<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 356 to 370.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/january-19-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/rfcs-we-love-meetup"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers">
    <title>India’s largest bank SBI leaked account data on millions of customers</title>
    <link>https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers</link>
    <description>
        &lt;b&gt;India’s largest bank has secured an unprotected server that allowed anyone to access financial information on millions of its customers, like bank balances and recent transactions.&lt;/b&gt;
        &lt;p id="speakable-summary" style="text-align: justify; "&gt;The blog post by Zack Whittaker was &lt;a class="external-link" href="https://techcrunch.com/2019/01/30/state-bank-india-data-leak/"&gt;published Tech Crunch&lt;/a&gt; on January 30, 2019. Karan Saini was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The server, hosted in a regional Mumbai-based data  center, stored two months of data from SBI Quick, a text message and  call-based system used to request basic information about their bank  accounts by customers of &lt;a href="https://www.crunchbase.com/organization/state-bank-of-india#section-overview"&gt;the government-owned State Bank of India&lt;/a&gt; (SBI), the largest bank in the country and a highly ranked company in the Fortune 500.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  the bank had not protected the server with a password, allowing anyone  who knew where to look to access the data on millions of customers’  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s not known for how long the server was open, but  long enough for it to be discovered by a security researcher, who told  TechCrunch of the leak, but did not want to be named for the story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SBI  Quick allows SBI’s banking customers to text the bank, or make a missed  call, to retrieve information back by text message about their finances  and accounts. It’s ideal for millions of the banking giant’s customers  who don’t use smartphones or have limited data service. By using  predefined keywords, like “BAL” for a customer’s current balance, the  service recognizes the customer’s registered phone number and will send  back the current amount in that customer’s bank account. The system can  also be used to send back the last five transactions, block an ATM card  and make inquiries about home or car loans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was the back-end text message system that was exposed, TechCrunch can confirm, storing millions of text messages each day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/SBI.png" alt="SBI" class="image-inline" title="SBI" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A redacted example of some of the banking and credit information found in the database (Image: TechCrunch)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The passwordless database allowed us to see all of the text messages  going to customers in real time, including their phone numbers, bank  balances and recent transactions. The database also contained the  customer’s partial bank account number. Some would say when a check had  been cashed, and many of the bank’s sent messages included a link to  download SBI’s YONO app for internet banking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bank sent out close to three million text messages on Monday alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  database also had daily archives of millions of text messages each,  going back to December, allowing anyone with access a detailed view into  millions of customers’ finances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We verified the data by asking India-based security researcher &lt;a href="https://twitter.com/iasni"&gt;Karan Saini&lt;/a&gt; to send a text message to the system. Within seconds, we found his  phone number in the database, including the text message he received  back.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The data available could potentially be used to profile and  target individuals that are known to have high account balances,” said  Saini in a message to TechCrunch. Saini previously &lt;a href="https://www.zdnet.com/article/another-data-leak-hits-india-aadhaar-biometric-database/"&gt;found a data leak&lt;/a&gt; in India’s Aadhaar, the country’s national identity database, and &lt;a href="https://www.zdnet.com/article/uber-security-flaw-two-factor-login-bypass/"&gt;a two-factor bypass bug&lt;/a&gt; in Uber’s ridesharing app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saini  said that knowing a phone number “could be used to aid social  engineering attacks — which is one of the most common attack vectors in  the country with regard to financial fraud,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SBI &lt;a href="https://www.sbichicago.com/about-us/about-sbi"&gt;claims more than&lt;/a&gt; 500 million customers across the glob,e with 740 million accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just  days earlier, SBI accused Aadhaar’s authority, UIDAI, of mishandling  citizen data that allowed fake Aadhaar identity cards to be created,  despite &lt;a href="https://www.tribuneindia.com/news/nation/uidai-says-tribune-story-misreporting--read-how-that-is-wrong/523478.html"&gt;numerous security lapses&lt;/a&gt; and misuse of the system. UIDAI denied the report, saying there was “no security breach” of its system. (UIDAI often uses &lt;a href="https://twitter.com/UIDAI/status/1023543590033608705"&gt;the term “fake news”&lt;/a&gt; to describe coverage it doesn’t like.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TechCrunch  reached out to SBI and India’s National Critical Information  Infrastructure Protection Centre, which receives vulnerability reports  for the banking sector. The database was secured overnight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite several emails, SBI did not comment prior to publication.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers'&gt;https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-01T15:13:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india">
    <title>Amazon and Walmart are about to take a big hit in India</title>
    <link>https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india</link>
    <description>
        &lt;b&gt;India is the world’s biggest emerging digital economy, and Silicon Valley’s top companies have invested huge sums to cash in on it. Now new regulations are threatening their business.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was published in &lt;a class="external-link" href="https://q13fox.com/2019/01/31/amazon-and-walmart-are-about-to-take-a-big-hit-in-india/"&gt;Q13 Fox&lt;/a&gt; on January 31, 2019. Gurshabad Grover was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;E-commerce restrictions due to go into effect Friday will prevent  global retailers such as Amazon and Walmart from using their deep  pockets and massive scale to drive down prices in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And proposed legal changes would require social media companies like  Facebook and Twitter to monitor and take down content at the request of  Indian authorities, which critics say could be misused for censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The new rules highlight the risk global tech giants are running in a country they see as &lt;a href="https://www.cnn.com/interactive/2018/11/business/internet-usage-india-future/" rel="noopener" target="_blank"&gt;their next growth frontier&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Amazon and Walmart push back&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://www.cnn.com/2018/12/27/business/india-amazon-walmart/" rel="noopener" target="_blank"&gt;new e-commerce rules&lt;/a&gt;,  announced in late December, look to curb practices like steep discounts  that have helped Amazon dominate the US market and already make huge  inroads in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules state that foreign online retailers can no longer strike  deals with companies to offer products that are not available elsewhere.  They also prevent these platforms from selling products distributed by  companies they have invested in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That would strike at the heart of Amazon’s business in India — the US company has &lt;a href="https://www.cnn.com/2018/09/30/tech/more-supermarket-amazon-india/index.html" rel="noopener" target="_blank"&gt;snapped up stakes&lt;/a&gt; in several local&lt;b&gt; &lt;/b&gt;suppliers&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon and India’s biggest online retailer, Walmart-owned Flipkart,  had been pushing India to delay the introduction of the new rules, but  the government said in a statement Thursday that it had decided “after  due consideration” not to do so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon had written to the Indian government asking for a four-month  extension to comply with the new rules, a company spokesperson said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“With over [400,000] sellers and hundreds of thousands of  transactions happening daily on the Amazon India Marketplace we need  adequate time to understand the details of the policy,” the spokesperson  added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Flipkart had asked the government for a six-month extension, a person familiar with the matter told CNN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The company reportedly warned of “significant customer disruption” if  the new policy is implemented this week. Flipkart CEO Kalyan  Krishnamurthy said in a letter to the Indian government that the new  rules could “have undesirable impacts on the continued growth of  e-commerce in India,” &lt;a href="https://www.reuters.com/article/us-india-ecommerce-flipkart-exclusive/exclusive-walmarts-flipkart-warns-of-major-customer-disruption-if-new-india-rules-not-delayed-idUSKCN1PN12E" rel="noopener" target="_blank"&gt;according to Reuters&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules will affect the Bangalore-based company’s sales of products like &lt;a href="https://edition.cnn.com/2018/10/12/tech/flipkart-amazon-india-smartphone/index.html" rel="noopener" target="_blank"&gt;smartphones&lt;/a&gt;, many of which it &lt;a href="https://www.flipkart.com/oppo-new-launch-2wer3-3wsdf-store?affid=HotDeals20&amp;amp;affExtParam2=redpixel&amp;amp;affExtParam1=4513302" rel="noopener" target="_blank"&gt;offers exclusively&lt;/a&gt; to its customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Flipkart declined to comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The changes follow intensive lobbying by India’s small businesses  against Amazon and Walmart’s outsized influence in the country.  (Together they have more than 70% of the Indian online shopping market.)&lt;b&gt; &lt;/b&gt;The  Confederation of All India Traders, which says it represents more than  70 million local retailers, warned the government against granting an  extension.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If any deferment or extension is given, the small traders both  offline and online will be compelled to resort to a national campaign  against any such move … which may also have political repercussions,”  the group said in a statement earlier this week, a thinly-veiled warning  to the government in an election year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The trade body expressed “deep satisfaction” at the government’s decision not to extend the deadline.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India’s WhatsApp problem&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s effort to further regulate its internet isn’t restricted to retail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In late December, two days before the e-commerce restrictions were  unveiled, India’s technology ministry published a host of proposed  changes to laws governing online content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The changes state that “intermediaries” including internet providers  and platforms like Facebook and Twitter must remove “unlawful” material  within 24 hours at the request of Indian authorities. That covers  content that goes against India’s sovereignty, national security or  foreign relations as well as “public order, decency or morality,” the  new rules state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts say the broad phrasing leaves the rules open to misuse and  could be used to suppress free speech. It could also lead to self  censorship by tech companies to avoid government scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It can lead to en masse takedown of content,” said Gurshabad Grover,  a policy officer at the Bangalore-based Centre for Internet and  Society, a think tank. “Intermediaries are often happy to take down  perfectly legal content just to avoid liability.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter said in a statement that it would continue to lobby the Indian government on the proposed&lt;b&gt; &lt;/b&gt;regulations before they are passed into law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our hope is that after this robust public consultation process any  changes to the [rules] in India strike a careful balance that protects  important values such as freedom of expression,” a Twitter spokesperson  told CNN Business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google and Facebook declined to comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Asia Internet Coalition, an industry group that counts all three  companies as its members, also urged the Indian government to reconsider  the rule changes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In addition to interfering with the fundamental rights of freedom of  speech and expression, and right to privacy as guaranteed under the  constitution, the [proposed regulations] impose burdensome obligations  on the intermediaries,” the group said in a letter to India’s technology  ministry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulations appear to be driven by India’s growing battle with  fake news and misinformation, with viral rumors on Facebook’s mobile  messaging service WhatsApp blamed for &lt;a href="https://edition.cnn.com/2018/09/30/tech/facebook-whatsapp-india-misinformation/index.html" rel="noopener" target="_blank"&gt;more than a dozen lynchings&lt;/a&gt; last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government specifically called out the mob violence in its  statement announcing the regulations, citing the “misuse of social  media by criminals and anti-national elements” as a key factor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules also state that platforms must enable the tracing of  individual posts and messages at the government’s request, a requirement  that WhatsApp has &lt;a href="https://money.cnn.com/2018/08/24/technology/whatsapp-india-encryption-privacy/index.html" rel="noopener" target="_blank"&gt;previously rejected&lt;/a&gt; as a non-starter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is WhatsApp’s biggest market, with more than 200 million users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why India matters&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India has opened itself up to foreign investment in recent years,  particularly in its fast-growing tech and retail industries, and  companies from around the world have rushed in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s internet is a particularly tempting prize. About 500 million  people are already online, with nearly 900 million more yet to be  connected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon has pledged at least $5 billion dollars to growing its business in the country, while &lt;a href="https://money.cnn.com/2018/05/09/investing/walmart-flipkart-india-softbank/" rel="noopener" target="_blank"&gt;Walmart spent $16 billion&lt;b&gt; &lt;/b&gt;to buy Flipkart&lt;/a&gt; last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook and Google have also identified India as their next big  market, rolling out several features and services in the country before  taking it to the rest of the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the changing legal environment presents a huge challenge, and Big Tech is battling to keep the promise alive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“An uncertain, constantly changing regulatory environment is not good  for any business,” Mishi Choudhary, legal director at the New  York-based advocacy group Software Freedom Law Center&lt;b&gt;,&lt;/b&gt; told CNN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India must decide where it sees itself in the global landscape,”  Choudhary added. “It can either be a democracy that will let the best  company win and provide an open, free and secure internet to its  citizens or turn the way our neighbors across the Himalayas [China]  have. It can’t have it both ways.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india'&gt;https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-01T15:03:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/january-19-newsletter">
    <title>January 2019 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/january-19-newsletter</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) welcomes you to the first issue of its e-Newsletter for 2019.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The CIS &lt;span class="highlightedSearchTerm"&gt;newsletter&lt;/span&gt; aims to  highlight developments in copyright and patent, free speech and  expression, privacy, cyber security, telecom, etc. as well as Industry  4.0, big data, additive manufacturing and so on which are  revolutionizing and moving the digital world forward. Through this &lt;span class="highlightedSearchTerm"&gt;newsletter&lt;/span&gt; we look to engage you with our research and build a strong bond by  bringing you insightful articles and blog posts which will be beneficial  for you and your business. Throughout the year we will send you stories  and insights from our board, staff and community leaders. We welcome  your feedback, suggestions or comments regarding our &lt;span class="highlightedSearchTerm"&gt;newsletter&lt;/span&gt; or any other aspect of our research.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Welcome to r@w blog!&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS researchers@work programme (RAW) is delighted to &lt;a class="external-link" href="https://medium.com/rawblog"&gt;announce the launch of its new blog hosted on Medium&lt;/a&gt;. The RAW blog will feature works by researchers and practitioners working in India and  elsewhere at the intersections of internet, digital media, and society. The blog will also feature highlights and materials from ongoing research and events at the researchers@work programme.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Highlights for January 2019&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Ambika Tandon and Aayush Rathi have produced &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work"&gt;a research paper that contextualises the narrative around Industry 4.0 and the future of work&lt;/a&gt; with reference to the female labour force in India. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Gurshabad Grover, Nikhil Srinath and Aayush Rathi (with inputs from Anubha Sinha and Sai Shakti) presented a response to the Telecom Regulatory Authority of India’s Consultation Paper on &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-ott-communication-services"&gt;Regulatory Framework for Over-The-Top (OTT) Communication Services&lt;/a&gt;. &lt;i&gt;CIS appreciates the continual efforts of TRAI to have consultations on the regulatory framework that should be applicable to OTT services and Telecom Service Providers (TSPs)&lt;/i&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Pranesh Prakash, Karan Saini and Elonnai Hickok &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/pranesh-prakash-elonnai-hickok-karan-saini-january-23-2019-leveraging-the-coordinated-vulnerability-disclosure-process-to-improve-the-state-of-information-security-in-india"&gt;authored a policy brief that recommends several changes&lt;/a&gt; pertaining to current legislation, policy and practice to the Government of India regarding coordinated vulnerability disclosure (“CVD”) for improving the overarching information and cyber security posture of the country. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Global Commission on the Stability of Cyberspace, a multi-stakeholder initiative comprised of eminent individuals across the globe opened a public comment procedure to solicit comments and obtain additional feedback. Arindrajit Basu, Gurshabad Grover and Elonnai Hickok &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation"&gt;responded to the public call-offering comments on all six norms and proposing two further norms&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;CIS and the News&lt;/h3&gt;
&lt;p&gt;The following news pieces were authored by CIS and published on its website in January:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy"&gt;How to make EVMs hack-proof, and elections more trustworthy&lt;/a&gt; (Pranesh Prakash; Times of India; December 9, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019"&gt;Registering for Aadhaar in 2019&lt;/a&gt; (Sunil Abraham; Business Standard; January 2, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved"&gt;The DNA Bill has a sequence of problems that need to be resolved&lt;/a&gt; (Shweta Mohandas and Elonnai Hickok; Newslaundry; January 15, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content"&gt;India should reconsider its proposed regulation of online content&lt;/a&gt; (Gurshabad Grover; Hindustan Times; January 24, 2019). &lt;i&gt;Akriti Bopanna and Aayush Rathi provided feedback for the article&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/nishant-shah-indian-express-january-27-2019-indias-proposed-new-internet-bill-is-as-repressive-as-the-worst-of-chinese-laws"&gt;India’s proposed new internet bill is as repressive as the worst of Chinese laws&lt;/a&gt; (Nishant Shah; Indian Express; January 27, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;CIS in the News&lt;/h3&gt;
&lt;p&gt;CIS was quoted in these news articles published elsewhere:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you"&gt;Creeped out by Netflix's 'You'? Here's how you can avoid online stalkers, data thieves&lt;/a&gt; (Sanyukta Dharmadhikari; The News Minute; January 10, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru"&gt;Civic activism over WhatsApp and stories of and from cab drivers are part of a new narrative in Bengaluru&lt;/a&gt; (Sowmya Rajaram; Bangalore Mirror; January 13, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are"&gt;They know where you are&lt;/a&gt; (Tini Sara Anien; Deccan Herald; January 17, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears"&gt;Oyo Hotels’ Real-Time Digital Record Database Sparks Privacy Fears&lt;/a&gt; (Nishant Sharma; Bloomberg Quint; January 16, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data"&gt;Is the viral #10YearChallenge just another sneaky way for tech firms to gather users’ personal data?&lt;/a&gt; (Devarsi Ghosh; Scroll.in; January 18, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/news/wired-january-22-2019-google-wikipedia-machine-learning-glow-languages"&gt;Google Gives Wikimedia Millions—Plus Machine Learning Tools&lt;/a&gt; (Wired; January 22, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy"&gt;New movies lose out due to piracy&lt;/a&gt; (Surupasree Sarmmah; Deccan Herald; January 23, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india"&gt;Submitted Your Biometrics for Aadhaar? Here’s How You Can Lock/Unlock That Data&lt;/a&gt; (Vidya Raja; Better India; January 24, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers"&gt;India’s largest bank SBI leaked account data on millions of customers&lt;/a&gt; (Zack Whittaker; Tech Crunch; January 30, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly"&gt;Open standards can disrupt Facebook’s messaging monopoly&lt;/a&gt; (Abhimanyu Ghoshal; The Next Web; January 30, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details"&gt;Conmen seed fake phone numbers in Google to trap people looking for customer care details &lt;/a&gt;(Tushar Kaushik; Economic Times; January 30, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india"&gt;Amazon and Walmart are about to take a big hit in India&lt;/a&gt; (Q13 Fox; January 31, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;/div&gt;
&lt;h2&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Security&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation"&gt;Response to GCSC on Request for Consultation: Norm Package Singapore&lt;/a&gt; (Gurshabad Grover, Arindrajit Basu and Elonnai Hickok; January 22, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;b&gt;Policy Brief&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/pranesh-prakash-elonnai-hickok-karan-saini-january-23-2019-leveraging-the-coordinated-vulnerability-disclosure-process-to-improve-the-state-of-information-security-in-india"&gt;Leveraging the Coordinated Vulnerability Disclosure Process to Improve the State of Information Security in India&lt;/a&gt; (Pranesh Prakash; Karan Saini and Elonnai Hickok; January 23, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation"&gt;CIS Submission to UN High Level Panel on Digital Co-operation&lt;/a&gt; (Aayush Rathi, Ambika Tandon, Arindrajit Basu and Elonnai Hickok; January 30, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Gender&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work"&gt;A Gendered Future of Work&lt;/a&gt; (Ambika Tandon and Aayush Rathi; December 19, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organized&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/rfcs-we-love-meetup"&gt;RFCs We Love meetup&lt;/a&gt; (Organized by CIS and India Internet Engineering Society; CIS, Bangalore; January 19, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated / Partnered In&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules"&gt;Webinar on the draft Intermediary Guidelines Amendment Rules&lt;/a&gt; (Organized by CCAOI and the ISOC Delhi Chapter; New Delhi; January 10, 2019). Gurshabad Grover was a discussant in the panel.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/news/medianama-roundtables-on-intermediary-liability-rules"&gt;MediaNama roundtables on intermediary liability rules&lt;/a&gt; (St. Marks Hotel, Bangalore; January 25, 2019). CIS was a community partner. Gurshabad Grover participated in the meeting.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet"&gt;DSCI's Bangalore chapter meet&lt;/a&gt; (Organized by Data Security Council of India; Bangalore; January 29, 2019). Karan Saini and Gurshabad Grover participated in the meet.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;h2&gt;&lt;a class="external-link" href="https://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The  growth in telecommunications in India has been impressive. While the  potential for growth and returns exist, a range of issues need to be  addressed for this potential to be realized. One aspect is more  extensive rural coverage and the second aspect is a countrywide access  to broadband which is low at about eight million subscriptions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Submission&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt; &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-ott-communication-services"&gt;Response to TRAI Consultation Paper on Regulatory Framework for Over-The-Top (OTT) Communication Services&lt;/a&gt; (Gurshabad Grover, Nikhil Srinath and Aayush Rathi with inputs from Anubha Sinha and Sai Shakti; January 10, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;h2&gt;&lt;a class="external-link" href="https://cis-india.org/raw"&gt;Researchers at Work (RAW)&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcement&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/irc19-list"&gt;Internet Researchers' Conference 2019 (IRC19): #List, Jan 30 - Feb 1, Lamakaan&lt;/a&gt; (P.P. Sneha; January 9, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a class="external-link" href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and  Society  (CIS) is a non-profit organisation that undertakes  interdisciplinary  research on internet and digital technologies from  policy and academic  perspectives. The areas of focus include digital  accessibility for  persons with disabilities, access to knowledge,  intellectual property  rights, openness (including open data, free and  open source software,  open standards, open access, open educational  resources, and open  video), internet governance, telecommunication  reform, digital privacy,  and cyber-security. The academic research at  CIS seeks to understand  the reconfigurations of social and cultural  processes and structures as  mediated through the internet and digital  media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet!   Write a cheque in favour of 'The Centre for Internet and Society' and   mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru -   5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners,  artists, and theoreticians,  both organisationally and as individuals,  to engage with us on topics  related internet and society, and improve  our collective understanding  of this field. To discuss such  possibilities, please write to Sunil  Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org  (for  academic research), with an indication of the form and the  content of  the collaboration you might be interested in. To discuss  collaborations  on Indic language Wikipedia projects, write to Tanveer  Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary  donor the Kusuma Trust founded  by Anurag Dikshit and Soma Pujari,  philanthropists of Indian origin for  its core funding and support for  most of its projects. CIS is also  grateful to its other donors,  Wikimedia Foundation, Ford Foundation,  Privacy International, UK, Hans  Foundation, MacArthur Foundation, and  IDRC for funding its various  projects&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/january-19-newsletter'&gt;https://cis-india.org/about/newsletters/january-19-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-03-03T16:34:21Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly">
    <title>Open standards can disrupt Facebook’s messaging monopoly</title>
    <link>https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly</link>
    <description>
        &lt;b&gt;Facebook made the news last week when The New York Times’ Mike Isaac reported that CEO Mark Zuckerberg intended to integrate the company’s three messaging platforms: WhatsApp, Messenger, and Instagram.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Abhimanyu Ghoshal was &lt;a class="external-link" href="https://thenextweb.com/facebook/2019/01/28/open-standards-can-help-disrupt-facebook-messaging-monopoly/"&gt;published in The Next Web&lt;/a&gt; on January 30, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;We don’t have all the details of exactly how this will work. The plan is still in its early stages, and there are plenty of moving parts – legal and technical – to take care of. What’s clear is this: with more than 2.6 billion users between the platforms, this is set to impact a lot of people if it goes through – and potentially many hundreds of millions more in the following years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the specifics of the move are yet to be revealed, a move like  this could help Facebook create more detailed profiles of its users.  Even if the company encrypts communications end-to-end as it seemed to  imply in its responses to NYT, it could still leverage communications  metadata to target ads more accurately than you might think.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here’s an example: without looking at your messages (because they’re  encrypted), Facebook could gather data on who you chat with most often  and for how long, later correlating that with the recipients’ interests  from Instagram. It could then show you ads for gifts that contact may  like, right around the time their birthday comes up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Integrating these platforms could also bolster Facebook’s efforts to  keep users tied into its ecosystem. That’s problematic, when you  consider the larger your network of contacts is on the company’s  services, the harder it is for you to leave them and use an alternative  you’re more comfortable with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is there a way out? &lt;a href="https://www.linkedin.com/in/praneshprakash/" rel="nofollow noopener" target="_blank"&gt;Pranesh Prakash&lt;/a&gt; – a Fellow at the &lt;a href="https://cis-india.org/" rel="nofollow noopener" target="_blank"&gt;Center for Internet and Society&lt;/a&gt;, as well as a Fellow at the &lt;a href="https://www.newamerica.org/" rel="nofollow noopener" target="_blank"&gt;New America&lt;/a&gt; think tank – believes that the answer lies not in breaking up Facebook  over privacy laws, but in competition, and regulators at the government  level should demand Facebook use open standards for its messaging  platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash explained that standards like SMTP and IMAP, which are used  for facilitating email exchanges, allow for interoperability between  services run by different organizations. They also let users choose the  client apps they prefer for accessing their inboxes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook’s messaging services, meanwhile, run on closed standards and don’t play nice with platforms created by third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This results in people becoming trapped in Facebook’s ecosystem: even  if you’re opposed to using the company’s products, you can’t  realistically ditch them all because your friends and family are all  using its platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case you’re worried about open-source protocols not being up to  the task of serving massive networks like the ones Facebook operates,  consider the fact that &lt;a href="https://mycodeplex.wordpress.com/2016/03/08/inside-of-whatsapp-part-1/" rel="nofollow noopener" target="_blank"&gt;WhatsApp runs on FunXMPP&lt;/a&gt;, a customized version of &lt;a href="https://xmpp.org/" rel="nofollow noopener" target="_blank"&gt;the open XMPP set of standards&lt;/a&gt; that anyone can use for their own projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If Facebook is doing the difficult legwork of unifying the underlying  technical infrastructure of its three apps, Prakash argues, &lt;a href="https://www.hindustantimes.com/analysis/privacy-laws-cannot-make-facebeook-and-google-accountable/story-Yne6DwUoGb0eO9mRxaDTaL.html" rel="nofollow noopener" target="_blank"&gt;it’d do well to make its new protocol public and open-source&lt;/a&gt;.  That way, anyone should be able to use the company’s services to reach  people just the same as when they choose to use a service created by a  separate entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash said that the only way diminishing Facebook’s power in this  regard is to open up access to its network of users. In doing so, it  will see people stick with the company’s services because they like  using them, not because they can’t stay in touch with their contacts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions surrounding Facebook’s monopolistic domination of the  messaging space will inevitably crop up when the company implements  Zuckerberg’s plan, and this sounds like a healthy way to tackle those  issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Naturally, that seems like it’d hurt Facebook’s bottom line – but  it’s important to start thinking about realistic measures to comply with  antitrust law – or risk being booted from countries that don’t  appreciate the way the company does business.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly'&gt;https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T01:59:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation">
    <title>CIS Submission to UN High Level Panel on Digital Co-operation</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation</link>
    <description>
        &lt;b&gt;The High-level Panel on Digital Cooperation was convened by the UN Secretary-General to advance proposals to strengthen cooperation in the digital space among Governments, the private sector, civil society, international organizations, academia, the technical community and other relevant stakeholders. The Panel issued a call for input that called for responses to various questions. CIS responded to the call for inputs.&lt;/b&gt;
        &lt;p&gt;Download the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/submission-to-un-high-level-panel-on-digital-cooperation"&gt;submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation'&gt;https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi, Ambika Tandon, Arindrajit Basu and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2019-02-19T01:41:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india">
    <title>Submitted Your Biometrics for Aadhaar? Here’s How You Can Lock/Unlock That Data</title>
    <link>https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india</link>
    <description>
        &lt;b&gt;Did you know that UIDAI provides a facility that allows users to lock/unlock their Aadhaar biometric data online?&lt;/b&gt;
        &lt;p&gt;The blog post by Vidya Raja was &lt;a class="external-link" href="https://www.thebetterindia.com/170550/aadhaar-biometric-privacy-safety-online-india/"&gt;published in the Better India&lt;/a&gt; on January 24, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Imagine someone hacking into your Netflix account – all you have to do is change the password. However, if there is a security &lt;a href="https://www.thebetterindia.com/99520/aadhaar-card-right-over-our-body-privacy-government/" rel="noopener" target="_blank"&gt;breach&lt;/a&gt; with respect to your biometric details, there is no reversing it.  So think carefully about how and where you submit your details.  While the Supreme Court has said that it is no longer mandatory to  link Aadhaar with your bank accounts or your telecom service provider,  it does not lessen the importance of Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, The Centre for Internet &amp;amp; Society, in a report published in &lt;a href="https://www.livemint.com/Money/YD7dqEVRJbrqoAs3h4PuJO/Are-biometrics-hackproof.html" rel="noopener" target="_blank"&gt;The Mint&lt;/a&gt;,  says, “Biometric devices are not hack-proof. It depends on the ease  with which this can be done. In Malaysia, thieves who stole a car with a  fingerprint-based ignition system simply chopped off the owner’s  finger. When a biometric attendance system was introduced at the  Institute of Chemical Technology (ICT) in Mumbai, students continued  giving proxies by using moulds made from Fevicol.”  Over the last year, there has been so much chatter about the Aadhaar number and how one can protect one’s information.&lt;/p&gt;
&lt;p&gt;Did you know that UIDAI provides a facility that allows users to lock/unlock their Aadhaar biometric data online?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;In this article, we explain how you can do that.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Locking biometrics online:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Visit UIDAI’s &lt;a href="https://uidai.gov.in/" rel="noopener" target="_blank"&gt;online&lt;/a&gt; portal to lock or unlock your biometrics&lt;/li&gt;
&lt;li&gt;Once there, you will need to click on ‘My Aadhaar’ and under the Aadhaar Services tab, click on Lock/Unlock Biometrics&lt;/li&gt;
&lt;li&gt;You will then be redirected to a new page and prompted to enter the 12-digit Aadhaar number and the security code&lt;/li&gt;
&lt;li&gt;Once the details have been entered, click on ‘Send OTP’&lt;/li&gt;
&lt;li&gt;You will receive an OTP on your registered mobile number&lt;/li&gt;
&lt;li&gt;Enter this and click on the Login button&lt;/li&gt;
&lt;li&gt;This feature will allow you to lock your biometrics&lt;/li&gt;
&lt;li&gt;Enter the 4-digit security code mentioned on the screen and click on the ‘Enable’ button&lt;/li&gt;
&lt;li&gt;Your biometrics will be locked, and you will have to unlock it in case you want to access it again&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Unlocking biometrics online:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;To unlock your biometrics, click on the ‘Login’ button&lt;/li&gt;
&lt;li&gt;Enter your Aadhaar number and the security code in the designated spaces&lt;/li&gt;
&lt;li&gt;Now click on ‘Send OTP’&lt;/li&gt;
&lt;li&gt;An OTP will be sent to your registered mobile number&lt;/li&gt;
&lt;li&gt;Enter it in the space provided and click on ‘Login’&lt;/li&gt;
&lt;li&gt;In case you want to temporarily unlock the biometrics, enter the security code and click on the unlock button&lt;/li&gt;
&lt;li&gt;Your biometrics will be unlocked for 10 minutes&lt;/li&gt;
&lt;li&gt;The locking date and time is mentioned on the screen after which biometrics will be automatically locked&lt;/li&gt;
&lt;li&gt;When you do not want to lock your biometrics, you can disable the lock permanently.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Using mAadhaar to lock/unlock biometrics:&lt;/h2&gt;
&lt;p&gt;mAadhaar is the official mobile application developed by the Unique  Identification Authority of India (UIDAI). Presently, it is available on  the &lt;a href="https://play.google.com/store/apps/details?id=in.gov.uidai.mAadhaarPlus&amp;amp;hl=en_IN" rel="noopener" target="_blank"&gt;Android&lt;/a&gt; platform.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Once the mAadhaar app has been downloaded, the user must use their Aadhaar card registered mobile number to login.&lt;/li&gt;
&lt;li&gt;You will then be sent an OTP that you are required to enter for  authentication. Do remember to change your password once registered.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On the top right side, tap on ‘Biometric lock’, and enter your  password to lock the biometrics. Once locked, it will show a small lock  icon next to your profile.&lt;/li&gt;
&lt;li&gt;To unlock, tap on the same icon followed by your password. The  information will unlock for 10 minutes. After that, it will be locked  again.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Once you lock this information, it ensures that even the Aadhaar  holder will not be able to use their biometric data (iris scan and  fingerprints) for authentication, until unlocked.&lt;/li&gt;
&lt;li&gt;If you try to use this information without unlocking, it will show you an error code 330.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Remember to lock and unlock your biometrics through a trusted  channel. The fact that there is no fee involved in either exercise will  make this easier. Also, even with the biometric locked, you can continue  to use the OTP-based authentication process for transactions, where you  will receive the OTP on your registered mobile number and e-mail  address.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(Edited by Shruti Singhal)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india'&gt;https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-02T02:09:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content">
    <title>India should reconsider its proposed regulation of online content</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content</link>
    <description>
        &lt;b&gt;The lack of technical considerations in the proposal is also apparent since implementing the proposal is infeasible for certain intermediaries. End-to-end encrypted messaging services cannot “identify” unlawful content since they cannot decrypt it. Presumably, the government’s intention is not to disallow end-to-end encryption so that intermediaries can monitor content.&lt;/b&gt;
        &lt;p class="moz-quote-pre"&gt;The article was &lt;a class="external-link" href="https://www.hindustantimes.com/analysis/india-should-reconsider-its-proposed-regulation-of-online-content/story-vvuPhz6tuxNIKTjXbRhijO.html"&gt;published in the Hindustan Times&lt;/a&gt; on January 24, 2019. The author would like to thank Akriti Bopanna and Aayush Rathi for their feedback.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Flowing from the Information Technology (IT) Act, India’s current  intermediary liability regime roughly adheres to the “safe harbour”  principle, i.e. intermediaries (online platforms and service providers)  are not liable for the content they host or transmit if they act as mere  conduits in the network, don’t abet illegal activity, and comply with  requests from authorised government bodies and the judiciary. This  paradigm allows intermediaries that primarily transmit user-generated  content to provide their services without constant paranoia, and can be  partly credited for the proliferation of online content. The law and IT  minister shared the intent to change the rules this July when discussing  concerns of online platforms being used “to spread incorrect facts  projected as news and designed to instigate people to commit crime”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  December 24, the government published and invited comments to the draft  intermediary liability rules. The draft rules significantly expand “due  diligence” intermediaries must observe to qualify as safe harbours:  they mandate enabling “tracing” of the originator of information, taking  down content in response to government and court orders within 24  hours, and responding to information requests and assisting  investigations within 72 hours. Most problematically, the draft rules go  much further than the stated intentions: draft Rule 3(9) mandates  intermediaries to deploy automated tools for “proactively identifying  and removing [...] unlawful information or content”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first  glaring problem is that “unlawful information or content” is not  defined. A conservative reading of the draft rules will presume that the  phrase means restrictions on free speech permissible under Article  19(2) of the Constitution, including that relate to national integrity,  “defamation” and “incitement to an offence”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ambiguity aside, is  mandating intermediaries to monitor for “unlawful content” a valid  requirement under “due diligence”? To qualify as a safe harbour, if an  intermediary must monitor for all unlawful content, then is it  substantively different from an intermediary that has active control  over its content and not a safe harbour? Clearly, the requirement of  monitoring for all “unlawful content” is so onerous that it is contrary  to the philosophy of safe harbours envisioned by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By  mandating automated detection and removal of unlawful content, the  proposed rules shift the burden of appraising legality of content from  the state to private entities. The rule may run afoul of the Supreme  Court’s reasoning in Shreya Singhal v Union of India wherein it read  down a similar provision because, among other reasons, it required an  intermediary to “apply [...] its own mind to whether information should  or should not be blocked”. “Actual knowledge” of illegal content, since  then, has held to accrue to the intermediary only when it receives a  court or government order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the inconsistencies with legal precedence, the rules may not stand judicial scrutiny if notified in their current form.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  lack of technical considerations in the proposal is also apparent since  implementing the proposal is infeasible for certain intermediaries.  End-to-end encrypted messaging services cannot “identify” unlawful  content since they cannot decrypt it. Internet service providers also  qualify as safe harbours: how will they identify unlawful content when  it passes encrypted through their network? Presumably, the government’s  intention is not to disallow end-to-end encryption so that  intermediaries can monitor content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Intermediaries that can  implement the rules, like social media platforms, will leave the task to  algorithms that perform even specific tasks poorly. Just recently,  Tumblr flagged its own examples of permitted nudity as pornography, and  Youtube slapped a video of randomly-generated white noise with five  copyright-infringement notices. Identifying more contextual expression,  such as defamation or incitement to offences, is a much more complex  problem. In the lack of accurate judgement, platforms will be happy to  avoid liability by taking content down without verifying whether it  violated law. Rule 3(9) also makes no distinction between large and  small intermediaries, and has no requirement for an appeal system  available to users whose content is taken down. Thus, the proposed rules  set up an incentive structure entirely deleterious to the exercise of  the right to freedom of expression. Given the wide amplitude and  ambiguity of India’s restrictions on free speech, online platforms will  end up removing swathes of content to avoid liability if the draft rules  are notified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of draconian laws to quell dissent plays a  recurring role in the history of the Indian state. The draft rules  follow India’s proclivity to join the ignominious company of  authoritarian nations when it comes to disrespecting protections for  freedom of expression. To add insult to injury, the draft rules are  abstruse, ignore legal precedence, and betray a poor technological  understanding. The government should reconsider the proposed regulation  and the stance which inspired it, both of which are unsuited for a  democratic republic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gurshabad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-24T16:59:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy">
    <title>New movies lose out due to piracy</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy</link>
    <description>
        &lt;b&gt;Piracy continues to be a huge concern among filmmakers but it can also be a marketing strategy for small-budget films.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surupasree Sarmmah was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/new-movies-lose-out-due-piracy-714536.html"&gt;Deccan Herald&lt;/a&gt; on January 23, 2019. Akriti Bopanna was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Despite a slew of measures taken by filmmakers, pirated versions of recently released films like ‘Uri: The Surgical Strike’, ‘Viswasam’, ‘KGF’ and ‘Why Cheat India’ were leaked online on websites like TamilRockers. Piracy has been a huge concern for all movie industries in India, national and regional, but experts say that not much can be done when a film is leaked online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Neville J Kattakayam, author of the book ‘The All Seeing Digital Eyes: A Guide To Privacy, Security and Literacy’, says, “The maximum one can do is to control the servers in a particular jurisdiction. But there are servers in unlikely places — like somewhere out in the sea. These places don’t fall under any jurisdiction, national or international. It becomes impossible to control the servers then.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Talking about the process of piracy, he explains that once a content is leaked, it mirages into different servers across to the world; not just online but offline too. “There are mirror sites having the same content that are immediately born. Accessibility wise, it’s all out there; there is nothing that one can completely restrict,” he says. &lt;br /&gt; &lt;br /&gt; Neville feels that it is largely in the hands of the producers to restrict access to their material until the movie is released. With people usually preferring good quality prints, theatrical replicas are not favoured much, he told Metrolife. &lt;br /&gt; &lt;br /&gt; “From what I have heard, the piracy usually happens when the copy is being sent to the censor board. Some intermediate source, who really wants to kill a movie, leaks it from there. That is the real challenge,” says Neville. &lt;br /&gt; &lt;br /&gt; Hemanth M Rao, a director, says that when a movie is leaked online, the effort, time and money put in is at stake. “You feel robbed. Most people would want to go to the theatres to watch a film but with incidents of piracy on the rise, the life span of a movie is shortened,” he says.&lt;br /&gt; &lt;br /&gt; However, he adds that the audience is beginning to understand the impact piracy has on the movie industry, especially at a time when there is intense competition between regional language industries.&lt;br /&gt; &lt;br /&gt; He has a word of praise for the Kannada Film Industry, which he feels is safeguarding interests of the artistes.&lt;br /&gt; &lt;br /&gt; “We have a close tie-up with the city police. We monitor where all a film is playing after its release. In case we come to know about any illegal activities, we intimate the police who act swiftly. This way, the access is cut down.” &lt;br /&gt; &lt;br /&gt; “Another thing that upsets me is the habit of going live on Facebook while one is at the theatre. I don’t understand what pleasure people get out of it,” he says. &lt;br /&gt; &lt;br /&gt; According to a new draft rule, being contemplated by the IT Ministry, host websites will be liable for any illegal content uploaded on their platform. Currently, a website is liable only for unlawful actions; like uploading copyrighted content without permission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Government can block access to the original host of the pirated content if needed however the traction and virality these kinds of content get make it very difficult to contain their spread. It ends up being a blanket ban on sites such as torrent sites where all the content is not illegal yet the site is blocked as a whole,” says Akriti Bopanna, Policy Officer, Centre for Internet and Society. &lt;br /&gt; &lt;br /&gt; The time taken for legal recourse doesn’t help either. Though filmmakers can approach the court for a ban on the website or server, the time taken for a legal remedy is way too long. By that time, the same link would have appeared in two or three other websites, says Akriti. “A leaked movie can be easily downloaded and sent to someone instantly.”&lt;br /&gt; &lt;br /&gt; She feels that a more effective method than banning a website or a server would be to educate people.&lt;br /&gt; &lt;br /&gt; “Not many know about copyright infringement, it is important to spread awareness from the grassroots level. Though we have messages on piracy shown at the start of every movie, these need to be more creative and fun so they will stay in the audience’s minds. Maybe the industry, as a whole, can do this as a community initiative,” she opines. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Small players don’t care much about piracy &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Small-budget movies take piracy as a marketing strategy. They feel that once people watch the movie and write reviews, the film will get an overall boost — allowing them to sell more tickets in theatres.&lt;br /&gt; &lt;br /&gt; However, major players spend crores on their movies and depend on ticket sales to get back the amount.&lt;br /&gt; &lt;br /&gt; Difficult to claim copyright from different websites&lt;br /&gt; &lt;br /&gt; Prominent production companies are targeting streaming websites who have uploaded their movies, citing copyright issues. However, floating websites like citytorrents and TamilRockers keep changing their domain name and it becomes impossible to counter them.&lt;br /&gt; &lt;br /&gt; -&lt;b&gt;Neville J Kattakayam&lt;/b&gt;&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy'&gt;https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T02:24:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation">
    <title>Response to GCSC on Request for Consultation: Norm Package Singapore</title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation</link>
    <description>
        &lt;b&gt;The GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Global Commission on the Stability of Cyberspace, a multi-stakeholder initiative comprised of eminent individuals across the globe that seeks to promote awareness and understanding among the various cyberspace communities working on issues related to international cyber security. CIS is honoured to have contributed research to this initiative previously and commends the GCSC for the work done so far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The GCSC &lt;a href="https://cyberstability.org/research/singapore_norm_package/"&gt;announced the release of its new Norm Package&lt;/a&gt; on Thursday November 8, 2018 that featured six norms that sought to promote the stability of cyberspace.This was done with the hope that they may be adopted by public and private actors in a bid to improve the international security architecture of cyberspace&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The norms introduced by the GCSC focus on the following areas:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Norm to Avoid Tampering&lt;/li&gt;
&lt;li&gt;Norm Against Commandeering of      ICT Devices into Botnets&lt;/li&gt;
&lt;li&gt;Norm for States to Create a      Vulnerability Equities Process&lt;/li&gt;
&lt;li&gt;Norm to Reduce and Mitigate      Significant Vulnerabilities&lt;/li&gt;
&lt;li&gt;Norm on Basic Cyber Hygiene as      Foundational Defense&lt;/li&gt;
&lt;li&gt;Norm Against Offensive Cyber      Operations by Non-State Actors&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms. We sincerely hope that the Commission may find the feedback useful in their upcoming deliberations.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/response-to-gcsc-on-request-for-consultation-norm-package-singapore/at_download/file"&gt;Read the full submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Gurshabad Grover and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>International Relations</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-27T15:43:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka">
    <title>Cyber Policy Centres Meeting in Sri Lanka</title>
    <link>https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka</link>
    <description>
        &lt;b&gt;Elonnai Hickok, Sunil Abraham and Ambika Tandon participated in this event organized by IDRC in Sri Lanka on January 11 - 14, 2019.&lt;/b&gt;
        &lt;ul&gt;
&lt;li&gt;Download the agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cpc-gathering-agenda.pdf"&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;See the presentation &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/idrc-privacy-project"&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka'&gt;https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-21T23:50:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/rfcs-we-love-meetup">
    <title>RFCs We Love meetup</title>
    <link>https://cis-india.org/internet-governance/news/rfcs-we-love-meetup</link>
    <description>
        &lt;b&gt;In collaboration with India Internet Engineering Society (IIESoc), CIS hosted the a 'RFCs We Love' meetup, where we discussed some IETF specifications and standards. The event was held on January 19 at the CIS office, Bangalore.

&lt;/b&gt;
        &lt;p&gt;The theme of the meetup was data centres and service providers. The agenda was:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;10:00 - 10:10    Introduction&lt;/li&gt;
&lt;li&gt;10:10 - 11:00    Link State Vector Running for DC Routing (Kannan)&lt;/li&gt;
&lt;li&gt;11:00 - 11:50    Multicast via Bit Index Explicit Replication (Senthil)&lt;/li&gt;
&lt;li&gt;11:50 - 12:40    Traffic Engineering in WAN (Shraddha)&lt;/li&gt;
&lt;li&gt;12:40 - 13:00    Open Discussion and planning for Feb meetup&lt;/li&gt;
&lt;li&gt;13:00 - 14:00    Lunch and networking&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Dhruv Dhody has written about the meetup at the IIESoc blog, where you can also find slides used by the presenters and &lt;a class="external-link" href="https://www.iiesoc.in/single-post/2019/01/21/RFCs-We-Love-SP-DC-Edition"&gt;some photos of the event&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/rfcs-we-love-meetup'&gt;https://cis-india.org/internet-governance/news/rfcs-we-love-meetup&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T13:43:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data">
    <title>Is the viral #10YearChallenge just another sneaky way for tech firms to gather users’ personal data?</title>
    <link>https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data</link>
    <description>
        &lt;b&gt;Is it merely an exercise in nostalgia? Or is it providing fodder for facial recognition algorithms on ageing?&lt;/b&gt;
        &lt;p&gt;The blog post by Devarsi Ghosh was published in &lt;a class="external-link" href="https://scroll.in/article/909752/is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data"&gt;Scroll.in&lt;/a&gt; on January 18, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“I like to look back at old memories and smile,” said the  25-year-old Kolkata resident Smitakshi Chowdhury. That’s what prompted  her to upload a decade-old photo of herself alongside a recent one on  Facebook last week without much thought. Chowdhury is among tens of  thousands of people who have participated in the “&lt;a href="https://scroll.in/article/909665/anil-kapoor-doesnt-need-it-twitter-replaces-10yearchallenge-nostalgia-with-jokes"&gt;ten year challenge&lt;/a&gt;”  that has gone viral in recent days as social media users nostalgically  display “then” and “now” images of themselves to the world.&lt;/p&gt;
&lt;p&gt;Among the prominent Indian personalities who showed how they’d changed over the decade were movie stars &lt;a class="link-external" href="https://www.instagram.com/p/BsrDsqwlNuk/?utm_source=ig_embed&amp;amp;utm_campaign=embed_loading_state_script" rel="nofollow" target="_blank"&gt;Sonam Kapoor&lt;/a&gt;, &lt;a class="link-external" href="https://www.instagram.com/p/BspkR1mAr2u/?utm_source=ig_embed&amp;amp;utm_campaign=embed_loading_state_script" rel="nofollow" target="_blank"&gt;Diana Penty&lt;/a&gt; and Shruti Haasan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But is there a darker design to this initiative to get social media  users to  sportlingly show what a difference a decade can make? On  January 15, an article in &lt;i&gt;&lt;a class="link-external" href="https://www.wired.com/story/facebook-10-year-meme-challenge/" rel="nofollow" target="_blank"&gt;Wired&lt;/a&gt;&lt;/i&gt; suggested that the fad could be an ingenious ploy to gather data on a  person’s age or how people age over time. The article by technology  writer Kate O’Neill noted that data obtained in this way could be put to  a variety of purposes, some benign such as targeted advertising, and  some not so harmless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Age progression could someday factor into insurance  assessment and health care,” O’Neill writes. “For example, if you seem  to be ageing faster than your cohorts, perhaps you’re not a very good  insurance risk. You may pay more or be denied coverage.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This hypothesis set off &lt;a class="link-external" href="https://twitter.com/search?q=facial+recogniton+facebook" rel="nofollow" target="_blank"&gt;a frenzy&lt;/a&gt;, as social media users issued warnings against participating in the challenge. But others noted that Facebook &lt;a class="link-external" href="https://www.theatlantic.com/technology/archive/2019/01/go-ahead-do-10yearschallenge/580624/" rel="nofollow" target="_blank"&gt;already has photographs&lt;/a&gt; of many long-time users from 10 years ago or more. It was also pointed  out that the metadata of images posted online contains information about  the date on which the photo was taken, where it was shot and the unique  identification number of the photo device – even though most people  don’t realise this. With so much information already out there, there  isn’t much the 10-Year Challenge could add.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Facebook has spookily sophisticated face-recognition technology, as  anyone who’s seen Facebook’s automatic tagging software at work will  tell you,” wrote Max Read in &lt;i&gt;&lt;a class="link-external" href="http://nymag.com/intelligencer/2019/01/facebook-doesnt-need-to-fool-you.html" rel="nofollow" target="_blank"&gt;New York Magazine&lt;/a&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate has revolved around not only what tech companies know about  social media users but how they share this information. For instance,  Facebook’s facial tagging system identifies people in images to third  parties, making it &lt;a class="link-external" href="http://fortune.com/2019/01/04/google-face-scanning-illinois/" rel="nofollow" target="_blank"&gt; susceptible to misuse&lt;/a&gt;. In fact, Facebook had been storing data obtained through facial recognition software since 2011, &lt;a class="link-external" href="https://www.theverge.com/2018/4/17/17246222/facebook-bipa-fines-penalty-tag-suggestions-facial-recognition" rel="nofollow" target="_blank"&gt;without notifying or obtaining consent&lt;/a&gt; from its users. It was only in February 2018 that it gave users the chance to opt out of the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook, on its part, in an official statement, said that it was not involved with the 10-Year Challenge.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;Possibilities of misuse&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While  personal information uploaded online could potentially be misused in  several ways, that does not mean just about any doomsday scenario is  feasible, said Pranesh Prakash of the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Insurance  companies always try to gather as much information as they can about a  person to weed out bad risks but governments regulate these companies on  the matter of what they can or cannot use,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, in 2018, the Delhi High Court ruled that insurance companies &lt;a href="https://scroll.in/pulse/872035/delhi-on-insurance-for-genetic-disorders-still-allows-many-conditions-to-be-excluded"&gt;could not deny coverage to a person&lt;/a&gt; based on their genetic history, he noted. However, the contradictory  ruling also said that if a disorder was established after genetic  testing, the insurance company could deny coverage or demand higher  premiums.&lt;/p&gt;
&lt;p&gt;Prakash suggested a more dire situation. “Suppose the  data produced from the 10-Year Challenge is used to improve the quality  of deepfakes and that is put into making pornography about you against  your will?” he said. “That business, unlike insurance, is unregulated.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the prospect of a person’s rate of ageing being  calculated by algorithms could also be beneficial. “If a medical AI  [artificial intelligence] company figures out your health looking at the  data based on your face and detects early skin cancer, would anyone be  complaining about this?” asked Shashank Bijapur, co-founder of  SpotDraft, a Gurgaon-based company that creates and manages legal  contracts using artificial intelligence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He noted that while it is  impractical to expect businesses to ignore the opportunity to use such  data to their advantage, social media users should  make informed  decisions while signing up on platforms. “Every such app online has a  privacy policy which is made available to whoever is using it right at  the beginning,” Bijapur said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data'&gt;https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-02T13:57:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears">
    <title>Oyo Hotels’ Real-Time Digital Record Database Sparks Privacy Fears</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears</link>
    <description>
        &lt;b&gt;Oyo Hotels’ pilot to maintain a real-time digital database of guests and plan to share it with law-enforcement agencies has triggered privacy concerns.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nishant Sharma was &lt;a class="external-link" href="https://www.bloombergquint.com/business/oyos-real-time-digital-record-database-sparks-privacy-fears"&gt;published by Bloomberg Quint&lt;/a&gt; on January 16, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The digital check-in and check-out database of guests will do away with the conventional arrival and departure registers, &lt;a href="https://www.bloombergquint.com/technology/former-indigo-president-aditya-ghosh-roped-in-as-ceo-of-oyo-hotels" target="_blank"&gt;Aditya Ghosh, chief executive India and South Asia at the hotel chain&lt;/a&gt; said at a CII event, according to a &lt;a href="https://www.business-standard.com/article/companies/oyo-s-digital-records-to-give-state-govts-law-enforcers-info-on-guests-119011400888_1.html" target="_blank"&gt;report&lt;/a&gt; in Business Standard. That will make the process efficient and  transparent and the SoftBank-backed startup has received acceptance from  governments of Haryana, Rajasthan and Telangana for the proposed  digitisation of guest entry and departure records, the report said  quoting Ghosh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That triggered an outrage on social media, with users calling it invasion of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Oyo,  in an emailed statement to BloombergQuint, said it will provide  information to the law-enforcement agencies about who is staying only  after an information order is issued by the police. The company said it  will create “stronger data security net”. Oyo, however, didn't clarify  who will maintain the data centres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centralisation of data of any  kind isn't good and will make data more fragile, Sunil Abraham, founder  of research think tank Center for Internet and Society, told  BloombergQuint. “If someone manages to break into the police data, or  where the data is stored then they will be able to have the access to  the data. It is always good to store data locally.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just last  year, Marriott International Inc. reported a hack in which passport  numbers, emails and mailing addresses of 327 million of its 500 million  Starwood guests was leaked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To be sure, police always have access  to data of customers staying at hotels, one way or the another. As per  existing regulations, all hotels, bed and breakfasts and guest-houses  have to make an entry of guests checking in and out in a register. This  can be checked by the local police when an information order is  presented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chances of manipulating information in such a register  is high, and at times police go through the data without having an  information order as well, said an industry executive requesting  anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srinivas Kodali, a cybersecurity expert, said such a  centralised database makes business sense for Oyo because they will get  access to data not just of people who booked through them but also of  others who checked in without booking online. “Because there is no law,  the entities can do it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, a technology policy  analyst and affiliated fellow at CIS, sees this as an invasion of  privacy in the absence of law. Digitisation of data can be allowed only  after there’s a law on what happens in the case it’s misused. There is  no legal framework about how and where the data will be used, he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-18T02:26:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules">
    <title>Webinar on the draft Intermediary Guidelines Amendment Rules</title>
    <link>https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules</link>
    <description>
        &lt;b&gt;CCAOI and the ISOC Delhi Chapter organised a webinar on January 10 to discuss the draft  "The Information Technology [Intermediary Guidelines (Amendment) Rules] 2018". Gurshabad Grover was a discussant in the panel.&lt;/b&gt;
        &lt;p&gt;The agenda of the discussion was:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A brief introduction to the draft highlighting the key issues[Shashank Mishra]&lt;/li&gt;
&lt;li&gt;Invited experts sharing their view on the paper and questions asked [Nehaa Chaudhari, Paul Brooks, Arjun Sinha, Gurshabad Grover]&lt;/li&gt;
&lt;li&gt;Open Discussion Q&amp;amp;A&lt;/li&gt;
&lt;li&gt;Summarizing the session&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;A recording of the session can be &lt;a class="external-link" href="https://livestream.com/internetsociety/intermediaryrules"&gt;accessed here&lt;/a&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules'&gt;https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2019-01-18T02:13:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are">
    <title>They know where you are</title>
    <link>https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are</link>
    <description>
        &lt;b&gt;With hotel-booking app routinely sharing real-time guest data with police and government, lives of those fleeing persecution is in danger, privacy advocates fear.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Tini Sara Anien was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/they-know-where-you-are-713535.html"&gt;Deccan Herald&lt;/a&gt; on January 17, 2019. Aayush Rathi was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Oyo Rooms, the online hotel room booking service, has been receiving brickbats since it disclosed this week that it was sharing real-time data of guests with the police and the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet and legal experts in Bengaluru say it is a breach of informational privacy, granted as a fundamental right by the Constitution. Couples running away from hostile families and individuals escaping religious and political persecution are at huge risk if their whereabouts are shared, they say.&lt;/p&gt;
&lt;p&gt;Aayush Rathi, policy officer with Centre for Internet and Society, finds the sharing of live guest data disturbing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Hotels have always maintained records. Earlier, when information from hotels was needed, a specific query had to be raised by law enforcement, pursuant to an ongoing case. The registry represents a significant departure by facilitating the collection of this data by law enforcement without cause,” he says.&lt;/p&gt;
&lt;p&gt;He also rues the lack of transparency about what the government will do with such data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The government is already collecting a lot of data and has little direction on what to do with it. There is no clarity on how this information will be used and protected. The government might say it is necessary for security, a very broad umbrella term, but in the absence of regulations, the data can be used for purposes little to do with security,” says Rathi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The service had initially marketed itself as a couple-friendly service, while across the country, unmarried, inter-faith couples face various challenges finding a room. “This targeting could get even more enhanced,” he fears.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, passport details were leaked from a popular hotel chain. The leaked data from hotel bookings can be used for multifarious purposes, ranging from selling to potential advertisers to identity theft,” Rathi says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawyer-researcher Nayantara Ranganathan, from the Internet Democracy Project, says the argument that sharing data improves privacy is “absolutely disingenuous.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Sharing all guest records in real-time to state governments and law enforcement is shocking and most definitely a breach of privacy,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the state getting access to such information with the promise of preventive policing, there is no telling how data is going to be used, she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She finds it bizarre that a private company is proactively sharing data, especially at a time when companies are “waking up to the fact that their consumers value their privacy.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why it endangers lives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vinay Sreenivasa, lawyer and member of Alternative Law Forum, says providing access to such information is ‘criminal.’ “A couple could be running away from moral policing after an inter-caste marriage and people might be tracking them, or someone might be going through a divorce and just need some privacy. There could be several reasons why one seeks a room and such data could put lives at risk,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court has clearly stated one’s data is one’s own and consent has to be taken when any personal information is used. The government has no business accessing such information, he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are'&gt;https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-18T02:14:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
