<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 351 to 365.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/response-to-the-draft-of-the-information-technology-intermediary-guidelines-amendment-rules-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-cooperation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/medianama-roundtables-on-intermediary-liability-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/january-19-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/response-to-the-draft-of-the-information-technology-intermediary-guidelines-amendment-rules-2018">
    <title>Response to the Draft of The Information Technology [Intermediary Guidelines (Amendment) Rules] 2018</title>
    <link>https://cis-india.org/internet-governance/blog/response-to-the-draft-of-the-information-technology-intermediary-guidelines-amendment-rules-2018</link>
    <description>
        &lt;b&gt;In this response, we aim to examine whether the draft rules meet tests of constitutionality and whether they are consistent with the parent Act. We also examine potential harms that may arise from the Rules as they are currently framed and make recommendations to the draft rules that we hope will help the Government meet its objectives while remaining situated within the constitutional ambit.&lt;/b&gt;
        
&lt;p&gt;&lt;br style="text-align: start;" /&gt;&lt;span style="text-align: start; float: none;"&gt;This document presents the Centre for Internet &amp;amp; Society (CIS) response&lt;/span&gt;&lt;span style="text-align: start; float: none;"&gt; to the Ministry of Electronics and Information Technology’s invitation&lt;/span&gt;&lt;span style="text-align: start; float: none;"&gt; to comment and suggest changes to the draft of The Information&lt;/span&gt;&lt;span style="text-align: start; float: none;"&gt; Technology [Intermediary Guidelines (Amendment) Rules] 2018 (hereinafter&lt;/span&gt;&lt;span style="text-align: start; float: none;"&gt; referred to as the “draft rules”) published on December 24, 2018. CIS is&lt;/span&gt;&lt;span style="text-align: start; float: none;"&gt; grateful for the opportunity to put forth its views and comments. This response was sent on the January 31, 2019.&lt;/span&gt;&lt;br style="text-align: start;" /&gt;&lt;br style="text-align: start;" /&gt;&lt;span style="text-align: start; float: none;"&gt;In this response, we aim to examine whether the draft rules meet tests&lt;/span&gt;&lt;span style="text-align: start; float: none;"&gt; of constitutionality and whether they are consistent with the parent&lt;/span&gt;&lt;span style="text-align: start; float: none;"&gt; Act. We also examine potential harms that may arise from the Rules as&lt;/span&gt;&lt;span style="text-align: start; float: none;"&gt; they are currently framed and make recommendations to the draft rules&lt;/span&gt;&lt;span style="text-align: start; float: none;"&gt; that we hope will help the Government meet its objectives while&lt;/span&gt;&lt;span style="text-align: start; float: none;"&gt; remaining situated within the constitutional ambit.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: start; float: none;"&gt;The response can be accessed &lt;a href="https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/response-to-the-draft-of-the-information-technology-intermediary-guidelines-amendment-rules-2018'&gt;https://cis-india.org/internet-governance/blog/response-to-the-draft-of-the-information-technology-intermediary-guidelines-amendment-rules-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Gurshabad Grover, Elonnai Hickok, Arindrajit Basu, Akriti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2019-02-07T08:06:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-cooperation">
    <title>CIS Submission to UN High Level Panel on Digital Cooperation </title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-cooperation</link>
    <description>
        &lt;b&gt;The UN high-level panel on Digital Cooperation issued a call for inputs that called for responses to various questions. CIS responded to the call for inputs. &lt;/b&gt;
        
&lt;p&gt;&lt;span style="text-align: start; float: none;"&gt;The high-level panel on
 Digital Cooperation was convened by the UN Secretary-General to advance
 proposals to strengthen cooperation in the digital space among 
Governments, the private sector, civil society, international 
organizations, academia, the technical community and other relevant 
stakeholders. The Panel issued a call for input that called for 
responses to various questions. CIS responded to the call for inputs.&lt;br /&gt;&lt;br /&gt;The response can be accessed &lt;a href="https://cis-india.org/internet-governance/submission-to-un-high-level-panel-on-digital-co-operation.pdf"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-cooperation'&gt;https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-cooperation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi, Ambika Tandon, Arindrajit Basu and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>International Relations</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-07T07:26:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/medianama-roundtables-on-intermediary-liability-rules">
    <title>MediaNama roundtables on intermediary liability rules</title>
    <link>https://cis-india.org/a2k/news/medianama-roundtables-on-intermediary-liability-rules</link>
    <description>
        &lt;b&gt;MediaNama hosted one policy round-table on Intermediary Liability protections in Bangalore and another round-table in New Delhi, to discuss inputs sought by MEITY on the amendments to Safe Harbor for platforms (payments services, content services, ISPs, etc.) in India. Centre for Internet &amp; Society is a community partner for the event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;One round-table was held at St. Mark's Hotel in Bangalore on January 25, 2019 and the next one will be held at India Habitat Centre in New Delhi on February 7, 2019. Gurshabad Grover participated in the meeting held on January 25, 2019. Participants discussed the draft amendments to the intermediary liability rules (under Section 79 of the IT Act) and recommendations stakeholders could respond with. For more info &lt;a class="external-link" href="https://www.medianama.com/2019/01/223-announcing-nama-event-on-the-future-of-online-safe-harbor-bangalore-delhi-ad/"&gt;click here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;MediaNama has posted some pieces after the discussion that may be of interest:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://www.medianama.com/2019/02/223-namapolicy-no-clarity-on-what-constitutes-offenses-for-intermediaries-alok-prasanna-kumar/"&gt;No clarity on what constitutes offenses for intermediaries&lt;/a&gt; (by Alok Prasanna Kumar)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://www.medianama.com/2019/02/223-regulation-of-intermediaries-nama/"&gt;Should different sizes or categories of intermediaries be regulated differently?&lt;/a&gt; (by Nikhil Pahwa)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://www.medianama.com/2019/02/223-safe-harbor-intermediary-liability-traceability/"&gt;The Intent of Traceability is behavioral change&lt;/a&gt; (by Nikhil Pahwa)&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/medianama-roundtables-on-intermediary-liability-rules'&gt;https://cis-india.org/a2k/news/medianama-roundtables-on-intermediary-liability-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2019-02-17T15:59:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet">
    <title>DSCI's Bangalore chapter meet</title>
    <link>https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet</link>
    <description>
        &lt;b&gt;On January 29, 2019, Karan Saini and Gurshabad Grover participated in the Bangalore chapter meet organized by Data Security Council of India in Bangalore.&lt;/b&gt;
        &lt;p&gt;&lt;img src="https://cis-india.org/home-images/DSCI.png/@@images/5964984e-07ca-4be0-8a63-98b2490b5032.png" alt="DSCI" class="image-inline" title="DSCI" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet'&gt;https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-02T01:47:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details">
    <title>Conmen seed fake phone numbers in Google to trap people looking for customer care details</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details</link>
    <description>
        &lt;b&gt;Googling for anything might seem like a good idea, but searching for contacts of businesses and customer care numbers is landing people in the hands of conmen.&lt;/b&gt;
        &lt;p&gt;The article by Tushar Kaushik was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/news/politics-and-nation/conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details/articleshow/67751196.cms"&gt;Economic Times&lt;/a&gt; on January 30, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Many use Google or other search engines for specific contact numbers — the customer care numbers of a bank, for instance. The search results do not throw up bona fide numbers, but those of conmen waiting to lure a victim. The conmen, knowing what the caller is seeking, and on the pretext of helping, cunningly makes them part with information such as bank account, debit/credit card and even the OTP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;About 20-odd people have been duped in this manner in the past month in Bengaluru, according to the city’s cybercrime police. About 20-30 victims have fallen prey in Gurugram in the last one-and-a-half months. In Maharashtra and Hyderabad, the trend of fake numbers being seeded on Google Maps and being used to dupe people is being observed since October 2018. The frauds are helped by the fact that any user can edit contact information on Google Maps. The Maharashtra cyber police reportedly notified Google authorities regarding this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Inspector and in-charge of cyber police station at Gurugram, Anand Kumar, said another variant of such cases was on the rise. People searching for contacts to help them return products they bought from e-commerce websites have been led to fake numbers. “In the past one-and-half months, about 20-30 such complaints have been received,” Kumar said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srinivas Kodali, a Hyderabad-based data security researcher, said similar incidents using fake numbers being uploaded on Google Maps had occurred in Hyderabad 2-3 months ago. He claimed Google had been informed of the incidents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Illustrating another instance of the way Google searches are misused, dairy brand Amul issued a legal notice to Google, alleging that a series of fake B2B campaigns regarding Amul Parlours and Distributors have started through fake websites using Google search ads since September 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bengaluru-based app developer and co-founder of TBG Labs Harsha Halvi said it was fairly easy for any conman to seed his own number and masquerade as a contact number and make it appear in a Google search. He said all it takes is a very good understanding of search engine optimisation (SEO).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gurshabad Grover, senior policy officer at The Centre for Internet and Society, Bengaluru, said, “The problem right now is Google is not making it clear whether something is verified information or is crowdsourced. On Google Maps, businesses can be claimed by legitimate owners. A suggestion is that Google verify the claimed entities,” Grover said. He added that people too should exercise vigilance while accessing information online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additional commissioner of police (crime) at Bengaluru Alok Kumar said Google could not be held responsible for such incidents as individuals seeded the fake numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reacting to the incidents, a spokesperson from Google India said, “Overall, allowing users to suggest edits provides comprehensive and up-to-date info, but we recognise there may be occasional inaccuracies or bad edits suggested by users.” The spokesperson said when such issues are reported to Google, the claims are investigated and action is taken in line with the findings.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details'&gt;https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-01T15:22:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers">
    <title>India’s largest bank SBI leaked account data on millions of customers</title>
    <link>https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers</link>
    <description>
        &lt;b&gt;India’s largest bank has secured an unprotected server that allowed anyone to access financial information on millions of its customers, like bank balances and recent transactions.&lt;/b&gt;
        &lt;p id="speakable-summary" style="text-align: justify; "&gt;The blog post by Zack Whittaker was &lt;a class="external-link" href="https://techcrunch.com/2019/01/30/state-bank-india-data-leak/"&gt;published Tech Crunch&lt;/a&gt; on January 30, 2019. Karan Saini was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The server, hosted in a regional Mumbai-based data  center, stored two months of data from SBI Quick, a text message and  call-based system used to request basic information about their bank  accounts by customers of &lt;a href="https://www.crunchbase.com/organization/state-bank-of-india#section-overview"&gt;the government-owned State Bank of India&lt;/a&gt; (SBI), the largest bank in the country and a highly ranked company in the Fortune 500.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  the bank had not protected the server with a password, allowing anyone  who knew where to look to access the data on millions of customers’  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s not known for how long the server was open, but  long enough for it to be discovered by a security researcher, who told  TechCrunch of the leak, but did not want to be named for the story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SBI  Quick allows SBI’s banking customers to text the bank, or make a missed  call, to retrieve information back by text message about their finances  and accounts. It’s ideal for millions of the banking giant’s customers  who don’t use smartphones or have limited data service. By using  predefined keywords, like “BAL” for a customer’s current balance, the  service recognizes the customer’s registered phone number and will send  back the current amount in that customer’s bank account. The system can  also be used to send back the last five transactions, block an ATM card  and make inquiries about home or car loans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was the back-end text message system that was exposed, TechCrunch can confirm, storing millions of text messages each day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/SBI.png" alt="SBI" class="image-inline" title="SBI" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A redacted example of some of the banking and credit information found in the database (Image: TechCrunch)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The passwordless database allowed us to see all of the text messages  going to customers in real time, including their phone numbers, bank  balances and recent transactions. The database also contained the  customer’s partial bank account number. Some would say when a check had  been cashed, and many of the bank’s sent messages included a link to  download SBI’s YONO app for internet banking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bank sent out close to three million text messages on Monday alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  database also had daily archives of millions of text messages each,  going back to December, allowing anyone with access a detailed view into  millions of customers’ finances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We verified the data by asking India-based security researcher &lt;a href="https://twitter.com/iasni"&gt;Karan Saini&lt;/a&gt; to send a text message to the system. Within seconds, we found his  phone number in the database, including the text message he received  back.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The data available could potentially be used to profile and  target individuals that are known to have high account balances,” said  Saini in a message to TechCrunch. Saini previously &lt;a href="https://www.zdnet.com/article/another-data-leak-hits-india-aadhaar-biometric-database/"&gt;found a data leak&lt;/a&gt; in India’s Aadhaar, the country’s national identity database, and &lt;a href="https://www.zdnet.com/article/uber-security-flaw-two-factor-login-bypass/"&gt;a two-factor bypass bug&lt;/a&gt; in Uber’s ridesharing app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saini  said that knowing a phone number “could be used to aid social  engineering attacks — which is one of the most common attack vectors in  the country with regard to financial fraud,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SBI &lt;a href="https://www.sbichicago.com/about-us/about-sbi"&gt;claims more than&lt;/a&gt; 500 million customers across the glob,e with 740 million accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just  days earlier, SBI accused Aadhaar’s authority, UIDAI, of mishandling  citizen data that allowed fake Aadhaar identity cards to be created,  despite &lt;a href="https://www.tribuneindia.com/news/nation/uidai-says-tribune-story-misreporting--read-how-that-is-wrong/523478.html"&gt;numerous security lapses&lt;/a&gt; and misuse of the system. UIDAI denied the report, saying there was “no security breach” of its system. (UIDAI often uses &lt;a href="https://twitter.com/UIDAI/status/1023543590033608705"&gt;the term “fake news”&lt;/a&gt; to describe coverage it doesn’t like.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TechCrunch  reached out to SBI and India’s National Critical Information  Infrastructure Protection Centre, which receives vulnerability reports  for the banking sector. The database was secured overnight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite several emails, SBI did not comment prior to publication.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers'&gt;https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-01T15:13:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india">
    <title>Amazon and Walmart are about to take a big hit in India</title>
    <link>https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india</link>
    <description>
        &lt;b&gt;India is the world’s biggest emerging digital economy, and Silicon Valley’s top companies have invested huge sums to cash in on it. Now new regulations are threatening their business.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was published in &lt;a class="external-link" href="https://q13fox.com/2019/01/31/amazon-and-walmart-are-about-to-take-a-big-hit-in-india/"&gt;Q13 Fox&lt;/a&gt; on January 31, 2019. Gurshabad Grover was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;E-commerce restrictions due to go into effect Friday will prevent  global retailers such as Amazon and Walmart from using their deep  pockets and massive scale to drive down prices in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And proposed legal changes would require social media companies like  Facebook and Twitter to monitor and take down content at the request of  Indian authorities, which critics say could be misused for censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The new rules highlight the risk global tech giants are running in a country they see as &lt;a href="https://www.cnn.com/interactive/2018/11/business/internet-usage-india-future/" rel="noopener" target="_blank"&gt;their next growth frontier&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Amazon and Walmart push back&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://www.cnn.com/2018/12/27/business/india-amazon-walmart/" rel="noopener" target="_blank"&gt;new e-commerce rules&lt;/a&gt;,  announced in late December, look to curb practices like steep discounts  that have helped Amazon dominate the US market and already make huge  inroads in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules state that foreign online retailers can no longer strike  deals with companies to offer products that are not available elsewhere.  They also prevent these platforms from selling products distributed by  companies they have invested in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That would strike at the heart of Amazon’s business in India — the US company has &lt;a href="https://www.cnn.com/2018/09/30/tech/more-supermarket-amazon-india/index.html" rel="noopener" target="_blank"&gt;snapped up stakes&lt;/a&gt; in several local&lt;b&gt; &lt;/b&gt;suppliers&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon and India’s biggest online retailer, Walmart-owned Flipkart,  had been pushing India to delay the introduction of the new rules, but  the government said in a statement Thursday that it had decided “after  due consideration” not to do so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon had written to the Indian government asking for a four-month  extension to comply with the new rules, a company spokesperson said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“With over [400,000] sellers and hundreds of thousands of  transactions happening daily on the Amazon India Marketplace we need  adequate time to understand the details of the policy,” the spokesperson  added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Flipkart had asked the government for a six-month extension, a person familiar with the matter told CNN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The company reportedly warned of “significant customer disruption” if  the new policy is implemented this week. Flipkart CEO Kalyan  Krishnamurthy said in a letter to the Indian government that the new  rules could “have undesirable impacts on the continued growth of  e-commerce in India,” &lt;a href="https://www.reuters.com/article/us-india-ecommerce-flipkart-exclusive/exclusive-walmarts-flipkart-warns-of-major-customer-disruption-if-new-india-rules-not-delayed-idUSKCN1PN12E" rel="noopener" target="_blank"&gt;according to Reuters&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules will affect the Bangalore-based company’s sales of products like &lt;a href="https://edition.cnn.com/2018/10/12/tech/flipkart-amazon-india-smartphone/index.html" rel="noopener" target="_blank"&gt;smartphones&lt;/a&gt;, many of which it &lt;a href="https://www.flipkart.com/oppo-new-launch-2wer3-3wsdf-store?affid=HotDeals20&amp;amp;affExtParam2=redpixel&amp;amp;affExtParam1=4513302" rel="noopener" target="_blank"&gt;offers exclusively&lt;/a&gt; to its customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Flipkart declined to comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The changes follow intensive lobbying by India’s small businesses  against Amazon and Walmart’s outsized influence in the country.  (Together they have more than 70% of the Indian online shopping market.)&lt;b&gt; &lt;/b&gt;The  Confederation of All India Traders, which says it represents more than  70 million local retailers, warned the government against granting an  extension.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If any deferment or extension is given, the small traders both  offline and online will be compelled to resort to a national campaign  against any such move … which may also have political repercussions,”  the group said in a statement earlier this week, a thinly-veiled warning  to the government in an election year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The trade body expressed “deep satisfaction” at the government’s decision not to extend the deadline.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India’s WhatsApp problem&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s effort to further regulate its internet isn’t restricted to retail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In late December, two days before the e-commerce restrictions were  unveiled, India’s technology ministry published a host of proposed  changes to laws governing online content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The changes state that “intermediaries” including internet providers  and platforms like Facebook and Twitter must remove “unlawful” material  within 24 hours at the request of Indian authorities. That covers  content that goes against India’s sovereignty, national security or  foreign relations as well as “public order, decency or morality,” the  new rules state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts say the broad phrasing leaves the rules open to misuse and  could be used to suppress free speech. It could also lead to self  censorship by tech companies to avoid government scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It can lead to en masse takedown of content,” said Gurshabad Grover,  a policy officer at the Bangalore-based Centre for Internet and  Society, a think tank. “Intermediaries are often happy to take down  perfectly legal content just to avoid liability.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter said in a statement that it would continue to lobby the Indian government on the proposed&lt;b&gt; &lt;/b&gt;regulations before they are passed into law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our hope is that after this robust public consultation process any  changes to the [rules] in India strike a careful balance that protects  important values such as freedom of expression,” a Twitter spokesperson  told CNN Business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google and Facebook declined to comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Asia Internet Coalition, an industry group that counts all three  companies as its members, also urged the Indian government to reconsider  the rule changes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In addition to interfering with the fundamental rights of freedom of  speech and expression, and right to privacy as guaranteed under the  constitution, the [proposed regulations] impose burdensome obligations  on the intermediaries,” the group said in a letter to India’s technology  ministry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulations appear to be driven by India’s growing battle with  fake news and misinformation, with viral rumors on Facebook’s mobile  messaging service WhatsApp blamed for &lt;a href="https://edition.cnn.com/2018/09/30/tech/facebook-whatsapp-india-misinformation/index.html" rel="noopener" target="_blank"&gt;more than a dozen lynchings&lt;/a&gt; last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government specifically called out the mob violence in its  statement announcing the regulations, citing the “misuse of social  media by criminals and anti-national elements” as a key factor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules also state that platforms must enable the tracing of  individual posts and messages at the government’s request, a requirement  that WhatsApp has &lt;a href="https://money.cnn.com/2018/08/24/technology/whatsapp-india-encryption-privacy/index.html" rel="noopener" target="_blank"&gt;previously rejected&lt;/a&gt; as a non-starter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is WhatsApp’s biggest market, with more than 200 million users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why India matters&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India has opened itself up to foreign investment in recent years,  particularly in its fast-growing tech and retail industries, and  companies from around the world have rushed in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s internet is a particularly tempting prize. About 500 million  people are already online, with nearly 900 million more yet to be  connected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon has pledged at least $5 billion dollars to growing its business in the country, while &lt;a href="https://money.cnn.com/2018/05/09/investing/walmart-flipkart-india-softbank/" rel="noopener" target="_blank"&gt;Walmart spent $16 billion&lt;b&gt; &lt;/b&gt;to buy Flipkart&lt;/a&gt; last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook and Google have also identified India as their next big  market, rolling out several features and services in the country before  taking it to the rest of the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the changing legal environment presents a huge challenge, and Big Tech is battling to keep the promise alive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“An uncertain, constantly changing regulatory environment is not good  for any business,” Mishi Choudhary, legal director at the New  York-based advocacy group Software Freedom Law Center&lt;b&gt;,&lt;/b&gt; told CNN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India must decide where it sees itself in the global landscape,”  Choudhary added. “It can either be a democracy that will let the best  company win and provide an open, free and secure internet to its  citizens or turn the way our neighbors across the Himalayas [China]  have. It can’t have it both ways.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india'&gt;https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-01T15:03:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/january-19-newsletter">
    <title>January 2019 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/january-19-newsletter</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) welcomes you to the first issue of its e-Newsletter for 2019.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The CIS &lt;span class="highlightedSearchTerm"&gt;newsletter&lt;/span&gt; aims to  highlight developments in copyright and patent, free speech and  expression, privacy, cyber security, telecom, etc. as well as Industry  4.0, big data, additive manufacturing and so on which are  revolutionizing and moving the digital world forward. Through this &lt;span class="highlightedSearchTerm"&gt;newsletter&lt;/span&gt; we look to engage you with our research and build a strong bond by  bringing you insightful articles and blog posts which will be beneficial  for you and your business. Throughout the year we will send you stories  and insights from our board, staff and community leaders. We welcome  your feedback, suggestions or comments regarding our &lt;span class="highlightedSearchTerm"&gt;newsletter&lt;/span&gt; or any other aspect of our research.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Welcome to r@w blog!&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS researchers@work programme (RAW) is delighted to &lt;a class="external-link" href="https://medium.com/rawblog"&gt;announce the launch of its new blog hosted on Medium&lt;/a&gt;. The RAW blog will feature works by researchers and practitioners working in India and  elsewhere at the intersections of internet, digital media, and society. The blog will also feature highlights and materials from ongoing research and events at the researchers@work programme.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Highlights for January 2019&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Ambika Tandon and Aayush Rathi have produced &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work"&gt;a research paper that contextualises the narrative around Industry 4.0 and the future of work&lt;/a&gt; with reference to the female labour force in India. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Gurshabad Grover, Nikhil Srinath and Aayush Rathi (with inputs from Anubha Sinha and Sai Shakti) presented a response to the Telecom Regulatory Authority of India’s Consultation Paper on &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-ott-communication-services"&gt;Regulatory Framework for Over-The-Top (OTT) Communication Services&lt;/a&gt;. &lt;i&gt;CIS appreciates the continual efforts of TRAI to have consultations on the regulatory framework that should be applicable to OTT services and Telecom Service Providers (TSPs)&lt;/i&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Pranesh Prakash, Karan Saini and Elonnai Hickok &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/pranesh-prakash-elonnai-hickok-karan-saini-january-23-2019-leveraging-the-coordinated-vulnerability-disclosure-process-to-improve-the-state-of-information-security-in-india"&gt;authored a policy brief that recommends several changes&lt;/a&gt; pertaining to current legislation, policy and practice to the Government of India regarding coordinated vulnerability disclosure (“CVD”) for improving the overarching information and cyber security posture of the country. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Global Commission on the Stability of Cyberspace, a multi-stakeholder initiative comprised of eminent individuals across the globe opened a public comment procedure to solicit comments and obtain additional feedback. Arindrajit Basu, Gurshabad Grover and Elonnai Hickok &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation"&gt;responded to the public call-offering comments on all six norms and proposing two further norms&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;CIS and the News&lt;/h3&gt;
&lt;p&gt;The following news pieces were authored by CIS and published on its website in January:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy"&gt;How to make EVMs hack-proof, and elections more trustworthy&lt;/a&gt; (Pranesh Prakash; Times of India; December 9, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019"&gt;Registering for Aadhaar in 2019&lt;/a&gt; (Sunil Abraham; Business Standard; January 2, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved"&gt;The DNA Bill has a sequence of problems that need to be resolved&lt;/a&gt; (Shweta Mohandas and Elonnai Hickok; Newslaundry; January 15, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content"&gt;India should reconsider its proposed regulation of online content&lt;/a&gt; (Gurshabad Grover; Hindustan Times; January 24, 2019). &lt;i&gt;Akriti Bopanna and Aayush Rathi provided feedback for the article&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/nishant-shah-indian-express-january-27-2019-indias-proposed-new-internet-bill-is-as-repressive-as-the-worst-of-chinese-laws"&gt;India’s proposed new internet bill is as repressive as the worst of Chinese laws&lt;/a&gt; (Nishant Shah; Indian Express; January 27, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;CIS in the News&lt;/h3&gt;
&lt;p&gt;CIS was quoted in these news articles published elsewhere:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you"&gt;Creeped out by Netflix's 'You'? Here's how you can avoid online stalkers, data thieves&lt;/a&gt; (Sanyukta Dharmadhikari; The News Minute; January 10, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru"&gt;Civic activism over WhatsApp and stories of and from cab drivers are part of a new narrative in Bengaluru&lt;/a&gt; (Sowmya Rajaram; Bangalore Mirror; January 13, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are"&gt;They know where you are&lt;/a&gt; (Tini Sara Anien; Deccan Herald; January 17, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears"&gt;Oyo Hotels’ Real-Time Digital Record Database Sparks Privacy Fears&lt;/a&gt; (Nishant Sharma; Bloomberg Quint; January 16, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data"&gt;Is the viral #10YearChallenge just another sneaky way for tech firms to gather users’ personal data?&lt;/a&gt; (Devarsi Ghosh; Scroll.in; January 18, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/news/wired-january-22-2019-google-wikipedia-machine-learning-glow-languages"&gt;Google Gives Wikimedia Millions—Plus Machine Learning Tools&lt;/a&gt; (Wired; January 22, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy"&gt;New movies lose out due to piracy&lt;/a&gt; (Surupasree Sarmmah; Deccan Herald; January 23, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india"&gt;Submitted Your Biometrics for Aadhaar? Here’s How You Can Lock/Unlock That Data&lt;/a&gt; (Vidya Raja; Better India; January 24, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers"&gt;India’s largest bank SBI leaked account data on millions of customers&lt;/a&gt; (Zack Whittaker; Tech Crunch; January 30, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly"&gt;Open standards can disrupt Facebook’s messaging monopoly&lt;/a&gt; (Abhimanyu Ghoshal; The Next Web; January 30, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details"&gt;Conmen seed fake phone numbers in Google to trap people looking for customer care details &lt;/a&gt;(Tushar Kaushik; Economic Times; January 30, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india"&gt;Amazon and Walmart are about to take a big hit in India&lt;/a&gt; (Q13 Fox; January 31, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;/div&gt;
&lt;h2&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Security&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation"&gt;Response to GCSC on Request for Consultation: Norm Package Singapore&lt;/a&gt; (Gurshabad Grover, Arindrajit Basu and Elonnai Hickok; January 22, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;b&gt;Policy Brief&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/pranesh-prakash-elonnai-hickok-karan-saini-january-23-2019-leveraging-the-coordinated-vulnerability-disclosure-process-to-improve-the-state-of-information-security-in-india"&gt;Leveraging the Coordinated Vulnerability Disclosure Process to Improve the State of Information Security in India&lt;/a&gt; (Pranesh Prakash; Karan Saini and Elonnai Hickok; January 23, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation"&gt;CIS Submission to UN High Level Panel on Digital Co-operation&lt;/a&gt; (Aayush Rathi, Ambika Tandon, Arindrajit Basu and Elonnai Hickok; January 30, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Gender&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work"&gt;A Gendered Future of Work&lt;/a&gt; (Ambika Tandon and Aayush Rathi; December 19, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organized&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/rfcs-we-love-meetup"&gt;RFCs We Love meetup&lt;/a&gt; (Organized by CIS and India Internet Engineering Society; CIS, Bangalore; January 19, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated / Partnered In&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules"&gt;Webinar on the draft Intermediary Guidelines Amendment Rules&lt;/a&gt; (Organized by CCAOI and the ISOC Delhi Chapter; New Delhi; January 10, 2019). Gurshabad Grover was a discussant in the panel.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/news/medianama-roundtables-on-intermediary-liability-rules"&gt;MediaNama roundtables on intermediary liability rules&lt;/a&gt; (St. Marks Hotel, Bangalore; January 25, 2019). CIS was a community partner. Gurshabad Grover participated in the meeting.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet"&gt;DSCI's Bangalore chapter meet&lt;/a&gt; (Organized by Data Security Council of India; Bangalore; January 29, 2019). Karan Saini and Gurshabad Grover participated in the meet.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;h2&gt;&lt;a class="external-link" href="https://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The  growth in telecommunications in India has been impressive. While the  potential for growth and returns exist, a range of issues need to be  addressed for this potential to be realized. One aspect is more  extensive rural coverage and the second aspect is a countrywide access  to broadband which is low at about eight million subscriptions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Submission&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt; &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-ott-communication-services"&gt;Response to TRAI Consultation Paper on Regulatory Framework for Over-The-Top (OTT) Communication Services&lt;/a&gt; (Gurshabad Grover, Nikhil Srinath and Aayush Rathi with inputs from Anubha Sinha and Sai Shakti; January 10, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;h2&gt;&lt;a class="external-link" href="https://cis-india.org/raw"&gt;Researchers at Work (RAW)&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcement&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/irc19-list"&gt;Internet Researchers' Conference 2019 (IRC19): #List, Jan 30 - Feb 1, Lamakaan&lt;/a&gt; (P.P. Sneha; January 9, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a class="external-link" href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and  Society  (CIS) is a non-profit organisation that undertakes  interdisciplinary  research on internet and digital technologies from  policy and academic  perspectives. The areas of focus include digital  accessibility for  persons with disabilities, access to knowledge,  intellectual property  rights, openness (including open data, free and  open source software,  open standards, open access, open educational  resources, and open  video), internet governance, telecommunication  reform, digital privacy,  and cyber-security. The academic research at  CIS seeks to understand  the reconfigurations of social and cultural  processes and structures as  mediated through the internet and digital  media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet!   Write a cheque in favour of 'The Centre for Internet and Society' and   mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru -   5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners,  artists, and theoreticians,  both organisationally and as individuals,  to engage with us on topics  related internet and society, and improve  our collective understanding  of this field. To discuss such  possibilities, please write to Sunil  Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org  (for  academic research), with an indication of the form and the  content of  the collaboration you might be interested in. To discuss  collaborations  on Indic language Wikipedia projects, write to Tanveer  Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary  donor the Kusuma Trust founded  by Anurag Dikshit and Soma Pujari,  philanthropists of Indian origin for  its core funding and support for  most of its projects. CIS is also  grateful to its other donors,  Wikimedia Foundation, Ford Foundation,  Privacy International, UK, Hans  Foundation, MacArthur Foundation, and  IDRC for funding its various  projects&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/january-19-newsletter'&gt;https://cis-india.org/about/newsletters/january-19-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-03-03T16:34:21Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly">
    <title>Open standards can disrupt Facebook’s messaging monopoly</title>
    <link>https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly</link>
    <description>
        &lt;b&gt;Facebook made the news last week when The New York Times’ Mike Isaac reported that CEO Mark Zuckerberg intended to integrate the company’s three messaging platforms: WhatsApp, Messenger, and Instagram.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Abhimanyu Ghoshal was &lt;a class="external-link" href="https://thenextweb.com/facebook/2019/01/28/open-standards-can-help-disrupt-facebook-messaging-monopoly/"&gt;published in The Next Web&lt;/a&gt; on January 30, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;We don’t have all the details of exactly how this will work. The plan is still in its early stages, and there are plenty of moving parts – legal and technical – to take care of. What’s clear is this: with more than 2.6 billion users between the platforms, this is set to impact a lot of people if it goes through – and potentially many hundreds of millions more in the following years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the specifics of the move are yet to be revealed, a move like  this could help Facebook create more detailed profiles of its users.  Even if the company encrypts communications end-to-end as it seemed to  imply in its responses to NYT, it could still leverage communications  metadata to target ads more accurately than you might think.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here’s an example: without looking at your messages (because they’re  encrypted), Facebook could gather data on who you chat with most often  and for how long, later correlating that with the recipients’ interests  from Instagram. It could then show you ads for gifts that contact may  like, right around the time their birthday comes up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Integrating these platforms could also bolster Facebook’s efforts to  keep users tied into its ecosystem. That’s problematic, when you  consider the larger your network of contacts is on the company’s  services, the harder it is for you to leave them and use an alternative  you’re more comfortable with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is there a way out? &lt;a href="https://www.linkedin.com/in/praneshprakash/" rel="nofollow noopener" target="_blank"&gt;Pranesh Prakash&lt;/a&gt; – a Fellow at the &lt;a href="https://cis-india.org/" rel="nofollow noopener" target="_blank"&gt;Center for Internet and Society&lt;/a&gt;, as well as a Fellow at the &lt;a href="https://www.newamerica.org/" rel="nofollow noopener" target="_blank"&gt;New America&lt;/a&gt; think tank – believes that the answer lies not in breaking up Facebook  over privacy laws, but in competition, and regulators at the government  level should demand Facebook use open standards for its messaging  platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash explained that standards like SMTP and IMAP, which are used  for facilitating email exchanges, allow for interoperability between  services run by different organizations. They also let users choose the  client apps they prefer for accessing their inboxes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook’s messaging services, meanwhile, run on closed standards and don’t play nice with platforms created by third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This results in people becoming trapped in Facebook’s ecosystem: even  if you’re opposed to using the company’s products, you can’t  realistically ditch them all because your friends and family are all  using its platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case you’re worried about open-source protocols not being up to  the task of serving massive networks like the ones Facebook operates,  consider the fact that &lt;a href="https://mycodeplex.wordpress.com/2016/03/08/inside-of-whatsapp-part-1/" rel="nofollow noopener" target="_blank"&gt;WhatsApp runs on FunXMPP&lt;/a&gt;, a customized version of &lt;a href="https://xmpp.org/" rel="nofollow noopener" target="_blank"&gt;the open XMPP set of standards&lt;/a&gt; that anyone can use for their own projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If Facebook is doing the difficult legwork of unifying the underlying  technical infrastructure of its three apps, Prakash argues, &lt;a href="https://www.hindustantimes.com/analysis/privacy-laws-cannot-make-facebeook-and-google-accountable/story-Yne6DwUoGb0eO9mRxaDTaL.html" rel="nofollow noopener" target="_blank"&gt;it’d do well to make its new protocol public and open-source&lt;/a&gt;.  That way, anyone should be able to use the company’s services to reach  people just the same as when they choose to use a service created by a  separate entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash said that the only way diminishing Facebook’s power in this  regard is to open up access to its network of users. In doing so, it  will see people stick with the company’s services because they like  using them, not because they can’t stay in touch with their contacts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions surrounding Facebook’s monopolistic domination of the  messaging space will inevitably crop up when the company implements  Zuckerberg’s plan, and this sounds like a healthy way to tackle those  issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Naturally, that seems like it’d hurt Facebook’s bottom line – but  it’s important to start thinking about realistic measures to comply with  antitrust law – or risk being booted from countries that don’t  appreciate the way the company does business.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly'&gt;https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T01:59:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation">
    <title>CIS Submission to UN High Level Panel on Digital Co-operation</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation</link>
    <description>
        &lt;b&gt;The High-level Panel on Digital Cooperation was convened by the UN Secretary-General to advance proposals to strengthen cooperation in the digital space among Governments, the private sector, civil society, international organizations, academia, the technical community and other relevant stakeholders. The Panel issued a call for input that called for responses to various questions. CIS responded to the call for inputs.&lt;/b&gt;
        &lt;p&gt;Download the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/submission-to-un-high-level-panel-on-digital-cooperation"&gt;submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation'&gt;https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi, Ambika Tandon, Arindrajit Basu and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2019-02-19T01:41:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india">
    <title>Submitted Your Biometrics for Aadhaar? Here’s How You Can Lock/Unlock That Data</title>
    <link>https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india</link>
    <description>
        &lt;b&gt;Did you know that UIDAI provides a facility that allows users to lock/unlock their Aadhaar biometric data online?&lt;/b&gt;
        &lt;p&gt;The blog post by Vidya Raja was &lt;a class="external-link" href="https://www.thebetterindia.com/170550/aadhaar-biometric-privacy-safety-online-india/"&gt;published in the Better India&lt;/a&gt; on January 24, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Imagine someone hacking into your Netflix account – all you have to do is change the password. However, if there is a security &lt;a href="https://www.thebetterindia.com/99520/aadhaar-card-right-over-our-body-privacy-government/" rel="noopener" target="_blank"&gt;breach&lt;/a&gt; with respect to your biometric details, there is no reversing it.  So think carefully about how and where you submit your details.  While the Supreme Court has said that it is no longer mandatory to  link Aadhaar with your bank accounts or your telecom service provider,  it does not lessen the importance of Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, The Centre for Internet &amp;amp; Society, in a report published in &lt;a href="https://www.livemint.com/Money/YD7dqEVRJbrqoAs3h4PuJO/Are-biometrics-hackproof.html" rel="noopener" target="_blank"&gt;The Mint&lt;/a&gt;,  says, “Biometric devices are not hack-proof. It depends on the ease  with which this can be done. In Malaysia, thieves who stole a car with a  fingerprint-based ignition system simply chopped off the owner’s  finger. When a biometric attendance system was introduced at the  Institute of Chemical Technology (ICT) in Mumbai, students continued  giving proxies by using moulds made from Fevicol.”  Over the last year, there has been so much chatter about the Aadhaar number and how one can protect one’s information.&lt;/p&gt;
&lt;p&gt;Did you know that UIDAI provides a facility that allows users to lock/unlock their Aadhaar biometric data online?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;In this article, we explain how you can do that.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Locking biometrics online:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Visit UIDAI’s &lt;a href="https://uidai.gov.in/" rel="noopener" target="_blank"&gt;online&lt;/a&gt; portal to lock or unlock your biometrics&lt;/li&gt;
&lt;li&gt;Once there, you will need to click on ‘My Aadhaar’ and under the Aadhaar Services tab, click on Lock/Unlock Biometrics&lt;/li&gt;
&lt;li&gt;You will then be redirected to a new page and prompted to enter the 12-digit Aadhaar number and the security code&lt;/li&gt;
&lt;li&gt;Once the details have been entered, click on ‘Send OTP’&lt;/li&gt;
&lt;li&gt;You will receive an OTP on your registered mobile number&lt;/li&gt;
&lt;li&gt;Enter this and click on the Login button&lt;/li&gt;
&lt;li&gt;This feature will allow you to lock your biometrics&lt;/li&gt;
&lt;li&gt;Enter the 4-digit security code mentioned on the screen and click on the ‘Enable’ button&lt;/li&gt;
&lt;li&gt;Your biometrics will be locked, and you will have to unlock it in case you want to access it again&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Unlocking biometrics online:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;To unlock your biometrics, click on the ‘Login’ button&lt;/li&gt;
&lt;li&gt;Enter your Aadhaar number and the security code in the designated spaces&lt;/li&gt;
&lt;li&gt;Now click on ‘Send OTP’&lt;/li&gt;
&lt;li&gt;An OTP will be sent to your registered mobile number&lt;/li&gt;
&lt;li&gt;Enter it in the space provided and click on ‘Login’&lt;/li&gt;
&lt;li&gt;In case you want to temporarily unlock the biometrics, enter the security code and click on the unlock button&lt;/li&gt;
&lt;li&gt;Your biometrics will be unlocked for 10 minutes&lt;/li&gt;
&lt;li&gt;The locking date and time is mentioned on the screen after which biometrics will be automatically locked&lt;/li&gt;
&lt;li&gt;When you do not want to lock your biometrics, you can disable the lock permanently.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Using mAadhaar to lock/unlock biometrics:&lt;/h2&gt;
&lt;p&gt;mAadhaar is the official mobile application developed by the Unique  Identification Authority of India (UIDAI). Presently, it is available on  the &lt;a href="https://play.google.com/store/apps/details?id=in.gov.uidai.mAadhaarPlus&amp;amp;hl=en_IN" rel="noopener" target="_blank"&gt;Android&lt;/a&gt; platform.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Once the mAadhaar app has been downloaded, the user must use their Aadhaar card registered mobile number to login.&lt;/li&gt;
&lt;li&gt;You will then be sent an OTP that you are required to enter for  authentication. Do remember to change your password once registered.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On the top right side, tap on ‘Biometric lock’, and enter your  password to lock the biometrics. Once locked, it will show a small lock  icon next to your profile.&lt;/li&gt;
&lt;li&gt;To unlock, tap on the same icon followed by your password. The  information will unlock for 10 minutes. After that, it will be locked  again.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Once you lock this information, it ensures that even the Aadhaar  holder will not be able to use their biometric data (iris scan and  fingerprints) for authentication, until unlocked.&lt;/li&gt;
&lt;li&gt;If you try to use this information without unlocking, it will show you an error code 330.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Remember to lock and unlock your biometrics through a trusted  channel. The fact that there is no fee involved in either exercise will  make this easier. Also, even with the biometric locked, you can continue  to use the OTP-based authentication process for transactions, where you  will receive the OTP on your registered mobile number and e-mail  address.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(Edited by Shruti Singhal)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india'&gt;https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-02T02:09:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content">
    <title>India should reconsider its proposed regulation of online content</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content</link>
    <description>
        &lt;b&gt;The lack of technical considerations in the proposal is also apparent since implementing the proposal is infeasible for certain intermediaries. End-to-end encrypted messaging services cannot “identify” unlawful content since they cannot decrypt it. Presumably, the government’s intention is not to disallow end-to-end encryption so that intermediaries can monitor content.&lt;/b&gt;
        &lt;p class="moz-quote-pre"&gt;The article was &lt;a class="external-link" href="https://www.hindustantimes.com/analysis/india-should-reconsider-its-proposed-regulation-of-online-content/story-vvuPhz6tuxNIKTjXbRhijO.html"&gt;published in the Hindustan Times&lt;/a&gt; on January 24, 2019. The author would like to thank Akriti Bopanna and Aayush Rathi for their feedback.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Flowing from the Information Technology (IT) Act, India’s current  intermediary liability regime roughly adheres to the “safe harbour”  principle, i.e. intermediaries (online platforms and service providers)  are not liable for the content they host or transmit if they act as mere  conduits in the network, don’t abet illegal activity, and comply with  requests from authorised government bodies and the judiciary. This  paradigm allows intermediaries that primarily transmit user-generated  content to provide their services without constant paranoia, and can be  partly credited for the proliferation of online content. The law and IT  minister shared the intent to change the rules this July when discussing  concerns of online platforms being used “to spread incorrect facts  projected as news and designed to instigate people to commit crime”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  December 24, the government published and invited comments to the draft  intermediary liability rules. The draft rules significantly expand “due  diligence” intermediaries must observe to qualify as safe harbours:  they mandate enabling “tracing” of the originator of information, taking  down content in response to government and court orders within 24  hours, and responding to information requests and assisting  investigations within 72 hours. Most problematically, the draft rules go  much further than the stated intentions: draft Rule 3(9) mandates  intermediaries to deploy automated tools for “proactively identifying  and removing [...] unlawful information or content”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first  glaring problem is that “unlawful information or content” is not  defined. A conservative reading of the draft rules will presume that the  phrase means restrictions on free speech permissible under Article  19(2) of the Constitution, including that relate to national integrity,  “defamation” and “incitement to an offence”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ambiguity aside, is  mandating intermediaries to monitor for “unlawful content” a valid  requirement under “due diligence”? To qualify as a safe harbour, if an  intermediary must monitor for all unlawful content, then is it  substantively different from an intermediary that has active control  over its content and not a safe harbour? Clearly, the requirement of  monitoring for all “unlawful content” is so onerous that it is contrary  to the philosophy of safe harbours envisioned by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By  mandating automated detection and removal of unlawful content, the  proposed rules shift the burden of appraising legality of content from  the state to private entities. The rule may run afoul of the Supreme  Court’s reasoning in Shreya Singhal v Union of India wherein it read  down a similar provision because, among other reasons, it required an  intermediary to “apply [...] its own mind to whether information should  or should not be blocked”. “Actual knowledge” of illegal content, since  then, has held to accrue to the intermediary only when it receives a  court or government order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the inconsistencies with legal precedence, the rules may not stand judicial scrutiny if notified in their current form.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  lack of technical considerations in the proposal is also apparent since  implementing the proposal is infeasible for certain intermediaries.  End-to-end encrypted messaging services cannot “identify” unlawful  content since they cannot decrypt it. Internet service providers also  qualify as safe harbours: how will they identify unlawful content when  it passes encrypted through their network? Presumably, the government’s  intention is not to disallow end-to-end encryption so that  intermediaries can monitor content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Intermediaries that can  implement the rules, like social media platforms, will leave the task to  algorithms that perform even specific tasks poorly. Just recently,  Tumblr flagged its own examples of permitted nudity as pornography, and  Youtube slapped a video of randomly-generated white noise with five  copyright-infringement notices. Identifying more contextual expression,  such as defamation or incitement to offences, is a much more complex  problem. In the lack of accurate judgement, platforms will be happy to  avoid liability by taking content down without verifying whether it  violated law. Rule 3(9) also makes no distinction between large and  small intermediaries, and has no requirement for an appeal system  available to users whose content is taken down. Thus, the proposed rules  set up an incentive structure entirely deleterious to the exercise of  the right to freedom of expression. Given the wide amplitude and  ambiguity of India’s restrictions on free speech, online platforms will  end up removing swathes of content to avoid liability if the draft rules  are notified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of draconian laws to quell dissent plays a  recurring role in the history of the Indian state. The draft rules  follow India’s proclivity to join the ignominious company of  authoritarian nations when it comes to disrespecting protections for  freedom of expression. To add insult to injury, the draft rules are  abstruse, ignore legal precedence, and betray a poor technological  understanding. The government should reconsider the proposed regulation  and the stance which inspired it, both of which are unsuited for a  democratic republic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gurshabad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-24T16:59:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy">
    <title>New movies lose out due to piracy</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy</link>
    <description>
        &lt;b&gt;Piracy continues to be a huge concern among filmmakers but it can also be a marketing strategy for small-budget films.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surupasree Sarmmah was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/new-movies-lose-out-due-piracy-714536.html"&gt;Deccan Herald&lt;/a&gt; on January 23, 2019. Akriti Bopanna was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Despite a slew of measures taken by filmmakers, pirated versions of recently released films like ‘Uri: The Surgical Strike’, ‘Viswasam’, ‘KGF’ and ‘Why Cheat India’ were leaked online on websites like TamilRockers. Piracy has been a huge concern for all movie industries in India, national and regional, but experts say that not much can be done when a film is leaked online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Neville J Kattakayam, author of the book ‘The All Seeing Digital Eyes: A Guide To Privacy, Security and Literacy’, says, “The maximum one can do is to control the servers in a particular jurisdiction. But there are servers in unlikely places — like somewhere out in the sea. These places don’t fall under any jurisdiction, national or international. It becomes impossible to control the servers then.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Talking about the process of piracy, he explains that once a content is leaked, it mirages into different servers across to the world; not just online but offline too. “There are mirror sites having the same content that are immediately born. Accessibility wise, it’s all out there; there is nothing that one can completely restrict,” he says. &lt;br /&gt; &lt;br /&gt; Neville feels that it is largely in the hands of the producers to restrict access to their material until the movie is released. With people usually preferring good quality prints, theatrical replicas are not favoured much, he told Metrolife. &lt;br /&gt; &lt;br /&gt; “From what I have heard, the piracy usually happens when the copy is being sent to the censor board. Some intermediate source, who really wants to kill a movie, leaks it from there. That is the real challenge,” says Neville. &lt;br /&gt; &lt;br /&gt; Hemanth M Rao, a director, says that when a movie is leaked online, the effort, time and money put in is at stake. “You feel robbed. Most people would want to go to the theatres to watch a film but with incidents of piracy on the rise, the life span of a movie is shortened,” he says.&lt;br /&gt; &lt;br /&gt; However, he adds that the audience is beginning to understand the impact piracy has on the movie industry, especially at a time when there is intense competition between regional language industries.&lt;br /&gt; &lt;br /&gt; He has a word of praise for the Kannada Film Industry, which he feels is safeguarding interests of the artistes.&lt;br /&gt; &lt;br /&gt; “We have a close tie-up with the city police. We monitor where all a film is playing after its release. In case we come to know about any illegal activities, we intimate the police who act swiftly. This way, the access is cut down.” &lt;br /&gt; &lt;br /&gt; “Another thing that upsets me is the habit of going live on Facebook while one is at the theatre. I don’t understand what pleasure people get out of it,” he says. &lt;br /&gt; &lt;br /&gt; According to a new draft rule, being contemplated by the IT Ministry, host websites will be liable for any illegal content uploaded on their platform. Currently, a website is liable only for unlawful actions; like uploading copyrighted content without permission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Government can block access to the original host of the pirated content if needed however the traction and virality these kinds of content get make it very difficult to contain their spread. It ends up being a blanket ban on sites such as torrent sites where all the content is not illegal yet the site is blocked as a whole,” says Akriti Bopanna, Policy Officer, Centre for Internet and Society. &lt;br /&gt; &lt;br /&gt; The time taken for legal recourse doesn’t help either. Though filmmakers can approach the court for a ban on the website or server, the time taken for a legal remedy is way too long. By that time, the same link would have appeared in two or three other websites, says Akriti. “A leaked movie can be easily downloaded and sent to someone instantly.”&lt;br /&gt; &lt;br /&gt; She feels that a more effective method than banning a website or a server would be to educate people.&lt;br /&gt; &lt;br /&gt; “Not many know about copyright infringement, it is important to spread awareness from the grassroots level. Though we have messages on piracy shown at the start of every movie, these need to be more creative and fun so they will stay in the audience’s minds. Maybe the industry, as a whole, can do this as a community initiative,” she opines. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Small players don’t care much about piracy &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Small-budget movies take piracy as a marketing strategy. They feel that once people watch the movie and write reviews, the film will get an overall boost — allowing them to sell more tickets in theatres.&lt;br /&gt; &lt;br /&gt; However, major players spend crores on their movies and depend on ticket sales to get back the amount.&lt;br /&gt; &lt;br /&gt; Difficult to claim copyright from different websites&lt;br /&gt; &lt;br /&gt; Prominent production companies are targeting streaming websites who have uploaded their movies, citing copyright issues. However, floating websites like citytorrents and TamilRockers keep changing their domain name and it becomes impossible to counter them.&lt;br /&gt; &lt;br /&gt; -&lt;b&gt;Neville J Kattakayam&lt;/b&gt;&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy'&gt;https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T02:24:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation">
    <title>Response to GCSC on Request for Consultation: Norm Package Singapore</title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation</link>
    <description>
        &lt;b&gt;The GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Global Commission on the Stability of Cyberspace, a multi-stakeholder initiative comprised of eminent individuals across the globe that seeks to promote awareness and understanding among the various cyberspace communities working on issues related to international cyber security. CIS is honoured to have contributed research to this initiative previously and commends the GCSC for the work done so far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The GCSC &lt;a href="https://cyberstability.org/research/singapore_norm_package/"&gt;announced the release of its new Norm Package&lt;/a&gt; on Thursday November 8, 2018 that featured six norms that sought to promote the stability of cyberspace.This was done with the hope that they may be adopted by public and private actors in a bid to improve the international security architecture of cyberspace&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The norms introduced by the GCSC focus on the following areas:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Norm to Avoid Tampering&lt;/li&gt;
&lt;li&gt;Norm Against Commandeering of      ICT Devices into Botnets&lt;/li&gt;
&lt;li&gt;Norm for States to Create a      Vulnerability Equities Process&lt;/li&gt;
&lt;li&gt;Norm to Reduce and Mitigate      Significant Vulnerabilities&lt;/li&gt;
&lt;li&gt;Norm on Basic Cyber Hygiene as      Foundational Defense&lt;/li&gt;
&lt;li&gt;Norm Against Offensive Cyber      Operations by Non-State Actors&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms. We sincerely hope that the Commission may find the feedback useful in their upcoming deliberations.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/response-to-gcsc-on-request-for-consultation-norm-package-singapore/at_download/file"&gt;Read the full submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Gurshabad Grover and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>International Relations</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-27T15:43:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka">
    <title>Cyber Policy Centres Meeting in Sri Lanka</title>
    <link>https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka</link>
    <description>
        &lt;b&gt;Elonnai Hickok, Sunil Abraham and Ambika Tandon participated in this event organized by IDRC in Sri Lanka on January 11 - 14, 2019.&lt;/b&gt;
        &lt;ul&gt;
&lt;li&gt;Download the agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cpc-gathering-agenda.pdf"&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;See the presentation &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/idrc-privacy-project"&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka'&gt;https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-21T23:50:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
