<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 361 to 375.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/rfcs-we-love-meetup"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india">
    <title>Submitted Your Biometrics for Aadhaar? Here’s How You Can Lock/Unlock That Data</title>
    <link>https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india</link>
    <description>
        &lt;b&gt;Did you know that UIDAI provides a facility that allows users to lock/unlock their Aadhaar biometric data online?&lt;/b&gt;
        &lt;p&gt;The blog post by Vidya Raja was &lt;a class="external-link" href="https://www.thebetterindia.com/170550/aadhaar-biometric-privacy-safety-online-india/"&gt;published in the Better India&lt;/a&gt; on January 24, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Imagine someone hacking into your Netflix account – all you have to do is change the password. However, if there is a security &lt;a href="https://www.thebetterindia.com/99520/aadhaar-card-right-over-our-body-privacy-government/" rel="noopener" target="_blank"&gt;breach&lt;/a&gt; with respect to your biometric details, there is no reversing it.  So think carefully about how and where you submit your details.  While the Supreme Court has said that it is no longer mandatory to  link Aadhaar with your bank accounts or your telecom service provider,  it does not lessen the importance of Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, The Centre for Internet &amp;amp; Society, in a report published in &lt;a href="https://www.livemint.com/Money/YD7dqEVRJbrqoAs3h4PuJO/Are-biometrics-hackproof.html" rel="noopener" target="_blank"&gt;The Mint&lt;/a&gt;,  says, “Biometric devices are not hack-proof. It depends on the ease  with which this can be done. In Malaysia, thieves who stole a car with a  fingerprint-based ignition system simply chopped off the owner’s  finger. When a biometric attendance system was introduced at the  Institute of Chemical Technology (ICT) in Mumbai, students continued  giving proxies by using moulds made from Fevicol.”  Over the last year, there has been so much chatter about the Aadhaar number and how one can protect one’s information.&lt;/p&gt;
&lt;p&gt;Did you know that UIDAI provides a facility that allows users to lock/unlock their Aadhaar biometric data online?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;In this article, we explain how you can do that.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Locking biometrics online:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Visit UIDAI’s &lt;a href="https://uidai.gov.in/" rel="noopener" target="_blank"&gt;online&lt;/a&gt; portal to lock or unlock your biometrics&lt;/li&gt;
&lt;li&gt;Once there, you will need to click on ‘My Aadhaar’ and under the Aadhaar Services tab, click on Lock/Unlock Biometrics&lt;/li&gt;
&lt;li&gt;You will then be redirected to a new page and prompted to enter the 12-digit Aadhaar number and the security code&lt;/li&gt;
&lt;li&gt;Once the details have been entered, click on ‘Send OTP’&lt;/li&gt;
&lt;li&gt;You will receive an OTP on your registered mobile number&lt;/li&gt;
&lt;li&gt;Enter this and click on the Login button&lt;/li&gt;
&lt;li&gt;This feature will allow you to lock your biometrics&lt;/li&gt;
&lt;li&gt;Enter the 4-digit security code mentioned on the screen and click on the ‘Enable’ button&lt;/li&gt;
&lt;li&gt;Your biometrics will be locked, and you will have to unlock it in case you want to access it again&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Unlocking biometrics online:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;To unlock your biometrics, click on the ‘Login’ button&lt;/li&gt;
&lt;li&gt;Enter your Aadhaar number and the security code in the designated spaces&lt;/li&gt;
&lt;li&gt;Now click on ‘Send OTP’&lt;/li&gt;
&lt;li&gt;An OTP will be sent to your registered mobile number&lt;/li&gt;
&lt;li&gt;Enter it in the space provided and click on ‘Login’&lt;/li&gt;
&lt;li&gt;In case you want to temporarily unlock the biometrics, enter the security code and click on the unlock button&lt;/li&gt;
&lt;li&gt;Your biometrics will be unlocked for 10 minutes&lt;/li&gt;
&lt;li&gt;The locking date and time is mentioned on the screen after which biometrics will be automatically locked&lt;/li&gt;
&lt;li&gt;When you do not want to lock your biometrics, you can disable the lock permanently.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Using mAadhaar to lock/unlock biometrics:&lt;/h2&gt;
&lt;p&gt;mAadhaar is the official mobile application developed by the Unique  Identification Authority of India (UIDAI). Presently, it is available on  the &lt;a href="https://play.google.com/store/apps/details?id=in.gov.uidai.mAadhaarPlus&amp;amp;hl=en_IN" rel="noopener" target="_blank"&gt;Android&lt;/a&gt; platform.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Once the mAadhaar app has been downloaded, the user must use their Aadhaar card registered mobile number to login.&lt;/li&gt;
&lt;li&gt;You will then be sent an OTP that you are required to enter for  authentication. Do remember to change your password once registered.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On the top right side, tap on ‘Biometric lock’, and enter your  password to lock the biometrics. Once locked, it will show a small lock  icon next to your profile.&lt;/li&gt;
&lt;li&gt;To unlock, tap on the same icon followed by your password. The  information will unlock for 10 minutes. After that, it will be locked  again.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Once you lock this information, it ensures that even the Aadhaar  holder will not be able to use their biometric data (iris scan and  fingerprints) for authentication, until unlocked.&lt;/li&gt;
&lt;li&gt;If you try to use this information without unlocking, it will show you an error code 330.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Remember to lock and unlock your biometrics through a trusted  channel. The fact that there is no fee involved in either exercise will  make this easier. Also, even with the biometric locked, you can continue  to use the OTP-based authentication process for transactions, where you  will receive the OTP on your registered mobile number and e-mail  address.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(Edited by Shruti Singhal)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india'&gt;https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-02T02:09:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content">
    <title>India should reconsider its proposed regulation of online content</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content</link>
    <description>
        &lt;b&gt;The lack of technical considerations in the proposal is also apparent since implementing the proposal is infeasible for certain intermediaries. End-to-end encrypted messaging services cannot “identify” unlawful content since they cannot decrypt it. Presumably, the government’s intention is not to disallow end-to-end encryption so that intermediaries can monitor content.&lt;/b&gt;
        &lt;p class="moz-quote-pre"&gt;The article was &lt;a class="external-link" href="https://www.hindustantimes.com/analysis/india-should-reconsider-its-proposed-regulation-of-online-content/story-vvuPhz6tuxNIKTjXbRhijO.html"&gt;published in the Hindustan Times&lt;/a&gt; on January 24, 2019. The author would like to thank Akriti Bopanna and Aayush Rathi for their feedback.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Flowing from the Information Technology (IT) Act, India’s current  intermediary liability regime roughly adheres to the “safe harbour”  principle, i.e. intermediaries (online platforms and service providers)  are not liable for the content they host or transmit if they act as mere  conduits in the network, don’t abet illegal activity, and comply with  requests from authorised government bodies and the judiciary. This  paradigm allows intermediaries that primarily transmit user-generated  content to provide their services without constant paranoia, and can be  partly credited for the proliferation of online content. The law and IT  minister shared the intent to change the rules this July when discussing  concerns of online platforms being used “to spread incorrect facts  projected as news and designed to instigate people to commit crime”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  December 24, the government published and invited comments to the draft  intermediary liability rules. The draft rules significantly expand “due  diligence” intermediaries must observe to qualify as safe harbours:  they mandate enabling “tracing” of the originator of information, taking  down content in response to government and court orders within 24  hours, and responding to information requests and assisting  investigations within 72 hours. Most problematically, the draft rules go  much further than the stated intentions: draft Rule 3(9) mandates  intermediaries to deploy automated tools for “proactively identifying  and removing [...] unlawful information or content”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first  glaring problem is that “unlawful information or content” is not  defined. A conservative reading of the draft rules will presume that the  phrase means restrictions on free speech permissible under Article  19(2) of the Constitution, including that relate to national integrity,  “defamation” and “incitement to an offence”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ambiguity aside, is  mandating intermediaries to monitor for “unlawful content” a valid  requirement under “due diligence”? To qualify as a safe harbour, if an  intermediary must monitor for all unlawful content, then is it  substantively different from an intermediary that has active control  over its content and not a safe harbour? Clearly, the requirement of  monitoring for all “unlawful content” is so onerous that it is contrary  to the philosophy of safe harbours envisioned by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By  mandating automated detection and removal of unlawful content, the  proposed rules shift the burden of appraising legality of content from  the state to private entities. The rule may run afoul of the Supreme  Court’s reasoning in Shreya Singhal v Union of India wherein it read  down a similar provision because, among other reasons, it required an  intermediary to “apply [...] its own mind to whether information should  or should not be blocked”. “Actual knowledge” of illegal content, since  then, has held to accrue to the intermediary only when it receives a  court or government order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the inconsistencies with legal precedence, the rules may not stand judicial scrutiny if notified in their current form.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  lack of technical considerations in the proposal is also apparent since  implementing the proposal is infeasible for certain intermediaries.  End-to-end encrypted messaging services cannot “identify” unlawful  content since they cannot decrypt it. Internet service providers also  qualify as safe harbours: how will they identify unlawful content when  it passes encrypted through their network? Presumably, the government’s  intention is not to disallow end-to-end encryption so that  intermediaries can monitor content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Intermediaries that can  implement the rules, like social media platforms, will leave the task to  algorithms that perform even specific tasks poorly. Just recently,  Tumblr flagged its own examples of permitted nudity as pornography, and  Youtube slapped a video of randomly-generated white noise with five  copyright-infringement notices. Identifying more contextual expression,  such as defamation or incitement to offences, is a much more complex  problem. In the lack of accurate judgement, platforms will be happy to  avoid liability by taking content down without verifying whether it  violated law. Rule 3(9) also makes no distinction between large and  small intermediaries, and has no requirement for an appeal system  available to users whose content is taken down. Thus, the proposed rules  set up an incentive structure entirely deleterious to the exercise of  the right to freedom of expression. Given the wide amplitude and  ambiguity of India’s restrictions on free speech, online platforms will  end up removing swathes of content to avoid liability if the draft rules  are notified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of draconian laws to quell dissent plays a  recurring role in the history of the Indian state. The draft rules  follow India’s proclivity to join the ignominious company of  authoritarian nations when it comes to disrespecting protections for  freedom of expression. To add insult to injury, the draft rules are  abstruse, ignore legal precedence, and betray a poor technological  understanding. The government should reconsider the proposed regulation  and the stance which inspired it, both of which are unsuited for a  democratic republic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gurshabad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-24T16:59:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy">
    <title>New movies lose out due to piracy</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy</link>
    <description>
        &lt;b&gt;Piracy continues to be a huge concern among filmmakers but it can also be a marketing strategy for small-budget films.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surupasree Sarmmah was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/new-movies-lose-out-due-piracy-714536.html"&gt;Deccan Herald&lt;/a&gt; on January 23, 2019. Akriti Bopanna was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Despite a slew of measures taken by filmmakers, pirated versions of recently released films like ‘Uri: The Surgical Strike’, ‘Viswasam’, ‘KGF’ and ‘Why Cheat India’ were leaked online on websites like TamilRockers. Piracy has been a huge concern for all movie industries in India, national and regional, but experts say that not much can be done when a film is leaked online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Neville J Kattakayam, author of the book ‘The All Seeing Digital Eyes: A Guide To Privacy, Security and Literacy’, says, “The maximum one can do is to control the servers in a particular jurisdiction. But there are servers in unlikely places — like somewhere out in the sea. These places don’t fall under any jurisdiction, national or international. It becomes impossible to control the servers then.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Talking about the process of piracy, he explains that once a content is leaked, it mirages into different servers across to the world; not just online but offline too. “There are mirror sites having the same content that are immediately born. Accessibility wise, it’s all out there; there is nothing that one can completely restrict,” he says. &lt;br /&gt; &lt;br /&gt; Neville feels that it is largely in the hands of the producers to restrict access to their material until the movie is released. With people usually preferring good quality prints, theatrical replicas are not favoured much, he told Metrolife. &lt;br /&gt; &lt;br /&gt; “From what I have heard, the piracy usually happens when the copy is being sent to the censor board. Some intermediate source, who really wants to kill a movie, leaks it from there. That is the real challenge,” says Neville. &lt;br /&gt; &lt;br /&gt; Hemanth M Rao, a director, says that when a movie is leaked online, the effort, time and money put in is at stake. “You feel robbed. Most people would want to go to the theatres to watch a film but with incidents of piracy on the rise, the life span of a movie is shortened,” he says.&lt;br /&gt; &lt;br /&gt; However, he adds that the audience is beginning to understand the impact piracy has on the movie industry, especially at a time when there is intense competition between regional language industries.&lt;br /&gt; &lt;br /&gt; He has a word of praise for the Kannada Film Industry, which he feels is safeguarding interests of the artistes.&lt;br /&gt; &lt;br /&gt; “We have a close tie-up with the city police. We monitor where all a film is playing after its release. In case we come to know about any illegal activities, we intimate the police who act swiftly. This way, the access is cut down.” &lt;br /&gt; &lt;br /&gt; “Another thing that upsets me is the habit of going live on Facebook while one is at the theatre. I don’t understand what pleasure people get out of it,” he says. &lt;br /&gt; &lt;br /&gt; According to a new draft rule, being contemplated by the IT Ministry, host websites will be liable for any illegal content uploaded on their platform. Currently, a website is liable only for unlawful actions; like uploading copyrighted content without permission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Government can block access to the original host of the pirated content if needed however the traction and virality these kinds of content get make it very difficult to contain their spread. It ends up being a blanket ban on sites such as torrent sites where all the content is not illegal yet the site is blocked as a whole,” says Akriti Bopanna, Policy Officer, Centre for Internet and Society. &lt;br /&gt; &lt;br /&gt; The time taken for legal recourse doesn’t help either. Though filmmakers can approach the court for a ban on the website or server, the time taken for a legal remedy is way too long. By that time, the same link would have appeared in two or three other websites, says Akriti. “A leaked movie can be easily downloaded and sent to someone instantly.”&lt;br /&gt; &lt;br /&gt; She feels that a more effective method than banning a website or a server would be to educate people.&lt;br /&gt; &lt;br /&gt; “Not many know about copyright infringement, it is important to spread awareness from the grassroots level. Though we have messages on piracy shown at the start of every movie, these need to be more creative and fun so they will stay in the audience’s minds. Maybe the industry, as a whole, can do this as a community initiative,” she opines. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Small players don’t care much about piracy &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Small-budget movies take piracy as a marketing strategy. They feel that once people watch the movie and write reviews, the film will get an overall boost — allowing them to sell more tickets in theatres.&lt;br /&gt; &lt;br /&gt; However, major players spend crores on their movies and depend on ticket sales to get back the amount.&lt;br /&gt; &lt;br /&gt; Difficult to claim copyright from different websites&lt;br /&gt; &lt;br /&gt; Prominent production companies are targeting streaming websites who have uploaded their movies, citing copyright issues. However, floating websites like citytorrents and TamilRockers keep changing their domain name and it becomes impossible to counter them.&lt;br /&gt; &lt;br /&gt; -&lt;b&gt;Neville J Kattakayam&lt;/b&gt;&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy'&gt;https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T02:24:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation">
    <title>Response to GCSC on Request for Consultation: Norm Package Singapore</title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation</link>
    <description>
        &lt;b&gt;The GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Global Commission on the Stability of Cyberspace, a multi-stakeholder initiative comprised of eminent individuals across the globe that seeks to promote awareness and understanding among the various cyberspace communities working on issues related to international cyber security. CIS is honoured to have contributed research to this initiative previously and commends the GCSC for the work done so far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The GCSC &lt;a href="https://cyberstability.org/research/singapore_norm_package/"&gt;announced the release of its new Norm Package&lt;/a&gt; on Thursday November 8, 2018 that featured six norms that sought to promote the stability of cyberspace.This was done with the hope that they may be adopted by public and private actors in a bid to improve the international security architecture of cyberspace&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The norms introduced by the GCSC focus on the following areas:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Norm to Avoid Tampering&lt;/li&gt;
&lt;li&gt;Norm Against Commandeering of      ICT Devices into Botnets&lt;/li&gt;
&lt;li&gt;Norm for States to Create a      Vulnerability Equities Process&lt;/li&gt;
&lt;li&gt;Norm to Reduce and Mitigate      Significant Vulnerabilities&lt;/li&gt;
&lt;li&gt;Norm on Basic Cyber Hygiene as      Foundational Defense&lt;/li&gt;
&lt;li&gt;Norm Against Offensive Cyber      Operations by Non-State Actors&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms. We sincerely hope that the Commission may find the feedback useful in their upcoming deliberations.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/response-to-gcsc-on-request-for-consultation-norm-package-singapore/at_download/file"&gt;Read the full submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Gurshabad Grover and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>International Relations</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-27T15:43:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka">
    <title>Cyber Policy Centres Meeting in Sri Lanka</title>
    <link>https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka</link>
    <description>
        &lt;b&gt;Elonnai Hickok, Sunil Abraham and Ambika Tandon participated in this event organized by IDRC in Sri Lanka on January 11 - 14, 2019.&lt;/b&gt;
        &lt;ul&gt;
&lt;li&gt;Download the agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cpc-gathering-agenda.pdf"&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;See the presentation &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/idrc-privacy-project"&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka'&gt;https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-21T23:50:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/rfcs-we-love-meetup">
    <title>RFCs We Love meetup</title>
    <link>https://cis-india.org/internet-governance/news/rfcs-we-love-meetup</link>
    <description>
        &lt;b&gt;In collaboration with India Internet Engineering Society (IIESoc), CIS hosted the a 'RFCs We Love' meetup, where we discussed some IETF specifications and standards. The event was held on January 19 at the CIS office, Bangalore.

&lt;/b&gt;
        &lt;p&gt;The theme of the meetup was data centres and service providers. The agenda was:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;10:00 - 10:10    Introduction&lt;/li&gt;
&lt;li&gt;10:10 - 11:00    Link State Vector Running for DC Routing (Kannan)&lt;/li&gt;
&lt;li&gt;11:00 - 11:50    Multicast via Bit Index Explicit Replication (Senthil)&lt;/li&gt;
&lt;li&gt;11:50 - 12:40    Traffic Engineering in WAN (Shraddha)&lt;/li&gt;
&lt;li&gt;12:40 - 13:00    Open Discussion and planning for Feb meetup&lt;/li&gt;
&lt;li&gt;13:00 - 14:00    Lunch and networking&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Dhruv Dhody has written about the meetup at the IIESoc blog, where you can also find slides used by the presenters and &lt;a class="external-link" href="https://www.iiesoc.in/single-post/2019/01/21/RFCs-We-Love-SP-DC-Edition"&gt;some photos of the event&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/rfcs-we-love-meetup'&gt;https://cis-india.org/internet-governance/news/rfcs-we-love-meetup&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T13:43:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data">
    <title>Is the viral #10YearChallenge just another sneaky way for tech firms to gather users’ personal data?</title>
    <link>https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data</link>
    <description>
        &lt;b&gt;Is it merely an exercise in nostalgia? Or is it providing fodder for facial recognition algorithms on ageing?&lt;/b&gt;
        &lt;p&gt;The blog post by Devarsi Ghosh was published in &lt;a class="external-link" href="https://scroll.in/article/909752/is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data"&gt;Scroll.in&lt;/a&gt; on January 18, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“I like to look back at old memories and smile,” said the  25-year-old Kolkata resident Smitakshi Chowdhury. That’s what prompted  her to upload a decade-old photo of herself alongside a recent one on  Facebook last week without much thought. Chowdhury is among tens of  thousands of people who have participated in the “&lt;a href="https://scroll.in/article/909665/anil-kapoor-doesnt-need-it-twitter-replaces-10yearchallenge-nostalgia-with-jokes"&gt;ten year challenge&lt;/a&gt;”  that has gone viral in recent days as social media users nostalgically  display “then” and “now” images of themselves to the world.&lt;/p&gt;
&lt;p&gt;Among the prominent Indian personalities who showed how they’d changed over the decade were movie stars &lt;a class="link-external" href="https://www.instagram.com/p/BsrDsqwlNuk/?utm_source=ig_embed&amp;amp;utm_campaign=embed_loading_state_script" rel="nofollow" target="_blank"&gt;Sonam Kapoor&lt;/a&gt;, &lt;a class="link-external" href="https://www.instagram.com/p/BspkR1mAr2u/?utm_source=ig_embed&amp;amp;utm_campaign=embed_loading_state_script" rel="nofollow" target="_blank"&gt;Diana Penty&lt;/a&gt; and Shruti Haasan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But is there a darker design to this initiative to get social media  users to  sportlingly show what a difference a decade can make? On  January 15, an article in &lt;i&gt;&lt;a class="link-external" href="https://www.wired.com/story/facebook-10-year-meme-challenge/" rel="nofollow" target="_blank"&gt;Wired&lt;/a&gt;&lt;/i&gt; suggested that the fad could be an ingenious ploy to gather data on a  person’s age or how people age over time. The article by technology  writer Kate O’Neill noted that data obtained in this way could be put to  a variety of purposes, some benign such as targeted advertising, and  some not so harmless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Age progression could someday factor into insurance  assessment and health care,” O’Neill writes. “For example, if you seem  to be ageing faster than your cohorts, perhaps you’re not a very good  insurance risk. You may pay more or be denied coverage.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This hypothesis set off &lt;a class="link-external" href="https://twitter.com/search?q=facial+recogniton+facebook" rel="nofollow" target="_blank"&gt;a frenzy&lt;/a&gt;, as social media users issued warnings against participating in the challenge. But others noted that Facebook &lt;a class="link-external" href="https://www.theatlantic.com/technology/archive/2019/01/go-ahead-do-10yearschallenge/580624/" rel="nofollow" target="_blank"&gt;already has photographs&lt;/a&gt; of many long-time users from 10 years ago or more. It was also pointed  out that the metadata of images posted online contains information about  the date on which the photo was taken, where it was shot and the unique  identification number of the photo device – even though most people  don’t realise this. With so much information already out there, there  isn’t much the 10-Year Challenge could add.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Facebook has spookily sophisticated face-recognition technology, as  anyone who’s seen Facebook’s automatic tagging software at work will  tell you,” wrote Max Read in &lt;i&gt;&lt;a class="link-external" href="http://nymag.com/intelligencer/2019/01/facebook-doesnt-need-to-fool-you.html" rel="nofollow" target="_blank"&gt;New York Magazine&lt;/a&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate has revolved around not only what tech companies know about  social media users but how they share this information. For instance,  Facebook’s facial tagging system identifies people in images to third  parties, making it &lt;a class="link-external" href="http://fortune.com/2019/01/04/google-face-scanning-illinois/" rel="nofollow" target="_blank"&gt; susceptible to misuse&lt;/a&gt;. In fact, Facebook had been storing data obtained through facial recognition software since 2011, &lt;a class="link-external" href="https://www.theverge.com/2018/4/17/17246222/facebook-bipa-fines-penalty-tag-suggestions-facial-recognition" rel="nofollow" target="_blank"&gt;without notifying or obtaining consent&lt;/a&gt; from its users. It was only in February 2018 that it gave users the chance to opt out of the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook, on its part, in an official statement, said that it was not involved with the 10-Year Challenge.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;Possibilities of misuse&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While  personal information uploaded online could potentially be misused in  several ways, that does not mean just about any doomsday scenario is  feasible, said Pranesh Prakash of the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Insurance  companies always try to gather as much information as they can about a  person to weed out bad risks but governments regulate these companies on  the matter of what they can or cannot use,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, in 2018, the Delhi High Court ruled that insurance companies &lt;a href="https://scroll.in/pulse/872035/delhi-on-insurance-for-genetic-disorders-still-allows-many-conditions-to-be-excluded"&gt;could not deny coverage to a person&lt;/a&gt; based on their genetic history, he noted. However, the contradictory  ruling also said that if a disorder was established after genetic  testing, the insurance company could deny coverage or demand higher  premiums.&lt;/p&gt;
&lt;p&gt;Prakash suggested a more dire situation. “Suppose the  data produced from the 10-Year Challenge is used to improve the quality  of deepfakes and that is put into making pornography about you against  your will?” he said. “That business, unlike insurance, is unregulated.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the prospect of a person’s rate of ageing being  calculated by algorithms could also be beneficial. “If a medical AI  [artificial intelligence] company figures out your health looking at the  data based on your face and detects early skin cancer, would anyone be  complaining about this?” asked Shashank Bijapur, co-founder of  SpotDraft, a Gurgaon-based company that creates and manages legal  contracts using artificial intelligence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He noted that while it is  impractical to expect businesses to ignore the opportunity to use such  data to their advantage, social media users should  make informed  decisions while signing up on platforms. “Every such app online has a  privacy policy which is made available to whoever is using it right at  the beginning,” Bijapur said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data'&gt;https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-02T13:57:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears">
    <title>Oyo Hotels’ Real-Time Digital Record Database Sparks Privacy Fears</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears</link>
    <description>
        &lt;b&gt;Oyo Hotels’ pilot to maintain a real-time digital database of guests and plan to share it with law-enforcement agencies has triggered privacy concerns.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nishant Sharma was &lt;a class="external-link" href="https://www.bloombergquint.com/business/oyos-real-time-digital-record-database-sparks-privacy-fears"&gt;published by Bloomberg Quint&lt;/a&gt; on January 16, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The digital check-in and check-out database of guests will do away with the conventional arrival and departure registers, &lt;a href="https://www.bloombergquint.com/technology/former-indigo-president-aditya-ghosh-roped-in-as-ceo-of-oyo-hotels" target="_blank"&gt;Aditya Ghosh, chief executive India and South Asia at the hotel chain&lt;/a&gt; said at a CII event, according to a &lt;a href="https://www.business-standard.com/article/companies/oyo-s-digital-records-to-give-state-govts-law-enforcers-info-on-guests-119011400888_1.html" target="_blank"&gt;report&lt;/a&gt; in Business Standard. That will make the process efficient and  transparent and the SoftBank-backed startup has received acceptance from  governments of Haryana, Rajasthan and Telangana for the proposed  digitisation of guest entry and departure records, the report said  quoting Ghosh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That triggered an outrage on social media, with users calling it invasion of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Oyo,  in an emailed statement to BloombergQuint, said it will provide  information to the law-enforcement agencies about who is staying only  after an information order is issued by the police. The company said it  will create “stronger data security net”. Oyo, however, didn't clarify  who will maintain the data centres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centralisation of data of any  kind isn't good and will make data more fragile, Sunil Abraham, founder  of research think tank Center for Internet and Society, told  BloombergQuint. “If someone manages to break into the police data, or  where the data is stored then they will be able to have the access to  the data. It is always good to store data locally.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just last  year, Marriott International Inc. reported a hack in which passport  numbers, emails and mailing addresses of 327 million of its 500 million  Starwood guests was leaked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To be sure, police always have access  to data of customers staying at hotels, one way or the another. As per  existing regulations, all hotels, bed and breakfasts and guest-houses  have to make an entry of guests checking in and out in a register. This  can be checked by the local police when an information order is  presented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chances of manipulating information in such a register  is high, and at times police go through the data without having an  information order as well, said an industry executive requesting  anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srinivas Kodali, a cybersecurity expert, said such a  centralised database makes business sense for Oyo because they will get  access to data not just of people who booked through them but also of  others who checked in without booking online. “Because there is no law,  the entities can do it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, a technology policy  analyst and affiliated fellow at CIS, sees this as an invasion of  privacy in the absence of law. Digitisation of data can be allowed only  after there’s a law on what happens in the case it’s misused. There is  no legal framework about how and where the data will be used, he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-18T02:26:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules">
    <title>Webinar on the draft Intermediary Guidelines Amendment Rules</title>
    <link>https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules</link>
    <description>
        &lt;b&gt;CCAOI and the ISOC Delhi Chapter organised a webinar on January 10 to discuss the draft  "The Information Technology [Intermediary Guidelines (Amendment) Rules] 2018". Gurshabad Grover was a discussant in the panel.&lt;/b&gt;
        &lt;p&gt;The agenda of the discussion was:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A brief introduction to the draft highlighting the key issues[Shashank Mishra]&lt;/li&gt;
&lt;li&gt;Invited experts sharing their view on the paper and questions asked [Nehaa Chaudhari, Paul Brooks, Arjun Sinha, Gurshabad Grover]&lt;/li&gt;
&lt;li&gt;Open Discussion Q&amp;amp;A&lt;/li&gt;
&lt;li&gt;Summarizing the session&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;A recording of the session can be &lt;a class="external-link" href="https://livestream.com/internetsociety/intermediaryrules"&gt;accessed here&lt;/a&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules'&gt;https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2019-01-18T02:13:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are">
    <title>They know where you are</title>
    <link>https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are</link>
    <description>
        &lt;b&gt;With hotel-booking app routinely sharing real-time guest data with police and government, lives of those fleeing persecution is in danger, privacy advocates fear.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Tini Sara Anien was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/they-know-where-you-are-713535.html"&gt;Deccan Herald&lt;/a&gt; on January 17, 2019. Aayush Rathi was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Oyo Rooms, the online hotel room booking service, has been receiving brickbats since it disclosed this week that it was sharing real-time data of guests with the police and the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet and legal experts in Bengaluru say it is a breach of informational privacy, granted as a fundamental right by the Constitution. Couples running away from hostile families and individuals escaping religious and political persecution are at huge risk if their whereabouts are shared, they say.&lt;/p&gt;
&lt;p&gt;Aayush Rathi, policy officer with Centre for Internet and Society, finds the sharing of live guest data disturbing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Hotels have always maintained records. Earlier, when information from hotels was needed, a specific query had to be raised by law enforcement, pursuant to an ongoing case. The registry represents a significant departure by facilitating the collection of this data by law enforcement without cause,” he says.&lt;/p&gt;
&lt;p&gt;He also rues the lack of transparency about what the government will do with such data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The government is already collecting a lot of data and has little direction on what to do with it. There is no clarity on how this information will be used and protected. The government might say it is necessary for security, a very broad umbrella term, but in the absence of regulations, the data can be used for purposes little to do with security,” says Rathi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The service had initially marketed itself as a couple-friendly service, while across the country, unmarried, inter-faith couples face various challenges finding a room. “This targeting could get even more enhanced,” he fears.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, passport details were leaked from a popular hotel chain. The leaked data from hotel bookings can be used for multifarious purposes, ranging from selling to potential advertisers to identity theft,” Rathi says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawyer-researcher Nayantara Ranganathan, from the Internet Democracy Project, says the argument that sharing data improves privacy is “absolutely disingenuous.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Sharing all guest records in real-time to state governments and law enforcement is shocking and most definitely a breach of privacy,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the state getting access to such information with the promise of preventive policing, there is no telling how data is going to be used, she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She finds it bizarre that a private company is proactively sharing data, especially at a time when companies are “waking up to the fact that their consumers value their privacy.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why it endangers lives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vinay Sreenivasa, lawyer and member of Alternative Law Forum, says providing access to such information is ‘criminal.’ “A couple could be running away from moral policing after an inter-caste marriage and people might be tracking them, or someone might be going through a divorce and just need some privacy. There could be several reasons why one seeks a room and such data could put lives at risk,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court has clearly stated one’s data is one’s own and consent has to be taken when any personal information is used. The government has no business accessing such information, he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are'&gt;https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-18T02:14:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved">
    <title>The DNA Bill has a sequence of problems that need to be resolved</title>
    <link>https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved</link>
    <description>
        &lt;b&gt;In its current form, it’s far from comprehensive and fails to adequately address privacy and security concerns.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The opinion piece was &lt;a class="external-link" href="https://www.newslaundry.com/2019/01/14/the-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved"&gt;published by Newslaundry&lt;/a&gt; on January 14, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On January 9, Science and Technology  Minister Harsh Vardhan introduced the DNA Technology (Use and  Application) Regulation Bill, 2018, amidst opposition and questions  about the Bill’s potential threat to privacy and the lack of security  measures. The Bill aims to provide for the regulation of the use and  application of DNA technology for certain criminal and civil purposes,  such as identifying offenders, suspects, victims, undertrials, missing  persons and unknown deceased persons. The Schedule of the Bill also  lists civil matters where DNA profiling can be used. These include  parental disputes, issues relating to immigration and emigration, and  establishment of individual identity. The Bill does not cover the  commercial or private use of DNA samples, such as private companies  providing DNA testing services for &lt;a href="https://scroll.in/pulse/827169/more-indians-are-taking-home-dna-tests-but-do-they-understand-what-their-genes-are-telling-them" target="_blank"&gt;conducting genetic tests&lt;/a&gt; or for verifying &lt;a href="https://timesofindia.indiatimes.com/city/hyderabad/Doubting-parents-can-buy-peace-for-Rs-10K/articleshow/15921603.cms" target="_blank"&gt;paternity&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Bill has seen several iterations and revisions from when it was first  introduced in 2007. However, after repeated expert consultations, the  Bill even at its current stage is far from a comprehensive legislation. &lt;a href="https://www.thehindu.com/sci-tech/science/scientific-ambitions-behind-dna-profiling-bill/article7544598.ece" target="_blank"&gt;Experts&lt;/a&gt; have articulated concerns that the version of the Bill that was  presented post the Puttaswamy judgement still fails to make provisions  that fully uphold the &lt;a href="https://www.bloombergquint.com/opinion/dna-evidence-only-opinion-not-science-and-definitely-not-proof-of-crime#gs.dfL5aOrP" target="_blank"&gt;privacy&lt;/a&gt; and &lt;a href="https://www.bloombergquint.com/opinion/the-dna-bill-another-invasive-imperfect-database#gs.0ZIZNiNR" target="_blank"&gt;dignity&lt;/a&gt; of the individual. The hurry to pass the Bill by pushing for it by &lt;a href="https://www.firstpost.com/politics/parliament-live-updates-lok-sabha-passes-constitutional-amendment-bill-with-323-ayes-3-noes-quota-bill-to-now-be-presented-in-rajya-sabha-5854221.html#live-blog-20190108130637" target="_blank"&gt;extending the winter session&lt;/a&gt; and before the Personal Data Protection Bill is brought before  Parliament is also worrying. The Bill was passed in the Lok Sabha with  only one amendment: which changed the year of the Bill from 2018 to  2019.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Need for a better-drafted legislation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although  the Schedule of the Bill includes certain civil matters under its  purview, some important provisions are silent on the procedure that is  to be followed for these civil matters. For example, the Bill  necessitates the consent of the individual for DNA profiling in criminal  investigation and for identifying missing persons. However, the Bill is  silent on the requirement for consent in all civil matters that have  been brought under the scope of the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  omission of civil matters in the provisions of the Bill that are  crucial for privacy is just one of the ways the Bill fails to ensure  privacy safeguards.  The civil matters listed in the Bill are highly  sensitive (such as paternity/maternity, use of assisted reproductive  technology, organ transplants, etc.) and can have a far-reaching impact  on a number of sections of society. For example, the civil matters  listed in the Bill affect women not just in the case of paternity  disputes but in a number of matters concerning women including the  Domestic Violence Act and the Prenatal Diagnostic Techniques Act. Other  matters such as pedigree, immigration and emigration can  disproportionately impact vulnerable groups and communities, raising  raises concerns of discrimination and abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and security concerns&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although  the Bill makes provisions for written consent for the collection of  bodily substances and intimate bodily substances, the Bill allows  non-consensual collection for offences punishable by death or  imprisonment for a term exceeding seven years. Another issue with  respect to collection with consent is the absence of safeguards to  ensure that consent is given freely, especially when under police  custody. This issue was also &lt;a href="https://twitter.com/tame_wildcard/status/1082550737845006336" target="_blank"&gt;highlighted by MP NK Premachandran&lt;/a&gt; when he emphasised that the Bill be sent to a &lt;a href="https://thewire.in/the-sciences/lok-sabha-passes-dna-technology-bill-all-you-need-to-know" target="_blank"&gt;Parliamentary Standing Committee&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart  from the collection, the Bill fails to ensure the privacy and security  of the samples. One such example of this failure is Section 35(b), which  allows access to the information contained in the DNA Data Banks for  the purpose of training. The use of these highly sensitive data—that  carry the risk of contamination—for training poses risks to the privacy  of the people who have deposited their DNA both with and without  consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An earlier  version of the Bill included a provision for the creation of a  population statistics databank. Though this has been removed now, there  is no guarantee that this provision will not make its way through  regulation. This is a cause for concern as the Bill also covers certain  civil cases including those relating to immigration and emigration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  July 2018, the Justice Sri Krishna Committee released the draft  Personal Data Protection Bill. The Bill was open for public consultation  and is now likely to be &lt;a href="https://economictimes.indiatimes.com/tech/internet/personal-data-protection-bill-only-after-new-government-takes-over/articleshow/67374919.cms" target="_blank"&gt;introduced in Parliament in June&lt;/a&gt;.  The PDP Bill, while defining “sensitive personal data”, provides an  exhaustive list of data that can be considered sensitive, including  biometric data, genetic data and health data. Under the Bill, sensitive  personal data has heightened parameters for collection and processing,  including clear, informed, and specific consent. Ideally, the DNA Bill  should be passed after ensuring that it is in line with the PDP Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  DNA Bill, once it becomes a law, will allow for law enforcement  authorities to collect sensitive DNA data and database the same for  forensic purposes without a number of key safeguards in place with  respect to security and the rights of individuals. In &lt;a href="http://ncrb.gov.in/StatPublications/CII/CII2016/pdfs/NEWPDFs/9%20%20Snapshots%20All%20India%202016.pdf" target="_blank"&gt;2016 alone&lt;/a&gt;,  29,75,711 crimes under various provisions the Indian Penal Code were  reported. One can only guess the sheer number of DNA profiles and  related information that will be collected from both criminal and  specified civil cases. The Bill needs to be revised to reduce all  ambiguity with respect to the civil cases, and also to ensure that it is  in line with the data protection regime in India. A comprehensive  privacy legislation should be enacted prior to the passing of this Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are still studies  and cases that show that DNA testing can be fallible. The Indian  government needs to ensure that there is proper sensitisation and  training on the collection, storage and use of DNA profiles as well as  the recognition and awareness of the fact that the DNA tests are not  infallible amongst key stakeholders, including law enforcement and the  judiciary.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved'&gt;https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DNA Profiling</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-15T02:36:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy">
    <title>How to make EVMs hack-proof, and elections more trustworthy</title>
    <link>https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy</link>
    <description>
        &lt;b&gt;Free and fair elections are the expression of democratic emancipation. India has always led by example: the Nehru Committee sought universal adult franchise in 1928, at a time when France didnât let women vote, and laws in the USA allowed disqualification of poor, illiterate, and African-American voters. But how reliable are our voting systems, particularly in terms of security?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://timesofindia.indiatimes.com/home/sunday-times/all-that-matters/how-to-make-evms-hack-proof-and-elections-more-trustworthy/articleshow/67004651.cms"&gt;Times of India&lt;/a&gt; on December 9, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Electronic voting machines (EVM) have been in use for general elections in India since 1999 having been first introduced in 1982 for a by-election in Kerala. The EVMs we use are indigenous, having been designed jointly by two public-sector organisations: the Electronics Corporation of India Ltd. and Bharat Electronics Ltd. In 1999, the Karnataka High Court upheld their use, as did the Madras High Court in 2001.&lt;br /&gt;&lt;br /&gt;Since then a number of other challenges have been levelled at EVMs, but the only one that was successful was the petition filed by Subramanian Swamy before the Supreme Court in 2013. But before we get to Swamy's case and its importance, we should understand what EVMs are and how they are used.&lt;br /&gt;&lt;br /&gt;The EVM used in India are standardised and extremely simple machines. From a security standpoint this makes them far better than the myriad different, and some notoriously insecure machines used in elections in the USA. Are they 'hack-proof' and 'infallible' as has been claimed by the ECI? Not at all.&lt;br /&gt;&lt;br /&gt;Similarly simple voting machines in the Netherlands and Germany were found to have vulnerabilities, leading both those countries to go back to paper ballots.&lt;br /&gt;&lt;br /&gt;Because the ECI doesn't provide security researchers free and unfettered access to the EVMs, there had been no independent scrutiny until 2010. That year, an anonymous source provided a Hyderabad-based technologist an original EVM. That technologist, Hari Prasad, and his team worked with some of the world's foremost voting security experts from the Netherlands and the US, and demonstrated several actual live hacks of the EVM itself and several theoretical hacks of the election process, and recommended going back to paper ballots. Further, EVMs have often malfunctioned, as news reports tell us. Instead of working on fixing these flaws, the ECI arrested Prasad (for being in possession of a stolen EVM) and denied Princeton Prof Alex Halderman entry into India when he flew to Delhi to publicly discuss their research. Even in 2017, when the ECI challenged political parties to âhackâ EVMs, it did not provide unfettered access to the machines.&lt;br /&gt;&lt;br /&gt;While paper ballots may work well in countries like Germany, they hadn't in India, where in some parts ballot-stuffing and booth-capturing were rampant. The solution as recognised by international experts, and as the ECI eventually realised, was to have the best of both worlds and to add a printer to the EVMs.&lt;br /&gt;&lt;br /&gt;These would print out a small slip of paper containing the serial number and name of the candidate, and the symbol of the political party, so that the sighted voter could verify that her vote has been cast correctly. This paper would then be deposited in a sealed box, which would provide a paper trail that could be used to audit the correctness of the EVM. They called this VVPAT: voter-verifiable paper audit trail. Swamy, in his PIL, asked for VVPAT to be introduced. The Supreme Court noted that the ECI had already done trials with VVPAT, and made them mandatory.&lt;br /&gt;&lt;br /&gt;However, VVPATs are of no use unless they are actually counted to ensure that the EVM tally and the paper tally do match. The most advanced and efficient way of doing this has been proposed by Lindeman &amp;amp; Stark, through a methodology called (RLAs), in which you keep auditing until either you've done a full hand count or you have strong evidence that continuing is pointless. The ECI could request the Indian Statistical Institute for its recommendations in implementing RLAs. Also, it must be remembered, current VVPAT technology are inaccessible for persons with visual impairments.&lt;br /&gt;&lt;br /&gt;While in some cases, the ECI has conducted audits of the printed paper slips, in 2017 it officially noted that only the High Court can order an audit and that the ECI doesn't have the power to do so under election law. Rule 93 of the Conduct of Election Rules needs to be amended to make audits mandatory.&lt;br /&gt;&lt;br /&gt;The ECI should also create separate security procedures for handling of VVPATs and EVMs, since there are now reports of EVMs being replaced 'after' voting has ended. Having separate handling of EVMs and VVPATs would ensure that two different safe-houses would need to be broken into to change the results of the vote. Implementing these two changes, changing election law to make risk-limiting audits mandatory, and improving physical security practices would make Indian elections much more trustworthy than they are now, while far more needs to be done to make them inclusive and accessible to all.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy'&gt;https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-14T15:34:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru">
    <title>Civic activism over WhatsApp and stories of and from cab drivers are part of a new narrative in Bengaluru</title>
    <link>https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru</link>
    <description>
        &lt;b&gt;Does a city have a pulse? And can that pulse be felt in its technological interactions?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sowmya Rajaram was published in &lt;a class="external-link" href="https://bangaloremirror.indiatimes.com/bangalore/others/civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru/articleshow/67506513.cms"&gt;Bangalore Mirror&lt;/a&gt; on January 13, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In Silicon Plateau Vol 2, Bengaluru comes alive through the ways its inhabitants interact with, and are impacted by, mobile apps and cloud services. Published by the Institute of Network Cultures, Amsterdam, in collaboration with the Centre for Internet and Society in December 2018, this art project and publishing series explores the intersection of technology, culture and society in Bengaluru. Perusing the 16 contributions, you wonder when and how Garden City become Silicon City, and how that has changed us fundamentally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The city has hurtled into an uncertain space – one that “offers a fertile terrain for research, having become the Silicon Valley of India and a demographically diverse metropolis in less than three decades,” as co-editors Marialaura Ghidini (art curator and researcher) and Tara Kelton (artist and designer) put it.&lt;/p&gt;
&lt;p&gt;Unique structure&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ghidini links to Yashas Shetty’s contribution, ‘Aadhaar Cards of Great Leaders’. “One of the formal narratives behind [Aadhaar] (you can look at the latest proceedings of the Asian Development Bank conference, Financial Inclusion in the Digital Economy) is that it has facilitated access to services to whom they define as ‘a broad range of people, especially in rural areas and illiterate’, facilitating government-to-person transfer to low-income people for example. Now, many countries in the West don’t have such a stark separation between rural and urban environment,” she explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In her piece ‘Environmental Apptivism: WhatsApp and Digital Public Spheres in Bangalore’, Nicole Rigillo, a Canadian anthropologist who did her research as a Postdoctoral Fellow with IIMB and the University of Edinburgh, investigates how WhatsApp amplifies the civic activism of Bengaluru’s activists. While the app enables easy and fast communication and resolution, it is not always accessible to a lower socio-economic bracket. Yet, Rigillo believes that many city activists do not focus only on middle class concerns. “Many groups are concerned with the preservation of common resource goods – lakes, trees. Others advocate on behalf of the poor – Citizens for Bengaluru and others have pressuring government officials to ensure pourakarmika salaries are paid. One activist offered vegetable cart sellers bags made of stapled newspapers, and offered to provide paper and staplers to them so they could make their own. The focus was not only on protecting the environment, but also on ensuring that the cart seller was able to maintain his livelihood,” she says. Citizens use WhatsApp groups – often with government functionaries added to them – over official government apps, because it gets the job done better and faster. “And we can all recognise how this is a useful way of organising politically in Bengaluru, where the average traffic speed (17 km/hr) is the slowest of all Indian cities.” And unlike urban improvement apps across the world that “rely on one-way, black-boxed forms&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;of communication, placing citizens in the position of making demands of government officials”, Rigillo says Bengaluru’s proactive citizen groups are instead, actively involved in day-to-day municipal governance. “HSR Layout is a shining example here, with their citizen-led waste management protocols, community gardens, and lake revitalisation efforts, and even participating in the on-the-ground enforcement of government directives, such as Karnataka’s 2016 Plastic Ban.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, questions must be asked of our involvement with apps and technology. In her piece ‘Terms of Service’, Sruthi Krishnan, writer and co-founder of Fields of View, a not-for-profit research organisation, points out how the “sanitised vocabulary of the platform economy masks and deliberately obfuscates complex, often harsh realities”. For instance, the term ‘service partner’ actually means little when the partnership is nonexistent and decisions are taken arbitrarily by the management. Ghidini agrees, because calling someone a ‘partner’ creates, as she says, “a distorted narrative around the condition of the ‘freelance’ worker, which is quite precarious, especially if your work is dictated by an algorithm that does not care if you have been driving 16 hours a day to make your daily target”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then, in his interview, Vir Kashyap, co-founder of Babjob.com (job platform for blue- and grey-collar job seekers, acquired by Quikr in 2017) discusses not-so-fantastic possibility of seeing the city of Bengaluru outsource public transport services to private companies such as Uber and Ola in the future. His explanation is that unlike abroad, where ride-sharing apps fit into an existing city infrastructure, in Bengaluru, for instance, “ride-sharing apps are actually filling a gap that exists in the public transport infrastructure, which is still very patchy in the city, making it difficult to travel using a public transport system”. She adds: “So the problem you have here is that of having a private company in the position of being able to replace what the city is supposed to offer to its tax payers as a default.” In addition, being a contractor or freelancer in a city such as Bengaluru is very different than a city in Europe. “For many, being a contractor with a service such as Ola or UrbanClap means freedom from having to work seven days a week for a fixed, and very small, amount of money. In a way the sharing economy is offering a better pay, so the wave of app-based companies has allowed many to emancipate themselves in a way,” Ghidini says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In ‘The Weight of Cloud Kitchens’ by Aasavri Rai and social entrepreneur Sunil Abraham, the full force of the environmental footprint our rampant food takeaway habits generate, is felt. An analysis of just 15 such platforms tell the story – an average of 67.072 grams of waste is generated for each order of a meal for one person in the price range of `200 to `300. Typically, 46.89 grams of non-biodegradable waste and 33.62 grams of biodegradable waste were generated across all orders. The writers write: ‘What is terrifying is that this investigation forms only a microcosm … With a reduction in dine-in customers and corresponding increase in home delivery across the city, the growth of waste production by this new generation of companies in the food and beverage industry gets magnified.’&lt;/p&gt;
&lt;p&gt;Looking ahead&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, there is “a high degree of trust that people in India generally have with each other. Interestingly, it’s higher than most other countries of similar income levels,” Kashyap says in his interview. Which is why Krishnan believes the time has come for us to have more meaningful conversations about technology. She cites Time magazine’s 2006 declaration of how the individual controls the information age. “Technology operates in the social context it stems from and speaks to, and existing social iniquities are often exacerbated by technology. And so, instead of looking at technology as a way to solve problems, if the starting point is the issue stemming from the socio-political context, there can be more meaningful conversations on how technology can help.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru'&gt;https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T14:48:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you">
    <title>Creeped out by Netflix's 'You'? Here's how you can avoid online stalkers, data thieves</title>
    <link>https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you</link>
    <description>
        &lt;b&gt; Several social media users have no idea of how much of their information is stored on the Internet and what kind of information they are allowing the applications to access.
&lt;/b&gt;
        &lt;p dir="ltr" style="text-align: justify; "&gt;The blog post by Sanyukta Dharmadhikari was published by the &lt;a class="external-link" href="https://www.thenewsminute.com/article/creeped-out-netflix-s-you-here-s-how-you-can-avoid-online-stalkers-data-thieves-94814"&gt;New Minute&lt;/a&gt; on January 10, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Imagine someone knowing exactly where you are,  where you live, what your routine is, where you will be and then waiting  there for a ‘chance encounter’ to happen. This near-horror phenomenon  is something Netflix’s new show &lt;i&gt;You&lt;/i&gt; delves into. It follows a  seemingly charming bookstore manager and his ‘love story’ with an  aspiring writer – except he stalks her, breaks into her home, steals her  phone and keeps tabs on her location in an attempt to be ‘at the right  place at the right time’ and weasel into her life.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The nightmarish experience of the woman he pursues in the  series led many users to check their own privacy settings on social  media. But several users still have no idea of how much of their  information is stored on the cloud and what kind of information they are  allowing the applications to access.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;How social media uses your data&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“There might be much more information about you out there  on the Internet than you sign up for. People do not really realise how  much of their data is out there. Things are made out to be very opaque,  so it is difficult to know who stores how much of your data,” says Anja  Kovacs, director at Delhi-based Internet Democracy Project.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Pranesh Prakash, a fellow at the Centre for Internet and  Society, explains that most websites put the onus of privacy onto the  user but recently, there have been some features that social media  giants have introduced after privacy concerns were voiced.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“On Twitter, I think you don’t need to use your real name  and you do not have to use your location. On Facebook, apart from your  name, you can restrict other information to friends only or use the  option ‘Only Me’. With these kinds of possibilities existing, one just  needs to know how to navigate through these tools,” Pranesh says.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The problem with this, he adds, is that the onus of privacy  is put onto the user. “It is a difficult situation for social networks.  One of Facebook’s most used feature is the ‘people you may know’  feature. Sometimes, that can go really bad, sometimes it may throw up  your ex as a suggestion or let your stalker see your profile or it may  allow people who visit a common psychologist to see each other as  suggestions without knowing why,” he says.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;While it is difficult for social media giants to calibrate  such settings, the users have recently been given options to help  control what kind of audience sees what information.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;After Google Plus was launched, Facebook introduced a  feature that allows users to choose who can see their status updates.  Pranesh adds that users should make use of such features.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Understanding your data online&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Not many users realise that basic information about them  can be used against them. Seemingly harmless information like your date  of birth, your birthplace or the pages that you follow on social media  may contain leads for identity thefts.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“All the information that you put up publicly can be used  by police, future employees or even your stalkers as well. For example,  your date of birth, which most users add to their social media profiles,  is usually used to verify bank accounts. If that is public, anyone can  pretend to be you,” says Pranesh.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;A way out is to relay this information only to people you  trust. Another thing is to remember that on the internet, information  received from one website can be used to access information on another  website.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“You might upload a picture with your pet and name your pet  in that post. However, that name could be the answer to one of the  security questions asked on another website. If you use the same email  address and username across social media profiles, it is easier to find  information about you. Users should be aware that websites can be  connected,” Pranesh explains.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Apps and permissions&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Another crucial thing to remember is that users must always look into privacy settings of social networks that they use.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;When you install new applications on your mobile phones,  they often ask for certain permissions – like seeking access to your  location – and users usually mechanically click on allow.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Most of these permissions apps request are often based on  the type of application – for example, it is natural for Google Maps to  ask permission to access your location – and users need to be vigilant  if apps ask for absurd permissions.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“I once saw a torchlight app that sought access to my  address book. Why would my flashlight need access to my contacts? There  are a lot of apps who don't read these permissions. It is quite easy to  figure out what kind of permissions an app needs and users need to apply  their mind when installing the apps,” Anja adds.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;She states that there are a lot of people who do not read  through the terms and conditions of a particular website or app or the  permissions they seek. And once access is granted, there is no way of  taking your data back.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Last year, it was revealed that a Facebook breach had  exposed data of 50 million people. Last month, Facebook reported another  security breach where nearly 6.8 million users risked their private  photos being exposed to third-party apps.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Facebook also found itself refuting serious claims of  wrongdoings in giving access to user information to certain device  makers, including China-based Huawei, and certain large technology  companies and popular apps like Netflix or Spotify.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Anja says users should be more critical of such companies and organisations that store data or sell users' data.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“People feel that things can’t change, but that is because  they don't make enough noise. You must ask whether companies can store  your data and not just who has what data – ask who can access it,” Anja  said. “Think more critically about which companies you trust and why you  trust them.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you'&gt;https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-12T02:13:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019">
    <title>Registering for Aadhaar in 2019</title>
    <link>https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019</link>
    <description>
        &lt;b&gt;It is a lot less scary registering for Aadhaar in 2019 than it was in 2010, given how the authentication modalities have since evolved.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.business-standard.com/article/opinion/registering-for-aadhaar-in-2019-119010201018_1.html"&gt;Business Standard&lt;/a&gt; on January 2, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last November, a global committee of lawmakers from nine countries the UK, Canada, Ireland, Brazil, Argentina, Singapore, Belgium, France and Latvia summoned Mark Zuckerberg to what they called an “international grand committee” in London. Mr. Zuckerberg was too spooked to show up, but Ashkan Soltani, former CTO of the FTC was among those who testified against Facebook. He said “in the US, a lot of the reticence to pass strong policy has been about killing the golden goose” referring to the innovative technology sector. Mr. Soltani went on to argue that “smart legislation will incentivise innovation”. This could be done either intentionally or unintentionally by governments. For example, a poorly thought through blocking of pornography can result in innovative censorship circumvention technologies. On other occasions, this can happen intentionally. I hope to use my inaugural column in these pages to provide an Indian example of such intentional regulatory innovation.&lt;br /&gt;&lt;br /&gt;Eight years ago, almost to this date, my colleague Elonnai Hickok wrote an open letter to the Parliamentary Finance Committee on what was then called the UID or Unique Identity. She compared Aadhaar to the digital identity project started by the National Democratic Alliance (NDA) government in 2001. Like the Vajpayee administration which was working in response to the Kargil War, she advocated a decentralised authentication architecture using smart cards based on public key cryptography. Last year, even before the five-judge constitutional bench struck down Section 57 of the Aadhaar Act, the UIDAI preemptively responded to this regulatory development by launching offline Aadhaar cards. This was to be expected especially since from the A.P. Shah Committee report, the Puttaswamy Judgment, the B.N. Srikrishna Committee consultation paper, report and bill, the principle of “privacy by design” was emerging as a key Indian regulatory principle in the domain of data protection.&lt;br /&gt;&lt;br /&gt;The introduction of the offline Aadhaar mechanism eliminates the need for biometrics during authentication. I have previously provided 11 reasons why biometrics is inappropriate technology for e-governance applications by democratic governments, and this comes as a massive relief for both human rights activists and security researchers. Second, it decentralises authentication, meaning that there is a no longer a central database that holds a 360-degree view of all incidents of identification and authentication. Third, it dramatically reduces the attack surface for Aadhaar numbers, since only the last four digits remain unmasked on the card. Each data controller using Aadhaar will have to generate his/her own series of unique identifiers to distinguish between residents. If those databases leak or get breached, it won’t tarnish the credibility of Aadhaar or the UIDAI to the same degree. Fourth, it increases the probability of attribution in case a data breach were to occur; if the breached or leaked data contains identifiers issued by a particular data controller, it would become easier to hold them accountable and liable for the associated harms. Fifth, unlike the previous iteration of the Aadhaar “card”, on which the QR code was easy to forge and alter, this mechanism provides for integrity and tamper detection because the demographic information contained within the QR code is digitally signed by the UIDAI. Finally, it retains the earlier benefit of being very cheap to issue, unlike smart cards.&lt;br /&gt;&lt;br /&gt;Thanks to the UIDAI, the private sector is also being forced to implement privacy by design. Previously, since everyone was responsible for protecting Aadhaar numbers, nobody was. Data controllers would gladly share the Aadhaar number with their contractors, that is, data processors, since nobody could be held responsible. Now, since their own unique identifiers could be used to trace liability back to them, data controllers will start using tokenisation when they outsource any work that involves processing of the collected data. Skin in the game immediately breeds more responsible behaviour in the ecosystem.&lt;br /&gt;&lt;br /&gt;The fintech sector has been rightfully complaining about regulatory and technological uncertainty from last year’s developments. This should be addressed by developing open standards and free software to allow for rapid yet secure implementation of these changes. The QR code standard itself should be an open standard developed by the UIDAI using some of the best practices common to international standard setting organisations like the World Wide Web Consortium, Internet Engineers Task Force and the Institute of Electrical and Electronics Engineers. While the UIDAI might still choose to take the final decision when it comes to various technological choices, it should allow stakeholders to make contributions through comments, mailing lists, wikis and face-to-face meetings. Once a standard has been approved, a reference implementation must be developed by the UIDAI under liberal licences, like the BSD licence that allows for both free software and proprietary software derivative works. For example, a software that can read the QR code as well as send and receive the OTP to authenticate the resident. This would ensure that smaller fintech companies with limited resources can develop secure systems.&lt;br /&gt;&lt;br /&gt;Since Justice Dhananjaya Y. Chandrachud’s excellent dissent had no other takers on the bench, holdouts like me must finally register for an Aadhaar number since we cannot delay filing taxes any further. While I would still have preferred a physical digital artefact like a smart card (built on an open standard), I must say it is a lot less scary registering for Aadhaar in 2019 than it was in 2010, given how the authentication modalities have since evolved.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019'&gt;https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-03T14:59:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
