<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 461 to 475.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/sflc-round-table-discussion-on-personal-data-protection-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/conference-on-data-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-wire-karan-saini-september-12-2018-what-security-breach-the-unchanging-tone-of-uidai-denials"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/meeting-of-information-systems-security-and-biometrics-sectional-committee"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-september-7-2018-aroon-deep-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/symposium-on-data-privacy-and-citizens-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/august-2018-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-rana-september-9-2018-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/artificial-intelligence-in-the-governance-sector-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindu-businessline-swaraj-paul-barooah-september-7-2018-indias-post-truth-society"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/sflc-round-table-discussion-on-personal-data-protection-bill">
    <title>SFLC Round Table Discussion on Personal Data Protection Bill </title>
    <link>https://cis-india.org/internet-governance/news/sflc-round-table-discussion-on-personal-data-protection-bill</link>
    <description>
        &lt;b&gt;Shweta Mohandas participated in a Round Table Discussion on Personal Data Protection Bill, orgnanised by SFLC on September 25, 2018 in Bangalore. She also moderated the first session - Data Protection Principles (Rights and Obligations).&lt;/b&gt;
        &lt;p&gt;See the agenda of the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/agenda-for-round-table-for-data-protection"&gt;event here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/sflc-round-table-discussion-on-personal-data-protection-bill'&gt;https://cis-india.org/internet-governance/news/sflc-round-table-discussion-on-personal-data-protection-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-02T03:16:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news">
    <title>A trust deficit between advertisers and publishers is leading to fake news</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news</link>
    <description>
        &lt;b&gt;Transparency regulations is need of the hour. And urgently for election and political advertising. What do the ads look like? Who paid for them? Who was the target? How many people saw these advertisements? How many times? Transparency around viral content is also required.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.hindustantimes.com/analysis/a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news/story-SVNH9ot3KD50XRltbwOyEO.html"&gt;Hindustan Times&lt;/a&gt; on September 24, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Traditionally, we have depended on the private censorship that  intermediaries conduct on their platforms. They enforce, with some  degree of success, their own community guidelines and terms of services  (TOS). Traditionally, these guidelines and TOS have been drafted keeping  in mind US laws since historically most intermediaries, including  non-profits like Wikimedia Foundation were founded in the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Across  the world, this private censorship regime was accepted by governments  when they enacted intermediary liability laws (in India we have Section  79A of the IT Act). These laws gave intermediaries immunity from  liability emerging from third party content about which they have no  “actual knowledge” unless they were informed using takedown notices.  Intermediaries set up offices in countries like India, complied with  some lawful interception requests, and also conducted geo-blocking to  comply with local speech regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For years, the Indian  government has been frustrated since policy reforms that it has pursued  with the US have yielded little fruit. American policy makers keep  citing shortcomings in the Indian justice systems to avoid expediting  the MLAT (Mutual Legal Assistance Treaties) process and the signing of  an executive agreement under the US Clout Act. This agreement would  compel intermediaries to comply with lawful interception and data  requests from Indian law enforcement agencies no matter where the data  was located.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data localisation requirement in the draft  national data protection law is a result of that frustration. As with  the US, a quickly enacted data localisation policy is absolutely  non-negotiable when it comes to Indian military, intelligence, law  enforcement and e-governance data. For India, it also makes sense in the  cases of health and financial data with exceptions under certain   circumstances. However, it does not make sense for social media  platforms since they, by definition, host international networks of  people. Recently an inter ministerial committee recommended that  “criminal proceedings against Indian heads of social media giants” also  be considered. However, raiding Google’s local servers when a lawful  interception request is turned down or arresting Facebook executives  will result in retaliatory trade actions from the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the consequences of online recruitment, disinformation in  elections and fake news to undermine public order are indeed serious,  are there alternatives to such extreme measures for Indian policy  makers? Updating intermediary liability law is one place to begin. These  social media companies increasingly exercise editorial control, albeit  indirectly, via algorithms to claim that they have no “actual  knowledge”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But they are no longer mere conduits or dumb pipes as  they are now publishers who collect payments to promote content.  Germany passed a law called NetzDG in 2017 which requires expedited  compliance with government takedown orders. Unfortunately, this law does  not have sufficient safeguards to prevent overzealous private  censorship. India should not repeat this mistake, especially given what  the Supreme Court said in the Shreya Singhal judgment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Transparency  regulations are imperative. And they are needed urgently for election  and political advertising. What do the ads look like? Who paid for them?  Who was the target? How many people saw these advertisements? How many  times? Transparency around viral content is also required. Anyone should  be able to see all public content that has been shared with more than a  certain percentage of the population over a historical timeline for any  geographic area. This will prevent algorithmic filter bubbles and echo  chambers, and also help public and civil society monitor  unconstitutional and hate speech that violates terms of service of these  platforms. So far the intermediaries have benefitted from surveillance —  watching from above. It is time to subject them to sousveillance —  watched by the citizens from below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data portability mandates and  interoperability mandates will allow competition to enter these monopoly  markets. Artificial intelligence regulations for algorithms that  significantly impact the global networked public sphere could require –  one, a right to an explanation and two, a right to influence automated  decision making that influences the consumers experience on the  platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The real solution lies elsewhere. Google and Facebook  are primarily advertising networks. They have successfully managed to  destroy the business model for real news and replace it with a business  model for fake news by taking away most of the advertising revenues from  traditional and new news media companies. They were able to do this  because there was a trust deficit between advertisers and publishers.  Perhaps this trust deficit could be solved by a commons-based solutions  based on free software, open standards and collective action by all  Indian new media companies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-10-02T06:44:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp">
    <title>Find ways to trace origin of messages: Government to WhatsApp</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp</link>
    <description>
        &lt;b&gt;Unhappy with the steps taken so far by WhatsApp, the government plans to trace the origins of incendiary messages spread on its platform.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/find-ways-to-trace-origin-of-messages-government-to-whatsapp/articleshow/65880372.cms"&gt;Economic Times&lt;/a&gt; on September 20, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Electronics and IT (MeitY) is drafting a letter — its third since July to the Facebook-owned platform — asking it to design a technology-led solution to the issue that in the past has led to mob lynching or riots in the country. Since India first raising its concerns, WhatsApp has announced measures such as limiting forwards to five groups at a time from the earlier 250, identifying forwarded messages, and a publicity campaign against fake news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government says these measures may not be enough. “It’s a reasonable demand from us, and very much doable. The third letter will reiterate that WhatsApp is not meeting all our concerns,” said a top government official, who did not want to be identified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If WhatsApp feels the solution given by the government for traceability goes against its end-to-end encryption policy, then the company should be able to find a solution on its own which is technically feasible without compromising on its offering, the official said. “We are not asking them to look into the contents of the message, but if some message has been forwarded, say, 100 times and has caused some law and order problem, then they should be able to identify where it originated from,” he said, adding that WhatsApp cannot absolve itself from responsibility in the name of user privacy. “We are not being unfair since we can’t allow anonymous publishing.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp could not be immediately reached for comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some analysts say the government’s demand from WhatsApp is reasonable and the company could provide traceability using metadata without compromising on encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“For basic level of traceability, storing the metadata is enough,” said Sunil Abraham, executive director of Center of Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“For the kind of traceability that the Indian government is asking for, WhatsApp may have to break its end-toend encryption. But other kind of traceablity, such as who is messaging whom, how many times, who are the propagators of messages, and who are receivers, can all be seen through storing just metadata.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just like every organisation used to store copies of end-of-end encrypted emails on their own servers, similarly WhatsApp can either store copies of encrypted messages or the metadata, he said. Last month, at a meeting between Union minister for electronics and IT Ravi Shankar Prasad and WhatsApp CEO Chris Daniels, the government asked the company to appoint a grievance officer in India, set up an Indian entity, and ensure traceability of messages.&lt;br /&gt;While the company agreed to register a corporate entity and build a team here, a stalemate over the issue of traceability continues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“(WhatsApp) needs to find solutions to deal with sinister developments like mob lynching and revenge porn and has to follow Indian law,” Prasad said in August. “It does not take rocket science to locate a message being circulated in hundreds and thousands...&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(WhatsApp) must have a mechanism to find a solution.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp has maintained that people rely on the platform for all kinds of sensitive conversations, including with their doctors, banks and families. “Building traceability would undermine end-to-end encryption and the private nature of WhatsApp, creating the potential for serious misuse. WhatsApp will not weaken the privacy protections we provide,” the company’s spokesperson said in August after the demand from the Indian government on traceability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The official quoted earlier reiterated that the government is notasking the company to break its end-to-end encryption, adding that if the company could find ways to tag non-original content with ‘forward’ labels and flag some links as spurious, it could also find a way around this problem.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp'&gt;https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-24T02:53:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world">
    <title>Forecasting the Implications of the CLOUD Act Around the World</title>
    <link>https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world</link>
    <description>
        &lt;b&gt;Elonnai Hickok participated in the event organized by the Global Network Initiative at the Russell Senate Office Building, Washington D.C. on September 18, 2018 as a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Elonnai spoke on the CLOUD Act from an Indian perspective based on the article that she &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india"&gt;co-authored&lt;/a&gt; with Vipul Kharbanda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world'&gt;https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-20T15:51:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/conference-on-data-protection">
    <title>Conference on Data Protection</title>
    <link>https://cis-india.org/internet-governance/news/conference-on-data-protection</link>
    <description>
        &lt;b&gt;Sunil Abraham  and Amber Sinha participated in a conference on data protection at NIPFP in New Delhi on September 4, 2018. The event was organized by National Institute of Public Finance and Policy. &lt;/b&gt;
        &lt;p&gt;Sunil Abraham and Amber Sinha were discussant in the session Disclosures in Privacy Policies: Does Consent Work?&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/data-protection"&gt;Click to see the agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/conference-on-data-protection'&gt;https://cis-india.org/internet-governance/news/conference-on-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-20T14:47:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-wire-karan-saini-september-12-2018-what-security-breach-the-unchanging-tone-of-uidai-denials">
    <title>'What Security Breach?' The Unchanging Tone of UIDAI's Denials</title>
    <link>https://cis-india.org/internet-governance/news/the-wire-karan-saini-september-12-2018-what-security-breach-the-unchanging-tone-of-uidai-denials</link>
    <description>
        &lt;b&gt;This week brought with it another instance of Aadhaar déjà vu. The narrative is now eerily familiar to people with even a passing acquaintance with the matter.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Karan Saini was &lt;a class="external-link" href="https://thewire.in/tech/uidai-aadhaar-data-breach-right-to-privacy"&gt;published in the Wire&lt;/a&gt; on September 12, 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A security vulnerability in the Aadhaar ecosystem comes to light,  usually through civil society stakeholders or the media. The Unique  Identification Authority of India (UIDAI) issues a standard denial,  refuses to publicly acknowledge that it has to course-correct and fix  the problem, and the public waits for the process to repeat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following a &lt;a href="https://www.huffingtonpost.in/2018/09/11/uidai-s-aadhaar-software-hacked-id-database-compromised-experts-confirm_a_23522472/" target="_blank"&gt;three-month-long investigation&lt;/a&gt; by &lt;i&gt;Huffington Post&lt;/i&gt; into the known and documented problem of &lt;a href="http://www.atimes.com/article/indias-ambitious-digital-id-project-faces-new-security-nightmare/" target="_blank"&gt;cracked Aadhaar enrolment software&lt;/a&gt;,  several security experts from within the country and elsewhere were  able to conclude that the authenticity of entries within the Aadhaar  database was likely compromised to an unknown extent. This was a direct  result of a patched version of the enrolment software with stripped  security features being circulated and used by potential hostile  actors – among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The patched software bypasses several crucial security features of  the enrolment client and could have also been used to get around the  biometric authentication which legitimate enrolment operators would have  to undertake before attempting to add new entries to the database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI responded to this report with a statement which is nearly  identical to many of the authority’s previous press releases on alleged  security incidents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its statement, the UIDAI said that “the claims made in the report  about Aadhaar being vulnerable to tampering leading to ghost entries in  Aadhaar database by purportedly bypassing operators’ biometric  authentication to generate multiple Aadhaar cards is totally baseless”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statement which was issued by the authority seems straightforward  but is actually cryptic in its very nature. The story published by &lt;i&gt;Huffington Post&lt;/i&gt; did not categorically assert that the software bypass was being used  ‘to generate multiple Aadhaar cards’, while the authority’s statement  specifically refuted this claim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is, sadly, not new. The Aadhaar authority has always purposely  misinterpreted what is actually being alleged in critical stories, and  then presented their interpretations in their statements of rebuttal,  which essentially amount to irresponsible dissemination of misleading  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the UIDAI ignores that even without the issue of  cracked enrolment software, there are already many proven cases of ghost  entries in the database, including that of a &lt;a href="https://thewire.in/government/uidai-aadhaar-lord-hanuman-pakistani-spy" target="_blank"&gt;Pakistani ISI spy&lt;/a&gt; as well as an &lt;a href="https://www.huffingtonpost.in/2018/07/10/this-uzbek-national-was-arrested-last-year-with-an-aadhaar-card-believed-to-be-forged-its-still-valid-on-the-uidai-website_a_23478403/" target="_blank"&gt;Uzbek national involved in illegal sex-trade&lt;/a&gt; in the country. Both of these persons held real, valid Aadhaar cards which were issued to them under false identities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI also states that enrolments are verified at their backend  system in order to prevent any such false entries from finding their way  into the database. Given this, the question arises – how did these  highlighted cases of false entries make it through the supposed checks  and balances in place to the point where Aadhaar numbers for these  persons were issued (and delivered)?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar events took place when in March 2018, &lt;a href="https://www.zdnet.com/article/another-data-leak-hits-india-aadhaar-biometric-database/" target="_blank"&gt;&lt;i&gt;ZDNet&lt;/i&gt; broke the story&lt;/a&gt; of an application programming interface (API) hosted on the website of  utility provider Indane Gas, which could have been abused by hackers to  steal information such as full names, Aadhaar numbers, names of linked  banking institutions as well as details of the specific utility provider  which a person uses for a major chunk of the population.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI statement at the time baldly claimed that there was no  breach of its central database (what is called the ‘CIDR’) and that  biometric data were safe. The only problem? Neither of these issues were  asserted or even hinted at in the original story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="u-linkBlend Identity TweetAuthor-link" href="https://twitter.com/pranesh"&gt;&lt;span class="Identity-screenName TweetAuthor-screenName" dir="ltr" title="@pranesh"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_PraneshTweet.png" alt="Pranesh Tweet" class="image-inline" title="Pranesh Tweet" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reporters from the publication had attempted to reach out to UIDAI  repeatedly – and that too through several mediums of communication, such  as phone, email and even direct messages to the official UIDAI Twitter  account – all to no avail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We tried to contact UIDAI by phone and email after we learned of the  Aadhaar data leak. We eventually sent all the details in a Twitter DM  message — but only because UIDAI wouldn’t offer […] an email address to  send this data leak issue to,” &lt;a href="http://web.archive.org/web/20180912093629/https:/webcache.googleusercontent.com/search?q=cache:RYXlh3dFLHkJ:https://twitter.com/zackwhittaker/status/977364392986718208%3Flang%3Den" target="_blank"&gt;posted&lt;/a&gt; Zack Whittaker, the reporter who had broken the story for &lt;i&gt;ZDNet&lt;/i&gt;, as a tweet on his public Twitter account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was not the first time the authority had done such a thing (and neither was it the last, as we see with the &lt;i&gt;Huffington Post&lt;/i&gt; story), as witnessed in the January 2018 incident with the &lt;a href="https://www.tribuneindia.com/news/nation/rs-500-10-minutes-and-you-have-access-to-billion-aadhaar-details/523361.html" target="_blank"&gt;&lt;i&gt;Tribune&lt;/i&gt;&lt;/a&gt;;  where the UIDAI did not respond to the paper’s attempts at  communication at all before publication and later used it to state that  no security incident had taken place altogether.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reporters from the &lt;i&gt;Huffington Post&lt;/i&gt; had also attempted to  reach out to UIDAI prior to publication of the story; attempts at  communication which the UIDAI willingly left unanswered. After UIDAI’s  rebuttal, the &lt;i&gt;Huffington Post&lt;/i&gt; published a statement of their  own in which they asserted that they stood by the claims made in their  story, while also making it known that the UIDAI &lt;a href="https://www.huffingtonpost.in/2018/09/11/uidai-fails-to-address-security-concerns-after-software-hack-expose_a_23523873/" target="_blank"&gt;had never responded directly&lt;/a&gt; to any of their communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI’s most recent statement deploys a bizarre array of security  jargon including buzzwords such as “full encryption”, “access control”  and “tamper resistance” – without providing any elaboration on what any  of these things would help prevent with regard to the issues raised in  the media report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This obfuscation is very troubling, and particularly so for those  people who do not actively follow news regarding the troubles of the  programme or other media organisations that are not equipped to  understand the nuances of security reporting. For both groups of people,  the statements issued by the UIDAI would be enough of an assertion to  lead them to believe that all is well with the project and that anyone  saying otherwise is an “unscrupulous element” with “vested interests”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After the first few incidents, the authority’s cookie-cutter response  seems to be part of the playbook through which they seek to protect  their image: by retaining the ability to publicly deny an incident, even  if it has already taken place; which is done by never confirming (or  even acknowledging) an issue before publication. This is presumably done  out of fear of the reputational damage which would inevitably be caused  by admittance of a compromise or fault on their part.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consider what happened with the &lt;i&gt;Tribune&lt;/i&gt; breach report. The  UIDAI officially denied it (even though some of their lower-level  officials were quoted in the story), filed an FIR against the  journalist. When the dust settled down,&lt;a href="https://economictimes.indiatimes.com/news/politics-and-nation/uidai-firewalls-5000-officials-post-breach/articleshow/62423133.cms" target="_blank"&gt; a prominent business newspaper&lt;/a&gt; ran a story which strangely enough quoted anonymous officials who highlighted the steps that were taken to fix the problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI understands that ‘the first step in solving a problem is to  recognise that it does exist’. Acknowledging problems within the  Aadhaar project would be catastrophically damaging for the authority as  well as the public’s perception of them. This is why we are always  presented with almost indistinguishable statements of rebuttal and  denial from the UIDAI, which too are never backed with any evidence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Seeing as how the UIDAI’s statements almost always end up backfiring,  their decision to employ a social media agency to monitor the internet  for chatter on Aadhaar starts to make a little sense. For a while now,  the authority has wished to undertake mass digital surveillance through  social media and other online forums in order to track “top detractors”  of the Aadhaar scheme and counter them to effectively “neutralise  negative sentiments” surrounding the project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This move, however, was challenged by petitioner Mahua Moitra who saw  it as “an attempt by the State to overreach the jurisdiction of the  Hon’ble Supreme Court in matters where the legality of social media  surveillance and Aadhaar itself is under challenge”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For now, the next time we are hit with a sense of déjà vu when it  comes to an Aadhaar-related security incident, we should see through the  UIDAI’s statements for what they truly are: hopeless attempts at damage  control for a system that is crumbling at its very foundation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-wire-karan-saini-september-12-2018-what-security-breach-the-unchanging-tone-of-uidai-denials'&gt;https://cis-india.org/internet-governance/news/the-wire-karan-saini-september-12-2018-what-security-breach-the-unchanging-tone-of-uidai-denials&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-19T14:14:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/meeting-of-information-systems-security-and-biometrics-sectional-committee">
    <title>Meeting of Information Systems Security and Biometrics Sectional Committee</title>
    <link>https://cis-india.org/internet-governance/news/meeting-of-information-systems-security-and-biometrics-sectional-committee</link>
    <description>
        &lt;b&gt;Gurshabad Grover attended the 14th meeting of the Information Systems Security and Biometrics Sectional Committee (LITD 17) of the Bureau of Indian Standards (BIS), which was held at the BIS office in New Delhi on 14 September 2018.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was Gurshabad's first LITD 17 meeting. The committee noted my co-option in the committee and registration in Working Group 1 (Information security management systems) and WG5 (Identity management and privacy technologies) of ISO JTC 1 / SC 27 / “IT Security Techniques”. Some of the items discussed included proposed standards for biometric information protection, mobile phone security, and data privacy engineering &amp;amp; management practices.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/meeting-of-information-systems-security-and-biometrics-sectional-committee'&gt;https://cis-india.org/internet-governance/news/meeting-of-information-systems-security-and-biometrics-sectional-committee&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-19T14:08:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-september-7-2018-aroon-deep-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery">
    <title>'Why should we talk to Dunzo?' State regulators fume at liquor delivery</title>
    <link>https://cis-india.org/internet-governance/news/medianama-september-7-2018-aroon-deep-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery</link>
    <description>
        &lt;b&gt;In 2016, the Chandigarh police ordered thirty bottles of liquor on getTalli, an online liquor ordering platform. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Aroon Deep was published in &lt;a class="external-link" href="https://www.medianama.com/2018/09/223-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery/"&gt;Medianama&lt;/a&gt; on September 7, 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“We do not sell liquor. On your request, we procure liquor from a  government authorized vendor on your behalf and deliver it to you,”  getTalli explained on its website, according to a &lt;a href="https://www.hindustantimes.com/punjab/how-to-sell-liquor-online-and-get-arrested-get-talli-lesson-chandigarh/story-LYRz9tEfbSnmw2VIj2D0VJ.html"&gt;Hindustan Times report&lt;/a&gt;.  The police weren’t exactly interested in consuming that liquor. The  order was a trap. They arrested both Pratham Gupta and Anurag Awasthi,  who founded the site. The two were charged with criminal conspiracy,  fraud, and a state law prohibiting “unlawful import, export, transport,  manufacture, possession, etc”. The site was shut down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Excise is a state subject, so each state has varying levels of  strictness in regulating services like Dunzo, which allow users to buy  alcohol (among several other things) through them. Karnataka is among  the stricter jurisdictions. Dunzo stopped delivering alcohol in the  state when regulators made noise about online alcohol delivery not being  a recognized mode of sale. “Why should we talk to [Dunzo]?” Rajendra  Prasad, an excise official in Bangalore told MediaNama. Dunzo doesn’t  seem to have government relations managers, so the company has chosen  simply to shut down alcohol delivery rather than engage with regulators.  Alcohol deliveries previously accounted for around one in thirty orders  for Dunzo in Bangalore, an employee &lt;a href="https://www.thenewsminute.com/article/not-just-dunzo-all-alcohol-delivery-services-may-stop-bengaluru-87712"&gt;told The News Minute&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Alcohol delivery and the law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the face of it, alcohol delivery — at least the kind used by Dunzo  — doesn’t seem to be cause for regulatory concern. Third party delivery  services can’t have their own inventory, so they must simply buy liquor  from authorized retailers and deliver them to customers. This doesn’t  seem to have any downsides, since the delivery is separately charged and  taxed; and the tax on the alcohol is also paid. But regulators have  continued to cry foul.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aayush Rathi, a policy officer at the Centre for Internet and  Society, pointed out that the Karnataka Excise Act — and possibly other  states’ excise regimes — gives states a lot of control on regulating the  movement of alcohol. “A ‘sale’ in the Karnataka Excise Act is defined  as ‘any transfer otherwise than by way of gift’,” Rathi told MediaNama.  This definition essentially makes online ordering and delivery of liquor  illegal — even if the service doing it doesn’t maintain inventory.  Since there is no license for online delivery of alcohol, there is  little by way of legal standing services like Dunzo have when faced with  regulatory scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But that is assuming that the regulatory scrutiny comes in the first  place. While Punjab and Karnataka have chosen to use the vast regulatory  powers the law grants them, other states haven’t done the same. In  Gurgaon and Pune, though, alcohol deliveries continue unabated. HipBar,  which delivers alcohol across India, told The News Minute, “HipBar is  engaging with multiple states and their respective regulators to move  the needle on last mile deliveries of alcoholic beverages with  reasonable restrictions and safeguards in place, such that the letter  and spirit of the excise policy is not vitiated.” That brings the  question of whether the current model of last-mile delivery by services  like Dunzo and HipBar violate the spirit of excise law in the first  place.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-september-7-2018-aroon-deep-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery'&gt;https://cis-india.org/internet-governance/news/medianama-september-7-2018-aroon-deep-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-19T14:04:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze">
    <title>Gender and Privacy: Countering the Patriarchal Gaze</title>
    <link>https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze</link>
    <description>
        &lt;b&gt;Ambika Tandon participated in a workshop on privacy and gender which was organized by Privacy International in United Kingdom on September 13 and 14, 2018. Ambika was part of a panel on reproductive rights and privacy in India. She also recorded a podcast on the same topic, as part of a series on privacy and gender being hosted by Privacy International.&lt;/b&gt;
        &lt;p&gt;Read the Agenda &lt;a class="external-link" href="https://cis-india.org/internet-governance/files/gender-and-privacy-workshop"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze'&gt;https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-19T01:48:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations">
    <title>Haryana Cops Say Internet Shutdowns Hurt Police Operations</title>
    <link>https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations</link>
    <description>
        &lt;b&gt;India sees a very high number of Internet shutdowns, often to preserve law and order, but Haryana cops are arguing against the practice.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gopal Sathe was published by Huffington Post on September 19, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Ahead of a Haryana court verdict in a rape case against  Dera Sacha Sauda (DSS) head Gurmeet Ram Rahim Singh, mobile Internet  services were shut down in nearby areas such as Panchkula and Mohali.  The &lt;a href="https://www.hindustantimes.com/punjab/ram-rahim-rape-verdict-ban-on-internet-brings-chandigarh-panchkula-to-a-standstill/story-PrcbUfait5yqzmF7QJiHBJ.html" target="_blank"&gt;&lt;i&gt;Hindustan Times&lt;/i&gt;&lt;/a&gt; reported that SMSes, mobile Internet and all services apart from voice calls were suspended to keep the peace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  as a result of the shutdown, police in Panchkula faced a challenge in  estimating the size of crowds gathered at different locations. "We were  until then sharing information and photos on WhatsApp to figure out the  number of people pouring in the city from various points as it helped  identify problem areas. DSS followers had started gathering August 22  onwards," Panchkula police commissioner Arshinder Singh Chawla has said,  according to a &lt;a href="https://cis-india.org/internet-shutdown-stories/view" target="_blank"&gt;report&lt;/a&gt; by Manoj Kumar first published by the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This  was a replay of events during the Jat agitation of 2016 as  well—protestors were present in much greater numbers than police  personnel, who were not aware of the scenario on the ground. The police  also worried about sending messages asking for help over the radio, as  this could have been tapped into by the protestors, according to the  report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of mobile Internet during the DSS-related  Internet shutdown also affected the use of technology such as drone  cameras, Chawla said. And because the police could not communicate with  security personnel at the court complex, the police inside had to scale  walls to leave safely, as they could not ask their colleagues for  backup.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report points out that this is in stark contrast to  what happened in Mumbai, where former police commissioner Rakesh Maria  made use of WhatsApp and SMS messages to prevent a scuffle from turning  into &lt;a href="http://www.ndtv.com/mumbai-news/putting-lid-on-rumours-helped-control-situation-in-lalbaug-rakesh-maria-723212"&gt;a riot&lt;/a&gt; during Eid celebrations in early 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A study by the Software Freedom Law Centre stated that India has already over 100 Internet shutdowns in 2018, &lt;a href="https://www.medianama.com/2018/09/223-india-100-internet-shutdowns/" target="_blank"&gt;&lt;i&gt;Medianama&lt;/i&gt;&lt;/a&gt; reported. The five states with the most shutdowns are Jammu and  Kashmir, Rajasthan, Uttar Pradesh, Maharashtra and Bihar. This has been  criticised by many, &lt;a href="https://www.accessnow.org/united-nations-event-explore-ways-stop-internet-shutdowns/"&gt;including the UN&lt;/a&gt;,  and as the Haryana police's experience show, the shutdowns are not just  harming citizens, but are counter-productive to maintaining order as  well.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations'&gt;https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-18T15:57:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/symposium-on-data-privacy-and-citizens-rights">
    <title>Symposium on Data Privacy and Citizen's Rights</title>
    <link>https://cis-india.org/internet-governance/news/symposium-on-data-privacy-and-citizens-rights</link>
    <description>
        &lt;b&gt;Shweta Mohandas was a panelist at the Symposium on Data Privacy and Citizen's Rights on September 9, 2018. The Symposium was organised by the Tech Law Forum of NALSAR University of Law, Hyderabad. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Concept Note&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The National Academy of Legal Studies and Research (NALSAR) University of Law, Hyderabad is organising a Symposium on DATA PRIVACY AND CITIZEN’S RIGHTS to provide multiple stakeholders one platform to discuss and deliberate on the BN Srikrishna Committee Report and Draft Bill.  &lt;br /&gt; &lt;br /&gt;The Committee headed by Retd. Justice BN Srikrishna released its Report and Draft Bill on the 27th of July, 2018. It comes at a time when there is increasing discussion about the individual privacy and surveillance by both private organisations and state authorities. Especially in light of the 9-judge Puttaswamy judgment affirming the Fundamental Right to Privacy, there was a need to concretise the right in the form of a statute. The Bill proposes an elaborate data protection framework by utilising concepts such as anonymisation, pseudonymisation, data localisation, guardian data fiduciary, among others. While the Bill has been lauded for providing a data protection framework largely similar to the one proposed by civil society, there are several areas of concern with the Bill such as the amendments suggested to the RTI Act, the impact of the Bill on Free Speech and the lack of substantial provisions regarding surveillance. There has been further criticism that the discussions regarding these issues have been conducted in silos, with little to no dialogue taking place between the various stakeholders and experts in the field.  &lt;br /&gt; &lt;br /&gt;We believe that there is a need to provide a common forum for these stakeholders to interact with each other in providing suggestions that are representative in nature and nuanced in their expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Themes&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy and Free Speech This interaction aims to examine the juxtaposition of the constitutional right to free speech and the now constitutionally affirmed right to privacy. Will a new data protection law impact the publication of leaked documents or sting operations like the Radia tapes or Tehelka’s ‘Operation Westend’? If so, how can journalists mitigate the risk of getting sued for breach of privacy?  While the jurisprudence concerning the right to privacy is in its most nascent state, it becomes important for us to explore its contours in light of already established constitutional guarantees.   &lt;br /&gt; &lt;br /&gt;Right to Information and Right to Privacy  How does the right to privacy impact the right to information? The guarantee of these two rights arise from diametrically opposite ideologies, in that privacy aims to shield from the public domain information and data concerning individuals and institutions while the right to information aims to promote transparency and disclosure of information held by the state. However, the question remains, is the existence of these two rights necessarily mutually exclusive? Will a new data protection law make it difficult to promote transparency under the Right to Information Act? Is there is a possibility of a clash between the Information Commissions and the proposed Data Protection Authority? This panel would analyze the co-existence and competitive nature of these two rights in the context of the Indian legal space.  &lt;br /&gt; &lt;br /&gt;Surveillance -  As we move towards a form of governance that is increasingly capable of surveilling individual movements and actions, it becomes extremely necessary for us to understand the nature of surveillance. Can data privacy be compromised for surveillance that may be necessary for increased safety in our physical and virtual living spaces? Are there any provisions that protects data in cases of it becoming exploitable? What is the interaction of international statutes (like ICCPR) and the latest Indian statute in terms of its recognition of necessity of surveillance in contrast to the necessity of protection of data.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/symposium-on-data-privacy-and-citizens-rights'&gt;https://cis-india.org/internet-governance/news/symposium-on-data-privacy-and-citizens-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-18T15:18:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/august-2018-newsletter">
    <title>August 2018 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/august-2018-newsletter</link>
    <description>
        &lt;b&gt;CIS newsletter for the month of August 2018.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Dear readers,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;India houses the second largest population in the world at approximately 1.35 billion individuals. In such a diverse and dense context, law enforcement could be a challenging job. Elonnai Hickok and Vipul Kharbanda &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india"&gt;throw light on the CLOUD Act and its implifications for India in a blog post&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On August 9, 2018, the DNA Technology (Use and Application) Regulation Bill, 2018 was introduced in the Lok Sabha. CIS had commented on some key aspects of the bill in many forums earlier. Elonnai Hickok and Murali Neelakantan in an article &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/bloomberg-quint-elonnai-hickok-and-murali-neelakantan-august-20-2018-dna-evidence-only-opinion-not-science-and-definitely-not-proof-of-crime"&gt;published by Bloomberg Quint&lt;/a&gt; have voiced their opinion on the bill.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Murali Neelakantan, Swaraj Barooah, Swagam Dasgupta and Torsha Sarkar in an &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/bloomberg-quint-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-august-14-2018-national-health-stack-data-for-datas-sake-a-manmade-health-hazard"&gt;Op-ed in Bloomberg Quint&lt;/a&gt; have examined the National Health Stack, an ambitious attempt by the government to to build a digital infrastructure with a “deep understanding of the incentive structures prevalent in the Indian healthcare ecosystem. The authors have argued that collection of health data, without sensitisation and accountability, has the potential to deny healthcare to the vulnerable.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;An article titled &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/nlud-student-law-journal-sunil-abraham-mukta-batra-geetha-hariharan-swaraj-barooah-and-akriti-bopanna-indias-contribution-to-internet-governance-debates"&gt;India's Contribution to Internet Governance Debates&lt;/a&gt;, co-authored by Sunil Abraham, Mukta Batra, Geetha Hariharan, Swaraj Barooah and Akriti Bopanna, was published in the NLUD Student Law Journal, an annual peer-reviewed journal published by the National Law University, Delhi. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;IT/IT-eS Sector and the Future of Work in India was organized at Omidyar Networks’ office in Bangalore, on June 29, 2018. Torsha Sarkar, Ambika Tandon and Aayush Rath &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/future-of-work-report-of-the-workshop-on-the-it-it-es-sector-and-the-future-of-work-in-india"&gt;co-authored a report&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Swaraj Barooah and Gurshabad Grover &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/livemint-july-24-2018-swaraj-barooah-and-gurshabad-grover-anti-trafficking-bill-may-lead-to-censorship"&gt;co-authored an article in Livemint&lt;/a&gt; that examines a few problematic provisions in the proposed Anti-trafficking Bill. The authors say that it may lead to censorship.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Researchers at Work programme of CIS &lt;a class="external-link" href="https://cis-india.org/raw/call-for-essays-offline"&gt;had invited abstracts for essays&lt;/a&gt; that explore dimensions of offline lives. Selected authors are expected to submit the first draft of the essay (2000-4000 words) by Friday, October 5, 2018.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Articles&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/livemint-july-24-2018-swaraj-barooah-and-gurshabad-grover-anti-trafficking-bill-may-lead-to-censorship"&gt;Anti-trafficking Bill may lead to censorship&lt;/a&gt; (Swaraj Barooah and Gurshabad Grover; Livemint; July 24, 2018). &lt;i&gt;The article was mirrored on CIS website in the month of August 2018&lt;/i&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/bloomberg-quint-august-6-2018-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-national-health-stack-an-expensive-temporary-placebo"&gt;The National Health Stack: An Expensive, Temporary Placebo&lt;/a&gt; (Murali Neelakantan, Swaraj Barooah, Swagam Dasgupta, and Torsha Sarkar; Bloomberg Quint; August 6, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-august-12-2018-nishant-shah-digital-native-double-speak"&gt;Digital Native: Double Speak&lt;/a&gt; (Nishant Shah; Indian Express; August 12, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/nlud-student-law-journal-sunil-abraham-mukta-batra-geetha-hariharan-swaraj-barooah-and-akriti-bopanna-indias-contribution-to-internet-governance-debates"&gt;India's Contribution to Internet Governance Debates&lt;/a&gt; (Sunil Abraham, Mukta Batra, Geetha Hariharan, Swaraj Barooah and Akriti Bopanna; NLUD Student Law Journal; August 16, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/bloomberg-quint-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-august-14-2018-national-health-stack-data-for-datas-sake-a-manmade-health-hazard"&gt;National Health Stack: Data for Data's Sake, A Manmade Health Hazard &lt;/a&gt;(Murali Neelakantan, Swaraj Barooah, Swagam Dasgupta and Torsha Sarkar; Bloomberg Quint; August 17, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/bloomberg-quint-elonnai-hickok-and-murali-neelakantan-august-20-2018-dna-evidence-only-opinion-not-science-and-definitely-not-proof-of-crime"&gt;DNA ‘Evidence’: Only Opinion, Not Science, And Definitely Not Proof Of Crime!&lt;/a&gt; (Elonnai Hickok and Murali Neelakantan; Bloomberg Quint; August 22, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-august-26-2018-nishant-shah-digital-native-playing-god"&gt;Digital Native: Playing God&lt;/a&gt; (Nishant Shah; Indian Express; August 26, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h2&gt;CIS in the News&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/undp-august-1-2018-undp-joins-tech-giants-in-partnership-on-ai"&gt;UNDP joins Tech Giants in Partnership on AI&lt;/a&gt; (UNDP; August 1, 2018). CIS is one of the partners.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-august-3-2018-uidai-says-asked-nobody-to-add-the-helpline-number-to-contacts"&gt;UIDAI says asked nobody to add the helpline number to contacts&lt;/a&gt; (Komal Gupta; Livemint; August 3, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-august-10-2018-mugdha-variyar"&gt;How Chinese apps are making inroads in Indian small towns&lt;/a&gt; (Mugdha Variyar; Economic Times; August 10, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/factor-daily-anand-murali-august-13-2018-the-big-eye"&gt;The Big Eye: The tech is all ready for mass surveillance in India&lt;/a&gt; (Anand Murali; Factor Daily; August 13, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-august-21-2018-centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws"&gt;Centre draws red lines for Whatsapp over fake news, says must comply with Indian laws&lt;/a&gt; (Nakul Sridhar; Hindustan Times; August 21, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-straits-times-august-24-2018-debarshi-dasgupta-india-steps-up-vigilance-against-whatsapp-abuse"&gt;India steps up vigilance against WhatsApp abuse&lt;/a&gt; (Debashree Dasgupta; Straits Times; August 24, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/huffington-post-august-25-2018-paul-bluementhal-and-gopal-sathe-indias-biometric-database-is-creating-a-perfect-surveillance-state"&gt;India’s Biometric Database Is Creating A Perfect Surveillance State — And U.S. Tech Companies Are On Board&lt;/a&gt; (Paul Bluementhal and Gopal Sathe; Huffington Post; August 25, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-rachel-lopez-august-26-2018-20-years-of-google-privacy-fake-news-and-future"&gt;20 years of Google: Privacy, fake news and the future&lt;/a&gt; (Rachel Lopez; Hindustan Times; August 26, 2018).&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Our Access to Knowledge programme currently consists of two projects.  The Pervasive Technologies project, conducted under a grant from the  International Development Research Centre (IDRC), aims to conduct  research on the complex interplay between low-cost pervasive  technologies and intellectual property, in order to encourage the  proliferation and development of such technologies as a social good. The  Wikipedia project, which is under a grant from the Wikimedia  Foundation, is for the growth of Indic language communities and projects  by designing community collaborations and partnerships that recruit and  cultivate new editors and explore innovative approaches to building  projects.&lt;/p&gt;
&lt;h3&gt;Wikipedia&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/c2ec3fc38c3fc2ec3f-c2ac24c4dc30c3fc15-c17c4dc30c02c25c3ec32c2fc02c32c4b-c24c46c32c41c17c41-c35c3fc15c40c2ac40c21c3fc2fc28c4dc32-c15c3ec30c4dc2fc15c4dc30c2ec02"&gt;మిసిమి పత్రిక గ్రంథాలయంలో తెలుగు వికీపీడియన్ల కార్యక్రమం&lt;/a&gt; (Pavan Santhosh; August 22, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/partnership-activity-in-annamayya-library-guntur"&gt;వికీపీడియా:సమావేశం/గుంటూరు/అన్నమయ్య గ్రంథాలయం - భాగస్వామ్య కార్యక్రమం జూలై 2018&lt;/a&gt; (Organized by CIS-A2K; Annamaya Library; Guntur; July 10, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/workshop-of-publishers-and-writers-on-unicode-open-source-and-wikimedia-projects"&gt;Workshop of Publishers and Writers on Unicode, Open Source and Wikimedia Projects&lt;/a&gt; (Organized by CIS-A2K; Pune; July 25, 2018). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/workshop-of-river-activists-for-building-jal-bodh-knowledge-resource-on-water"&gt;Workshop of River activists for building Jal Bodh - Knowledge resource on Water&lt;/a&gt; (Organized by CIS-A2K; Pune; July 25, 2018). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/tumakur%20university-workshop"&gt;ವಿಕಿಪೀಡಿಯ:ಸಂಪಾದನೋತ್ಸವಗಳು/ಸಂಪಾದನೋತ್ಸವ ತುಮಕೂರು ವಿಶ್ವವಿದ್ಯಾನಿಲಯ ೨೦೧೮ &lt;/a&gt;(Organized by CIS-A2K; Tumakur University; July 25, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Intensive_Personalised_Wiki_Training_Session_at_Pune"&gt;Intensive Personalised Wiki Training Session at Pune&lt;/a&gt; (Organized by CIS-A2K; August 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Wikisource_and_Wiki_technical_session_at_MKCL,_Pune"&gt;Wikisource and Wiki technical session at MKCL&lt;/a&gt; (Organized by CIS-A2K; Pune; August 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Wiki_technical_orientation_session_with_PyLadies_group_at_Cummins_College_of_Engineering,_Pune"&gt;Wiki technical orientation session with PyLadies group&lt;/a&gt; (Organized by CIS-A2K; Cummins College of Engineering, Pune; August 7, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Indian_Independence_Struggle_Edit-a-thon_on_Marathi_Wikipedia"&gt;Indian Independence Struggle Edit-a-thon on Marathi Wikipedia&lt;/a&gt; (Organized by CIS-A2K; August 10 - 20, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;b&gt;Event Participation&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/partnership-discussions-with-misimi-telugu-monthly-magazine"&gt;వికీపీడియా:సమావేశం/హైదరాబాదు/మిసిమి పత్రిక భాగస్వామ్య సమావేశం, జూలై 2018&lt;/a&gt; (July 24, 2018). CIS-A2K held partnership discussions with Misimi Telugu monthly magazine. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;Note: &lt;i&gt;Event reports for all these were published in the month of August 2018&lt;/i&gt;.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;As part of its research on privacy and free speech, CIS is engaged with  two different projects. The first one (under a grant from Privacy  International and IDRC) is on surveillance and freedom of expression  (SAFEGUARDS). The second one (under a grant from MacArthur Foundation)  is on restrictions that the Indian government has placed on freedom of  expression online.&lt;/p&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/use-of-visuals-and-nudges-in-privacy-notices"&gt;Use of Visuals and Nudges in Privacy Notices&lt;/a&gt; (Saumyaa Naidu; edited by Elonnai Hickok and Amber Sinha; August 18, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india"&gt;An Analysis of the CLOUD Act and Implications for India&lt;/a&gt; (Elonnai Hickok and Vipul Kharbanda; August 22, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/consumer-care-society-silver-jubilee-year-celebrations"&gt;Consumer Care Society: Silver Jubilee Year Celebrations&lt;/a&gt; (Arindrajit Basu; August 27, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;b&gt;Event Participation&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/celebrating-one-year-of-the-justice-k-s-puttaswamy-v-union-of-india-judgment"&gt;Celebrating One Year of the Justice K.S. Puttaswamy v. Union of India Judgment&lt;/a&gt; (Organized by Indian Council for Research on International Economic Relations and Centre for Communication Governance at National Law University - Delhi; India International Centre; New Delhi; August 24, 2018). Shweta Mohandas was a panelist at the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h3&gt;Free Speech &amp;amp; Expression&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/icann-response-to-didp-31-on-diversity"&gt;ICANN response to DIDP #31 on diversity&lt;/a&gt; (Akriti Bopanna and Akash Sriram; August 21, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;b&gt;Event Participation&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/feminist-information-infrastructure-workshop-with-blank-noise-and-sangama"&gt;Feminist Information Infrastructure Workshop with Blank Noise and Sangama&lt;/a&gt; (Organized by Sangama and Blank Noise; CIS, Bangalore; August 8, 2018). Akriti Bopanna, Swaraj Paul Barooah and Ambika Tandon conducted the workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/summer-school-on-disinformation"&gt;Summer School on Disinformation&lt;/a&gt; (Organized by Digital Asia Hub, Hans-Bredow-Institut, University of Hamburg, Institute for Technology &amp;amp; Society of Rio de Janeiro - ITS Rio and Berkman Klein Center for Internet and Society at Harvard University; Azure Room, Pullman, Jakarta; August 22 - 24, 2018). Sunil Abraham made a presentation on Disinformation and Online Recruitment.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/world-library-and-information-congress-2018"&gt;World Library and Information Congress 2018&lt;/a&gt; (Organized by International Federation of Library Associations and Institutions; Kuala Lumpur; August 26 - 27, 2018). Swaraj Paul Barooah was a speaker at two panels. Swaraj's first panel, titled "Intellectual Freedom in a Polarised World" was selected as one of 9 sessions to be live-streamed and recorded, out of 249 sessions in total. The recording can be accessed on &lt;a class="external-link" href="https://www.youtube.com/watch?v=0HujFHQn1zY"&gt;YouTube&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h3&gt;Information Technology&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/future-of-work-report-of-the-workshop-on-the-it-it-es-sector-and-the-future-of-work-in-india"&gt;Future of Work: Report of the ‘Workshop on the IT/IT-eS Sector and the Future of Work in India’&lt;/a&gt; (Torsha Sarkar, Ambika Tandon and Aayush Rath; edited by Elonnai Hickok. Akash Sriram and Divya Kushwaha; August 16, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/raw/call-for-essays-offline"&gt;Call for Essays: Offline&lt;/a&gt; (P.P. Sneha; August 6, 2018). Selected authors are expected to submit the first draft of the essay (2000-4000 words) by Friday, October 5, 2018.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;span style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and  Society (CIS) is a non-profit organisation that undertakes  interdisciplinary research on internet and digital technologies from  policy and academic perspectives. The areas of focus include digital  accessibility for persons with disabilities, access to knowledge,  intellectual property rights, openness (including open data, free and  open source software, open standards, open access, open educational  resources, and open video), internet governance, telecommunication  reform, digital privacy, and cyber-security. The academic research at  CIS seeks to understand the reconfigurations of social and cultural  processes and structures as mediated through the internet and digital  media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet!  Write a cheque in favour of 'The Centre for Internet and Society' and  mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru -  5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, artists, and theoreticians,  both organisationally and as individuals, to engage with us on topics  related internet and society, and improve our collective understanding  of this field. To discuss such possibilities, please write to Sunil  Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for  academic research), with an indication of the form and the content of  the collaboration you might be interested in. To discuss collaborations  on Indic language Wikipedia projects, write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary donor the Kusuma Trust founded  by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for  its core funding and support for most of its projects. CIS is also  grateful to its other donors, Wikimedia Foundation, Ford Foundation,  Privacy International, UK, Hans Foundation, MacArthur Foundation, and  IDRC for funding its various projects&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/august-2018-newsletter'&gt;https://cis-india.org/about/newsletters/august-2018-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-16T05:08:39Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-rana-september-9-2018-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges">
    <title>#NAMAprivacy: Data Protection Authority's regulatory and enforcement challenges</title>
    <link>https://cis-india.org/internet-governance/news/medianama-rana-september-9-2018-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges</link>
    <description>
        &lt;b&gt;This is the second post in our series covering our events in Delhi and Bangalore on India’s Data Protection Law.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Rana was published in &lt;a class="external-link" href="https://www.medianama.com/2018/09/223-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges/"&gt;Medianama&lt;/a&gt; on September 9, 2018. Amber Sinha was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“The Data Protection Authority of India, as it stands, performs legislative, executive and judicial functions. It’s not a bad thing,” said Alok Prasanna Kumar, Senior Resident Fellow at the Vidhi Centre for Legal Policy at the #NAMAprivacy discussion on the data protection bill in Bangalore last week. “But unlike other regulators, the DPA’s ambit is vast. It could potentially deal with every kind of company. So, there’s no way one entity could do this in regards to efficacy and no single entity should do it either.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That was one of the many challenges that our panelists have suggested  that the regulator may face when it is established. Panelists, however,  were largely unsure on how the proposed regulator will impact consumers  or businesses, given that the most regulations are yet to be defined in  the Personal Data Protection Bill, 2018. To this extent, Renuka Sane,  Associate Professor at the National Institute of Public Finance and  Policy (NIPFP) said, “On most questions about this law, I would have one  answer, that it is too early to say anything. We will have to wait and  see how it will evolve.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To reiterate, the draft bill, 2018 proposed establishing a regulatory  body that will implement and oversee the data protection law in the  country; the Data Protection Authority of India (DPA). The regulatory  body will be empowered to impose penalties on data fiduciaries, accept  complaints from data principals, prevent misuse of personal data,  determine if the data protection law has been violated, and promote  awareness of data protection. The authority will consist of six  whole-time members and a chairperson, to be appointed by the central  government, based on the recommendations of a selection committee that  includes the Chief Justice of India (CJI), the Cabinet secretary and one  CJI nominated expert.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following are some of the key points made in both, Delhi and  Bengaluru. Please note that these points are not necessarily listed in  the order they were made and are not verbatim excerpts of the speakers’  remarks. We’ve edited them for brevity.&lt;/p&gt;
&lt;h3&gt;Regulatory and Enforcement by the DPA&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Tasks to be undertaken&lt;/b&gt;: There are four main functions that the DPA has to undertake at some point of time – &lt;ol&gt;
&lt;li&gt;The DPA will have to issues licenses to some players&lt;/li&gt;
&lt;li&gt;It will have to come up with regulations as there are several places in the Act (Bill) that will be determined by regulations,&lt;/li&gt;
&lt;li&gt;It will have come up with some sort of monitoring mechanism to gauge  if you are abiding by the regulations are not and iv. It will have to  determine violations and undertake enforcement actions&lt;b&gt;. &lt;/b&gt;(Renuka Sane)&lt;/li&gt;
&lt;/ol&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;To increase transparency and credibility&lt;/b&gt;:  Regulators have to demonstrate what is the problem that they are trying  to solve before passing a regulation. Is the solution they are opting  for, the most appropriate way of solving the problem? Have they  considered all the available alternative solutions? They need to hold  public consultations on all these issues in a transparent manner. Unless  all these things are embedded in the law, we are not going to make much  progress on the DPA. (Renuka Sane)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Regulatory balance&lt;/b&gt;: The regulators in India need to  merge the two sides of responsive theory – compliance theory, where we  put a lot of faith in businesses to self-regulate and comply with  processes, with dissonance theory, where we have punishments, fines and  criminal enforcement for noncompliance. (Amber Sinha, Senior Programme  Manager at Centre for Internet and Society (CIS))If a DPA were to come  in today and regulate everybody who is dealing with personal data at a  significant level, there are more than 600 million entities that they  have to regulate. (Beni Chugh, Dvara)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Accountability:&lt;/b&gt; When you create an extremely  powerful agency like the DPA, you will have to put in place a system of  regulatory governance, where the DPA is held accountable for its actions  or else you will exhaustipate the asymmetry of power between the  regulator and the regulated. (Renuka Sane)&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;br /&gt; One big feature, which has become a standard practice across regulators,  that is missing in the DRA is a reporting board structure, where you  are internally accountable to the management board and externally, you  are accountable through self-reporting mechanisms. The functioning of  the Chairperson is not defined well enough for us to see if there is  enough internal accountability at the organisation. The internal  governance of the regulatory body is what can improve the outcomes of  the regulations. (Beni Chugh).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Penalties for violation of privacy laws&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Criminal penalties: &lt;/b&gt;According to me, the threshold  for a criminal offence is low in this bill. If the law were to be  implemented today, a vast majority of the businesses would be criminally  charged. There are three provision in the bill that deal with criminal  penalties, they essentially deal with data processors breaching  individual rights in a reckless or in a grossly negligent fashion. There  are legal standards on how to construed ‘reckless’ behavior,  particularly from the domain of tort law. However, what will trigger an  enforcement action is still kind of open to speculation because the  language of the bill open to interpretation.  (Amber Sinha, CIS)&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;b&gt;The bill enables the Data Protection Authorities  to impose penalties of up to Rs 15 crores or 4% of the annual global  turnover, whichever is higher, for violating privacy laws.&lt;/b&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Penalties for govt authorities: &lt;/b&gt;Even if you levy a  heavy fine on a government authority for breaching any laws, it’s you  and I who will be paying for their fault, because its ultimately going  from the Budget. I think that’s where the criminal offense part of it  becomes important. You can hold people personally liable. (Beni Chugh)An  individual liability on a government official or secretary may be the  way to go and I find that the bill has that provision In (Bill) 96 (3).  (a member of the audience)I think that there are several exceptions  given to the state and perhaps that will make it more difficult to  define whether there has been a violation by the state. (Renuka Sane)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Impact on consumers and businesses&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Onerous task for consumers&lt;/b&gt;: The problem with the  bill is that it assumes a lot of active understanding of the law. For a  consumer to file a grievance, she has to say that there was a violation  and it is likely to (or) has caused her harm. But, since harm is not  well defined, how are you going to file a grievance? (Beni Chugh)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Uncertainty over regulations&lt;/b&gt;: I’m uncertain about  the impact the bill would have on businesses because many of the  obligations that one needs to abide by, are not well defined. (Beni  Chugh)&lt;/li&gt;
&lt;li&gt;Bill will become less ambiguous once the DRA creates regulations. (Renuka Sane)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Other notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;One thing that the bill does fairly well is defining the obligations of a data processor. (Amber Sinha)&lt;/li&gt;
&lt;li&gt;There are certain discrepancies which exist between the approach  that the report seems to espouse and what is actually reflected in the  Bill. (Amber Sinha)&lt;/li&gt;
&lt;li&gt;On most questions about this law, I would have one answer that it is  too early to say and we will see how it will evolve. (Renuka Sane)&lt;/li&gt;
&lt;li&gt;There are various metrics based on which you can define if the DRA  is an independent organisation. Based on few of them, it could be  independent, but based on others, it could not be. (Renuka Sane)&lt;/li&gt;
&lt;li&gt;I think that there are several exceptions given to the state and  perhaps that will make it more difficult to define whether there has  been a violation by the state. (Renuka Sane)&lt;/li&gt;
&lt;li&gt;I predict that the DPA will treat NPCI as any other fiduciary, even  if the data it processes will be marked as critical. (Manasa  Venkataraman, Associate Fellow, The Takshashila Institution)&lt;/li&gt;
&lt;li&gt;In the EU, they have had the luxury of spending 10 years (on GDPR)  because they already had a data protection law. But for us, we never had  one, this is the first one. So, in that sense, it is definitely much  more urgent for us. We have to get it right, we can’t rush it but there  is much greater urgency in our jurisdiction. (Amber Sinha)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-rana-september-9-2018-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges'&gt;https://cis-india.org/internet-governance/news/medianama-rana-september-9-2018-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-14T12:26:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/artificial-intelligence-in-the-governance-sector-in-india">
    <title>Artificial Intelligence in the Governance Sector in India</title>
    <link>https://cis-india.org/internet-governance/blog/artificial-intelligence-in-the-governance-sector-in-india</link>
    <description>
        &lt;b&gt;The use of Artificial Intelligence has the potential to ameliorate several existing structural inefficiencies in the discharge of governmental functions. Our research indicates that the deployment of this technology across sub-sectors is still on the horizons.&lt;/b&gt;
        &lt;p&gt;Ecosystem Mapping:Shweta Mohandas and Anamika Kundu &lt;br /&gt;Edited by: Amber Sinha, Pranav MB and Vishnu Ramachandran&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Much of the technological capacity and funding for AI in governance in India is coming from the private sector - a trend we expect will continue as the government engages in an increasing number of partnerships with both start-ups and large corporations alike. While there is considerable enthusiasm and desire by the government to develop AI-driven solutions in governance, including the release of two reports identifying the broad contours of India’s AI strategy, this enthusiasm is yet to be underscored by adequate financial, infrastructural, and technological capacity. This gap provides India with a unique opportunity to understand some the of the ethical, legal and technological hurdles faced by the West both during and after the implementation of similar technology and avoid these challenges when devising its own AI strategy and regulatory policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case study identified five sub-sectors including law enforcement, education, defense, discharge of governmental functions and also considered the implications of AI in judicial decision-making processes that have been used in the United States. After mapping the uses of AI in various sub-sectors, this report identifies several challenges to the deployment of this technology. This includes factors such as infrastructural and technological capacity, particularly among key actors at the grassroots level, lack of trust in AI driven solutions and adequate funding. We also identified several ethical and legal concerns that policy-makers must grapple with. These include over-dependence on AI systems, privacy and security, assignment of liability, bias and discrimination both in process and outcome, transparency and due process. Subsequently, this report can be considered as a roadmap for the future of AI in India by tracking corresponding and emerging developments in other parts of the world. In the final section of the report, we propose several recommendations for policy-makers and developers that might address some of the challenges and ethical concerns identified. Some of these include benchmarks for the use of AI in the public sector, development of standards of explanation, a standard framework for engagement with the private sector, leveraging AI as a field to further India’s international strategy, developing adequate standards of data curation, ensuring that the benefits of the technology reaches the lowest common denominator, adopting interdisciplinary approaches to the study of Artificial Intelligence and    developing fairness,transparency and due process through the contextual application of a rules-based system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is crucial that policy-makers do not adopt a ‘one-size-fits-all’ approach to AI regulation but consider all options within a regulatory spectrum that considers the specific impacts of the deployment of this technology for each sub-sector within governance - with the distinction of public sector use. Given that the governance sector has potential implications for the fundamental rights of all citizens, it is also imperative that the government does not shy away from its obligation to ensure the fair and ethical deployment of this technology while also ensuring the existence of robust redress mechanisms. To do so, it must chart out a standard rules-based system that creates guidelines and standards for private sector development of AI solutions for the public sector. As with other emerging technology, the success of Artificial intelligence depends on whether it is deployed with the intention of placing greater regulatory scrutiny on the daily lives of individuals or for harnessing individual potential that augment rather than counter the core tenets of constitutionalism and human dignity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Read the full report &lt;a href="https://cis-india.org/internet-governance/ai-and-governance-case-study-pdf"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/artificial-intelligence-in-the-governance-sector-in-india'&gt;https://cis-india.org/internet-governance/blog/artificial-intelligence-in-the-governance-sector-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-14T11:37:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindu-businessline-swaraj-paul-barooah-september-7-2018-indias-post-truth-society">
    <title>India’s post-truth society</title>
    <link>https://cis-india.org/internet-governance/blog/hindu-businessline-swaraj-paul-barooah-september-7-2018-indias-post-truth-society</link>
    <description>
        &lt;b&gt;The proliferation of lies and manipulative content supplies an ever-willing state a pretext to step up surveillance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The op-ed was published in &lt;a class="external-link" href="https://www.thehindubusinessline.com/opinion/deconstructing-the-20-society/article24895705.ece"&gt;Hindu Businessline&lt;/a&gt; on September 7, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;After a set of rumours spread over WhatsApp triggered a series of  lynchings across the country, the government recently took the  interesting step of placing the responsibility for this violence on  WhatsApp. This is especially noteworthy because the party in power, as  well as many other political parties, have taken to campaigning over  social media, including using WhatsApp groups in a major way to spread  their agenda and propaganda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After all, a simple tweet or message  could be shared thousands of times and make its way across the country  several times, before the next day’s newspaper is out. Nonetheless,  while the use of social media has led to a lot of misinformation and  deliberately polarising ‘news’, it has also helped contribute to  remarkable acts of altruism and community, as seen during the recent  Kerala floods.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government has taken a seemingly  techno-determinist view by placing responsibility on WhatsApp, the  duality of very visible uses of social media has led to others viewing  WhatsApp and other internet platforms more as a tool, at the mercy of  the user. However, as historian Melvin Kranzberg noted, “technology is  neither good nor bad; nor is it neutral”. And while the role of  political and private parties in spreading polarising views should be  rigorously investigated, it is also true that these internet platforms  are creating new and sometimes damaging structural changes to how our  society functions. A few prominent issues are listed below:&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Fragmentation of public sphere&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Jurgen  Habermas, noted sociologist, conceptualised the Public Sphere as being  “a network for communicating information and points of view, where the  streams of communication are, in the process, filtered and synthesised  in such a way that they coalesce into bundles of topically specified  public opinions”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To a large extent, the traditional gatekeepers  of information flow, such as radio, TV and mainstream newspapers,  performed functions enabling a public sphere. For example, if a  truth-claim about an issue of national relevance was to be made, it  would need to get an editor’s approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case there was a  counter claim, that too would have to pass an editorial check. Today  however, nearly anybody can become a publisher of information online,  and if it catches the right ‘influencer’s attention, it could spread far  wider and far quicker than it would’ve in traditional media. While this  does have the huge positive of giving space to more diverse viewpoints,  it also comes with two significant downsides.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, that it  gives a sense of ‘personal space’ to public speech. An ordinary person  would think a few times, do some research, and perhaps practice a speech  before giving it before 10,000 people. An ordinary person would also  think for perhaps five seconds before putting out a tweet on the very  same topic, despite now having a potentially global audience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second,  by having messages sent directly to your hand-held device, rather than  open for anyone to fact-check and counter, there is less transparency  and accountability for those who send polarising material and  misinformation. How can a mistaken and polarising view be countered, if  one doesn’t even know it is being made? And if it can’t be countered,  how can its spread by contained?&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The attention market&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Not  only is that earlier conception of public sphere being fragmented, these  new networked public spheres are also owned by giant corporations. This  means that these public spheres where critical discourse is being  shaped and spread, are actually governed by advertisement-financed  global conglomerates. In a world of information overflow, and privately  owned, ad-financed public spheres, the new unit of currency is  attention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is in the direct interest of the Facebooks and  Googles of the world, to capture user attention as long as possible,  regardless of what type of activity that encourages. It goes without  saying that neither the ‘mundane and ordinary’, nor the ‘nuanced and  detailed’ capture people’s attention nearly as well as the sensational  and exciting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nearly as addicting, studies show, are the  headlines and viewpoints which confirm people’s biases. Fed by  algorithms that understand the human desire to ‘fit in’, people are  lowered into echo chambers where like-minded people find each other and  continually validate each other. When people with extremist views are  guided to each other by these algorithms, they not only gather  validation, but also now use these platforms to confidently air their  views — thus normalising what was earlier considered extreme. Needless  to say, internet platforms are becoming richer in the process.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Censorship by obfuscation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Censorship  in the attention economy, no longer requires blocking of views or  interrupting the transmission of information. Rather, it is sufficient  to drown out relevant information in an ocean of other information. Fact  checking news sites face this problem. Regardless of how often they  fact-check speeches by politicians, only a minuscule percentage of the  original audience comes to know about, much less care about the  corrections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, repeated attacks (when baseless) on  credibility of news sources causes confusion about which sources are  trustworthy. In her extremely insightful book “Twitter and Tear Gas”,  Prof Zeynep Tufekci rightly points out that rather than traditional  censorship, powerful entities today, (often States) focus on  overwhelming people with information, producing distractions, and  deliberately causing confusion, fear and doubt. Facts, often don’t  matter since the goal is not to be right, but to cause enough confusion  and doubt to displace narratives that are problematic to these powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Viewpoints  from members of groups that have been historically oppressed, are  especially harangued. And those who are oppressed tend to have less  time, energy and emotional resources to continuously deal with online  harassment, especially when their identities are known and this  harassment can very easily spill over to the physical world.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Habermas  saw the ideal public sphere as one that is free of lies, distortions,  manipulations and misinformation. Needless to say, this is a far cry  from our reality today, with all of the above available in unhealthy  doses. It will take tremendous effort to fix these issues, and it is  certainly no longer sufficient for internet platforms to claim they are  neutral messengers. Further, whether the systemic changes are understood  or not, if they are not addressed, they will continue to create and  expand fissures in society, giving the state valid cause for intervening  through backdoors, surveillance, and censorship, all actions that  states have historically been happy to do!&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindu-businessline-swaraj-paul-barooah-september-7-2018-indias-post-truth-society'&gt;https://cis-india.org/internet-governance/blog/hindu-businessline-swaraj-paul-barooah-september-7-2018-indias-post-truth-society&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>swaraj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-09-12T12:16:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
