<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2076 to 2090.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/policies/website-use"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/policies/privacy-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/policies/non-discrimination-equal-opportunities-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/policies/ethical-research-guidelines"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/june-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-maitreyee-boruah-june-29-2013-internet-users-enraged-over-us-online-spying"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-anirban-sen-june-29-2013-issue-of-duplication-of-identities-of-users-under-control"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin">
    <title>CIS Cybersecurity Series (Part 3) - Eva Galperin</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin</link>
    <description>
        &lt;b&gt;CIS interviews Eva Galperin, Global Policy Analyst at the Electronic Frontier Foundation (EFF).&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;"It is a vital tool for speaking truth to power. Unless you are able to speak anonymously, you are not really free to espouse unpopular ideas to people who have the power to do bad things to do... I think the value of anonymous speech vastly outweighs the difficulties that you can sometimes get into because people can speak anonymously. And on the whole, I think anonymity is worth protecting." - Eva Galperin, Global Policy Analyst at EFF. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its third installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS speaks to Eva Galperin, the Global Policy Analyst at the Electronic Frontier Foundation (EFF).She has worked for the EFF in various capacities for the last five years, applying the combination of her political science and technical background to organizing activism campaigns, and doing education and outreach on intellectual property, privacy, and security issues.&lt;/p&gt;
&lt;p&gt;EFF homepage: &lt;a href="https://www.eff.org/"&gt;https://www.eff.org/&lt;/a&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/BLtiuVX0nEM" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-08-01T09:55:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance">
    <title>The Difficult Balance of Transparent Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance</link>
    <description>
        &lt;b&gt;Is it too much to ask for transparency in data surveillance? On occasion, companies like Microsoft, Facebook, and the other silicon valley giants would say no. When customers join these services, each company provides their own privacy statement which assures customers of the safety and transparency that accompanies their personal data.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Google even publishes annual “Transparency Reports” which detail the data movement behind the scenes. Governments, too, are somewhat open about surveillance methods, for example with the public knowledge of the existence and role of institutions like America’s NSA and India’s CMS. These façades of assurance, however, never satisfy the public enough to protect them from feeling cheated and deceived when information leaks about surveillance practices. And in the face of controversy around surveillance, both service providers and governments scramble to provide explanations for discrepancies between their promises and their practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So it seems that transparency might not be too much to ask, but instead is perhaps more complicated of a request than imagined. For some citizens, nothing would be more satisfying than complete transparency on all data collection. For those who recognize surveillance as crucial for national security, however, complete transparency would mean undermining the very efficacy of surveillance practices. And data companies often find themselves caught between these two ends, simultaneously seeking profits by catering to the public, while also trying to abide by political and legal frameworks. Therefore, in the process of modern data surveillance, each attempt at resolution of the transparency issue will become a delicate balance between three actors: the government, the big data companies, and the people. As rightly stated on the Digital Due Process website, rules for surveillance must carefully consider “the individual’s constitutional right to privacy, the government’s need for tools to conduct investigations, and the interest of service providers in clarity and customer trust.”&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So we must unpack the idea of transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, there should be a distinction made between proactive transparency and reactive transparency, or, the announcement of surveillance practices versus the later access to surveillance records. The former is more risky and therefore more difficult to entertain, while the latter may lack any real substance beyond satisfying inquiries. Also consider the discrepancy in motivation for transparency between the actors. For the citizen, is transparency really an end goal, or is it only a stepping stone in the argument for eradication of surveillance practices in the name of rights to privacy? Here, we ascertain the true value of total transparency; will it ever please citizens to learn of a government’s most recent undermining of the private sphere?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reactive transparency has been achieved only in recent years in India, during a number of well publicized legal cases. In one of the earliest cases of reactive transparency, Reliance Communications made an affidavit in the Supreme Court over the exact number of surveillance directives given by the government. It was released that 151,000 Reliance accounts were monitored for a project between 2006 and 2010, with 3,588 tapped phones just from the Delhi region alone in 2005.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But also there has been controversy over the extent of reactive transparency, because it has been especially problematic to discern the point where transparency once again encroaches on privacy, both for government and the people’s sake. After gathering the data, its release could further jeopardize the citizens and the government. It is important to carefully consider the productive extent of reactive transparency: What will become of the information? Will one publicly reveal how many people were spied on? Who was spied on? What was found when through spying? Citizens must take all of this into consideration when requesting transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, service providers embrace transparency when it can benefit their corporation, or as a recent Facebook statement explained, “we’ve been in discussions with U.S. national security authorities urging them to allow more transparency, &lt;i&gt;so that our users around the world can understand how infrequently we are asked to provide user data on national security grounds&lt;/i&gt;.” &lt;a href="#fna" name="fra"&gt;[a]&lt;/a&gt; Many of the service providers mentioned in the recently leaked PRISM report have made well-publicized requests to the U.S. government for more transparency.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not only have they allegedly written requests to the government to allow them to disclose information, but the companies (including Facebook &lt;a href="#fna" name="fra"&gt;[a]&lt;/a&gt;, Apple &lt;a href="#fnb" name="frb"&gt;[b]&lt;/a&gt;, Microsoft&lt;a href="#fnc" name="frc"&gt;[c]&lt;/a&gt;, and Google &lt;a href="#fnd" name="frd"&gt;[d]&lt;/a&gt;) have all released explanatory statements in the wake of the June 2013 PRISM scandal. Although service providers claim that the request to release data about their cooperation is in the ‘interest of transparency,’ it instead seems that the motivation for this transparency is to ease consumers’ concerns and help the companies save face. The companies (and the government) will admit their participation in surveillance once it has become impossible to deny their association with the programs. This shrewd aspect of transparency can be seen most clearly in statements like those from Microsoft, who included in their statement on June 14&lt;sup&gt;th&lt;/sup&gt;, “We have not received any national security orders &lt;i&gt;of the type that Verizon was reported to have received&lt;/i&gt;.” &lt;a href="#fnc" name="frc"&gt;[c]&lt;/a&gt; Spontaneous allusions like this are meant to contrast guilt-conscious service providers favorably to telecom service providers such as AT&amp;amp;T and Verizon, who allegedly yielded the most communications data and who as of now have yet to release defensive public statements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, we find ourselves in a situation where entities admit to their collusion in snooping only once information has leaked, indignation has ignited, and scandal has erupted. A half-hearted proactive transparency leads to an outrage demanding reactive semi-transparency. These weak forms of transparency neither satisfy the public, nor allow governments and service providers to maintain dignity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But now is also a crucial moment for possible reevaluation and reformation of this system, especially in India. Not only is India enacting its own national security surveillance system, the CMS&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; but the recent NSA and PRISM revelations are still sending shockwaves throughout the world of cyber security and surveillance. Last week, a Public Interest Litigation (PIL) was sent to the Indian Supreme Court, arguing that nine foreign service providers (Facebook, Hotmail, Yahoo!, Google, Apple, Skype, Paltalk, AOL, YouTube) violated the trust and privacy of their Indian customers through their collusion with the US government’s surveillance programs.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among other things, the PIL emphatically sought prosecution of the mentioned corporations, demands for the service providers to establish servers in India, and also sought stricter rules to prevent Indian officials from using these foreign services for work involving national security. Ultimately, the PIL was rejected by the Supreme Court; although the PIL stated the grounds of Rule 6 of the Information Technology Rules 2011 for the guidelines in protecting sensitive Indian citizen information, the SC saw the PIL as addressing problems outside of SC jurisdiction, and was quoted as saying “we cannot entertain the &lt;a href="https://cis-india.org/internet-governance/blog/pil.pdf" class="internal-link"&gt;petition&lt;/a&gt; as an Indian agency is not involved.”&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The SC considered the PIL only partially, however, as certain significant parts of the petition were indeed within Indian domestic agency, for example the urge to prohibit federal officials from using the private email services such as Gmail, Hotmail, and Yahoo. And although the SC is not the correct place to push for new safeguard legislation, the ideas of the PIL are not invalid, as Indian leaders have long searched for ways of ensuring basic Indian privacy laws in the context of international service providers. This is also not a problem distinctive to India. International service providers have entered into agreements regarding the same problems of incorporating international customers’ rights, formal agreements which India could emulate if it wanted to demand greater privacy or transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, there is the Safe Harbor Framework, an institution in place to protect and mediate European Union citizens’ privacy rights within the servers of foreign (i.e. American) Internet companies. These regulations were established in 2000, and serve the purpose of adjusting foreign companies’ standards to incorporate E.U. privacy laws. In accordance with the agreement, E.U. data is only allowed to be sent to outside providers who maintain the seven Safe Harbor principles, several of which focus on transparency of data usage.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;India could enact a system similar to this, and it would likely alleviate some of the concerns raised in the most recent PIL. These frameworks, however, have not proven completely reliable safeguards either, especially when the service providers’ own government uses national security as a means to override the agreement. Although the U.S. government has yet to fully confirm or deny many of the NSA and PRISM allegations in regards to Europe, there is currently strong room to believe that the surveillance practices may have violated the Safe Harbor agreements by delivering sensitive E.U. citizen data to the U.S. government.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; It is uncertain how these revelations will impact the agreements made between the big Silicon-Valley companies and their E.U. customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recent PIL also strongly suggested establishing domestic data servers to keep Indian citizens’ information within the country and under the direct supervision of Indian entities. It strongly pushes for self-reliance as the best way to ensure both citizen and national security. The PIL assumes that domestic servers will not only offer better information protection, but also create much needed jobs and raise national tax revenue.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; If allegations about PRISM and the E.U. prove true, then the E.U. may also decide to support establishment of European servers as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several of the ideas outlined in the PIL have merit, but may not be as productive as the requesters assume. It is true that establishing servers and domestic regulators in India may temporarily protect from unwanted foreign, i.e. American, surveillance. But at the same time, this also increases likelihood of India’s own central government taking a stronger surveillance stance, more stringently monitoring their own servers and databases. It has not yet been described how the CMS will be operate its surveillance methods, but moving data to domestic servers may just result in shifting power from NSA to CMS. Rather than more privacy or transparency, the situation could easily become a matter of &lt;i&gt;who&lt;/i&gt; citizens prefer spying over them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if one government establishes rules which enforce transparency, this may clash with the laws of the service providers’ domestic government, i.e. confidentiality in surveillance. Considering all of this, rejection of foreign service providers and promotion of domestic self reliance may ultimately prove the most effective alternative for nations which are growing rapidly in both internet presence and internet consciousness. But that does not make this option the easiest. Facing the revelations and disillusionment of domestic (CMS) and international (PRISM) surveillance methods, countries like India are reaching an impeding critical juncture. Now is the most important time to establish new norms, while public sentiment is at its highest and transition is most possible, not only creating new laws which can safeguard privacy, but also strongly considering alternatives to foreign service providers like those outlined in June’s PIL. Privacy International’s guiding principles of communications surveillance also offer useful advice, urging for the establishment of oversight institutions which can access surveillance records and periodically publish aggregate data on surveillance methods.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Although the balance between security on the national level and security on the personal level will continue to be problematic for nations in the upcoming years, and even though service providers’ positions on surveillance usually seem contrived, Microsoft Vice President John Frank made a statement which deserves appreciation, rightly saying, “Transparency alone may not be enough to restore public confidence, but it’s a great place to start.”&lt;a href="#fnc" name="frc"&gt;[c]&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a href="http://digitaldueprocess.org/"&gt;http://digitaldueprocess.org/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/151Ue1H"&gt;http://bit.ly/151Ue1H&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/12XDb1Z"&gt;http://bit.ly/12XDb1Z&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;a class="external-link" href="http://ti.me/11Xh08V"&gt;http://ti.me/11Xh08V&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;a href="https://cis-india.org/internet-governance/blog/pil.pdf" class="internal-link"&gt;Copy of 2013 PIL to Supreme Court, Prof. S.N. Singh&lt;/a&gt; [attached]&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/1aXWdbU"&gt;http://bit.ly/1aXWdbU&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;a class="external-link" href="http://1.usa.gov/qafcXe"&gt;http://1.usa.gov/qafcXe&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/114hcCX"&gt;http://bit.ly/114hcCX&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/156wspI"&gt;http://bit.ly/156wspI&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fra" name="fna"&gt;a&lt;/a&gt;]. &lt;b&gt;Facebook Statement&lt;/b&gt;: &lt;a class="external-link" href="http://bit.ly/ZQDcn6"&gt;http://bit.ly/ZQDcn6&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#frb" name="fnb"&gt;b&lt;/a&gt;]. &lt;b&gt;Apple Statement&lt;/b&gt;: &lt;a class="external-link" href="http://bit.ly/1akaBuN"&gt;http://bit.ly/1akaBuN&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#frc" name="fnc"&gt;c&lt;/a&gt;]. &lt;b&gt;Microsoft Statement&lt;/b&gt;:&lt;a class="external-link" href="http://bit.ly/1bFIt31"&gt;http://bit.ly/1bFIt31&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#frd" name="fnd"&gt;d&lt;/a&gt;]. &lt;b&gt;Google Statement&lt;/b&gt;: &lt;a class="external-link" href="http://bit.ly/16QlaqB"&gt;http://bit.ly/16QlaqB&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance'&gt;https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>kovey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T04:23:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography">
    <title>dna exclusive: Geeks have a solution to digital surveillance in India: Cryptography</title>
    <link>https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography</link>
    <description>
        &lt;b&gt;While you were thinking of what next to post on Twitter, the government has stealthily put an ambitious surveillance programme in place that tracks your every move in the digital world — through voice calls, SMS and MMS, GPRS, fax communications on landlines, video calls and emails.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Joanna Lobo was &lt;a class="external-link" href="http://www.dnaindia.com/scitech/1857945/report-dna-exclusive-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography"&gt;published in DNA&lt;/a&gt; on July 7, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The programme, conceived in 2011, has now been brought under one umbrella referred to as the centralised monitoring system (CMS). It is the death of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But as concerned citizens argue for the need to formulate policies and laws to protect privacy, there's a simpler solution in sight for now: a CryptoParty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At this 'party', an informal gathering of people, non-geeks can learn how to legally encrypt their digital communications and how to store data without the fear of anyone snooping in. Encryption is a process of encoding messages so that it can only be read by authorised parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is it?&lt;/b&gt;&lt;br /&gt; "A CryptoParty educates people in the domain of cryptography. It's  usually about the basics: how to send encrypted email, how to protect  your hardware and how to use free and open source software," says  Satyakam Goswami, a free software consultant associated with the  Software Freedom Law Centre (SFLC), Delhi (remove this). Goswami was one  of the 72 participants at the CryptoParty organised on Saturday at  Institute of Informatics &amp;amp; Communication (IIC), Delhi University  South Campus  	On June 30, a CryptoParty organised at the Centre for Internet and  Society (CIS) in Bangalore had 30 people in attendance. "We were taught  about the what, how and who is watching us. We were also taught how to  encrypt emails, chat, video calls or instant messaging,” says Siddhart  Prakash Rao, a computer science graduate and a free software and open  source enthusiast who is about to pursue a Masters in Cryptography.&lt;br /&gt; &lt;br /&gt; The topics may be a mouthful for non-geeks but CryptoParty advocates  maintain that all this is taught in the simplest way possible. The  choice of subject depends on the composition of the group — if it is a  gathering of geeks, like at the Bangalore event, then the topics are  more technical.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How can it help?&lt;/b&gt;&lt;br /&gt; CryptoParties started in August 2012 by an Australian woman (who goes  by the pseudonym Asher Wolf) after a conversation on Twitter about The  Australian Parliament's new cybercrime bill that allowed law enforcement  to ask Internet Service Providers to monitor and store data. &lt;br /&gt; Attending a CryptoParty is a good way to learn how to overcome government snooping legally.&lt;br /&gt; &lt;br /&gt; “Citizens should use encryption to safeguard their private  communications against both corporations and the government. Encryption  is one of the best ways to react to CMS along with increased civic  vigilance and democratic questioning of our government and  parliamentarians,” says Pranesh Prakash, policy director, CIS, and one  of the frontrunners in the fight to formulate a policy to safeguard  privacy in India.&lt;br /&gt; &lt;br /&gt; "In India, people tend to be rather ignorant. They are not aware of the  kind of surveillance they are subjected to once online. It's a lack of  understanding," says Sumandro Chattapadhyay, a researcher with Sarai, a  programme of the Centre for the Study of Developing Societies, Delhi.&lt;br /&gt; &lt;br /&gt; Bernadette Langle, who also works at CIS has been instrumental in  organising the handful of CryptoParties in the country. When dna spoke  to her, she was on her way to Delhi after participating in the Bangalore  event. Langle will also be part of a CryptoParty being planned for  October in Mumbai. "Ten years ago, you had to be a geek to be able to  encrypt and protect yourself online. Now, you need software and it's  much easier," she says.&lt;br /&gt; &lt;br /&gt; The advantage is that the privacy tactics taught at such parties is  completely legal. All knowledge is in the public domain. “A government  will only deny its citizens basic communications privacy if it is  authoritarian,” says Pranesh. “So while it can try social engineering  and other means to gain access to what you've encrypted, it simply  cannot 'decode' it as long as you have chosen a strong pass phrase and  keep that protected, or they create quantum computers capable of  breaking your encryption.”&lt;br /&gt; &lt;br /&gt; The CIS is currently working on revisions of the Privacy (Protection)  Bill 2013 with the objective of contributing to privacy legislation in  India. Till that bill becomes an Act and till there's a better way to  overcome needless government surveillance, attending a CryptoParty could  possibly be the wisest solution for those concerned about privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(For more details on CryptoParties, visit www.cryptoparty.in)&lt;br /&gt; &lt;br /&gt; &lt;b&gt;How to encrypt:&lt;/b&gt;&lt;br /&gt; SMS: Make content secure by using software like TextSecure (Android) or  CryptoSMS (Symbian). However, SMS metadata (who you are sending the  message to and at what time) can still be tracked.&lt;br /&gt; &lt;br /&gt; Instead of Whatsapp, install Jabbir and add off the record encryption.&lt;br /&gt; &lt;br /&gt; For email, you can use OpenPGP in conjunction with Thunderbird to  encrypt mails you send from Gmail/Yahoo Mail/Live Mail accounts so that  even Google, Yahoo and Microsoft can't read them&lt;br /&gt; &lt;br /&gt; For web browsing, use a VPN (which will hide your traffic from your  ISP), or Tor (which will help anonymise your traffic, but will slow down  your connection slower).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography'&gt;https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T06:24:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis">
    <title>Biometrics or bust? India's Identity Crisis</title>
    <link>https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis</link>
    <description>
        &lt;b&gt;Malavika Jayaram is speaking at an event organized by the Oxford Internet Institute on July 2, 2013. The talk will be held at Oxford Internet Institute, University of Oxford, 1 St Giles Oxford OX1 3JS.&lt;/b&gt;
        &lt;hr /&gt;
&lt;div class="story" style="text-align: justify; "&gt;
&lt;p&gt;This info was &lt;a class="external-link" href="http://www.oii.ox.ac.uk/events/?id=602"&gt;published on the Oxford Internet Institute website&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;India's mammoth biometric ID project, which has  registered around 270 million people and is yet to be fully realized, is  already the worldís largest such endeavor. It is marketed as a  potential game-changer both domestically (where it is touted as a silver  bullet to solve most problems) and internationally (where countries  wait and watch this experiment before importing it into their own  jurisdictions). Alongside all the hype about the scale of the scheme,  its potential for transforming the delivery of services and the scope  for private participation in traditionally state-controlled functions,  there are fears of function creep, of subversion to create new types of  fraud and corruption, of increased profiling and targeting, and of a  citizenry becoming transparent to its government in an unprecedented  way, all in the name of ambiguous benefits and the rhetoric of  inclusion.&lt;/p&gt;
&lt;p&gt;The government praises the ease and efficiency of  centralized databases, the promise of technology (including the myth of  biometrics uniquely and unambiguously identifying people in a foolproof  way) and the construction of the identified self. However, there is  growing awareness of the dangers of joined-up databases resulting in  exclusion rather than inclusion, and persecution rather than  democratization.&lt;/p&gt;
&lt;p&gt;The scheme is technically voluntary, but with the  provision of benefits, goods and services being increasingly linked to  the scheme, it will soon become impossible to function in India without a  biometric ID. If every facet of everyday life is linked to this single  number, it renders all claims of voluntariness meaningless. The lack of  information self-determination in a biometrically mediated universe has  important ramifications for anonymity, free speech and the maintenance  of an essential private sphere.&lt;/p&gt;
&lt;p&gt;In this talk, Malavika will  provide an overview of the scheme as well as the debate around privacy  and autonomy that it has triggered, framed against the backdrop of a  larger civil liberties crisis. She will also describe Indiaís efforts to  craft new privacy and data protection legislation.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis'&gt;https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T09:49:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop">
    <title>Concerns over central snoop</title>
    <link>https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop</link>
    <description>
        &lt;b&gt;Eyebrows have been raised at the Centre’s single-window system to intercept phone calls and internet exchanges — the desi version of the US’s surveillance programme, PRISM — that is expected to roll out this year-end.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Aloke Tikku was &lt;a class="external-link" href="http://www.hindustantimes.com/India-news/NewDelhi/Concerns-over-central-snoop/Article1-1083658.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on June 28, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;span class="WebRupee"&gt; Rs. &lt;/span&gt;400-crore project — tentatively  called the Central Monitoring System (CMS) — will not only allow the  government to listen to a target’s phone conversation but also track  down a caller’s precise location, match his voice against known  suspects’ before the call is completed and see what people have been up  to on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And then, it can also use analytics to discover possible links — between  suspected terrorists, criminals or just about anybody — from the  internet and phone data. All this will be done from one place without  keeping the internet or phone service provider in the loop — something  the telecom and home ministries insist will enhance citizens’ privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both ministries also insist that the CMS won’t change the rules of the  game. “The process to seek authorisation for interception will not be  diluted,” a home ministry official promised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So is everything hunky dory?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hardly. But technology — in this case, the CMS — is a smaller part of the problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bigger chunk is the process of approving “lawful interception” orders and the lack of transparency around it.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;It was in December 1996 that the Supreme Court held that the State could  spy on its citizens in extraordinary circumstances but, as an interim  measure, made it mandatory for the home secretary to approve each and  every such request.&lt;/p&gt;
&lt;p&gt;Telecom minister Kapil Sibal, who appeared in this case in the  mid-1990s, convinced the court that it didn’t have the powers to order  that a judge decide each phone-tapping case. Instead, Sibal suggested  that this power remain with the executive on lines of the law in the UK.&lt;/p&gt;
&lt;p&gt;A former home secretary, however, conceded that they hardly have the time to apply their mind before signing a wiretap order.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Interest.png/@@images/9beb69be-db6c-45d6-9f70-4888deef3295.png" alt="Interest of State" class="image-inline" title="Interest of State" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;That isn’t surprising. The home secretary approves around 7,500-9,000  interception orders every month. That means he or she has to sign an  average of 300 orders every day without a break.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If he were to spend just 30 seconds on each case, he would have to  keep aside four-and-a-half hours just approving interception orders  every day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An official said the ministry was considering a suggestion to pick up  a fixed number of cases at random for closer scrutiny before approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many believe this might not be enough. It is argued that the  government — which was trying to replicate surveillance technology from  the west — needs to adopt their safeguards and transparency norms too.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of the Bangalore-based Centre for  Internet and Society, said he didn’t have a problem with CMS as long as  it didn’t go for blanket surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“But there is no reason why the executive — and not a judge — should  have the powers to decide on phone-tapping requests,” he said. Or for  that matter, why shouldn’t there be an independent audit of  phone-tapping decisions, their implementation and outcome?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The aggregated data should be put in the public domain,” Abraham  said. The US has such provisions. So does Britain, which inspired Sibal  to argue for retaining interception powers with the executive in the  mid-1990s. It is time to follow-up on that model.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop'&gt;https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T09:33:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring">
    <title>Technology, Power, and Revolutions in the Arab Spring</title>
    <link>https://cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS), Bangalore cordially invites you to a talk by Prof. Ramesh Srinivasan on technology, power and revolutions in the Arab Spring. The talk will be held in CIS office on July 2, 2013 from 6.00 p.m. onwards.&lt;/b&gt;
        &lt;h2&gt;Ramesh Srinivasan&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Ramesh  Srinivasan, Associate Professor at UCLA in Design and  Media/Information  Studies, studies and participates in projects focused  on how new media  technologies impact political revolutions, economic  development and  poverty reduction, and the future of cultural heritage.  He recently  wrote &lt;a href="http://www.washingtonpost.com/national/on-innovations/london-egypt-and-the-complex-role-of-social-media/2011/08/11/gIQAIoud8I_story.html"&gt;an op/ed at the Washington Post&lt;/a&gt; explaining the complex nature of social media in revolutions and riots,   such as those in Egypt and in London, and also a column for the Post’s   Sunday Outlook section on the &lt;a href="http://www.washingtonpost.com/national/on-innovations/five-myths-about-social-media/2011/09/15/gIQAr2BwAL_allComments.html#comments"&gt;5 Myths of Social Media&lt;/a&gt;.  Additionally, he has written multiple front page articles for the Huffington Post, including a &lt;a href="http://www.huffingtonpost.com/ramesh-srinivasan/the-net-worth-of-open-net_b_823570.html"&gt;piece&lt;/a&gt; on Internet Freedom for the Huffington Post. He has had his work  featured on the front page of the UCLA and USC websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recent public  outreach has built on his response in the New Yorker  (from his blog: &lt;a href="http://rameshsrinivasan.org/"&gt;http://rameshsrinivasan.org&lt;/a&gt;)   to Malcolm Gladwell’s writings critiquing the power of social media in   impacting revolutionary movements. He has worked with bloggers,   pragmatically studying their strengths and limitations, who were   involved in recent revolutions in Egypt and Kyrgyzstan, as discussed in a   recent &lt;a href="http://www.npr.org/2011/08/12/139570720/twitter-created-echo-chamber-during-egyptian-protests"&gt;NPR interview&lt;/a&gt;.   He has also collaborated with non-literate tribal populations in India   to study how literacy emerges through uses of technology, and   traditional Native American communities to study how non-Western   understandings of the world can introduce new ways of looking at the   future of the internet. His work has impacted contemporary   understandings of media studies, anthropology and sociology, design, and   economic and political development studies. He has given several major   invited talks, including recently at LIFT in 2009 (&lt;a href="http://vimeo.com/5520100"&gt;http://vimeo.com/5520100&lt;/a&gt;).   He holds an engineering degree from Stanford, a Masters degree from  the  MIT Media Lab, and a Doctorate from Harvard University. His full   academic CV can be found at &lt;a href="http://rameshsrinivasan.org/cv"&gt;http://rameshsrinivasan.org/cv&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;a class="external-link" href="http://rameshsrinivasan.org/"&gt;See Prof. Ramesh Srinivasan's blog page&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring'&gt;https://cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-01T08:36:57Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/policies/website-use">
    <title>Terms of Website Use</title>
    <link>https://cis-india.org/about/policies/website-use</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h2&gt;Parties and Ownership&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;These Terms of Website Use (&lt;b&gt;"Terms"&lt;/b&gt;) is made between the Centre for Internet &amp;amp; Society (&lt;b&gt;"CIS"&lt;/b&gt;) and you.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In these Terms, all references to "&lt;b&gt;you&lt;/b&gt;" or "&lt;b&gt;user&lt;/b&gt;" shall mean the end-user accessing the Website, its contents and using the services offered through the Website. "&lt;b&gt;Service providers&lt;/b&gt;" mean independent third party service providers. All references to "&lt;b&gt;we&lt;/b&gt;", "&lt;b&gt;us&lt;/b&gt;" and "&lt;b&gt;our&lt;/b&gt;" shall mean CIS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The domain name www.cis-india.org ("&lt;b&gt;Website&lt;/b&gt;") is owned by CIS. CIS offers this web site, including all information, tools and services available from this site, to you, the user, conditioned upon your acceptance of all the terms, conditions, policies and notices stated here. Your use of this site indicates that you have read, acknowledged and agreed to these Terms.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Due Diligence&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;These Terms are published in compliance with Rule 3(1) of the Information Technology (Intermediaries Guidelines) Rules, 2011 notified by the Central Government in the Gazette of India Extraordinary vide Notification GSR 314(E) on 11 April 2011 ("&lt;b&gt;Intermediaries Rules&lt;/b&gt;"). These Terms constitute an electronic record for the purposes of the Information Technology Act, 2000 ("&lt;b&gt;IT Act&lt;/b&gt;").&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;You agree that you will &lt;span style="text-decoration: underline;"&gt;not&lt;/span&gt; host, display, upload, modify, publish, transmit, update or share any information that:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;belongs to another person and to which you do not have any right to;&lt;/li&gt;
&lt;li&gt;is grossly harmful, harassing, blasphemous defamatory, obscene, pornographic, paedophilic, libellous, invasive of another's privacy, hateful, racially or ethnically objectionable, disparaging, relating or encouraging money laundering or gambling, or otherwise unlawful in any manner whatever;&lt;/li&gt;
&lt;li&gt;harms minors in any way;&lt;/li&gt;
&lt;li&gt;infringes any patent, trademark, copyright or other proprietary rights;&lt;/li&gt;
&lt;li&gt;violates any law for the time being in force;&lt;/li&gt;
&lt;li&gt;deceives or misleads the addressee about the origin of such messages or communicates any information which is grossly offensive or menacing in nature;&lt;/li&gt;
&lt;li&gt;impersonates another person;&lt;/li&gt;
&lt;li&gt;contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer resource; or,&lt;/li&gt;
&lt;li&gt;threatens the unity, integrity, defence, security or sovereignty of India, friendly relations with foreign states, or public order or causes incitement to the commission of any cognisable offence or prevents investigation of any offence or is insulting to any other nation.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;You agree that in the event of any non-compliance with these Terms, we have the right to immediately terminate your access or usage rights to this Website and our services and/or remove any information that is, or is deemed by us to be, non-compliant.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Use of this Website&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Unauthorised use of this Website, any information contained therein and unauthorised entry into our systems is strictly prohibited. You may not use contact information provided on this Website for unauthorized purposes, including marketing. You may not use any hardware or software intended to damage or interfere with the proper working of this Website or to surreptitiously intercept any system, data or personal information from this Website. You agree not to interrupt or attempt to interrupt the operation of this Website in any way.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We reserve the right, in our sole discretion, to limit or terminate your access to or use of this Website at any time without notice. Termination of your access or use will not waive or affect any other right or relief to which we may be entitled at law or in equity.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;You represent and warrant that you own or otherwise control all the rights to the content you supply; that the content is accurate; that use of the content you supply does not violate any provision herein and will not cause injury to any person or entity; and that you will indemnify us for all claims resulting from content you supply.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;You shall comply, and cause compliance, with all applicable provisions of any law, statute, ordinance, order, rule, regulation, bye-law, notification, custom, circular, press note, policy or other usage or mandatory requirement having, in the territory of India, the force of law.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Information on this Website&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;We are not responsible if information made available on this Website is not accurate, complete or current. The material on this Website is provided for general information only and should not be relied upon or used as the sole basis for making decisions without consulting primary, more accurate, more complete or timelier sources of information. Any reliance on the material on this Website is at your own risk. This Website may contain information that has typographical errors or inaccuracies. This Website may contain certain historical information. Historical information is provided for your reference only. We reserve the right to modify the contents of this Website at any time, but we have no obligation to update any information on this Website. You agree that it is your responsibility to monitor changes to this Website. Your use of this Website constitutes agreement to all such changes. We may discontinue or change any product or service described or offered on this Website at any time.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Trademarks, Copyright and Other Proprietary Rights&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;You or third parties acting on your behalf are not allowed to frame this site or use our proprietary marks as meta tags, without our written consent. These marks include, but are not limited to:&lt;br /&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_logo.jpg/@@images/6aeb5910-e761-415d-9df0-efe1d60a3c94.jpeg" alt="CIS Logo" class="image-inline" title="CIS Logo" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
You may not use frames or utilize framing techniques or technology to enclose any content included on the site without our express written consent. Further, you may not utilize any site content in any meta tags or any other "hidden text" techniques or technologies without our express written consent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Trademarks, logos and service marks displayed on this site are registered and unregistered trademarks of ours and our partners, sponsors, content providers, or other third parties. All of these trademarks, logos and service marks are the property of their respective owners. Nothing on this site shall be construed as granting, by implication, estoppel, or otherwise, any license or right to use any trademark, logo or service mark displayed on the site without the owner's prior written permission, except as otherwise described herein. We reserve all rights not expressly granted in and to the site and its content.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Disclaimer of Warranties&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Your use of this Website is at your sole risk. This Website is provided on an "as is" basis. We reserve the right to restrict or terminate your access to this Website or any feature or part thereof at any time. We expressly disclaim all warranties of any kind, whether express or implied, including but not limited to the implied warranties of merchantability and fitness for a particular purpose and any warranties that materials on this Website are non-infringing, as well as warranties implied from a course of performance or course of dealing; that access to this Website will be uninterrupted or error-free; that this Website will be secure; that the site or the server that makes this Website available will be virus-free; or that information on this Website will be complete, accurate or timely. If you download any materials from this Website, you do so at your own discretion and risk. You will be solely responsible for any damage to your computer system or loss of data that results from the download of any such materials. No advice or information, whether oral or written, obtained by you from us shall create any warranty of any kind. We do not make any warranties or representations regarding the use of the materials on this Website in terms of their completeness, correctness, accuracy, adequacy, usefulness, timeliness, reliability or otherwise.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Limitation of Liability&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;You acknowledge and agree that you assume full responsibility for your use of this Website. You acknowledge and agree that any information you send or receive during your use of this Website may not be secure and may be intercepted by unauthorized parties. You acknowledge and agree that your use of this Website is at your own risk. Recognizing such, you acknowledge and agree that, to the fullest extent permitted by applicable law, neither we, our partners, sponsors or content providers will be liable for any direct, indirect, punitive, exemplary, incidental, special, consequential or other damages arising out of or in any way related to this Website, or any other site you access through a link from this Website or from any actions we take or fail to take as a result of communications you send to us, or the delay or inability to use this Website, or for any information, products or services advertised in or obtained through this Website, removal or deletion of any materials submitted or posted on this Website, or otherwise arising out of the use of this Website, whether based on contract, tort, strict liability or otherwise, even if we, our affiliates or any of our suppliers have been advised of the possibility of damages.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This disclaimer applies, without limitation, to any damages or injury arising from any failure of performance, error, omission, interruption, deletion, defects, delay in operation or transmission, computer viruses, file corruption, communication-line failure, network or system outage, your loss of profits, or theft, destruction, unauthorized access to, alteration of, loss or use of any record or data, and any other tangible or intangible loss. You specifically acknowledge and agree that neither we nor our suppliers shall be liable for any defamatory, offensive or illegal conduct of any user of this Website. Your sole and exclusive remedy for any of the above claims or any dispute with us is to discontinue your use of this Website. Subject to the terms of the Limitation Act, 1963, you agree that any cause of action arising out of or related to the site must commence within one (1) year after the cause of action accrues otherwise the cause of action is permanently barred.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Indemnification&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;You agree to indemnify us, defend us and hold us harmless, including our affiliates and our officers, members, directors, employees, consultants, contractors, agents, licensors, service providers, subcontractors and suppliers from and against any and all losses, liabilities, expenses, damages and costs, including reasonable attorneys' fees and court costs, arising or resulting from your use of this Website and any violation of these Terms. If you cause a technical disruption to this Website or the systems transmitting this Website to you or others, you agree to be responsible for any and all losses, liabilities, expenses, damages and costs, including reasonable attorneys' fees and court costs, arising or resulting from that disruption. We reserve the right to assume exclusive defence and control of any matter otherwise subject to indemnification by you and, in such an event, you agree to cooperate with us in the defence of such matter.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Governing Law, Jurisdiction and Definitive Agreement&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;This Website is controlled, operated and administered within India. We do not make any representation that materials on this Website are appropriate or available for use at other locations outside India and access to them from territories where their contents are illegal is prohibited. You may not use this Website in violation of Indian laws. If you access this Website from locations outside India, you are responsible for compliance with all local laws. These Terms shall be governed by the laws of India, without giving effect to its conflict of laws provisions. You agree that the courts at Bangalore shall have exclusive jurisdiction to settle any dispute or claim that arises out of or in connection with your use of this Website and these Terms.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;These Terms constitute the entire and definitive agreement between you and us with respect to your use of this Website. If for any reason a court of competent jurisdiction finds any provision of these Terms, or portion thereof, to be unenforceable, that provision shall be enforced to the maximum extent permissible so as to give effect to the intent of these Terms, and the remainder of these Terms shall continue in full force and effect.&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;div id="_mcePaste"&gt;﻿&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/policies/website-use'&gt;https://cis-india.org/about/policies/website-use&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-01T07:16:15Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/policies/privacy-policy">
    <title>Privacy Policy</title>
    <link>https://cis-india.org/about/policies/privacy-policy</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h2&gt;Preliminary&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;This Privacy Policy ("Policy") states the internal policy of the Centre for Internet &amp;amp; Society ("CIS") with regard to the collection, storage, security, processing and disclosure of personal data.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This Policy constitutes compliance with the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 313(E) on 11 April 2011.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Collection of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;CIS will not collect any personal data that is not necessary for the achievement of a purpose that is connected to a stated CIS function.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS will not collect any personal data without obtaining the prior consent of the person to whom it pertains. CIS may obtain such consent in any manner, and through any medium, but will not employ threats, duress or coercion to obtain such consent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Personal data collected in respect of a grant of consent by the person to whom it pertains will, if that consent is subsequently withdrawn for any reason, be destroyed or anonymised.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Storage of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;CIS will not store any personal data for a period longer than is necessary to achieve the purpose for which it was collected, or, if that purpose is achieved or ceases to exist for any reason, for any period following such achievement or cessation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Any personal data collected in relation to the achievement of a purpose will, if that purpose is achieved or ceases to exist for any reason, be destroyed or anonymised.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS may store personal data for a period longer than is necessary to achieve the purpose for which it was collected, or, if that purpose has been achieved or ceases to exist for any reason, for any period following such achievement or cessation, if – &lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;the person to whom it pertains grants consent to such storage;&lt;/li&gt;
&lt;li&gt;it is required to be stored under the provisions of applicable law; or&lt;/li&gt;
&lt;li&gt;it is the subject of a pending legal proceeding.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Processing of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS will not process any personal data that is not necessary for the achievement of the purpose for which it was collected unless the person to whom it pertains grants consent to such processing.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Security of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS will not collect, store or process any personal data in the absence of measures, including, but not restricted to, technological, physical and administrative measures, adequate to secure the confidentiality, secrecy, sanctity and safety of the personal data, including from theft, loss, damage or destruction.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;Any person who collects, stores or processes any personal data on behalf of CIS will be subject to a duty of confidentiality and secrecy in respect of it.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS will, if the confidentiality, secrecy, sanctity or safety of any personal data collected, stored or processed by CIS is violated by theft, loss, damage or destruction, or as a result of any disclosure contrary to the provisions of this Policy, notify, to the extent possible, the person to whom the personal data pertains.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Disclosure of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS will not disclose to any person to whom any personal data does not pertain, or otherwise cause any such a person to receive, the content or nature of that personal data, including any other details in respect thereof, unless the person to whom it pertains grants consent to such disclosure. CIS may obtain such consent in any manner, and through any medium, but will not employ threats, duress or coercion to obtain such consent.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS may disclose personal data with a person to whom it does not pertain, whether located in India or otherwise, for the purpose only of processing it to achieve the purpose for which it was collected, if such a disclosure is pursuant to an agreement that binds the person receiving it to same or stronger measures in respect of its storage, processing and disclosure as are contained in this Policy.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;If the disclosure of any personal data is necessary to –&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;prevent a reasonable threat to national security, defence or public order; or&lt;/li&gt;
&lt;li&gt;prevent, investigate or prosecute a cognisable offence;&lt;/li&gt;
&lt;/ul&gt;
CIS may, upon receiving an order in writing from a judicial authority or law enforcement officer, disclose the personal data that is the subject of the order without seeking the consent of the person to whom it pertains.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS may, to the extent possible, notify the person to whom any personal data pertains of its disclosure and the identity of the person it was disclosed to, and any other details in respect thereof.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Accuracy of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;CIS will reasonably afford any person whose personal data is collected, stored or processed by CIS the opportunity to review it and, where necessary, rectify anything that is inaccurate or not up to date.&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/policies/privacy-policy'&gt;https://cis-india.org/about/policies/privacy-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T06:25:37Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/policies/non-discrimination-equal-opportunities-policy">
    <title>Non-Discrimination and Equal Opportunities Policy</title>
    <link>https://cis-india.org/about/policies/non-discrimination-equal-opportunities-policy</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;h2&gt;Preliminary&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;This Non-Discrimination and Equal Opportunities Policy ("Policy") states the internal policy of the Centre for Internet &amp;amp; Society ("CIS") with regard to non-discrimination at the workplace and equal opportunities during recruitment.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;This Policy is internal to CIS and is meant to provide a safe, diverse and comfortable workplace at CIS. This Policy is not legally mandated and, therefore, is not judicially enforceable in India. This Policy is without prejudice to any anti-discrimination provisions of applicable law including, but not restricted to, the provisions of:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Article 17 of the Constitution of India;&lt;/li&gt;
&lt;li&gt;the Protection of Civil Rights Act, 1955,&lt;/li&gt;
&lt;li&gt;the Scheduled Castes and Scheduled Tribes (Prevention of Atrocities) Act, 1989;&lt;/li&gt;
&lt;li&gt;the Sexual Harassment of Women at the Workplace (Prevention, Prohibition and Redressal) Act, 2013;&lt;/li&gt;
&lt;li&gt;Sections 354 and 509 of the Indian Penal Code, 1860; and,&lt;/li&gt;
&lt;li&gt;the Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act, 1995.&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Non-discrimination&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;CIS will not adversely discriminate, and prohibits other adverse discrimination at the workplace, on the basis of religion, race, caste, sex, place of birth, descent, sexual orientation, gender identity, disability, age or any of them (&lt;strong&gt;"Discrimination Characteristics"&lt;/strong&gt;). CIS will not condone any adverse discrimination against any person on its premises, whether that person is in its employment or otherwise.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Any person who believes himself or herself to have been subjected to adverse discrimination on the basis of the Discrimination Characteristics is encouraged to bring the matter to the attention of the Diversity Committee of CIS at the earliest practical opportunity. No person will be punished, retaliated against, or limited in employment or other opportunity for exercising anything set out in this Policy, or for filing a complaint, furnishing information for, or participating in an investigation, or any other activity related to the administration of this Policy.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Any adverse discrimination or other action or behaviour that constitutes a violation of law will be reported to the police.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Equal Opportunities&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;CIS provides equal opportunities to its employment, consultancy or otherwise without regard for the Discrimination Characteristics. All actions of CIS with regard to its employees, consultants, advisors, interns and staff, including but not limited to those relating to compensation, benefits, transfers, leave, layoffs, training, education, and assistance, will be made without regard for the Discrimination Characteristics.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Notwithstanding anything contained in the previous paragraph, if CIS reasonably believes that its employment, workplace or premises do not adequately represent the balance of diversity of persons who share one or more of the Discrimination Characteristics, it may, with the aim only of redressing that imbalance, take positive discriminatory action in respect of persons who share that aspect, or those aspects, of the Discrimination Characteristics that are sought to be adequately represented.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Any person who believes himself or herself to have been subjected to adverse discrimination, or impermissible positive discrimination, on the basis of the Discrimination Characteristics is encouraged to bring the matter to the attention of the Diversity Committee of CIS at the earliest practical opportunity.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Diversity Committee&lt;/h2&gt;
&lt;p&gt;The Interim Diversity Committee of CIS is comprised of:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Pallavi Bedi&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Torsha Sarkar&lt;/li&gt;&lt;li&gt;Gurshabad Grover&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/policies/non-discrimination-equal-opportunities-policy'&gt;https://cis-india.org/about/policies/non-discrimination-equal-opportunities-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-07-29T06:59:09Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/policies/ethical-research-guidelines">
    <title>Ethical Research Guidelines</title>
    <link>https://cis-india.org/about/policies/ethical-research-guidelines</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society will endeavour to protect the physical, social and psychological well-being of those who participate in their research. The guidelines below state the necessary steps to follow while doing research.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The ethical research guideline requires CIS staff and consultants to consider and take the following steps while engaging in research.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Providing notice to the individual of the: Aims, methods, his/her right to abstain from participation in the research and his/her right to terminate at any time his/her participation; the confidential nature of his/her replies and any limits on such confidentiality.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Providing informants and other participants the right to remain anonymous.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Taking informed consent from the individual that he/she agrees to participate. If children are involved in the research, informed consent will be taken from the parents. Informed consent will entail communicating :&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Purpose(s) of the study, and the anticipated consequences of the research;&lt;/li&gt;
&lt;li&gt;Identity of funders and sponsors&lt;/li&gt;
&lt;li&gt;Anticipated uses of the data&lt;/li&gt;
&lt;li&gt;The degree of anonymity and confidentiality which may be afforded to informants and subjects.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ensuring that when audio/visual-recorders and photographic records are being used, participants that are being recorded will be made aware of the use of the devices, and have the option to request that they not be used.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Ensuring that the identity and identifying information of the participant (if not already in the public domain) is destroyed at the end of project, unless the individual has consented to otherwise.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;At public events organized by CIS, it will be announced and publicly posted that the event is being recorded. Individuals will be given the choice object to being recorded or their name and organization shared in conference reports, blogs, articles etc. If the individual does not object, it will be considered that they have given their consent.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The Centre for Internet and Society strictly follows a policy of &lt;strong&gt;No Plagiarism&lt;/strong&gt;.&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/policies/ethical-research-guidelines'&gt;https://cis-india.org/about/policies/ethical-research-guidelines&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-13T12:21:48Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback">
    <title>Privacy Protection Bill, 2013 (With Amendments based on Public Feedback)</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback</link>
    <description>
        &lt;b&gt;In 2013 CIS drafted the Privacy Protection Bill as a citizens' version of a privacy legislation for India. Since April 2013, CIS has been holding Privacy Roundtables in collaboration with FICCI and DSCI, with the objective of gaining public feedback to the Privacy Protection Bill and other possible frameworks for privacy in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;As a part of this  process, CIS has been amending the Privacy Protection Bill based on  public feedback. Below is the text of the Bill as amended according to  feedback gained from the New Delhi, Bangalore, and Chennai Roundtables.&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-amendments.pdf" class="internal-link"&gt;Click to download the Privacy Protection Bill, 2013 with latest amendments&lt;/a&gt;&lt;/b&gt; (PDF, 196 Kb).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T10:50:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/june-2013-bulletin">
    <title>June 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/june-2013-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of June 2013 can be accessed below.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet &amp;amp; Society (CIS) welcomes you to the sixth issue of its newsletter for 2013. Hivos published a White Paper by Nishant Shah titled &lt;a href="https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway"&gt;Whose Change is it Anyway?&lt;/a&gt;, which attempts to reflect critically on existing patterns of making change and its implications for the future of citizen action in information and network societies. The Access to Knowledge team carried out a &lt;a href="https://cis-india.org/a2k/blog/indian-language-wikipedia-statistics"&gt;quantitative analysis to identify trends and growth patterns in Indian Language Wikipedias&lt;/a&gt; from September 2012 to April 2013. CIS drafted the &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback"&gt;Privacy Protection Bill&lt;/a&gt; and amended it as per feedback gained from the New Delhi, Bangalore, and Chennai Privacy Roundtable Events. CIS made &lt;a href="https://cis-india.org/a2k/blog/cis-closing-statement-marrakesh-treaty-for-the-blind"&gt;closing statement on the Treaty for the Blind&lt;/a&gt; at the WIPO Diplomatic Conference which was concluded with the adoption of the &lt;a href="http://www.wipo.int/meetings/en/doc_details.jsp?doc_id=241683"&gt;Marrakesh Treaty to Facilitate Access to Published Works for Persons who are Blind, Visually Impaired, or otherwise Print Disabled&lt;/a&gt;. In a &lt;a href="https://cis-india.org/a2k/blog/patent-pools"&gt;research paper&lt;/a&gt; Nehaa Chaudhari gives an analysis of patent pools, Sameer Boray gives an &lt;a href="https://cis-india.org/a2k/blog/the-right-way-to-fight-video-piracy"&gt;analysis of video piracy&lt;/a&gt; and Pranav Menon &lt;a href="https://cis-india.org/a2k/blog/india-eu-fta-issues-surrounding-data-protection-and-security"&gt;gives an analysis of India-EU FTA and issues surrounding data protection and security&lt;/a&gt;. In this period we organised the &lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society"&gt;Institute on Internet and Society&lt;/a&gt; with support from the Ford Foundation at Golden Palms, Bangalore from June 8 to 14, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Celebrating 5 Years of CIS&lt;/b&gt;&lt;br /&gt;CIS is now 5 years old and we just celebrated this by holding an open exhibition in our offices in Bangalore and Delhi from May 20 to 23, showcasing our work and accomplishments over the period. We had about 170 visitors from the general public coming in to our office. Videos of the event are &lt;a href="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013"&gt;&lt;b&gt;Google Policy Fellowship&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;CIS has initiated processing of applications for the Google Policy Fellowship programme. Shortlisted candidates would be informed about their interview. However, as of now there will be a 20 days delay in announcing the list for the interview.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;br /&gt; CIS is inviting applications for the posts of &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Screen Reader Project) and &lt;a href="https://cis-india.org/jobs/content-developer-requirement"&gt;Editor/Content Developer&lt;/a&gt;. To apply for these posts, send in your resume to Nirmita Narasimhan (&lt;a href="mailto:nirmita@cis-india.org"&gt;nirmita@cis-india.org&lt;/a&gt;). CIS is also seeking applications for the post of &lt;a href="https://cis-india.org/jobs/programme-officer-internet-governance"&gt;Programme Officer&lt;/a&gt; (Internet Governance). To apply send your resume to Sunil Abraham (&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;) and Pranesh Prakash (&lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;).&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing two projects in partnership with the &lt;b&gt;Hans Foundation&lt;/b&gt;. One is to create a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India and another for developing a screen reader and text-to- speech synthesizer for Indian languages:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit for Persons with Disabilities&lt;/b&gt;&lt;br /&gt;CIS and the Centre for Law and Policy Research (CLPR) are working in this project. Draft chapters have been published. Feedback and comments are invited from readers for the chapter on Jharkhand:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-jharkhand-call-for-comments"&gt;The Jharkhand Chapter&lt;/a&gt; (by CLPR, June 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;All the chapters published on the website are early drafts and will be reviewed and updated&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Award&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/girls-in-ict-day-2013-in-delhi"&gt;Girls in ICT Day 2013&lt;/a&gt; (organized by ITU-APT Foundation of India with support from CMAI - Association of India Communication and Infrastructure, FICCI Auditorium, Tansen Marg, New Delhi, May 7, 2013). Dr. Nirmita Narasimhan got a felicitation for her contribution and achievements in the field of Information and Communication Technology. The honour was conferred during the celebration of this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/business-world-june-26-2013-chitra-narayanan-a-treat-for-the-blind"&gt;A Treat for the Blind&lt;/a&gt; (by Chitra Narayanan, Business World, June 26, 2013). Pranesh Prakash was quoted. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt; and &lt;a href="https://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Wikimedia Foundation has given a &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;grant&lt;/a&gt; to CIS to support and develop the growth of Indic language communities and projects by community collaborations and partnerships. This is being carried out by the Access to Knowledge team based in Delhi. CIS is also doing a project (Pervasive Technologies) on examining the relationship between production of pervasive technologies and intellectual property. CIS also promotes openness including open government data, open standards, open access, and free/libre/open source software through its Openness programme.&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/a2k"&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/a&gt;&lt;b&gt; (Previously IP Reforms)&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WIPO&lt;/b&gt;&lt;br /&gt;Pranesh Prakash participated in the WIPO Diplomatic Conference to Conclude a Treaty to Facilitate Access to Published Works by Visually Impaired Persons and Persons with Print Disabilities in Marrakesh, Morocco, June 17 to 28, 2013. The conference concluded with the adoption of the Marrakesh Treaty to facilitate access to published works by blind persons, persons with visual impairment, and other print disabled persons, by requiring mandatory exceptions in copyright law to enable conversions of books into accessible formats, and by enabling cross-border transfer of accessible format books. Click for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/cis-closing-statement-marrakesh-treaty-for-the-blind"&gt;CIS's Closing Statement at Marrakesh on the Treaty for the Blind&lt;/a&gt; (by Pranesh Prakash, June 28, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/india-closing-statement-marrakesh-treaty-for-the-blind"&gt;India's Closing Statement at Marrakesh on the Treaty for the Blind&lt;/a&gt; (June 29, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pervasive Technologies&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/patent-pools"&gt;Pervasive Technologies: Patent Pools&lt;/a&gt; (by Nehaa Chaudhari, June 27, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Other (FTA, Piracy)&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/the-right-way-to-fight-video-piracy"&gt;The Right Way to Fight Video Piracy?&lt;/a&gt; (by Sameer Boray, June 6, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/india-eu-fta-issues-surrounding-data-protection-and-security"&gt;India-EU Proposed Free Trade Agreement: Issues Surrounding Data Protection and Security&lt;/a&gt; (by Pranav Menon, June 8, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/india-eu-fta-copyright-issues"&gt;India- EU FTA: A Note on the Copyright Issues&lt;/a&gt; (by Nehaa Chaudhari, June 18, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta"&gt;Governance in the Age of the Internet and Free Trade Agreements&lt;/a&gt; (organized by Thai Netizen Network and co-hosted by the Ministry of Information and Communication and the National Science and Technology Development Agency, Queen Sirikit National Convention Center, June 8, 2013). Sunil Abraham was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Access to Knowledge (Wikipedia)&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of three members based in Bangalore: &lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and one team member &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt; who is working from Delhi office.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Statistical Report&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/indian-language-wikipedia-statistics"&gt;Indian Language Wikipedia Statistics&lt;/a&gt; (by Nitika Tandon, June 30, September 2012 – April 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/kannada-wikipedia-workshop-bloggers"&gt;A 'Kannada' Wikipedia Workshop for Bloggers&lt;/a&gt; (Suchitra, Bengaluru, June 23, 2013). Dr. U.B. Pavanaja conducted the workshop.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/my-first-wikipedia-training-workshop"&gt;Telugu Wikipedia Training Workshop&lt;/a&gt; (co-organised by A2K team and Theatre Outreach Unit, University of Hyderabad, Golden Threshold, Nampally, Hyderabad, March 8, 2013). T. Vishnu Vardhan conducted the workshop.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/digital-humanities-for-indian-higher-education"&gt;Digital Humanities for Indian Higher Education&lt;/a&gt; (co-organised by HEIRA-CSCS, Tumkur University, CILHE-TISS and CCS, Indian Institute of Science, July 13, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/my-first-wikipedia-training-workshop"&gt;My First Wikipedia Training Workshop – Theatre Outreach Unit, University of Hyderabad&lt;/a&gt; (by T. Vishnu Vardhan, June 26, 2013). &lt;i&gt;The workshop was conducted in March but the report was published only in June&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/visual-editor.pdf/view"&gt;Wikipedia Visual Editor&lt;/a&gt; (by Nitika Tandon, June 27, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Press Coverage (including videos)&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/hmtv-may-30-2013-wikipedia-and-telegu-wikipedians"&gt;A Feature on Wikipedia and Telegu Wikipedians&lt;/a&gt; (HMTV, May 30-31, 2013). Watch the video.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikipedia-live-phone-in-programme"&gt;Wikipedia Live Phone-in Programme&lt;/a&gt; (HMTV, June 1, 2013). T. Vishnu Vardhan took part in a one hour live phone-in programme on Wikipedia.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/timeout-bengaluru-akhila-seetharaman-june-21-2013-wiki-donors"&gt;Wiki donors&lt;/a&gt; (by Akhila Seetharaman, TimeOut Bengaluru, June 21, 2013). T. Vishnu Vardhan and Dr. U.B. Pavanaja are quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/prajavani-june-5-2013-kannada-wikipedia-workshop-coverage"&gt;Kannada Wikipedia Workshop at Hasan&lt;/a&gt; (Prajavani, June 5, 2013). Dr. U.B. Pavanaja conducted the workshop on June 4, 2013.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/samyukta-karnataka-june-5-2013-kannada-wikipedia-workshop-coverage"&gt;Kannada Wikipedia Workshop at Hasan&lt;/a&gt; (Samyukta Karnataka, June 5, 2013). Dr. U.B.Pavanaja conducted the workshop on June 4, 2013.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/vijaya-karnataka-june-5-2013-report-of-kannada-wikipedia-workshop-in-hasan"&gt;Kannada Wikipedia Workshop at Hasan&lt;/a&gt; (Vijaya Karnataka, June 5, 2013). Dr. U.B.Pavanaja conducted the workshop on June 4, 2013.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/suvarna-news-june-13-2013-wiki-rahasya-panel-discussion"&gt;Wiki Rahasya: Panel Discussion&lt;/a&gt; (Suvarna News, June 13, 2013).  Dr. U.B.Pavanaja participated in a panel discussion around Wikipedia in general and about Kannada Wikipedia in specific.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/dml-central-june-24-2013-nishant-shah-big-data-peoples-lives-and-importance-of-openness"&gt;Big Data, People's Lives, and the Importance of Openness&lt;/a&gt; (by Nishant Shah, DML Central, June 24, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Hosted&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/bangalore-rhok-june-1-2-2013-report"&gt;RHoK Global Event&lt;/a&gt; (Centre for Internet and Society, Bangalore, June 1 – 2, 2013). Yogesh Londhe shares with you a post-event report.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS began two projects earlier this year. The first one on facilitating research and events on surveillance and freedom of expression is with Privacy International and support from the International Development Research Centre, Canada. The second one on mapping cyber security actors in South Asia and South East Asia is with the Citizen Lab, Munk School of Global Affairs, University of Toronto and support from the International Development Research Centre, Canada:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cyber Stewards Project&lt;/b&gt;&lt;br /&gt;Laird Brown, a strategic planner and writer with core competencies on brand analysis, public relations and resource management and Purba Sarkar who in the past worked as a strategic advisor in the field of SAP Retail are working in this project.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Video Interview&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan"&gt;An Interview with Ram Mohan&lt;/a&gt; (June 30, 2013)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/geo-politics-of-information-controls"&gt;The Geopolitics of Information Controls: A Presentation by Masashi Crete-Nishihata&lt;/a&gt; (TERI, Bangalore, June 19, 2013). About 20 people participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Privacy Research&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback"&gt;Privacy Protection Bill, 2013&lt;/a&gt; (With Amendments based on Public Feedback) (by Elonnai Hickok, June 30, 2013): CIS drafted the Bill. Based on feedback received from the New Delhi, Bangalore, and Chennai Roundtables the Bill was amended. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Interviews&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-citizen-lab-on-internet-filtering"&gt;Interview with the Citizen Lab on Internet Filtering in India&lt;/a&gt; (June 24, 2013). Maria Xynou interviewed Masashi Crete-Nishihata and Jakub Dalek from the Citizen Lab on internet filtering in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-irish-data-protection-commissioner"&gt;Interview with Billy Hawkes&lt;/a&gt; (June 20, 2014). Maria Xynou interviewed Billy Hawkes, the Irish Data Protection Commissioner on recommendations for data protection in India.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Columns&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"&gt;Indian Surveillance Laws &amp;amp; Practices Far Worse than US&lt;/a&gt; (by Pranesh Prakash, Economic Times, June 13, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-express-june-14-2013-nishant-shah-world-wide-rule"&gt;World Wide Rule&lt;/a&gt; (by Nishant Shah, Indian Express, June 14, 2013). Nishant Shah reviews Schmidt and Cohen's book “The New Digital Age”.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch"&gt;Way to Watch&lt;/a&gt; (by Chinmayi Arun, Indian Express, June 26, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/india-together-june-26-2013-snehashish-ghosh-the-state-is-snooping-can-you-escape"&gt;The State is Snooping: Can You Escape?&lt;/a&gt; (by Snehashish Ghosh, India Together, June 26, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance"&gt;India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis — It is Now Officially Confirmed&lt;/a&gt; (by Maria Xynou, June 13, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/sebi-and-communication-surveillance"&gt;SEBI and Communication Surveillance: New Rules, New Responsibilities?&lt;/a&gt; (by Kovey Coles, June 27, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation"&gt;Open Letter to "Not" Recognize India as Data Secure Nation till Enactment of Privacy Legislation&lt;/a&gt; (by Elonnai Hickok, June 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/open-letter-to-siam-on-rfid%20installation-in-vehicles"&gt;Open Letter to Prevent the Installation of RFID tags in Vehicles&lt;/a&gt; (by Maria Xynou, June 27, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring"&gt;Technology, Power, and Revolutions in the Arab Spring&lt;/a&gt; (CIS, July 2, 2013). Prof. Ramesh Srinivasan gave a talk.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/cryptoparty-bangalore"&gt;Learn to Secure Your Online Communication!&lt;/a&gt; (CIS, Bangalore, June 30, 2013). A Crypto Party was organised.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/cryptoparty-delhi"&gt;Learn to Secure Your Online Communication!&lt;/a&gt; (IIC, Delhi University, South Campus, New Delhi, July 6, 2013). A Crypto Party was organised.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-4th-privacy-round-table-meeting"&gt;4&lt;sup&gt;th&lt;/sup&gt; Privacy Round Table Meeting&lt;/a&gt; (co-organised with the Federation of Indian Chambers of Commerce and Industry and the Data Security Council of India, Mumbai, June 15, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming / Ongoing Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/digital-activism-in-europe"&gt;Digital Activism in Europe&lt;/a&gt; (The Sarai Programme, Centre for the Study of Developing Societies, New Delhi, July 8, 2013). Bernadette Längle will give a talk.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-round-table-kolkata"&gt;Privacy Round Table, Kolkata&lt;/a&gt; (co-organised with the Federation for Indian Chambers of Commerce and Industry, and the Data Security Council of India, Lytton Hotel, Sudder Street, Kolkata, July 13, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis"&gt;Biometrics or bust? India's Identity Crisis&lt;/a&gt; (organized by the Oxford Internet Institute, July 2, 2013). Malavika Jayaram was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/tehelka-june-15-2013-pranesh-prakash-on-us-snooping-into-indian-cyber-space"&gt;Pranesh Prakash on the US snooping into Indian cyber space&lt;/a&gt; (by Tehelka, June 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-times-of-india-kim-arora-june-6-2013-indian-student-in-cornell-university-hacks-icse-isc-databas"&gt;Indian student in Cornell University hacks into ICSE, ISC database&lt;/a&gt; (by Kim Arora, Times of India, June 6, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-june-7-2013-vasudha-venugopal-karthik-subramanian-hacking-sparks-row-over-exam-evaluation"&gt;‘Hacking’ sparks row over exam evaluation&lt;/a&gt; (by Vasudha Venugopal and Karthik Subramanian, Hindu, June 7, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-javed-anwer-ishan-srivastava-june-8-2013-internet-firms-deny-existence-of-prism"&gt;Internet firms deny existence of PRISM&lt;/a&gt; (by Javed Anwer and Ishan Srivastava, Times of India, June 8, 2013). Sunil Abraham and Pranesh Prakash are quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system"&gt;Indian Government Quietly Brings In Its 'Central Monitoring System': Total Surveillance Of All Telecommunications&lt;/a&gt; (Tech Dirt, June 8, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access"&gt;Facebook, Google deny spying access&lt;/a&gt; (by Javed Anwer, Times of India, June 9, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hindu-businessline-thomas-k-thomas-june-10-2013-govt-mulls-advisory-on-privacy-issues-related-to-google-facebook"&gt;Govt mulls advisory on privacy issues related to Google, Facebook&lt;/a&gt; (by Thomas K Thomas, Hindu Business Line, June 10, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-june-22-2013-kim-arora-cyber-experts-suggest-open-source-software-to-protect-privacy"&gt;Cyber experts suggest using open source software to protect privacy&lt;/a&gt; (by Kim Arora, Times of India, June 22, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-javed-anwer-june-26-2013-govt-goes-after-porn-makes-isps-ban-sites"&gt;Govt goes after porn, makes ISPs ban sites&lt;/a&gt; (by Javed Anwer, Times of India, June 26, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-register-phil-muncaster-june-27-2013-indian-govt-blocks-40-smut-sites-forgets-to-give-reason"&gt;Indian govt blocks 40 smut sites, forgets to give reason&lt;/a&gt; (by Phil Muncaster, The Register, June 27, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop"&gt;Concerns over central snoop&lt;/a&gt; (by Aloke Tikku, Hindustan Times, June 28, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-maitreyee-boruah-june-29-2013-internet-users-enraged-over-us-online-spying"&gt;Internet users enraged over US online spying&lt;/a&gt; (by Maitreyee Boruah, Times of India, June 29, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-anirban-sen-june-29-2013-issue-of-duplication-of-identities-of-users-under-control"&gt;Issue of duplication of identities of users under control: Nilekani&lt;/a&gt; (by Anirban Sen, Livemint, June 29, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar"&gt;In India, Prism-like Surveillance Slips Under the Radar&lt;/a&gt; (by Anjan Trivedi, Time World, June 30, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS in partnership with the Ford Foundation is executing a project on Internet Access. It covers the history of the internet, technologies involved, principle and values of internet access, broadband market and universal access. It will also touch upon various policies and regulations which has an impact on internet access and bodies and mechanism which are responsible for formulation of policies related to internet access. The blog posts and modules are being published in the &lt;a href="http://www.internet-institute.in/"&gt;Internet Institute website&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society"&gt;Institute on Internet and Society&lt;/a&gt; (supported by Ford Foundation, Golden Palms Resort, Bangalore, June 8 – 14, 2013). Pranesh Prakash, Bernadette Längle, Vir Kamal Chopra, AK Bhargava, Ananth Guruswamy, Archana Gulati, Chakshu Roy, Elonnai Hickok, Gaurab Raj Upadhaya, Helani Galpaya, Michael Ginguld, Dr. Nadeem Akhtar, C. Nandini, Dr. Nirmita Narasimhan, Dr. Nishant Shah, Parminder Jeet Singh, Ravikiran Annaswamy, Dr. Ravina Aggarwal, Satyen Gupta, Dr. Subbiah Arunachalam, Sunil Abraham, Tulika Pandey and T. Vishnu Vardhan were speakers at the event. The presentations can be accessed &lt;a href="http://internet-institute.in/repository"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/business-standard-article-opinion-shyam-ponappa-june-5-2013-law-and-order-through-traffic-systems"&gt;Law &amp;amp; Order through Traffic Systems&lt;/a&gt; (by Shyam Ponappa, Business Standard, June 5, 2013 and cross-posted in &lt;a href="https://cis-india.org/telecom/blog/business-standard-article-opinion-shyam-ponappa-june-5-2013-law-and-order-through-traffic-systems"&gt;Organizing India Blogspot&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;White Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway"&gt;Whose Change is it Anyway?&lt;/a&gt; (by Nishant Shah, Hivos, June 18, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new conversations and debates that shape the contours of Digital Humanities in Asia.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/mapping-the-field-of-digital-humanities"&gt;Mapping the Field of Digital Humanities&lt;/a&gt; (by Sara Morais, June 11, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/a-suggested-set-of-values-for-the-digital-humanities"&gt;A Suggested Set of Values for the Digital Humanities&lt;/a&gt; (by Sara Morais, June 12, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/archive-practice-and-digital-humanities"&gt;Archive Practice and Digital Humanities&lt;/a&gt; (by Sara Morais, June 24, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;h3&gt;Request for Collaboration&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/june-2013-bulletin'&gt;https://cis-india.org/about/newsletters/june-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-07-27T09:48:16Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar">
    <title>In India, Prism-like Surveillance Slips Under the Radar</title>
    <link>https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar</link>
    <description>
        &lt;b&gt;Prism, the contentious U.S. data-collection surveillance program, has captured the world’s attention ever since whistle-blower Edward Snowden leaked details of global spying to the Guardian and Washington Post.

&lt;/b&gt;
        &lt;p&gt;The article by Anjan Trivedi was &lt;a class="external-link" href="http://world.time.com/2013/06/30/in-india-prism-like-surveillance-slips-under-the-radar/#ixzz2XoCbrn00"&gt;published in Time World &lt;/a&gt;on June 30, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;However, it turns out &lt;a href="http://topics.time.com/india/"&gt;India&lt;/a&gt;,  the world’s largest democracy, is building its own version to monitor  internal communications in the name of national security. Yet India’s  Central Monitoring System, or CMS, was not shrouded in secrecy — New  Delhi &lt;a href="http://www.dot.gov.in/sites/default/files/AR%20Englsih%2011-12_0.pdf"&gt;announced&lt;/a&gt; its intentions to watch over its citizens, however mutedly, in &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=70747"&gt;2011&lt;/a&gt;, and rollout is slated for August. And while reports that the American system collected 6.3 billion &lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;intelligence reports&lt;/a&gt; in India led to a &lt;a href="http://m.indianexpress.com/news/supreme-court-agrees-to-hear-pil-on-us-surveillance-of-internet-data/1131011/"&gt;lawsuit&lt;/a&gt; at the nation’s &lt;a href="http://topics.time.com/supreme-court/"&gt;Supreme Court&lt;/a&gt;, comparable indignation has been conspicuously lacking with the domestic equivalent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CMS is an ambitious surveillance system that monitors text messages,  social-media engagement and phone calls on landlines and cell phones,  among other communications. That means 900 million landline and  cell-phone users and 125 million Internet users. The project, which is  being implemented by the government’s &lt;a href="http://www.cdot.in/about_us/berif_history.htm"&gt;Centre for Development of Telematics&lt;/a&gt; (&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=78145"&gt;C-DOT&lt;/a&gt;),  is meant to help national law-enforcement agencies save time and avoid  manual intervention, according to the Department of Telecommunications’ &lt;a href="http://www.dot.gov.in/sites/default/files/Telecom%20Annual%20Report-2012-13%20%28English%29%20_For%20web%20%281%29.pdf"&gt;annual report&lt;/a&gt;.  This has been in the works since 2008, when C-DOT started working on a  proof-of-concept, according to an older report. The government &lt;a href="http://planningcommission.nic.in/aboutus/committee/wrkgrp12/cit/wgrep_telecom.pdf"&gt;set aside&lt;/a&gt; approximately $150 million for the system as part of its 12th five-year  plan, although the Cabinet ultimately approved a higher amount.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the internal-security ministry though, the surveillance system  remains a relatively “hush-hush” topic, a project official unauthorized  to speak to the press tells TIME. In April 2011, the Police  Modernisation Division of the Home Affairs Ministry put out a 90-page  tender to solicit bidders for communication-interception systems in  every state and union territory of India. The system requirements  included “live listening, recording, storage, playback, analysis,  postprocessing” and voice recognition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Civil-liberties groups concede that states often need to undertake  targeted-monitoring operations. However, the move toward extensive  “surveillance capabilities enabled by digital communications,” suggests  that governments are now “casting the net wide, enabling intrusions into  private lives,” according to Meenakshi Ganguly, South Asia director for  Human Rights Watch. This extensive communications surveillance through  the likes of Prism and CMS are “out of the realm of judicial  authorization and allow unregulated, secret surveillance, eliminating  any transparency or accountability on the part of the state,” a recent  U.N. &lt;a href="http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf"&gt;report&lt;/a&gt; stated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is no stranger to censorship and monitoring — tweets, blogs,  books or songs are frequently blocked and banned. India ranked second  only to the U.S. on Google’s list of user-data requests with 4,750  queries, up &lt;a href="http://www.google.com/transparencyreport/userdatarequests/IN/"&gt;52% from two years back&lt;/a&gt;, and removal requests from the government &lt;a href="http://www.google.com/transparencyreport/removals/government/IN/?metric=items&amp;amp;p=2012-12"&gt;increased by 90%&lt;/a&gt; over the previous reporting period. While these were largely made  through police or court orders, the new system will not require such a  legal process. In recent times, India’s democratically elected  government has barred access to certain websites and Twitter handles,  restricted the number of outgoing text messages to five per person per  day and arrested citizens for liking Facebook posts and tweeting.  Historically too, censorship has been India’s preferred means of  policing social unrest. “Freedom of expression, while broadly available  in theory,” Ganguly tells TIME, “is endangered by abuse of various India  laws.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a growing discrepancy and power imbalance between citizens  and the state, says Anja Kovacs of the Internet Democracy Project. And,  in an environment like India where “no checks and balances [are] in  place,” that is troubling. The potential for misuse and  misunderstanding, Kovacs believes, is increasing enormously. Currently,  India’s laws relevant to interception “disempower citizens by relying  heavily on the executive to safeguard individuals’ constitutional  rights,” a recent &lt;a href="http://www.indianexpress.com/news/way-to-watch/1133737/0"&gt;editorial&lt;/a&gt; noted. The power imbalance is often noticeable at public protests, as  in the case of the New Delhi gang-rape incident in December, when the  government shut down public transport near protest grounds and  unlawfully detained demonstrators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With an already sizeable and growing population of Internet users,  the government’s worries too are on the rise. Netizens in India are set  to triple to 330 million by 2016, &lt;a href="http://startupcatalyst.in/wp-content/uploads/2013/05/From_Buzz_to_Bucks_Apr_2013_tcm80-132875.pdf"&gt;according to a recent report&lt;/a&gt;.  “As [governments] around the world grapple with the power of social  media that can enable spontaneous street protests, there appears to be  increasing surveillance,” Ganguly explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s junior minister for telecommunications attempted to explain the benefits of this system during a &lt;a href="http://www.youtube.com/watch?v=rwTsek5WUfE"&gt;recent Google+ Hangout&lt;/a&gt; session. He acknowledged that CMS is something that “most people may  not be aware of” because it’s “slightly technical.” A participant noted  that the idea of such an intrusive system was worrying and he did not  feel safe. The minister, though, insisted that it would “safeguard your  privacy” and national security. Given the high-tech nature of CMS, he  noted that telecom companies would no longer be part of the government’s  surveillance process. India currently does &lt;a href="http://www.hrw.org/news/2013/06/07/india-new-monitoring-system-threatens-rights"&gt;not&lt;/a&gt; have formal privacy legislation to prohibit arbitrary monitoring. The new system comes under the &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=71791"&gt;jurisdiction&lt;/a&gt; of the Indian Telegraph Act of 1885, which allows for monitoring communication in the “interest of public safety.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance system is not only an “abuse of privacy rights and  security-agency overreach,” critics say, but also counterproductive in  terms of security. In the process of collecting data to monitor criminal  activity, the data itself may become a target for terrorists and  criminals — a “honeypot,” according to Sunil Abraham, executive director  of India’s Centre for Internet and Society. Additionally, the  wide-ranging tapping undermines financial markets, Abraham says, by  compromising confidentiality, trade secrets and intellectual property.  What’s more, vulnerabilities will have to be built into the existing  cyberinfrastructure to make way for such a system. Whether the nation’s  patchy infrastructure will be able to handle a complex web of  surveillance and networks, no one can say. That, Abraham contends, is  what attackers will target.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;National security has widely been cited as the reason for this  system, but no one can say whether it will actually help avert terrorist  activity. India’s own 9/11 is a case in point: the Indian government  was handed intelligence by foreign agencies about the possibility of the  2008 Mumbai terrorist attacks, but did not act. This is a “clear  indication that having access to massive amounts of data is not  necessarily going to make people safer,” Kovacs tells TIME. However,  officers familiar with the new system say it will not increase  surveillance or enhance intrusion beyond current levels; it will only  strengthen the policy framework of privacy and increase &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=80829"&gt;operational efficiency&lt;/a&gt;.  Spokespersons and officials in the internal-security and telecom  departments did not respond to requests or declined to comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has been cagey about details on implementation and &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=70791"&gt;extent&lt;/a&gt;.  This ability to act however the authorities deems fit “just makes it  really easy to slide into authoritarianism, and that is not acceptable  for any democratic country,” Kovacs says. Indeed, India has seen that  before — almost four decades ago, Indira Gandhi declared a state of  emergency for 19 months, which suspended all civil liberties. Indians  complaining about Prism may want to look a little closer to home.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar'&gt;https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-03T09:31:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-maitreyee-boruah-june-29-2013-internet-users-enraged-over-us-online-spying">
    <title>Internet users enraged over US online spying</title>
    <link>https://cis-india.org/news/times-of-india-maitreyee-boruah-june-29-2013-internet-users-enraged-over-us-online-spying</link>
    <description>
        &lt;b&gt;India is the fifth most tracked nation by American intelligence agencies.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Maitreyee Boruah was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-06-29/people/40256468_1_privacy-private-information-sunil-abraham"&gt;published in the Times of India&lt;/a&gt; on June 29, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Have you been posting pictures and messages with gay abandon on your  social networking sites or having personal discussions on instant chat  or video messaging and thinking that no one other than the intended  recipient(s) has access to it? Well, going by the recent revelation that  government agencies, and that too from the US, have been spying on our  internet usage and collating private information, even the most hardcore  security settings for your online data are apparently of no use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to former US &lt;a href="http://timesofindia.indiatimes.com/topic/Central-Intelligence-Agency"&gt;Central Intelligence Agency&lt;/a&gt; (CIA) employee Edward Snowden's testimony, the US National Security Agency ( &lt;a href="http://timesofindia.indiatimes.com/topic/National-Security-Agency"&gt;NSA&lt;/a&gt;)  has been using major tech giants to spy on private information of users  around the world. And India is the fifth most tracked nation by the US  intelligence system. But isn't this a direct infringement on our right  to privacy? Or are such measures the need of the hour, given the  increasing incidences of terror acts across the world?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What should the &lt;a href="http://timesofindia.indiatimes.com/topic/Indian-Government"&gt;Indian government&lt;/a&gt; do?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, a PIL (Public Interest Litigation) was filed in the Indian  Supreme Court on the issue of the web snooping by the US. The PIL  sought the Centre to initiate action against internet companies for  sharing information with foreign authorities, which amounts to breach of  contract and violation of the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"First, we need to urgently enact a horizontal privacy law, which articulates privacy principles and institutes &lt;a href="http://timesofindia.indiatimes.com/topic/The-Office"&gt;the office&lt;/a&gt; of the &lt;a href="http://timesofindia.indiatimes.com/topic/Privacy-Commissioner"&gt;privacy commissioner&lt;/a&gt;.  Second, we need to promote the use of encryption and other  privacy-enhancing technologies. The use of foreign internet  infrastructure by those in public offices should be banned, except in  the case of public dissemination. And last, but not the least, take  action against online firms that have access to personal data of users  and violate the privacy of Indian citizens through the office of the  regulator," suggests Sunil Abraham, executive director of  Bangalore-based research organization, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anja Kovacs, project director at the Internet Democracy Project in  India, meanwhile, wants the Indian government to assert itself. "The  best the Indian government can do is to demand that this kind of  snooping does not happen. However, it can't ensure that such episodes  won't happen in the future, as there is no enforceable global legal  framework to deal with online snooping."&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Era of the Big Brother?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the lack of  legal support, does it mean that internet users have no right to  privacy? "We do have a right to privacy. Unfortunately, our right is not  respected. By and large, unless they use special tools to protect  themselves, internet users do not have any real privacy in many  countries, including India," says Anja, adding, "The right to privacy is  not explicitly included in the Constitution, and the Privacy Bill  continues to be pending. Also, Indian intelligence agencies are not  under supervision of the Parliament, which is an important weakness in  the accountability system." Echoing Anja, Sunil says, "In India,  unfortunately, our right to privacy is not sufficiently protected.  Indian laws are not strong enough to safeguard privacy of Internet  users."&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Anger in the online community&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  large number of internet users who we spoke to said they were "shocked"  after hearing about the US government's spying mechanism. "The recent  revelation of snooping by the &lt;a href="http://timesofindia.indiatimes.com/topic/US-Government"&gt;US government&lt;/a&gt; is a clear case of intrusion into our privacy. It is absolutely illegal," says 24-year-old IT professional Subodh Gupta.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-maitreyee-boruah-june-29-2013-internet-users-enraged-over-us-online-spying'&gt;https://cis-india.org/news/times-of-india-maitreyee-boruah-june-29-2013-internet-users-enraged-over-us-online-spying&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T04:10:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-anirban-sen-june-29-2013-issue-of-duplication-of-identities-of-users-under-control">
    <title>Issue of duplication of identities of users under control: Nilekani</title>
    <link>https://cis-india.org/news/livemint-anirban-sen-june-29-2013-issue-of-duplication-of-identities-of-users-under-control</link>
    <description>
        &lt;b&gt;Nandan Nilekani says UIDAI system almost completely accurate, duplication of identities virtually negligible.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Anirban Sen was &lt;a class="external-link" href="http://www.livemint.com/Politics/jgihdb9IkoT0ui0sC2viIM/Issue-of-duplication-of-identities-of-users-under-control-N.html"&gt;published in Livemint&lt;/a&gt; on June 29, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI) chief &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Nandan%20Nilekani"&gt;Nandan Nilekani&lt;/a&gt;&lt;/span&gt; said the government agency was in preliminary discussions with some  embassies to use the Aadhaar project to simplify visa application  procedures and that the issue of duplication of identities of users was  well under control.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;In March, a UIDAI spokesperson told &lt;i&gt;Mint&lt;/i&gt; that it  had detected 34,015 cases where one person had been issued two Aadhaar  numbers. The figures represented a little over 0.01% of the 290 million  people who had been enrolled at the time.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Nilekani, who was delivering a keynote address at a  three-day conference on the success and failures of information  technology (IT) in the public and private sector at the Indian Institute  of Management in Bangalore, said the UIDAI system was almost completely  accurate and duplication of identities was virtually negligible.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;“Knowing what we know now, we believe we have accuracy of  upto 99.99%,” said Nilekani, chairman of the Unique Identification  Authority of India (UIDAI).&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Nilekani, on Saturday, assured that the project was  completely secure and user data and biometrics were safe in the hands of  the agencies it works with and brushed aside any concerns on security  of user data that have been widely raised by Internet security groups  and activists.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;“We’re not giving any access to data, except when it is  resident authorized. It is shared only when a resident participates in a  transaction and authorizes the data which is shared,” said Nilekani,  who was one of the seven co-founders of India’s second largest software  exporter &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Infosys%20Ltd"&gt;Infosys Ltd&lt;/a&gt;&lt;/span&gt;. He served as CEO of Infosys from 2002 to 2007.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;“The system is also not open to the internet—the system  has rings of authentications of service agencies. There are lots of  concentric rings of security,” he added. “The biometric data is not used  except for enrolment, re-duplication and authentication.”&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Internet rights groups and activists such as &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt; of the Centre for Internet and Society (CIS), a research thinktank that  focuses on issues of Internet governance, have often raised concerns  over UID’s overtly broad scope and privacy issues in the project.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;“We don’t need Aadhaar because we already have a much  more robust identity management and authentication system based on  digital signatures that has a proven track record of working at a  “billions-of-users” scale on the Internet with reasonable security. The  Unique Identification (UID) project based on the so-called  “infallibility of biometrics” is deeply flawed in design. These design  disasters waiting to happen cannot be permanently thwarted by band-aid  policies,” Abraham wrote in a blog post on the CIS website last year.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Nilekani also acknowledged that the department had faced  several challenges, due to the sheer scale of the project that aims to  cover the country’s entire population of 1.2 billion.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;“We have had lots of challenges on this project—we have  backlogs of enrolment because we have more packets than we can process,  we backlogs of letter deliveries because we cannot handle so many  letters…but fundamentally notwithstanding those challenges, we believe  we are on the right track,” said Nilekani.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Both UIDAI and the census department under the National  Population Register project are recording biometric data, which includes  fingerprint and iris data. Even though both the agencies reached a  truce after a cabinet decision in January 2012 and were allowed to  co-exist, there have been several reports of duplication between the two  agencies in biometric collection.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;UIDAI is not just being used as the main platform for  rolling out the government’s direct cash transfer scheme, but is also  being regarded as an important authentication scheme for financial  transactions and other security measures.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-anirban-sen-june-29-2013-issue-of-duplication-of-identities-of-users-under-control'&gt;https://cis-india.org/news/livemint-anirban-sen-june-29-2013-issue-of-duplication-of-identities-of-users-under-control&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-02T10:13:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
