<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 371 to 385.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2018-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-china-tech-forum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved">
    <title>The DNA Bill has a sequence of problems that need to be resolved</title>
    <link>https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved</link>
    <description>
        &lt;b&gt;In its current form, it’s far from comprehensive and fails to adequately address privacy and security concerns.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The opinion piece was &lt;a class="external-link" href="https://www.newslaundry.com/2019/01/14/the-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved"&gt;published by Newslaundry&lt;/a&gt; on January 14, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On January 9, Science and Technology  Minister Harsh Vardhan introduced the DNA Technology (Use and  Application) Regulation Bill, 2018, amidst opposition and questions  about the Bill’s potential threat to privacy and the lack of security  measures. The Bill aims to provide for the regulation of the use and  application of DNA technology for certain criminal and civil purposes,  such as identifying offenders, suspects, victims, undertrials, missing  persons and unknown deceased persons. The Schedule of the Bill also  lists civil matters where DNA profiling can be used. These include  parental disputes, issues relating to immigration and emigration, and  establishment of individual identity. The Bill does not cover the  commercial or private use of DNA samples, such as private companies  providing DNA testing services for &lt;a href="https://scroll.in/pulse/827169/more-indians-are-taking-home-dna-tests-but-do-they-understand-what-their-genes-are-telling-them" target="_blank"&gt;conducting genetic tests&lt;/a&gt; or for verifying &lt;a href="https://timesofindia.indiatimes.com/city/hyderabad/Doubting-parents-can-buy-peace-for-Rs-10K/articleshow/15921603.cms" target="_blank"&gt;paternity&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Bill has seen several iterations and revisions from when it was first  introduced in 2007. However, after repeated expert consultations, the  Bill even at its current stage is far from a comprehensive legislation. &lt;a href="https://www.thehindu.com/sci-tech/science/scientific-ambitions-behind-dna-profiling-bill/article7544598.ece" target="_blank"&gt;Experts&lt;/a&gt; have articulated concerns that the version of the Bill that was  presented post the Puttaswamy judgement still fails to make provisions  that fully uphold the &lt;a href="https://www.bloombergquint.com/opinion/dna-evidence-only-opinion-not-science-and-definitely-not-proof-of-crime#gs.dfL5aOrP" target="_blank"&gt;privacy&lt;/a&gt; and &lt;a href="https://www.bloombergquint.com/opinion/the-dna-bill-another-invasive-imperfect-database#gs.0ZIZNiNR" target="_blank"&gt;dignity&lt;/a&gt; of the individual. The hurry to pass the Bill by pushing for it by &lt;a href="https://www.firstpost.com/politics/parliament-live-updates-lok-sabha-passes-constitutional-amendment-bill-with-323-ayes-3-noes-quota-bill-to-now-be-presented-in-rajya-sabha-5854221.html#live-blog-20190108130637" target="_blank"&gt;extending the winter session&lt;/a&gt; and before the Personal Data Protection Bill is brought before  Parliament is also worrying. The Bill was passed in the Lok Sabha with  only one amendment: which changed the year of the Bill from 2018 to  2019.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Need for a better-drafted legislation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although  the Schedule of the Bill includes certain civil matters under its  purview, some important provisions are silent on the procedure that is  to be followed for these civil matters. For example, the Bill  necessitates the consent of the individual for DNA profiling in criminal  investigation and for identifying missing persons. However, the Bill is  silent on the requirement for consent in all civil matters that have  been brought under the scope of the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  omission of civil matters in the provisions of the Bill that are  crucial for privacy is just one of the ways the Bill fails to ensure  privacy safeguards.  The civil matters listed in the Bill are highly  sensitive (such as paternity/maternity, use of assisted reproductive  technology, organ transplants, etc.) and can have a far-reaching impact  on a number of sections of society. For example, the civil matters  listed in the Bill affect women not just in the case of paternity  disputes but in a number of matters concerning women including the  Domestic Violence Act and the Prenatal Diagnostic Techniques Act. Other  matters such as pedigree, immigration and emigration can  disproportionately impact vulnerable groups and communities, raising  raises concerns of discrimination and abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and security concerns&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although  the Bill makes provisions for written consent for the collection of  bodily substances and intimate bodily substances, the Bill allows  non-consensual collection for offences punishable by death or  imprisonment for a term exceeding seven years. Another issue with  respect to collection with consent is the absence of safeguards to  ensure that consent is given freely, especially when under police  custody. This issue was also &lt;a href="https://twitter.com/tame_wildcard/status/1082550737845006336" target="_blank"&gt;highlighted by MP NK Premachandran&lt;/a&gt; when he emphasised that the Bill be sent to a &lt;a href="https://thewire.in/the-sciences/lok-sabha-passes-dna-technology-bill-all-you-need-to-know" target="_blank"&gt;Parliamentary Standing Committee&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart  from the collection, the Bill fails to ensure the privacy and security  of the samples. One such example of this failure is Section 35(b), which  allows access to the information contained in the DNA Data Banks for  the purpose of training. The use of these highly sensitive data—that  carry the risk of contamination—for training poses risks to the privacy  of the people who have deposited their DNA both with and without  consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An earlier  version of the Bill included a provision for the creation of a  population statistics databank. Though this has been removed now, there  is no guarantee that this provision will not make its way through  regulation. This is a cause for concern as the Bill also covers certain  civil cases including those relating to immigration and emigration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  July 2018, the Justice Sri Krishna Committee released the draft  Personal Data Protection Bill. The Bill was open for public consultation  and is now likely to be &lt;a href="https://economictimes.indiatimes.com/tech/internet/personal-data-protection-bill-only-after-new-government-takes-over/articleshow/67374919.cms" target="_blank"&gt;introduced in Parliament in June&lt;/a&gt;.  The PDP Bill, while defining “sensitive personal data”, provides an  exhaustive list of data that can be considered sensitive, including  biometric data, genetic data and health data. Under the Bill, sensitive  personal data has heightened parameters for collection and processing,  including clear, informed, and specific consent. Ideally, the DNA Bill  should be passed after ensuring that it is in line with the PDP Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  DNA Bill, once it becomes a law, will allow for law enforcement  authorities to collect sensitive DNA data and database the same for  forensic purposes without a number of key safeguards in place with  respect to security and the rights of individuals. In &lt;a href="http://ncrb.gov.in/StatPublications/CII/CII2016/pdfs/NEWPDFs/9%20%20Snapshots%20All%20India%202016.pdf" target="_blank"&gt;2016 alone&lt;/a&gt;,  29,75,711 crimes under various provisions the Indian Penal Code were  reported. One can only guess the sheer number of DNA profiles and  related information that will be collected from both criminal and  specified civil cases. The Bill needs to be revised to reduce all  ambiguity with respect to the civil cases, and also to ensure that it is  in line with the data protection regime in India. A comprehensive  privacy legislation should be enacted prior to the passing of this Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are still studies  and cases that show that DNA testing can be fallible. The Indian  government needs to ensure that there is proper sensitisation and  training on the collection, storage and use of DNA profiles as well as  the recognition and awareness of the fact that the DNA tests are not  infallible amongst key stakeholders, including law enforcement and the  judiciary.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved'&gt;https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DNA Profiling</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-15T02:36:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy">
    <title>How to make EVMs hack-proof, and elections more trustworthy</title>
    <link>https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy</link>
    <description>
        &lt;b&gt;Free and fair elections are the expression of democratic emancipation. India has always led by example: the Nehru Committee sought universal adult franchise in 1928, at a time when France didnât let women vote, and laws in the USA allowed disqualification of poor, illiterate, and African-American voters. But how reliable are our voting systems, particularly in terms of security?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://timesofindia.indiatimes.com/home/sunday-times/all-that-matters/how-to-make-evms-hack-proof-and-elections-more-trustworthy/articleshow/67004651.cms"&gt;Times of India&lt;/a&gt; on December 9, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Electronic voting machines (EVM) have been in use for general elections in India since 1999 having been first introduced in 1982 for a by-election in Kerala. The EVMs we use are indigenous, having been designed jointly by two public-sector organisations: the Electronics Corporation of India Ltd. and Bharat Electronics Ltd. In 1999, the Karnataka High Court upheld their use, as did the Madras High Court in 2001.&lt;br /&gt;&lt;br /&gt;Since then a number of other challenges have been levelled at EVMs, but the only one that was successful was the petition filed by Subramanian Swamy before the Supreme Court in 2013. But before we get to Swamy's case and its importance, we should understand what EVMs are and how they are used.&lt;br /&gt;&lt;br /&gt;The EVM used in India are standardised and extremely simple machines. From a security standpoint this makes them far better than the myriad different, and some notoriously insecure machines used in elections in the USA. Are they 'hack-proof' and 'infallible' as has been claimed by the ECI? Not at all.&lt;br /&gt;&lt;br /&gt;Similarly simple voting machines in the Netherlands and Germany were found to have vulnerabilities, leading both those countries to go back to paper ballots.&lt;br /&gt;&lt;br /&gt;Because the ECI doesn't provide security researchers free and unfettered access to the EVMs, there had been no independent scrutiny until 2010. That year, an anonymous source provided a Hyderabad-based technologist an original EVM. That technologist, Hari Prasad, and his team worked with some of the world's foremost voting security experts from the Netherlands and the US, and demonstrated several actual live hacks of the EVM itself and several theoretical hacks of the election process, and recommended going back to paper ballots. Further, EVMs have often malfunctioned, as news reports tell us. Instead of working on fixing these flaws, the ECI arrested Prasad (for being in possession of a stolen EVM) and denied Princeton Prof Alex Halderman entry into India when he flew to Delhi to publicly discuss their research. Even in 2017, when the ECI challenged political parties to âhackâ EVMs, it did not provide unfettered access to the machines.&lt;br /&gt;&lt;br /&gt;While paper ballots may work well in countries like Germany, they hadn't in India, where in some parts ballot-stuffing and booth-capturing were rampant. The solution as recognised by international experts, and as the ECI eventually realised, was to have the best of both worlds and to add a printer to the EVMs.&lt;br /&gt;&lt;br /&gt;These would print out a small slip of paper containing the serial number and name of the candidate, and the symbol of the political party, so that the sighted voter could verify that her vote has been cast correctly. This paper would then be deposited in a sealed box, which would provide a paper trail that could be used to audit the correctness of the EVM. They called this VVPAT: voter-verifiable paper audit trail. Swamy, in his PIL, asked for VVPAT to be introduced. The Supreme Court noted that the ECI had already done trials with VVPAT, and made them mandatory.&lt;br /&gt;&lt;br /&gt;However, VVPATs are of no use unless they are actually counted to ensure that the EVM tally and the paper tally do match. The most advanced and efficient way of doing this has been proposed by Lindeman &amp;amp; Stark, through a methodology called (RLAs), in which you keep auditing until either you've done a full hand count or you have strong evidence that continuing is pointless. The ECI could request the Indian Statistical Institute for its recommendations in implementing RLAs. Also, it must be remembered, current VVPAT technology are inaccessible for persons with visual impairments.&lt;br /&gt;&lt;br /&gt;While in some cases, the ECI has conducted audits of the printed paper slips, in 2017 it officially noted that only the High Court can order an audit and that the ECI doesn't have the power to do so under election law. Rule 93 of the Conduct of Election Rules needs to be amended to make audits mandatory.&lt;br /&gt;&lt;br /&gt;The ECI should also create separate security procedures for handling of VVPATs and EVMs, since there are now reports of EVMs being replaced 'after' voting has ended. Having separate handling of EVMs and VVPATs would ensure that two different safe-houses would need to be broken into to change the results of the vote. Implementing these two changes, changing election law to make risk-limiting audits mandatory, and improving physical security practices would make Indian elections much more trustworthy than they are now, while far more needs to be done to make them inclusive and accessible to all.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy'&gt;https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-14T15:34:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru">
    <title>Civic activism over WhatsApp and stories of and from cab drivers are part of a new narrative in Bengaluru</title>
    <link>https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru</link>
    <description>
        &lt;b&gt;Does a city have a pulse? And can that pulse be felt in its technological interactions?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sowmya Rajaram was published in &lt;a class="external-link" href="https://bangaloremirror.indiatimes.com/bangalore/others/civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru/articleshow/67506513.cms"&gt;Bangalore Mirror&lt;/a&gt; on January 13, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In Silicon Plateau Vol 2, Bengaluru comes alive through the ways its inhabitants interact with, and are impacted by, mobile apps and cloud services. Published by the Institute of Network Cultures, Amsterdam, in collaboration with the Centre for Internet and Society in December 2018, this art project and publishing series explores the intersection of technology, culture and society in Bengaluru. Perusing the 16 contributions, you wonder when and how Garden City become Silicon City, and how that has changed us fundamentally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The city has hurtled into an uncertain space – one that “offers a fertile terrain for research, having become the Silicon Valley of India and a demographically diverse metropolis in less than three decades,” as co-editors Marialaura Ghidini (art curator and researcher) and Tara Kelton (artist and designer) put it.&lt;/p&gt;
&lt;p&gt;Unique structure&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ghidini links to Yashas Shetty’s contribution, ‘Aadhaar Cards of Great Leaders’. “One of the formal narratives behind [Aadhaar] (you can look at the latest proceedings of the Asian Development Bank conference, Financial Inclusion in the Digital Economy) is that it has facilitated access to services to whom they define as ‘a broad range of people, especially in rural areas and illiterate’, facilitating government-to-person transfer to low-income people for example. Now, many countries in the West don’t have such a stark separation between rural and urban environment,” she explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In her piece ‘Environmental Apptivism: WhatsApp and Digital Public Spheres in Bangalore’, Nicole Rigillo, a Canadian anthropologist who did her research as a Postdoctoral Fellow with IIMB and the University of Edinburgh, investigates how WhatsApp amplifies the civic activism of Bengaluru’s activists. While the app enables easy and fast communication and resolution, it is not always accessible to a lower socio-economic bracket. Yet, Rigillo believes that many city activists do not focus only on middle class concerns. “Many groups are concerned with the preservation of common resource goods – lakes, trees. Others advocate on behalf of the poor – Citizens for Bengaluru and others have pressuring government officials to ensure pourakarmika salaries are paid. One activist offered vegetable cart sellers bags made of stapled newspapers, and offered to provide paper and staplers to them so they could make their own. The focus was not only on protecting the environment, but also on ensuring that the cart seller was able to maintain his livelihood,” she says. Citizens use WhatsApp groups – often with government functionaries added to them – over official government apps, because it gets the job done better and faster. “And we can all recognise how this is a useful way of organising politically in Bengaluru, where the average traffic speed (17 km/hr) is the slowest of all Indian cities.” And unlike urban improvement apps across the world that “rely on one-way, black-boxed forms&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;of communication, placing citizens in the position of making demands of government officials”, Rigillo says Bengaluru’s proactive citizen groups are instead, actively involved in day-to-day municipal governance. “HSR Layout is a shining example here, with their citizen-led waste management protocols, community gardens, and lake revitalisation efforts, and even participating in the on-the-ground enforcement of government directives, such as Karnataka’s 2016 Plastic Ban.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, questions must be asked of our involvement with apps and technology. In her piece ‘Terms of Service’, Sruthi Krishnan, writer and co-founder of Fields of View, a not-for-profit research organisation, points out how the “sanitised vocabulary of the platform economy masks and deliberately obfuscates complex, often harsh realities”. For instance, the term ‘service partner’ actually means little when the partnership is nonexistent and decisions are taken arbitrarily by the management. Ghidini agrees, because calling someone a ‘partner’ creates, as she says, “a distorted narrative around the condition of the ‘freelance’ worker, which is quite precarious, especially if your work is dictated by an algorithm that does not care if you have been driving 16 hours a day to make your daily target”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then, in his interview, Vir Kashyap, co-founder of Babjob.com (job platform for blue- and grey-collar job seekers, acquired by Quikr in 2017) discusses not-so-fantastic possibility of seeing the city of Bengaluru outsource public transport services to private companies such as Uber and Ola in the future. His explanation is that unlike abroad, where ride-sharing apps fit into an existing city infrastructure, in Bengaluru, for instance, “ride-sharing apps are actually filling a gap that exists in the public transport infrastructure, which is still very patchy in the city, making it difficult to travel using a public transport system”. She adds: “So the problem you have here is that of having a private company in the position of being able to replace what the city is supposed to offer to its tax payers as a default.” In addition, being a contractor or freelancer in a city such as Bengaluru is very different than a city in Europe. “For many, being a contractor with a service such as Ola or UrbanClap means freedom from having to work seven days a week for a fixed, and very small, amount of money. In a way the sharing economy is offering a better pay, so the wave of app-based companies has allowed many to emancipate themselves in a way,” Ghidini says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In ‘The Weight of Cloud Kitchens’ by Aasavri Rai and social entrepreneur Sunil Abraham, the full force of the environmental footprint our rampant food takeaway habits generate, is felt. An analysis of just 15 such platforms tell the story – an average of 67.072 grams of waste is generated for each order of a meal for one person in the price range of `200 to `300. Typically, 46.89 grams of non-biodegradable waste and 33.62 grams of biodegradable waste were generated across all orders. The writers write: ‘What is terrifying is that this investigation forms only a microcosm … With a reduction in dine-in customers and corresponding increase in home delivery across the city, the growth of waste production by this new generation of companies in the food and beverage industry gets magnified.’&lt;/p&gt;
&lt;p&gt;Looking ahead&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, there is “a high degree of trust that people in India generally have with each other. Interestingly, it’s higher than most other countries of similar income levels,” Kashyap says in his interview. Which is why Krishnan believes the time has come for us to have more meaningful conversations about technology. She cites Time magazine’s 2006 declaration of how the individual controls the information age. “Technology operates in the social context it stems from and speaks to, and existing social iniquities are often exacerbated by technology. And so, instead of looking at technology as a way to solve problems, if the starting point is the issue stemming from the socio-political context, there can be more meaningful conversations on how technology can help.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru'&gt;https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T14:48:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you">
    <title>Creeped out by Netflix's 'You'? Here's how you can avoid online stalkers, data thieves</title>
    <link>https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you</link>
    <description>
        &lt;b&gt; Several social media users have no idea of how much of their information is stored on the Internet and what kind of information they are allowing the applications to access.
&lt;/b&gt;
        &lt;p dir="ltr" style="text-align: justify; "&gt;The blog post by Sanyukta Dharmadhikari was published by the &lt;a class="external-link" href="https://www.thenewsminute.com/article/creeped-out-netflix-s-you-here-s-how-you-can-avoid-online-stalkers-data-thieves-94814"&gt;New Minute&lt;/a&gt; on January 10, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Imagine someone knowing exactly where you are,  where you live, what your routine is, where you will be and then waiting  there for a ‘chance encounter’ to happen. This near-horror phenomenon  is something Netflix’s new show &lt;i&gt;You&lt;/i&gt; delves into. It follows a  seemingly charming bookstore manager and his ‘love story’ with an  aspiring writer – except he stalks her, breaks into her home, steals her  phone and keeps tabs on her location in an attempt to be ‘at the right  place at the right time’ and weasel into her life.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The nightmarish experience of the woman he pursues in the  series led many users to check their own privacy settings on social  media. But several users still have no idea of how much of their  information is stored on the cloud and what kind of information they are  allowing the applications to access.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;How social media uses your data&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“There might be much more information about you out there  on the Internet than you sign up for. People do not really realise how  much of their data is out there. Things are made out to be very opaque,  so it is difficult to know who stores how much of your data,” says Anja  Kovacs, director at Delhi-based Internet Democracy Project.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Pranesh Prakash, a fellow at the Centre for Internet and  Society, explains that most websites put the onus of privacy onto the  user but recently, there have been some features that social media  giants have introduced after privacy concerns were voiced.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“On Twitter, I think you don’t need to use your real name  and you do not have to use your location. On Facebook, apart from your  name, you can restrict other information to friends only or use the  option ‘Only Me’. With these kinds of possibilities existing, one just  needs to know how to navigate through these tools,” Pranesh says.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The problem with this, he adds, is that the onus of privacy  is put onto the user. “It is a difficult situation for social networks.  One of Facebook’s most used feature is the ‘people you may know’  feature. Sometimes, that can go really bad, sometimes it may throw up  your ex as a suggestion or let your stalker see your profile or it may  allow people who visit a common psychologist to see each other as  suggestions without knowing why,” he says.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;While it is difficult for social media giants to calibrate  such settings, the users have recently been given options to help  control what kind of audience sees what information.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;After Google Plus was launched, Facebook introduced a  feature that allows users to choose who can see their status updates.  Pranesh adds that users should make use of such features.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Understanding your data online&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Not many users realise that basic information about them  can be used against them. Seemingly harmless information like your date  of birth, your birthplace or the pages that you follow on social media  may contain leads for identity thefts.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“All the information that you put up publicly can be used  by police, future employees or even your stalkers as well. For example,  your date of birth, which most users add to their social media profiles,  is usually used to verify bank accounts. If that is public, anyone can  pretend to be you,” says Pranesh.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;A way out is to relay this information only to people you  trust. Another thing is to remember that on the internet, information  received from one website can be used to access information on another  website.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“You might upload a picture with your pet and name your pet  in that post. However, that name could be the answer to one of the  security questions asked on another website. If you use the same email  address and username across social media profiles, it is easier to find  information about you. Users should be aware that websites can be  connected,” Pranesh explains.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Apps and permissions&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Another crucial thing to remember is that users must always look into privacy settings of social networks that they use.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;When you install new applications on your mobile phones,  they often ask for certain permissions – like seeking access to your  location – and users usually mechanically click on allow.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Most of these permissions apps request are often based on  the type of application – for example, it is natural for Google Maps to  ask permission to access your location – and users need to be vigilant  if apps ask for absurd permissions.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“I once saw a torchlight app that sought access to my  address book. Why would my flashlight need access to my contacts? There  are a lot of apps who don't read these permissions. It is quite easy to  figure out what kind of permissions an app needs and users need to apply  their mind when installing the apps,” Anja adds.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;She states that there are a lot of people who do not read  through the terms and conditions of a particular website or app or the  permissions they seek. And once access is granted, there is no way of  taking your data back.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Last year, it was revealed that a Facebook breach had  exposed data of 50 million people. Last month, Facebook reported another  security breach where nearly 6.8 million users risked their private  photos being exposed to third-party apps.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Facebook also found itself refuting serious claims of  wrongdoings in giving access to user information to certain device  makers, including China-based Huawei, and certain large technology  companies and popular apps like Netflix or Spotify.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Anja says users should be more critical of such companies and organisations that store data or sell users' data.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“People feel that things can’t change, but that is because  they don't make enough noise. You must ask whether companies can store  your data and not just who has what data – ask who can access it,” Anja  said. “Think more critically about which companies you trust and why you  trust them.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you'&gt;https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-12T02:13:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019">
    <title>Registering for Aadhaar in 2019</title>
    <link>https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019</link>
    <description>
        &lt;b&gt;It is a lot less scary registering for Aadhaar in 2019 than it was in 2010, given how the authentication modalities have since evolved.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.business-standard.com/article/opinion/registering-for-aadhaar-in-2019-119010201018_1.html"&gt;Business Standard&lt;/a&gt; on January 2, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last November, a global committee of lawmakers from nine countries the UK, Canada, Ireland, Brazil, Argentina, Singapore, Belgium, France and Latvia summoned Mark Zuckerberg to what they called an “international grand committee” in London. Mr. Zuckerberg was too spooked to show up, but Ashkan Soltani, former CTO of the FTC was among those who testified against Facebook. He said “in the US, a lot of the reticence to pass strong policy has been about killing the golden goose” referring to the innovative technology sector. Mr. Soltani went on to argue that “smart legislation will incentivise innovation”. This could be done either intentionally or unintentionally by governments. For example, a poorly thought through blocking of pornography can result in innovative censorship circumvention technologies. On other occasions, this can happen intentionally. I hope to use my inaugural column in these pages to provide an Indian example of such intentional regulatory innovation.&lt;br /&gt;&lt;br /&gt;Eight years ago, almost to this date, my colleague Elonnai Hickok wrote an open letter to the Parliamentary Finance Committee on what was then called the UID or Unique Identity. She compared Aadhaar to the digital identity project started by the National Democratic Alliance (NDA) government in 2001. Like the Vajpayee administration which was working in response to the Kargil War, she advocated a decentralised authentication architecture using smart cards based on public key cryptography. Last year, even before the five-judge constitutional bench struck down Section 57 of the Aadhaar Act, the UIDAI preemptively responded to this regulatory development by launching offline Aadhaar cards. This was to be expected especially since from the A.P. Shah Committee report, the Puttaswamy Judgment, the B.N. Srikrishna Committee consultation paper, report and bill, the principle of “privacy by design” was emerging as a key Indian regulatory principle in the domain of data protection.&lt;br /&gt;&lt;br /&gt;The introduction of the offline Aadhaar mechanism eliminates the need for biometrics during authentication. I have previously provided 11 reasons why biometrics is inappropriate technology for e-governance applications by democratic governments, and this comes as a massive relief for both human rights activists and security researchers. Second, it decentralises authentication, meaning that there is a no longer a central database that holds a 360-degree view of all incidents of identification and authentication. Third, it dramatically reduces the attack surface for Aadhaar numbers, since only the last four digits remain unmasked on the card. Each data controller using Aadhaar will have to generate his/her own series of unique identifiers to distinguish between residents. If those databases leak or get breached, it won’t tarnish the credibility of Aadhaar or the UIDAI to the same degree. Fourth, it increases the probability of attribution in case a data breach were to occur; if the breached or leaked data contains identifiers issued by a particular data controller, it would become easier to hold them accountable and liable for the associated harms. Fifth, unlike the previous iteration of the Aadhaar “card”, on which the QR code was easy to forge and alter, this mechanism provides for integrity and tamper detection because the demographic information contained within the QR code is digitally signed by the UIDAI. Finally, it retains the earlier benefit of being very cheap to issue, unlike smart cards.&lt;br /&gt;&lt;br /&gt;Thanks to the UIDAI, the private sector is also being forced to implement privacy by design. Previously, since everyone was responsible for protecting Aadhaar numbers, nobody was. Data controllers would gladly share the Aadhaar number with their contractors, that is, data processors, since nobody could be held responsible. Now, since their own unique identifiers could be used to trace liability back to them, data controllers will start using tokenisation when they outsource any work that involves processing of the collected data. Skin in the game immediately breeds more responsible behaviour in the ecosystem.&lt;br /&gt;&lt;br /&gt;The fintech sector has been rightfully complaining about regulatory and technological uncertainty from last year’s developments. This should be addressed by developing open standards and free software to allow for rapid yet secure implementation of these changes. The QR code standard itself should be an open standard developed by the UIDAI using some of the best practices common to international standard setting organisations like the World Wide Web Consortium, Internet Engineers Task Force and the Institute of Electrical and Electronics Engineers. While the UIDAI might still choose to take the final decision when it comes to various technological choices, it should allow stakeholders to make contributions through comments, mailing lists, wikis and face-to-face meetings. Once a standard has been approved, a reference implementation must be developed by the UIDAI under liberal licences, like the BSD licence that allows for both free software and proprietary software derivative works. For example, a software that can read the QR code as well as send and receive the OTP to authenticate the resident. This would ensure that smaller fintech companies with limited resources can develop secure systems.&lt;br /&gt;&lt;br /&gt;Since Justice Dhananjaya Y. Chandrachud’s excellent dissent had no other takers on the bench, holdouts like me must finally register for an Aadhaar number since we cannot delay filing taxes any further. While I would still have preferred a physical digital artefact like a smart card (built on an open standard), I must say it is a lot less scary registering for Aadhaar in 2019 than it was in 2010, given how the authentication modalities have since evolved.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019'&gt;https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-03T14:59:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order">
    <title>The constitutionality of MHA surveillance order</title>
    <link>https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order</link>
    <description>
        &lt;b&gt;The rules require review committees to examine all surveillance orders issued under this section every couple of months.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nehaa Chaudhari was published in &lt;a class="external-link" href="http://www.asianage.com/360-degree/301218/the-constitutionality-of-mha-surveillance-order.html"&gt;Asian Age&lt;/a&gt; on December 30, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The MHA notification &lt;/b&gt;&lt;b&gt;authorising&lt;/b&gt;&lt;b&gt; 10 agencies to intercept, monitor and decrypt “any information”  generated, transmitted, received or stored in “any computer” has kicked  up a row. One section calls it electronic surveillance at the behest of  the Big Brother. This time the qualitative difference is data stored  anywhere, not just data in motion, can be intercepted.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is a fundamental right in India. Nine Supreme Court judges  agreed on this in late August, last year. It is “the constitutional core  of human dignity” and flows primarily from the “guarantee of life and  personal liberty” of our Constitution, they said, in the case of  K.S.Puttaswamy vs Union of India. This meant two rules for the Indian  state. Rule number 1.) Do not intrude upon a citizen’s right to life and  personal liberty; and rule number 2.) Take all necessary steps to  safeguard individual privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, because no fundamental right is absolute, the Indian state  is allowed to deviate from rule number 1 in certain situations. It can  restrict individual privacy provided that it first fulfills three  conditions: The restriction must be backed by law; it must be for a  legitimate state aim; and, it must be proportionate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All laws (including existing ones) and government actions, with  consequences for individual privacy, must meet the three conditions  listed above to be valid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those that fail to do so are unconstitutional, and must be suitably  amended, or will be struck down, as was the case with Section 377 of the  Indian Penal Code, earlier this year. Section 69 of the Information  Technology Act, under which the Ministry of Home Affairs has issued its  recent surveillance order, warrants similar scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 69 empowers the Centre and all state governments to authorise  any of their officers to surveil citizens’ electronic communications  and information. They may do so for any of the reasons laid down in the  same section, including India’s sovereignty, integrity, defence,  security and foreign relations, or public order, or to prevent the  incitement of certain offences, or to investigate any offence.  Government orders issued under this section must be reasoned, and in  writing. These orders, and the resultant surveillance activity, must  follow the procedure laid down in a set of rules framed under the  Information Technology Act in 2009. The rules require review committees  to examine all surveillance orders issued under this section every  couple of months. The review committee at the Centre examines the Union  government’s surveillance orders, while state governments’ orders are  examined by committees at their respective states. But, review  committees, whether at the Centre, or at any of the states, only have&lt;br /&gt; three members each, tasked with reviewing hundreds of orders every day.  Moreover, they consist only of government officials. Neither the  Information Technology Act, nor the accompanying 2009 rules, require  Parliamentary or judicial oversight of electronic surveillance by the  executive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the past week, at least two petitions have been filed before the  Supreme Court,which claim that the MHA’s surveillance order violates the  fundamental right to privacy and is unconstitutional. This order for  electronic surveillance is a clear deviation from rule number 1, and so  the question before the court will be if it meets each of the conditions  above to be valid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is the MHA order lawful? Yes, given as it was framed under the  framework of the IT Act. There remains however, a larger question of the  constitutionality of Section 69 itself. If the court finds Section 69  itself to be unconstitutional, any action taken pursuant to Section 69,  including the recent MHA order, will also be unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is the MHA order pursuant to a legitimate state aim? The order itself  does not specify what in particular the government hopes to achieve.  However, given as it was issued under Section 69, the government could  well argue that it was only for the six purposes laid down in the  statute.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, according to the Supreme Court in the right to privacy  judgment, legitimate state aims are “matters of policy to be considered  by the Union government.” The court even offered examples of possible  legitimate state aims, which included the grounds listed under Section  69.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is the MHA order proportionate? No; and neither is the IT Act’s  framework dealing with electronic surveillance. The IT Act allows  government surveillance of citizens, unchecked by either the  legislature, or the judiciary. It creates a scenario where tiny  government committees must review the government’s own decisions to  curtail citizens’ fundamental rights. Moreover, it penalises individuals  with up to seven years in jail, in addition to fines, for not complying  with any interception, monitoring, or decryption request by an  authorised government agency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of the recent MHA order, this means that individuals must  comply with surveillance requests by 10 government agencies including  tax authorities, the police, and civil and military intelligence  agencies, or be prepared to face jail time. This is unethical,  undemocratic, and unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unchecked government surveillance threatens not just an individual’s  fundamental right to privacy, but also her fundamental freedoms of  speech, movement, and assembly among others, also guaranteed fundamental  rights under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These rights and freedoms are the very essence of what it means to be  a free citizen in a modern democracy. A democratic state must only  exercise its police powers in the narrowest of circumstances, within  bright lines, clearly defined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In August, 2017, the Supreme Court laid down the framework to  identify these narrow circumstances and bright lines in so far as the  fundamental right to privacy was concerned. But, the promise of  Puttaswamy is only as good as its implementation, and here lies its  biggest challenge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Pranesh Prakash, Fellow at the Centre for Internet and Society,  said on a television channel recently, perhaps it is about time that we  stopped relying solely on the courts to step in to safeguard our  fundamental rights, and started demanding that our elected law-markers  did their jobs, or did them better. After all, a general election is but  a few months away.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order'&gt;https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-31T14:06:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2018-newsletter">
    <title>December 2018 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/december-2018-newsletter</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society (CIS) wish you all a great year ahead and welcome you to the twelfth issue of its newsletter (December) for the year 2018: &lt;/b&gt;
        &lt;h3&gt;&lt;b&gt;Highlights&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS &lt;a href="https://cis-india.org/a2k/blogs/cis-signs-mou-with-odia-virtual-academy"&gt;signed a MoU&lt;/a&gt; with Odia Virtual Academy to      work on drafting an open content policy for the state, to promote use of      Wikimedia projects by various user types and to ensure sustainability of      Wikimedia projects, and to facilitate development of relevant free and      open source software projects. This partnership between OVA and CIS will      be carried out from December 2018 to November 2019.&lt;/li&gt;
&lt;li&gt;Natalia Khaniejo, in a &lt;a href="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity"&gt;four-part report&lt;/a&gt; has attempted to document      the various approaches that are being adopted by different stakeholders      towards incentivizing cybersecurity and the economic challenges of      implementing the same. The literature review was edited by Amber Sinha.&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, Karan Saini,      Aayush Rathi and Swaraj Barooah &lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic"&gt;created an infographic&lt;/a&gt; which has mapped the      key stakeholder, areas of focus and threat vectors that impact      cybersecurity policy in India. The authors have stated that broadly      policy-makers should concentrate on establishing a framework where      individuals feel secure and trust the growing digital ecosystem.&lt;/li&gt;
&lt;li&gt;In April 2018 European Union      issued the proposal for a new regime dealing with cross border sharing of      data and information by issuing two draft instruments, an E-evidence      Regulation (“Regulation”) and an E-evidence Directive (“Directive”),      (together the “E-evidence Proposal”). Vipul Kharbanda &lt;a href="https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law"&gt;has analysed&lt;/a&gt; how service providers based in      India whose services are also available in Europe would be affected by      these proposals.&lt;/li&gt;
&lt;li&gt;Feminist research methodology      is a vast body of knowledge, spanning across multiple disciplines      including sociology, media studies, and critical legal studies. A &lt;a href="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research"&gt;literature review by Ambika Tandon&lt;/a&gt; aims to      understand key aspects of feminist methodology across these disciplines,      with a particular focus on research on technology and its interaction with      society.&lt;/li&gt;
&lt;li&gt;CIS and design collective      Design Beku came together &lt;a href="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu"&gt;for a workshop on Illustrations&lt;/a&gt; and Visual      Representations of Cybersecurity. The authors Paromita Bathija, Padmini      Ray Murray, and Saumyaa Naidu have stated that images play a vital role in      the public’s perception of cybercrime and cybersecurity. &lt;/li&gt;
&lt;li&gt;A list of selected sessions and      papers for the Internet Researchers' Conference 2019 (IRC19) &lt;a href="https://cis-india.org/raw/irc19-list-selected-sessions-papers"&gt;has been published&lt;/a&gt;. IRC19 will be held in      Lamakaan, Hyderabad, from Jan 30 to Feb 1, 2019.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Articles&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security"&gt;Private-public partnership for cyber security&lt;/a&gt; (Arindrajit Basu; Hindu Businessline; December 24, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle"&gt;Is the new ‘interception’ order old wine in a new      bottle?&lt;/a&gt; (Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and      Pranav M. Bidare; Newslaundry.com; December 27, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/indian-express-nishant-shah-december-30-2018-digital-native-system-needs-a-robot"&gt;Digital Native: System Needs a Reboot&lt;/a&gt; (Nishant Shah; Indian Express; December 30, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/deccan-herald-rajitha-menon-december-6-2018-many-sites-bypass-porn-ban"&gt;Many sites bypass porn ban&lt;/a&gt; (Rajitha Menon;      Deccan Herald; December 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook"&gt;How data privacy and governance issues have battered      Facebook ahead of 2019 polls&lt;/a&gt; (Rahul Sachitanand; Economic      Times; December 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls"&gt;Is Aadhaar Essential To Achieve Error-Free Electoral      Rolls?&lt;/a&gt; (Bloomberg Quint; December 16, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy"&gt;Centre’s order on computer surveillance threatens right      to privacy, experts say&lt;/a&gt; (Abhishek Dey; Scroll.in; December 22,      2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards"&gt;Centre’s order on computer surveillance is backed by      law – but the law lacks adequate safeguards&lt;/a&gt; (Nehaa Chaudhari      and Tuhina Joshi; Scroll.in; December 23, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data"&gt;Ten Indian government agencies can now snoop on      people’s internet data&lt;/a&gt; (David Spenser; VPN Compare; December      24, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete"&gt;Big Brother is here: Amid snooping row, govt report      says monitoring system 'practically complete'&lt;/a&gt; (Keerthana      Sankaran; New Indian Express; December 26, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content"&gt;MHA snoop order &amp;amp; bid to amend IT rules: China-like      clampdown or tracking unlawful content?&lt;/a&gt; (Fatima Khan; The Print      December 28, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech"&gt;The dark side of future tech: Where are we headed on      privacy, security, truth? &lt;/a&gt;(Dipanjan Sinha; Hindustan Times; December      29, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order"&gt;The constitutionality of MHA surveillance order&lt;/a&gt; (Nehaa Chaudhari; Asian Age; December 30, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Wikipedia&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/punjabi-wikisource-training-workshop-patiala"&gt;Punjabi Wikisource Training Workshop, Patiala&lt;/a&gt; (Jayanta Nath; December 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/indic-wikisource-community-consultation-2018"&gt;Indic Wikisource Community Consultation 2018&lt;/a&gt; (Jayanta Nath; December 8, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/cis-signs-mou-with-odia-virtual-academy"&gt;CIS Signs MoU with Odia Virtual Academy&lt;/a&gt; (Sailesh      Patnaik; December 19, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Lecture&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/news/lecture-on-open-access-and-open-content-licensing-at-icar-short-course"&gt;Lecture on Open Access and Open Content Licensing at      ICAR (short course)&lt;/a&gt; (Organized by ICAR-Indian Institute of      Horticultural Research (IIHR) a constituent establishment of Indian      Council of Agricultural Research; November 13 - 22, 2018). Anubha Sinha      delivered a lecture.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Lecture&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude"&gt;Teaching at Shristi Interlude&lt;/a&gt; (Organised by      Shristi; Bangalore; December 7, 2018). Shweta Mohandas participated as a      mentor.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Gender &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research"&gt;Feminist Methodology in Technology Research: A      Literature Review&lt;/a&gt; (Ambika Tandon with contributions from Mukta      Joshi; research assistance by by Kumarjeet Ray and Navya Sharma; design by      Saumyaa Naidu; December 23, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/intermediary-liability-and-gender-based-violence"&gt;Event Report on Intermediary Liability and Gender Based      Violence &lt;/a&gt;(Akriti Bopanna; edited by Ambika Tandon; December 20,      2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018"&gt;International Network on Feminist Approaches to      Bioethics 2018&lt;/a&gt; (Co-organized by Feminist Approaches to      Bioethics and Sama; St. John's Medical College; Bangalore; December 3 - 5,      2018). Aayush Rathi and Ambika Tandon were speakers at the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Cyber Security&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research Papers&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law"&gt;European E-Evidence Proposal and Indian Law&lt;/a&gt; (Vipul Kharbanda; December 23, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity"&gt;Economics of Cybersecurity: Literature Review      Compendium&lt;/a&gt; (Natalia Khaniejo; edited by Amber Sinha; December      31, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Infographic&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic"&gt;Mapping cybersecurity in India: An infographic&lt;/a&gt; (information contributed by Arindrajit Basu, Karan Saini, Aayush Rathi and      Swaraj Barooah; designed by Saumyaa Naidu; December 23, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu"&gt;A Critical Look at the Visual Representation of      Cybersecurity&lt;/a&gt; (Paromita Bathija, Padmini Ray Murray, and      Saumyaa Naidu; December 11, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/india-china-tech-forum"&gt;India-China Tech Forum 2018&lt;/a&gt; (Organised by      ORF and Peking University at the Ji Xianlin Centre for India-China      Studies; Mumbai; December 11 - 12, 2018). Arindrajit Basu was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Artificial Intelligence &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/future-tech-and-future-law"&gt;Future Tech and Future Law&lt;/a&gt; (Organised by      Dept. of IT &amp;amp; BT, Government of Karnataka; Palace Grounds; Bangalore;      November 29 - December 1, 2018). Arindrajit Basu was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit"&gt;AI for Social Good Summit&lt;/a&gt; (Co-organised by      Google AI and United Nations ESCAP; Bangkok; December 13, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Selected Papers&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-list-selected-sessions-papers"&gt;Internet Researchers' Conference 2019&lt;/a&gt; (IRC19): #List - Selected Sessions and Papers (P.P. Sneha; January 2,      2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr size="2" style="text-align: justify; " width="100%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt; &lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt; &lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge:      a2k@cis-india.org &lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work:      raw@cis-india.org &lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at tanveer@cis-india.org.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2018-newsletter'&gt;https://cis-india.org/about/newsletters/december-2018-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-01-08T16:15:38Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity">
    <title>Economics of Cybersecurity: Literature Review Compendium</title>
    <link>https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity</link>
    <description>
        &lt;b&gt;The twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.&lt;/b&gt;
        
&lt;hr /&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;Authored by Natallia Khaniejo and edited by Amber Sinha&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;Politics and economics are increasingly being amalgamated with Cybernetic frameworks and consequently Critical infrastructure has become intrinsically dependent on Information and Communication Technology (ICTs). The rapid evolution of technological platforms has been accompanied by a concomitant rise in the vulnerabilities that accompany them. Recurrent issues include concerns like network externalities, misaligned incentives and information asymmetries. Malignant actors use these vulnerabilities to breach secure systems, access and sell data, and essentially destabilize cyber and network infrastructures. Additionally, given the relative nascence of the realm, establishing regulatory policies without limiting innovation in the space becomes an additional challenge as well. The lack of uniform understanding regarding the definition and scope of what can be defined as Cybersecurity also serves as a barrier preventing the implementation of clear guidelines. Furthermore, the contrast between what is convenient and what is ‘sanitary’ in terms of best practices for cyber infrastructures is also a constant tussle with recommendations often being neglected in favor of efficiency. In order to demystify the security space itself and ascertain methods of effective policy implementation, it is essential to take stock of current initiatives being proposed for the development and implementation of cybersecurity best practices, and examine their adequacy in a rapidly evolving technological environment. This literature review attempts to document the various approaches that are being adopted by different stakeholders towards incentivizing cybersecurity and the economic challenges of implementing the same.&lt;/p&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;Click on the below links to read the entire story:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-i"&gt;Economics of Cybersecurity Part I&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-ii"&gt;Economics of Cybersecurity Part II&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-iii"&gt;Economics of Cybersecurity Part III&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-iv"&gt;Economics of Cybersecurity Part IV&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity'&gt;https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natallia Khaniejo</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-05-01T06:09:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content">
    <title>MHA snoop order &amp; bid to amend IT rules: China-like clampdown or tracking unlawful content?</title>
    <link>https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content</link>
    <description>
        &lt;b&gt;An MHA order last week authorised 10 government agencies to scan data on computers. This was followed by the Modi government’s proposal to amend the Information Technology rules for social media platforms like WhatsApp, Facebook and Twitter to “proactively identify, remove or disable access to unlawful information or content” in order to curb fake news online.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Fatima Khan was &lt;a class="external-link" href="https://theprint.in/talk-point/mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content/170167/"&gt;published in the Print&lt;/a&gt; on December 28, 2018. Amber Sinha was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;No concrete steps taken by either NDA or UPA to enact laws for surveillance reform&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://egazette.nic.in/WriteReadData/2018/194066.pdf"&gt;MHA order&lt;/a&gt; which  gives 10 government agencies the power to intercept, monitor and  decrypt ‘any information’ generated, transmitted, received, or stored in  any computer, reaffirms the sorry state of communication surveillance  law in India. This is reflected in the lack of judicial review, minimal  legislative oversight and no regard for the principles of necessity,  proportionality, user notification and transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite detailed &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;recommendations&lt;/a&gt; by  the Committee of Experts led by Justice AP Shah back in 2013, there  have been no concrete steps taken by either the current NDA government  or the previous UPA government to enact laws for surveillance reform.  The &lt;a href="http://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf"&gt;draft bill&lt;/a&gt; by  the committee led by Justice Srikrishna does refer to the principles of  necessity and proportionality, but stops short of recommending an  overhaul of the surveillance regime. This notification is but merely the  logical next step in the existing framework for communications  surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the &lt;a href="http://meity.gov.in/writereaddata/files/Draft_Intermediary_Amendment_24122018.pdf"&gt;draft amendments&lt;/a&gt; to  the IT Act regulations seek to address the problem of ‘unlawful  content’ and seem to stem largely from concerns about the use of  platforms like Facebook and WhatsApp to spread disinformation and impact  electoral processes in India. To that extent, these steps are misguided  and betray a failure to engage with the actual problem. Already, the  powers of content moderation exercised by online platforms suffer from  problems of transparency and accountability. The draft regulations will  only serve to compound this problem while unreasonably expecting the  platforms to exercise powers which should require judicial  determination.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content'&gt;https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-12-30T10:08:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech">
    <title>The dark side of future tech: Where are we headed on privacy, security, truth?</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech</link>
    <description>
        &lt;b&gt;#2018 Year-End Special: We now live in a time when devices listen, chips track your choices, and governments can watch from behind a barcode. How do we navigate this world?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Dipanjan Sinha was published in the &lt;a class="external-link" href="https://www.hindustantimes.com/tech/the-dark-side-of-future-tech-where-are-we-headed-on-privacy-security-truth/story-EEdRPH5Qcr9MDP6tB9m4QK.html"&gt;Hindustan Times&lt;/a&gt; on December 29, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;“One of the definitions of sanity is the ability to tell  real from unreal. Soon we’ll need a new definition,” Alvin Toffler,  author of the 1970 bestseller Future Shock, once said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy.  Security. Freedom. Democracy. History. News — the lines between the real  and unreal are blurring in each of these fields.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fake news is  helping decide elections; history being rewritten as it happens; rumour  has become identical in look, feel and distribution to the actual news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Devices  that listen, governments that watch you from behind a barcode, chips  that track where you go, what you eat, how you feel — these used to be  the stuff of dystopian novels.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  April, the world learnt of the Chinese government’s social credit  system, a programme currently in the works that would employ private  technology platforms and local councils to use personal data to assign a  social score to every registered citizen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Behave as the state  wants you to, and you could get cheaper loans, easier access to  education; it’s unclear what the consequences could be for those who do  the opposite, but discredits are likely for bad behaviours that range  from smoking in non-smoking zones to buying ‘too many’ video games, and  being critical of the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We’ve seen this before —  totalitarian governments where the individual is under constant  surveillance by a state that pretends this is for the greater good. But  the last time we came across it, it was fiction — George Orwell’s 1984,  set in a superstate where thought police took their orders from a  totalitarian leader with a friendly name, Big Brother.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p&gt;&lt;aside&gt; 
&lt;ul class="row latest-news-bx"&gt;
&lt;/ul&gt;
&lt;/aside&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CATCH-22 &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Just because you’re  paranoid doesn’t mean they aren’t out to get you,” Joseph Heller said,  in Catch-22, a novel so layered that you’re never sure which bits are  true. Who gets access to the data your phone collects? What is the  government watching for, after they’ve assigned citizens unique IDs?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It  feels good to be able to criticise China, still something of an anomaly  in a global community that is largely democratic and free-market, but  the UK had a National Identity Cards Act from 2006 to 2010; India has  the Aadhar project; Brazil has had the National Civil Identification  document since 2017; Germany, a national identity card since 2010, and  Colombia has had one since 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They’re collecting biometric  data, assigning numbers to citizens and building national registers —  with not much word on what’s in them, who has access, or how secure they  are.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“To  ask what the risk is with accumulating such big data is like asking  what the risk is with computers. They are both embedded in our lives,”  says Pranesh Prakash, a fellow at the thinktank Centre for Internet and  Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security is just the base layer in the pyramid if risks.  There is also the risk of discrimination — whether in terms of  benefits, employment, or something like marriage, Prakash says. There is  the risk of bad data leading to worse discrimination; there is the risk  of public profiling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The question here is about transparency,”  Prakash says. “The questions of what the data contains, who it is  accessed by or sold do, how much of it there is, and what the purpose is  of collecting it — need to be clearly answered.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;OPERATION THEATRE&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New  questions are being asked in the field of medicine as well. Where do  you draw the line on designer babies? Should parents get to edit the  genes of their child-to-be? How much ought we to tinker — do you stop at  mutations, or go on to decide hair colour and intellect?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As it  becomes cheaper and easier to sequence DNA, the questions over the next  steps — of interpreting and analysing the data — will become more  complex, says K VijayRaghavan, principal scientific adviser to the  government of India, and former director of the National Centre for  Biological Sciences. “From here on, with the data deluge, deciding what  and how to do it will become fiendishly complex. Especially as  commercial interests become involved.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have rules and laws for  the use of DNA information in research, but corresponding laws that  regulate how one can use personal whole genome information in the public  space are still being framed. “The data-privacy discussion will soon  get to the genomic-data space,” VijayRaghavan says. “Data sharing is  needed for patients to benefit. Yet data privacy is needed to prevent  exploitative use. It’s a conundrum, and there are no easy answers.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech'&gt;https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-30T09:24:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle">
    <title>Is the new ‘interception’ order old wine in a new bottle?</title>
    <link>https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle</link>
    <description>
        &lt;b&gt;The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;An opinion piece co-authored by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare was published in &lt;a class="external-link" href="https://www.newslaundry.com/2018/12/27/is-the-new-interception-order-old-wine-in-a-new-bottle"&gt;Newslaundry.com&lt;/a&gt; on December 27, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;On December 20, 2018, through an &lt;a href="http://egazette.nic.in/WriteReadData/2018/194066.pdf" target="_blank"&gt;order&lt;/a&gt; issued by the Ministry of Home Affairs (MHA), 10 security  agencies—including the Intelligence Bureau, the Central Bureau of  Investigation, the Enforcement Directorate and the National  Investigation Agency—were listed as the intelligence agencies in India  with the power to intercept, monitor and decrypt "any information"  generated, transmitted, received, or stored in any computer under Rule 4  of the Information Technology (Procedure and Safeguards for  Interception, Monitoring and Decryption of Information) Rules, 2009,  framed under section 69(1) of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 21, the Press Information Bureau published a &lt;a href="http://www.pib.nic.in/PressReleseDetail.aspx?utm_campaign=fullarticle&amp;amp;utm_medium=referral&amp;amp;PRID=1556945" target="_blank"&gt;press release&lt;/a&gt; providing clarifications to the previous day’s order. It said the  notification served to merely reaffirm the existing powers delegated to  the 10 agencies and that no new powers were conferred on them.  Additionally, the release also stated that “adequate safeguards” in the  IT Act and in the Telegraph Act to regulate these agencies’ powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presumably,  these safeguards refer to the Review Committee constituted to review  orders of interception and the  prior approval needed by the Competent  Authority—in this case, the secretary in the Ministry of Home Affairs in  the case of the Central government and the secretary in charge of the  Home Department in the case of the State government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted in  the press release, the government has always had the power to authorise  intelligence agencies to submit requests to carry out the interception,  decryption, and monitoring of communications, under Rule 4 of the  Information Technology (Procedure and Safeguards for Interception,  Monitoring and Decryption of Information) Rules, 2009, framed under  section 69(1) of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When considering the implications of  this notification, it is important to look at it in the larger framework  of India’s surveillance regime, which is made up of a set of provisions  found across multiple laws and operating licenses with differing  standards and surveillance capabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 5(2) of the  Indian Telegraph Act, 1885 allows the government (or an empowered  authority) to intercept or detain transmitted information on the grounds  of a public emergency, or in the interest of public safety if satisfied  that it is necessary or expedient so to do in the interests of the  sovereignty and integrity of India, the security of the State, friendly  relations with foreign states or public order or for preventing  incitement to the commission of an offence. This is supplemented by Rule  419A of the Indian Telegraph Rules, 1951, which gives further  directions for the interception of these messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;-  Condition 42 of the &lt;a href="http://www.dot.gov.in/sites/default/files/DOC270613-013.pdf" target="_blank"&gt;Unified Licence for Access Services&lt;/a&gt;,  mandates that every telecom service provider must facilitate the  application of the Indian Telegraph Act. Condition 42.2 specifically  mandates that the license holders must comply with Section 5 of the same  Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 69(1) of the Information Technology Act and  associated Rules allows for the interception, monitoring, and decryption  of information stored or transmitted  through any computer resource if  it is found to be necessary or expedient to do in the interest of the  sovereignty or integrity of India, defense of India, security of the  State, friendly relations with foreign States or public order or for  preventing incitement to the commission of any cognizable offence  relating to above or for investigation of any offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section  69B of the Information Technology Act and associated Rules empowers the  Centre to authorise any agency of the government to monitor and collect  traffic data “to enhance cyber security, and for identification,  analysis, and prevention of intrusion, or spread of computer contaminant  in the country”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 92 of the CrPc allows for a Magistrate or Court to order access to call record details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notably,  a key difference between the IT Act and the Telegraph Act in the  context of interception is that the Telegraph Act permits interception  for preventing incitement to the commission of an offence on the  condition of public emergency or in the interest of public safety while  the IT Act permits interception, monitoring, and decryption  of any  cognizable offence relating to above or for investigation of any  offence. Technically, this difference in surveillance capabilities and  grounds for interception could mean that different intelligence agencies  would be authorized to carry out respective surveillance capabilities  under each statute. Though the Telegraph Act and the associated Rule  419A do not contain an equivalent to Rule 4—&lt;a href="https://mha.gov.in/MHA1/Par2017/pdfs/par2013-pdfs/ls-110214/294.pdf" target="_blank"&gt;nine Central Government agencies and one State Government agency&lt;/a&gt; have previously been authorized under the Act. The Central Government  agencies authorised under the Telegraph Act are the same as the ones  mentioned in the December 20 notification with the following  differences:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Under the Telegraph Act, the Research and Analysis  Wing (RAW) has the authority to intercept. However, the 2018  notification more specifically empowers  the Cabinet Secretariat of RAW  to issue requests for interception under the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Under the  Telegraph Act, the Director General of Police, of concerned  state/Commissioner of Police, Delhi for Delhi Metro City Service Area,  has the authority to intercept. However, the 2018 notification  specifically authorises  the Commissioner of Police, New Delhi with the  power to issue requests for interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, the&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009" target="_blank"&gt; IT (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009 &lt;/a&gt;under  69B of the IT Act  contain a provision similar to Rule 4 of the IT  (Procedure and Safeguards for Interception, Monitoring and Decryption of  Information) Rules, 2009 - allowing the government to authorize  agencies that can monitor and collect traffic data.  In 2016, the  Central Government &lt;a href="http://meity.gov.in/writereaddata/files/69B%20Notification%20-April%202016.pdf" target="_blank"&gt;authorised&lt;/a&gt; the Indian Computer Emergency Response Team to monitor and collect  traffic data, or information generated, transmitted, received, or stored  in any computer resource. This was an exercise of the power conferred  upon the Central Government by Section 69B(1) of the IT Act. However,  this notification does not reference Rule 4 of the IT Rules, thus it is  unclear if a  similar notification has been issued under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  it is accurate that the order does not confer new powers, areas of  concern that existed with India’s surveillance regime continue to remain  including the question of whether 69(1) and 69B and associated Rules  are &lt;a href="https://thewire.in/government/narendra-modi-snooping-it-act-home-ministry" target="_blank"&gt;constitutionally&lt;/a&gt; valid, the lack of t&lt;a href="https://cis-india.org/internet-governance/blog/transparency-in-surveillance" target="_blank"&gt;ransparency&lt;/a&gt; by the government and the prohibition of transparency by service providers, &lt;a href="https://cis-india.org/internet-governance/blog/yahoo-october-23-2013-what-india-can-learn-from-snowden-revelations" target="_blank"&gt;heavy handed &lt;/a&gt;penalties on service providers for non-compliance, and a lack of legal backing and &lt;a href="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance" target="_blank"&gt;oversight&lt;/a&gt; mechanisms for intelligence agencies. Some of these could be addressed  if the draft Data Protection Bill 2018 is enacted and the Puttaswamy  Judgement fully implemented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MHA’s  order and the press release thereafter have served to  publicise and  provide needed clarity with respect to the powers vested in which  intelligence agencies in India under section 69(1) of the IT Act.  This  was previously unclear and could have posed a challenge to ensuring  oversight and accountability of actions taken by intelligence agencies  issuing requests under section 69(1) .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The publishing of the list  has subsequently served to raise questions and create a debate about key  issues concerning privacy, surveillance and state overreach. On &lt;a href="https://barandbench.com/ministry-of-home-affairs-surveillance-order-challenged-in-supreme-court/" target="_blank"&gt;December 24&lt;/a&gt;,  the order was challenged by advocate ML Sharma on the grounds of it  being illegal, unconstitutional and contrary to public interest. Sharma  in his contention also stated the need for the order to be tested on the  basis of the right to privacy established by the Supreme Court in  Puttaswamy which laid out the test of necessity, legality, and  proportionality. According to this test, any law that encroaches upon  the privacy of the individual will have to be justified in the context  of the right to life under Article 21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there are also other  questions that exist. India has multiple laws enabling its surveillance  regime and though this notification clarifies which intelligence  agencies can intercept under the IT Act, it is still seemingly unclear  which intelligence agencies can monitor and collect traffic data under  the 69B Rules. It is also unclear what this order means for past  interceptions that have taken place by agencies on this list or agencies  outside of this list under section 69(1) and associated Rules of the IT  Act. Will these past interceptions possess the same evidentiary value  as interceptions made by the authorised agencies in the order?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle'&gt;https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2018-12-29T16:02:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-china-tech-forum">
    <title>India-China Tech Forum 2018</title>
    <link>https://cis-india.org/internet-governance/news/india-china-tech-forum</link>
    <description>
        &lt;b&gt;Arindrajit Basu spoke at the India-China Tech Forum 2018 organised by ORF and Peking University at the Ji Xianlin Centre for India-China Studies, Mumbai on December 11 - 12, 2018. The event functioned as a bi-annual dialogue that fosters co-operation in this space between the two countries.&lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;Arindrajit spoke on the panel 'India, China and the future of cyber norms' along with Saravjit Singh,Liu Ke and Weng Wejia. This was a closed door discussion under Chatham House rules. Click &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/india-china-tech-forum-2018"&gt;here&lt;/a&gt; to read the agenda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-china-tech-forum'&gt;https://cis-india.org/internet-governance/news/india-china-tech-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-26T15:32:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete">
    <title>Big Brother is here: Amid snooping row, govt report says monitoring system 'practically complete'</title>
    <link>https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete</link>
    <description>
        &lt;b&gt;The recently released 2017-18 annual report of the Centre for Development of Telematics (C-DOT) says that surveillance equipment is being rolled out in 21 service areas across the country.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Keerthana Sankaran was published in &lt;a class="external-link" href="http://www.newindianexpress.com/nation/2018/dec/24/big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete-1915866.html"&gt;New Indian Express&lt;/a&gt; on December 26, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;While last week's government order on  snooping caused an uproar, the Centre's plans for a far-reaching  monitoring system have been in the making for almost a decade -- with  the groundwork being done by the previous UPA regime. The recently  released 2017-18 annual report of the Centre for Development of  Telematics (C-DOT) says that India’s ‘Central Monitoring System’ (CMS)  is “practically complete”, confirming that the Orwellian ‘Big Brother’  is here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report says that surveillance equipment is being rolled out in 21  service areas across the country and operations have commenced in 12  service areas. The system will monitor and intercept calls and messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government claims the CMS is based on the Telegraph Act of 1885  which states that the central or state government may intercept messages  if the government is “satisfied that it is necessary or expedient to do  so in the interests of the sovereignty and integrity of India, the  security of the state, friendly relations with foreign states or public  order or for preventing incitement to the commission of an offence.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the surveillance system was publicly announced in 2009,  C-DOT’s annual report of 2007-2008 had hinted at a testing phase for a  “lawful interception, monitoring” system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A post from the website of the Centre for Internet and Society describes how the CMS could work. Network providers are all required to give interconnected Regional Monitoring Centres access to their network servers. The article also points out that there is no law that describes the CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS was approved by the Cabinet Committee on Security during the  UPA government in 2011, receiving flak from experts and the press for  not safeguarding the citizen’s right to privacy. However, in a Lok Sabha  session in May 2016, Telecom Minister Ravi Shankar Prasad said that the  system is for the “process of lawful interception”, adding that  regional monitoring centres in Delhi and Mumbai had been  operationalised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest C-DOT report also talks about a Centre of Excellence for  Lawful Interception being set up, which would use high-end technologies -  such as open source intelligence, image processing and search engine  tools to scan Twitter and Facebook - for surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Thursday, the Ministry of Home Affairs released a notification,  authorising 10 central agencies to intercept, monitor and decrypt any  "information generated, transmitted, received or stored in any  computer." While the public and opposition parties expressed alarm over  the new order, the C-DOT report clearly shows that state surveillance  plans are already in an advanced stage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These government moves are taking place despite the August 2017  landmark judgement by the Supreme Court, which declared the right to  privacy as a fundamental right which will protect citizens from  intrusive activities by the state.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete'&gt;https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-26T15:22:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security">
    <title>Private-public partnership for cyber security </title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security</link>
    <description>
        &lt;b&gt;Given the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindrajit Basu was published in &lt;a class="external-link" href="https://www.thehindubusinessline.com/opinion/private-public-partnership-for-cyber-security/article25821899.ece"&gt;Hindu Businessline&lt;/a&gt; on December 24, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;On November 11, 2018, as 70 world leaders gathered in Paris to  commemorate the countless lives lost in World War I, French President  Emmanuel Macron inaugurated the Paris Peace Forum with a fiery speech  denouncing nationalism and urging global leaders to pursue peace and  stability through multilateral initiatives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In many ways, it  echoed US President Woodrow Wilson’s monumental speech delivered at the  US Senate a century ago in which he outlined 14 points on the principles  for peace post World War I. As history unkindly reminds us through the  catastrophic realities of World War II, Wilson’s principles went on to  be sacrificed at the altar of national self-interest and inadequate  multilateral enforcement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;President Macron’s first initiative for  global peace — the Paris Call for Trust and Security in Cyber Space was  unveiled on November 12 — at the UNESCO Internet Governance Forum — also  taking place in Paris. The call was endorsed by over 50 states, 200  private sector entities, including Indian business guilds such as FICCI  and the Mobile Association of India and over 100 organisations from  civil society and academia from all over the globe. The text essentially  comprises a set of high-level principles that seeks to prevent the  weaponisation of cyberspace and promote existing institutional  mechanisms to “limit hacking and destabilising activities” in  cyberspace.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Need for private participation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Given the  increasing exploitation of the internet for reaping offensive dividends  by state and non-state actors alike and the prevailing roadblocks in the  multilateral cyber norms formulation process, Macron’s efforts are  perhaps of Wilsonian proportions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A key difference, however, was  that Macron’s efforts were devised hand-in-glove with Microsoft — one of  the most powerful and influential private sector actors of our time.  Microsoft’s involvement is unsurprising given that private entities have  become a critical component of the global cybersecurity landscape and  governments need to start thinking about how to optimise their  participation in this process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, one of the defining  features of cyberspace is its incompatibility with state-centric  ‘command and control’ formulae that lead to the ordering of other global  security regimes — such as nuclear non-proliferation. The decentralised  nature of cyberspace means that private sector actors play a vital role  in implementing the rules designed to secure cyberspace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Simultaneously,  private actors such as Microsoft have recognised the utility of clearly  defined ‘rules of the road’ which ensure certainty and stability in  cyberspace and ensure its trustworthiness among global customers.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Normative deadlock&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;There  have been multiple gambits to develop universal norms of responsible  state behaviour to foster cyber stability. The United Nations-Group of  Governmental Experts (UN-GGE) has been constituted five times now and  will meet again in January 2019.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the third and fourth GGEs  in 2013 and 2015 respectively made some progress towards agreeing on  some baseline principles, the fifth GGE broke down due to opposition  from states including Russia, China and Cuba on the application of  specific principles of international law to cyberspace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was  an extension of a long-running ‘Cold War’ like divide among states at  the United Nations. The US along with its NATO allies believe in  creating voluntary non-binding norms for cybersecurity through the  application of international law in its entirety while Russia, China and  its allies in the Shanghai Co-operation Organization (SCO) reject the  premise that international law applies in its entirety and call for the  negotiation of an independent treaty for cyberspace that lays down  binding obligations on states.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Critical role&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The private  sector has begun to play a critical role in breaking this deadlock.  Recent history is testament to catalytic roles played by non-state  actors in cementing global co-operative regimes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example,  Dupont — the world’s leading ChloroFluoroCarbon (CFC) producer — played a  leading role in the 1970s and 1980s towards the development of The  Montreal Protocol on Substances that Deplete the Ozone Layer and gained  positive recognition for its efforts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another example is the  International Committee of the Red Cross (ICRC) — a non-governmental  organisation that played a crucial role in the development of the Geneva  Conventions and its Additional Protocols, which regulate the conduct of  atrocities in warfare by preparing initial drafts of the treaties and  circulating them to key government players.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, in  cyberspace, Microsoft’s Digital Geneva Convention which devised a set of  rules to protect civilian use of the internet was put forward by Chief  Legal Officer, Brad Smith two months before the fifth GGE met in 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite  the breakdown at the UN-GGE, Microsoft pushed on with the Tech Accords —  a public commitment made by (as of today) 69 companies “agreeing to  defend all customers everywhere from malicious attacks by cyber-criminal  enterprises and nation-states.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much like the ICRC, Microsoft  leads commendable diplomatic efforts with the Paris Call as they reached  out to states, civil society actors and corporations for their  endorsement.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Looking Forward&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Private sector-led normative  efforts towards securing cyberspace are redundant in the absence of  three key recommendations. First, is the implementation of best  practices at the organisational level through the implementation of  robust cyber defense mechanisms, the detection and mitigation of  vulnerabilities and breach notifications — both to consumer and the  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, is the development of mechanisms that enables  direct co-operation between governments and private actors at the  domestic level. In India, a Joint Working Group between the Data  Security Council of India (DSCI) and the National Security Council  Secretariat (NSCS) was set up in 2012 to explore a Private Public  Partnership on cyber-security in India , which has great potential but  is yet to report any tangible outcomes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third and final point  is the recognition that their efforts need to result in a plurality of  states coming to the negotiating table. The absence of the US, China and  Russia in the Paris Call are eerily reminiscent of the lack of US  participation in Woodrow Wilson’s League of Nations, which was one of  the reasons for its ultimate failure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft needs to keep on calling with Paris but Beijing, Washington and Alibaba need to pick up.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-26T15:02:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook">
    <title>How data privacy and governance issues have battered Facebook ahead of 2019 polls</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook</link>
    <description>
        &lt;b&gt;Rohit S, an airline pilot, had enough of Facebook. With over 1,000 friends and part of at least a dozen groups on subjects ranging from planes to politics, the 34-year-old found himself constantly checking his phone for updates and plunging headlong into increasingly noisy debates, where he had little personal connect.&lt;/b&gt;
        &lt;p&gt;The article by Rahul Sachitanand was &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/how-data-privacy-and-governance-issues-have-battered-facebook-ahead-of-2019-polls/articleshow/67004685.cms"&gt;published in Economic Times&lt;/a&gt; on December 9, 2018. Elonnai Hickok was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While he had originally signed up with Facebook a decade ago to reconnect with school classmates, he found himself more and more disconnected from the sprawl the social network had become. “It was a mess of impersonal shares, unverified half-truths and barely any personal updates,” he says, a week after permanently logging out. “I’d rather reconnect the old-fashioned way.”&lt;br /&gt;&lt;br /&gt;This kind of user disenchantment has become increasingly common among Facebook users. Many like Rohit, who signed up with more altruistic aims, find themselves distanced by how the social networking platform has evolved.&lt;br /&gt;&lt;br /&gt;All through 2018, Facebook and its embattled cofounder, Mark Zuckerberg, have found themselves battling one fire after another. Starting with the mess involving Cambridge Analytica and ending with the document dump unearthed by UK’s Parliament this week (that showed the firm as a cut-throat corporation at best), this has been a year to forget. “Unfortunately, Facebook cannot be trusted with the privacy of its users’ data,” says Alessandro Acquisti, professor, Carnegie Mellon University. “Time and again, Facebook has shown a cavalier attitude towards the handling of users’ data as well as towards informing users clearly and without deception about the actual extent of Facebook’s data collection and handling policies.”&lt;br /&gt;&lt;br /&gt;This perception has caused problems with Facebook, both around the world and at home, with privacy advocates pushing for stronger monitoring to counter the seeming free reign enjoyed by the platform.&lt;br /&gt;&lt;br /&gt;Mishi Choudhary, legal director of Software Freedom Law Center in the US and Mishi Choudhary and Associates, a New Delhi-law firm, says the pay-for-data model necessitates a stronger data protection regime that doesn’t leave users at the mercy of self-governing corporate entities.&lt;br /&gt;&lt;br /&gt;“The contrast between Facebook’s public statements and private strategies to monetise user data reveals the truth of surveillance capitalism carried out stealthily and steadily,” she says.&lt;br /&gt;&lt;br /&gt;In an election year in India, this could cause problems for Facebook.&lt;br /&gt;&lt;br /&gt;The company has already tried to clean up its act, implementing more transparent political advertising norms and looking to clean up fake news claims (on itself and WhatsApp, the messaging platform it owns) to try to win back user trust. Facebook has also launched video monetisation capabilities and Lasso, a short video offering similar to Tik Tok, the Chinese startup that has been massively popular here. The company, that has over 250 million users in India, plans to train five million people on digital technologies in three years, to try to increase awareness.&lt;br /&gt;&lt;br /&gt;Facebook didn’t respond to an email seeking more specific comments for this piece.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a country where privacy legislation is yet in the works, experts are worried about the overt and covert interest in users’ private data. Hundreds of millions of users here, many unwittingly, accepting user terms and giving apps too many permissions could easily give away confidential information, the experts argue. This is especially so in the case of Android users in the country, who access the web on cheap handsets and don’t have a full understanding of what they sign up for. “Very few people know about the origin or provenance of apps that they download or what data they track or phone features that they access,” says Shiv Putcha, founder and principal analyst, Mandala Insights, a telecom consultancy. “These are all potential security breaches of a massive order.”&lt;br /&gt;&lt;br /&gt;Alessandro Acquisti, professor, Carnegie Mellon University. This situation has privacy advocates closely watching Facebook and pushing for more stringent rules to monitor the company. "The criticality of human rights impact assessment for all products and services by companies like Facebook is underscored," says Elonnai Hickok, from the Centre for Internet and Society, a think tank in Bengaluru. "To build user trust, these assessments should be made public."&lt;br /&gt;&lt;br /&gt;As India finalises its privacy legislation, it is important to ensure that such assessments are undertaken according to law, citizens and their rights are upheld and companies are held accountable. "This also demonstrates that India needs a privacy legislation that allows the government to address a situation if data of Indian citizens is impacted."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook'&gt;https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-25T01:43:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
