a Distinguished Fellow at CIS is a regular columnist with the Business Standard. The articles published on his blog Organizing India Blogspot is mirrored on our website:&lt;/p&gt;
&lt;p&gt;# Newspaper Column&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Centre- or State-Driven Development? (by Shyam Ponappa, Business Standard, February 5, 2014, Observer India Blogspot, February 7, 2014): &lt;a href="http://bit.ly/1ceuWFS"&gt;http://bit.ly/1ceuWFS&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;# Blog Entry&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;An Introduction to Spectrum Sharing (by Beli, February 24, 2014): &lt;a href="http://bit.ly/NZlknd"&gt;http://bit.ly/NZlknd&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------------------&lt;br /&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;br /&gt;----------------------------------------------------------&lt;br /&gt;CIS in partnership with the Ford Foundation is executing a project to create a knowledge repository on Internet and society. This repository will comprise content targeted primarily at civil society with a view to enabling their informed participation in the Indian Internet and ICT policy space. The repository is available at the Internet Institute website: &lt;a href="http://bit.ly/1iQT2UB"&gt;http://bit.ly/1iQT2UB&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;►Event Organized&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Institute      on Internet and Society (organised by Ford Foundation and CIS, Yashada, Pune,      February 11-17, 2014): &lt;a href="http://bit.ly/1fpTdDS"&gt;http://bit.ly/1fpTdDS&lt;/a&gt;. Bishakha Datta, Ravikiran      Annaswamy, Kingsley John, Prof. G. Nagarjuna, Nisha Thompson, Prashant      Naik, Nehaa Chaudhari, Bhairav Acharya, Manu Srivastav, Dr. Abhijeet Safai,      Payal Malik, Nishant Shah, Laura Stein, Sunil Abraham, Madan Muthu and      Chinmayi Arun taught at the institute. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------------&lt;br /&gt;&lt;a href="https://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;br /&gt;-----------------------------------------------------&lt;br /&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;p&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, IDRC and the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/february-2014-bulletin'&gt;https://cis-india.org/about/newsletters/february-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-04-07T07:27:46Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/financial-times-february-26-2014-india-tea-parties-enable-politicians-to-woo-urban-youth-with-technology">
    <title>India ‘tea parties’ enable politicians to woo urban youth with technology</title>
    <link>https://cis-india.org/news/financial-times-february-26-2014-india-tea-parties-enable-politicians-to-woo-urban-youth-with-technology</link>
    <description>
        &lt;b&gt;Babalal Patel’s tiny tea stall in southern Mumbai is a long way from Silicon Valley. It is not even that close to Bangalore, the Indian equivalent. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Avantika Chilkoti was &lt;a class="external-link" href="http://www.ft.com/cms/s/0/e8381500-9784-11e3-809f-00144feab7de.html#slide1"&gt;published in the Financial Times&lt;/a&gt; on February 26, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;But one night this month this ramshackle shop became the venue for a social media experiment that highlights the high-tech face of electioneering in India, the world’s largest democracy. A crowd gathered outside to watch two television screens showing a live broadcast with Narendra Modi, prime ministerial candidate for the opposition Bharatiya Janata party, as he answered questions the audience submitted by text message.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar “tea parties” were held across the country, designed to ram home Mr Modi’s humble background as a tea seller and his technological credentials. But the nationwide event, organised using mobile technology more commonly seen in US presidential campaigns, also signals a shift in Indian politics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For decades, political campaigns in India have centred around colossal rallies and billboard advertising. But a growing population of young people, rising internet use and the ubiquity of mobile phones mean the 2014 battle is playing out equally fiercely online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are moving far ahead of saying that we are building ‘likes’ on social media,” says Arvind Gupta, head of IT and social media for the BJP. “Organisation is being done using digital. So if I’m going to tell everybody there’s an event tomorrow, it can be posted on Facebook, websites, on SMS, on WhatsApp, though the real meeting is happening on the ground.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These techniques, which became familiar during the Arab uprisings of northern Africa, are an increasingly important part of communication strategy ahead of a national election, which must be held in the next three months, and which many believe will be close.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Gupta believes parties are fighting what he calls a “postmodern election” for up to 160 - largely urban - seats of the total 543. More than half the 50-strong team working on communication for the BJP are dedicated to digital campaigning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s internet user base reached a point of inflection last year, passing 200m. While that is a fraction of the 1.3bn population, prompting many to question the power of social media, use is far greater among urban and young voters, millions of whom will be eligible to vote for the first time this year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Social media is suddenly becoming important, not for all constituencies but for urban constituencies because for the first time the urban youth and the educated class is very much glued into the election and showing interest,” says Rajeeva Karandikar, a statistician and election analyst.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Modi, chief minister of Gujarat, has adapted particularly quickly to the changing environment. He captured the public imagination by using holograms to address rallies and Google Hangouts to interact with the diaspora. He has 3.4m Twitter followers and more than 10.6m “likes” on his Facebook page, thanks in part to a slick social media team led by high-profile technology entrepreneurs. Meanwhile Rahul Gandhi, the reticent, undeclared candidate for the incumbent Congress party, does not even have a verified Twitter account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some were disappointed by low attendance at the national “tea parties”, but the events were lauded for being interactive and, perhaps most importantly in a country where newspaper readership remains high, grabbed column inches in local media. The audience could speak directly to Mr Modi at venues with a two-way video link and the footage was immediately available on YouTube.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While answering each question Mr Modi has a point of view,” says Pratik Patel, 28, a chartered accountant who organised the event at his grand- father’s tea shop. “He doesn’t have two ways of looking at the same thing - this helps him to be more decisive and forward thinking.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media also provides swaths of information to India’s political parties, as they copy the sophisticated data analytics used by US president Barack Obama’s campaigns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From its offices in suburban Mumbai, the digital marketing group Pinstorm tracks what social media users are discussing at the constituency level and identifies significant supporters or critics. It describes the service as an early warning system or “social radar”, which allows parties to mobilise workers rapidly to oppose or support a point of view.&lt;br /&gt;Sceptics argue, however, that social media has insufficient traction in India to affect results of the forthcoming poll. But the size of the user base does not reflect its full power. It is educated influential Indians who use these digital networks and the online debate shapes views in traditional media that reach a wider audience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The theory is that since the elites are connected and have more time to spare on social media, let us use social media and the internet more generally to influence discourse through these elites,” says Sunil Abraham, executive director for the Bangalore-based Centre for Internet and Society. “It’s an indirect route to the vote.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An adviser to the Obama campaign warns, however, that, given differences in funding and the local environment, India’s politicians should be wary of using the US presidential race as a model. This year a simpler technology may prove the best tool for campaigns in India: the mobile phone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Folks look to the Obama campaign for this sort of stuff,” says Ethan Roeder, who worked on data for the 2008 and 2012 US presidential campaigns. “But a lot of these international campaigns would do best looking elsewhere for a model . . . No campaign in the history of the world has ever spent that much money to elect a single individual to a single office.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s version is, of course, markedly cheaper, thanks to the roadside chai-wallahs and armies of volunteers, pulling in the new breed of voters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I have never attended a political rally in my entire life,” says Mr Patel, who helped organise Mr Modi’s nationwide “tea party”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If people want to connect with me they need to connect with me on social media or via email.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Modi’s digital army&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The team building the digital campaign for India’s opposition Bharatiya Janata party mixes entrepreneurs and veterans from the technology industry, rather than individuals with experience of electioneering alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rajesh Jain, working on electoral technology, is well known in the industry since setting up successful businesses in online news and digital marketing. These include IndiaWorld Communications, a collection of websites which was bought in 1999 by Satyam Infoway, then India’s largest internet service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He has the archetypal curriculum vitae, with a degree from one of the eminent Indian institutes of technology followed by a master’s degree from Columbia University in New York.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Arvind Gupta, who heads the BJP’s IT and social media cell, has a remarkably similar educational background - with an added stint in Silicon Valley to his name.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the last count, the party had recruited more than 2m volunteers, who are organised online and will provide support in different ways. But there is also a younger generation of advocates who have given up good jobs to join the digital effort. Citizens for Accountable Governance is a non-profit youth organisation co-ordinating nationwide “tea parties” ahead of this year’s national election, where Narendra Modi, the party’s prime ministerial candidate, interacts with audiences at tea stalls via video link.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;About 100 young professionals lead the operation and all come with impressive credentials, including jobs at prominent global consulting groups such as McKinsey, and banks such as JPMorgan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond that, Mr Modi has had a team working for him personally since he took over as chief minister of Gujarat more than a decade ago.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is a discreet IT set-up that still functions independently of the party’s operations.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/financial-times-february-26-2014-india-tea-parties-enable-politicians-to-woo-urban-youth-with-technology'&gt;https://cis-india.org/news/financial-times-february-26-2014-india-tea-parties-enable-politicians-to-woo-urban-youth-with-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-06T12:13:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3">
    <title>Surveillance and the Indian Constitution - Part 3: The Public/Private Distinction and the Supreme Court’s Wrong Turn</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3</link>
    <description>
        &lt;b&gt;After its decision in Gobind, the Supreme Court's privacy floodgates opened; a series of claims involving private parties came before its docket, and the resulting jurisprudence ended up creating confusion between state-individual surveillance, and individual-individual surveillance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Gautam Bhatia's blog post was originally &lt;a class="external-link" href="http://indconlawphil.wordpress.com/2013/12/17/privacy-and-surveillance-in-india-iii-the-publicprivate-distinction-and-the-supreme-courts-wrong-turn/"&gt;published on Indian Constitutional Law and Philosophy Blog&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;We have seen that &lt;i&gt;Gobind &lt;/i&gt;essentially crystallized a constitutional right to privacy as an aspect of personal liberty, to be infringed only by a narrowly-tailored law that served a compelling state interest. After the landmark decision in &lt;i&gt;Gobind&lt;/i&gt;, &lt;i&gt;&lt;a href="http://indiankanoon.org/doc/971635/"&gt;Malak Singh v State of P&amp;amp;H&lt;/a&gt; &lt;/i&gt;was the next targeted-surveillance history-sheeter case to come before the Supreme Court. In that case, Rule 23 of the Punjab Police Rules was at issue. Its vires was not disputed, so the question was a direct matter of constitutionality. An order of surveillance was challenged by two individuals, on the ground that there were no reasonable bases for suspecting them of being repeat criminals, and that their inclusion in the surveillance register was politically motivated.  After holding that entry into a surveillance sheet was a purely administrative measure, and thus required no prior hearing (&lt;i&gt;audi alteram partem&lt;/i&gt;), the Court then embarked upon a lengthy disquisition about the scope and limitations of surveillance, which deserves to be reproduced in full:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;But all this does not mean that the police have a licence to enter the names of whoever they like (dislike?) in the surveillance register; nor can the surveillance be such as to squeeze the fundamental freedoms guaranteed to all citizens or to obstruct the free exercise and enjoyment of those freedoms; nor can the surveillance so intrude as to &lt;/i&gt;&lt;i&gt;&lt;span&gt;offend the dignity of the individual&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. Surveillance of persons who do not fall within the categories mentioned in Rule 23.4 or for reasons unconnected with the prevention of crime, or excessive surveillance falling beyond the limits prescribed by the rules, will entitle a citizen to the Court’s protection which the court will not hesitate to give. The very rules which prescribe the conditions for making entries in the surveillance register and the mode of surveillance appear to recognise the caution and care with which the police officers are required to proceed. The note following R. 23.4 is instructive. It enjoins a duty upon the police officer to construe the rule strictly and confine the entries in the surveillance register to the class of persons mentioned in the rule. Similarly R.23.7 demands that there should be no illegal interference in the guise of surveillance. Surveillance, therefore, has to be unobstrusive and within bounds. Ordinarily the names of persons with previous criminal record alone are entered in the surveillance register. &lt;/i&gt;&lt;i&gt;&lt;span&gt;They must be proclaimed offenders, previous convicts, or persons who have already been placed on security for good behaviour. In addition, names of persons who are reasonably believed to be habitual offenders or receivers of stolen property whether they have been convicted or not may be entered&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. It is only in the case of this category of persons that there may be occasion for abuse of the power of the police officer to make entries in the surveillance register. But, here, the entry can only be made by the order of the Superintendent of Police who is prohibited from delegating his authority under Rule 23.5. Further it is necessary that the Superintendent of Police must entertain &lt;/i&gt;&lt;i&gt;&lt;span&gt;a reasonable belief&lt;/span&gt;&lt;/i&gt;&lt;i&gt; that persons whose names are to be entered in Part II are habitual offenders or receivers of stolen property. While it may not be necessary to supply the grounds of belief to the persons whose names are entered in the surveillance register it may become necessary in some cases to satisfy the Court when an entry is challenged &lt;/i&gt;&lt;i&gt;&lt;span&gt;that there are grounds to entertain such reasonable belief&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. In fact in the present case we sent for the relevant records and we have satisfied ourselves that there were sufficient grounds for the Superintendent of Police to entertain a reasonable belief. In the result we reject both the appeals subject to our observations regarding the mode of surveillance. There is no order as to costs.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three things emerge from this holding: &lt;i&gt;first&lt;/i&gt;, the Court follows &lt;i&gt;Gobind&lt;/i&gt; in locating the right to privacy within the philosophical concept of individual &lt;i&gt;dignity&lt;/i&gt;, found in Article 21’s guarantee of personal liberty. &lt;i&gt;Secondly&lt;/i&gt;, it follows &lt;i&gt;Kharak Singh, Malkani and Gobind&lt;/i&gt; in insisting that the surveillance be targeted, limited to fulfilling the government’s crime-prevention objectives, and be limited – not even to suspected criminals, but – repeat offenders or serious criminals. And &lt;i&gt;thirdly&lt;/i&gt;, it leaves open a role for the Court – that is, &lt;i&gt;judicial review&lt;/i&gt; – in examining the grounds of surveillance, if challenged in a particular case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After &lt;i&gt;Malak Singh, &lt;/i&gt;there is another period of quiet. &lt;a href="http://www.indiankanoon.org/doc/304068/"&gt;&lt;i&gt;LIC v Manubhai D Shah&lt;/i&gt;&lt;/a&gt;, in 1993, attributed – wrongly – to &lt;i&gt;Indian Express Newspapers &lt;/i&gt;the proposition that Article 19(1)(a)’s free expression right included privacy of communications (&lt;i&gt;Indian Express &lt;/i&gt;itself had cited a  UN Report without incorporating it into its holding).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Soon afterwards, &lt;i&gt;&lt;a href="http://www.indiankanoon.org/doc/501107/"&gt;R. Rajagopal v State of TN&lt;/a&gt; &lt;/i&gt;involved the question of the publication of a convicted criminal’s autobiography by a publishing house; Auto Shankar, the convict in question, had supposedly withdrawn his consent after agreeing to the book’s publication, but the publishing house was determined to go ahead with it. Technically, this wasn’t an Article 21 case: so much is made clear by the very manner in which the Court frames its issues: the question is whether a &lt;i&gt;&lt;span&gt;citizen&lt;/span&gt;&lt;/i&gt; of the country can prevent &lt;i&gt;&lt;span&gt;another person&lt;/span&gt;&lt;/i&gt;&lt;i&gt; &lt;/i&gt;from writing his biography, or life story. (Paragraph 8) The Court itself made things clear when it held that the right of privacy has two aspects: the &lt;i&gt;tortious &lt;/i&gt;aspect, which provides damages for a breach of individual privacy; and the &lt;i&gt;constitutional aspect&lt;/i&gt;, which protects privacy against &lt;span&gt;&lt;b&gt;unlawful governmental intrusion.&lt;/b&gt;&lt;/span&gt; (Paragraph 9) Having made this distinction, the Court went on to cite a number of American cases that were precisely about the right to privacy against governmental intrusion, and therefore – ideally – irrelevant to the present case (Paras 13 – 16); and then, without quite explaining how it was using these cases – or whether they were relevant at all, it switched to examining the law of defamation (Para 17 onwards). It would be safe to conclude, therefore, in light of the clear distinctions that it made, the Court was concerned in &lt;i&gt;R. Rajagopal &lt;/i&gt;about an action between private parties, and therefore, privacy in the context of tort law. It’s confusing observations, however, were to have rather unfortunate effects, as we shall see.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We now come to a series of curious cases involving privacy and medical law. In &lt;a href="http://indiankanoon.org/doc/382721/"&gt;&lt;i&gt;Mr X v Hospital Z&lt;/i&gt;&lt;/a&gt;, the question arose whether a Hospital that – in the context of a planned marriage – had disclosed the appellant’s HIV+ status, leading to his social ostracism – was in breach of his right to privacy. The Court cited &lt;i&gt;Rajagopal&lt;/i&gt;, but unfortunately failed to understand it, and turned the question into one of the &lt;i&gt;constitutional right to privacy, and not the private right. &lt;/i&gt;Why the Court turned an issue between two private parties – adequately covered by the tort of breach of confidentiality – into an Article 21 issue is anybody’s guess. &lt;i&gt;Surely&lt;/i&gt; Article 21 – the right to life and personal liberty – is not horizontally applicable, because if it was, we might as well scrap the entire Indian Penal Code, which deals with exactly these kinds of issues – individuals violating each others’ rights to life and personal liberty. Nonetheless, the Court cited &lt;i&gt;Kharak Singh, Gobind &lt;/i&gt;&lt;span&gt;&lt;b&gt;and&lt;/b&gt;&lt;/span&gt; Article 8 of the European Convention of Human Rights, further muddying the waters, because Article 8 – in contrast to American law – embodies a &lt;i&gt;proportionality test&lt;/i&gt; for determining whether there has been an impermissible infringement of privacy. The Court then came up with the following observation:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;Where there is a clash of two Fundamental Rights, as in the instant case, namely, the appellant’s right to privacy as part of right to life and Ms. Akali’s right to lead a healthy life which is her Fundamental Right under Article 21, the RIGHT which would advance the public morality or public interest, would alone be enforced through the process of Court, for the reason that moral considerations cannot be kept at bay.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With respect, this is utterly bizarre. If there is a clash of two rights, then that clash must be resolved by referring to the &lt;i&gt;Constitution&lt;/i&gt;, and not to the Court’s opinion of what an amorphous, elastic, malleable, many-sizes-fit “public morality” says. The mischief caused by this decision, however, was replicated in &lt;i&gt;&lt;a href="http://indiankanoon.org/doc/1309207/"&gt;Sharda v Dharmpal&lt;/a&gt;, &lt;/i&gt;decided by the Court in 2003. In that case, the question was whether the Court could require a party who had been accused of unsoundness of mind (as a ground for divorce under the wonderfully progressive Hindu Marriage Act) to undergo a medical examination – and draw an adverse inference if she refused. Again, whether this was a case in which Article 21 ought to be invoked is doubtful; at least, it is arguable, since it was the Court making the order. Predictably, the Court cited from &lt;i&gt;Mr X v Hospital Z &lt;/i&gt;extensively. It cited &lt;i&gt;Gobind&lt;/i&gt; (compelling State interest) &lt;i&gt;and&lt;/i&gt; the ECHR (proportionality). It cited a series of cases involving custody of children, where various Courts had used a “balancing test” to determine whether the best interests of the child overrode the privacy interest exemplified by the client-patient privilege. It applied this balancing test to the case at hand by balancing the “right” of the petitioner to obtain a divorce for the spouse’s unsoundness of mind under the HMA, vis-à-vis the Respondent’s right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of the above analysis, it is submitted that although the outcome in &lt;i&gt;Mr X v Hospital Z &lt;/i&gt;and &lt;i&gt;Sharda v Dharmpal &lt;/i&gt;might well be correct, the Supreme Court has misread what &lt;i&gt;R. Rajagopal &lt;/i&gt;actually held, and its reasoning is deeply flawed. Neither of these cases are Article 21 cases: they are private tort cases between private parties, and ought to be analysed under private law, as &lt;i&gt;Rajagopal&lt;/i&gt; itself was careful to point out. In private law, also, the balancing test makes perfect sense: there are a series of interests at stake, as the Court rightly understood, such as certain rights arising out of marriage, all of a private nature. In any event, whatever one might make of these judgments, one thing is clear: they are both logically and legally irrelevant to the &lt;i&gt;Kharak Singh &lt;/i&gt;line of cases that we have been discussing, which are to do with the Article 21 right to privacy &lt;i&gt;against the State&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3'&gt;https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-06T23:02:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules">
    <title>UIDAI Practices and the Information Technology Act, Section 43A and Subsequent Rules</title>
    <link>https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules</link>
    <description>
        &lt;b&gt;UIDAI practices and section 43A of the IT Act are analyzed in this post.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the 52&lt;sup&gt;nd&lt;/sup&gt; Report on Cyber Crime, Cyber Security, and the Right to Privacy – in evidence provided, the Department of Electronics and Information Technology stated &lt;i&gt;“...Section 43A and the rules published under that Section cover the entire privacy in case of digital data. These are being followed by UIDAI also and other organisations...”&lt;/i&gt; (pg.46) &lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This blog post explains the requirements found under Section 43A of the Information Technology Act 2000 and the subsequent Information Technology “ Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; and analyses publicly available documents from the UIDAI website&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; as well as the UIDAI enrolment form&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; to demonstrate the ways in which:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;UIDAI practices &lt;b&gt;are &lt;/b&gt;in line with section 43A and the Rules, &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;UIDAI practices &lt;b&gt;are not&lt;/b&gt; in line with section 43A and the Rules, &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;UIDAI practices &lt;b&gt;are partially&lt;/b&gt; in with section 43A and the Rules &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Where more information&lt;/b&gt; is needed to draw a conclusion. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Applicability and Scope&lt;/h3&gt;
&lt;p&gt;Section 43A of the Information Technology Act 2008 and subsequent Rules apply only to Body Corporate and to digital information.&lt;/p&gt;
&lt;p&gt;Body Corporate under the Information Technology Act 2008 is defined as:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; “Any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities” &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - not in line&lt;/b&gt;: The UIDAI is not a body corporate. The UIDAI is an attached office under the aegis of the Planning Commission that was set up by an executive order.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI collects, processes, stores, and shares both digital and non-digital information. As section 43A and subsequent Rules apply only to digital information, there is not sufficient protection provided over all the information collected, processed, stored, and used by the UIDAI.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy Policy on Website&lt;/h3&gt;
&lt;p&gt;Rule 4 requires body corporate to provide a privacy policy on their website. The privacy policy must include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Clear and easily accessible statements of its practices and policies&lt;/li&gt;
&lt;li&gt;Type of personal or sensitive personal data or information collected&lt;/li&gt;
&lt;li&gt;Purpose of collection and usage of such information &lt;/li&gt;
&lt;li&gt;Disclosure of information including sensitive personal information &lt;/li&gt;
&lt;li&gt;Reasonable security practices and procedures as provided under rule 8&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Though the UIDAI has placed a privacy policy&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; on their website, the privacy policy only addresses the use of website and does not comprehensively provide clear and accessible statements about all of the UIDAI’s practices and policies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does not state the specific types of personal or sensitive data that could be collected, but instead states &lt;i&gt;“As a general rule, this website does not collect Personal Information about you when you visit the site. You can generally visit the site without revealing Personal Information, unless you choose to provide such information.”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Features on the UIDAI website that require individuals to provide personal information and sensitive personal information include: Booking an appointment, checking aadhaar status, enrolling for e-aadhaar, enrolling for aadhaar, updating aadhaar data. Types of information required for these services include: mobile number, name, address, gender, date of birth, and enrolment ID.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The privacy policy goes on to state: &lt;i&gt; “If you are asked for any other Personal Information you will be informed how it will be used if you choose to give it. If at any time you believe the principles referred to in this privacy statement have not been followed, or have any other comments on these principles, please notify the webmaster through the Contact Us page. Note: The use of the term "Personal Information" in this privacy statement refers to any information from which your identity is apparent or can be reasonably ascertained.”&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does explain the purpose for collection of information on the website and the use of collected information.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does not address the possibility of disclosure of information collected by the UIDAI from the use of its website, except in the case of when an individual provides his/her email at which point the privacy policy states&lt;i&gt; “Your e-mail address will not be used for any other purpose, and will not be disclosed without your consent.”&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does not provide information about the security practices adopted by the UIDAI. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Consent&lt;i&gt; &lt;/i&gt;&lt;/h3&gt;
&lt;p&gt;Rule 5 requires that prior to the collection of sensitive personal data, the body corporate must obtain consent, either in writing or through fax regarding the purpose of usage before collection of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;/b&gt;&lt;br /&gt;The UIDAI collects written consent from individuals through the enrolment form  for the issuance of an Aadhaar number.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Collection Limitation&lt;/h3&gt;
&lt;p&gt;Rule 5 (2) requires that body corporate only collect sensitive personal data if it is connected to a lawful purpose and if it is considered necessary for that purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;/b&gt;&lt;br /&gt;The Aadhaar enrolment form requires only the necessary sensitive personal data for the issuance of an Aadhaar number. Individuals are given the option to provide banking and financial information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Notice During Direct Collection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(3) requires that while collecting information directly from an individual the body corporate must provide the following information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The fact that the information is being collected&lt;/li&gt;
&lt;li&gt;The purpose for which the information is being collected&lt;/li&gt;
&lt;li&gt;The intended recipients of the information &lt;/li&gt;
&lt;li&gt;The name and address of the agency that is collecting the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency that will retain the information&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;br /&gt;&lt;/b&gt;The Aadhaar enrolment form does not provide the following information:&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The intended recipients of the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency collecting the information &lt;/li&gt;
&lt;li&gt;The name and address of the agency that will retain the information &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Retention Limitation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(4) requires that body corporate must retain sensitive personal data only for as long as it takes to fulfil the stated purpose or otherwise required under law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;/b&gt;&lt;br /&gt;It is unclear from publicly available information what the UIDAI retention practices are.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Use Limitation&lt;/h3&gt;
&lt;p&gt;Rule 5(5) requires that information must be used for the purpose that it was collected for.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;br /&gt;&lt;/b&gt;It is unclear from publicly available information if the UIDAI is using collected information only for the purpose for which it was collected for. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Right to Access and Correct&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Rule 5(6) requires body corporate to provide individuals with the ability to review the information they have provided and access and correct  personal or sensitive personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;br /&gt;&lt;/b&gt;Though the UIDAI provides individuals with the ability to access and correct personal information, as stated on the enrolment form, correction is free only if changed within 96 hours of enrolment. Additionally, as stated on the enrolment form, if an individual chooses to allow for the UIDAI to facilitate the opening of a bank account and link present bank accounts to the UID number, this information, after being provided, cannot be corrected. The UIDAI website has a portal for updating information, but only name, address, gender, data of birth, and mobile number can be updated through this method.&lt;b&gt; &lt;/b&gt;&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Right to ‘Opt Out’ and Withdraw Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(7) requires that body corporate must provide individuals with the option of 'opting out' of providing data or information sought. Individuals also have the right to withdraw consent at any point of time.  Body corporate has the right to withdraw services if consent is withdrawn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;br /&gt;&lt;/b&gt;The UID enrolment form provides individuals with one ‘optional’ field  - the option of having the UIDAI open a bank account and link it to the individuals UID number or having the UIDAI link present bank accounts to individuals UID number. No other option to ‘opt out’ or withdraw consent is present on the enrolment form or the UIDAI privacy policy, terms of use, or website.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 8 requires that body corporate must secure information in accordance with the ISO  27001 standard. These practices must be audited on an annual basis or when the body corporate undertakes a significant up gradation of its process and computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;br /&gt;&lt;/b&gt;The security practices adopted by the UIDAI are not mentioned in the website privacy policy, on the website, or on the enrolment form, thus it is unclear from publicly available information if the UID is compliant with ISO 27001 standards. Though the UIDAI has been functioning since 2010, and it is unclear from publicly available information if annual audits of the UIDAI security practices have been undertaken.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Disclosure with Consent&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 6 requires that body corporate must have consent before disclosing sensitive personal data to any third person or party, except in the case with Government agencies for the purpose of verification of identity, prevention, detection, investigation, including cyber incidents and prosecution and punishment of offenses, on receipt of a written request. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;/b&gt;&lt;br /&gt;In the enrolment form, consent for disclosure is stated as&lt;i&gt; ‘‘I have no objection to the UIDAI sharing information provided by me to the UIDAI with agencies engaged in delivery of welfare services.” &lt;/i&gt;This is a blanket statement and allows for all future possibilities of sharing and disclosure of information provided with any organization that the UIDAI deems as ‘engaged in the delivery of welfare services’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI privacy policy only addresses the disclosure of an individual’s email address with consent. Though not directly addressing disclosure, the UIDAI privacy policy also states &lt;i&gt;“&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;We will not identify users or their browsing activities, except when a law enforcement agency may exercise a warrant to inspect the service provider's logs.”&lt;/i&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Prohibition on Publishing and Further Disclosure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 6(3) and 6(4) prohibit the body corporate from publishing sensitive personal  data or information. Similarly, organizations receiving sensitive personal data are not allowed to disclose it further.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;/b&gt;&lt;br /&gt;The UDAI does not publish sensitive personal data. It is unclear what practices and standards registrars and enrolment agencies are functioning under.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Requirements for Transfer of Sensitive Personal Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 7 requires that body corporate may transfer sensitive personal data into another jurisdiction only if the country ensures the same level of protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;br /&gt;&lt;/b&gt;It is unclear from publicly available information if information collected by the UIDAI is transferred outside of India. &lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Establishment of Grievance Officer&lt;b&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(9) requires that body corporate must establish a grievance officer and the details must be posted on the body corporates website and grievances must be addressed within a month of receipt. &lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;br /&gt;&lt;/b&gt;The website of the UIDAI provides details of a grievance officer that individuals can contact.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; It is unclear from publicly available information if grievances are addressed within a month.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a class="external-link" href="http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf"&gt;http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://dispur.nic.in/itact/it-procedures-sensitive-personal-data-rules-2011.pdf"&gt;http://dispur.nic.in/itact/it-procedures-sensitive-personal-data-rules-2011.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/"&gt;http://uidai.gov.in/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;a class="external-link" href="http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf"&gt;http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/organization-details.html"&gt;http://uidai.gov.in/organization-details.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/privacy-policy.html"&gt;http://uidai.gov.in/privacy-policy.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;a class="external-link" href="http://resident.uidai.net.in/home"&gt;http://resident.uidai.net.in/home&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;a class="external-link" href="http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf"&gt;http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;a class="external-link" href="https://ssup.uidai.gov.in/web/guest/ssup-home"&gt;https://ssup.uidai.gov.in/web/guest/ssup-home&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/contactus.html"&gt;http://uidai.gov.in/contactus.html&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules'&gt;https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-06T07:00:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments">
    <title>Open Call for Comments: The Privacy Protection Bill 2013 drafted by the Centre for Internet and Society</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is announcing an Open Call for Comments to the CIS Privacy Protection Bill 2013.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In early 2013 the Centre for Internet and Society drafted the Privacy (Protection) Bill 2013 as a citizen’s version of privacy legislation for India. The Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been collecting comments to the Privacy Protection Bill since April 2013 with the intention of submitting the Bill to the Department of Personnel and Training as a citizen’s version of a privacy legislation for India.  If you would like to submit comments on the Privacy Protection Bill to be included as part of the Centre for Internet and Society’s submission to the Department of Personnel and Training, please email comments to &lt;a href="mailto:bhairav@cis-india.org"&gt;bhairav@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf" class="internal-link"&gt;Download the latest version of the Privacy Protection Bill&lt;/a&gt;&lt;/b&gt; (February 2014)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-25T05:38:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy">
    <title>CIS Welcomes 52nd Report on Cyber Crime, Cyber Security, and Right to Privacy </title>
    <link>https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy</link>
    <description>
        &lt;b&gt;The “Fifty Second Report on Cyber Crime, Cyber Security, and Right to Privacy” issued by the 2013 -2014 Standing Committee on Information Technology on February 12th 2014, highlights the urgent need for reform in India’s cyber security framework and the need for the much awaited privacy legislation to be finalized and made into a law. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a class="external-link" href="http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf"&gt;&lt;b&gt;Read the Fifty-Second Report on Cyber Crime, Cyber Security and Right to Privacy released by the Department of Electronics and Information Technology&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Report consists of questions on the state of cyber security, cyber crime, and privacy posed by the Standing Committee and briefings and evidence provided by the Department of Electronics and Information Technology (DEITY ) in reply. The Report concludes with recommendations from the Standing Committee on the way forward. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report represents an important step forward in the realm of privacy and cyber security in India as the evidence provided by DEITY  clarifies a number of aspects of India’s present and upcoming cyber security policies and practices. Furthermore, the recommendations by the Standing Committee highlight present gaps and inadequacies in India’s policies and practices and needed steps forward– particularly the need for a privacy legislation in India in the context of cyber security, increased transactions of sensitive data, and governmental projects like the Unique Identification Project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadly, the Standing Committee sought input from DEITY  on eight different aspects of cyber crime, cyber security, and privacy in India - namely:  the growing incidents of cyber crime and resulting financial loss, the challenges and constraints of cyber crime,  the role of relevant governmental organizations in India with respect to cyber security, preparedness and policy initiatives, cyber security and the right to privacy, monitoring and grievance redressal mechanism, and education and awareness initiatives. The evidence provided by DEITY  sheds light on the present mindset of the Government at this time, upcoming policies, and capacity and infrastructure gaps in India’s cyber security framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society appreciates the Report and we would like to highlight and emphasize the following aspects:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Need for a privacy legislation and inadequacy of privacy provisions in Information Technology Act&lt;/b&gt;: When asked by the Standing Committee about the right to privacy and cyber security, DEITY  highlighted the fact that the Information Technology Act contains sufficient safeguards for privacy, and added that the Department of Personnel and Training (DoPT) is in the process of developing a privacy legislation that will address the general concerns of privacy in the country, and thus the two together will be sufficient. DEITY  also noted that no study on the extent of privacy breach due to cyber crime in India has been conducted. In their recommendations, the Standing Committee noted that it was unhappy that the Government has yet to institute a legal framework on privacy, as the increased transfer of sensitive data and projects like the UID leave citizens vulnerable to privacy violations . Significantly, the Standing Committee recommended that though the DoPT is currently responsible for drafting the Privacy Bill, DEITY  should coordinate with the DoPT and become involved in the process. &lt;br /&gt;&lt;br /&gt;As recognized by the Standing Committee, the Centre for Internet and Society would like to  further emphasize the inadequacy of the provisions relating to privacy in the Information Technology Act, and the need for a privacy legislation in India.  Inadequate aspects of the provisions have been pointed out by a number of sources. For example:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;The Report of the Group of Experts on Privacy&lt;/a&gt;: Prepared by the committee chaired by Justice AP Shah &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://ec.europa.eu/justice/policies/privacy/docs/studies/final_report_india_en.pdf"&gt;First Analysis of the Personal Data Protection Law in India&lt;/a&gt;: Prepared by the University of Namur for the Commission of the European Communities Directorate General for Justice, Freedom, and Security&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011" class="external-link"&gt;Comments on the Information Technology&lt;/a&gt; (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011: Prepared by the Centre for Internet and Society and submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1964013"&gt;India’s U-Turns on Data Privacy&lt;/a&gt;: Prepared by Graham Greenleaf for the Privacy Laws &amp;amp; Business International Report, Issues 110 -114, 2011 &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Unclear Enforcement of 43A and associated rules&lt;/b&gt;: In evidence provided, DEITY, while discussing section 43A and the associated Rules, noted that the Data Security Council of India and empanelled security auditors through CERT-in are responsible for the ‘auditing of best practice’s (pg 24).  The Standing Committee did not directly respond to this comment.&lt;br /&gt;&lt;br /&gt;The Centre for Internet and Society would like to point out that DEITY did not clearly state that DSCI and the auditors through CERT-in were responsible for auditing organizational security practices for compliance with 43A. Furthermore, there is no publicly available information regarding audits ensuring compliance with 43A or information about the number of companies  that have been found to be compliant.  The Centre for Internet and Society would like to encourage that this information be made public, and compliance with 43A be enforced at the organizational level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI not in compliance with 43A and associated Rules&lt;/b&gt;:  In evidence provided, DEITY  noted that &lt;i&gt;“..Section 43A and the rules published under that Section cover the entire privacy in case of digital data. These are being followed by UIDAI also and other organisations...”&lt;/i&gt; (pg.46) In their recommendations the Standing Committee did not directly address this comment, but did emphasize the need for a privacy legislation in light of the UID scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society appreciates that the Standing Committee raised concern about the privacy implications of the UID project. We would like to highlight that the UIDAI is not a Body Corporate, and is not in compliance with 43A or the subsequent Rules in the Information Technology Act. Furthermore, the UID project involves the handling and processing of data in analogue and digital formats, and thus the privacy protections found under 43A are not sufficient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The potential harms of metadata&lt;/b&gt;: In evidence provided, the Department noted  &lt;i&gt;“...we have been assured that whatever data has been gathered by them for surveillance relates only to the metadata..but we expressed that any incursion into the content will not be tolerated and is not tolerable from the Indian stand and point of view.”&lt;/i&gt; (pg.47) The Standing Committee did not respond directly to this comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society would like to thank the Standing Committee for noting that the Government should have taken prior steps to preventing such an interception from taking place and for recommending the Department to take develop a policy to prevent future instances of interception from taking place. The Centre for Internet and Society would like to emphasize the importance and potential sensitive nature of metadata. Metadata can, and often does, disclose more about an individual or an activity than the actual content. For example, metadata can reveal identity, behaviour patterns, associations, and can enable the mapping of location and individual movement. As such, the Centre for Internet and Society would recommend that the Government of India treat access to all information generated by individual and governmental communications as sensitive and confidential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Inadequacy of the Information Technology Act&lt;/b&gt;: When asked by the Standing Committee if the Information Technology Act provided sufficient legal safeguards for cyber security and cyber crime, DEITY  highlighted the fact that the Information Technology Act 2000 addresses all aspects of cyber crime in a comprehensive manner.  DEITY  also pointed out that the National Cyber Security Policy 2013 has provisions to enable the development of a legal framework, and the Department of Personnel and Training  is in the process of drafting a privacy legislation for India that will fill any gaps that exist. In their recommendations, the Standing Committee recognized that the Information Technology Act does contain provisions that address cyber security and cyber crime, but, especially in the recent controversy over section 66A of the Act, Standing Committee emphasized the need for periodical reviews of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society appreciates the fact that the Committee recognized the need for periodical review of the Information Technology Act, particularly in light of the controversy over 66 A. The Centre for Internet and Society would like to underscore the problems associated with 66A and would like to highlight that with regards to privacy and cyber security, the IT Act is not adequate and falls short in a number of areas. Research that the Centre for Internet and Society has conducted explaining these weaknesses can be found through the below links:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Breaking Down Section 66A of the IT Act&lt;/li&gt;
&lt;li&gt;Short note on IT Amendment Act, 2008&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Implications of domestic servers&lt;/b&gt;:  In response to questions posed by the Standing Committee about security risks associated with the importation of electronics and IT products, as well as the hosting of servers outside the country, DEITY  noted the security risk of using foreign infrastructure and pointed to the hosting of servers in India as a solution to protecting the security and privacy of Indian data. The Standing Committee supported this initiative, and encouraged DEITY  to take further steps towards securing and protecting the privacy of Indian data through the hosting of servers for critical sectors within India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society appreciates the fact that the Standing Committee carefully limited the recommendation of locating servers in India to those in critical sectors, but would caution the Government of potential implications on users ability to freely access content and services, and highlight the fact that localization of servers is not a security solution in itself as a comprehensive solution and hardening of critical assets against cyber attacks is essential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Incorporation of safeguards into MOU’s for international cooperation&lt;/b&gt;: When asked about MOU’s for international cooperation that DEITY  has engaged in with other countries, DEITY  reported that currently CERT-in is entering into a number of MOU’s with other countries to facilitate cooperation for cyber security purposes. Presently there are MOUs with the US, Japan, South Korea, Mauritius, Kasakhstan, Finland, and the Canada Electronics and ICT sector. DEITY  is also seeking MOUs with Malaysia, Israel, Egypt, Canada, and Brazil. The Standing Committee supported  India entering into MOU’s for purposes of international cooperation, and encouraged DEITY  to continue entering into MOU’s to mitigate jurisdictional complications when seeking to address issues related to cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society recognizes the importance of international cooperation when handling issues related to cyber security and cyber crime. To ensure that this process is in line with human rights, the Centre for Internet and Society would encourage DEITY  to ensure that all MOU’s and/or  Mutual Legal Assistance Agreements:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Uphold the principle of dual criminality &lt;/li&gt;
&lt;li&gt;Apply the highest level of protection for individuals in the case where the laws of more than one state could apply to communications surveillance &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Are not used by any party involved to circumvent domestic legal restrictions on communications surveillance.&lt;/li&gt;
&lt;li&gt;Are clearly documented and publicly available&lt;/li&gt;
&lt;li&gt;Contain provisions guaranteeing  procedural fairness.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hactivism as a benefit to society&lt;/b&gt;: In evidence provided on page 14, DEITY, among other elements, referred to Hactivism as a societal challenge to securing cyber security and tackling cyber crime. The Standing Committee did not directly address this comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society would like to point out that hacktivism is a complex topic and consists of methods. Though some methods used by hacktivists are illegal, and some use hacktivism for censorship purposes and to target certain groups, other forms of hacktivism  can benefit society and strengthen cyber security by  finding and revealing vulnerabilities in a system, and bringing attention to illegal or violative practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This works towards ensuring that a system is adequately secure. Because of the dynamic nature of hacktivism, the Centre for Internet and Society believes that hacktivism needs to be evaluated on a case by case basis and the Government should not broadly label hacktivism as a challenge to cyber security and cyber crime.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importance of the anonymous speech: In evidence provided, DEITY noted the threat to cyber security that the anonymous nature of the internet posed. This was reiterated by the Standing Committee in their recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While recognizing the potential threat to cyber security that the anonymous nature of the internet can pose, the Centre for Internet and Society would like to highlight the importance of anonymous speech online to an individual’s right to free expression.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Recognizing the direct connection between a strong privacy framework and a strong cyber security framework, as security cannot be achieved without privacy, and recognizing the need for a privacy legislation in light of governmental projects like the UID,  the Centre for Internet and Society welcomes &lt;i&gt;the Fifty Second Report on Cyber Crime, Cyber Security, and the Right to Privacy&lt;/i&gt; and echoes the Standing Committees recommendation and emphasis on the need for a comprehensive privacy legislation to be passed in India.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. These safeguards are reflected in the principle of “safeguards for International Cooperation” found in the International Principles on the Application of Human Rights to Communications Surveillance”  &lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;https://en.necessaryandproportionate.org/text&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. For more information about hacktivism see: Activism, Hacktivism, and Cyberterrorism. The Internet as a Tool for Influencing Foreign Policy. By Dorothy E. Denning. Georgetown University. Available at: &lt;a class="external-link" href="http://www.iwar.org.uk/cyberterror/resources/denning.htm"&gt;http://www.iwar.org.uk/cyberterror/resources/denning.htm&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy'&gt;https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-24T10:49:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/calcutta-hc-strengthens-whistle-blower-protection">
    <title>Calcutta High Court Strengthens Whistle Blower Protection</title>
    <link>https://cis-india.org/internet-governance/blog/calcutta-hc-strengthens-whistle-blower-protection</link>
    <description>
        &lt;b&gt;Calcutta High Court has ordered for protection of whistle blower's privacy in its November 20, 2013 order. The court has directed the government to accept RTI applications without the applicant's personal details.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the absence of any law for the protection of whistle-blowers in the country, exposing the rampant corruption in our public institutions has become a hazardous occupation, with reports of threat and intimidation and even incidents of murder of whistle-blowers commonplace.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; With the Whistle blower’s Protection Bill in abeyance and without any strict laws protecting the identities of the whistle-blowers who challenge such a corrupt system, even the mechanisms like the Right to Information Act which are meant to safeguard against systemic abuse and ensure transparency are being severely undermined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For this reason, the Calcutta High Court’s affirmation of whistle-blowers’ privacy and identity protection is an important development. Through its order on the 20th of November, 2013, the Calcutta High Court held that for the purposes of section 6(2), which requires an application to the Public Information Officer to provide contact details of the applicant, it is sufficient in such application to disclose only the post-box number of the applicant. The court directed the Government to accept RTI applications without personal details or detailed whereabouts, when a post-box number or sufficient detail has been provided to establish contact between the whistle-blower and the authority. However if a public authority has any difficulty contacting the applicant through the Post Box No. the applicant may be asked to provide other contact details. The court further directed that personal details of applicants are not to be posted on the authorities’ websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The order, which was notified by the Government last week, ensures to some extent the protection of a whistle-blowers identity, and reduces the chances of the RTI being undermined by threats or acts of violence by those who are a part of the corrupt system, against persons exercising their right to information. However, its implementation is liable to be contingent on the authorities’ interpretation of when it would be “difficult” to establish contact between the authority and the applicant. Certain practical difficulties could also undermine the actual impact of the order, such as the fact that many applications are sent through registered or speed post, which cannot be mailed to a post-box number, especially since ordinary post cannot be tracked online like speed or registered post.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Developing a system in which ordinary citizens do not have to fear retaliation for exposing corruption requires a comprehensive legislation protecting whistle-blowers identities and ensuring data security. However, the important message this judgement sends out is that the judiciary is still committed to protecting whistle-blowers, in lieu of the government’s actions. This is a particularly important stance taken by the Court, considering the Supreme Court in the past has refused to frame guidelines for whistle-blower protection, citing the imperative in enacting a whistle-blower legislation to be the Parliament’s.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A full text of the judgement is &lt;a class="external-link" href="http://sartian.org/media/k2/attachments/DOPT_CIR_8_JAN.pdf"&gt;available here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].Whistleblower shot dead in Bihar, THE HINDU, available at http://www.thehindu.com/news/national/whistleblower-shot-dead-in-bihar/article4542293.ece; Tamil Nadu Whistleblower alleges death threats; Silence from Government, NDTV, available at http://www.ndtv.com/article/india/tamil-nadu-whistleblower-alleges-death-threats-silence-from-govt-410450.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Indian Postal Tracking Portal, &lt;a class="external-link" href="http://www.indiapost.gov.in/tracking.aspx"&gt;http://www.indiapost.gov.in/tracking.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Supreme Court refuses to frame guidelines for protection of whistleblowers, Daily News and Analysis, &lt;i&gt;available at &lt;/i&gt;http://www.dnaindia.com/india/report-supreme-court-refuses-to-frame-guideline-for-protection-of-whistleblowers-1525622.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/calcutta-hc-strengthens-whistle-blower-protection'&gt;https://cis-india.org/internet-governance/blog/calcutta-hc-strengthens-whistle-blower-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-24T06:38:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
