<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 376 to 390.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2018-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-china-tech-forum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order">
    <title>The constitutionality of MHA surveillance order</title>
    <link>https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order</link>
    <description>
        &lt;b&gt;The rules require review committees to examine all surveillance orders issued under this section every couple of months.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nehaa Chaudhari was published in &lt;a class="external-link" href="http://www.asianage.com/360-degree/301218/the-constitutionality-of-mha-surveillance-order.html"&gt;Asian Age&lt;/a&gt; on December 30, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The MHA notification &lt;/b&gt;&lt;b&gt;authorising&lt;/b&gt;&lt;b&gt; 10 agencies to intercept, monitor and decrypt “any information”  generated, transmitted, received or stored in “any computer” has kicked  up a row. One section calls it electronic surveillance at the behest of  the Big Brother. This time the qualitative difference is data stored  anywhere, not just data in motion, can be intercepted.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is a fundamental right in India. Nine Supreme Court judges  agreed on this in late August, last year. It is “the constitutional core  of human dignity” and flows primarily from the “guarantee of life and  personal liberty” of our Constitution, they said, in the case of  K.S.Puttaswamy vs Union of India. This meant two rules for the Indian  state. Rule number 1.) Do not intrude upon a citizen’s right to life and  personal liberty; and rule number 2.) Take all necessary steps to  safeguard individual privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, because no fundamental right is absolute, the Indian state  is allowed to deviate from rule number 1 in certain situations. It can  restrict individual privacy provided that it first fulfills three  conditions: The restriction must be backed by law; it must be for a  legitimate state aim; and, it must be proportionate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All laws (including existing ones) and government actions, with  consequences for individual privacy, must meet the three conditions  listed above to be valid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those that fail to do so are unconstitutional, and must be suitably  amended, or will be struck down, as was the case with Section 377 of the  Indian Penal Code, earlier this year. Section 69 of the Information  Technology Act, under which the Ministry of Home Affairs has issued its  recent surveillance order, warrants similar scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 69 empowers the Centre and all state governments to authorise  any of their officers to surveil citizens’ electronic communications  and information. They may do so for any of the reasons laid down in the  same section, including India’s sovereignty, integrity, defence,  security and foreign relations, or public order, or to prevent the  incitement of certain offences, or to investigate any offence.  Government orders issued under this section must be reasoned, and in  writing. These orders, and the resultant surveillance activity, must  follow the procedure laid down in a set of rules framed under the  Information Technology Act in 2009. The rules require review committees  to examine all surveillance orders issued under this section every  couple of months. The review committee at the Centre examines the Union  government’s surveillance orders, while state governments’ orders are  examined by committees at their respective states. But, review  committees, whether at the Centre, or at any of the states, only have&lt;br /&gt; three members each, tasked with reviewing hundreds of orders every day.  Moreover, they consist only of government officials. Neither the  Information Technology Act, nor the accompanying 2009 rules, require  Parliamentary or judicial oversight of electronic surveillance by the  executive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the past week, at least two petitions have been filed before the  Supreme Court,which claim that the MHA’s surveillance order violates the  fundamental right to privacy and is unconstitutional. This order for  electronic surveillance is a clear deviation from rule number 1, and so  the question before the court will be if it meets each of the conditions  above to be valid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is the MHA order lawful? Yes, given as it was framed under the  framework of the IT Act. There remains however, a larger question of the  constitutionality of Section 69 itself. If the court finds Section 69  itself to be unconstitutional, any action taken pursuant to Section 69,  including the recent MHA order, will also be unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is the MHA order pursuant to a legitimate state aim? The order itself  does not specify what in particular the government hopes to achieve.  However, given as it was issued under Section 69, the government could  well argue that it was only for the six purposes laid down in the  statute.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, according to the Supreme Court in the right to privacy  judgment, legitimate state aims are “matters of policy to be considered  by the Union government.” The court even offered examples of possible  legitimate state aims, which included the grounds listed under Section  69.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is the MHA order proportionate? No; and neither is the IT Act’s  framework dealing with electronic surveillance. The IT Act allows  government surveillance of citizens, unchecked by either the  legislature, or the judiciary. It creates a scenario where tiny  government committees must review the government’s own decisions to  curtail citizens’ fundamental rights. Moreover, it penalises individuals  with up to seven years in jail, in addition to fines, for not complying  with any interception, monitoring, or decryption request by an  authorised government agency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of the recent MHA order, this means that individuals must  comply with surveillance requests by 10 government agencies including  tax authorities, the police, and civil and military intelligence  agencies, or be prepared to face jail time. This is unethical,  undemocratic, and unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unchecked government surveillance threatens not just an individual’s  fundamental right to privacy, but also her fundamental freedoms of  speech, movement, and assembly among others, also guaranteed fundamental  rights under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These rights and freedoms are the very essence of what it means to be  a free citizen in a modern democracy. A democratic state must only  exercise its police powers in the narrowest of circumstances, within  bright lines, clearly defined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In August, 2017, the Supreme Court laid down the framework to  identify these narrow circumstances and bright lines in so far as the  fundamental right to privacy was concerned. But, the promise of  Puttaswamy is only as good as its implementation, and here lies its  biggest challenge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Pranesh Prakash, Fellow at the Centre for Internet and Society,  said on a television channel recently, perhaps it is about time that we  stopped relying solely on the courts to step in to safeguard our  fundamental rights, and started demanding that our elected law-markers  did their jobs, or did them better. After all, a general election is but  a few months away.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order'&gt;https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-31T14:06:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2018-newsletter">
    <title>December 2018 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/december-2018-newsletter</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society (CIS) wish you all a great year ahead and welcome you to the twelfth issue of its newsletter (December) for the year 2018: &lt;/b&gt;
        &lt;h3&gt;&lt;b&gt;Highlights&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS &lt;a href="https://cis-india.org/a2k/blogs/cis-signs-mou-with-odia-virtual-academy"&gt;signed a MoU&lt;/a&gt; with Odia Virtual Academy to      work on drafting an open content policy for the state, to promote use of      Wikimedia projects by various user types and to ensure sustainability of      Wikimedia projects, and to facilitate development of relevant free and      open source software projects. This partnership between OVA and CIS will      be carried out from December 2018 to November 2019.&lt;/li&gt;
&lt;li&gt;Natalia Khaniejo, in a &lt;a href="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity"&gt;four-part report&lt;/a&gt; has attempted to document      the various approaches that are being adopted by different stakeholders      towards incentivizing cybersecurity and the economic challenges of      implementing the same. The literature review was edited by Amber Sinha.&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, Karan Saini,      Aayush Rathi and Swaraj Barooah &lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic"&gt;created an infographic&lt;/a&gt; which has mapped the      key stakeholder, areas of focus and threat vectors that impact      cybersecurity policy in India. The authors have stated that broadly      policy-makers should concentrate on establishing a framework where      individuals feel secure and trust the growing digital ecosystem.&lt;/li&gt;
&lt;li&gt;In April 2018 European Union      issued the proposal for a new regime dealing with cross border sharing of      data and information by issuing two draft instruments, an E-evidence      Regulation (“Regulation”) and an E-evidence Directive (“Directive”),      (together the “E-evidence Proposal”). Vipul Kharbanda &lt;a href="https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law"&gt;has analysed&lt;/a&gt; how service providers based in      India whose services are also available in Europe would be affected by      these proposals.&lt;/li&gt;
&lt;li&gt;Feminist research methodology      is a vast body of knowledge, spanning across multiple disciplines      including sociology, media studies, and critical legal studies. A &lt;a href="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research"&gt;literature review by Ambika Tandon&lt;/a&gt; aims to      understand key aspects of feminist methodology across these disciplines,      with a particular focus on research on technology and its interaction with      society.&lt;/li&gt;
&lt;li&gt;CIS and design collective      Design Beku came together &lt;a href="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu"&gt;for a workshop on Illustrations&lt;/a&gt; and Visual      Representations of Cybersecurity. The authors Paromita Bathija, Padmini      Ray Murray, and Saumyaa Naidu have stated that images play a vital role in      the public’s perception of cybercrime and cybersecurity. &lt;/li&gt;
&lt;li&gt;A list of selected sessions and      papers for the Internet Researchers' Conference 2019 (IRC19) &lt;a href="https://cis-india.org/raw/irc19-list-selected-sessions-papers"&gt;has been published&lt;/a&gt;. IRC19 will be held in      Lamakaan, Hyderabad, from Jan 30 to Feb 1, 2019.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Articles&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security"&gt;Private-public partnership for cyber security&lt;/a&gt; (Arindrajit Basu; Hindu Businessline; December 24, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle"&gt;Is the new ‘interception’ order old wine in a new      bottle?&lt;/a&gt; (Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and      Pranav M. Bidare; Newslaundry.com; December 27, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/indian-express-nishant-shah-december-30-2018-digital-native-system-needs-a-robot"&gt;Digital Native: System Needs a Reboot&lt;/a&gt; (Nishant Shah; Indian Express; December 30, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/deccan-herald-rajitha-menon-december-6-2018-many-sites-bypass-porn-ban"&gt;Many sites bypass porn ban&lt;/a&gt; (Rajitha Menon;      Deccan Herald; December 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook"&gt;How data privacy and governance issues have battered      Facebook ahead of 2019 polls&lt;/a&gt; (Rahul Sachitanand; Economic      Times; December 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls"&gt;Is Aadhaar Essential To Achieve Error-Free Electoral      Rolls?&lt;/a&gt; (Bloomberg Quint; December 16, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy"&gt;Centre’s order on computer surveillance threatens right      to privacy, experts say&lt;/a&gt; (Abhishek Dey; Scroll.in; December 22,      2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards"&gt;Centre’s order on computer surveillance is backed by      law – but the law lacks adequate safeguards&lt;/a&gt; (Nehaa Chaudhari      and Tuhina Joshi; Scroll.in; December 23, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data"&gt;Ten Indian government agencies can now snoop on      people’s internet data&lt;/a&gt; (David Spenser; VPN Compare; December      24, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete"&gt;Big Brother is here: Amid snooping row, govt report      says monitoring system 'practically complete'&lt;/a&gt; (Keerthana      Sankaran; New Indian Express; December 26, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content"&gt;MHA snoop order &amp;amp; bid to amend IT rules: China-like      clampdown or tracking unlawful content?&lt;/a&gt; (Fatima Khan; The Print      December 28, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech"&gt;The dark side of future tech: Where are we headed on      privacy, security, truth? &lt;/a&gt;(Dipanjan Sinha; Hindustan Times; December      29, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order"&gt;The constitutionality of MHA surveillance order&lt;/a&gt; (Nehaa Chaudhari; Asian Age; December 30, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Wikipedia&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/punjabi-wikisource-training-workshop-patiala"&gt;Punjabi Wikisource Training Workshop, Patiala&lt;/a&gt; (Jayanta Nath; December 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/indic-wikisource-community-consultation-2018"&gt;Indic Wikisource Community Consultation 2018&lt;/a&gt; (Jayanta Nath; December 8, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/cis-signs-mou-with-odia-virtual-academy"&gt;CIS Signs MoU with Odia Virtual Academy&lt;/a&gt; (Sailesh      Patnaik; December 19, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Lecture&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/news/lecture-on-open-access-and-open-content-licensing-at-icar-short-course"&gt;Lecture on Open Access and Open Content Licensing at      ICAR (short course)&lt;/a&gt; (Organized by ICAR-Indian Institute of      Horticultural Research (IIHR) a constituent establishment of Indian      Council of Agricultural Research; November 13 - 22, 2018). Anubha Sinha      delivered a lecture.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Lecture&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude"&gt;Teaching at Shristi Interlude&lt;/a&gt; (Organised by      Shristi; Bangalore; December 7, 2018). Shweta Mohandas participated as a      mentor.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Gender &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research"&gt;Feminist Methodology in Technology Research: A      Literature Review&lt;/a&gt; (Ambika Tandon with contributions from Mukta      Joshi; research assistance by by Kumarjeet Ray and Navya Sharma; design by      Saumyaa Naidu; December 23, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/intermediary-liability-and-gender-based-violence"&gt;Event Report on Intermediary Liability and Gender Based      Violence &lt;/a&gt;(Akriti Bopanna; edited by Ambika Tandon; December 20,      2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018"&gt;International Network on Feminist Approaches to      Bioethics 2018&lt;/a&gt; (Co-organized by Feminist Approaches to      Bioethics and Sama; St. John's Medical College; Bangalore; December 3 - 5,      2018). Aayush Rathi and Ambika Tandon were speakers at the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Cyber Security&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research Papers&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law"&gt;European E-Evidence Proposal and Indian Law&lt;/a&gt; (Vipul Kharbanda; December 23, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity"&gt;Economics of Cybersecurity: Literature Review      Compendium&lt;/a&gt; (Natalia Khaniejo; edited by Amber Sinha; December      31, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Infographic&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic"&gt;Mapping cybersecurity in India: An infographic&lt;/a&gt; (information contributed by Arindrajit Basu, Karan Saini, Aayush Rathi and      Swaraj Barooah; designed by Saumyaa Naidu; December 23, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu"&gt;A Critical Look at the Visual Representation of      Cybersecurity&lt;/a&gt; (Paromita Bathija, Padmini Ray Murray, and      Saumyaa Naidu; December 11, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/india-china-tech-forum"&gt;India-China Tech Forum 2018&lt;/a&gt; (Organised by      ORF and Peking University at the Ji Xianlin Centre for India-China      Studies; Mumbai; December 11 - 12, 2018). Arindrajit Basu was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Artificial Intelligence &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/future-tech-and-future-law"&gt;Future Tech and Future Law&lt;/a&gt; (Organised by      Dept. of IT &amp;amp; BT, Government of Karnataka; Palace Grounds; Bangalore;      November 29 - December 1, 2018). Arindrajit Basu was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit"&gt;AI for Social Good Summit&lt;/a&gt; (Co-organised by      Google AI and United Nations ESCAP; Bangkok; December 13, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Selected Papers&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-list-selected-sessions-papers"&gt;Internet Researchers' Conference 2019&lt;/a&gt; (IRC19): #List - Selected Sessions and Papers (P.P. Sneha; January 2,      2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr size="2" style="text-align: justify; " width="100%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt; &lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt; &lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge:      a2k@cis-india.org &lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work:      raw@cis-india.org &lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at tanveer@cis-india.org.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2018-newsletter'&gt;https://cis-india.org/about/newsletters/december-2018-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-01-08T16:15:38Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity">
    <title>Economics of Cybersecurity: Literature Review Compendium</title>
    <link>https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity</link>
    <description>
        &lt;b&gt;The twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.&lt;/b&gt;
        
&lt;hr /&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;Authored by Natallia Khaniejo and edited by Amber Sinha&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;Politics and economics are increasingly being amalgamated with Cybernetic frameworks and consequently Critical infrastructure has become intrinsically dependent on Information and Communication Technology (ICTs). The rapid evolution of technological platforms has been accompanied by a concomitant rise in the vulnerabilities that accompany them. Recurrent issues include concerns like network externalities, misaligned incentives and information asymmetries. Malignant actors use these vulnerabilities to breach secure systems, access and sell data, and essentially destabilize cyber and network infrastructures. Additionally, given the relative nascence of the realm, establishing regulatory policies without limiting innovation in the space becomes an additional challenge as well. The lack of uniform understanding regarding the definition and scope of what can be defined as Cybersecurity also serves as a barrier preventing the implementation of clear guidelines. Furthermore, the contrast between what is convenient and what is ‘sanitary’ in terms of best practices for cyber infrastructures is also a constant tussle with recommendations often being neglected in favor of efficiency. In order to demystify the security space itself and ascertain methods of effective policy implementation, it is essential to take stock of current initiatives being proposed for the development and implementation of cybersecurity best practices, and examine their adequacy in a rapidly evolving technological environment. This literature review attempts to document the various approaches that are being adopted by different stakeholders towards incentivizing cybersecurity and the economic challenges of implementing the same.&lt;/p&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;Click on the below links to read the entire story:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-i"&gt;Economics of Cybersecurity Part I&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-ii"&gt;Economics of Cybersecurity Part II&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-iii"&gt;Economics of Cybersecurity Part III&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-iv"&gt;Economics of Cybersecurity Part IV&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity'&gt;https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natallia Khaniejo</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-05-01T06:09:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content">
    <title>MHA snoop order &amp; bid to amend IT rules: China-like clampdown or tracking unlawful content?</title>
    <link>https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content</link>
    <description>
        &lt;b&gt;An MHA order last week authorised 10 government agencies to scan data on computers. This was followed by the Modi government’s proposal to amend the Information Technology rules for social media platforms like WhatsApp, Facebook and Twitter to “proactively identify, remove or disable access to unlawful information or content” in order to curb fake news online.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Fatima Khan was &lt;a class="external-link" href="https://theprint.in/talk-point/mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content/170167/"&gt;published in the Print&lt;/a&gt; on December 28, 2018. Amber Sinha was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;No concrete steps taken by either NDA or UPA to enact laws for surveillance reform&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://egazette.nic.in/WriteReadData/2018/194066.pdf"&gt;MHA order&lt;/a&gt; which  gives 10 government agencies the power to intercept, monitor and  decrypt ‘any information’ generated, transmitted, received, or stored in  any computer, reaffirms the sorry state of communication surveillance  law in India. This is reflected in the lack of judicial review, minimal  legislative oversight and no regard for the principles of necessity,  proportionality, user notification and transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite detailed &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;recommendations&lt;/a&gt; by  the Committee of Experts led by Justice AP Shah back in 2013, there  have been no concrete steps taken by either the current NDA government  or the previous UPA government to enact laws for surveillance reform.  The &lt;a href="http://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf"&gt;draft bill&lt;/a&gt; by  the committee led by Justice Srikrishna does refer to the principles of  necessity and proportionality, but stops short of recommending an  overhaul of the surveillance regime. This notification is but merely the  logical next step in the existing framework for communications  surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the &lt;a href="http://meity.gov.in/writereaddata/files/Draft_Intermediary_Amendment_24122018.pdf"&gt;draft amendments&lt;/a&gt; to  the IT Act regulations seek to address the problem of ‘unlawful  content’ and seem to stem largely from concerns about the use of  platforms like Facebook and WhatsApp to spread disinformation and impact  electoral processes in India. To that extent, these steps are misguided  and betray a failure to engage with the actual problem. Already, the  powers of content moderation exercised by online platforms suffer from  problems of transparency and accountability. The draft regulations will  only serve to compound this problem while unreasonably expecting the  platforms to exercise powers which should require judicial  determination.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content'&gt;https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-12-30T10:08:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech">
    <title>The dark side of future tech: Where are we headed on privacy, security, truth?</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech</link>
    <description>
        &lt;b&gt;#2018 Year-End Special: We now live in a time when devices listen, chips track your choices, and governments can watch from behind a barcode. How do we navigate this world?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Dipanjan Sinha was published in the &lt;a class="external-link" href="https://www.hindustantimes.com/tech/the-dark-side-of-future-tech-where-are-we-headed-on-privacy-security-truth/story-EEdRPH5Qcr9MDP6tB9m4QK.html"&gt;Hindustan Times&lt;/a&gt; on December 29, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;“One of the definitions of sanity is the ability to tell  real from unreal. Soon we’ll need a new definition,” Alvin Toffler,  author of the 1970 bestseller Future Shock, once said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy.  Security. Freedom. Democracy. History. News — the lines between the real  and unreal are blurring in each of these fields.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fake news is  helping decide elections; history being rewritten as it happens; rumour  has become identical in look, feel and distribution to the actual news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Devices  that listen, governments that watch you from behind a barcode, chips  that track where you go, what you eat, how you feel — these used to be  the stuff of dystopian novels.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  April, the world learnt of the Chinese government’s social credit  system, a programme currently in the works that would employ private  technology platforms and local councils to use personal data to assign a  social score to every registered citizen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Behave as the state  wants you to, and you could get cheaper loans, easier access to  education; it’s unclear what the consequences could be for those who do  the opposite, but discredits are likely for bad behaviours that range  from smoking in non-smoking zones to buying ‘too many’ video games, and  being critical of the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We’ve seen this before —  totalitarian governments where the individual is under constant  surveillance by a state that pretends this is for the greater good. But  the last time we came across it, it was fiction — George Orwell’s 1984,  set in a superstate where thought police took their orders from a  totalitarian leader with a friendly name, Big Brother.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p&gt;&lt;aside&gt; 
&lt;ul class="row latest-news-bx"&gt;
&lt;/ul&gt;
&lt;/aside&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CATCH-22 &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Just because you’re  paranoid doesn’t mean they aren’t out to get you,” Joseph Heller said,  in Catch-22, a novel so layered that you’re never sure which bits are  true. Who gets access to the data your phone collects? What is the  government watching for, after they’ve assigned citizens unique IDs?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It  feels good to be able to criticise China, still something of an anomaly  in a global community that is largely democratic and free-market, but  the UK had a National Identity Cards Act from 2006 to 2010; India has  the Aadhar project; Brazil has had the National Civil Identification  document since 2017; Germany, a national identity card since 2010, and  Colombia has had one since 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They’re collecting biometric  data, assigning numbers to citizens and building national registers —  with not much word on what’s in them, who has access, or how secure they  are.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“To  ask what the risk is with accumulating such big data is like asking  what the risk is with computers. They are both embedded in our lives,”  says Pranesh Prakash, a fellow at the thinktank Centre for Internet and  Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security is just the base layer in the pyramid if risks.  There is also the risk of discrimination — whether in terms of  benefits, employment, or something like marriage, Prakash says. There is  the risk of bad data leading to worse discrimination; there is the risk  of public profiling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The question here is about transparency,”  Prakash says. “The questions of what the data contains, who it is  accessed by or sold do, how much of it there is, and what the purpose is  of collecting it — need to be clearly answered.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;OPERATION THEATRE&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New  questions are being asked in the field of medicine as well. Where do  you draw the line on designer babies? Should parents get to edit the  genes of their child-to-be? How much ought we to tinker — do you stop at  mutations, or go on to decide hair colour and intellect?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As it  becomes cheaper and easier to sequence DNA, the questions over the next  steps — of interpreting and analysing the data — will become more  complex, says K VijayRaghavan, principal scientific adviser to the  government of India, and former director of the National Centre for  Biological Sciences. “From here on, with the data deluge, deciding what  and how to do it will become fiendishly complex. Especially as  commercial interests become involved.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have rules and laws for  the use of DNA information in research, but corresponding laws that  regulate how one can use personal whole genome information in the public  space are still being framed. “The data-privacy discussion will soon  get to the genomic-data space,” VijayRaghavan says. “Data sharing is  needed for patients to benefit. Yet data privacy is needed to prevent  exploitative use. It’s a conundrum, and there are no easy answers.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech'&gt;https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-30T09:24:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle">
    <title>Is the new ‘interception’ order old wine in a new bottle?</title>
    <link>https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle</link>
    <description>
        &lt;b&gt;The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;An opinion piece co-authored by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare was published in &lt;a class="external-link" href="https://www.newslaundry.com/2018/12/27/is-the-new-interception-order-old-wine-in-a-new-bottle"&gt;Newslaundry.com&lt;/a&gt; on December 27, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;On December 20, 2018, through an &lt;a href="http://egazette.nic.in/WriteReadData/2018/194066.pdf" target="_blank"&gt;order&lt;/a&gt; issued by the Ministry of Home Affairs (MHA), 10 security  agencies—including the Intelligence Bureau, the Central Bureau of  Investigation, the Enforcement Directorate and the National  Investigation Agency—were listed as the intelligence agencies in India  with the power to intercept, monitor and decrypt "any information"  generated, transmitted, received, or stored in any computer under Rule 4  of the Information Technology (Procedure and Safeguards for  Interception, Monitoring and Decryption of Information) Rules, 2009,  framed under section 69(1) of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 21, the Press Information Bureau published a &lt;a href="http://www.pib.nic.in/PressReleseDetail.aspx?utm_campaign=fullarticle&amp;amp;utm_medium=referral&amp;amp;PRID=1556945" target="_blank"&gt;press release&lt;/a&gt; providing clarifications to the previous day’s order. It said the  notification served to merely reaffirm the existing powers delegated to  the 10 agencies and that no new powers were conferred on them.  Additionally, the release also stated that “adequate safeguards” in the  IT Act and in the Telegraph Act to regulate these agencies’ powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presumably,  these safeguards refer to the Review Committee constituted to review  orders of interception and the  prior approval needed by the Competent  Authority—in this case, the secretary in the Ministry of Home Affairs in  the case of the Central government and the secretary in charge of the  Home Department in the case of the State government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted in  the press release, the government has always had the power to authorise  intelligence agencies to submit requests to carry out the interception,  decryption, and monitoring of communications, under Rule 4 of the  Information Technology (Procedure and Safeguards for Interception,  Monitoring and Decryption of Information) Rules, 2009, framed under  section 69(1) of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When considering the implications of  this notification, it is important to look at it in the larger framework  of India’s surveillance regime, which is made up of a set of provisions  found across multiple laws and operating licenses with differing  standards and surveillance capabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 5(2) of the  Indian Telegraph Act, 1885 allows the government (or an empowered  authority) to intercept or detain transmitted information on the grounds  of a public emergency, or in the interest of public safety if satisfied  that it is necessary or expedient so to do in the interests of the  sovereignty and integrity of India, the security of the State, friendly  relations with foreign states or public order or for preventing  incitement to the commission of an offence. This is supplemented by Rule  419A of the Indian Telegraph Rules, 1951, which gives further  directions for the interception of these messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;-  Condition 42 of the &lt;a href="http://www.dot.gov.in/sites/default/files/DOC270613-013.pdf" target="_blank"&gt;Unified Licence for Access Services&lt;/a&gt;,  mandates that every telecom service provider must facilitate the  application of the Indian Telegraph Act. Condition 42.2 specifically  mandates that the license holders must comply with Section 5 of the same  Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 69(1) of the Information Technology Act and  associated Rules allows for the interception, monitoring, and decryption  of information stored or transmitted  through any computer resource if  it is found to be necessary or expedient to do in the interest of the  sovereignty or integrity of India, defense of India, security of the  State, friendly relations with foreign States or public order or for  preventing incitement to the commission of any cognizable offence  relating to above or for investigation of any offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section  69B of the Information Technology Act and associated Rules empowers the  Centre to authorise any agency of the government to monitor and collect  traffic data “to enhance cyber security, and for identification,  analysis, and prevention of intrusion, or spread of computer contaminant  in the country”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 92 of the CrPc allows for a Magistrate or Court to order access to call record details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notably,  a key difference between the IT Act and the Telegraph Act in the  context of interception is that the Telegraph Act permits interception  for preventing incitement to the commission of an offence on the  condition of public emergency or in the interest of public safety while  the IT Act permits interception, monitoring, and decryption  of any  cognizable offence relating to above or for investigation of any  offence. Technically, this difference in surveillance capabilities and  grounds for interception could mean that different intelligence agencies  would be authorized to carry out respective surveillance capabilities  under each statute. Though the Telegraph Act and the associated Rule  419A do not contain an equivalent to Rule 4—&lt;a href="https://mha.gov.in/MHA1/Par2017/pdfs/par2013-pdfs/ls-110214/294.pdf" target="_blank"&gt;nine Central Government agencies and one State Government agency&lt;/a&gt; have previously been authorized under the Act. The Central Government  agencies authorised under the Telegraph Act are the same as the ones  mentioned in the December 20 notification with the following  differences:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Under the Telegraph Act, the Research and Analysis  Wing (RAW) has the authority to intercept. However, the 2018  notification more specifically empowers  the Cabinet Secretariat of RAW  to issue requests for interception under the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Under the  Telegraph Act, the Director General of Police, of concerned  state/Commissioner of Police, Delhi for Delhi Metro City Service Area,  has the authority to intercept. However, the 2018 notification  specifically authorises  the Commissioner of Police, New Delhi with the  power to issue requests for interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, the&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009" target="_blank"&gt; IT (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009 &lt;/a&gt;under  69B of the IT Act  contain a provision similar to Rule 4 of the IT  (Procedure and Safeguards for Interception, Monitoring and Decryption of  Information) Rules, 2009 - allowing the government to authorize  agencies that can monitor and collect traffic data.  In 2016, the  Central Government &lt;a href="http://meity.gov.in/writereaddata/files/69B%20Notification%20-April%202016.pdf" target="_blank"&gt;authorised&lt;/a&gt; the Indian Computer Emergency Response Team to monitor and collect  traffic data, or information generated, transmitted, received, or stored  in any computer resource. This was an exercise of the power conferred  upon the Central Government by Section 69B(1) of the IT Act. However,  this notification does not reference Rule 4 of the IT Rules, thus it is  unclear if a  similar notification has been issued under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  it is accurate that the order does not confer new powers, areas of  concern that existed with India’s surveillance regime continue to remain  including the question of whether 69(1) and 69B and associated Rules  are &lt;a href="https://thewire.in/government/narendra-modi-snooping-it-act-home-ministry" target="_blank"&gt;constitutionally&lt;/a&gt; valid, the lack of t&lt;a href="https://cis-india.org/internet-governance/blog/transparency-in-surveillance" target="_blank"&gt;ransparency&lt;/a&gt; by the government and the prohibition of transparency by service providers, &lt;a href="https://cis-india.org/internet-governance/blog/yahoo-october-23-2013-what-india-can-learn-from-snowden-revelations" target="_blank"&gt;heavy handed &lt;/a&gt;penalties on service providers for non-compliance, and a lack of legal backing and &lt;a href="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance" target="_blank"&gt;oversight&lt;/a&gt; mechanisms for intelligence agencies. Some of these could be addressed  if the draft Data Protection Bill 2018 is enacted and the Puttaswamy  Judgement fully implemented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MHA’s  order and the press release thereafter have served to  publicise and  provide needed clarity with respect to the powers vested in which  intelligence agencies in India under section 69(1) of the IT Act.  This  was previously unclear and could have posed a challenge to ensuring  oversight and accountability of actions taken by intelligence agencies  issuing requests under section 69(1) .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The publishing of the list  has subsequently served to raise questions and create a debate about key  issues concerning privacy, surveillance and state overreach. On &lt;a href="https://barandbench.com/ministry-of-home-affairs-surveillance-order-challenged-in-supreme-court/" target="_blank"&gt;December 24&lt;/a&gt;,  the order was challenged by advocate ML Sharma on the grounds of it  being illegal, unconstitutional and contrary to public interest. Sharma  in his contention also stated the need for the order to be tested on the  basis of the right to privacy established by the Supreme Court in  Puttaswamy which laid out the test of necessity, legality, and  proportionality. According to this test, any law that encroaches upon  the privacy of the individual will have to be justified in the context  of the right to life under Article 21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there are also other  questions that exist. India has multiple laws enabling its surveillance  regime and though this notification clarifies which intelligence  agencies can intercept under the IT Act, it is still seemingly unclear  which intelligence agencies can monitor and collect traffic data under  the 69B Rules. It is also unclear what this order means for past  interceptions that have taken place by agencies on this list or agencies  outside of this list under section 69(1) and associated Rules of the IT  Act. Will these past interceptions possess the same evidentiary value  as interceptions made by the authorised agencies in the order?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle'&gt;https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2018-12-29T16:02:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-china-tech-forum">
    <title>India-China Tech Forum 2018</title>
    <link>https://cis-india.org/internet-governance/news/india-china-tech-forum</link>
    <description>
        &lt;b&gt;Arindrajit Basu spoke at the India-China Tech Forum 2018 organised by ORF and Peking University at the Ji Xianlin Centre for India-China Studies, Mumbai on December 11 - 12, 2018. The event functioned as a bi-annual dialogue that fosters co-operation in this space between the two countries.&lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;Arindrajit spoke on the panel 'India, China and the future of cyber norms' along with Saravjit Singh,Liu Ke and Weng Wejia. This was a closed door discussion under Chatham House rules. Click &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/india-china-tech-forum-2018"&gt;here&lt;/a&gt; to read the agenda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-china-tech-forum'&gt;https://cis-india.org/internet-governance/news/india-china-tech-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-26T15:32:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete">
    <title>Big Brother is here: Amid snooping row, govt report says monitoring system 'practically complete'</title>
    <link>https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete</link>
    <description>
        &lt;b&gt;The recently released 2017-18 annual report of the Centre for Development of Telematics (C-DOT) says that surveillance equipment is being rolled out in 21 service areas across the country.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Keerthana Sankaran was published in &lt;a class="external-link" href="http://www.newindianexpress.com/nation/2018/dec/24/big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete-1915866.html"&gt;New Indian Express&lt;/a&gt; on December 26, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;While last week's government order on  snooping caused an uproar, the Centre's plans for a far-reaching  monitoring system have been in the making for almost a decade -- with  the groundwork being done by the previous UPA regime. The recently  released 2017-18 annual report of the Centre for Development of  Telematics (C-DOT) says that India’s ‘Central Monitoring System’ (CMS)  is “practically complete”, confirming that the Orwellian ‘Big Brother’  is here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report says that surveillance equipment is being rolled out in 21  service areas across the country and operations have commenced in 12  service areas. The system will monitor and intercept calls and messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government claims the CMS is based on the Telegraph Act of 1885  which states that the central or state government may intercept messages  if the government is “satisfied that it is necessary or expedient to do  so in the interests of the sovereignty and integrity of India, the  security of the state, friendly relations with foreign states or public  order or for preventing incitement to the commission of an offence.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the surveillance system was publicly announced in 2009,  C-DOT’s annual report of 2007-2008 had hinted at a testing phase for a  “lawful interception, monitoring” system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A post from the website of the Centre for Internet and Society describes how the CMS could work. Network providers are all required to give interconnected Regional Monitoring Centres access to their network servers. The article also points out that there is no law that describes the CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS was approved by the Cabinet Committee on Security during the  UPA government in 2011, receiving flak from experts and the press for  not safeguarding the citizen’s right to privacy. However, in a Lok Sabha  session in May 2016, Telecom Minister Ravi Shankar Prasad said that the  system is for the “process of lawful interception”, adding that  regional monitoring centres in Delhi and Mumbai had been  operationalised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest C-DOT report also talks about a Centre of Excellence for  Lawful Interception being set up, which would use high-end technologies -  such as open source intelligence, image processing and search engine  tools to scan Twitter and Facebook - for surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Thursday, the Ministry of Home Affairs released a notification,  authorising 10 central agencies to intercept, monitor and decrypt any  "information generated, transmitted, received or stored in any  computer." While the public and opposition parties expressed alarm over  the new order, the C-DOT report clearly shows that state surveillance  plans are already in an advanced stage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These government moves are taking place despite the August 2017  landmark judgement by the Supreme Court, which declared the right to  privacy as a fundamental right which will protect citizens from  intrusive activities by the state.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete'&gt;https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-26T15:22:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security">
    <title>Private-public partnership for cyber security </title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security</link>
    <description>
        &lt;b&gt;Given the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindrajit Basu was published in &lt;a class="external-link" href="https://www.thehindubusinessline.com/opinion/private-public-partnership-for-cyber-security/article25821899.ece"&gt;Hindu Businessline&lt;/a&gt; on December 24, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;On November 11, 2018, as 70 world leaders gathered in Paris to  commemorate the countless lives lost in World War I, French President  Emmanuel Macron inaugurated the Paris Peace Forum with a fiery speech  denouncing nationalism and urging global leaders to pursue peace and  stability through multilateral initiatives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In many ways, it  echoed US President Woodrow Wilson’s monumental speech delivered at the  US Senate a century ago in which he outlined 14 points on the principles  for peace post World War I. As history unkindly reminds us through the  catastrophic realities of World War II, Wilson’s principles went on to  be sacrificed at the altar of national self-interest and inadequate  multilateral enforcement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;President Macron’s first initiative for  global peace — the Paris Call for Trust and Security in Cyber Space was  unveiled on November 12 — at the UNESCO Internet Governance Forum — also  taking place in Paris. The call was endorsed by over 50 states, 200  private sector entities, including Indian business guilds such as FICCI  and the Mobile Association of India and over 100 organisations from  civil society and academia from all over the globe. The text essentially  comprises a set of high-level principles that seeks to prevent the  weaponisation of cyberspace and promote existing institutional  mechanisms to “limit hacking and destabilising activities” in  cyberspace.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Need for private participation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Given the  increasing exploitation of the internet for reaping offensive dividends  by state and non-state actors alike and the prevailing roadblocks in the  multilateral cyber norms formulation process, Macron’s efforts are  perhaps of Wilsonian proportions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A key difference, however, was  that Macron’s efforts were devised hand-in-glove with Microsoft — one of  the most powerful and influential private sector actors of our time.  Microsoft’s involvement is unsurprising given that private entities have  become a critical component of the global cybersecurity landscape and  governments need to start thinking about how to optimise their  participation in this process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, one of the defining  features of cyberspace is its incompatibility with state-centric  ‘command and control’ formulae that lead to the ordering of other global  security regimes — such as nuclear non-proliferation. The decentralised  nature of cyberspace means that private sector actors play a vital role  in implementing the rules designed to secure cyberspace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Simultaneously,  private actors such as Microsoft have recognised the utility of clearly  defined ‘rules of the road’ which ensure certainty and stability in  cyberspace and ensure its trustworthiness among global customers.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Normative deadlock&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;There  have been multiple gambits to develop universal norms of responsible  state behaviour to foster cyber stability. The United Nations-Group of  Governmental Experts (UN-GGE) has been constituted five times now and  will meet again in January 2019.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the third and fourth GGEs  in 2013 and 2015 respectively made some progress towards agreeing on  some baseline principles, the fifth GGE broke down due to opposition  from states including Russia, China and Cuba on the application of  specific principles of international law to cyberspace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was  an extension of a long-running ‘Cold War’ like divide among states at  the United Nations. The US along with its NATO allies believe in  creating voluntary non-binding norms for cybersecurity through the  application of international law in its entirety while Russia, China and  its allies in the Shanghai Co-operation Organization (SCO) reject the  premise that international law applies in its entirety and call for the  negotiation of an independent treaty for cyberspace that lays down  binding obligations on states.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Critical role&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The private  sector has begun to play a critical role in breaking this deadlock.  Recent history is testament to catalytic roles played by non-state  actors in cementing global co-operative regimes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example,  Dupont — the world’s leading ChloroFluoroCarbon (CFC) producer — played a  leading role in the 1970s and 1980s towards the development of The  Montreal Protocol on Substances that Deplete the Ozone Layer and gained  positive recognition for its efforts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another example is the  International Committee of the Red Cross (ICRC) — a non-governmental  organisation that played a crucial role in the development of the Geneva  Conventions and its Additional Protocols, which regulate the conduct of  atrocities in warfare by preparing initial drafts of the treaties and  circulating them to key government players.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, in  cyberspace, Microsoft’s Digital Geneva Convention which devised a set of  rules to protect civilian use of the internet was put forward by Chief  Legal Officer, Brad Smith two months before the fifth GGE met in 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite  the breakdown at the UN-GGE, Microsoft pushed on with the Tech Accords —  a public commitment made by (as of today) 69 companies “agreeing to  defend all customers everywhere from malicious attacks by cyber-criminal  enterprises and nation-states.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much like the ICRC, Microsoft  leads commendable diplomatic efforts with the Paris Call as they reached  out to states, civil society actors and corporations for their  endorsement.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Looking Forward&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Private sector-led normative  efforts towards securing cyberspace are redundant in the absence of  three key recommendations. First, is the implementation of best  practices at the organisational level through the implementation of  robust cyber defense mechanisms, the detection and mitigation of  vulnerabilities and breach notifications — both to consumer and the  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, is the development of mechanisms that enables  direct co-operation between governments and private actors at the  domestic level. In India, a Joint Working Group between the Data  Security Council of India (DSCI) and the National Security Council  Secretariat (NSCS) was set up in 2012 to explore a Private Public  Partnership on cyber-security in India , which has great potential but  is yet to report any tangible outcomes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third and final point  is the recognition that their efforts need to result in a plurality of  states coming to the negotiating table. The absence of the US, China and  Russia in the Paris Call are eerily reminiscent of the lack of US  participation in Woodrow Wilson’s League of Nations, which was one of  the reasons for its ultimate failure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft needs to keep on calling with Paris but Beijing, Washington and Alibaba need to pick up.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-26T15:02:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook">
    <title>How data privacy and governance issues have battered Facebook ahead of 2019 polls</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook</link>
    <description>
        &lt;b&gt;Rohit S, an airline pilot, had enough of Facebook. With over 1,000 friends and part of at least a dozen groups on subjects ranging from planes to politics, the 34-year-old found himself constantly checking his phone for updates and plunging headlong into increasingly noisy debates, where he had little personal connect.&lt;/b&gt;
        &lt;p&gt;The article by Rahul Sachitanand was &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/how-data-privacy-and-governance-issues-have-battered-facebook-ahead-of-2019-polls/articleshow/67004685.cms"&gt;published in Economic Times&lt;/a&gt; on December 9, 2018. Elonnai Hickok was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While he had originally signed up with Facebook a decade ago to reconnect with school classmates, he found himself more and more disconnected from the sprawl the social network had become. “It was a mess of impersonal shares, unverified half-truths and barely any personal updates,” he says, a week after permanently logging out. “I’d rather reconnect the old-fashioned way.”&lt;br /&gt;&lt;br /&gt;This kind of user disenchantment has become increasingly common among Facebook users. Many like Rohit, who signed up with more altruistic aims, find themselves distanced by how the social networking platform has evolved.&lt;br /&gt;&lt;br /&gt;All through 2018, Facebook and its embattled cofounder, Mark Zuckerberg, have found themselves battling one fire after another. Starting with the mess involving Cambridge Analytica and ending with the document dump unearthed by UK’s Parliament this week (that showed the firm as a cut-throat corporation at best), this has been a year to forget. “Unfortunately, Facebook cannot be trusted with the privacy of its users’ data,” says Alessandro Acquisti, professor, Carnegie Mellon University. “Time and again, Facebook has shown a cavalier attitude towards the handling of users’ data as well as towards informing users clearly and without deception about the actual extent of Facebook’s data collection and handling policies.”&lt;br /&gt;&lt;br /&gt;This perception has caused problems with Facebook, both around the world and at home, with privacy advocates pushing for stronger monitoring to counter the seeming free reign enjoyed by the platform.&lt;br /&gt;&lt;br /&gt;Mishi Choudhary, legal director of Software Freedom Law Center in the US and Mishi Choudhary and Associates, a New Delhi-law firm, says the pay-for-data model necessitates a stronger data protection regime that doesn’t leave users at the mercy of self-governing corporate entities.&lt;br /&gt;&lt;br /&gt;“The contrast between Facebook’s public statements and private strategies to monetise user data reveals the truth of surveillance capitalism carried out stealthily and steadily,” she says.&lt;br /&gt;&lt;br /&gt;In an election year in India, this could cause problems for Facebook.&lt;br /&gt;&lt;br /&gt;The company has already tried to clean up its act, implementing more transparent political advertising norms and looking to clean up fake news claims (on itself and WhatsApp, the messaging platform it owns) to try to win back user trust. Facebook has also launched video monetisation capabilities and Lasso, a short video offering similar to Tik Tok, the Chinese startup that has been massively popular here. The company, that has over 250 million users in India, plans to train five million people on digital technologies in three years, to try to increase awareness.&lt;br /&gt;&lt;br /&gt;Facebook didn’t respond to an email seeking more specific comments for this piece.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a country where privacy legislation is yet in the works, experts are worried about the overt and covert interest in users’ private data. Hundreds of millions of users here, many unwittingly, accepting user terms and giving apps too many permissions could easily give away confidential information, the experts argue. This is especially so in the case of Android users in the country, who access the web on cheap handsets and don’t have a full understanding of what they sign up for. “Very few people know about the origin or provenance of apps that they download or what data they track or phone features that they access,” says Shiv Putcha, founder and principal analyst, Mandala Insights, a telecom consultancy. “These are all potential security breaches of a massive order.”&lt;br /&gt;&lt;br /&gt;Alessandro Acquisti, professor, Carnegie Mellon University. This situation has privacy advocates closely watching Facebook and pushing for more stringent rules to monitor the company. "The criticality of human rights impact assessment for all products and services by companies like Facebook is underscored," says Elonnai Hickok, from the Centre for Internet and Society, a think tank in Bengaluru. "To build user trust, these assessments should be made public."&lt;br /&gt;&lt;br /&gt;As India finalises its privacy legislation, it is important to ensure that such assessments are undertaken according to law, citizens and their rights are upheld and companies are held accountable. "This also demonstrates that India needs a privacy legislation that allows the government to address a situation if data of Indian citizens is impacted."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook'&gt;https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-25T01:43:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls">
    <title>Is Aadhaar Essential To Achieve Error-Free Electoral Rolls?</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls</link>
    <description>
        &lt;b&gt;The Election Commission’s plans to link Aadhaar with electoral rolls may have stirred a hornet’s nest.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.bloombergquint.com/politics/is-aadhaar-essential-to-achieve-error-free-electoral-rolls"&gt;Bloomberg's Quint&lt;/a&gt; on December 16, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The commission  plans to undertake the exercise to clean up electoral rolls—which need  to be updated frequently to avoid duplication and errors, &lt;i&gt;The Economic Times&lt;/i&gt; newspaper reported citing people aware of the matter. But with privacy  concerns raised against the Aadhaar, is this the best way to achieve  error-free voter data?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director at the  Centre for Internet and Society, doesn’t think so. Using Aadhaar data  without the consent of the user poses legal problems, he told  BloombergQuint in a conversation. “For the Election Commission to link  Aadhaar with citizens’ voter ID would require amending the law.”&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;It is questionable whether this will fall within the bounds that the SC has set for usage of Aadhaar.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  former legal advisor of the Election Commission SK Mendiratta, however,  brushed aside privacy concerns relating to the process. The Election  Commission, according to him, is a constitutional body and can use  information with the government to ensure purity of the electoral roll.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reetika  Khera, associate professor at Indian Institute of Management-Ahmedabad,  said this could be bad for voters. She cited the mass deletion of  voters from electoral rolls in Telangana ahead of the recent elections,  and urged that due process must be followed.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;There  are serious problems with the use of algorithmic approaches in various  spheres. Aadhaar as a tool to clean up the electoral rolls is the  problem.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Reetika Khera, Associate Professor, IIM Ahmedabad&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-25T01:21:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit">
    <title>AI for Social Good Summit</title>
    <link>https://cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit</link>
    <description>
        &lt;b&gt;Arindrajit Basu was a speaker at the event co-organized by Google AI and United Nations ESCAP on December 13, 2018 in Bangkok, Thailand.&lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;Arindrajit spoke at the panel " How can governments use AI in Public Service Delivery" along with Malavika Jayaram, Jake Lucci,Punit Shukla,Simon Schmooly and Gal Oren. He presented CIS research on AI in agriculture in Karnataka-which will be published as part of a compendium documenting case studies worldwide soon.&lt;/p&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/ai-for-social-good-summit"&gt;Click to read more&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit'&gt;https://cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2018-12-25T01:02:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy">
    <title>Centre’s order on computer surveillance threatens right to privacy, experts say</title>
    <link>https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy</link>
    <description>
        &lt;b&gt;The Constitutional validity of the notification allowing ten agencies to intercept information is uncertain.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Abhishek Dey was &lt;a class="external-link" href="https://scroll.in/article/906623/centres-order-on-computer-surveillance-threatens-right-to-privacy-experts-say"&gt;published in Scroll.in&lt;/a&gt; on December 22, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A notification issued by the Union Ministry of Home Affairs on  Thursday allowing ten agencies to intercept, monitor and decrypt any  information generated from any computer poses a grave threat to the &lt;a href="https://scroll.in/article/848321/supreme-courts-decision-that-privacy-is-a-fundamental-right-is-not-just-about-aadhaar"&gt;fundamental right&lt;/a&gt; to privacy, said lawyers and cyber security experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  notification led to a political storm on Friday and criticism from the  Opposition forced Parliament to be adjourned. However, Union Finance  Minister Arun Jaitley &lt;a class="link-external" href="https://indianexpress.com/article/india/oppn-making-a-mountain-where-molehill-does-not-exist-jaitley-on-mhas-surveillance-order-5504009/" rel="nofollow" target="_blank"&gt;accused&lt;/a&gt; the Opposition of “making a mountain where a molehill does not exist”.  The government on Friday issued a clarification stating that the  directive does not confer any new powers on it and has the legal backing  of the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts agreed that Thursday’s notification lists powers &lt;a href="https://scroll.in/article/906579/home-ministry-order-on-computer-surveillance-is-not-new-upa-introduced-provisions-in-2008"&gt;already available&lt;/a&gt; to the authorities in the Information Technology Act 2000. The legal  provisions to allow interception were introduced in 2008 by the  Congress-led United Progressive Alliance government. However, with the  fresh directive, experts said that the Bharatiya Janata Party-led  government seems to be trying to formalise surveillance through the  interception of computer information, they said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is true that  such [interception] powers already existed,” said Pavan Duggal, a  lawyer with expertise in cyber security. “But neither any such formal  directives were issued which I know of, nor any agency were specifically  notified to have those powers.”&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;&lt;b&gt;Privacy test&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  Information Technology Act 2000 was amended in 2008 to allow to the  monitoring and interception of computer information, while the rules  under which this would operate were &lt;a class="link-external" href="http://meity.gov.in/writereaddata/files/Information%20Technology%20%28Procedure%20and%20Safeguards%20for%20Interception%2C%20Monitoring%20and%20Decryption%20of%20Information%29%20Rules%2C%202009.pdf" rel="nofollow" target="_blank"&gt;promulgated&lt;/a&gt; in 2009. In 2017, the Supreme Court delivered a judgment establishing  privacy as a fundamental right. The legal foundation of the computer  interception directive could be still be challenged in court because it  has not yet been considered in light of the privacy judgment, said  Duggal. “It is now a matter of Constitutional validity,” he said&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thursday’s  notification lists the agencies authorised to intercept, monitor and  decrypt computer data: the Intelligence Bureau, Narcotics Control  Bureau, Enforcement Directorate, Central Board of Direct Taxes,  Directorate of Revenue Intelligence, Central Bureau of Investigation,  National Investigation Agency, Cabinet Secretariat (RAW), Directorate of  Signal Intelligence (for service areas of Jammu and Kashmir, North East  and Assam) and the Commissioner of Police, Delhi. The Act provides a  jail term of seven years for anyone who refuses to cooperate with these  agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Friday, experts questioned whether a notification listing the 10  agencies had actually been issued earlier, as the Centre claimed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It  is a fresh notification,” said Apar Gupta, a lawyer who specialises in  technology and media issues. “With this, interception of computers has  received formal acceptance in the public domain and it can have serious  implications on privacy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior officials of the Delhi Police  also said this appeared to be a fresh order. Asked if this meant that  the agencies would not need to ask for authorisation in every case since  a blanket order has been issued, the officials said that this still  needs to be clarified.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;&lt;b&gt;Lacking proportionality&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  order has raised questions about the validity of the cases of  interception of computer information conducted by the state police and  other security agencies between 2009 (the year the interception rules  were promulgated) and 2018 (the year the notification has been issued),  Pranesh Prakash, co-founder of the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One possibility, he said, may be that they were all unlawful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  if they were indeed conducted with legal backing, Prakash said, then  permission for this would  been sanctioned in the form of an order by a  competent authority. This is what Rule 3 of the &lt;a class="link-external" href="http://meity.gov.in/writereaddata/files/Information%20Technology%20%28Procedure%20and%20Safeguards%20for%20Interception%2C%20Monitoring%20and%20Decryption%20of%20Information%29%20Rules%2C%202009.pdf" rel="nofollow" target="_blank"&gt;interception rules&lt;/a&gt; mandate. But if so, Rule 4, which deals with the government authorising  agencies to conduct such interceptions, is redundant. “How can it not  be when any state police or other agency is capable of acquiring an  order for interception under Rule 3?” he said&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, Prakash said, the new directive does not pass the test of proportionality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  2007, the Central government introduced rules to amend the Indian  Telegraph Act 1951 to allow for information to be intercepted, Prakash  said. However, the rules say that the competent authority should resort  to interception only after considering all alternative means to acquire  information. Thursday’s directive, though, is silent about the  circumstances in which interception will be permitted, he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy'&gt;https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-25T00:50:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data">
    <title>Ten Indian government agencies can now snoop on people’s internet data</title>
    <link>https://cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data</link>
    <description>
        &lt;b&gt;In a significant attack on online privacy, India’s Home Affair’s Ministry has authorised no fewer than ten different central government agencies to intercept, monitor, and decrypt “any information generated, transmitted, received or stored in any computer”.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by David Spencer was &lt;a class="external-link" href="https://www.vpncompare.co.uk/indian-government-agencies-snoop-data/"&gt;published by VPN Compare&lt;/a&gt; on December 24, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The move has angered many Indian internet users, with the number of Indians &lt;a href="https://www.vpncompare.co.uk/best-vpn-india-2018-top-5/"&gt;turning to VPNs&lt;/a&gt; like &lt;a href="https://www.vpncompare.co.uk/expressvpn-com" rel="noopener" target="_blank"&gt;ExpressVPN&lt;/a&gt; to protect their online privacy is expected to rise significantly.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Extending powers under and old law&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The  authorisation has been made under Section 69 (1) of the Information  Technology Act, 2000 and Rule 4 of the Information Technology (Procedure  and safeguard for Monitoring and Collecting Traffic Data or  Information) Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While these laws have been in place for almost  a decade, it is only now that the Ministry has decided to use them  toenable the decryption and access of online data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The agencies  that can now look at what every single Indian citizen is doing online  include the Intelligence Bureau, the Narcotics Control Bureau, the  Enforcement Directorate, the Central Board of Direct Taxes, and the  Directorate of Revenue Intelligence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other which will also be  permitted to hack into people’s devices are the Central Bureau of  Investigation; National Investigation Agency, the Cabinet Secretariat  (R&amp;amp;AW), the Directorate of Signal Intelligence (only for the service  areas of Jammu &amp;amp; Kashmir and North-East and Assam) and the Delhi  Commissioner of Police.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The laws do notionally limit the  circumstances in which these agencies can access private internet data,  but as is so often the case, the definition of these circumstances are  so vague as to render the restrictions almost meaningless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Permissible  circumstances include cases thought to be “in the interest of the  sovereignty or integrity of India, defence of India, security of the  State, friendly relations with foreign States or public order or for  preventing incitement to the commission of any recognizable offence  relating to above or for investigation of any offence.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian  lawyers have said that all of the above agencies will still have to  comply with Rule 3 of Information Technology (Procedure and Safeguards  for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This  requires permission from either the union home secretary or the  secretary of the Home Affair’s Ministry before interception can take  place.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The new powers could be illegal&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The new permissions  also raise the interesting prospect that all previous interception of  data by these agencies could be both unconstitutional and illegal,  according to one Indian technology policy analyst, Pranesh Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also told &lt;a href="https://thewire.in/government/home-ministry-allows-10-central-agencies-to-engage-in-electronic-interception" rel="noopener" target="_blank"&gt;The Wire&lt;/a&gt; that  he believed “Section 69 and 69B of the IT Act are unconstitutional for  being over-broad in what they allow interception and monitoring for, in  demanding decryption from accused persons, and the punishments that they  prescribe.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The New Delhi based Internet Freedom Foundation  echoed this opinion, releasing a statement which said, “the decision to  authorise electronic snooping is unconstitutional and in breach of the  telephone tapping guidelines, the Privacy Judgement and the Aadhaar  judgement.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Opponents of the Indian President, Narendra Modi, have  argued that this latest decision is further evidence that he is turning  India into a surveillance state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Congress Party chief, Rahul  Gandhi, said this move showed Modi is “an insecure dictator”, while  others have argued that that this increased surveillance will have a  “chilling effect” on democratic debate and dissent in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srinivas Kodali, an independent security researcher in Hyderabad, told &lt;a href="https://www.aljazeera.com/news/2018/12/india-opponents-modi-creating-surveillance-state-181222090416318.html" rel="noopener" target="_blank"&gt;Al Jazeera&lt;/a&gt; the  new powers would “make data collection from critics and political  opponents easier [and] facilitate targeted raids against the opposition  and critics.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For their part, the Indian Government have used the age-old argument about the new powers helping them to combat “terrorism”.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;VPN use expected to rise in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;For  innocent India internet users, the reality is that their rights to  online privacy have been significantly undermined by the new powers.  There are now multiple central government agencies with the power to  intercept, decrypt, and access their private online data, with minimal  safeguards in place to protect their rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For most Indians, the new powers are a step to far, as has been seen by the angry response on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It  seems highly likely that the move will see more and amore Indian’s  turning to a VPN to protect their online privacy. By connecting to a  VPN, such as &lt;a href="https://www.vpncompare.co.uk/expressvpn-com" rel="noopener" target="_blank"&gt;ExpressVPN&lt;/a&gt;, they are able to ensure all of their online data is encrypted by state-of-the-art encryption and also effectively anonymised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It  means that no government agency will be able to see what they are doing  online and it will be almost impossible for their online activity to be  traced back to them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Using a VPN should protect internet users  from the erosion of online rights the Indian Government is trying to  implement. But it seems unlikely that it will stop the Modi  administration from trying.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data'&gt;https://cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-25T00:33:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards">
    <title>Centre’s order on computer surveillance is backed by law – but the law lacks adequate safeguards</title>
    <link>https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards</link>
    <description>
        &lt;b&gt;The Information Technology Act’s surveillance scheme furthers a colonial hangover.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Nehaa Chaudhari and Tuhina Joshi was published by &lt;a class="external-link" href="https://scroll.in/article/906764/centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards"&gt;Scroll.in&lt;/a&gt; on December 23, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Thursday, the Ministry of Home Affairs &lt;a class="link-external" href="http://egazette.nic.in/WriteReadData/2018/194066.pdf" rel="nofollow" target="_blank"&gt;issued&lt;/a&gt; a statutory order authorising 10 “security and intelligence agencies”  to intercept, monitor and decrypt electronic information and  communication. A media frenzy soon ensued, with Opposition political  parties seizing the notification as evidence that the government was  running a &lt;a class="link-external" href="https://indianexpress.com/article/india/centre-order-central-agencies-access-to-computers-opposition-reaction-5503615/" rel="nofollow" target="_blank"&gt;surveillance state&lt;/a&gt;. The ministry responded with a &lt;a class="link-external" href="http://pib.nic.in/PressReleseDetail.aspx?PRID=1556945" rel="nofollow" target="_blank"&gt;press release&lt;/a&gt;,  clarifying that the order was in keeping with Section 69(1) of the  Information Technology Act, 2000, and the Information Technology  (Procedure and Safeguards for Interception, Monitoring and Decryption of  Information) Rules, 2009, proving that the order was sound in law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several  government officials and Bharatiya Janata Party representatives have  since defended this order as being in India’s sovereign and national  security interest. They say it will bring transparency and  accountability into surveillance, and that is is only an extension of  the previous Congress-led government’s policy from 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No doubt, Central and state governments have had the power to  intercept, monitor and decrypt any information in any computer resource  since 2008, when Section 69 of the Information Technology Act was  amended to expand the government’s powers of interception. This  amendment was &lt;a class="link-external" href="https://privacyinternational.org/state-privacy/1002/state-privacy-india#commssurveillance" rel="nofollow" target="_blank"&gt;one of many changes&lt;/a&gt; introduced to India’s surveillance framework to tackle crime and terrorism &lt;a class="link-external" href="https://www.livemint.com/Industry/UTc7pjvKRUB9HCWBCoUo0K/Tweaking-the-law-to-deal-with-cyber-terrorism.html" rel="nofollow" target="_blank"&gt;in the wake of the 2008 terrorist attacks&lt;/a&gt; in Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  the ministry’s December 20 directive is the first time such an order  has been introduced under this section; and in this difference between a  legislation being on the statute books versus it being implemented lies  the reason for collective public outrage. That said, research by &lt;a class="link-external" href="https://cis-india.org/@@search?SearchableText=surveillance" rel="nofollow" target="_blank"&gt;the Centre for Internet and Society&lt;/a&gt; and &lt;a class="link-external" href="https://sflc.in/surveillance-there-need-judicial-oversight" rel="nofollow" target="_blank"&gt;SFLC.in&lt;/a&gt; shows that the Indian state has long engaged in surveilling electronic  communications, and other kinds of interception and monitoring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While railing against the ministry’s order is very welcome, it is futile  if it does not lead to a conversation around the root of the problem –  Section 69(1) of the Information Technology Act and the accompanying  Information Technology Rules. This section empowers the Central and  state governments to authorise government agencies to intercept, monitor  or decrypt “any information generated, transmitted, received or stored  in any computer resource”. It lays down six grounds on the basis of  which such authorisation may be granted. These are:&lt;/p&gt;
&lt;ol class="cms-block-ol cms-block" style="text-align: justify; "&gt;
&lt;li&gt;The preservation of India’s sovereignty or integrity.&lt;/li&gt;
&lt;li&gt;The security of the state.&lt;/li&gt;
&lt;li&gt;Public order.&lt;/li&gt;
&lt;li&gt;Maintaining friendly relations with other countries.&lt;/li&gt;
&lt;li&gt;Preventing offences relating to 1. to 4. from being incited or committed.&lt;/li&gt;
&lt;li&gt;Criminal investigations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;All authorisation orders issued by the government under Section 69(1)  must be reasoned and written, and must be subject to the procedure laid  down in the Information Technology Rules. As per these rules, all such  orders must be scrutinised by a review committee of the Centre, or the  state in question, set up under &lt;a class="link-external" href="http://www.dot.gov.in/sites/default/files/358%2520GI-2014%2520dated%25208.2.2014_6.pdf?download=1" rel="nofollow" target="_blank"&gt;Rule 419A&lt;/a&gt; of the Indian Telegraph Rules, 1951. All review committees set up under  Rule 419A comprise only of government secretaries. This means that the  executive sits in judgment over its own decisions. This goes against one  of the most basic principles of justice and fairness – that no person  shall be a judge in their own case.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;Threat to privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;State  surveillance threatens individual privacy and must be subject to  adequate safeguards. Privacy is a fundamental right guaranteed by the  Constitution of India, as &lt;a href="https://scroll.in/latest/848304/supreme-court-upholds-right-to-privacy-as-a-fundamental-right"&gt;recognised&lt;/a&gt; by nine judges of the Supreme Court in August 2017. Like all other  fundamental rights, the right to privacy is not absolute, and can be  restricted. According to the Supreme Court, these restrictions must be:  (1) backed by law, (2) for a legitimate state aim, and (3)  proportionate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, any government order under Section  69(1) of the Information Technology Act must fulfil this three-part test  to be constitutional. The absence of judicial or legislative oversight  over the executive’s decision-making under Section 69(1) is likely to  make it a disproportionate restriction on an individual’s fundamental  right to privacy and, therefore, unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even the  government-appointed Justice Srikrishna Committee of Experts, which has  been given the task of framing India’s data protection law, was &lt;a class="link-external" href="http://meity.gov.in/content/data-protection-committee-report" rel="nofollow" target="_blank"&gt;concerned&lt;/a&gt; about this lack of legislative or judicial review. This committee has  cited Germany, the United Kingdom, South Africa and the United States as  countries with adequate procedural safeguards over government  surveillance actions. On page 125 of its final report, it has noted,  “Executive review alone is not in tandem with comparative models in  democratic nations which either provide for legislative oversight,  judicial approval or both.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Act and the  Information Technology Rules are but one of many means of government  surveillance in India. Similar provisions exist in the Indian Telegraph  Act, 1885, the Telegraph Rules, 1951, and the Indian Post Office Act,  1898. These laws are the extension of a colonial legacy, used by a  foreign power to keep tabs on an alien population. Disappointingly, the  Information Technology Act’s surveillance scheme only furthers this  colonial hangover. Indian privacy thought, especially in the past few  years, has reflected the idea that we must evolve an Indian privacy  framework, grounded in our constitutional values, and tailored to the  Indian context. It is about time that our surveillance laws begin to  reflect our constitutional values as well.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;ol class="cms-block-ol cms-block" style="text-align: justify; "&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards'&gt;https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-24T17:04:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
