<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 651 to 665.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/quantified-identities-as-a-global-phenomenon-analyzing-the-impact-of-biometric-systems-in-our-societies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-komal-gupta-february-8-2018-from-march-1-only-registered-devices-to-be-used-to-authenticate-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/reuters-february-13-2018-rahul-bhatia-critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-print-kaveesha-kohli-and-talha-ashraf-the-vanishing-act-scoop-on-bjp-ram-madhav"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-february-13-2018-nirmal-john-cci-leaves-google-searching-for-answers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/unpacking-data-protection-law-a-visual-representation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ai-and-manufacturing-and-services-in-india-looking-forward"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/kaplan-herald-february-5-2018-aadhaar-safety-is-regularly-evolving"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-komal-gupta-february-7-2017-to-protect-data-dont-opt-for-plastic-or-laminated-Aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/Qjanuary-2018-newsletter"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/quantified-identities-as-a-global-phenomenon-analyzing-the-impact-of-biometric-systems-in-our-societies">
    <title>Quantified identities as a global phenomenon: analyzing the impact of biometric systems in our societies</title>
    <link>https://cis-india.org/internet-governance/news/quantified-identities-as-a-global-phenomenon-analyzing-the-impact-of-biometric-systems-in-our-societies</link>
    <description>
        &lt;b&gt;A session by Amber Sinha and Leandro Ucciferri of ADC, Argentina at the Internet Freedom Festival to be held in Valencia, Spain in March has been selected. Amber Sinha will make a presentation.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the last decade, societies all around the world have seen an exponential growth in the implementation of biometric identification systems, used from the most complex to the most mundane activities that we perform in our daily lives. The research work being carried out by ADC in Argentina, and more broadly in Latin America, allowed us to reach certain observations: In general, public policies related to the use of these types of technologies are carried out with little or no transparency vis-à-vis society; the lack of precise information, which varies country to country, about the technologies and mechanisms being used for the collection, analysis and storage of the biometric data, and the use cases behind such technologies (e.g. the purpose of the data, who will have access to it, if it will be shared and transferred between different public or private bodies); and finally the lack of sufficient legal frameworks to guarantee an adequate treatment of the biometric data collected, both by the State and the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the research by CIS in India and other jurisdictions in Asia shows that biometric identification systems are being portrayed as critical to the use of online services such as e-governance or e-commerce platforms, and facilitates the generation of enormous amounts of transactional data. In India, the biometric identity is envisioned as a ‘cradle to grave’ identity. This unique identifier is key to the integration of different government and private sector databases and poses serious risks of profiling, function creep, lack of accountability and regulation by code.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With this session we aim to address some of the more pressing issues regarding the implementation of biometric technologies in our societies, specifically: a) Threats to bodily integrity and dignity: how biometrics reduce an individual to a number represented through a biometric sequence. b) Irreversible damages in case of breach: unlike passwords, biometrics –such as our fingerprints, our faces, iris or voice– cannot be changed; so once compromised, the damage is irreversible. c) Are biometrics appropriate forms of identifiers? How can we answer questions around uniqueness, discrimination and bias, resolving false positives and false negatives, as well as the change of biometrics over time (e.g. age or medical conditions that may affect our bodies). d) How biometrics are changing our perception of public spaces, specially due to technologies such as facial recognition? e) How are biometric based identification systems reconfiguring the relationship between citizen and state? Together with CIS, we will give a brief overview of the current trends in Latin America and Asia, in order to set the context of the conversation and then allow participants to freely express their own personal/professional expertise to learn about their concerns and experiences in terms of how biometric technologies have affected their day to day lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For more info, &lt;a class="external-link" href="https://platform.internetfreedomfestival.org/en/IFF2018/public/schedule/custom/189"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/quantified-identities-as-a-global-phenomenon-analyzing-the-impact-of-biometric-systems-in-our-societies'&gt;https://cis-india.org/internet-governance/news/quantified-identities-as-a-global-phenomenon-analyzing-the-impact-of-biometric-systems-in-our-societies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-01T00:56:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable">
    <title>Beyond Scale: How to make your digital development program sustainable</title>
    <link>https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable</link>
    <description>
        &lt;b&gt;A dissemination workshop was organized by BBC Media Action, with support from the Digital Impact Alliance and the Bill &amp; Melinda Gates Foundation on February 21, 2018 in Bangalore. Sunil Abraham participated in the workshop.&lt;/b&gt;
        &lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;9.00 to 9.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Registration and coffee&lt;/p&gt;
&lt;p&gt;&lt;b&gt;9.50 to 10.05&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Introduction to ‘&lt;i&gt;Beyond Scale’&lt;/i&gt;, Kate Willson, CEO, Digital Impact Alliance&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.15 to 11.15&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;‘Surviving the Valley of Death’, panel discussion with:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Rahul Mullick, ICT lead, Bill &amp;amp; Melinda Gates Foundation, India, &lt;/li&gt;
&lt;li&gt;Nehal Sanghavi, Senior Advisor for Innovation and Partnership, USAID, India&lt;/li&gt;
&lt;li&gt;Kate Wilson, CEO, Digital Impact Alliance&lt;/li&gt;
&lt;li&gt;Priyanka Dutt, Country Director, BBC Media Action&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;Moderated by Sara Chamberlain, Digital Director, BBC Media Action&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.15 to 11.30 &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Tea/coffee break&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.30 to 11.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Introduction to the table workshop sessions&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.45 to 1.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each table works to identify solutions to some of the digital development sector’s most pressing challenges in the areas of organizational change management, regulatory compliance, legal protection and risk, public sector adoption, private sector business models, solution design, technical architecture for scale, partnerships and human capacity.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1 PM to 2.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2.00 to 2.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Each table finalizes its presentation.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.00 to 4.15&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Presentations, Q&amp;amp;A and discussion of each table’s group work&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.15 &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Tea/coffee will be served at the tables&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.30 to 4.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Introduction to the ‘Expert Bar’&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.45 to 6.00 &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There will be one or more ‘experts’ in specific focus areas of the guide seated at each table. Participants are free to visit the tables that interest them to discuss their challenges and share their own expertise.  &lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;6.00 – 9.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Networking reception with open bar and snacks&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable'&gt;https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    

   <dc:date>2018-02-26T14:23:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-komal-gupta-february-8-2018-from-march-1-only-registered-devices-to-be-used-to-authenticate-aadhaar">
    <title>From 1 March, only registered devices to be used to authenticate Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/livemint-komal-gupta-february-8-2018-from-march-1-only-registered-devices-to-be-used-to-authenticate-aadhaar</link>
    <description>
        &lt;b&gt;UIDAI directive to Aadhaar authentication agencies aims to avoid putting citizens’ biometric data at risk&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was &lt;a class="external-link" href="http://www.livemint.com/Politics/FgXy2gorgyXaGVvpkl4yKN/From-1-Mar-only-registered-devices-to-be-used-to-authentica.html"&gt;published in Livemint&lt;/a&gt; on February 8, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI) has directed all Aadhaar authentication agencies to use only registered biometric devices from 1 March to avoid putting residents’ data at risk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The initial deadline to upgrade these devices was 1 June 2017, but it has been extended several times. The latest is the sixth extension.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI wants the biometric devices registered with the Aadhaar system for encryption key management. The Aadhaar authentication server can individually identify and validate these devices and manage encryption keys on each registered device.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is reiterated that to ensure encryption of biometrics of residents at time of capture, it is absolutely essential to use only the registered devices. Any further use of non-registered devices will be putting residents’ privacy at risk,” a UIDAI circular dated 2 February said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January last year, UIDAI had instructed all the authentication user agencies (AUAs) and authentication service agencies (ASAs) to adhere to its new encryption standards and accordingly upgrade the devices to the new norms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The AUA is an entity engaged in providing Aadhaar-enabled services. It may be a government, public or a private legal agency registered in India which uses Aadhaar authentication services provided by UIDAI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ASA is any entity that transmits authentication requests to the Central Identities Data Repository (CIDR) on behalf of one or more AUAs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Requests from AUAs to extend the timeline has been cited as the reason for delay by UIDAI. The last deadline was 31 January.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, UIDAI claims most of the entities have migrated to registered devices and “no further extension will be given in this regard.” Failure to meet the February-end deadline will lead to loss or disruption of services, the circular added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A privacy expert called for better security in the Aadhaar system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The UIDAI should have gone in for smart cards, which are inherently more secure and would have proven a better basis for a national ID system. Given its choice of biometrics, UIDAI should have required hardware-level encryption — the yet-to-be-specified (Level 1) security standard— from 2010,” said Pranesh Prakash, policy director at think tank Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Making the much-delayed Level 1 mandatory is what UIDAI should be focusing on; sadly, even basic registration and easily-defeated software-level encryption (Level 0) is yet to be made mandatory,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI has been under the scanner over the past few months over charges that random entities have been accessing personal information without the consent of individual Aadhaar number holders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, UIDAI put in place a two-layer security to reinforce privacy protections for Aadhaar holders—it introduced a virtual identification so that the actual number need not be shared to authenticate their identity. Simultaneously, it further regulated the storage of the Aadhaar numbers within various databases.&lt;br /&gt;There are more than 1.2 billion Aadhaar holders in the country.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-komal-gupta-february-8-2018-from-march-1-only-registered-devices-to-be-used-to-authenticate-aadhaar'&gt;https://cis-india.org/internet-governance/news/livemint-komal-gupta-february-8-2018-from-march-1-only-registered-devices-to-be-used-to-authenticate-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-02-24T07:59:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/reuters-february-13-2018-rahul-bhatia-critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance">
    <title>Critics of India's ID card project say they have been harassed, put under surveillance</title>
    <link>https://cis-india.org/internet-governance/news/reuters-february-13-2018-rahul-bhatia-critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance</link>
    <description>
        &lt;b&gt;Researchers and journalists who have identified loopholes in India’s massive national identity card project have said they have been slapped with criminal cases or harassed by government agencies because of their work.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://www.reuters.com/article/us-india-aadhaar-breach/critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance-idUSKBN1FX0H0"&gt;Reuters&lt;/a&gt; on February 13, 2018. &lt;span&gt;Reporting by Rahul Bhatia; Editing by Raju Gopalakrishnan&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last month, the Unique Identification Authority of India (UIDAI), the semi-government body responsible for the national identity project, called Aadhaar, or “Basis”, filed a criminal case against the Tribune newspaper for publishing a story that said access to the card’s database could be bought for 500 rupees ($7.82).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reuters spoke to eight additional researchers, activists and journalists who have complained of being harassed after writing about Aadhaar. They said UIDAI and other government agencies were extremely sensitive to criticism of the Aadhaar programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar is a biometric identification card that is becoming integral to the digitisation of India’s economy, with over 1.1 billion users and the world’s biggest database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indians have been asked to furnish their Aadhaar numbers for a host of transactions including accessing bank accounts, paying taxes, receiving subsidies, acquiring a mobile number, settling a property deal and registering a marriage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Tribune said one of its reporters purchased access to a portal that could provide data linked to any Aadhaar cardholder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI complaint, filed with the police cyber cell in the capital, New Delhi, accused the newspaper, the reporter, and others of cheating by impersonation, forgery and unauthorised access to a computer network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Media associations sharply criticised the action - the Editors Guild of India said UIDAI’s move was “clearly meant to browbeat a journalist whose story was of great public interest. It is unfair, unjustified and a direct attack on the freedom of the press.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response, the agency said “an impression was being created in media that UIDAI is targeting the media or whistleblowers or shooting the messenger.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“That is not at all true. It is for the act of unauthorised access, criminal proceedings have been launched,” it said in a statement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Osama Manzar, the director of the Digital Empowerment Foundation, a New Delhi-based NGO, called the government’s prickliness “a clear sign that rather than it wanting to learn how to make Aadhaar a tool of empowerment, it actually wants to use it as a coercive tool of disempowerment”.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Leakage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Last May, the Centre for Internet and Society (CIS), an independent Indian advocacy group, published a report that government websites had inadvertently leaked several million identification numbers from the project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI sent the CIS a legal notice within days, said Srinivas Kodali, one of the authors of the report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The notice alleged that some of the data cited in the report would only be available if the site had been accessed illegally. The UIDAI wrote that the people involved had to be “brought to justice.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Kodali, two more notices followed, addressed to the group’s directors and two researchers, containing more accusations. “They said it was a criminal conspiracy, and demanded that we send individual responses,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS then received questions about its funding from the home ministry section that grants NGOs permission to receive foreign funding, said a source in the group who saw the letter. CIS viewed this as a threat to its funding, the source said. CIS declined to comment on the notices or on the questions about funding.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI did not reply to multiple e-mails seeking comment on the accusations about CIS and similar complaints by other activists and journalists, and officials could not be reached by phone. Officials at the Ministry of Information Technology that supervises UIDAI were unreachable by phone.&lt;br /&gt;In a column in the Economic Times newspaper in January, Ajay Pandey, the head of the UIDAI, wrote: “The data of all Aadhaar holders is safe and secure. One should not believe rumours or claims made on its so-called ‘breach’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;R.S. Sharma, the head of India’s telecom regulatory body, said there was an “orchestrated campaign” against Aadhaar as it was against the interests of those who operated in the shadow economy with fictitious names, or were skimming off subsidies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is going to clean up many systems,” Sharma told a television channel last month. “That’s probably one of the reasons why people realise that this is now becoming too difficult or too dangerous for them.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;That trip to Turkey&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A Bangalore researcher who contributed to the CIS report said scrutiny by police and government officials was a common occurrence, but harassment was stepped up after it was published.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Sometimes people from the police station visit you. Other times from the Home Ministry. It was intimidating,” the researcher said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The person, who asked not to be named for fear of reprisal, said police officers asked questions like “How was that trip to Turkey?',” to make it clear the subjects were under surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When Sameer Kochhar, a social scientist and author of books on Aadhaar, demonstrated how the system’s biometrics safeguards could be bypassed last year, UIDAI filed a police report in New Delhi, a person familiar with the matter said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subsequently, Kochhar received at least three notices from the Delhi Police alleging that he had violated 14 sections under three separate laws, the person said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kochhar’s lawyer declined comment. Delhi Police officials declined comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics have warned Aadhaar could be used as an instrument of state surveillance while data security and privacy regulations are still to be framed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Former central bank governor Raghuram Rajan said last month that the government needed to prove it would protect the privacy of Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I do think that we have to assure the public that their data is safe,” Rajan said. “All these reports about easy availability of data are worrying and we have to ensure security. We cannot just say trust us, trust us, it’s all secure.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/reuters-february-13-2018-rahul-bhatia-critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance'&gt;https://cis-india.org/internet-governance/news/reuters-february-13-2018-rahul-bhatia-critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2018-02-24T07:50:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-print-kaveesha-kohli-and-talha-ashraf-the-vanishing-act-scoop-on-bjp-ram-madhav">
    <title>The mystery of the website which published the ‘scoop’ on BJP’s Ram Madhav</title>
    <link>https://cis-india.org/internet-governance/news/the-print-kaveesha-kohli-and-talha-ashraf-the-vanishing-act-scoop-on-bjp-ram-madhav</link>
    <description>
        &lt;b&gt;The website has since been taken down, but the identity of its creators may not be very easy to find.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Kaveesha Kohli and Talha Ashraf was &lt;a class="external-link" href="https://theprint.in/2018/02/13/the-vanishing-act-scoop-on-bjp-ram-madhav/"&gt;published in The Print&lt;/a&gt; on February 13, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The BJP filed a criminal complaint Sunday against a website after it published a report about an alleged video said to show the party’s national general secretary Ram Madhav in a ‘compromising position’. However, the site no longer exists and experts say it may be difficult to find out who was behind the ‘expose’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Congress MP from Assam, Sushmita Dev, was among those who shared the website’s report, which claimed that the senior BJP functionary and in-charge of the party’s north-east affairs, was allegedly caught in a hotel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But soon after the Nagaland unit of the BJP vehemently denounced it as “fictitious report” and filed an FIR, the website ceased to exist. In its complaint, the  BJP said the “news report is totally false and it seeks to character assassinate Ram Madhav and sabotage the election campaign of the BJP”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the screenshot of the article continues to be shared on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Registration details of &lt;a href="http://thenewsjoint.com/" rel="noopener" target="_blank"&gt;thenewsjoint.com&lt;/a&gt; (now defunct) taken from The Internet Corporation for Assigned Names and Numbers (ICANN) that manages domain names says the site was created and registered on 2 January 2018. The site’s expiry date is 2 January 2019.&lt;/p&gt;
&lt;p&gt;Since its creation, the site has published multiple stories, most of which have been published in the last two weeks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If we look through Google cache, it has published multiple stories about budget aftershocks, Sensex falls by record, Modi Sarkar shuts bamboo budget, etc,” said Pranesh Prakash, policy director at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anyone could have published the website with the domain name The News Joint, said Madhulika Srikuamar, Junior Fellow, Cyber Initiative, Observer Research Foundation.&lt;/p&gt;
&lt;p&gt;“The buyer, for an additional fee, can opt to keep her details private and not reveal her identity online,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The domain name thenewsjoint.com is registered through a private organisation named DomainsByProxy.com. The use of the private organisation is to maintain secrecy and makes it easy to hide the owner’s actual name and address. So how can it be traced?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In order to track the original owners of the domain name, the police will have to take the court order and ask DomainsByProxy to hand over the name and IP address of the persons who registered themselves,” said Prakash.&lt;/p&gt;
&lt;p&gt;And there’s no way to regulate against such sites as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While there are no specific domestic regulations that govern the registration, sale and purchase of domain names, most restrictions on domain name registration stem from intellectual property protections,” said Srikumar.&lt;/p&gt;
&lt;p&gt;In this particular case, it remains unclear whether the website was taken down because of the article on Madhav.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash says it is important to verify whether The News Joint was created to peddle false news, or was pretending to be a genuine news website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It can be compared to the broader news environment in India where very mainstream newspapers, especially their Web desks, very often end up publishing news without any regard for journalistic ethics, without verification of the facts,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-print-kaveesha-kohli-and-talha-ashraf-the-vanishing-act-scoop-on-bjp-ram-madhav'&gt;https://cis-india.org/internet-governance/news/the-print-kaveesha-kohli-and-talha-ashraf-the-vanishing-act-scoop-on-bjp-ram-madhav&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-02-22T14:55:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-february-13-2018-nirmal-john-cci-leaves-google-searching-for-answers">
    <title>CCI leaves Google searching for answers </title>
    <link>https://cis-india.org/internet-governance/news/economic-times-february-13-2018-nirmal-john-cci-leaves-google-searching-for-answers</link>
    <description>
        &lt;b&gt;If you go to the Google search box and type "nuance", the first result that shows up is "CCIBSE 0.00 % Judgement on Google". No, we just made that up. &lt;/b&gt;
        &lt;p&gt;The article by Nirmal John was &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/cci-leaves-google-searching-for-answers/articleshow/62903105.cms"&gt;published in the Economic Times&lt;/a&gt; on February 13, 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Competition Commission of India's (CCI) landmark ruling enforcing a Rs 135.86-crore fine on Google for "search bias" and abusing its "dominant position" is one of the more finely considered judgements in the technology industry. According to Sunil Abraham, executive director of Bengaluru-based research organisation, the Centre for Internet and Society, "CCI is returning to the roots of the competition law, where it is as important to prevent concentration of power as it is to look at how pricing affects people. The emphasis here is now also on protecting innovation and competition itself."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To begin with, according to the CCI, the rules of engagement are different for early-stage markets and mature markets.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CCI has differentiated between early-stage markets and mature markets. In an earlier judgement when two radio cab operators, FastTrack and Meru, had accused Ola of offering discounts and predatory pricing, the CCI had ruled in favour of Ola. CCI had said a lack of market maturity in the cab-hailing space was central to its decision. "At this stage, it is difficult to determine with certainty the long-term impact of this pricing strategy, as the market is yet to mature," the CCI had ruled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The search market is different. Google is the 800-pound gorilla and pretty much the entire zoo in this market. The Google judgement, according to a lawyer who chose to remain off the record, "is based on the principle that a higher degree of responsibility is cast on Google because it has a dominant position in the market".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Google_cases" src="https://economictimes.indiatimes.com/img/62903154/Master.jpg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nub of the argument is that Google, by the showcasing of flights in its search page, has used its role as a gateway to offer a specific service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the judgement notes: "Google is leveraging its strong position in various online search markets to enter into and enhance its position in ancillary markets. Not only does that cause direct harm to competitors in vertical markets, it also causes direct harm to other website owners, since their websites are moved down on SERP [search engine results page] and hence, they receive less clicks as a result of lessened traffic. Further, this also harms consumers as they no longer receive the most relevant results at the top of SERP."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But why should the consumers care? After all they are getting the cheapest price.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is where CCI's second important point comes in. There needs to be a balance between the short-term concerns of consumers with their long-term benefits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if consumers who used Google flights to find options for firming up travel plans may have saved money, the CCI has, in this instance, taken the view that what may be of immediate benefit to the consumer may not be good for them in the long term because of the distortion of the market it creates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from prices, there is another benefit that comes from Google's search aggregation. Sid Talwar of Lightbox Ventures, a Mumbai-based VC firm, brings into light an interesting paradox: Is the addition of an extra step to the search process in consumer interest? Talwar argues that the consumer may be more interested in the most efficient way to find what he is looking for, which is the import of Google's mission. By aggregating results from various sources and offering it right at the search page, it could be fulfilling a consumer need.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is where another facet of the judgement -- the pre-eminence of product and user-interface (UI) design and its relationship with controlling user behaviour -- establishes the anti-competitive nature of Google's search results page. The manipulation of UI design has been key to the debate on anti-competitive behaviour across the world. Europe's competition commissioner Margrethe Vestager became one of the most important proponents of this idea when the European Commission fined Google a record $2.9 billion in mid-2017 for "abusing its dominance in Europe by giving prominent placement in searches to its comparison shopping service and demoting rival offerings".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As NS Nappinai, a Mumbai-based lawyer and author of Technology Laws Decoded, points out, the ruling establishes a precedent and helps the CCI build a reputation for itself as a body that shows strength in evaluating technology. "Tech companies will now have to take cognisance of abuse of their dominant position in India," she says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-february-13-2018-nirmal-john-cci-leaves-google-searching-for-answers'&gt;https://cis-india.org/internet-governance/news/economic-times-february-13-2018-nirmal-john-cci-leaves-google-searching-for-answers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-02-19T02:26:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection">
    <title>A Series of Op-eds on Data Protection</title>
    <link>https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection</link>
    <description>
        &lt;b&gt;I wrote a short series of three op-eds for Asia Times this week.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The first article "&lt;a class="external-link" href="http://www.atimes.com/user-consent-key-data-protection-india/"&gt;User consent is the key to data protection in India&lt;/a&gt;" examines the debate around consent and the arguments made to discard it. I question the premise of big data exceptionalism, particularly in the absence of any mature governance models which address use regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the second article "Robust economic argument for a sound Indian data protection law", I examine the substance of the argument of 'innovation' as a legitimate competing interest with respect to privacy, and questionthe economic arguments made in support of innovation enabled by unregulated access to data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the third article "&lt;a class="external-link" href="http://www.atimes.com/indias-data-protection-needs-graded-enforcement-mechanism/"&gt;India’s data protection law needs graded enforcement mechanism&lt;/a&gt;", I look at the two competing arms of regulation - enforcement and compliance, and how a balance of two is need in India,with an empowered regulator and drawing from the principles from responsive regulation theory.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection'&gt;https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-02-19T02:08:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide">
    <title>The Fundamental Right to Privacy - A Visual Guide</title>
    <link>https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide</link>
    <description>
        &lt;b&gt;Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. This visual guide to the story of privacy law in India and the recent judgement of the Puttaswamy v.
Union of India case is developed by Amber Sinha (research and content) and Pooja Saxena (design and conceptualisation).

&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;The Fundamental Right to Privacy - A Visual Guide: &lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-and-pooja-saxena-the-fundamental-right-to-privacy-a-visual-guide/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;iframe src="//www.slideshare.net/slideshow/embed_code/key/1MMYCXyxa2YBip" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" height="485" width="595"&gt; &lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide'&gt;https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    

   <dc:date>2018-02-16T05:31:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/unpacking-data-protection-law-a-visual-representation">
    <title>Unpacking Data Protection Law: A Visual Representation</title>
    <link>https://cis-india.org/internet-governance/blog/unpacking-data-protection-law-a-visual-representation</link>
    <description>
        &lt;b&gt;This visual explainer unpacking data protection law was developed by Amber Sinha (research) and Pooja Saxena (design), and published as part of the Data Privacy Week celebrations on the Privacy International blog. Join the conversation on Twitter using #dataprivacyweek.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Cross-posted from &lt;a href="https://medium.com/@privacyint/unpacking-data-protection-300e51c5f9b5" target="_blank"&gt;Privacy International blog&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Credits: Flag illustrations, when not created by the authors, are from &lt;a href="http://www.freepik.com/" target="_blank"&gt;Ibrandify / Freepik&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;img src="https://github.com/cis-india/website/blob/master/img/AS-PS_UnpackingDataProtectionLaw_2018_01.png?raw=true" alt="Data protection law systems are usually seen as a dichotomy between the United State of America and the European Union" width="80%" /&gt;
&lt;img src="https://github.com/cis-india/website/blob/master/img/AS-PS_UnpackingDataProtectionLaw_2018_02.png?raw=true" alt="This dichotomy is not an accurate representation of the issue. Today, close to a hundred countries follow the omnibus approach, while less than a dozen, including the US, use the sectoral approach." width="80%" /&gt;
&lt;img src="https://github.com/cis-india/website/blob/master/img/AS-PS_UnpackingDataProtectionLaw_2018_03.gif?raw=true" alt="If too many laws apply to the same actor, compliance becomes difficult. As a result, the sectoral approach to data protection is becoming less relevant." width="80%" /&gt;
&lt;img src="https://github.com/cis-india/website/blob/master/img/AS-PS_UnpackingDataProtectionLaw_2018_04.png?raw=true" alt="Data protection regulation involve interaction between regulators and industry." width="80%" /&gt;
&lt;img src="https://github.com/cis-india/website/blob/master/img/AS-PS_UnpackingDataProtectionLaw_2018_05.gif?raw=true" alt="To be an effective data protection regulator, an entire range of regulatory tools are required, which the regulator can use to reward, support and sanction." width="80%" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/unpacking-data-protection-law-a-visual-representation'&gt;https://cis-india.org/internet-governance/blog/unpacking-data-protection-law-a-visual-representation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-02-15T13:22:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ai-and-manufacturing-and-services-in-india-looking-forward">
    <title>AI and Manufacturing and Services in India: Looking Forward</title>
    <link>https://cis-india.org/internet-governance/blog/ai-and-manufacturing-and-services-in-india-looking-forward</link>
    <description>
        &lt;b&gt;This Report provides an overview of the proceedings of the Roundtable on Artificial Intelligence (AI) in Manufacturing and Services: Looking Forward (hereinafter referred to as ‘the Roundtable’), conducted at The Energy Resource Institute (TERI), in Bangalore on January 19, 2018.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Event Report: &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/ai-and-manufacturing-services"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The Roundtable comprised of participants from different sides of the AI and manufacturing and services spectrum including practitioners, representatives from multinational companies, think tanks, academicians, and researchers. The Roundtable discussed various questions regarding AI in the manufacturing and services industry in India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The round of discussions began with initial observations from the in progress research that the Centre for Internet and Society (CIS) is undertaking, on the use of AI in manufacturing and services. Some of the uses of AI that the research had thus far identified across various sectors included AI platforms in IT services for accurate forecasting for businesses, AI driven automation of routine tasks in manufacturing and production, and AI driven analytics for forecasting in the agriculture sector. The discussion then proceeded to the benefits of using AI - including efficient and effective results, precision, and automation of repetitive maintenance tasks. The draft research also acknowledges that although the use of AI is beneficial in many ways, there are also some key concerns around job displacement, privacy, lack of awareness, and a needed capacity to fully understand and use new AI technologies. The draft research also identified a few key AI initiatives in India, such as Wipro Holmes, TCS Ignio, and G.E, that were providing solutions to help automating software maintenance tasks and helping in the smooth working of SAP (Systems, Applications &amp;amp; Products) operations. Innovative uses of AI in areas such as crop production (M.I.T.R.A.) and dairy optimization (StellApps) were also identified.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To understand the present state of AI and impact of the same, the session was opened to discussion on the following questions: See the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/ai-and-manufacturing-services"&gt;&lt;strong&gt;full report here.&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ai-and-manufacturing-and-services-in-india-looking-forward'&gt;https://cis-india.org/internet-governance/blog/ai-and-manufacturing-and-services-in-india-looking-forward&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Pranav M. Bidare</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2018-02-14T11:13:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/kaplan-herald-february-5-2018-aadhaar-safety-is-regularly-evolving">
    <title>Aadhaar: ‘Safety is regularly evolving‘</title>
    <link>https://cis-india.org/internet-governance/news/kaplan-herald-february-5-2018-aadhaar-safety-is-regularly-evolving</link>
    <description>
        &lt;b&gt;Experts say the new security features will significantly ensure there is no ‘large-scale theft of people‘s identity‘. Alnoor Peermohamed reports.&lt;/b&gt;
        &lt;p class="rbig" style="text-align: justify; "&gt;The blog post was published in &lt;a class="external-link" href="https://kaplanherald.com/2018/02/05/aadhaar-safety-is-regularly-evolving/"&gt;Kaplan Herald &lt;/a&gt;on February 5, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="rbig" style="text-align: justify; "&gt;While the introduction of new features such as face authentication, virtual ID, and limited know-your-customer (KYC) by the Unique Identification Authority of India are being seen as reactions to mounting public pressure over the security of Aadhaar, experts, who have helped build the citizen identity system, say these have been in the pipeline for a long time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pegged to be fully functional by July 1, the new features will make Aadhaar more secure, but that hasn‘t stopped the UIDAI from drawing flak over the recent issue of rogue agents selling demographic data of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, the agency‘s handling of the issue has not inspired confidence among the public and security researchers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts say for a system of Aadhaar‘s size, security is continually evolving.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lalitesh Katragadda, former head of Google‘s product centre in India and who also helped build Aadhaar, says as a country we need to understand there‘s ‘no such thing as a 100 per cent secure system‘.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While security gaps will always exist, he says it‘s the UIDAI‘s duty to ensure there‘s no ‘large-scale theft of people‘s identity‘.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to him, the new security features will help significantly in this regard.&lt;/p&gt;
&lt;p class="rbig" style="text-align: justify; "&gt;Face authentication will be another biometric Aadhaar will begin offering to combat the reportedly high failure rates of fingerprint authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system will use common Webcams to capture photos of individuals and match them with the existing photo on the UIDAI‘s database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system will not use any high-end hardware backed facial recognition like the recently launched iPhone X, which the company claims is more accurate than its previous fingerprint authentication technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI will work around this issue by clubbing face authentication with other forms of authentication — fingerprint, iris scan or a one-time password sent to a user‘s mobile phone.&lt;/p&gt;
&lt;p class="rbig" style="text-align: justify; "&gt;While it isn‘t known how exactly the feature will be built into apps relying on Aadhaar authentication, Srikanth Nadhamuni, the former chief technology officer of Aadhaar, envisions a scenario where a photo of an individual could be captured and matched when fingerprint authentication fails, in order to improve the probability of a match.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But even this isn‘t a foolproof plan, some believe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Your face is again a biometric, and that comes with the same host of issues that is plaguing the other biometrics that have so far been used,” says Sunil Abraham, executive director at the Bengaluru-based think-tank, Centre for Internet and Society.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/kaplan-herald-february-5-2018-aadhaar-safety-is-regularly-evolving'&gt;https://cis-india.org/internet-governance/news/kaplan-herald-february-5-2018-aadhaar-safety-is-regularly-evolving&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-02-07T16:44:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-komal-gupta-february-7-2017-to-protect-data-dont-opt-for-plastic-or-laminated-Aadhaar">
    <title>To protect data, don’t opt for plastic or laminated Aadhaar card: UIDAI</title>
    <link>https://cis-india.org/internet-governance/news/livemint-komal-gupta-february-7-2017-to-protect-data-dont-opt-for-plastic-or-laminated-Aadhaar</link>
    <description>
        &lt;b&gt;Unauthorized printing of Aadhaar cards could render the QR (quick response) code dysfunctional or even expose personal data without an individual’s informed consent, UIDAI says.&lt;/b&gt;
        &lt;p&gt;The article by Komal Gupta was &lt;a class="external-link" href="http://www.livemint.com/Politics/5Gr7j4bgNoLRVtf10cjrzK/To-protect-data-dont-opt-for-plastic-or-laminated-Aadhaar.html"&gt;published by Livemint&lt;/a&gt; on February 7, 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="S3l" style="text-align: justify; "&gt;To protect information provided by holders of Aadhaar, the Unique Identification Authority of India (UIDAI) on Tuesday cautioned people against opting for plastic or laminated “smart” cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unauthorized printing of the cards could render the QR (quick response) code dysfunctional or even expose personal data without an individual’s informed consent, it said in a statement on Tuesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, opting for plastic or laminated cards opened up the possibility of Aadhaar details (personal sensitive demographic information) being shared with devious elements without the informed consent of holders, the statement added.&lt;/p&gt;
&lt;p&gt;According to UIDAI, the Aadhaar letter sent by it, a cutaway portion or downloaded versions of Aadhaar on ordinary paper or mAadhaar are perfectly valid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If a person has a paper Aadhaar card, there is absolutely no need to get his/her Aadhaar card laminated or obtain a plastic Aadhaar card or so called smart Aadhaar card by paying money. There is no concept such as smart or plastic Aadhaar card,” UIDAI chief executive officer Ajay Bhushan Pandey said in a statement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Printing Aadhaar on a plastic/PVC sheet privately can cost anywhere between Rs50 and Rs300 or more, UIDAI said. It added that a printout of the downloaded Aadhaar card, even in black and white, is as valid as the original Aadhaar letter sent by UIDAI.&lt;/p&gt;
&lt;p&gt;It added that in case a person loses his Aadhaar card, he can download the card free from &lt;i&gt;https://eaadhaar.uidai.gov.in.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pandey asked holders not to share Aadhaar number or personal details with unauthorized agencies for getting the card laminated, or printed on plastic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The agency also directed unauthorized agencies not to collect Aadhaar information from people, reminding them that collecting such information or unauthorized printing of Aadhaar card is a criminal offence punishable with imprisonment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I feel a lot more has to be done by UIDAI. Sadly, by encouraging people to rely on printed Aadhaar ‘cards’, UIDAI is ending up with the worst of both worlds with respect to personal data protection: photocopies of so-called Aadhaar cards/letter are being circulated to facilitate identity fraud as well as the kind of dangerous personal data disclosures that centralized databases enable,” said Pranesh Prakash, policy director at think tank Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, UIDAI put in place a two-layer security to reinforce privacy protections for Aadhaar holders—it introduced a virtual identification so that the actual number need not be shared to authenticate their identity. Simultaneously, it further regulated the storage of the Aadhaar numbers within various databases.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-komal-gupta-february-7-2017-to-protect-data-dont-opt-for-plastic-or-laminated-Aadhaar'&gt;https://cis-india.org/internet-governance/news/livemint-komal-gupta-february-7-2017-to-protect-data-dont-opt-for-plastic-or-laminated-Aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-02-07T01:00:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india">
    <title>CIS Submission to the Committee of Experts on a Data Protection Framework for India</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ‘White Paper of the Committee of Experts on a Data Protection Framework for India’ (“White Paper”) released by the Ministry of Electronics and Information Technology. The White paper was drafted by a Committee of Expert (“Committee”) constituted by the Ministry. CIS has conducted research on the issues of privacy, data protection and data security since 2010 and is thankful for the opportunity to put forth its views. The submission was made on January 31, 2018.&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;The submission is divided into four parts — I. Preliminary, II. Scope and Exemption, III. Grounds of Processing, Obligations of Entities and Individual Rights and IV. Regulation and Enforcement. The submission follows the same the order as adopted by the White Paper.&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;&lt;/h4&gt;
&lt;p&gt;&lt;b&gt;Please access the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/data-protection-submission"&gt;full submission here&lt;/a&gt;.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india'&gt;https://cis-india.org/internet-governance/blog/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-04-18T16:39:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india">
    <title>Submission to the Committee of Experts on a Data Protection Framework for India</title>
    <link>https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ‘White Paper of the Committee of Experts on a Data Protection Framework for India’ (“White Paper”) released by the Ministry of Electronics and Information Technology. The White paper was drafted by a Committee of Expert (“Committee”) constituted by the Ministry. CIS has conducted research on the issues of privacy, data protection and data security since 2010 and is thankful for the opportunity to put forth its views. The submission was made on January 31, 2018.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india'&gt;https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-02-05T13:39:00Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/Qjanuary-2018-newsletter">
    <title>January 2018 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/Qjanuary-2018-newsletter</link>
    <description>
        &lt;b&gt;January 2018 Newsletter&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Dear readers,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The paper titled &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/patent-working-requirements-and-complex-products"&gt;"Patent Working Requirements and Complex Products" &lt;/a&gt;has been published in the latest issue of the NYU Journal of Intellectual Property and Entertainment Law. It is one of the outputs of the Pervasive Technology project and has been authored by Prof. Jorge L. Contreras, Paxton M. Lewis, and Rohini Lakshané.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/submission-to-dipp-at-meeting-with-ip-stakeholders"&gt;made a submission to the Department of Industrial Planning and Promotion on mobile patents&lt;/a&gt;. CIS offered its assistance on matters aimed at developing a suitable policy framework for SEPs and FRAND in India, and, working towards sustained innovation, manufacture and availability of mobile technologies in India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The use of Artificial Intelligence (AI) in healthcare in India is increasing with new startups and large ICT companies offering AI solutions for healthcare challenges in the country. &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/artificial-intelligence-and-the-healthcare-industry-in-india" style="text-align: left; "&gt;The report&lt;/a&gt;&lt;span style="text-align: left; "&gt; by &lt;/span&gt;&lt;span&gt;by Yesha Paul, Elonnai Hickok, Amber Sinha and Udbhav Tiwari &lt;span&gt;seeks to map the present state of AI in the healthcare sector in India.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;About 27% of India's population is still illiterate or barely literate. Most privacy policies and terms of services for web and mobile applications are in English and therefore it is only 10% of us who can actually read them before we provide our consent. The article by Sunil Abraham was &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/deccan-herald-january-20-2018-sunil-abraham-data-protection-we-can-innovate-leapfrog"&gt;published in Deccan Herald&lt;/a&gt; on January 20, 2018.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;CIS &lt;a class="external-link" href="https://cis-india.org/telecom/blog/submission-to-trai-consultation-on-inputs-for-formulation-of-national-telecom-policy-2018"&gt;made a submission to TRAI Consultation&lt;/a&gt; on inputs to the National Telecom Policy. CIS in its submission also recommended what all should be the main objectives of TRAI while drafting the next edition of National Telecom Policy.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Under a &lt;a class="external-link" href="https://cis-india.org/raw/life-of-a-tuple-nrc-assam-citizen-identification-infrastructure"&gt;research grant from the Azim Premji University CIS&lt;/a&gt; has initiated a study of the ongoing updation process of the National Register of Citizens (NRC) in Assam and the resultant reform of citizen identification infrastructure in India.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The &lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-shyam-ponappa-january-3-2018-2g-judgment-of-december-2017"&gt;2G judgment of December 2017&lt;/a&gt; provides a critique of how no proper evidence was presented on existence of an FCFS policy and its improper implementation, wrote Shyam Ponappa in his article in the Business Standard which was published on January 3, 2018. &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The following articles were written by CIS members:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-december-3-2017-digital-native-memory-card-is-full"&gt;Digital native: Memory card is full&lt;/a&gt;&lt;span&gt; (Nishant Shah; Indian Express; January 3, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-shyam-ponappa-january-3-2018-2g-judgment-of-december-2017"&gt;The 2G Judgment of December 2017: What Was It About?&lt;/a&gt; (Shyam Ponappa; Business Standard; January 3, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/business-standard-sunil-abraham-january-10-fixing-aadhaar"&gt;Fixing Aadhaar: Security developers' task is to trim chances of data breach&lt;/a&gt; (Sunil Abraham; Business Standard; January 10, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/governance-now-elonnai-hickok-another-step-towards-privacy-law-data-protection"&gt;Another Step towards Privacy Law&lt;/a&gt; (Elonnai Hickok; Governance Now; January 15, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/deccan-herald-january-20-2018-sunil-abraham-data-protection-we-can-innovate-leapfrog"&gt;Data Protection: We can innovate, leapfrog&lt;/a&gt; (Sunil Abraham; Deccan Herald; January 20, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;&lt;br /&gt;CIS in the News:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-and-samanwaya-rautray-from-net-neutrality-to-ibc-and-aadhaar-how-vidhi-is-framing-key-government-legislation"&gt;From net neutrality to IBC &amp;amp; Aadhaar, how Vidhi is framing key government legislation&lt;/a&gt; (Surabhi Agarwal and Samanwaya Rautray; Economic Times; January 4, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-komal-gupta-january-7-2018-uidai-denies-any-breach-of-aadhaar-database"&gt;UIDAI denies any breach of Aadhaar database&lt;/a&gt; (Komal Gupta; Livemint; January 7, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-january-9-2018-manasa-venkataraman-ajay-patri-token-security-or-tokenized-security"&gt;Token security or tokenized security?&lt;/a&gt; (Manasa Venkataraman and Ajay Patri; Livemint; January 9, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy"&gt;UIDAI introduces new two-layer security system to improve Aadhaar privacy&lt;/a&gt; (Economic Times; January 11, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/indian-express-january-11-2018-"&gt;Hammered government offers Virtual ID firewall to protect your Aadhaar &lt;/a&gt;(New Indian Express; January 11, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindu-yuthika-bhargava-january-11-2018-virtual-aadhaar-id-too-little-too-late"&gt;Virtual Aadhaar ID: too little, too late?&lt;/a&gt; (Yuthika Bhargava; Hindu; January 11, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bloomberg-quint-january-11-2018-india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy"&gt;India To Introduce Virtual ID For Aadhaar To Strengthen Privacy&lt;/a&gt; (Bloomberg Quint; January 11, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/uidais-virtual-id-limited-kyc-does-little-to-protect-aadhaar-data-already-collected-say-critics"&gt;UIDAI's Virtual ID, limited KYC does little to protect Aadhaar data already collected, say critics&lt;/a&gt; (Business Today; January 12, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/ndtv-sukriti-dwivedi-january-13-2018-aadhaar-body-talked-about-virtual-id-7-years-ago-put-it-off-uidai-chief"&gt;Aadhaar Body Talked About Virtual ID 7 Years Ago, Put It Off: UIDAI Chief&lt;/a&gt; (Sukriti Dwivedi; NDTV; January 13, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-january-14-2018-pranshu-rathee-bengaluru-gives-data-safety-tips-to-panel"&gt;Bengaluru gives data safety tips to panel &lt;/a&gt;(Deccan Herald; January 14, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindu-businessline-january-16-2018-sravanthi-challapalli-is-your-personal-information-under-lock-and-key"&gt;Is your personal information under lock and key?&lt;/a&gt; (Sravanthi Challapalli; Hindu Businessline; January 16, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/first-post-january-18-2018-aadhaar-privacy-debate-how-the-12-digit-number-went-from-personal-identifier-to-all-pervasive-transaction-tool"&gt;Aadhaar-privacy debate: How the 12-digit number went from personal identifier to all pervasive transaction tool&lt;/a&gt; (First Post; January 18, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-komal-gupta-remya-nair-january-24-2018-paytm-payments-bank-woos-corporates-with-digital-incentives"&gt;Paytm Payments Bank woos corporates with digital incentives&lt;/a&gt; (Komal Gupta and Remya Nair; Livemint; January 24, 2018).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/business-standard-january-25-2018-alnoor-peermohamed-aadhaars-new-security-measures-are-good-it-is-still-work-in-progress"&gt;Aadhaar's new security measures are good, it is still work in progress&lt;/a&gt; (Alnoor Peermohamed; Business Standard; January 25, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/government-of-odisha-adopting-creative-commons-license-to-promote-transparency-and-access-to-knowledge"&gt;Government of Odisha adopting Creative Commons License to Promote Transparency and Access to Knowledge&lt;/a&gt; (Sailesh Patnaik; January 17, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/experience-and-learning-outcome-from-wikipedia-education-program"&gt;Experience and Learning outcome from Wikipedia Education Program&lt;/a&gt; (Lakshmi Karlekar; January 30, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Events Organized&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Marathi_Wikipedia_Workshop_at_Dept._of_Mass_Communication,_Solapur_University"&gt;Marathi Wikipedia Workshop at Dept. of Mass Communication, Solapur University&lt;/a&gt; (Organized by CIS-A2K and Dept of Mass Communication, Solapur University; Solapur; January 2, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Marathi_Wikipedia_Workshop_at_Dayanand_College,_Solapur"&gt;Marathi Wikipedia Workshop at Dayanand College, Solapur&lt;/a&gt; (Organized by CIS-A2K and Dayanand College, Solapur; Solapur; January 3, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Marathi_Wikipedia_Workshop_at_Willingdon_College,_Sangli"&gt;Marathi Wikipedia Workshop at Willingdon College, Sangli&lt;/a&gt; (Organized by CIS-A2K and Willingdon College; Sangli; January 5, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Marathi_Wikipedia_Workshop_at_Govt.Science_%26_Arts_College,_Aurangabad"&gt;Marathi Wikipedia Workshop at Govt.Science &amp;amp; Arts College, Aurangabad&lt;/a&gt; (Organized by CIS-A2K and Govt.Science &amp;amp; Arts College; Aurangabad; January 9, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Marathi_Wikipedia_Workshop_at_Dr.Babasaheb_Ambedkar_Marathwada_Vidyapeeth"&gt;Marathi Wikipedia Workshop at Dr.Babasaheb Ambedkar Marathwada Vidyapeeth&lt;/a&gt; (Organized by CIS-A2K and Dr. Babasaheb Ambedkar Marathwada University; Aurangabad; January 10, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Marathi_Wikipedia_Workshop_at_Shivaji_University,_Kolhapur"&gt;Marathi Wikipedia Workshop at Shivaji University, Kolhapur &lt;/a&gt;(Organized by CIS-A2K and Shivaji University; Kolhapur; January 15, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%8D%E0%B0%B0%E0%B0%BE%E0%B0%9C%E0%B1%86%E0%B0%95%E0%B1%8D%E0%B0%9F%E0%B1%81/%E0%B0%86%E0%B0%82%E0%B0%A7%E0%B1%8D%E0%B0%B0_%E0%B0%B2%E0%B1%8A%E0%B0%AF%E0%B1%8B%E0%B0%B2_%E0%B0%95%E0%B0%B3%E0%B0%BE%E0%B0%B6%E0%B0%BE%E0%B0%B2/2018/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%A1%E0%B1%87%E0%B0%9F%E0%B0%BE_%E0%B0%95%E0%B0%BE%E0%B0%B0%E0%B1%8D%E0%B0%AF%E0%B0%B6%E0%B0%BE%E0%B0%B2_-_%E0%B0%9C%E0%B0%A8%E0%B0%B5%E0%B0%B0%E0%B0%BF"&gt;Wikidata Workshop&lt;/a&gt; (Organized by CIS-A2K and Andhra Loyola College; Vijaywada; January 20 - 21, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/events/train-the-trainer-2018"&gt;Train the Trainer 2018&lt;/a&gt; (Organized by CIS-A2K; Mysore; January 26 - 28, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;►&lt;/span&gt;&lt;span style="text-align: justify; "&gt;Pervasive Technologies&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Research Paper&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/patent-working-requirements-and-complex-products"&gt;Patent Working Requirements and Complex Products&lt;/a&gt; (Jorge L. Contreras, Rohini Lakshané and Paxton M. Lewis; JIPEL NYU Journal of Intellectual Property &amp;amp; Entertainment Law, Vol. 7 - No.1 on January 16, 2018). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Submission&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/submission-to-dipp-at-meeting-with-ip-stakeholders"&gt;Submission to DIPP at Meeting with IP Stakeholders&lt;/a&gt; (Anubha Sinha; January 1, 2018). &lt;i&gt;The submission was made in December 2017 but it was published on the website in January 2018&lt;/i&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/artificial-intelligence-and-the-healthcare-industry-in-india"&gt;Artificial Intelligence and the Healthcare Industry in India&lt;/a&gt; (Yesha Paul, Elonnai Hickok, Amber Sinha and Udbhav Tiwari (Ecosystem mapping by Shweta Mohandas, Sidharth Ray and Elonnai Hickok. Designed by Saumyaa Naidu under Creative Commons Attribution 4.0 International License; January 26, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;strong&gt;
&lt;p style="text-align: justify; "&gt;Events Organized&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/roundtable-on-ai-and-manufacturing-and-services"&gt;Roundtable on A.I. and Manufacturing and Service&lt;/a&gt;s (TERI, Bengaluru; January 19, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/null-bangalore-meet-january-19"&gt;null Bangalore Meet: Special Session on Digital Identity and Privacy&lt;/a&gt; (CIS, Bengaluru; January 19, 2018). Sunil Abraham gave a talk.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p style="text-align: justify; "&gt;►Free Speech and Expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Blog Entries&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/internet-governance-forum-report-2017"&gt;Internet Governance Forum Report 2017&lt;/a&gt; (Shweta Mohandas; January 11, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/mobile-net-ban-during-peaceful-protest-leaves-farmers-confused"&gt;Mobile net ban during peaceful protest leaves farmers confused&lt;/a&gt; (Shruti Jain; January 19, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/2018hurt-sentiments2019-cost-udaipur-internet-access-for-four-days"&gt;‘Hurt sentiments’ cost Udaipur internet access for four days&lt;/a&gt; (Shruti Jain; January 19, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="text-align: justify; "&gt;&lt;strong&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources, and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Article &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/submission-to-trai-consultation-on-inputs-for-formulation-of-national-telecom-policy-2018"&gt;Submission to TRAI Consultation on "Inputs for Formulation of National Telecom Policy - 2018"&lt;/a&gt; (Pranesh Prakash; January 25, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;span&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;a class="external-link" href="https://cis-india.org/raw/life-of-a-tuple-nrc-assam-citizen-identification-infrastructure"&gt;Life of a Tuple: National Register of Citizens (NRC) and the Reform of Citizen Identification Infrastructure in Assam&lt;/a&gt; (Sumandro Chattapadhyay; January 22, 2018). All posts related to the study can be &lt;a class="external-link" href="https://cis-india.org/raw/life-of-a-tuple/"&gt;found here&lt;/a&gt;.&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;strong&gt;&lt;br /&gt;&lt;span&gt;-----------------------------------&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;br /&gt;&lt;/a&gt;&lt;span&gt;----------------------------------- &lt;/span&gt;&lt;/p&gt;
&lt;div class="keyResearch"&gt;
&lt;div id="parent-fieldname-text-8a5942eb6f4249c5b6113fdd372e636c"&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="viewlet-below-content-body"&gt;
&lt;div class="visualClear"&gt;&lt;/div&gt;
&lt;div class="documentActions"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/Qjanuary-2018-newsletter'&gt;https://cis-india.org/about/newsletters/Qjanuary-2018-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2018-03-01T01:35:56Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
