<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 721 to 735.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/aadhaar-linking-deadline-approaches-here-are-all-the-myths-and-facts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/twitter-india-workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/state-led-interference-in-encrypted-systems-a-public-debate-on-different-policy-approaches"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-december-1-2017-inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/november-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/figi-symposium-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-november-23-2017-fcc-plan-to-repeal-net-neutrality-may-not-impact-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-">
    <title>Breeding misinformation in virtual space</title>
    <link>https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-</link>
    <description>
        &lt;b&gt;A well-informed citizenry and institutions that provide good information are fundamental to a functional democracy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The phenomenon of fake news has rece-ived significant sc-holarly and  media attention over the last few years. In March, Sir Tim Berners Lee,  inventor of the World Wide Web, has called for a crackdown on fake news,  stating in an open letter that “misinformation, or fake news, which is  surprising, shocking, or designed to appeal to our biases, can spread  like wildfire.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gartner, which annually predicts what the next year in technology  will look like, highlighted ‘increased fake news’  as one of its  predictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report states that by 2022, “majority of individuals in mature  economies will consume more false information than true information. Due  to its wide popularity and reach, social media has come to play a  central role in the fake news debate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Researchers have suggested that rumours penetrate deeper within a  social network than outside, indicating the susceptibility of this  medium. Social networks such as Facebook and communities on messaging  services such as Whats-App groups provide the perfect environment for  spreading rumours. Information received via friends tends to be trusted,  and online networks allow in-dividuals to transmit information to many  friends at once.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to understand the recent phenomenon of fake news, it is  important to recognise that the problem of misinformation and propaganda  has existed for a long time. The historical examples of fake news go  back centuries where, prior to his coronation as Roman Emperor, Octavian  ran a disinformation campaign against Marcus Antonius to turn the Roman  populace against him.&lt;/p&gt;
&lt;p class="imgCenter" style="text-align: justify; "&gt;&lt;a class="objectNew"&gt;&lt;img alt="aa" src="http://images.asianage.com/images/fdeb4b878fd86fc0af509a2eb0b6927a4c6fdede-tc-img-preview.jpg" title="aa" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The advent of the printing press in the 15th century led to  widespread publication; however, there were no standards of verification  and journalistic ethics. Andrew Pettigrew wri-tes in his The Invention  of News, that news reporting in the 16th and 17th centuries was full of  portents about “comets, celestial apparitions, freaks of nature and  natural disasters.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, the immediate cause for the 1857 War of Indepen-dence was  rumours that the bones of cows and pigs were mixed with flour and used  to grease the cartridges used by the sepoys.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Leading up to the Second World War, the radio emerged as a strong  medium for dissemination of disinformation, used by the Nazis and other  Axis powers. More recently, the milk miracle in the mid-1990s consisting  of stories of the idol of Ganesha drinking milk was a popular fake news  phenomenon. In 2008, rumours about the popular snack, Kurkure, being  made out of plastic became so widespread that Pepsi, its holding  company, had to publicly rebut them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A quick survey by us at the Centre of Internet and Society, for a  forthcoming report, of the different kinds of misinformation being  circulated in India, suggested four different kinds of fake news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first is a case of manufactured primary content. This includes  instances where the entire premise on which an argument is based is  patently false. In August 2017, a leading TV channel reported that  electricity had been cut to the Jama Masjid in New Delhi for non-payment  of bills. This was based on a false report carried by a news portal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second kind of fake news involves manipulation or editing of  primary content so as to misrepresent it as something else. This form of  fake news is often seen with respect to multimedia content such as  images, pictures, audios and videos. These two forms of fake news tend  to originate outside traditional media such as newspapers and television  channels, and can be often sourced back to social media and WhatsApp  forwards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, we see such unverified stories being picked up by  traditional media. Further, there are instances where genuine content  such as text and pictures are shared with fallacious contexts and  descriptions. Earlier this year, several dailies pointed out that an  image shared by the ministry of home affairs, purportedly of the  floodlit India-Pakistan border, was actually an image of the  Spain-Morocco border. In this case, the image was not doctored but the  accompanying information was false.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, more complicated cases of misinformation involve the primary  content itself not being false or manipulated, but the facts when they  are reported may be quoted out of context. Most examples of  misinformation spread by mainstream media, which has more evolved  systems of fact checking and verification, and editorial controls, would  tend to fall under this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, there are instances of lack of diligence in fully  understanding the issues before reporting. Such misrepresentations are  often encountered while reporting in fields that require specialised  knowledge, such as science and technology, law, finance etc. Such forms  of misinformation, while not suggestive of malafide intent can still  prove to be quite dangerous in shaping erroneous opinions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the widespread dissemination of fake news contributes greatly  to its effectiveness, it also has a lot to do with the manner in which  it is designed to pander to our cognitive biases. Directionally  motivated reasoning prompts people confronted with political information  to process it with an intention to reach a certain pre-decided  conclusion, and not with the intention to assess it in a dispassionate  manner. This further results in greater susceptibility to confirmation  bias, disconfirmation bias and prior attitude effect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fake news is also linked to the idea of “naïve realism,” the belief  people have that their perception of reality is the only accurate view,  and those in disagreement are necessarily uninformed, irrational, or  biased. This also explains why so much fake news simply does not engage  with alternative points of view.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A well-informed citizenry and institutions that provide good  information are fundamental to a functional democracy. The use of the  digital medium for fast, unhindered and unchecked spread of information  presents a fertile ground for those seeking to spread misinformation.  How we respond to this issue will be vital for democratic societies in  our immediate future. Fake news presents a complex regulatory challenge  that requires the participation of different stakeholders such as the  content disseminators, platforms, norm guardians which include  institutional fact checkers, trade organisations, and “name-and-shaming”  watchdogs, regulators and consumers.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-'&gt;https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-08T02:24:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/aadhaar-linking-deadline-approaches-here-are-all-the-myths-and-facts">
    <title>Aadhaar linking deadline approaches: Here are all the myths and facts</title>
    <link>https://cis-india.org/internet-governance/news/aadhaar-linking-deadline-approaches-here-are-all-the-myths-and-facts</link>
    <description>
        &lt;b&gt;Love it or hate it, you just can't escape it. We're talking about Aadhaar, which is a bigger buzzword than usual in the face of the looming end-December deadline for linkages with bank accounts, PPF, insurance policies, ration card and perhaps even PAN. As India rushes to comply, there are a number of myths and half-truth making the rounds. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="http://www.businesstoday.in/current/policy/aadhar-linking-deadline-last-day-uidai-bank-account/story/265465.html"&gt;Business Today&lt;/a&gt; on December 7, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The official website of the Unique Identification Authority of India (UIDAI), the body issuing the biometrics-based Aadhaar number, helpfully lists out some of them, while others came to light when activists took up cudgels on behalf of Aadhaar-harassed citizens. But, either ways, you need to know the hard truth behind them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Myth:&lt;/strong&gt; Aadhaar-linkage is not only mandatory for every Indian citizen but also every person residing in the country.&lt;br /&gt;&lt;strong&gt;Fact:&lt;/strong&gt; In a notification dated May 11, 2017, the Central Board of Direct Taxes exempted the following categories from mandatory Aadhaar enrolment: &lt;br /&gt;Those who are not citizens of India, non-resident Indians as per Income Tax Laws, those aged over 80 years at any time during the tax year, and the residents of Assam, Meghalaya and Jammu &amp;amp; Kashmir.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has also made it clear that NRIs and those holding the Overseas Citizen of India (OCI) card are not eligible to obtain Aadhaar as per the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016. "NRI/OCI need not verify their bank account or SIM or PAN with Aadhaar. If required, they may inform the service provider(s) that they being NRI/OCI are exempted from Aadhaar verification," the UIDAI had said on Twitter way back in October, and followed it up with a circular in mid-November.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the Aadhaar Act, only a "resident" is entitled to obtain Aadhaar, which refers to an individual, irrespective of nationality, who has resided in India for a period aggregating 182 days or more in the year immediately preceding the date of application for enrolment. So, this means that even NRIs and expats fulfilling the above criteria can apply for Aadhaar, but they cannot be forced to link their Indian bank accounts with it.&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Myth:&lt;/strong&gt; I had to give my fingerprints to get a SIM card and now the telecom company will keep my biometrics for future use&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Fact:&lt;/strong&gt; According to UIDAI, a telecom company cannot store your biometrics at its end. All the biometrics collected should be encrypted by the service provider and sent to UIDAI at that instant itself. Any storage of biometric by any agency is a serious crime punishable with up to three years of imprisonment under the Aadhaar Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Myth:&lt;/strong&gt; Aadhaar is prone to data breaches and leaks&lt;strong&gt;&lt;br /&gt;Fact: &lt;/strong&gt;Yes, there have been at least two serious leaks reported in the media, but the UIDAI has denied both of them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In May 2017, The Centre for Internet and Society, a Bangalore-based non-profit research organisation, had reportedly investigated  three government portals linked with social welfare schemes that together leaked Aadhaar information of around 1.3 crore people. Then, two months later, came news about over 200 government websites Aadhaar information public. This raised a lot of concerns and detractors cried themselves hoarse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the UIDAI, some agencies of central or state governments had been proactively putting up details of their beneficiaries as required under the RTI Act. While the said information was promptly removed from the offending websites, the authority points out that no biometrics were displaced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Therefore to say that Aadhaar has been breached, data has been leaked, is completely incorrect and misleading," it says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, the Aadhaar Act and IT Act are now in place, which impose restrictions on publication of Aadhaar numbers, bank account, and other personal details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Myth:&lt;/strong&gt; Aadhaar has a poorly verified database.&lt;br /&gt;&lt;strong&gt;Fact:&lt;/strong&gt; Several security measures are in place to ensure that Aadhaar enrolment system is secure.  It is done through registrars-credible institutions like state government, banks, Common Service Centres which employ enrolment agencies empanelled by UIDAI. The latter, in turn, employ operators certified by the authority. Aadhaar enrolments are done only through customized software developed and provided by UIDAI. Every day, the operators have to log into the enrolment machine through their Aadhaar number and fingerprints. Once an enrolment is done, the operator is required to sign through his/ her biometrics. Moreover, at the time of enrolment itself, the captured data is encrypted and can't be read by anyone other than the UIDAI server.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Myth:&lt;/strong&gt; People are being denied benefits and rations because they don't have Aadhaar or because of biometrics issues&lt;strong&gt;&lt;br /&gt;Fact:&lt;/strong&gt; UIDAI CEO Ajay Bhushan Pandey has clarified to the media that though Section 7 of the Aadhaar Act stipulates that benefits and subsidies from the Consolidated Fund of India shall be given on the basis of Aadhaar or proof of possession of an Aadhaar number, the lack of it cannot be grounds for denial. "Section 7 specifies that till Aadhaar number is prescribed, the benefits should be given through alternate means of identification," Pandey said to The Hindu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Act also provides for statutory protection to those who are unable to authenticate because of worn-out fingerprints, medical conditions like leprosy or other reasons such as technical faults. "The field agencies have been accordingly instructed through the notifications issued by the government. In spite of this, if a person is denied because he does not have Aadhaar or he is unable to biometrically authenticate, it is undisputedly a violation of instructions issued by the government and such violators have to be punished," added Pandey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Myth:&lt;/strong&gt; Publicly sharing the Aadhaar number, to track a lost Amazon package, for instance, makes one susceptible to identity fraud&lt;br /&gt;&lt;strong&gt;Fact:&lt;/strong&gt; Your Aadhaar number, just like your mobile phone number or bank account number, is not a secret though it is certainly sensitive personal information. Just as no one can hack into your bank account using just the account number, identity theft is impossible using the Aadhaar number alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What you need to assiduously protect are things like passwords, including OTPs, and PINs. A prudent practice would be to never put up any sensitive personal information on websites or social media platforms.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/aadhaar-linking-deadline-approaches-here-are-all-the-myths-and-facts'&gt;https://cis-india.org/internet-governance/news/aadhaar-linking-deadline-approaches-here-are-all-the-myths-and-facts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-01T16:04:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/twitter-india-workshop">
    <title>Twitter India Workshop </title>
    <link>https://cis-india.org/internet-governance/news/twitter-india-workshop</link>
    <description>
        &lt;b&gt;Manasa Rao attended a workshop organized by Twitter titled "The Network Effort". It was an effort by the Public Policy and Government team at Twitter to enable NGOs and non-profits to conduct successful Twitter campaigns and teach them best practices.&lt;/b&gt;
        &lt;p&gt;The handbook for the workshop &lt;a class="external-link" href="https://about.twitter.com/content/dam/about-twitter/values/twitter-for-good/NGO-Handbook-Eng-Digital.pdf"&gt;is here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/twitter-india-workshop'&gt;https://cis-india.org/internet-governance/news/twitter-india-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-01-01T16:10:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/state-led-interference-in-encrypted-systems-a-public-debate-on-different-policy-approaches">
    <title>State-led interference in encrypted systems: A public debate on different policy approaches</title>
    <link>https://cis-india.org/internet-governance/news/state-led-interference-in-encrypted-systems-a-public-debate-on-different-policy-approaches</link>
    <description>
        &lt;b&gt;State-led interference in encrypted systems. Sunil Abraham is a speaker for this event.
&lt;/b&gt;
        &lt;ul&gt;
&lt;li&gt;Proposer's Name: Mr. Carlos Alberto Afonso&lt;/li&gt;
&lt;li&gt;Proposer's Organization: Instituto Nupef&lt;/li&gt;
&lt;li&gt;Co-Proposer's Name: Mr. Hartmut Glaser&lt;/li&gt;
&lt;li&gt;Co-Proposer's Organization: CGI.br&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Co-Organizers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr., Carlos, AFONSO,Civil Society, Instituto Nupef&lt;/li&gt;
&lt;li&gt;Mr. Hartmut, GLASER, Technical Community, CGI.br&lt;/li&gt;
&lt;li&gt;Ms. Jamila, VENTURINI,Technical Community, NIC.br&lt;/li&gt;
&lt;li&gt;Mr. Diego, CANABARRO, Technical Community, NIC.br&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Session Format: Other - 90 Min&lt;br /&gt;Format description: The session is designed to host a dialectic debate segment followed by a traditional round-table segment structured around a Q&amp;amp;A format.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Proposer:&lt;br /&gt;Country: Brazil&lt;br /&gt;Stakeholder Group: Civil Society&lt;br /&gt;&lt;br /&gt;Co-Proposer:&lt;br /&gt;Country: Brazil&lt;br /&gt;Stakeholder Group: Technical Community&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speakers&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Christoph Steck (Telefonica, Spain)&lt;/li&gt;
&lt;li&gt;Riana Pfefferkorn (Stanford CIS, EUA)&lt;/li&gt;
&lt;li&gt;Cristine Hoepers (CERT.br, Brazil)&lt;/li&gt;
&lt;li&gt;Carlos A. Afonso (Nupef Institute, Brazil)&lt;/li&gt;
&lt;li&gt;Neide Oliveira (Federal Prosecution Service, Brazil)&lt;/li&gt;
&lt;li&gt;Sunil Abraham (CIS India)&lt;/li&gt;
&lt;li&gt;Monica Guise Rosina (Facebook Brazil)&lt;/li&gt;
&lt;li&gt;Jonah F. Hill (NTIA, EUA)&lt;/li&gt;
&lt;li&gt;Nina Leemhuis Janssen (Govt of The Netherlands)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Content of the Session&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The workshop is built around a policy question that approaches some historical controversies inherent to the widespread use and availability of encryption in the Internet, with a special focus on the tension between the increasing use of cryptography after Snowden and the supposed challenges it poses to public and national security in a digital era. The session promotes a space for multistakeholder debate on: the state of the art in the development and employment of cryptography; different attitudes towards the freedom to use encryption in different jurisdictions; modes of state-led interference in/with encrypted systems; and the limits posed by national and international law to such interference, as well as the impacts it might have to the protection and promotion fundamental human rights and shared values, to permission-less innovation on the Internet and the open architecture of the network. The session will host two segments: one will consist of two presentations made by government officials from the UK and the Netherlands that will detail different policy approaches for dealing with the use of encryption. The second comprises a multistakeholder round-table that gathers comments and questions about the previous presentations. In the end, moderators will summarize discussions and an overarching and documented report of the session will be made available for the session. The unorthodox format chosen for this session allows public scrutiny over some very practical policy-oriented approaches. The bulk of discussions registered during the workshop can provide dialogued feedback into policy development processes elsewhere.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Relevance of the Session&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The development and use of encryption to protect information and communication dates back to ancient times. Encryption has been mainly employed over the centuries to protect personal data, business information, governmental classified information, etc. Attempts to break encryption in general as well as the notion of inserting vulnerabilities (such as backdoors) in systems that rely on encryption have been a parallel phenomenon to (and also an integral part of) the longstanding efforts of cryptography. One might even say that those two processes function as the two different sides of the same coin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The advent and the great pace of development of computing and networking technologies boosted the science behind cryptography to unprecedented levels of relevance for society in general. More recently, after the Snowden affairs, cryptography has been perceived as a necessary condition (not a sufficient one though) for Internet users to curb the abuses entailed by massive digital surveillance and espionage by an ever growing number of countries. In parallel, together with other measures, the deployment of encryption to commercial applications seems to have become a, somehow, sine qua non condition for some Internet companies to regain consumer trust and retain competitive advantages in relation to other players in the market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The widespread use and availability of encryption tools however refueled tensions and entailed policy responses in a myriad of countries (e.g.: the Apple vs FBI case in the context of the San Bernadino Shooting; the announcement made by some European countries of their willingness to outlaw some uses of encryption as well as the public commitment of the Netherlands government to support encryption and oppose the development of backdoors; and the successive orders by Brazilian courts that aimed at blocking Whatsapp in the country due to the company’s denial to delivery communication records from some of its users). Those tensions generally revolve around the fact that as general-purpose technology, encryption can be also employed to conceal irregular and/or illicit activities, which would justify the creation of some narrow but allegedly needed exceptions to the constitutional limits built over the last century in several countries to impose limits to criminal investigation in order to uphold privacy and personal data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cases mentioned above gave rise to fierce discussions on whether or not the use of encryption increases by itself the likelihood of and facilitate the occurrence of crime and other illicit activities (most notably organized crime of all sorts and terrorism). Some law enforcement agencies and security forces have argued that encryption impairs crime investigation and the prosecution of criminals, and therefore the development of technology with embedded backdoors might be needed. Other actors, including representatives from the technical community, however, argue that such interference might disrupt regularly protected flows of information and communication as well as compromise privacy and the protection of other fundamental human rights. At this point, we are in a stage in which the trade-off between those two perspectives have to be settled through democratic means and public participation and that is why this workshop was submitted for the IGF 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides dealing with several different topics that comprise the overarching agenda of Internet governance (human rights, cybersecurity, openness and permission-less innovation, economic development, infrastructure governance, etc), the topic of this workshop is directly connected to two different goals comprised in the UN SDGs: sound institutions and innovation. Discussions on the contours of sound political institutions and on challenges and incentives for innovation are integral components of any sort of political agenda that aims at reflecting upon the “digital future”, which is the case of the 2017 IGF and highlight the importance of adding this proposal to the overall agenda of the event.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/state-led-interference-in-encrypted-systems-a-public-debate-on-different-policy-approaches'&gt;https://cis-india.org/internet-governance/news/state-led-interference-in-encrypted-systems-a-public-debate-on-different-policy-approaches&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-12-05T14:03:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-december-1-2017-inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime">
    <title>India’s Data Protection Regime Must Be Built Through an Inclusive and Truly Co-Regulatory Approach</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-december-1-2017-inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime</link>
    <description>
        &lt;b&gt;We must move India past its existing consultative processes for rule-making, which often prompts stakeholders to take adversarial and extremely one-sided positions.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="https://thewire.in/201123/inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime/"&gt;Wire&lt;/a&gt; on December 1, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Earlier this week, the Ministry of Electronics and Information Technology released &lt;a title="a white paper" href="http://meity.gov.in/white-paper-data-protection-framework-india-public-comments-invited" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;a white paper&lt;/span&gt;&lt;/a&gt; by a “committee of experts” appointed a few months back led by former Supreme Court judge, Justice B.N. Srikrishna, on a data protection framework for India. The other members of the committee are Aruna Sundararajan, Ajay Bhushan Pandey, Ajay Kumar, Rajat Moona, Gulshan Rai, Rishikesha Krishnan, Arghya Sengupta and Rama Vedashree.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the exception of Justice Srikrishna and Krishnan, the rest of the committee members are either part of the government or part of organisations that have worked closely with the government on separate issues relating to technology, with some of them also having taken positions against the fundamental right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Refreshingly, the committee and the ministry has opted for a consultative process outlining the issues they felt relevant to a data protection law, and espousing provisional views on each of the issues and seeking public responses on them. The paper states that on the basis of the response received, the committee will conduct public consultations with citizens and stakeholders. Legitimate concerns &lt;a title="were raised earlier" href="http://indianexpress.com/article/india/citizens-group-questions-data-privacy-panel-composition-aadhaar-4924220/" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;were raised earlier&lt;/span&gt;&lt;/a&gt; about the constitution of the committee and the lack of inclusion of different voices on it. However, if the committee follows an inclusive, transparent and consultative process in the drafting of the data protection legislation, it would go a long way in addressing these concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper seeks response to as many as 231 questions covering a broad spectrum of issues relating to data protection – including definitions of terms such as personal data, sensitive personal data, processing, data controller and processor – the purposes for which exemptions should be available, cross border flow of data, data localisation and the right to be forgotten.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While a thorough analysis of all the issues up for discussion would require a more detailed evaluation, at this point, the process of rule-making and the kind of governance model envisaged in this paper are extremely important issues to consider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In part IV of the paper on ‘Regulation and Enforcement’, there is a discussion on a co-regulatory approach for the governance of data protection in India. The paper goes so far as to provisionally take a view that it may be appropriate to pursue a co-regulatory approach which involves “a spectrum of frameworks involving varying levels of government involvement and industry participation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the discussion on co-regulation in the white paper is limited to the section on regulation and enforcement. A truly inclusive and co-regulatory approach ought to involve active participation from non-governmental stakeholders in the rule-making process itself. In India, unfortunately, we lack a strong tradition of lawmakers engaging in public consultations and participation of other stakeholders in the process of drafting laws and regulation. One notable exception has been the Telecom Regulatory Authority of India (TRAI), which periodically seeks public responses on consultation papers it releases and also holds open houses occasionally. It is heartening to see the committee of experts and the ministry follow a similar process in this case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, these are essentially examples of ‘notice and comment’ rulemaking where the government actors stand as neutral arbiters who must decide on written briefs submitted to it in response to consultation papers or draft regulations that it notifies to the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This process is, by its very nature, adversarial, and often means that different stakeholders do not reveal their true priorities but must take extreme one-sided positions, as parties tend to at the beginning of a negotiation.This also prevents the stakeholders from sharing an honest assessment of the actual regulatory challenge they may face, lest it undermine their position.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This often pits industry and public interest proponents against each other, sometimes also leading to different kinds of industry actors in adversarial positions. An excellent example of this kind of posturing, also relevant to this paper, is visible in the responses submitted to the TRAI on the its recent consultation paper on ‘Privacy, Security and Ownership of data in Telecom Sector’. One of the more contentious issue raised by the TRAI was about the adequacy of the existing data protection framework under the license agreement with telecom companies, and if there was a need to bring about greater parity in regulation between telecom companies and over-the-top (OTT) service providers. Rather than facilitating an actual discussion on what is a complex regulatory issues, and the real practical challenges it poses for the stakeholders, this form of consultation simply led to the telecom companies and OTT services providers submitting contrasting extreme positions without much scope for engagement between two polar arguments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A truly co-regulatory approach which also extends to rulemaking would involve collaborative processes which are far less adversarial in their design and facilitate joint problem solving through multiple face to face meetings. Such processes are also more likely to lead to better rule making by using the more specialised knowledge of the different stakeholders about technology, domain-specific issues, industry realities and low cost solutions. Further, by bringing the regulated parties into the rulemaking process, the ownership of the policy is shared, often leading to better compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the domain of data protection law itself, we have a few existing models of robust co-regulation which entail the involvement of stakeholders not just at the level of enforcement but also at the level of drafting. The oldest and most developed form of this kind of privacy governance can be seen in the study of the Dutch privacy statute. It involved a central privacy legislations with broad principles, sectoral industry-drafted “codes of conduct”, government evaluations and certifications of these codes; and a legal safe harbour for those companies that follow the approved code for their sector. Over a period of 20 years, the Dutch experience saw the approval of 20 sectoral codes across a variety of sectors such as banking, insurance, pharmaceuticals, recruitment and medical research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other examples of policies espousing this approach include two documents from the US – first, a draft bill titled ‘Commercial Privacy Bill of Rights Act of 2011’ introduced before the Congress by John McCain and John Kerry, and second, a White House Paper titled ‘Consumer Data Privacy In A Networked World: A Framework For Protecting Privacy And Promoting Innovation In The Global Digital Economy’ released by the Obama administration. Neither of these documents have so far led to a concrete policy. Both of these policies envisioned broadly worded privacy requirements to be passed by the Congress, followed by the detailed rules to be&lt;span&gt; drafted&lt;/span&gt;. The Obama administration white paper is more inclusive in mandating that ‘multi-stakeholder groups’ draft the codes that include not only industry representatives but also privacy advocates, consumer groups, crime victims, academics, international partners, federal and state civil and criminal law enforcement representatives and other relevant groups.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principles that emerge out this consultative process are likely to guide the data protection law in India for a long time to come. Among democratic regimes with a significant data-driven market, India is extremely late in arriving at a data protection law. The least that it can do at this point is to learn from the international experience and scholarship which has shown that merits of a co-regulatory approach which entails active participation of the government, industry, civil society and academia in the drafting and enforcement of a robust data protection law.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-december-1-2017-inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime'&gt;https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-december-1-2017-inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-01T16:18:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/november-2017-newsletter">
    <title>November 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/november-2017-newsletter</link>
    <description>
        &lt;b&gt;November 2017 Newsletter&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Dear readers,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Anubha Sinha took part in the 35th Session of the World Intellectual Property Organization (“WIPO”) Standing Committee on Copyright and Related Rights (“SCCR”) at Geneva from 13 November, 2017 to 18 November, 2017. &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/35th-sccr-cis-question-to-dr-rostama-on-her-study-on-the-impact-of-the-digital-environment-on-copyright-legislation"&gt;She posed a question on the agenda&lt;/a&gt; 'Other Matters' on behalf of CIS on Day 5, 17 November, 2017. CIS also gave statements on &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/35th-sccr-cis-statement-on-limitations-and-exceptions-for-libraries-and-archives"&gt;Limitations and Exceptions for Libraries and Archives&lt;/a&gt; and &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/35th-sccr-cis-statement-on-grulac-proposal-for-analysis-of-copyright-in-the-digital-environment"&gt;GRULAC Proposal for Analysis of Copyright in the Digital Environment&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-a2k-signs-mou-with-telangana-government"&gt;CIS-A2K signed a Memorandum of Understanding&lt;/a&gt; with the Telangana Government’s IT, Electronics &amp;amp; Communications Department with to catalyse the development of the Wikimedia movement in Telangana and improve the state of free-licensed digital content in Telugu and Urdu.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Ministry of Electronics &amp;amp; Information Technology, Government of India has published the Guidelines for Indian Government Websites (GIGW). Nirmita Narasimhan on behalf of the Centre for Internet &amp;amp; Society &lt;a class="external-link" href="https://cis-india.org/accessibility/blog/comments-on-guidelines-for-indian-government-websites"&gt;gave comments on GIGW&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The government has already set up a Nudge unit; now, it should apply the Nobel laureate's insights on auctions relating to essential infrastructure wrote Shyam Ponappa in &lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-november-1-2017-nobel-laureate-richard-thaler-views-on-auctions"&gt;an article in the Business Standard&lt;/a&gt; on November 1, 2017.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;DataMeet and CIS have &lt;a class="external-link" href="https://cis-india.org/openness/steps-towards-integrated-open-water-data"&gt;collaborated on identifying and addressing the challenges to open up and integrate data and information&lt;/a&gt; in the water sector.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector"&gt;commented on the Consultation Paper on Privacy, Security and Ownership of Data in Telecom Sector&lt;/a&gt; published by the Telecom Regulatory Authority of India on August 9, 2017.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/a-comparison-of-legal-and-regulatory-approaches-to-cyber-security-in-india-and-the-united-kingdom"&gt;published a report that compares laws and regulations in the United Kingdom and India&lt;/a&gt; to see the similarities and disjunctions in cyber security policy between them.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="https://cis-india.org/telecom/blog/cis-comments-on-promoting-local-telecom-equipment-manufacturing"&gt;sent comments on TRAI consultation paper on promoting local telecom equipment manufacturing&lt;/a&gt;. The submission drew on research primarily done in the Pervasive Technologies project.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;CIS in the News:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/telangana-today-november-8-2017-alekhya-hanumanthu-big-data-for-governance"&gt;Big Data for governance&lt;/a&gt; (Alekhya Hanumanthu; Telangana Today; November 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/the-times-of-india-shalini-umachandrani-november-7-2017-how-tech-is-making-life-easier-for-differently-abled"&gt;How tech is making life easier for differently-abled&lt;/a&gt; (Shalini Umachandrani; November 7, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar"&gt;India Today Conclave Next 2017: Aadhaar was rushed, says MP Rajeev Chandrashekhar&lt;/a&gt; (Priya Pathak; India Today; November 8, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar"&gt;What You Need To Worry About Before Linking Your Mobile Number With Aadhaar &lt;/a&gt;(Roopa Raju and Shekhar Rai; Youth Ki Awaaz; November 8, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now"&gt;OPINION | Data is New Oil and Human Mind the New Battlefield. India Must Wake Up Now&lt;/a&gt; (Lt. General (Retd.) D. S. Hooda; News18.com; November 11, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns"&gt;Aadhaar seeding: benefits and concerns&lt;/a&gt; (Shaikh Zoaib Saleem; Livemint; November 14, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-november-23-2017-ronald-abraham-privacy-issues-exist-even-without-aadhaar"&gt;Privacy issues exist even without Aadhaar&lt;/a&gt; (Ronald Abraham; November 15, 2017).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/cima-sarah-oh-november-15-2017-openness-nine-ways-civil-society-groups-have-mobilized-to-defend-internet-freedom"&gt;Advocating for Openness: Nine Ways Civil Society Groups Have Mobilized to Defend Internet Freedom&lt;/a&gt; (Centre for International Media Assistance; November 15, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-november-16-2017-komal-gupta-govt-working-to-set-up-financial-cert-to-tackle-cyber-threats"&gt;Govt working to set up financial CERT to tackle cyber threats&lt;/a&gt; (Komal Gupta; Livemint; November 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs"&gt;Financial CERT to combat cyber threats, says MoS home affairs&lt;/a&gt; (CISO MAG; November 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/financial-express-november-20-2017-government-websites-made-aadhaar-details-public"&gt;UIDAI admits 210 government websites made Aadhaar details public&lt;/a&gt; (Financial Express; November 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/sunny-sen-livemint-november-23-2017-indias-internet-missionaries"&gt;India’s internet missionaries: The women Google is relying on to spread its Next Billion message&lt;/a&gt; (Sunny Sen; Livemint; November 21, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-november-23-2017-fcc-plan-to-repeal-net-neutrality-may-not-impact-india"&gt;FCC’s plan to repeal net neutrality may not impact India&lt;/a&gt; (Surabhi Agarwal; Economic Times; November 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-kul-bhushan-november-23-2017-indian-activists-slam-fcc-decision-to-ditch-net-neutrality"&gt;Indian activists slam FCC decision to ditch net neutrality&lt;/a&gt; (Kul Bhushan; Hindustan Times; November 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-november-23-2017-fcc-plan-to-repeal-net-neutrality-may-not-impact-india"&gt;FCC’s plan to repeal net neutrality may not impact India&lt;/a&gt; (Surabhi Agarwal; Economic Times; November 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/digit-subhrojit-mallick-november-24-2017-why-should-you-keep-a-close-eye-on-net-neutrality-debate-in-us"&gt;Why should you keep a close eye on the net neutrality debate in the US&lt;/a&gt; (Subhrojit Mallick; Digit; November 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi"&gt;Cyberattacks a significant threat to democracy: Modi&lt;/a&gt; (Komal Gupta; Livemint; November 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations"&gt;Aadhaar verification at airports raises need for stricter data privacy regulations&lt;/a&gt; (Aman Sethi; Hindustan Times, November 27, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/idap-interview-series-interview-x-with-nirmita-narasimhan"&gt;IDAP Interview Series: Interview with Nirmita Narasimhan&lt;/a&gt; (IDIA Law; November 27, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework"&gt;Govt releases white paper on data protection framework&lt;/a&gt; (Komal Gupta; Livemint; November 28, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/deccan-herald-november-30-2017-bengalureans-to-receive-helen-keller-award"&gt;Bengalureans to receive Helen Keller award&lt;/a&gt; (Deccan Herald; November 30, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt;------------------------------------- &lt;br /&gt;India has an estimated 70 million persons with disabilities who don't have access to read printed materials due to some form of physical, sensory, cognitive or other disability. As part of our endeavour to make available accessible content for persons with disabilities, we are developing a text-to-speech software in 15 languages with support from the Hans Foundation. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;Submission&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/blog/comments-on-guidelines-for-indian-government-websites"&gt;Comments on Guidelines for Indian Government Websites&lt;/a&gt; (Nirmita Narasimhan; November 26, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;►&lt;/span&gt;Copyright &amp;amp; Patent&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/35th-sccr-cis-statement-on-limitations-and-exceptions-for-libraries-and-archives"&gt;35th SCCR: CIS Statement on Limitations and Exceptions for Libraries and Archives&lt;/a&gt; (Anubha Sinha; November 15, 2017).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/35th-sccr-cis-statement-on-grulac-proposal-for-analysis-of-copyright-in-the-digital-environment"&gt;35th SCCR: CIS Statement on Limitations and Exceptions for Libraries and Archives&lt;/a&gt; (Anubha Sinha; November 17, 2017).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/35th-sccr-cis-question-to-dr-rostama-on-her-study-on-the-impact-of-the-digital-environment-on-copyright-legislation"&gt;35th SCCR: CIS' Question to Dr. Rostama on her Study on the Impact of the Digital Environment on Copyright Legislation&lt;/a&gt; (Anubha Sinha; November 19, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Blog Entry&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-a2k-signs-mou-with-telangana-government"&gt;CIS-A2K signs MoU with Telangana Government &lt;/a&gt;(Manasa Rao; November 8, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;►Privacy&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/a-comparison-of-legal-and-regulatory-approaches-to-cyber-security-in-india-and-the-united-kingdom"&gt;A Comparison of Legal and Regulatory Approaches to Cyber Security in India and the United Kingdom&lt;/a&gt; (Divij Joshi; edited by Elonnai Hickok; November 12, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector"&gt;Counter Comments on TRAI's Consultation Paper on Privacy, Security and Ownership of Data in Telecom Sector&lt;/a&gt; (Amber Sinha; November 23, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bis-international-seminar-on-internet-of-things"&gt;BIS International Seminar on Internet of Things&lt;/a&gt; (Organized by BIS; November 15, 2017; India Habitat Centre, New Delhi). Amber Sinha attended the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/internet-universality-indicators-for-a-safe-secure-and-inclusive-cyberspace-for-sustainable-development"&gt;Internet Universality Indicators for a Safe, Secure and Inclusive Cyberspace for Sustainable Development&lt;/a&gt; (Organized by UNESCO in collaboration with the Ministry of Electronics and IT, Government of India; UNESCO Conference Room, Chanakyapuri, New Delhi; November 17, 2017). Amber Sinha attended the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/roundtable-on-data-integrity-and-privacy"&gt;Roundtable on Data Integrity and Privacy&lt;/a&gt; (Organized by Observer Research Foundation; November 18, 2017). The round table discussion was chaired by Shri Baijayant Panda, Hon'ble Member of Parliament.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span style="text-align: justify; "&gt;►&lt;/span&gt;Cyber Security&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/breach-notifications-a-step-towards-cyber-security-for-consumers-and-citizens"&gt;Breach Notifications: A Step towards Cyber Security for Consumers and Citizens&lt;/a&gt; (Amelia Andersdotter; November 14, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/roundtable-on-enhancing-indian-cyber-security-through-multi-stakeholder-cooperation"&gt;Roundtable on Enhancing Indian Cyber Security through Multi-Stakeholder Cooperation&lt;/a&gt; (Indian Islamic Centre; Lodhi Road; New Delhi; November 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech"&gt;Open House on Security Practices in FinTech&lt;/a&gt; (Organized by CIS and Has Geek; November 17, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa"&gt;Multinational Cyber Security Forum at University of Haifa&lt;/a&gt; (Organized by Center for Cyber, Law and Policy and University of Haifa in collaboration with the Hewlett Foundation Cyber Initiative; November 5 - 7, 2017). Sunil Abraham participated in the meeting held in Israel.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc"&gt;Global Commission on the Stability of Cyberspace&lt;/a&gt; (GCSC) (Organized by GCSC; November 21, 2017; New Delhi). Pranesh Prakash participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;strong&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;-----------------------------------&lt;br /&gt;&lt;/span&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;br /&gt;&lt;/a&gt;&lt;span&gt;----------------------------------- &lt;/span&gt;&lt;/p&gt;
&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources, and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Article &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-november-1-2017-nobel-laureate-richard-thaler-views-on-auctions"&gt;Nobel Laureate Richard Thaler's Views On Auctions&lt;/a&gt; (Shyam Ponappa; Business Standard; November 1, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;Submission&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/cis-comments-on-promoting-local-telecom-equipment-manufacturing"&gt;Comments on TRAI Consultation Paper on Promoting Local Telecom Equipment Manufacturing&lt;/a&gt; (Anubha Sinha; November 26, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;span style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;span&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Articles&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-november-5-2017-digital-native-rebellion-by-google-doc"&gt;Digital native: Rebellion by Google Doc &lt;/a&gt;(Nishant Shah; Indian Express; November 4, 2017)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-november-19-2017-nishant-shah-digital-native-let-there-be-life"&gt;Digital native: Let there be life&lt;/a&gt; (Nishant Shah; Indian Express; November 19, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="keyResearch"&gt;
&lt;div id="parent-fieldname-text-8a5942eb6f4249c5b6113fdd372e636c"&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="viewlet-below-content-body"&gt;
&lt;div class="visualClear"&gt;&lt;/div&gt;
&lt;div class="documentActions"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/november-2017-newsletter'&gt;https://cis-india.org/about/newsletters/november-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2018-01-10T01:57:29Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/figi-symposium-2017">
    <title>FIGI Symposium 2017</title>
    <link>https://cis-india.org/internet-governance/news/figi-symposium-2017</link>
    <description>
        &lt;b&gt;Innovative Approaches to Digital Financial Inclusion Challenges. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The        &lt;strong&gt;first edition of the Financial Inclusion Global Initiative (FIGI) Symposium &lt;/strong&gt;was held in Bangalore, India, from 29 November to 1 December 2017. The Symposium was organized jointly by the Telecommunication Standardization Bureau (TSB) of the International Telecommunication Union (ITU), jointly with  the Bill &amp;amp; Melinda Gates Foundation, the World Bank and the Committee on Payments and Market Infrastructure (CPMI) and the kind support of the Government of India. ​​​​​​​​​​​​​​​​​​&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok participated in the symposium and spoke in the "Security, Infrastructure, and Trust" working group on big data and privacy in DFS. For more info on the symposium, &lt;a class="external-link" href="https://www.itu.int/en/ITU-T/extcoop/figisymposium/2017/Pages/default.aspx"&gt;see here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/figi-symposium-2017'&gt;https://cis-india.org/internet-governance/news/figi-symposium-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-01T16:29:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework">
    <title>Govt releases white paper on data protection framework</title>
    <link>https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework</link>
    <description>
        &lt;b&gt;Public comments are welcome till 31 December on the data protection white paper, which is aimed at securing digital transactions and addressing privacy issues.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/LIKM3FxX3KEcA52uGMlcJP/Govt-releases-white-paper-on-data-protection-framework.html"&gt;Livemint&lt;/a&gt; on November 28, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A  nuanced approach towards data protection will have to be followed in  India, keeping in mind the fact that individual privacy is a fundamental  right limited by reasonable restrictions, according to a white paper  issued by the government on a data protection framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government has sought public comments till 31 December on the white  paper, which is aimed at securing digital transactions and addressing  customer and privacy protection issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The white paper, drafted  by the committee of experts on data protection framework, was released  by the ministry of electronics and information technology on Monday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  31 July, the government constituted a 10-member committee of experts  headed by former Supreme Court justice B.N. Srikrishna to study various  issues relating to data protection and make specific suggestions on the  principles to be considered for data protection as well as suggest a  draft Data Protection bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other members of the committee include  telecom secretary Aruna Sundararajan,  Unique Identification Authority  of India chief executive Ajay Bhushan Pandey, and additional secretary  in the information technology ministry Ajay Kumar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  committee seeks to put the onus on stakeholders and the public through a  questionnaire on issues such as collection of personal data, consent of  consumers, penalties and compensation, code of conduct and an  enforcement model that should be set up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The sensitivity of the  data could also develop based on its combination with other types of  information. For example, an email address taken in isolation, is not  sensitive. However, if it is combined with a password, then it could  become sensitive as it opens access to many other websites and systems,  which may expose the individual to harm such as cyberattacks and  phishing frauds,” the white paper said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is also possible that  personal or even non-personal data, when processed using big data  analytics, could be transformed into sensitive personal data. Therefore,  there may be a need to create safeguards which will prevent misuse of  personal information in these contexts of use, it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The white  paper also seeks “to designate certain lawful grounds under which data  can be processed, even in the absence of consent.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In some  situations, seeking consent prior to a data processing activity would  not be possible, or it may defeat the purpose of the processing. For  instance, where law enforcement officials need to apprehend a criminal,  seeking the consent of the criminal prior to processing would defeat the  purpose of the investigation, it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It seems to be an  eminently reasonable white paper which raises the right questions.  However, it lacks analysis of data protection vis-a-vis Aadhaar,” said  Pranesh Prakash, policy director at the Centre for Internet and Society,  a Bengaluru-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Safeguarding privacy rights needs  much more than a data protection law; it needs a larger consultation  that includes issues like surveillance as well, added Prakash.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework'&gt;https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-28T14:34:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa">
    <title>Multinational Cyber Security Forum at University of Haifa</title>
    <link>https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa</link>
    <description>
        &lt;b&gt;Sunil Abraham participated in a meeting in Israel on Multinational Cyber Security Forum hosted by Center for Cyber, Law and Policy and University of Haifa in collaboration with the Hewlett Foundation Cyber Initiative.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The workshop was held from November 5 to 7, 2017. The objective of the workshop was to facilitate a free and open exchange among participants under the Chatham House Rules. The workshop sought to identify areas of agreement and dissent pertaining to cyber security regulation and to explore issues that require further research, clarification and development.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa'&gt;https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-27T14:34:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way">
    <title>Data Protection and Privacy in India: The (Fundamental) Right Way</title>
    <link>https://cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way</link>
    <description>
        &lt;b&gt;Amber Sinha attended a roundtable conference on data protection and privacy on October 30, 2017 at India Habitat Centre in New Delhi. The close-door event was organised by the  Indian Council for Research on International Economic Relations.&lt;/b&gt;
        &lt;p&gt;Participants at the conference discussed:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Role of consent in data protection, how it should be configured in India&lt;/li&gt;
&lt;li&gt;Conflicts between the data minimization principle and big data&lt;/li&gt;
&lt;li&gt;Governance approaches to data protection&lt;/li&gt;
&lt;li&gt;Propertarian view of data&lt;/li&gt;
&lt;li&gt;Need for capacity building in India and institutions who should be involved in the data protection regime, and&lt;/li&gt;
&lt;li&gt;Cross border data flows and data localisation&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way'&gt;https://cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-27T14:01:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations">
    <title>Aadhaar verification at airports raises need for stricter data privacy regulations</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations</link>
    <description>
        &lt;b&gt;The absence of legislation is letting companies compile and deploy sensitive personal information without legal oversight.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aman Sethi was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations/story-pNJYBM7mJkhRrFJElYX2RJ.html"&gt;Hindustan Times&lt;/a&gt; on November 27, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;When Suvodeep Das, a 42-year-old marketing professional, took a Jet airways flight from Hyderabad to Mumbai in September, he said a software bug in the airline’s website wouldn’t let him check in online without first punching in his Aadhaar number.&lt;br /&gt;&lt;br /&gt;“When I got my boarding pass, it had my Aadhaar number printed on it,” Das told HT, wondering, “Why do you need an Aadhaar number to take a flight, and why display it publicly?”&lt;br /&gt;&lt;br /&gt;In October, another passenger found their Aadhaar number on the boarding pass: this time, it was barcoded.&lt;br /&gt;&lt;br /&gt;HT has reviewed both boarding passes. Publishing Aadhaar numbers is an offence under the Aadhaar Act 2016.&lt;br /&gt;&lt;br /&gt;Jet Airways did not respond to repeated requests for comment. Speaking off the record, airline executives said Jet encoded Aadhaar numbers to test the proposed Aadhaar Enabled Entry and Biometric Boarding System (AEEBBS): a complex Aadhaar-seeding project that aims to replace a passenger’s boarding pass with his/her fingerprint.&lt;br /&gt;&lt;br /&gt;Bangalore International Airport (BIAL), which plans to install AEEBBS, says it will improve passenger security and reduce check-in time at the Kempegowda International, India’s third busiest airport.&lt;br /&gt;&lt;br /&gt;Privacy advocates, however, say the system, which stores passenger biometrics and Aadhaar numbers on the servers of a private corporation, is an example of how the absence of a data protection law in India lets companies compile and deploy sensitive personal information without legal oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Future uses of the AEEBBS, according to the BIAL website, include  integrating the system with passenger blacklists, typically maintained  by the ministry of home affairs, to determine who can and cannot board a  flight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The unregulated proliferation of Aadhaar uses is  compromising the digital identities of citizens and putting them at  risk,” said Usha Ramanathan, a legal theorist who has written  extensively on Aadhaar. ”There is a misconception that data protection  is about data being at risk. It is actually about the rights of people  being at risk.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pilot Project&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January, Bangalore  International Airport Ltd (BIAL), the corporation that runs the  Bengaluru terminal, and Jet Airways integrated their flight and  passenger databases as part of a four-month pilot project to test the  AEEBS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The pilot project incorporated the entire airport journey  from entry right through to the boarding gate and included all security  check points,” a BIAL spokesperson said in an email. “The project  allowed for quicker processing time for a passenger from entry to  security gate while simultaneously enabling fewer points of human  interaction.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participation in the project was voluntary. BIAL  said about 15% of passengers opted to use it. In October, BIAL called  for bids for a full roll-out of the AEEBBS by December 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system, tender documents reveal, works in the following way:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First  passengers enter their Aadhaar numbers when they book their flights.  The airline turns this number into a QR code printed on the flight  ticket. Once at the terminal, passengers bypass the standard practice of  showing their ticket and ID to a security guard, and instead they enter  the terminal by flashing the ticket at a QR code scanner while pressing  their fingers against a biometric reader installed at the entrance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  AEEBBS verifies the passenger’s identity by querying the UIDAI’s  database, and then checks the airport’s flight information system to see  if the passenger is booked to fly that day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thereafter, the  system creates a “passenger dataset” that bundles the passenger’s  biometrics and flight information into a single file unique to each  passenger. This dataset is used to verify the identity of the passenger  at each checkpoint, allowing the airport to track the passenger until  she boards her plane.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tender document states that the  biometric data should be purged immediately after the passenger’s flight  departs. If flights are rescheduled, the biometrics shall persist until  the passenger finally departs.&lt;/p&gt;
&lt;div class="airport_wrap" style="text-align: justify; "&gt;
&lt;div class="airport_padding"&gt;
&lt;div class="airport_headline"&gt;Concerns over Bengaluru airport’s use of Aadhaar&lt;/div&gt;
The  Aadhaar-Enabled Entry and Biometric Boarding System (AEEBBS) aims to  replace boarding cards with a passenger’s fingerprint. Here is how it  works.&lt;/div&gt;
&lt;img src="http://www.hindustantimes.com/static/ht2017/11/bengaluru_airport_aadhaar.jpg" width="100%&amp;quot;/" /&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why Biometrics?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bengaluru isn’t the only airport experimenting with systems like the AEEBBS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  have initiated trials on facial recognition, iris and finger-print  scanning etc., to generate Aadhaar + Biometric enabled passenger  data-sets,” said a spokesperson for the GMR Hyderabad International  Airport. “We hope to complete these trials in the next two months and  deploy them by June 2018 for all domestic passengers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet  biometrics isn’t a fool-proof way of verifying someone’s identity.  Biometric experts have maintained that fingerprints can be copied and  printed onto “fake fingers” — a process known as spoofing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At  Michigan State University, biometric expert Anil Jain and his team have  developed so-called fake fingers using 12 different materials, the most  sophisticated of which mimics the physical properties of human skin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Many  of the commercial systems may not have state-of-the-art spoof detection  facilities,” Jain said, adding that he has advised the UIDAI on  biometrics in the past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jain said it was important that a secured  space like an airport have biometric readers that include “liveness”  detection, a term that refers to a broad set of techniques that use a  combination of advanced hardware and software to avoid spoof attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  it is not mandatory for UIDAI-certified biometric devices to have  liveness detection features. Documents published by Standardisation  Testing and Quality Certification (STQC), the agency tasked with  certifying Aadhaar devices, make clear that “liveness detection” is  “preferable” but not mandatory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some manufacturers of certified  devices say their devices have liveness detection, but STQC does not  include this specific feature in its testing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prof Jain said  biometrics are harder to forge than the identity cards that are  currently needed to gain access to airport terminals, suggesting that  the AEEBBS could increase security only if the data that undergirds the  system is properly secured.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Storage Concerns&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under  regulations framed by the Unique Identification Authority of India  (UIDAI), it is illegal to store biometric data captured for any  Aadhaar-related transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, UIDAI-certified biometric  devices are prohibited from storing biometric data which casts a cloud  over BIAL’s proposal to create passenger datasets to merge passenger  flight data, biometric data and Aadhaar numbers, and store it on a local  BIAL network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While UIDAI did not respond to requests for comment  on if these passenger data sets violated its regulations, BIAL said it  would work around the system by capturing passenger biometric data twice  — once to verify passenger identities in accordance with UIDAI  regulations, and once for the purpose of creating the passenger data  set.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our intent is to capture data and store a separate set of  biometrics records (delinked from Aadhaar) that include  face/iris/fingerprints for the purpose of authentication of passenger at  various check points inside the airport,” the spokesperson said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some experts believe this may not be enough.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The  Aadhaar Act and Regulations are supposed to ensure that our biometric  records are safe, and entities capturing biometrics for Aadhaar-related  purposes cannot store the biometrics,” said Pranesh Prakash, policy  director at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If biometrics  collected doesn’t need to follow the Aadhaar regulations because of a  technicality, how strong are the regulations?” Prakash said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last  year, 22.18 million passengers travelled through Bengaluru airport. Once  the AEEBBS is installed, the airport’s servers shall become a temporary  repository of millions of fingerprints, and a lucrative target for  sophisticated hackers who could capture this data by implanting  malicious software in the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such software has become easier  to access since August 2016, when a group calling itself the “Shadow  Brokers” announced it had stolen some of the world’s most advanced  cyber-weapons from the vaults of the Tailored Access Operations unit of  National Security Agency, which manages the cyber-arsenal of the United  States of America.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Designing the system to minimise the use of  biometrics could alleviate these concerns, according to Rahul Matthan, a  partner at law firm Trilegal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If data minimisation is the  principle that we keep on top of mind, Aadhaar should be used to allow  entry,” Matthan said, “Then the airport must devise other methods and  standards to ensure that security and passenger tracking is achieved.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguarding Aadhaar Numbers&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  AEEBBS also raises questions on the manner in which airlines and  airports will store non-biometric data like passenger Aadhaar numbers.  UIDAI regulations published in July 2017 say companies and government  departments must store Aadhaar numbers in secure, isolated, databases  called ‘Aadhaar Data Vaults’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Aadhaar number in these vaults  must be associated with a “reference key” — which is like a nick-name  for the Aadhaar number. So instead of using a citizen’s Aadhaar number  for a given transaction, businesses must preserve the confidentiality of  the number by using the reference key instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jet Airway’s  decision to print Aadhaar numbers, rather than the reference keys, on  the boarding passes, suggests that the airline is not following UIDAI  guidelines — a problem that is likely to multiply as more airlines start  gathering this information to avail of the AEEBBS facility. Jet Airways  did not respond to requests for comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the AEEBBS is in  place, BIAL also intends to use passenger data, harvested during  check-in and boarding, for commercial purposes, but it is unclear if and  how this data will be anonymised before it is used.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We aim to  make meaning of the abundant data that will be collected,” the BIAL  spokesperson said, insisting that the airport would respect traveller  privacy and the data would not be sold to third parties. “In due course —  and with passenger consent — we intend to use business intelligence to  make the journey more impactful.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For lawyer Matthan, the AEEBBS  is an example of why India needs a comprehensive data protection law to  address issues between citizens and private corporations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There  is a need to ensure that Aadhaar is based on a sound framework of  privacy protection,” he said, noting that the recent Supreme Court  judgment protected citizen privacy against infringement by the  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data protection legislation, he said, would ensure that private corporations are held to the same standard.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-27T13:34:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-november-23-2017-fcc-plan-to-repeal-net-neutrality-may-not-impact-india">
    <title>FCC’s plan to repeal net neutrality may not impact India</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-november-23-2017-fcc-plan-to-repeal-net-neutrality-may-not-impact-india</link>
    <description>
        &lt;b&gt;India is unlikely to be impacted by the US Federal Communications Commission’s plan to repeal net neutrality regulations.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was published in the &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/fccs-plan-to-repeal-net-neutrality-may-not-impact-india/printarticle/61760422.cms"&gt;Economic Times&lt;/a&gt; on November 23, 2017. Sunil Abraham quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India adopted a pro-net neutrality stand by taking a tough call against zero-rated plans such as Facebook’s Free Basics and Airtel Zero last year. According to experts, the Indian telecom regulator showed great courage and conviction by battling any type of preferential treatment of internet websites. This was even after a massive campaign by Facebook in support of its Free Basics programme, which promised access to a few basic services free of cost through partnerships with selected telecom service providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our regulator now thinks of itself as a forerunner in this space, so we doubt they are going to be influenced by the American move,” said Sunil Abraham, Executive Director of the Centre for Internet and Society in Bengaluru. He called the proposal to withdraw the President Barack Obama era regulations “incredible” since they took almost a decade and lots of debate to be framed. Abraham said there is no evidence to suggest that India copies what the US does and there is a long way to go before the new regulations come in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The FCC is just one actor in this game — there are the Congress and the courts along with the Federal Trade Commission,” said Abraham, adding that the proposal is likely to be challenged at multiple levels. “I’m proposing to repeal the heavy-handed Internet regulations imposed by the Obama Administration and to return to the light-touch framework under which the Internet developed and thrived before 2015,” FCC chief Ajit Pai, who worked for Verizon Communications earlier, tweeted on Tuesday. The plan shared by Pai will be put to vote on December 14. Experts expect the plan to go through, given the Republican majority in the FCC and they fear it will allow internet service providers like Verizon, AT&amp;amp;T and Comcast to give preference to some sites and apps in return for a fee or for their own business interests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If it goes through, it will take control away from the user and companies will be free to make fast lanes and favour the content they like and play the gatekeepers,” said Mishi Choudhary, president at Software Freedom Law Centre.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She said the conversation has once again moved the power back to internet service providers, which will hurt small companies on the pretext of innovation and getting away from micro managing. “It is certainly not bolstering the position of the US as a leader for free and open internet,” added Choudhary. Streaming service Netflix tweeted in response saying that it supports strong net neutrality and opposes the FCC’s proposal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Telecom Regulatory Authority of India (Trai) fought a tough battle in 2016 against plans that promised select internet services to poor people by offering them free of cost. The regulator issued differential pricing regulations by which it banned what’s known as zerorating plans. “Trai showed immense foresight by releasing the rules and this is a good opportunity for India to occupy the vacuum of leadership in this space by providing the right regulatory environment,” said Choudhary.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-november-23-2017-fcc-plan-to-repeal-net-neutrality-may-not-impact-india'&gt;https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-november-23-2017-fcc-plan-to-repeal-net-neutrality-may-not-impact-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-26T11:43:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar">
    <title>India Today Conclave Next 2017: Aadhaar was rushed, says MP Rajeev Chandrashekhar</title>
    <link>https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar</link>
    <description>
        &lt;b&gt;Talking at the ongoing India Today Conclave Next 2017, MP Rajeev Chandrashekhar said that Aadhaar was rushed and foisted on the country by authorities that fail to first create a proper ecosystem. Chandrashekhar gave his comments at a keynote titled Privacy -- The Fundamental Right for the Digital Citizen.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Priya Pathak was published by &lt;a class="external-link" href="http://indiatoday.intoday.in/technology/story/india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar/1/1084396.html"&gt;India Today&lt;/a&gt; on November 8, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chandrashekhar, who has been vocal on  the issues like data protection, privacy and net neutrality, said that  the government should have created a proper ecosystem for Aadhaar by  bringing norms and laws around data protection and privacy before asking  people to sign up for the unique ID.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MP talked about India's  journey from being a largest unconnected world to becoming the largest  connected world. But Chandrashekhar criticised the "flawed" Aadhaar and  said that it was a classic example of how a government system would push  for technology in governance without addressing key bits of the  ecosystem around the citizen and the consumer.&lt;/p&gt;
&lt;div class="zg-placement-transition   zg-placement" id="zdt_3644892_1_wrapper" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;"If  that (Aadhaar) wasn't enough, the IT act and section 66A and its  language and its vagueness and its potential for misuse was another  example of the faults of a bureaucracy or a political system trying to  legislate or create solutions in the digital world, " he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At  the same time, he lauded the recent Supreme Court order that held all  Indians had fundamental right to privacy. "The latest finding of Supreme  Court of Privacy as fundamental right is a big deal and it will alter  number of things going forward," he said. He added that there should be  more debate and discussion on data privacy as there is an attempt to  characterise data privacy as some of kind of elitist issue in India  which it's not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy, especially for the digital world,  currently is one of the most debated topics in India. The country in the  past few years has seen a number of instances where a government or a  private entity has knowingly or unknowingly compromised the data of its  users. Recently a study published by Centre for Internet and Society, a  Bengaluru-based organisation, revealed that private data of more 130  million Aadhaar card holders were leaked from four government websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Supreme Court in August this year declared privacy as a fundamental  right. A nine-judge Constitution bench headed by Chief Justice J S  Khehar has declared that "right to privacy is an intrinsic part of Right  to Life and Personal Liberty under Article 21 and entire Part III of  the Constitution".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move has been praised by many including  Rajeev Chadrashekhar who has said that it is a big welcome step. "It is  clear that Aadhaar and all other legislations existing and proposed will  have to meet the test of privacy being a fundamental right," he  recently said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar'&gt;https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T06:41:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar">
    <title>What You Need To Worry About Before Linking Your Mobile Number With Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar</link>
    <description>
        &lt;b&gt;As part of the directive issued by the Department of Telecommunications (DoT) dated March 23, 2017, major telecom service providers have issued a deadline of February 6, 2018, for linking mobile numbers with Aadhaar as part of the E-KYC verification.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Roopa Raju and Shekhar Rai was published in &lt;a class="external-link" href="https://www.youthkiawaaz.com/2017/11/linking-aadhar-with-mobile-number-pros-and-cons/"&gt;Youth Ki Awaaz&lt;/a&gt; on November 8, 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The landmark case referenced by the DoT in the circular was the order  issued by the Supreme Court on February 6, 2017, delivered by Justice  JS Khehar (the erstwhile Chief Justice of India) in the case of &lt;a href="https://thewire.in/109330/aadhaar-phone-legal-battle/" rel="noopener" target="_blank"&gt;Lokniti Foundation vs Union of India&lt;/a&gt;.  The petitioner &lt;a href="http://supremecourtofindia.nic.in/jonew/courtnic/rop/2016/23429/rop_885627.pdf" rel="noopener" target="_blank"&gt;contended&lt;/a&gt; that terrorists, criminals and anti-social elements frequently used SIM  cards to commit atrocious, organised and unorganised crimes across the  country. The petition called for &lt;a href="http://supremecourtofindia.nic.in/jonew/courtnic/rop/2016/23429/rop_885627.pdf" rel="noopener" target="_blank"&gt;ensuring 100% verification&lt;/a&gt; on the identity of telecom service subscribers in public interest under &lt;a href="https://indiankanoon.org/doc/981147/" rel="noopener" target="_blank"&gt;Article 32&lt;/a&gt; of the Constitution of India. The PIL added that unverified SIM cards  pose a serious threat to the country’s security as they are routinely  used  in criminal and terrorist activities, thereby affecting a  citizen’s right (as ensured under &lt;a href="https://indiankanoon.org/doc/1199182/" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt; of the Constitution). As per the CAG report tabled at the Parliament in 2014, the identities of &lt;a href="https://timesofindia.indiatimes.com/india/Identities-of-4-59-crore-mobile-users-still-unverified-CAG/articleshow/39572824.cms" rel="noopener" target="_blank"&gt;4.59 crore mobile users&lt;/a&gt; still remained unverified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 21 of the Constitution of India, 1949, &lt;a href="https://indiankanoon.org/doc/1199182/" rel="noopener" target="_blank"&gt;states&lt;/a&gt; that – &lt;i&gt;“No person shall be deprived of his life or personal liberty except according to procedure established by law.”&lt;/i&gt; While there is a threat to the common public interest through increased  acts of terrorism and atrocities due to unverified SIM cards, the  safety of information provided and linked to Aadhaar are increasingly  being questioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a study dated May 1, 2017, published by the Centre for Internet  and Society (CIS), a Bangalore-based organisation, it was observed that  data of &lt;a href="http://indiatoday.intoday.in/technology/story/aadhaar-data-of-130-millions-bank-account-details-leaked-from-govt-websites-report/1/943632.html" rel="noopener" target="_blank"&gt;over 130 million&lt;/a&gt; Aadhaar card-holders were leaked from just four government portals  dealing with the National Social Assistance programme, the National  Rural Employment Guarantee Scheme, the Chandranna Bima Scheme and the  Daily Online Payment Reports of NREGA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On October 25, 2017, the chief minister of West Bengal, Mamata Banerjee, also &lt;a href="https://thewire.in/190932/west-bengal-mamata-banerjee-bjp-aadhaar/" rel="noopener" target="_blank"&gt;strongly opposed&lt;/a&gt; the government’s plan to link mobile numbers with Aadhaar cards. She  said that it was a breach of privacy and that the ruling government was  intruding upon the citizen’s right to personal freedom. However, the  Supreme Court &lt;a href="https://www.ndtv.com/india-news/aadhaar-petitions-in-supreme-court-today-including-bengals-10-points-1768703" rel="noopener" target="_blank"&gt;questioned&lt;/a&gt; the state government’s right to challenge the Centre and asked her to file a plea with the court in her individual capacity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the data published by Telecom Regulatory Authority of India  (TRAI) on September 14, 2017, India’s telecom subscriber base &lt;a href="http://indianexpress.com/article/technology/tech-news-technology/telecom-subscriber-base-dips-marginally-to-121-crore/" rel="noopener" target="_blank"&gt;dipped by 1.3 lakh&lt;/a&gt; to 121.07 crore in July 2017. Moreover, only three operators – Reliance  Jio, Bharti Airtel and the state-run BSNL – reported additions to their  subscriber base.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Month&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Telephone subscriber base&lt;br /&gt; (in million)&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Growth rate&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Mar-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1194.58&lt;/td&gt;
&lt;td&gt;–&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Apr-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1198.89&lt;/td&gt;
&lt;td&gt;0.36%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;May-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1204.98&lt;/td&gt;
&lt;td&gt;0.51%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Jun-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1210.84&lt;/td&gt;
&lt;td&gt;0.49%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Jul-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1210.71&lt;/td&gt;
&lt;td&gt;-0.01%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(Source: &lt;a href="http://www.trai.gov.in/release-publication/reports/telecom-subscriptions-reports" rel="noopener" target="_blank"&gt;TRAI monthly subscription data&lt;/a&gt;)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dip in the subscriber count for various telecom operators can be  accredited to the phasing of registration of SIM cards through E-KYC for  new mobile numbers. While there is a the possibility of addition of  genuine subscribers in the following months, the direct subscriber  acquisition cost (DSAC) has been significantly reduced owing to the  overall reduction in subscriber addition (assuming exclusion of sunk  cost).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to the DoT directive, telecom service providers relied heavily  on the documents provided by the subscribers for SIM registration. The  two-fold impact of this was the delay in SIM activation, owing to the  transfer of documents from the retailer to the distributor to the  company and the possibility of documents not matching with the usage  timeline of usage. Additionally, tracking the ever-changing retailers  was difficult for the service providers – and with the subscriber  documents being collected and stored at one location by the service  providers, verification of dummy subscribers was difficult.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the introduction of Aadhaar linkage for mobile numbers,  subscribers are held accountable for its usage, thereby tagging  responsibility for any acts arising as a result. Savings from the  digitisation of documents and paper should also be considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, an increased number of job losses is possible, owing to the  ‘optimisation’ of the process by way of document verification, servicing  costs and reliance on third parties (to name just a few). Increased  compliance costs are also an issue of concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key question that looms prominently with the approaching deadline  is how secure public data will be, given that it may possibly be linked  with bank account numbers and income tax returns. With retailers using  fingerprints of the subscribers to validate Aadhaar numbers with the  mobile numbers at the time of SIM registration, there is an increased  risk of exposure to identity theft.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government is increasingly trying to bring in a seamless  process to assimilate data for transparency in analysing consumer  patterns, it is suggested that they also allocate funds for enhancing  the cyber-security of the data consolidated from this directive.  Furthermore, cyber security regulations can be strengthened to avoid  data leakages to third party organisations. Severe penalties should also  be implemented to ensure robust compliance to these measures.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar'&gt;https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T05:55:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now">
    <title>OPINION | Data is New Oil and Human Mind the New Battlefield. India Must Wake Up Now</title>
    <link>https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now</link>
    <description>
        &lt;b&gt;In information warfare, the battlespace is the human mind. This is where the privacy of an individual intersects with national security. Fighting this battle will require a new paradigm in thought and action.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Lt. General (Retd.) D. S. Hooda was published by &lt;a class="external-link" href="http://www.news18.com/news/india/opinion-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now-1573747.html"&gt;News18.com&lt;/a&gt; on November 11, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A few days ago, the Army Headquarters took out a public advisory  warning about a “deliberate misinformation campaign being launched by  vested interests some of which is being initiated from countries  bordering our nation.” This is an acknowledgment of the use of social  media for what is today considered the most dominant form of warfare —  ‘information warfare’. It has been extensively used by our adversaries  in Jammu and Kashmir to show the government and security forces in poor  light.&lt;br /&gt; &lt;br /&gt; Deception, propaganda and misinformation have always been a part of  warfare but what is different today is that the tools of information  warfare have acquired a new dimension. An integration of massive amounts  of data with Artificial Intelligence (AI) has given a significant  weapon in the hands of information warriors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cost of saving data has been plummeting, with the cost being halved  about every 15 months. Now more and more data about individuals is being  saved, both by corporations and governments. In his book, &lt;i&gt;Data and Goliath&lt;/i&gt;,  Bruce Schneier writes that worldwide, Google has the capacity to store  15 exabytes of data. To put it in context, one exabyte is 500 billion  pages of text. Bruce also quotes the case of Max Schrems, an Austrian  law student, who in 2011 demanded all his personal data from Facebook.  After a two year legal battle, Facebook gave him a CD with 1200 pages of  PDF. This is how much Facebook knows about you, and it does not forget  because it is all saved.&lt;br /&gt; &lt;br /&gt; All this big data would be useless unless it can be utilised for  decision making and this is where advances in AI have provided the  breakthrough. Smart machines mine the data and detect trends, patterns,  habits, ideology and desires. These personal characteristics of  individuals are being used by corporations to send targeted  advertisements to influence commercial decisions.&lt;br /&gt; &lt;br /&gt; The same technique is used in information warfare. On November 1, the US  House Intelligence Committee released Facebook advertisements bought by  Russian operatives to influence the 2016 elections. Washington Post  wrote, “The ads made visceral appeals to voters concerned about illegal  immigration...African American political activism, rising prominence of  Muslims” among other issues. Senator Angus King said, “The strategy is  to take a crack in our society and turn it into a chasm.”&lt;br /&gt; &lt;br /&gt; Data is the new oil and that is exactly how it is being traded and sold.  In the absence of any legal provisions, companies and ‘data brokers’  are sharing and selling personal data. Can this personal data find its  way to a hostile government? Last month, the US Army brought out that  their troops in the Baltic had reported instances of cell phone hacking.  However, more worrisome was the fact the hackers knew personal details  of the soldiers. Direct threats against family members of the military  can have a negative psychological impact during conflict.&lt;br /&gt; &lt;br /&gt; India has its share of political, social and ethnic differences, just as  in many societies. In recent times these differences have been  magnified as nationalism has taken centre stage. It is difficult to  imagine why these fault lines will not be exploited by inimical forces  as India enters the election mode in 2018. Looking at examples from the  US and French elections, Brexit and the cyber battle during the  Catalonia referendum, I think we have no option but to be prepared.&lt;br /&gt; &lt;br /&gt; The preparation for this war (and I do not use this word lightly) lies in three spheres — concepts, practices and structures.&lt;br /&gt; &lt;br /&gt; Conceptually, our current shortcoming is that we are viewing this issue  through a technical prism rather than the broader spectrum of  information warfare. CERT and NTRO can technically protect our critical  infrastructure but they do not have an equal understanding of the human  dimension, which is more strategic than scientific. The Americans, world  leaders in information technology, have not been able to prevent a  perceived subversion of their democratic process.&lt;br /&gt; &lt;br /&gt; Our practices need to improve. The security of personal data is a major  concern. The Supreme Court has declared privacy as a fundamental right,  but there are no privacy laws to back it up. Even data stored in India  is not safe as the owners of our data are the giant technology  companies, mostly based in the US and not under our legal control. In  September 2017, it was reported that Google has quietly stopped  challenging most search warrants from US judges in which the data  requested is stored on overseas servers.&lt;br /&gt; &lt;br /&gt; A May 2017, report by the Centre for Internet and Society estimated that  135 million Aadhaar numbers could have been leaked from official  portals. This was not due to a security breach but due to poor privacy  practices.&lt;br /&gt; &lt;br /&gt; Our continued reliance on foreign hardware and software is extremely  worrisome. There was clear evidence that Cisco systems had been  back-doored by the American National Security Agency but the Indian  military continues to procure hardware from Cisco. There is a similar  story with Chinese equipment in our telecommunication and power sectors.  An attempt to introduce an Indian operating system to replace Windows  in the Army has been mired in controversy.&lt;br /&gt; &lt;br /&gt; In case of a targeted cyber attack on India, there is little we can do  except issue advisories. The solutions will have to come from foreign  manufactures or developers whose equipment we are using. There is an  urgent need to give a fillip to developing indigenous solutions for our  critical infrastructure.&lt;br /&gt; &lt;br /&gt; And finally, structures. An organisation to execute information warfare  would have to be led by the Ministry of Defence, because the threat is  mainly from external players. It would be a combination of military  planners, specialists from the field of intelligence, government  agencies, media and cyber warfare experts. Such an organisation does not  currently exist, though the raising of the Cyber Command could fill  this gap.&lt;br /&gt; &lt;br /&gt; In information warfare, the battlespace is the human mind. This is where  the privacy of an individual intersects with national security.  Fighting this battle will require a new paradigm in thought and action.&lt;br /&gt; &lt;br /&gt; &lt;i&gt;&lt;b&gt;(The author is former Northern Commander, Indian Army, under  whose leadership India carried out surgical strikes against Pakistan in  2016. Views are personal.)&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now'&gt;https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T03:28:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
