<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2491 to 2505.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/clear-and-present-danger"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/defense-of-fundamental-freedoms-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-freedom-press-conference-at-un-fellows"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-freedom-at-home"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/no-more-blocking-of-websites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/securing-e-governance-event-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/consumer-privacy-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/net-loss"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/censorship-2020"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/google-hangout-with-sunil"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/co-spying-on-competitors-staff"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-liberty-2012"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/clear-and-present-danger">
    <title>Clear and Present Danger: Attempts to Change Internet Governance and Implications for Press Freedom</title>
    <link>https://cis-india.org/news/clear-and-present-danger</link>
    <description>
        &lt;b&gt;The event was organised by National Endowment for Democracy in Washington, D.C., on June 26, 2012. Emma Llansó, Rebecca MacKinnon, Emin Milli, Susan Morgan and Katitza Rodriguez were the speakers. &lt;/b&gt;
        &lt;p&gt;Pranesh Prakash participated in the event. Susan Morgan from Global Network Initiative was the moderator.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.ned.org/events/clear-and-present-danger-attempts-to-change-internet-governance-and-implications-for-press-fr"&gt;&lt;span class="visualHighlight"&gt;More details are published on the National Endowment for Democracy website&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/clear-and-present-danger'&gt;https://cis-india.org/news/clear-and-present-danger&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-29T03:59:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust">
    <title>How Facebook is Blatantly Abusing our Trust</title>
    <link>https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust</link>
    <description>
        &lt;b&gt;‘Don’t fix it, if it ain’t broken’ is not an adage Facebook seems to subscribe to. Nishant Shah's column on privacy and Facebook was published in First Post on June 27, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Facebook is just re-emerging from the controversies around how it conducted the voting on its new privacy policies, when it goes and digs itself deeper by trying to push down its email services down the throats of its users. If you have recently logged-in to Facebook, you will have received a notification that says that you have been ‘gifted’ with a free Facebook email account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, that is a later phenomenon. A couple of days ago, the whole community of Facebook users went about their usual way, without knowing that something substantial had changed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook, who launched their email service as a part of their social networking empire, with or without your consent, has given us a ‘yourname@facebook.com’ email account. I know free things are considered good, but not an email account that I did not sign up for!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And to make things worse, this email account was, without our consent, added to our time-line and displayed as the primary email address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In itself, it is a small move – with the redesign of the Timeline, Facebook had already introduced many such forced disclosures and changes that most of just had to accept, even if it might have had us fuming. However, with this change, Facebook has now started showing exactly what it can do in building your public profile and creating information about you, without your consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In their lame PR spiel, the company tried to pass it off as a freebie that they were gifting their users. But anybody who was not born yesterday realises that this is a desperate attempt to make a floundering service work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook messaging may work despite the clunky user interface, but its email services remain terribly underused. One of the paradoxes for this lies in the fact that you cannot open a Facebook account without a primary email account with another service, which is used as your authentication as well as the system through which Facebook notifications work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, many times, when introducing Facebook to first-time users of the web, we have to first train them in creating and using an email account before they can get on to the social network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, when Facebook did offer users the option of using a Facebook email service, most of them politely declined because nobody in their right mind is going to migrate to new a email services unless there was a substantial range of benefits being offered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So how did Facebook respond? It just forced the email service upon its millions of users. While this is no different from the other kind of restrictions that are imposed upon us within the Facebook universe – the advertisements we see, the design and layout, the insipid white-and-blue background, the kind of information we can and cannot share and display – etc. this is the first time that Facebook actually added to our information profile and displayed it to the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which means, that the next time somebody looks you up on Facebook – and let’s face it, one of the things we all use Facebook for, is to find people we know and get connected with them – they will see your Facebook email id listed as your contact address. And while you might get a notification in your primary email about any mails that you receive in your Facebook account, the fact is that, all those emails will become a part of Facebook’s huge data farms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a move that is almost a pale imitation of Google’s growing monopoly over our private information, Facebook seems to be now looking to expand its data empires. However, while Google did it through strategic design and marketing, offering innovations and incentives for its users to use their services, Facebook seems to have decided to build a Trojan horse and sneak these services in through the back door.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this might not seem a big deal right now, it has deeper repercussions for what this corporate behemoth can do, not only with our data, but also to our data that we think is actually our own.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If your alarm bells aren’t already ringing, they should be, as Facebook demonstrates a blatant abuse of the trust that we have put in its system, to keep our private data safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The million dollar question – or maybe a slightly reduced price, given its public listing status on the stock-exchange right now – is that while Facebook might keep us safe from other people using our data, will it also be able to keep us safe from itself?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/how-facebook-is-blatantly-abusing-our-trust-359263.html"&gt;&lt;span class="visualHighlight"&gt;Read the original here&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust'&gt;https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-28T12:42:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/defense-of-fundamental-freedoms-online">
    <title>Internet Freedom Fellows Program Emphasizes Defense of Fundamental Freedoms Online</title>
    <link>https://cis-india.org/news/defense-of-fundamental-freedoms-online</link>
    <description>
        &lt;b&gt;At the Human Rights Council (HRC), the United States has consistently placed special emphasis on the protection and promotion of the freedoms of expression, peaceful assembly and association, because we understand that these fundamental freedoms are essential to facilitating the exercise of other universal rights.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://blogs.state.gov/index.php/site/entry/internet_freedom_fellows/"&gt;&lt;span class="visualHighlight"&gt;Published on DipNote, the US Department of State Official Blog&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Ambassador &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://geneva.usmission.gov/2010/03/13/donahoe-bi/"&gt;Eileen Chamberlain Donahoe&lt;/a&gt;&lt;/span&gt; serves as the U.S. Representative to the &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://geneva.usmission.gov/us-hrc/"&gt;Human Rights Council&lt;/a&gt;&lt;/span&gt;. His blog post was published on DipNote on June 25, 2012.&lt;/p&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;As activity in the economic, social, and the political realms gravitates from the offline world to the online world, we have an additional responsibility to ensure that human rights and fundamental freedoms are not eroded simply because they are being exercised in the digital realm. The United States is committed to the principle that the same rights that people have offline must also be protected in the online world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As activity in the economic, social, and the political realms gravitates from the offline world to the online world, we have an additional responsibility to ensure that human rights and fundamental freedoms are not eroded simply because they are being exercised in the digital realm. The United States is committed to the principle that the same rights that people have offline must also be protected in the online world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, I had the chance to spend time with the Internet Freedom Fellows, six young human rights activists, each of whom is working in his or her own way to promote and defend freedom of expression, freedom of peaceful assembly and association, and all other human rights on the Internet. The Internet Freedom Fellows (IFF) program is funded by the State Department's Innovation Fund and the &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://geneva.usmission.gov/us-hrc/"&gt;U.S. Mission in Geneva&lt;/a&gt;&lt;/span&gt;, and was designed to follow up on Secretary Clinton's &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://http//www.state.gov/e/eb/cip/netfreedom/index.htm"&gt;pledge&lt;/a&gt;&lt;/span&gt; to find innovative ways to promote the use of the Internet in support of human rights. The 2012 Fellows are: Dlshad Othman (Syria), Pranesh Prakash (India), Koundjoro Gabriel Kambou (Burkina Faso), Sopheap Chak (Cambodia), Andres Azpurua (Venezuela), and Emin Milli (Azerbaijan).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fellows' visit to Geneva coincided with a moment when the Human Rights Council is seized with these issues: The United States and a cross regional group of countries consisting of Brazil, Nigeria, Tunisia, and Turkey have joined with Sweden to present a resolution on the Promotion, Protection and Enjoyment of Human Rights on the Internet. If adopted later this session, this landmark text will mark the first time the Council has substantively addressed the issue of human rights online in a resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the global community has watched during the past 18 months, individuals across the Middle East, North Africa and beyond have taken to both physical town squares and virtual spaces to express their legitimate aspirations and demand democracy. The Internet has become an essential medium through which journalists, activists, and citizens connect and share information in ways that are changing their societies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of this year's fellows is Dlshad Othman, a Syrian activist and IT engineer who has put his own life in danger to assist his fellow Syrian citizen journalists. Sitting next to me at a UN press conference, Dlshad explained how he helps provide Syrians with digital security resources so that they can communicate online freely and securely despite Assad's "electronic army," with its active online censorship and surveillance. Although he cannot currently return to his country, Dlshad is focused on making it possible for the world to hear the voices of people inside Syria. "This is actually the only way that we have at this time, since there isn't any media on the ground."&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;As the Representative of the United States to the Human Rights Council, I am inspired by these fellows and the courage they've displayed in using the digital realm to advocate for the human rights of their fellow citizens. I will recall their stories and experiences as I work to promote these fundamental freedoms in the Human Rights Council.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/defense-of-fundamental-freedoms-online'&gt;https://cis-india.org/news/defense-of-fundamental-freedoms-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-02T06:47:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-freedom-press-conference-at-un-fellows">
    <title>Internet Freedom press conference at the UN Fellows</title>
    <link>https://cis-india.org/news/internet-freedom-press-conference-at-un-fellows</link>
    <description>
        &lt;b&gt;The Internet Freedom Fellows Program of the U.S. State funded Department and administered by the United States Mission to the United Nations in Geneva, provides human rights activists around the world in Geneva, Washington, and Silicon Valley to work with other activists, U.S. and international to meet government and members of civil society and the private sector in technology and the human rights involved.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://www.weeklying.com/internet-freedom-press-conference-at-the-un-fellows.html"&gt;&lt;span class="visualHighlight"&gt;Published in Weekly ING on June 22, 2012&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  central goal of the program is to share experiences and promote  understanding of the importance of a free Internet to freedom of  expression and association as fundamental rights of the people studied.  Fellows are in Geneva June 19 to 22 at the 20th Session of the UN Human  Rights Council. Fellows this year on Internet freedom, all human rights  activists and practitioners active in the digital media, are from Syria,  India, Burkina Faso, Cambodia, Venezuela and Azerbaijan. . In Geneva,  they will participate in a conversation, global webcast of the United  Nations, to “global networks, individual freedom”, Wednesday, Juin  20-1000 EDT (14:00 UTC) The 2012 Fellows are: Dlshad Othman (Syria): Mr.  Othman is a Syrian activist and software engineer with the Syrians, the  digital resources and support for security features so that they can  use online communication and advocacy work freely and safely, despite  the increased repression of E-Government in the form of censorship,  Cyber-attacks and sophisticated monitoring intense.Pranesh Prakash  (India): Mr. Prakash is a program manager at the Center for Internet and  Society at Bangalore. He works primarily in areas where policies  intersect and technology, conduct research and policy advocacy on issues  of online freedom of expression, access to knowledge, intellectual  property and Internet governance reform Koundjoro Gabriel Kambou  (Burkina Faso). Mr. Kambou is a newspaper reporter and a presenter at  Lefaso.net blogs. He wooed and promotes human rights and the values ​​of  democracy and freedom of the press. He publishes articles and videos to  educate and raise awareness on issues of human rights Sopheap Chak  (Cambodia):. Ms Chak is the program director of the Cambodian Centre for  Human Rights (CCHR) is a leading Cambodian human rights activist  bloggers. It mobilizes youth activists around the country in civic  engagement through the Youth Network of Cambodia to change. She is the  author of the online Global Voice, UPI Asia Online, and calls  Furutre.Andres Azpurua (Venezuela): Mr. Azpurua is committed to the  creation of digital tools to allow Venezuelans to better exercise their  rights. O He has to create a digital platform that promotes and defends  the rights of voters helped. It is also the founder of a digital  initiative to establish a voluntary civil society to the right of the  Milli Venezuela.Emin (Azerbaijan) is to be promoted: Mr. Milli is a  writer and dissident who has actively used online networking tools, to  disseminate information on violations of human rights in Azerbaijan. He  was in for 16 months for his critical views on the Government of  Azerbaijan in prison. He was pardoned in 2010 and is currently writing  his doctoral work in London, the “New Media and the Arab revolutions”.  U.S. Mission Photo by Eric Bridiers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Internet&lt;/h3&gt;
&lt;p&gt;Image the U.S. mission in Geneva &lt;br /&gt;&lt;img src="https://cis-india.org/home-images/unmision.jpg/@@images/843a9493-f909-4e12-ac05-7dee3cae8e8d.jpeg" alt="UN Mission Geneva" class="image-inline" title="UN Mission Geneva" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Internet Freedom Fellows Program of the U.S. State funded Department  and administered by the United States Mission to the United Nations in  Geneva, provides human rights activists around the world in Geneva,  Washington, and Silicon Valley to work with other activists, U.S. and  international to meet government and members of civil society and the  private sector in technology and the human rights involved. A central  goal of the program is to share experiences and promote understanding of  the importance of a free Internet to freedom of expression and  association as fundamental rights of the people studied. Fellows are in  Geneva June 19 to 22 at the 20th Session of the UN Human Rights Council.  Fellows this year on Internet freedom, all human rights activists and  practitioners active in the digital media, are from Syria, India,  Burkina Faso, Cambodia, Venezuela and Azerbaijan. . In Geneva, they will  participate in a conversation, global webcast of the United Nations, to  “global networks, individual freedom”, Wednesday, Juin 20-1000 EDT  (14:00 UTC) The 2012 Fellows are: Dlshad Othman (Syria): Mr. Othman is a  Syrian activist and software engineer with the Syrians, the digital  resources and support for security features so that they can use online  communication and advocacy work freely and safely, despite the increased  repression of E-Government in the form of censorship, Cyber-attacks and  sophisticated monitoring intense.Pranesh Prakash (India): Mr. Prakash  is a program manager at the Center for Internet and Society at  Bangalore. He works primarily in areas where policies intersect and  technology, conduct research and policy advocacy on issues of online  freedom of expression, access to knowledge, intellectual property and  Internet governance reform Koundjoro Gabriel Kambou (Burkina Faso). Mr.  Kambou is a newspaper reporter and a presenter at Lefaso.net blogs. He  wooed and promotes human rights and the values ​​of democracy and  freedom of the press. He publishes articles and videos to educate and  raise awareness on issues of human rights Sopheap Chak (Cambodia):. Ms  Chak is the program director of the Cambodian Centre for Human Rights  (CCHR) is a leading Cambodian human rights activist bloggers. It  mobilizes youth activists around the country in civic engagement through  the Youth Network of Cambodia to change. She is the author of the  online Global Voice, UPI Asia Online, and calls Furutre.Andres Azpurua  (Venezuela): Mr. Azpurua is committed to the creation of digital tools  to allow Venezuelans to better exercise their rights. O He has to create  a digital platform that promotes and defends the rights of voters  helped. It is also the founder of a digital initiative to establish a  voluntary civil society to the right of the Milli Venezuela.Emin  (Azerbaijan) is to be promoted: Mr. Milli is a writer and dissident who  has actively used online networking tools, to disseminate information on  violations of human rights in Azerbaijan. He was in for 16 months for  his critical views on the Government of Azerbaijan in prison. He was  pardoned in 2010 and is currently writing his doctoral work in London,  the “New Media and the Arab revolutions”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-freedom-press-conference-at-un-fellows'&gt;https://cis-india.org/news/internet-freedom-press-conference-at-un-fellows&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-28T06:03:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-freedom-at-home">
    <title>Internet Freedom At Home: Governments, Companies Need Accountability, Speakers Say</title>
    <link>https://cis-india.org/news/internet-freedom-at-home</link>
    <description>
        &lt;b&gt;The freedom to access the internet does not translate into freedom of expression in many countries of the world, including in western economies, according to speakers at a peer forum organised yesterday by the United States mission to the United Nations in Geneva.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://www.ip-watch.org/2012/06/22/internet-freedom-at-home-governments-companies-need-accountability-speakers-say/"&gt;&lt;span class="visualHighlight"&gt;Catherine Saez wrote this for Intellectual Property Watch on June 22, 2012&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both governments and companies, prime providers of internet surveillance technologies in particular in the developed countries, need to be held accountable for the destination and use of those technologies, some of which run counter to human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The peer forum on internet freedom and human rights was held on 21 June and gathered technology experts, and human right activists, with the participation of the mission’s &lt;a class="external-link" href="http://geneva.usmission.gov/us-hrc/internet-freedom-fellows-2012/"&gt;&lt;span class="visualHighlight"&gt;Internet Freedom Fellows programme&lt;/span&gt;&lt;/a&gt;, organised since 2011 in parallel with the UN Human Rights Council.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom to connect exists in most countries where internet surveillance runs counter to human rights but not freedom from fear, Rebecca MacKinnon, former CNN journalist and co-founder of &lt;a class="external-link" href="http://globalvoicesonline.org/"&gt;&lt;span class="visualHighlight"&gt;Global Voices Online&lt;/span&gt;&lt;/a&gt; said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Internet freedom does not mean just free networks, it means free people,” MacKinnon said. “Accomplishing that and constraining the abuse of power across digital networks is a tough problem.”&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Strong Global Standard Needed, Democracies also Concerned&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the Internet Age, it is technically trivial both for corporations and governments to gain access to people’s private communications, she said. The issue is that without strong global standards the empowering potential of the internet is going to be diminished, she said. This is true not only for interconnection but also public transparency and accountability in how surveillance technologies are developed, deployed. And it applies to how information is shared between governments and between companies and governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even in democracies, “we are really struggling” with the issue of how to make sure that in the legitimate fight against crime, terrorism, cyber attacks, which all are real problems, the mechanisms put in place are not abused, she said. How can it ensured that those who hold power through those mechanisms will be accountable when they use that power for purposes that were not intended, she asked. She cited a recent report from the American Civil Liberties Union http://www.aclu.org/spy-files on widespread surveillance by US law enforcement agencies across the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance technologies “are being sold very obviously to governments who clearly are going to abuse that technology,” she said. She mentioned what has been nicknamed the “Wiretappers’ Ball” to describe trade fairs run by a company which invites law enforcement and security agencies from around the world to meet with companies that built those technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The last one of those fairs was held “not too far from Washington, DC” and 35 US federal agencies were present, along with representatives of 43 different countries, she said, with ” no questions asked.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A lot of these technologies are being built or developed primarily by western companies with western governments as prime customers, but are being sold blatantly to countries like Azerbaijan (which has been reported recently for its crackdown on free expression) and others, she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a major customer, the United States needs to demand transparency on the part of these companies about where those technologies are being sold and used, MacKinnon said, adding, “Internet freedom starts at home.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a need to demand that governments be accountable and transparent on what surveillance technologies exist and how they are being deployed and used, and not only at the domestic level, but globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an example of transparency, she cited the &lt;a class="external-link" href="http://www.google.com/transparencyreport/removals/copyright/?hl=en_US"&gt;&lt;span class="visualHighlight"&gt;Google transparency report&lt;/span&gt;&lt;/a&gt;, which lists the number of requests from governments around the world both for user information and takedown requests. MacKinnon said the top requesters were democratic governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All companies should be requested to provide similar transparency reports, she said, and governments should also issue transparency reports about the number of requests they are making. “There should be ways to do this without compromising active investigation,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;MacKinnon recently published a book entitled, “Consent of the Networked.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet: Shopping Mall or Public Square&lt;br /&gt;&lt;/b&gt;A panel discussion addressed the protection of human rights in a world of global networks in which two visions of the internet were described. One is§ the internet as a shopping mall, mainly owned by private interests, the other one as a public square.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Robert Whelan from the International Committee of the Red Cross raised the concept of informed consent in the context of victims of armed conflicts. The victims of violation of human rights law have the right to know what information is going to be used about their experience, or their story, he said. They should know where this information will go, who is going to see it, have access to it, where that information is going to be replicated or reproduced and when will that information will be deleted, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The challenge is to put the civilian victims at the centre, and in control of the information about their experience. This is at odds with the concept of free exchange of information, he said, citing as examples the “re-tweeting” and reproducing of articles, photographs and names on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nicolas Seidler from the Internet Society said the internet is not “the wild west” but just the digital version of the real world, and as such is subject to the same human rights instruments. The challenge is that no new rights are needed; rather the need is to implement and reinforce human rights standards on the internet, he said. Governments’ management of the internet is but a reflection of their overall management, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For Brett Solomon, executive director of &lt;a class="external-link" href="https://www.accessnow.org/"&gt;&lt;span class="visualHighlight"&gt;Accessnow.org&lt;/span&gt;&lt;/a&gt;, a US-based nongovernmental organisation pushing for digital freedom, several issues are laid out in the “&lt;a class="external-link" href="https://s3.amazonaws.com/access.3cdn.net/d9369de5fc7d7dc661_k3m6i2tbd.pdf"&gt;&lt;span class="visualHighlight"&gt;Silicon Valley Standard&lt;/span&gt;&lt;/a&gt;” [pdf]. The standard was developed after the Silicon Valley human rights conference held in San Francisco in 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The effort to protect rights holders and copyrights by the copyright industry, which he qualified as “voracious,” is putting internet intermediaries at risk of liability, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Effective internet security is essential, he said, as “there is no freedom of speech unless people feel safe and secure.” He called for the right to encryption of web activity. “Technology companies must provide a basic level of security … to their users by default and resist bans and curtailments of the use of encryption,” the standard says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;David Sullivan, policy and communications director for the &lt;a class="external-link" href="http://www.globalnetworkinitiative.org/"&gt;&lt;span class="visualHighlight"&gt;Global Network Initiative&lt;/span&gt;&lt;/a&gt; (GNI) presented the initiative, which gathers information and communication technology stakeholders and provides a framework for companies based on international standards. Companies that commit to GNI standards also commit to being assessed independently, he said, on how they implement principles, if they have policies and procedures in place to meet standards and accountability commitments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sullivan cited the Stop Online Piracy Act (SOPA), the failed US legislation, as a policy effort aimed at solving one problem around copyright infringing material that is was “going to have deeply worrisome repercussions around the world as other countries look at that example in ways that could have deeply problematic consequences in terms of censorship.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year, the human right activists participating in the Internet Freedom Fellows programme are: Dishad Othman from Syria, Pranesh Prakash from India, Koundjoro Gabriel Kambou from Burkina Faso, Sopheap Chak from Cambodia, Andreas Azpurua from Venezuela and Emin Milli from Azerbaijan. Short &lt;a class="external-link" href="http://geneva.usmission.gov/us-hrc/internet-freedom-fellows-2012/"&gt;&lt;span class="visualHighlight"&gt;biographies are here&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emin Milli, a writer who was imprisoned for expressing his opinion in Azerbajian, said he looked at internet as a public square and not a shopping mall but the situations vastly differ from one country to the other, he added, as contexts are very different. The Eurovision song contest, which was held in the country this year, was a great opportunity for civil society, with the help of international media to draw attention to the situation of Azerbaijan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dishad Othman, a Syrian activist and IT engineer, characterised himself as a security activist as he is helping people to use tools to hide themselves on the internet. Sharing experiences from different countries is very important, he said, calling for a larger group of international activists who could help people but also technology companies to provide a safer environment and to promote freedom on the internet so that “all people can benefit from it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, programme manager at the Centre for Internet and Society in Bangalore, said people have tools to protect themselves from surveillance that they do not use. In particular, he said, many journalists do not know how to use those tools, especially in the context of journalists’ computers and files that are seized, endangering their sources.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-freedom-at-home'&gt;https://cis-india.org/news/internet-freedom-at-home&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-06-28T05:27:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/no-more-blocking-of-websites">
    <title>No more blocking of entire websites?</title>
    <link>https://cis-india.org/news/no-more-blocking-of-websites</link>
    <description>
        &lt;b&gt;The Madras HC has taken one step to ensure that entire websites are no longer blocked, but it doesn't mean that arbitrary takedowns will cease. &lt;/b&gt;
        &lt;p&gt;&lt;span&gt;CIS research is quoted in this article by Danish Sheikh published in the &lt;/span&gt;&lt;a href="http://www.business-standard.com/india/news/no-more-blockingentire-websites/478261/"&gt;Business Standard on June 24, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vimeo’s back. As is Pastebin, and Pirate Bay and IsoHunt. For your, you know, legitimate file-sharing practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having been approached by a consortium of Internet Service Providers, the Madras High Court has issued a welcome clarification of its “John Doe order” issued in favour of RK Productions for the films 3 and Dammu. Designed to protect against potential offences by yet-unidentified persons, the sweeping scope of the order left a very wide, undefined scope to ISPs dealing with potentially infringing material. The ISPs over-complied, a host of file-sharing websites were barred from Indian servers overnight — oh, and “Anonymous” got more annoyed. Note here that the vagueness of the order extended to not specifying any infringing websites in particular.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the representation from the ISPs, the Court has provided them a specific directive. The new order states that the interim injunction was granted only with respect to the particular URL which featured the infringing movie, and not the entire website. No more blocking entire websites — the ISPs are now required to be informed about the particulars of where the infringing movie is kept within 48 hours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The clarification couldn’t have come at a more vital time, and will hopefully serve as a precedent to curb an alarming practice that can be traced back to 2002. Back then, the Delhi High Court was approached in a matter concerning the unauthorised transmission of Ten Sports by unlicensed cable operators. The result was the Court’s first John Doe order with respect to media transmission: a commissioner was appointed to search premises of unnamed cable operators and seize evidence by taking photographs and video films. This particular order was then relied on by the Court almost a decade later in pre-emptively injuncting piracy of UTV Software Communication’s Saat Khoon Maaf and Thank You. The trend escalated from there, with similar orders being obtained for a number of films including Don 2, Bodyguard, Kahaani and Department, to name a few.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where the last few years have seen a steadily rising output of orders largely from the Delhi and Madras High Court, just last week it was the Bombay High Court that joined the fray. Approached by Viacom 18 Motion Pictures, it passed a John Doe pre-emptively banning the piracy of Viacom’s Gangs of Wasseypur prior to its June 22 release. Considering the Bombay High Court’s noted apprehension in granting ex-parte orders, this decision looked set to add further momentum to the John Doe juggernaut.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, we get the Madras High Court’s welcome restraint. That vague injunctions are an abuse of process is a principle that has been noted time and again, with the Delhi High Court even noting that “vague and general injunction of anticipatory nature can never be granted”. This is coupled with the larger access to information and free speech issue that has been raised more vocally following the ire with the mass block of file-sharing websites. The antecedents to this scenario may well be the media infrastructure cases of the ‘50s and ‘60s, where newspaper content was indirectly being regulated by way of regulation of newsprint, advertisement space, etc. Recognising these indirect control mechanisms in their ultimate speech-restricting form, the Supreme Court struck them down as unreasonable restrictions to the right to free expression under Article 19(1)(a) of the Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prevention isn’t always better than cure. The Madras High Court has thankfully taken one step in the direction. What is left dangling is the other big question — that of the intermediary rules. There may now be a barrier to blocking of entire websites in this manner, but as so many internet users have found, one doesn’t have to necessarily approach the Courts if they want internet service providers to take down content: the ISPs are happy to do that for free. As a Centre for Internet and Society study found, takedown requests sent to ISPs, no matter how trivial or flimsy, will for the most part be met by acquiescence of the order. Without appropriate checks and balances, the intermediary will over-comply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the ISPs’ intervention before the Madras High Court is an encouraging sign, it doesn’t mean that the arbitrary takedowns under the intermediary rules will cease to happen. The digital media site Medianama quotes an ISP representative citing concern that ISPs were being wrongfully vilified on the Internet — and (significantly) that it would adversely impact their business if video streaming was disabled for users. The same commercial considerations wouldn’t likely stand when it comes to the bit-by-bit requests that come forward under the IT rules. Along with focusing attention on the High Court’s clarification, we need to sustain the movement to strike down the intermediary rules and push for a more transparent and fair mechanism.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/no-more-blocking-of-websites'&gt;https://cis-india.org/news/no-more-blocking-of-websites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-06-26T09:47:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you">
    <title>UID: Are your biometric I-cards stacked against you?</title>
    <link>https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you</link>
    <description>
        &lt;b&gt;Imagine a rural family of five. Mom. Dad. Two kids. And Grandma. Assume too that they are below the poverty line. The day is coming when this family will have to give its biometrics out to myriad agencies. &lt;/b&gt;
        &lt;p&gt;&lt;a href="http://articles.economictimes.indiatimes.com/2012-06-24/news/32382928_1_biometrics-uidai-national-population-register"&gt;This article by M Rajshekhar was published in the Economic Times on June 24, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;You know that Nandan Nilekani's &lt;a href="http://economictimes.indiatimes.com/topic/Unique%20Identification%20Authority%20of%20India" target="_blank"&gt;&lt;span&gt;Unique Identification Authority of India&lt;/span&gt;&lt;/a&gt; (UIDAI) or the Registrar General's &lt;a href="http://economictimes.indiatimes.com/topic/National%20Population%20Register" target="_blank"&gt;&lt;span&gt;National Population Register&lt;/span&gt;&lt;/a&gt; (NPR) has been collecting biometrics for a while now. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; But a set of other departments have entered the fray. This ranges from  the PDS department, ministry of rural development (MoRD), states'  education departments, the Rashtriya Swasthya Bima Yojana (RSBY), banks,  the department of social welfare, the post office...they are all  collecting biometrics (see Agencies Collecting Biometrics Right Now). &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; This is the latest iteration in India's tryst with biometrics. From a beginning where only the &lt;a href="http://economictimes.indiatimes.com/topic/NPR" target="_blank"&gt;&lt;span&gt;NPR&lt;/span&gt;&lt;/a&gt; — and, a little later, the &lt;a href="http://economictimes.indiatimes.com/topic/UIDAI" target="_blank"&gt;&lt;span&gt;UIDAI&lt;/span&gt;&lt;/a&gt; — were to capture biometrics, we have now reached a point where myriad  departments and ministries are camping in India's villages and towns,  capturing &lt;a href="http://economictimes.indiatimes.com/topic/fingerprints" target="_blank"&gt;&lt;span&gt;fingerprints&lt;/span&gt;&lt;/a&gt; and iris images. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt; Identity Thieves &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; There was to be one large database. Now, we are moving to a system  where multiple agencies capture and store biometrics data in myriad  servers. This is amplifying the risk of biometric theft. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; As Sunil Abraham, the head of Bangalore-based Centre for Internet and  Society says, "If biometrics is used as authentication factor then it  would be possible for a criminal to harvest your biometrics — such as  using a glass to collect fingerprints — without your conscious  cooperation. Or the registrar can cache your biometrics and duplicate  transactions." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; As the number of databases containing biometrics rises, the risk of  this information leaking out increases. There have been complaints  against an UIDAI enrolment agency called Madras Security Printers that  it had sold data to private companies. There were also charges that  enrolment agencies had outsourced the enrolment work to other companies,  which they are not allowed to do. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; What complicates matters further is there are not many safeguards. The  country doesn't have a policy on how biometrics can be captured, used,  stored and destroyed. But before we get deeper into that story, it is  useful to understand why multiple departments have begun collecting  biometrics. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt; Biometric Rush &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; According to a senior bureaucrat who recently retired from the ministry  of planning, the answer lies in the 2014 elections. "For the  government, cash transfers are the large reforms that they think UPA 2  can point towards in the next elections. For this reason, they need all  this up and running before 2014." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; However, over the past few months, parts of the government are  increasingly unsure if UIDAI and NPR will meet their targets. "I do not  think the 2014 target can be met at all," says a senior official in the &lt;a href="http://economictimes.indiatimes.com/topic/National%20Informatics%20Centre" target="_blank"&gt;&lt;span&gt;National Informatics Centre&lt;/span&gt;&lt;/a&gt; (NIC). "We have to enroll another 800 million people. Then, we have to  deduplicate them. Then, we have to make the cards and distribute them." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; This is one reason why a set of government departments are configuring  their own alternatives. Take the Department of Financial Services (DFS).  It has been testing an online, biometric system for cash payments in  Haryana's Mewat district for months now. Here, each bank will store its  customers' biometric information in its own servers. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; If a customer of bank A goes to a banking correspondent (BC) agent of  bank B, his biometrics would be forwarded by bank B to bank A for  authentication. Once authenticated, the transaction will be completed.  "We should be rolling the new system out nationally from July or  August," says the bureaucrat. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; The rural development ministry is also testing its payment system. Once  the local administration tells the ministry about who worked how many  days, the ministry will be able to put money into their accounts  automatically via a payment gateway. Right now, this is done manually  with the block development officer and sarpanch making out the cheques. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; This pilot, says DK Jain, joint secretary, MoRD, started 3-4 months ago  in parts of Gujarat, Karnataka, Odisha and Rajasthan. In another six  months, it will be available across the country. And then, there is the  PDS. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; Here, different states are putting different systems in place. Andhra,  says a senior mandarin in the food ministry, is going with UID, Haryana  is looking at smart cards, Jharkhand is going with Aadhaar, MP and  Gujarat are testing food coupons, while Chhattisgarh has decided to use  RSBY and Orissa has chosen NPR. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; Apart from this, data is also being collected by the RSBY and BC  companies on behalf of the banks handling welfare payments, or  scrambling to meet their financial inclusion targets. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Sunil Abraham is quoted in this article&lt;/i&gt;.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you'&gt;https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-26T09:33:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/securing-e-governance-event-report">
    <title>Securing e-Governance</title>
    <link>https://cis-india.org/internet-governance/securing-e-governance-event-report</link>
    <description>
        &lt;b&gt;On June 16, 2012, Privacy India in partnership with the Centre for Internet &amp; Society, Bangalore, International Development Research Centre, Canada, Privacy International, UK and the Society in Action Group, Gurgaon organised a public discussion on “Securing e-Governance: Ensuring Data Protection and Privacy”, at the Ahmedabad Management Association. &lt;/b&gt;
        &lt;p&gt;The conversation brought together a cross section of citizens, lawyers, activists, researchers, academia and students.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Prashant.jpg/@@images/7d25500b-2486-4674-9b83-5584b672cf38.jpeg" alt="Prashant Iyengar" class="image-inline" title="Prashant Iyengar" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Prashant Iyengar, &lt;/b&gt;&lt;b&gt;Assistant Professor, Jindal Global Law,&lt;/b&gt; opened the conference with an explanation of Privacy India’s mandate to  raise awareness, spark civil action and promote democratic dialogue  around privacy challenges and violations in India. He summarized the  series of eight consultation previously organized across India in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary"&gt;Kolkata&lt;/a&gt; on January 23, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore"&gt;Bangalore&lt;/a&gt; on February 5, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad"&gt;Ahmedabad&lt;/a&gt; on March 26, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report"&gt;Guwahati&lt;/a&gt; on June 23, 2011, in &lt;a href="https://cis-india.org/internet-governance/privacy-chennai-report.pdf/view"&gt;Chennai&lt;/a&gt; on August 6, 2011, in &lt;a href="https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill"&gt;Mumbai&lt;/a&gt; on January 21, 2012, in &lt;a href="https://cis-india.org/internet-governance/all-india-privacy-delhi-report"&gt;New Delhi&lt;/a&gt; on February 3, 2012 and again in &lt;a href="https://cis-india.org/internet-governance/high-level-privacy-conclave"&gt;New Delhi&lt;/a&gt; on February 4, 2012.&lt;/p&gt;
&lt;p&gt;He described an egregious instance where the State Government of  Karnataka, announced a plan to “post on its website all details of (1.51  crore) ration cardholders in the state”, to weed out duplicate ration  cards and promote transparency. Details posted on the website would  include the “ration card number, category of card (BPL/APL), names and  photographs of the head and other members of a family, address, sources  of income, LPG gas connection and number of cylinders in  village/taluk/district wise.” An official said, “This would also work as  a marriage bureau, for instance, a boy can see a photograph of a girl  on the website and see whether she suits him”.&lt;a href="#_ftn1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;He described another embarrassing incident, which took place in 2008.  Sixteen surveillance cameras were stolen from the Taj Mahal. After they  had been replaced, in December 2010, it was reported that all of the  CCTVs in the Taj Mahal had stopped working due to a “virus attack” on  their computer systems. The district administration and the police  department were apparently in disagreement as to who bore the burden of  their maintenance.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Prof. Subhash Bhatnagar, Advisor Center for e-Governance IIM, Ahmedabad&lt;/b&gt;,  dismissed the notion that privacy is irrelevant in India. A survey on  e-governance, of 50,000 people conducted in major cities of India shows  that confidentiality and security of data were among the top 3 concerns  among 20 choices. He discussed various mission mode projects in the  National e-Governance Plan that holds and shares large amounts of data  on individuals and business. He referred to his personal experience when  enrolling for UID. He noticed that the box concerning consent for  sharing of information with third parties was, by default, automatically  ticked. When he asked the UID staff, they mentioned that the software  does not allow for enrollment to continue if the box is not ticked. He  called for increased vigilance among citizens, a phone helpline  dedicated to resolution of privacy intrusions and sensitizing designers  of e-Governance projects.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Subhash.jpg/@@images/1bc58ead-4318-430d-bc78-b892513ad498.jpeg" alt="Subhash Bhatnagar" class="image-inline" title="Subhash Bhatnagar" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Nityesh.jpg/@@images/2e28525b-1577-4abb-96c8-68284ac72f46.jpeg" alt="Nityesh Bhatt" class="image-inline" title="Nityesh Bhatt" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr. Nityesh Bhatt, Sr. Associate Prof and Chairperson-Information   Management Area, Institute of Management, Nirma University, Ahmedabad,&lt;/b&gt;&lt;i&gt; &lt;/i&gt;stressed   the importance of limiting access of information on a need-to-know   basis, which is one of the most fundamental security principles. He   described various characteristics of information security management   including: planning, policy, programs, protection, people and project   management. Lastly, he recommended ‘SETA’ as an essential program,   designed to reduce the incidence of accidental security breaches by   employees, contractors, consultants, vendors, and business partners. A   SETA program consists of three elements: security education, security  training, and security awareness. It can improve employee behavior and  enables the organization to hold employees accountable for their  actions.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Dr. Neeta Shah, &lt;/b&gt;&lt;b&gt;Director (e-Governance) Gujarat Informatics Limited,&lt;/b&gt;&lt;i&gt; &lt;/i&gt;described   the extent of e-governance initiatives in Gujarat (there are more than   100 e-governance applications running) and its impact. She discussed   successful e-governance initiatives that have helped solve critical   problems such as the online teacher application process, which   accelerates the recruitment process of primary teachers.&lt;/p&gt;
&lt;p&gt;E-governance applications of various departments ensure security of data and privacy protection through the following measures:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Network security (NIPS, Firewalls, content filtering, HIPS, antivirus, etc.)&lt;/li&gt;
&lt;li&gt;Data security (robust SAN environment with high raid levels to prevent any data loss)&lt;/li&gt;
&lt;li&gt;Application security (audited by empanelled TPA)&lt;/li&gt;
&lt;li&gt;DR/BCP provisioning (real-time data is replicated to DR site in case  of any physical calamity or damage to resources at primary site, backup  exists at remote different seismological locations)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;When  designing e-government projects, the government tends to think about  security of the system, but not privacy of the data. Security in the  minds of the government is achieved through strengthening  infrastructure, but they often overlook the human dynamic.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Neeta.jpg/@@images/6f2d5dba-dac7-4743-ad72-72b47f919575.jpeg" alt="Neeta Shah" class="image-inline" title="Neeta Shah" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Gopalkrishnan Devnathan (Kris dev), Co-founder, International Transparency and Accountability Network,&lt;/b&gt;&lt;i&gt; &lt;/i&gt;described  e-Governance as the application of Information and Communication  Technology for delivering government services. It involves the  integration of various systems and services between  Government-to-Citizens, Government-to-Business, Government-to-Government  as well as back office processes and interactions within the entire  government framework. E-governance initiatives can ensure privacy and  security through:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Securing data/transaction using Smart Card with triple access control, Card, PIN and Biometrics (multimodal)&lt;/li&gt;
&lt;li&gt;Mirrored data storage with proper security&lt;/li&gt;
&lt;li&gt;Indelible audit trail using encrypted flat file&lt;/li&gt;
&lt;li&gt;Prevent server intrusion and data theft upfront rather than do post-mortem analysis&lt;/li&gt;
&lt;li&gt;Information on data accessed can be communicated on real time basis using ICT tools&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Lastly, he&lt;i&gt; &lt;/i&gt;identified the usefulness, inhibitions and potential security solutions for the Unique Identification System.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Gopalakrishnan.jpg/@@images/cb006e36-05e6-410f-87de-a179119a5023.jpeg" alt="Gopalakrishnan Devnathan" class="image-inline" title="Gopalakrishnan Devnathan" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Anindya.jpg/@@images/1f025dc0-c8bd-4df9-af39-dbabdfb83521.jpeg" alt="Anindya Kumar" class="image-inline" title="Anindya Kumar" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Anindya Kumar Banerjee, Regional Manager- East, CG &amp;amp; MP at Ncomputing Inc., &lt;/b&gt;discussed a comparative analysis of e-governance initiatives in India. He analyzed various factors such as ease of use, simplicity of procedures, time savings compared to manual, affordable cost of service and reduction in corruption. He described the difference infrastructural threats of security and privacy in e-Governance.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr. Mrinalini Shah, Professor of Operations Management at Institute of Management Technology, Ghaziabad&lt;/b&gt;&lt;i&gt; &lt;/i&gt;identified  the slow legal system and multiple jurisdiction system as a challenge  for privacy and security of data and implementations of suitable access  controls and authorization as a helping factor.&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Mrinalini.jpg/@@images/efdbd8d4-d5d6-4a3d-9360-6aaa79acfaa2.jpeg" alt="Mrinalini Shah" class="image-inline" title="Mrinalini Shah" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Utkarsh.jpg/@@images/28ea0c0e-9ede-436c-bca6-12fd6f748c37.jpeg" alt="Utkarsh Jani" class="image-inline" title="Utkarsh Jani" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Utkarsh Jani, Advocate, Jani Advocates&lt;/b&gt;, described the relevant section of the Information Technology Act (ITA) relating to privacy and the political and social challenges surrounding the right to privacy. He discussed the right to privacy vis-à-vis data protection.  Though the ITA does enforce a level of data protection, it is far from flawless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ITA lacks the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The definition and classification of data types.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The nature and protection of the categories of data.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Data controllers and data processors have distinct &lt;/li&gt;
&lt;li&gt;Clear restrictions on the manner of data collection.&lt;/li&gt;
&lt;li&gt;Clear guidelines on the purposes for which the data can be put and to whom it can be sent.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Standards and technical measures governing the collection, storage, access to, protection, retention and destruction of data.&lt;/li&gt;
&lt;li&gt;It does not provide strong safeguard and penalties against the aforesaid breaches. &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;S&lt;b&gt;unny Vaghela, Founder and CTO, TechDefence Pvt. Ltd&lt;/b&gt;., provided a hacker’s perspective to security and privacy issues in e-governance. Cyber crimes such as privacy violations and data breaches are increasing because of the dependence on complex computer infrastructures. Complex computer infrastructures make systems vulnerable because if one application is hacked, the entire network can be accessed and compromised.&lt;/p&gt;
&lt;p&gt;He conducted a live demonstration, showing how simple it is to hack into a government website. From his personal experience as an ethical hacker, he stated that government agencies are extremely negligent about the privacy and the security of data. A major concern with e-governance websites is that they not designed with privacy in mind, leaving the personal and private details of citizens vulnerable.&lt;/p&gt;
&lt;p&gt;He called for full penetration testing and vulnerability assessment of  e-governance portals in order to maintain the privacy of citizens and  protect government data. Some government websites that were hacked  include AMC e-governance (was awarded one best e-governance award in  2010), CBI server and the Income Tax of India server.&lt;/p&gt;
&lt;p&gt;Lastly, he described the frequent mistakes made by the government in  e-Governance projects. The government started using the e-Governance  systems in 2003. Typically, three things are a component of the  application: the person, the source code and the database, but the  security is on the network. Governments work on developing the network  to be secure, but they often overlook the application. A solution to  this could be the use of high interaction honey pots.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Sunny.jpg/@@images/3fbba656-7cad-49f4-8563-3bc50e958198.jpeg" alt="Sunny Vaghela" class="image-inline" title="Sunny Vaghela" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/NishaThompson.jpg/@@images/f03f05bb-ba12-421f-a921-47f4b80b17c2.jpeg" alt="Nisha Thompson" class="image-inline" title="Nisha Thompson" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Nisha Thompson, Data Project Manager at Arghyam/ India Water Portal&lt;/b&gt;, discussed the increased amount of data generated through e-governance initiatives and its impact. When more data is generated and collected, politics and privacy become intertwined. There can be a conflict between opening up data and privacy thus; one needs to decide on parameters. For example, with regards to privacy and national security, parameters should be in place to determine where privacy ends and the public good starts. In India, this line does not begin with the individual as it does in many contexts. Collective privacy in India is important. She described various online tools that increase transparency and awareness such as: Transparency Chennai, India Governs and I Paid a Bribe.&lt;/p&gt;
&lt;p&gt;Over the course of the day, participants engaged in lively discussion on various issues such as the objectives and features of e-governance, examples of e-governance projects, and the parameters, problems, loopholes and tensions in e-governance projects.&lt;/p&gt;
&lt;p&gt;Participants response to privacy concerns have to a large extent focused on the fact that e-Governance is a double-edge sword. E-governance initiatives are an invariable tool for ensuring wider participation and deeper involvement of citizens, institutions, NGOs as well as private firms in the decision making process. However, the political and regulatory environment must be strengthened.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_participants.jpg/@@images/cc15001d-bf85-4b07-9eb8-c87cb6dcc50f.jpeg" alt="Participants" class="image-inline" title="Participants" /&gt;&lt;/p&gt;
&lt;h3&gt;About Privacy India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy India was established in 2010 with the objective of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India. One of our goals is to build consensus towards the promulgation of comprehensive privacy legislation in India through consultations with the public, policymakers, legislators and the legal and academic community.&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;&lt;a href="#_ftnref1"&gt;[1]&lt;/a&gt; Nagesh Prabhu, A way to check bogus ration cards, THE HINDU, September 18, 2010, &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/article696087.ece"&gt;http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/article696087.ece&lt;/a&gt; (last visited Oct 23, 2011).&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click below to download the following resources:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="resolveuid/fc0269aba5d44a5488c08aefe92d58d2" class="internal-link"&gt;E-Governance, Identity and Privacy&lt;/a&gt; [PDF, 253 Kb]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/securing-e-governance-programme.pdf" class="internal-link"&gt;Event Brochure&lt;/a&gt; [PDF, 1618 Kb]&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/securing-e-governance-event-report'&gt;https://cis-india.org/internet-governance/securing-e-governance-event-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>natasha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-26T06:45:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/consumer-privacy-delhi">
    <title>Privacy Matters — Consumer Privacy</title>
    <link>https://cis-india.org/internet-governance/consumer-privacy-delhi</link>
    <description>
        &lt;b&gt;Privacy India, in partnership with the Centre for Internet &amp; Society, International Development Research Centre, Society in Action Group and Privacy International, invites you to a public conference focused on discussing the challenges and concerns to consumer privacy in India. The event will be held at the Indian International Centre, New Delhi on Saturday, July 7, 2012, from 9 a.m. to 5 p.m.&lt;/b&gt;
        &lt;p&gt;According to the Consumer Protection Act, 1986, a consumer is a broad  label for any person who buys any goods or services for consideration  with the intent of using them for a non-commercial purpose. Certain  services that consumers use may, by their very nature, put an  extraordinary amount of sensitive personal information into the hands of  vendors.&lt;/p&gt;
&lt;p&gt;Consumer privacy is concerned with accuracy of how a consumers  information is collected and used. Because a consumers relationship with  another entity is based on an exchange along consented terms, a breach  in consumer privacy can be constituted as an action that was not agreed  to. In the age of data collection – a breach in privacy occurs when  information is used in different ways than was intended. Consumer  privacy in India is determined at the sectoral level, and differs  depending on the services that is provided for.&lt;/p&gt;
&lt;p&gt;As corporations sell data banks, ISP's expose consumer habits, or  ones personal information falls in the wrong hands – the consequences  are far reaching, and can result in spamming, unwanted marketing, theft,  or the violation can impact an individual's ability to buy a home,  potential employment opportunities, or gain access to credit.&lt;/p&gt;
&lt;p&gt;In India, the right to privacy has been a neglected area of study and  engagement. Although sectoral legislation deals with privacy issues,  India does not as yet have a horizontal legislation that deals  comprehensively with privacy across all contexts. The absence of a  minimum guarantee of privacy is felt most heavily by marginalized  communities, including HIV patients, children, women, sexuality  minorities, prisoners, etc. - people who most need to know that  sensitive information is protected.&lt;/p&gt;
&lt;p&gt;Since June 2010, Privacy India in collaboration with Privacy  International, based in London, has been conducting workshops and  engaging in public awareness. Participants include policy makers,  researchers, sectoral experts, NGOs, and the public to discuss and  deliberate different questions of privacy, its intersections and its  implications with our everyday life. The discussions have ranged from  topics of online privacy to minority rights and privacy and e-Governance  initiatives privacy.  The workshops have been organized in different  cities - Bangalore, Guwahati, Mumbai, Delhi, Kolkata, Ahmedabad,  Chennai, Goa, etc.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/consumer-privacy-event" class="internal-link"&gt;Click here&lt;/a&gt; for the agenda&lt;/p&gt;
&lt;p&gt;Please confirm your participation with &lt;a class="external-link" href="mailto:natasha@cis-india.org"&gt;natasha@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Download the invite &lt;a href="https://cis-india.org/internet-governance/consumer-privacy-invite" class="internal-link"&gt;here&lt;/a&gt; [PDF, 160 Kb]&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Download our research &lt;a href="https://cis-india.org/internet-governance/consumer-research.pdf" class="internal-link"&gt;here&lt;/a&gt; [PDF, 178 Kb]&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/consumer-privacy-delhi'&gt;https://cis-india.org/internet-governance/consumer-privacy-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-07-31T10:55:30Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/net-loss">
    <title>NET LOSS </title>
    <link>https://cis-india.org/news/net-loss</link>
    <description>
        &lt;b&gt;Unless the IT Act is amended and the definition of ‘offensive’ online content clearly set out, attempts to gag the Internet will continue in our country, argues Abimanyu Nagarajan&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.telegraphindia.com/1120620/jsp/opinion/story_15632655.jsp#.T-gA68XvqTZ"&gt;The article was published in the Telegraph on June 20, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Lately, the Indian government seems to be trying its best to control the Internet. In the past few weeks, dozens of file hosting or sharing sites have been blocked by court order. Earlier this year Union human resource development minister, Kapil Sibal, came down heavily on social networking sites and the Internet and waxed eloquent on the need to weed out “offensive” content there.&lt;/p&gt;
&lt;p&gt;In fact, this week Google said that there was a 49 per cent increase in requests for content removal from India in the second half of 2011 compared to the first half. Of the 101 requests to take down 255 items, only five were made by the courts. The rest were by politicians and policemen.&lt;/p&gt;
&lt;p&gt;In the now infamous cartoon case, a professor of Calcutta’s Jadavpur University was arrested for circulating a cartoon relating to chief minister Mamata Banerjee via email. One of the charges levelled against him was that he was culpable under Section 66A of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p&gt;Indeed, experts feel that the IT Act and its vague and loose definition of what constitutes “offensive” content on the Net or on a social networking site can easily be abused by those who wish to control online content.&lt;/p&gt;
&lt;p&gt;Everything related to the Internet comes under the purview of the IT Act. As cyber law expert Pavan Duggal says, “The IT Act, 2000, covers all aspects pertaining to the use of computers, computer systems, computer networks, computer resources, communication devices as also data and information in the electronic format.”&lt;/p&gt;
&lt;p&gt;Social networking sites and what gets posted there also come under the act. Section 2(1)(w) of the act uses the term “intermediary” to mean any legal entity that receives, stores or transmits a message, or provides any service with respect to that message on behalf of another person. By this definition social networking sites are “intermediaries” and there are strict sets of rules and guidelines listed under Section 43(a) of the act that they have to follow if they want to operate in India.&lt;/p&gt;
&lt;p&gt;But what infuriates IT experts most is Section 66A of the IT Act, which leaves the term “offensive” utterly vague and fluid. It states: “Any person who sends, by means of a computer resource or a communication device (a) any information that is grossly offensive or has menacing character; (b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device; (c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages shall be punishable with imprisonment for a term which may extend to three years and with fine.”&lt;/p&gt;
&lt;p&gt;In addition, Rule 3 of the IT Intermediaries Guidelines, 2011, lays down that all Internet service providers, telecom companies, email and blogging services must take down content that is “harmful, harassing, blasphemous, defamatory…”. In fact, this provision allows you to send a takedown notice for any content that may have offended you and the item has to be deleted within 36 hours.&lt;/p&gt;
&lt;p&gt;This is draconian, say IT experts. As Prashant Mali, a cyber law expert and president of Cyber Law Consulting, puts it, “The problem is that the offences listed under Section 66A are non-bailable, cognisable offenses. Technically speaking, since nothing is specific, you can always be arrested.”&lt;/p&gt;
&lt;p&gt;Adds advocate Apar Gupta, a partner at law firm Advani and Company, “Section 66A is vague and stringent at the same time.”&lt;/p&gt;
&lt;p&gt;The extent to which these provisions in the IT Act can be abused was recently demonstrated by the Bangalore-based Centre for Internet Society (CIS). Sunil Abraham, executive director of CIS, talks about how the group flagged content as being offensive on a variety of sites, even though they weren’t so.&lt;/p&gt;
&lt;p&gt;“We sent takedown notices to e-commerce, content hosting, and news media sites,” recalls Abraham. “And in most cases, we found the intermediaries were very risk averse. For example, there was one site that was talking about game theory — a mathematics model on decision making. As part of the article, they had linked out to a few gambling sites to support their research. We sent notices saying that the site promoted gambling and was therefore offensive. They didn’t just remove the links, they took the whole site down.”&lt;/p&gt;
&lt;p&gt;Mahesh Murthy, CEO of Pinstorm, a digital advertising firm, points out that this means individuals are being allowed to do what should ideally be done by a court of law. “People who are not part of the judiciary, who are not elected officials, are taking decisions on censorship.”&lt;/p&gt;
&lt;p&gt;Gupta reveals that the sites are not even required to inform a user that their content is being taken down. “The content vanishes into a black hole. All they have to do is remove the flagged content within 36 hours of it being reported,” he says.&lt;/p&gt;
&lt;p&gt;IT experts have been crying themselves hoarse demanding that the government amends the IT Act and clearly sets out definitions for what constitutes “offensive” content. As Duggal says, “It will do immense service to the nation if the IT Act, 2000, is amended so as to provide more definitions, illustrations and parameters of what constitutes offensive content. Since the act is silent on what constitutes offensive material, the scope for abuse of Section 66A remains wide open.”&lt;/p&gt;
&lt;p&gt;So will the government heed the demand of cyber law professionals and other experts and amend the IT Act? That remains to be seen. But unless the government changes its posture vis-à-vis the Internet, and shifts from its position that it’s something that needs to be controlled, few believe that an amendment in this regard will be forthcoming any time soon.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/net-loss'&gt;https://cis-india.org/news/net-loss&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-25T06:15:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/censorship-2020">
    <title>CENSORSHIP 2020:  The Future of Free Speech Online</title>
    <link>https://cis-india.org/news/censorship-2020</link>
    <description>
        &lt;b&gt;The DC Chapter of the Internet Society, in conjunction with the U.S. Department of State, invite you to an informal discussion on CENSORSHIP 2020: The Future of Free Speech Online on Monday, June 25, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://cct.georgetown.edu/300237.html"&gt;Published in Communication, Culture &amp;amp; Technology&lt;/a&gt;&lt;/span&gt;. For more info, &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://http//censorship2020.eventbrite.com/"&gt;visit here&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Arab Spring demonstrated how Internet technologies such as Twitter, blogs, and Facebook could be used to mobilize protesters, publicize corruption and human rights violations, and connect activists and emigres. But in Iran , Syria , and elsewhere, we have seen repressive governments use the Internet to identify and track dissidents, to spread disinformation, and defame political opponents. Will the technologies of anonymization win out over new digital monitoring tools? Will new wireless data technologies foster democracy--or lead to more effective tracking and surveillance? Join us for an informal discussion with six people fighting for free speech on the Internet in their country--and around the world:&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;ul&gt;
&lt;li&gt;Dlshad Othman (Syria), an activist and IT engineer providing Syrians with digital security tools&lt;/li&gt;
&lt;li&gt;Pranesh Prakash (India), a blogger and cyberlaw expert who is promoting a free Internet and online freedom of speech.&lt;/li&gt;
&lt;li&gt;Koundjoro Gabriel Kambou (Burkina Faso), a journalist at Lefaso.net, is promoting human rights, democracy particularly among young people.&lt;/li&gt;
&lt;li&gt;Sopheap Chak (Cambodia), the Deputy Director of the Cambodian Center for Human Rights (CCHR) and one of Cambodia ’s leading bloggers.&lt;/li&gt;
&lt;li&gt;Andres Azpurua (Venezuela) has trained 300 youth on using Web 2.0 tools to publicize human rights violations.&lt;/li&gt;
&lt;li&gt;Emin Milli (Azerbaijan), a writer who is using YouTube, Facebook and Twitter to spread information about human rights violations.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="_mcePaste"&gt;Moderator: Ambassador (ret.) Richard Kauzarlich, Deputy Director, Terrorism, Transnational Crime and Corruption Center (TraCCC), George Mason University, &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://traccc.gmu.edu/"&gt;http://traccc.gmu.edu/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="visualHighlight"&gt;&lt;span style="text-align: justify; "&gt;Hosted by the Communication, Culture and Technology Program of Georgetown University 2nd Floor, Car Barn, 3520 Prospect St., N.W. , Washington , DC (enter from Prospect St.)&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/censorship-2020'&gt;https://cis-india.org/news/censorship-2020&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-28T10:01:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/google-hangout-with-sunil">
    <title>Google Hangout with Ashoka Fellow Sunil Abraham</title>
    <link>https://cis-india.org/news/google-hangout-with-sunil</link>
    <description>
        &lt;b&gt;Sunil Abraham, an Ashoka Fellow from India, visited the DC Office and shared his work on public accountability, access, and learning at the intersection of internet and society.&lt;/b&gt;
        
&lt;h3&gt;Watch the video below&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;iframe src="http://www.youtube.com/embed/QprvyCtY1DU" frameborder="0" height="315" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.youtube.com/watch?v=QprvyCtY1DU"&gt;Click&lt;/a&gt; to see the original from YouTube.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/google-hangout-with-sunil'&gt;https://cis-india.org/news/google-hangout-with-sunil&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-20T09:16:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights">
    <title>Global Networks, Individual Freedoms: A Peer Forum on Internet Freedom and Human Rights</title>
    <link>https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights</link>
    <description>
        &lt;b&gt;In Connection with the 2012 Internet Freedom Fellows Program, the United States Mission to the United Nations in Geneva is pleased to invite Pranesh Prakash to a peer forum at the United States Mission to the United Nations on Thursday, June 21, 2012, from 9 a.m. to 3 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Join the Internet Freedom Fellows, diplomats, UN representatives, civil society, technologists and social media experts, Geneva media and other professionals engaged in the intersection of human rights, internet freedom and technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This peer forum is part of the Internet Freedom Fellows program, which brings human rights activists from across the globe to Geneva, Washington, and Silicon Valley to meet with fellow activists, U.S. and international government leaders, and members of civil society and the private sector engaged in technology and human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year’s Internet Freedom Fellows, all human rights activists and active practitioners of digital media, are from Syria, India, Burkina Faso, Cambodia, Venezuela and Azerbaijan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For additional information on the program, please visit &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://geneva.usmission.gov/us-hrc/internet-freedom-fellows-2012/"&gt;Internet Freedom Fellows&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;h3 id="_mcePaste"&gt;Program&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;9:00 a.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Welcome and introduction&lt;/strong&gt;&lt;br /&gt;David Kennedy / John Horniblow&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:15 - 10:15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Freedom to Connect and Freedom from Fear: The problem of surveillance in a networked world&lt;/strong&gt;. &lt;br /&gt;&lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://consentofthenetworked.com/author/"&gt;Rebecca MacKinnon&lt;/a&gt;&lt;/span&gt; – Co Founder Global Voices Online, Author “Consent of  the Networked”, Boards of Directors of the Committee to Protect Journalists and the Global Network Initiative&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:15 - 10:45&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Developing Networked Voices and Promoting the protection of Human Rights &lt;/strong&gt;&lt;br /&gt;Andreas Harsono, blogger and human rights activist (Indonesia), and Rosebell Kagumire, multimedia journalist working on peace and conflict issues in the Eastern Africa region (Uganda)  &lt;br /&gt;2011 Internet Freedom Fellows and journalists (via Skype)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:45 - 11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Coffee break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 - 12:00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Moderated Panel Discussion – How Do we Protect Human Rights in a world of global networks? How do the needs of the grassroots, civil society and business inform the process of upholding the UDHR and IHL in networks and technologies?&lt;/strong&gt;&lt;br /&gt;Dr. Robert Whelan (ICRC), Pranesh Prakash, Salil Trepathi (IHRB), Nicolas Seidler (ISOC), Emin Milli  Moderated Panel Discussion followed by Q &amp;amp;A&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:00 - 13:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Buffet Luncheon&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00 - 13:30&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;The Open Internet - Empowering Digital Humanitarianism&lt;/strong&gt;&lt;br /&gt;Paul Conneally - Head of Communications for ITU and a former Red Cross delegate (in various positions, locations and with IFRC plus ICRC and the Irish Red Cross).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:40 - 14:10&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Global Network Initiative and the multistakeholder approach ensuring an Open Internet&lt;br /&gt;David Sullivan -Policy and Communications Director &lt;br /&gt;Global Network Initiative&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left; "&gt;14.15 &lt;span style="text-align: left; "&gt;- &lt;/span&gt;14.40&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;The Silicon Valley Standard and implications for technology companies in the protection of Human Rights and other freedoms &lt;/strong&gt;&lt;br /&gt;Brett Solomon -Exec Director Access Now  (via Skype)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left; "&gt;15:00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Twiplomacy &lt;/strong&gt;&lt;br /&gt;Matthias Luefkins  &lt;i&gt;Managing Director, Digital, EMEA&lt;/i&gt;– Burson Marstellar&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div style="text-align: justify; "&gt;Participation is limited.  Please RSVP by noon on Friday, June 15 to &lt;span class="visualHighlight"&gt;&lt;a class="mail-link" href="mailto:iff@usmission.ch"&gt;iff@usmission.ch&lt;/a&gt;. &lt;/span&gt;When responding, please indicate whether you will also join us for the luncheon buffet.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights'&gt;https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-28T09:12:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/co-spying-on-competitors-staff">
    <title>Cos spying on competitors, staff: Study </title>
    <link>https://cis-india.org/news/co-spying-on-competitors-staff</link>
    <description>
        &lt;b&gt;Most companies are spying on their competitors and their own employees, according to a recent survey conducted by the Associated Chambers of Commerce and Industry of India (Assocham). &lt;/b&gt;
        
&lt;p&gt;The &lt;a class="external-link" href="http://www.thestatesman.net/index.php?option=com_content&amp;amp;view=article&amp;amp;id=413934:cos-spying-on-competitors-staff-study&amp;amp;catid=40:business&amp;amp;from_page=search"&gt;Statesman published this article&lt;/a&gt; on June 19, 2012. Sunil Abraham is quoted in it.&lt;/p&gt;
&lt;p&gt;The survey's results raise questions about whether employees have enough privacy in the workplace. Rubbishing the survey's findings, head of the Indian Council of Corporate Investigators, Mr Kunwar Vikram Singh, said businesses are not spying but verifying facts.&lt;/p&gt;
&lt;p&gt;The Assocham survey said almost 1,200 of 1,500 executives surveyed admitted to hiring people to spy on their employees and monitor their lifestyles. They said they watch former employees, too, especially those who had been laid off or kicked out for fraud.&lt;/p&gt;
&lt;p&gt;In the survey, which was done between January and May this year in Ahmedabad, Bangalore, Chennai, the Delhi-National Capital Region and Mumbai, about 900 top industry officials said they carry out corporate espionage, bug the offices of their rivals and plant moles in other companies. About a quarter of respondents said they have hired computer experts to hack networks and track e-mails of their rivals.&lt;/p&gt;
&lt;p&gt;Many more respondents — 1,110 of those questioned — said they use social media sites to track their rival companies and employees. “Most of the companies have mentioned their sensitive details including their data, plans, clients’ details, products and other confidential and trade-related secrets on their page and unknowingly share the same in the social media circuit,” said Mr DS Rawat, national secretary-general of Assocham, “which is why it is the most favoured spying activity being carried out by the companies.”&lt;/p&gt;
&lt;p&gt;The practice of companies pilfering trade secrets and ideas may be bad for the country's business environment, said Mr Rawat. It “might dampen the spirit of innovation in the long-run,” he said.&lt;/p&gt;
&lt;p&gt;The Indian Council of Corporate Investigators’ Mr Singh, however, disputed Assocham's picture of rampant corporate espionage. “I totally deny that corporates are spying on their employees,” he said. “It is not spying. It is verification of facts.”&lt;/p&gt;
&lt;p&gt;Mr Singh said that when companies look into their employees or other companies, for example, before they enter into joint ventures, they are just carrying out “due diligence”. He said they legally gather information needed for companies to survive. He also denied there were any privacy issues.&lt;/p&gt;
&lt;p&gt;Mr Sunil Abraham, executive director of the Centre for Internet and Society, though, said there are growing concerns about privacy in the workplace, including about intense video surveillance. “Managers started to object to this,” he said. “What they started saying was it really undermines the morale of these locations ... friends and relatives would ask, 'In spite of you being so educated, it's funny your companies don't trust you at all.'”&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Companies need to develop more nuanced ways to deal with these problems — perhaps something more similar to the military's multiple levels of clearance — and different ways for people to acquire and lose trust, Mr Abraham said.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Whether or not surveillance is legal, depends on the type, Mr Abraham said. There is some private information a person will expect to remain private, and some information that is expected to be public — like Twitter feeds.&lt;/p&gt;
&lt;p&gt;There is no law against monitoring this second type, known as “clear view surveillance”, he said, and blanket legislation could clash with freedom of expression. He said an ideal law for this should include a “proportional relation to power” clause, which would limit the legal ability of the powerful to monitor, but allow individual citizens more leeway.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/co-spying-on-competitors-staff'&gt;https://cis-india.org/news/co-spying-on-competitors-staff&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-20T08:46:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-liberty-2012">
    <title>Internet At Liberty 2012</title>
    <link>https://cis-india.org/news/internet-liberty-2012</link>
    <description>
        &lt;b&gt;Activists and experts from all over the world came together for this event organised by Google on May 23 and 24, 2012 to explore free expression in the digital age.&lt;/b&gt;
        &lt;p&gt;&lt;img src="https://cis-india.org/home-images/Internet.jpg/@@images/dc9d1698-03d0-4d2e-bdba-be0f3a5ccb51.jpeg" alt="Internet" class="image-inline" title="Internet" /&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham was a speaker in Plenary IV Debate 3: In a world where nearly nine out of ten Internet users are not American, what is the responsibility of United States institutions in promoting internet freedom? Cynthia Wong, Mohamed El Dahshan, Dunja Mijatović and Judy Woodruff were the other speakers in this panel. See the video below:&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Internet at Liberty 2012: Plenary IV - Sunil Abraham, Cynthia Wong, Mohamed El Dahshan and Dunja Mijatović&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/9YMte4hdYu0" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.youtube.com/watch?v=9YMte4hdYu0"&gt;View the video on YouTube&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-liberty-2012'&gt;https://cis-india.org/news/internet-liberty-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-05T05:24:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
