<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 456 to 470.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/networked-economies-and-gender-action-learning"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cross-border-data-sharing-and-india-a-study-in-processes-content-and-capacity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/takshashilas-online-cogitatum-on-ai-and-ethics-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/sflc-round-table-discussion-on-personal-data-protection-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/conference-on-data-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-wire-karan-saini-september-12-2018-what-security-breach-the-unchanging-tone-of-uidai-denials"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/meeting-of-information-systems-security-and-biometrics-sectional-committee"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-september-7-2018-aroon-deep-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/networked-economies-and-gender-action-learning">
    <title>Networked Economies and Gender Action Learning</title>
    <link>https://cis-india.org/internet-governance/news/networked-economies-and-gender-action-learning</link>
    <description>
        &lt;b&gt;Elonnai Hickok, Sunil Abraham and Ambika Tandon participated in a meeting organized by IDRC for grantees under their networked economies programme to discuss gender-based outputs and development outcomes in their work. The event was held in Ottawa on September 20 - 21, 2018, facilitated by Gender at Work.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham, Swaraj Paul Barooah and Ambika Tandon also attended a workshop on Gender Action Learning on September 24 - 25, 2018, which discussed strategies to work on gender under a grant for Cyber Policy Centres. Other organizations present at the workshop were Research ICT Africa, Lirne Asia, and Centre Latam Digital at CIDE,  Mexico. Gender at Work facilitated this workshop as well, and will be  working with all the grantees over a period of 18 months.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/networked-economies-and-gender-action-learning'&gt;https://cis-india.org/internet-governance/news/networked-economies-and-gender-action-learning&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-02T03:10:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing">
    <title>Cyber-Security in the Age of Smart Manufacturing</title>
    <link>https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing</link>
    <description>
        &lt;b&gt;Arindrajit Basu attended the event 'Cyber-security in the age of Smart Manufacturing.' The event 'BTS - CyberComm 2018' was organised by  the Federation of Indian Chamber of Commerce &amp; industry (FICCI) in association with Karnataka Innovation and Technology Society, and Government of Karnataka at The Lalit Ashok, Bengaluru on September 26, 2018.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The event was aimed at understanding the cyber security threats revolving around Industry 4.0 and smart manufacturing. The speakers included Mr. Gaurav Gupta, Principal Secretary, IT, BT and S&amp;amp;T Department, Government of Karnataka;Mr. Sanjay Mujoo, Vice President, Pointnext Global Centre Bangalore, Hewlett Packard Enterprise, India;Mr. Yogesh Andlay, Founder, Nucleus Software &amp;amp; Polaris Financial Technology and  Mr. Ambrish Bakaya, Co-Chair, ICT and Digital Economy Committee FICCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from discussing how to cover the threat vectors as businesses increasingly become digitised and use digital supply chains,the event was also useful in terms of obtaining an understanding of how the Karnataka government is approaching the digital ecosystem. The Centres of Excellence aim to bring on board academics, industry bodies and practitioners to develop best practices. FICCI, which was co-hosting this event indicated  that they will continue to work with the government to further this agenda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing'&gt;https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-10-02T00:23:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar">
    <title>After Supreme Court Setback, Fintech Firms Await Clarity On Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar</link>
    <description>
        &lt;b&gt;The 12-digit Aadhaar number is now out of bounds for fintech companies in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nishant Sharma was &lt;a class="external-link" href="https://www.bloombergquint.com/aadhaar/after-supreme-court-setback-fintech-firms-await-clarity-on-aadhaar"&gt;published in Bloomberg Quint&lt;/a&gt; on September 27, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/FiEbZcL3lnY" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;With the Supreme Court on Wednesday terming Aadhaar authentication by private companies as “&lt;a href="https://www.bloombergquint.com/law-and-policy/2018/09/26/aadhaar-a-quick-summary-of-the-supreme-court-majority-order" target="_blank"&gt;unconstitutional&lt;/a&gt;”,  companies such as online wallets and e-tailers, among others, will now  have to make changes to how they onboard and verify customers, in  addition to how they transact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a 567-page majority judgment  authored by Justice Sikri and concurred upon by two other judges—Chief  Justice Dipak Misra and Justice AM Khanwilkar—it said that Section 57 of  the Aadhaar Act, which allows private companies to use Aadhaar for  authentication services based on a contract between the corporate and an  individual, would enable commercial exploitation of private data and  hence is unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What it essentially means is that the  private bodies, such as lending platforms, wallets, or any private  entity, cannot use Aadhaar for authentication,” said Anirudh Rastogi  founder at Ikigai Law (formerly TRA), a law firm that specialises in  representing businesses on data privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The decision is set to  impact private companies right from Flipkart-owned PhonePe, Paytm,  Reliance Jio and Amazon, among others, which rely on Aadhaar for  e-verification. Amazon recently launched cardless equated monthly  installments on Amazon Pay through the digital finance platform Capital  Float and asked customers to provide Aadhaar numbers or virtual ID and  PAN details on the Amazon app for verification.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;'Aadhaar Is Just Another ID'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Pranesh  Prakash, fellow, Centre for Internet and Society, said that with this  judgment Aadhaar is no longer an identity infrastructure as its creators  have dreamt of. “It is now just another ID.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For those opposed to  Aadhaar, on privacy and security grounds, this may be a part victory.  But for the Fintech industry it stymies the use of quick Aadhaar-based  e-KYC (know your customer norms) to onboard customers. “The fintech  industry thrives on the instant paperless mantra, and this move will  curb its rapid growth, ” Amrish Rau, co-founder of PayU, said in a text  message.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The verdict is also set to push up costs for the  industry. Rau said: “Conducting physical KYC would be a costly affair,  with every physical KYC costing about Rs 100 per person.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies  like PhonePe await more clarity. “We are waiting to hear from bodies  like the Reserve Bank of India, UIDAI on what KYC that will be required  for wallets moving ahead," Sameer Nigam, cofounder of PhonePe, said.  "Whether we go to no KYC, lower limit environment or go to the physical  KYC environment."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  judgment also stated that the identification number will not be  mandatory for opening bank accounts, mobile-phone connections or for  admissions into educational institutions. However, Aadhaar will continue  to be mandatory for the distribution of state-sponsored welfare schemes  including direct benefit transfers and the public distribution system.  Taxpayers will have to link their Permanent Account Numbers to the  biometric database.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aadhaar-Based KYC: Allowed With Consent?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  Supreme Court has concluded that the part of section 57 which enables  body corporate and individuals also to seek authentication, that too on  the basis of a contract between the individual and such body corporate  or person, would impinge upon the right to privacy of such individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasanna  S, a Supreme Court advocate and lawyer for one of the petitioners in  the Aadhaar matter interpreted it to mean that even if a customer  voluntarily wants to use Aadhaar for e-KYC, businesses cannot accept it.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;They  have struck down the part of Section 57 that allows use of Aadhaar  based on a contract. A contract, by nature is voluntary, But since the  court has struck down this part, even voluntary use won’t be permitted.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Prasanna S, Advocate, Supreme Court&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jaitley Hints At Legal Backing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile,  Finance Minister Arun Jaitley on Wednesday hinted that the Centre is  likely to examine whether separate legal backing is needed for Section  57 of the Aadhaar Act, the newswire PTI reported. “So, let us first read  the judgement. There are two-three prohibited areas. Are they because  they are totally prohibited or are they because they need legal  backing,” Jaitley was quoted as saying.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rastogi of Ikigai Law said  that the court has left open for the government to promulgate a law to  enable private parties to use Aadhaar that can withstand judicial  scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rahul  Matthan, a technology partner at law firm Trilegal differed with this  view. He said that since the apex court has ruled that private entities  cannot access the Aadhaar infrastructure, it means that even if the  government brings a specific law to allow for that, it would be  unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasanna agreed with this interpretation.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;The  court has hinted that commercial exploitation of personal information  will fail the proportionality test laid down by it in the Right to  Privacy judgment. This is one of the grounds for them to conclude that  Section 57 is unconstitutional. So even a law is introduced, private  access will be impermissible.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Prasanna S, Advocate, Supreme Court&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Are Aadhaar-Based KYCs Tainted?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since  the use of Aadhaar by private entities has been struck down, does it  mean entities who have used it for KYC so far have to re-do that  exercise? And data that was collected as part of Aadhaar-based KYC- does  that need to be deleted?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The majority order hasn’t specifically  addressed these questions, Matthan pointed out. But went on to explain  that his reading of the judgment is that the court wants things to  remain as they are.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;The  Supreme Court has said that collection of data before the Aadhaar Act  was introduced is valid. If you follow that sentiment, may be we can  argue that there’s no requirement to delete the data.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Rahul Matthan, Partner, Trilegal&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Whatever  has been done without the authority of law has to go, Prasanna said.  But this outcome may not be practical and another hearing before the  Supreme Court may be required to clear these questions, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Private  entities such as the online cab aggregator Ola have already removed  eKYC from its e-wallet when BloombergQuint last checked. Others may  follow suit.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-01T23:39:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cross-border-data-sharing-and-india-a-study-in-processes-content-and-capacity">
    <title>Cross-Border Data Sharing and India: A study in Processes, Content and Capacity</title>
    <link>https://cis-india.org/internet-governance/blog/cross-border-data-sharing-and-india-a-study-in-processes-content-and-capacity</link>
    <description>
        &lt;b&gt;A majority of criminal investigations in the modern era necessitate law enforcement access to electronic evidence stored extra-territorially. The conventional methods of compelling the presentation of evidence available for investigative agencies often fail when the evidence is not present within the territorial boundaries of the state.

&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;The crux of the issue lies in the age old international law tenet of territorial sovereignty.Investigating crimes is a sovereign act and it cannot be exercised in the territory of another country without that country’s consent or through a permissive principle of extra-territorial jurisdiction. Certain countries have explicit statutory provisions which disallow companies incorporated in their territory from disclosing data to foreign jurisdictions. The United States of America, which houses most of the leading technological firms like Google, Apple, Microsoft, Facebook, and Whatsapp, has this requirement.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;This necessitates a consent based international model for cross border data sharing as a completely ad-hoc system of requests for each investigation would be ineffective. Towards this, Mutual Legal Assistance Treaties (MLATs) are the most widely used method for cross border data sharing, with letters rogatory, emergency requests and informal requests being other methods available to most investigators. While recent gambits towards ring-fencing the data within Indian shores might alter the contours of the debate, a sustainable long-term strategy requires a coherent negotiation strategy that enables co-operation with a range of international partners.&lt;/p&gt;
&lt;p&gt;This negotiation strategy needs to be underscored by domestic safeguards that ensure human rights guarantees in compliance with international standards, robust identification and augmentation of  capacity and clear articulation of how India’s strategy lines up with the existing tenets of International law. This report studies the workings of the Mutual Legal Assistance Treaty (MLAT) between the USA and India and identifies hurdles in its existing form, culls out suggestions for improvement and explores how recent legislative developments, such as the CLOUD Act might alter the landscape.&lt;/p&gt;
&lt;p&gt;The path forward lies in undertaking process based reforms within India with an eye on leveraging these developments to articulate a strategically beneficial when negotiating with external partners.As the nature of policing changes to a model that increasingly relies on electronic evidence, India needs to ensure that it’s technical strides made in accessing this evidence is not held back by the lack of an enabling policy environment. While the data localisation provisions introduced in the draft Personal Data Protection Bill may alter the landscape once it becomes law, this paper retains  its relevance in terms of guiding the processes, content and capacity to adequately manoeuvre the present conflict of laws situation and accessing data not belonging to Indians that may be needed for criminal investigations.As a disclaimer,the report and graphics contained within it have been drafted using publicly available information and may not reflect real world practices.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;&lt;strong&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/mlat-report"&gt;Click here to download the report&lt;/a&gt;&lt;/strong&gt; With research assistance from Sarath Mathew and Navya Alam and visualisation by Saumyaa Naidu&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cross-border-data-sharing-and-india-a-study-in-processes-content-and-capacity'&gt;https://cis-india.org/internet-governance/blog/cross-border-data-sharing-and-india-a-study-in-processes-content-and-capacity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Elonnai Hickok, Udbhav Tiwari and Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-29T00:37:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/takshashilas-online-cogitatum-on-ai-and-ethics-in-india">
    <title>Takshashila's online Cogitatum on AI and Ethics in India</title>
    <link>https://cis-india.org/internet-governance/news/takshashilas-online-cogitatum-on-ai-and-ethics-in-india</link>
    <description>
        &lt;b&gt;Elonnai Hickok participated in an event organized by Takhshashila on August 27, 2018 and made a presentation on Ethics and AI in India. The event was held in Takshashila Institution &lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/ethics-and-ai"&gt;Click to view the slides&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/takshashilas-online-cogitatum-on-ai-and-ethics-in-india'&gt;https://cis-india.org/internet-governance/news/takshashilas-online-cogitatum-on-ai-and-ethics-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-26T01:46:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/sflc-round-table-discussion-on-personal-data-protection-bill">
    <title>SFLC Round Table Discussion on Personal Data Protection Bill </title>
    <link>https://cis-india.org/internet-governance/news/sflc-round-table-discussion-on-personal-data-protection-bill</link>
    <description>
        &lt;b&gt;Shweta Mohandas participated in a Round Table Discussion on Personal Data Protection Bill, orgnanised by SFLC on September 25, 2018 in Bangalore. She also moderated the first session - Data Protection Principles (Rights and Obligations).&lt;/b&gt;
        &lt;p&gt;See the agenda of the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/agenda-for-round-table-for-data-protection"&gt;event here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/sflc-round-table-discussion-on-personal-data-protection-bill'&gt;https://cis-india.org/internet-governance/news/sflc-round-table-discussion-on-personal-data-protection-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-02T03:16:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news">
    <title>A trust deficit between advertisers and publishers is leading to fake news</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news</link>
    <description>
        &lt;b&gt;Transparency regulations is need of the hour. And urgently for election and political advertising. What do the ads look like? Who paid for them? Who was the target? How many people saw these advertisements? How many times? Transparency around viral content is also required.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.hindustantimes.com/analysis/a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news/story-SVNH9ot3KD50XRltbwOyEO.html"&gt;Hindustan Times&lt;/a&gt; on September 24, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Traditionally, we have depended on the private censorship that  intermediaries conduct on their platforms. They enforce, with some  degree of success, their own community guidelines and terms of services  (TOS). Traditionally, these guidelines and TOS have been drafted keeping  in mind US laws since historically most intermediaries, including  non-profits like Wikimedia Foundation were founded in the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Across  the world, this private censorship regime was accepted by governments  when they enacted intermediary liability laws (in India we have Section  79A of the IT Act). These laws gave intermediaries immunity from  liability emerging from third party content about which they have no  “actual knowledge” unless they were informed using takedown notices.  Intermediaries set up offices in countries like India, complied with  some lawful interception requests, and also conducted geo-blocking to  comply with local speech regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For years, the Indian  government has been frustrated since policy reforms that it has pursued  with the US have yielded little fruit. American policy makers keep  citing shortcomings in the Indian justice systems to avoid expediting  the MLAT (Mutual Legal Assistance Treaties) process and the signing of  an executive agreement under the US Clout Act. This agreement would  compel intermediaries to comply with lawful interception and data  requests from Indian law enforcement agencies no matter where the data  was located.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data localisation requirement in the draft  national data protection law is a result of that frustration. As with  the US, a quickly enacted data localisation policy is absolutely  non-negotiable when it comes to Indian military, intelligence, law  enforcement and e-governance data. For India, it also makes sense in the  cases of health and financial data with exceptions under certain   circumstances. However, it does not make sense for social media  platforms since they, by definition, host international networks of  people. Recently an inter ministerial committee recommended that  “criminal proceedings against Indian heads of social media giants” also  be considered. However, raiding Google’s local servers when a lawful  interception request is turned down or arresting Facebook executives  will result in retaliatory trade actions from the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the consequences of online recruitment, disinformation in  elections and fake news to undermine public order are indeed serious,  are there alternatives to such extreme measures for Indian policy  makers? Updating intermediary liability law is one place to begin. These  social media companies increasingly exercise editorial control, albeit  indirectly, via algorithms to claim that they have no “actual  knowledge”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But they are no longer mere conduits or dumb pipes as  they are now publishers who collect payments to promote content.  Germany passed a law called NetzDG in 2017 which requires expedited  compliance with government takedown orders. Unfortunately, this law does  not have sufficient safeguards to prevent overzealous private  censorship. India should not repeat this mistake, especially given what  the Supreme Court said in the Shreya Singhal judgment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Transparency  regulations are imperative. And they are needed urgently for election  and political advertising. What do the ads look like? Who paid for them?  Who was the target? How many people saw these advertisements? How many  times? Transparency around viral content is also required. Anyone should  be able to see all public content that has been shared with more than a  certain percentage of the population over a historical timeline for any  geographic area. This will prevent algorithmic filter bubbles and echo  chambers, and also help public and civil society monitor  unconstitutional and hate speech that violates terms of service of these  platforms. So far the intermediaries have benefitted from surveillance —  watching from above. It is time to subject them to sousveillance —  watched by the citizens from below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data portability mandates and  interoperability mandates will allow competition to enter these monopoly  markets. Artificial intelligence regulations for algorithms that  significantly impact the global networked public sphere could require –  one, a right to an explanation and two, a right to influence automated  decision making that influences the consumers experience on the  platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The real solution lies elsewhere. Google and Facebook  are primarily advertising networks. They have successfully managed to  destroy the business model for real news and replace it with a business  model for fake news by taking away most of the advertising revenues from  traditional and new news media companies. They were able to do this  because there was a trust deficit between advertisers and publishers.  Perhaps this trust deficit could be solved by a commons-based solutions  based on free software, open standards and collective action by all  Indian new media companies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-10-02T06:44:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp">
    <title>Find ways to trace origin of messages: Government to WhatsApp</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp</link>
    <description>
        &lt;b&gt;Unhappy with the steps taken so far by WhatsApp, the government plans to trace the origins of incendiary messages spread on its platform.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/find-ways-to-trace-origin-of-messages-government-to-whatsapp/articleshow/65880372.cms"&gt;Economic Times&lt;/a&gt; on September 20, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Electronics and IT (MeitY) is drafting a letter — its third since July to the Facebook-owned platform — asking it to design a technology-led solution to the issue that in the past has led to mob lynching or riots in the country. Since India first raising its concerns, WhatsApp has announced measures such as limiting forwards to five groups at a time from the earlier 250, identifying forwarded messages, and a publicity campaign against fake news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government says these measures may not be enough. “It’s a reasonable demand from us, and very much doable. The third letter will reiterate that WhatsApp is not meeting all our concerns,” said a top government official, who did not want to be identified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If WhatsApp feels the solution given by the government for traceability goes against its end-to-end encryption policy, then the company should be able to find a solution on its own which is technically feasible without compromising on its offering, the official said. “We are not asking them to look into the contents of the message, but if some message has been forwarded, say, 100 times and has caused some law and order problem, then they should be able to identify where it originated from,” he said, adding that WhatsApp cannot absolve itself from responsibility in the name of user privacy. “We are not being unfair since we can’t allow anonymous publishing.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp could not be immediately reached for comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some analysts say the government’s demand from WhatsApp is reasonable and the company could provide traceability using metadata without compromising on encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“For basic level of traceability, storing the metadata is enough,” said Sunil Abraham, executive director of Center of Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“For the kind of traceability that the Indian government is asking for, WhatsApp may have to break its end-toend encryption. But other kind of traceablity, such as who is messaging whom, how many times, who are the propagators of messages, and who are receivers, can all be seen through storing just metadata.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just like every organisation used to store copies of end-of-end encrypted emails on their own servers, similarly WhatsApp can either store copies of encrypted messages or the metadata, he said. Last month, at a meeting between Union minister for electronics and IT Ravi Shankar Prasad and WhatsApp CEO Chris Daniels, the government asked the company to appoint a grievance officer in India, set up an Indian entity, and ensure traceability of messages.&lt;br /&gt;While the company agreed to register a corporate entity and build a team here, a stalemate over the issue of traceability continues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“(WhatsApp) needs to find solutions to deal with sinister developments like mob lynching and revenge porn and has to follow Indian law,” Prasad said in August. “It does not take rocket science to locate a message being circulated in hundreds and thousands...&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(WhatsApp) must have a mechanism to find a solution.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp has maintained that people rely on the platform for all kinds of sensitive conversations, including with their doctors, banks and families. “Building traceability would undermine end-to-end encryption and the private nature of WhatsApp, creating the potential for serious misuse. WhatsApp will not weaken the privacy protections we provide,” the company’s spokesperson said in August after the demand from the Indian government on traceability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The official quoted earlier reiterated that the government is notasking the company to break its end-to-end encryption, adding that if the company could find ways to tag non-original content with ‘forward’ labels and flag some links as spurious, it could also find a way around this problem.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp'&gt;https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-24T02:53:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world">
    <title>Forecasting the Implications of the CLOUD Act Around the World</title>
    <link>https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world</link>
    <description>
        &lt;b&gt;Elonnai Hickok participated in the event organized by the Global Network Initiative at the Russell Senate Office Building, Washington D.C. on September 18, 2018 as a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Elonnai spoke on the CLOUD Act from an Indian perspective based on the article that she &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india"&gt;co-authored&lt;/a&gt; with Vipul Kharbanda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world'&gt;https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-20T15:51:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/conference-on-data-protection">
    <title>Conference on Data Protection</title>
    <link>https://cis-india.org/internet-governance/news/conference-on-data-protection</link>
    <description>
        &lt;b&gt;Sunil Abraham  and Amber Sinha participated in a conference on data protection at NIPFP in New Delhi on September 4, 2018. The event was organized by National Institute of Public Finance and Policy. &lt;/b&gt;
        &lt;p&gt;Sunil Abraham and Amber Sinha were discussant in the session Disclosures in Privacy Policies: Does Consent Work?&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/data-protection"&gt;Click to see the agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/conference-on-data-protection'&gt;https://cis-india.org/internet-governance/news/conference-on-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-20T14:47:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-wire-karan-saini-september-12-2018-what-security-breach-the-unchanging-tone-of-uidai-denials">
    <title>'What Security Breach?' The Unchanging Tone of UIDAI's Denials</title>
    <link>https://cis-india.org/internet-governance/news/the-wire-karan-saini-september-12-2018-what-security-breach-the-unchanging-tone-of-uidai-denials</link>
    <description>
        &lt;b&gt;This week brought with it another instance of Aadhaar déjà vu. The narrative is now eerily familiar to people with even a passing acquaintance with the matter.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Karan Saini was &lt;a class="external-link" href="https://thewire.in/tech/uidai-aadhaar-data-breach-right-to-privacy"&gt;published in the Wire&lt;/a&gt; on September 12, 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A security vulnerability in the Aadhaar ecosystem comes to light,  usually through civil society stakeholders or the media. The Unique  Identification Authority of India (UIDAI) issues a standard denial,  refuses to publicly acknowledge that it has to course-correct and fix  the problem, and the public waits for the process to repeat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following a &lt;a href="https://www.huffingtonpost.in/2018/09/11/uidai-s-aadhaar-software-hacked-id-database-compromised-experts-confirm_a_23522472/" target="_blank"&gt;three-month-long investigation&lt;/a&gt; by &lt;i&gt;Huffington Post&lt;/i&gt; into the known and documented problem of &lt;a href="http://www.atimes.com/article/indias-ambitious-digital-id-project-faces-new-security-nightmare/" target="_blank"&gt;cracked Aadhaar enrolment software&lt;/a&gt;,  several security experts from within the country and elsewhere were  able to conclude that the authenticity of entries within the Aadhaar  database was likely compromised to an unknown extent. This was a direct  result of a patched version of the enrolment software with stripped  security features being circulated and used by potential hostile  actors – among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The patched software bypasses several crucial security features of  the enrolment client and could have also been used to get around the  biometric authentication which legitimate enrolment operators would have  to undertake before attempting to add new entries to the database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI responded to this report with a statement which is nearly  identical to many of the authority’s previous press releases on alleged  security incidents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its statement, the UIDAI said that “the claims made in the report  about Aadhaar being vulnerable to tampering leading to ghost entries in  Aadhaar database by purportedly bypassing operators’ biometric  authentication to generate multiple Aadhaar cards is totally baseless”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statement which was issued by the authority seems straightforward  but is actually cryptic in its very nature. The story published by &lt;i&gt;Huffington Post&lt;/i&gt; did not categorically assert that the software bypass was being used  ‘to generate multiple Aadhaar cards’, while the authority’s statement  specifically refuted this claim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is, sadly, not new. The Aadhaar authority has always purposely  misinterpreted what is actually being alleged in critical stories, and  then presented their interpretations in their statements of rebuttal,  which essentially amount to irresponsible dissemination of misleading  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the UIDAI ignores that even without the issue of  cracked enrolment software, there are already many proven cases of ghost  entries in the database, including that of a &lt;a href="https://thewire.in/government/uidai-aadhaar-lord-hanuman-pakistani-spy" target="_blank"&gt;Pakistani ISI spy&lt;/a&gt; as well as an &lt;a href="https://www.huffingtonpost.in/2018/07/10/this-uzbek-national-was-arrested-last-year-with-an-aadhaar-card-believed-to-be-forged-its-still-valid-on-the-uidai-website_a_23478403/" target="_blank"&gt;Uzbek national involved in illegal sex-trade&lt;/a&gt; in the country. Both of these persons held real, valid Aadhaar cards which were issued to them under false identities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI also states that enrolments are verified at their backend  system in order to prevent any such false entries from finding their way  into the database. Given this, the question arises – how did these  highlighted cases of false entries make it through the supposed checks  and balances in place to the point where Aadhaar numbers for these  persons were issued (and delivered)?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar events took place when in March 2018, &lt;a href="https://www.zdnet.com/article/another-data-leak-hits-india-aadhaar-biometric-database/" target="_blank"&gt;&lt;i&gt;ZDNet&lt;/i&gt; broke the story&lt;/a&gt; of an application programming interface (API) hosted on the website of  utility provider Indane Gas, which could have been abused by hackers to  steal information such as full names, Aadhaar numbers, names of linked  banking institutions as well as details of the specific utility provider  which a person uses for a major chunk of the population.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI statement at the time baldly claimed that there was no  breach of its central database (what is called the ‘CIDR’) and that  biometric data were safe. The only problem? Neither of these issues were  asserted or even hinted at in the original story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="u-linkBlend Identity TweetAuthor-link" href="https://twitter.com/pranesh"&gt;&lt;span class="Identity-screenName TweetAuthor-screenName" dir="ltr" title="@pranesh"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_PraneshTweet.png" alt="Pranesh Tweet" class="image-inline" title="Pranesh Tweet" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reporters from the publication had attempted to reach out to UIDAI  repeatedly – and that too through several mediums of communication, such  as phone, email and even direct messages to the official UIDAI Twitter  account – all to no avail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We tried to contact UIDAI by phone and email after we learned of the  Aadhaar data leak. We eventually sent all the details in a Twitter DM  message — but only because UIDAI wouldn’t offer […] an email address to  send this data leak issue to,” &lt;a href="http://web.archive.org/web/20180912093629/https:/webcache.googleusercontent.com/search?q=cache:RYXlh3dFLHkJ:https://twitter.com/zackwhittaker/status/977364392986718208%3Flang%3Den" target="_blank"&gt;posted&lt;/a&gt; Zack Whittaker, the reporter who had broken the story for &lt;i&gt;ZDNet&lt;/i&gt;, as a tweet on his public Twitter account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was not the first time the authority had done such a thing (and neither was it the last, as we see with the &lt;i&gt;Huffington Post&lt;/i&gt; story), as witnessed in the January 2018 incident with the &lt;a href="https://www.tribuneindia.com/news/nation/rs-500-10-minutes-and-you-have-access-to-billion-aadhaar-details/523361.html" target="_blank"&gt;&lt;i&gt;Tribune&lt;/i&gt;&lt;/a&gt;;  where the UIDAI did not respond to the paper’s attempts at  communication at all before publication and later used it to state that  no security incident had taken place altogether.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reporters from the &lt;i&gt;Huffington Post&lt;/i&gt; had also attempted to  reach out to UIDAI prior to publication of the story; attempts at  communication which the UIDAI willingly left unanswered. After UIDAI’s  rebuttal, the &lt;i&gt;Huffington Post&lt;/i&gt; published a statement of their  own in which they asserted that they stood by the claims made in their  story, while also making it known that the UIDAI &lt;a href="https://www.huffingtonpost.in/2018/09/11/uidai-fails-to-address-security-concerns-after-software-hack-expose_a_23523873/" target="_blank"&gt;had never responded directly&lt;/a&gt; to any of their communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI’s most recent statement deploys a bizarre array of security  jargon including buzzwords such as “full encryption”, “access control”  and “tamper resistance” – without providing any elaboration on what any  of these things would help prevent with regard to the issues raised in  the media report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This obfuscation is very troubling, and particularly so for those  people who do not actively follow news regarding the troubles of the  programme or other media organisations that are not equipped to  understand the nuances of security reporting. For both groups of people,  the statements issued by the UIDAI would be enough of an assertion to  lead them to believe that all is well with the project and that anyone  saying otherwise is an “unscrupulous element” with “vested interests”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After the first few incidents, the authority’s cookie-cutter response  seems to be part of the playbook through which they seek to protect  their image: by retaining the ability to publicly deny an incident, even  if it has already taken place; which is done by never confirming (or  even acknowledging) an issue before publication. This is presumably done  out of fear of the reputational damage which would inevitably be caused  by admittance of a compromise or fault on their part.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consider what happened with the &lt;i&gt;Tribune&lt;/i&gt; breach report. The  UIDAI officially denied it (even though some of their lower-level  officials were quoted in the story), filed an FIR against the  journalist. When the dust settled down,&lt;a href="https://economictimes.indiatimes.com/news/politics-and-nation/uidai-firewalls-5000-officials-post-breach/articleshow/62423133.cms" target="_blank"&gt; a prominent business newspaper&lt;/a&gt; ran a story which strangely enough quoted anonymous officials who highlighted the steps that were taken to fix the problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI understands that ‘the first step in solving a problem is to  recognise that it does exist’. Acknowledging problems within the  Aadhaar project would be catastrophically damaging for the authority as  well as the public’s perception of them. This is why we are always  presented with almost indistinguishable statements of rebuttal and  denial from the UIDAI, which too are never backed with any evidence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Seeing as how the UIDAI’s statements almost always end up backfiring,  their decision to employ a social media agency to monitor the internet  for chatter on Aadhaar starts to make a little sense. For a while now,  the authority has wished to undertake mass digital surveillance through  social media and other online forums in order to track “top detractors”  of the Aadhaar scheme and counter them to effectively “neutralise  negative sentiments” surrounding the project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This move, however, was challenged by petitioner Mahua Moitra who saw  it as “an attempt by the State to overreach the jurisdiction of the  Hon’ble Supreme Court in matters where the legality of social media  surveillance and Aadhaar itself is under challenge”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For now, the next time we are hit with a sense of déjà vu when it  comes to an Aadhaar-related security incident, we should see through the  UIDAI’s statements for what they truly are: hopeless attempts at damage  control for a system that is crumbling at its very foundation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-wire-karan-saini-september-12-2018-what-security-breach-the-unchanging-tone-of-uidai-denials'&gt;https://cis-india.org/internet-governance/news/the-wire-karan-saini-september-12-2018-what-security-breach-the-unchanging-tone-of-uidai-denials&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-19T14:14:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/meeting-of-information-systems-security-and-biometrics-sectional-committee">
    <title>Meeting of Information Systems Security and Biometrics Sectional Committee</title>
    <link>https://cis-india.org/internet-governance/news/meeting-of-information-systems-security-and-biometrics-sectional-committee</link>
    <description>
        &lt;b&gt;Gurshabad Grover attended the 14th meeting of the Information Systems Security and Biometrics Sectional Committee (LITD 17) of the Bureau of Indian Standards (BIS), which was held at the BIS office in New Delhi on 14 September 2018.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was Gurshabad's first LITD 17 meeting. The committee noted my co-option in the committee and registration in Working Group 1 (Information security management systems) and WG5 (Identity management and privacy technologies) of ISO JTC 1 / SC 27 / “IT Security Techniques”. Some of the items discussed included proposed standards for biometric information protection, mobile phone security, and data privacy engineering &amp;amp; management practices.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/meeting-of-information-systems-security-and-biometrics-sectional-committee'&gt;https://cis-india.org/internet-governance/news/meeting-of-information-systems-security-and-biometrics-sectional-committee&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-19T14:08:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-september-7-2018-aroon-deep-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery">
    <title>'Why should we talk to Dunzo?' State regulators fume at liquor delivery</title>
    <link>https://cis-india.org/internet-governance/news/medianama-september-7-2018-aroon-deep-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery</link>
    <description>
        &lt;b&gt;In 2016, the Chandigarh police ordered thirty bottles of liquor on getTalli, an online liquor ordering platform. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Aroon Deep was published in &lt;a class="external-link" href="https://www.medianama.com/2018/09/223-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery/"&gt;Medianama&lt;/a&gt; on September 7, 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“We do not sell liquor. On your request, we procure liquor from a  government authorized vendor on your behalf and deliver it to you,”  getTalli explained on its website, according to a &lt;a href="https://www.hindustantimes.com/punjab/how-to-sell-liquor-online-and-get-arrested-get-talli-lesson-chandigarh/story-LYRz9tEfbSnmw2VIj2D0VJ.html"&gt;Hindustan Times report&lt;/a&gt;.  The police weren’t exactly interested in consuming that liquor. The  order was a trap. They arrested both Pratham Gupta and Anurag Awasthi,  who founded the site. The two were charged with criminal conspiracy,  fraud, and a state law prohibiting “unlawful import, export, transport,  manufacture, possession, etc”. The site was shut down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Excise is a state subject, so each state has varying levels of  strictness in regulating services like Dunzo, which allow users to buy  alcohol (among several other things) through them. Karnataka is among  the stricter jurisdictions. Dunzo stopped delivering alcohol in the  state when regulators made noise about online alcohol delivery not being  a recognized mode of sale. “Why should we talk to [Dunzo]?” Rajendra  Prasad, an excise official in Bangalore told MediaNama. Dunzo doesn’t  seem to have government relations managers, so the company has chosen  simply to shut down alcohol delivery rather than engage with regulators.  Alcohol deliveries previously accounted for around one in thirty orders  for Dunzo in Bangalore, an employee &lt;a href="https://www.thenewsminute.com/article/not-just-dunzo-all-alcohol-delivery-services-may-stop-bengaluru-87712"&gt;told The News Minute&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Alcohol delivery and the law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the face of it, alcohol delivery — at least the kind used by Dunzo  — doesn’t seem to be cause for regulatory concern. Third party delivery  services can’t have their own inventory, so they must simply buy liquor  from authorized retailers and deliver them to customers. This doesn’t  seem to have any downsides, since the delivery is separately charged and  taxed; and the tax on the alcohol is also paid. But regulators have  continued to cry foul.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aayush Rathi, a policy officer at the Centre for Internet and  Society, pointed out that the Karnataka Excise Act — and possibly other  states’ excise regimes — gives states a lot of control on regulating the  movement of alcohol. “A ‘sale’ in the Karnataka Excise Act is defined  as ‘any transfer otherwise than by way of gift’,” Rathi told MediaNama.  This definition essentially makes online ordering and delivery of liquor  illegal — even if the service doing it doesn’t maintain inventory.  Since there is no license for online delivery of alcohol, there is  little by way of legal standing services like Dunzo have when faced with  regulatory scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But that is assuming that the regulatory scrutiny comes in the first  place. While Punjab and Karnataka have chosen to use the vast regulatory  powers the law grants them, other states haven’t done the same. In  Gurgaon and Pune, though, alcohol deliveries continue unabated. HipBar,  which delivers alcohol across India, told The News Minute, “HipBar is  engaging with multiple states and their respective regulators to move  the needle on last mile deliveries of alcoholic beverages with  reasonable restrictions and safeguards in place, such that the letter  and spirit of the excise policy is not vitiated.” That brings the  question of whether the current model of last-mile delivery by services  like Dunzo and HipBar violate the spirit of excise law in the first  place.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-september-7-2018-aroon-deep-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery'&gt;https://cis-india.org/internet-governance/news/medianama-september-7-2018-aroon-deep-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-19T14:04:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze">
    <title>Gender and Privacy: Countering the Patriarchal Gaze</title>
    <link>https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze</link>
    <description>
        &lt;b&gt;Ambika Tandon participated in a workshop on privacy and gender which was organized by Privacy International in United Kingdom on September 13 and 14, 2018. Ambika was part of a panel on reproductive rights and privacy in India. She also recorded a podcast on the same topic, as part of a series on privacy and gender being hosted by Privacy International.&lt;/b&gt;
        &lt;p&gt;Read the Agenda &lt;a class="external-link" href="https://cis-india.org/internet-governance/files/gender-and-privacy-workshop"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze'&gt;https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-19T01:48:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations">
    <title>Haryana Cops Say Internet Shutdowns Hurt Police Operations</title>
    <link>https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations</link>
    <description>
        &lt;b&gt;India sees a very high number of Internet shutdowns, often to preserve law and order, but Haryana cops are arguing against the practice.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gopal Sathe was published by Huffington Post on September 19, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Ahead of a Haryana court verdict in a rape case against  Dera Sacha Sauda (DSS) head Gurmeet Ram Rahim Singh, mobile Internet  services were shut down in nearby areas such as Panchkula and Mohali.  The &lt;a href="https://www.hindustantimes.com/punjab/ram-rahim-rape-verdict-ban-on-internet-brings-chandigarh-panchkula-to-a-standstill/story-PrcbUfait5yqzmF7QJiHBJ.html" target="_blank"&gt;&lt;i&gt;Hindustan Times&lt;/i&gt;&lt;/a&gt; reported that SMSes, mobile Internet and all services apart from voice calls were suspended to keep the peace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  as a result of the shutdown, police in Panchkula faced a challenge in  estimating the size of crowds gathered at different locations. "We were  until then sharing information and photos on WhatsApp to figure out the  number of people pouring in the city from various points as it helped  identify problem areas. DSS followers had started gathering August 22  onwards," Panchkula police commissioner Arshinder Singh Chawla has said,  according to a &lt;a href="https://cis-india.org/internet-shutdown-stories/view" target="_blank"&gt;report&lt;/a&gt; by Manoj Kumar first published by the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This  was a replay of events during the Jat agitation of 2016 as  well—protestors were present in much greater numbers than police  personnel, who were not aware of the scenario on the ground. The police  also worried about sending messages asking for help over the radio, as  this could have been tapped into by the protestors, according to the  report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of mobile Internet during the DSS-related  Internet shutdown also affected the use of technology such as drone  cameras, Chawla said. And because the police could not communicate with  security personnel at the court complex, the police inside had to scale  walls to leave safely, as they could not ask their colleagues for  backup.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report points out that this is in stark contrast to  what happened in Mumbai, where former police commissioner Rakesh Maria  made use of WhatsApp and SMS messages to prevent a scuffle from turning  into &lt;a href="http://www.ndtv.com/mumbai-news/putting-lid-on-rumours-helped-control-situation-in-lalbaug-rakesh-maria-723212"&gt;a riot&lt;/a&gt; during Eid celebrations in early 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A study by the Software Freedom Law Centre stated that India has already over 100 Internet shutdowns in 2018, &lt;a href="https://www.medianama.com/2018/09/223-india-100-internet-shutdowns/" target="_blank"&gt;&lt;i&gt;Medianama&lt;/i&gt;&lt;/a&gt; reported. The five states with the most shutdowns are Jammu and  Kashmir, Rajasthan, Uttar Pradesh, Maharashtra and Bihar. This has been  criticised by many, &lt;a href="https://www.accessnow.org/united-nations-event-explore-ways-stop-internet-shutdowns/"&gt;including the UN&lt;/a&gt;,  and as the Haryana police's experience show, the shutdowns are not just  harming citizens, but are counter-productive to maintaining order as  well.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations'&gt;https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-18T15:57:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
