<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 746 to 760.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/elements-of-a-decentralized-web-talk-by-gene-kogan"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/sunny-sen-livemint-november-23-2017-indias-internet-missionaries"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-november-20-2017-government-websites-made-aadhaar-details-public"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/national-privacy-workshop-at-india-international-centre"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/breach-notifications-a-step-towards-cyber-security-for-consumers-and-citizens"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/cross-border-sharing-of-data-challenges-and-solutions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-comparison-of-legal-and-regulatory-approaches-to-cyber-security-in-india-and-the-united-kingdom"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/telangana-today-november-8-2017-alekhya-hanumanthu-big-data-for-governance"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs">
    <title>Financial CERT to combat cyber threats, says MoS home affairs</title>
    <link>https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs</link>
    <description>
        &lt;b&gt;To tackle cyber threats to India’s financial institutions, the central government is mulling to establish a financial Computer Emergency Response Team (CERT).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://www.cisomag.com/financial-cert-combat-cyber-threats-says-mos-home-affairs/"&gt;CISO MAG&lt;/a&gt; on November 17, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Addressing the 15th Asia Pacific Computer Emergency Response Team (APCERT) Open Conference in New Delhi on November 15, 2017, IT Secretary Ajay Prakash Sawhney said, “right now, the one which is directly being worked on is the financial CERT. We are getting the framework in place and once that is there, we will look at other sectors. It will oversee the entire financial sector including banks and financial institutions.”&lt;br /&gt;&lt;br /&gt;In March this year, the power ministry had announced to create four sectoral CERTs for cybersecurity in power systems: CERT (Transmission), CERT (Thermal), CERT (Hydro), and CERT (Distribution).&lt;br /&gt;&lt;br /&gt;Udbhav Tiwari, program manager at the Centre for Internet and Society, a Bengaluru-based think tank, highlighted the responsibilities of the financial CERT in a conversation with Live Mint.  “The biggest task of sectoral CERT is to share information with the others in the industry. For example, if a bank undergoes an attack, normally the bank will perform all the necessary actions to limit the attack and to prevent it from happening in the future. But the obligation of sharing how the attack happened with all the other banks in India to make sure that they can protect their respective systems from such an attack, can be carried out by a financial CERT,” he said.&lt;br /&gt;&lt;br /&gt;Cybersecurity Chief Gulshan Rai, who was also present at the event, said “from April to October 2017, around 50,000 cyber security incidents have been handled by CERT-In; including phishing, malware attacks, attacks on digital payments and targeted attacks on some of the critical industries.”&lt;br /&gt;&lt;br /&gt;On August 1, 2017, MoS home affairs Hansraj Gangaram Ahir had said “as per the information by the Indian computer emergency response team (CERT-In), 50 incidents affecting 19 financial organizations have been reported during the period of November, 2016 to June, 2017.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs'&gt;https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-23T16:07:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc">
    <title>Global Commission on the Stability of Cyberspace (GCSC)</title>
    <link>https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc</link>
    <description>
        &lt;b&gt;The Global Commission on the Stability of Cyberspace organized a meeting on November 21, 2017 in New Delhi. The meeting took place at Taj Diplomatic Enclave Hotel on the sidelines of the 5th Global Conference on Cyberspace. Pranesh Prakash participated in the event.&lt;/b&gt;
        &lt;p&gt;GSC commissioners engaged in discussions with leading experts on cyber diplomacy, cyber norms and counter-proliferation. See the Draft Agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyber-security-hearings-gsc"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc'&gt;https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-23T14:38:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector">
    <title>Counter Comments on TRAI's Consultation Paper on Privacy, Security and Ownership of Data in Telecom Sector</title>
    <link>https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) has commented on the Consultation Paper on Privacy, Security and Ownership of Data in Telecom Sector published by the Telecom Regulatory Authority of India on August 9, 2017.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The submission is divided in three main parts. The first part 'Preliminary' introduces the document. The second part 'About CIS' is an overview of the organization. The third part contains the 'Counter Comments' on the Consultation Paper taking into account the submission made by other stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Download the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/counter-comments.pdf"&gt;full submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector'&gt;https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-23T14:29:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/elements-of-a-decentralized-web-talk-by-gene-kogan">
    <title>Elements of a Decentralized Web</title>
    <link>https://cis-india.org/internet-governance/events/elements-of-a-decentralized-web-talk-by-gene-kogan</link>
    <description>
        &lt;b&gt;Gene Kogan will deliver a talk on the elements of a decentralized web at the Centre for Internet (CIS) office in Bengaluru on December 11, 5.30 p.m. to 7.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The internet is broken. Straying far from the original vision of democratizing access to knowledge, large tech companies now resemble the industrial barons of the 19th century, presiding over what many scholars regard as a public utility but nevertheless unregulated. As machine learning has entered the picture, the usual suspects like Facebook, Reddit, and Quora, have begun training sophisticated algorithms on personal data to route traffic in order to maximize attention, leading to a web which is more atomized, addictive, and anxiety-inducing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response to this, some have begun writing about, conceptualizing, and implementing the open-source protocols of what they consider the future web 3.0. Cryptocurrency enthusiasts have expanded their focus to more generalized blockchains which enable trust in decentralized platforms, while initiatives like IPDB and IPFS ambitiously promise to make hosting, storage, database querying, and even computation itself possible inside of peer-to-peer networks. But all is not well in this techno-utopia -- as the speculative bubble around this "internet of money" grows, so too does interest from the very institutions these new initiatives seek to overcome. The landscape is beginning to look like Silicon Valley of the 1990s and the threat of a crash looms. It's up to us to determine which way this one will play out.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Gene Kogan&lt;/h3&gt;
&lt;p&gt;Gene Kogan is an artist and a programmer who is interested in generative systems, computer science, and software for creativity and self-expression. He is a collaborator within numerous open-source software projects, and gives workshops and lectures on topics at the intersection of code and art. Gene initiated ml4a, a free book about machine learning for artists, activists, and citizen scientists, and regularly publishes video lectures, writings, and tutorials to facilitate a greater public understanding of the subject.&lt;br /&gt;&lt;br /&gt;Links:&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://genekogan.com"&gt;genekogan.com&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt; &lt;a href="http://twitter.com/genekogan"&gt;twitter.com/genekogan&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/elements-of-a-decentralized-web-talk-by-gene-kogan'&gt;https://cis-india.org/internet-governance/events/elements-of-a-decentralized-web-talk-by-gene-kogan&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-23T14:16:26Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/sunny-sen-livemint-november-23-2017-indias-internet-missionaries">
    <title>India’s internet missionaries: The women Google is relying on to spread its Next Billion message</title>
    <link>https://cis-india.org/internet-governance/news/sunny-sen-livemint-november-23-2017-indias-internet-missionaries</link>
    <description>
        &lt;b&gt;Google’s internet saathis have brought 11.5 million women in 105,000 villages online. But there’s a catch: the women are taught to use only Google products.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sunny Sen was published by &lt;a class="external-link" href="http://www.livemint.com/Technology/vb74LKjlZbdkCagfiA3ckI/Indias-internet-missionaries-The-women-Google-is-relying-o.html"&gt;Livemint&lt;/a&gt; on November 21, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="A5l" id="U2010472038590ED" style="text-align: justify; "&gt;Until  Google came calling at Khaula, one of the nearly 100,000 villages in  Uttar Pradesh, early in 2016, few among the womenfolk there had heard  about the internet. A few had seen their men watching videos on  smartphones, but none had accessed the internet on her own.&lt;/p&gt;
&lt;p id="U201047203859CqD" style="text-align: justify; "&gt;Now,  more than 1,100 women in Khaula and neighbouring villages know how to  access the internet and regularly log in. They teach their children,  they teach themselves new skills, they look up fixes to niggling medical  problems, and watch YouTube videos.&lt;/p&gt;
&lt;p id="U201047203859vwG" style="text-align: justify; "&gt;Khaula  is ground zero for an ambitious Google initiative called Next Billion  to spread use of the internet in developing economies. The initiative  rides on the shoulders of women—internet saathis, who have been roped in  to carry the “here’s how to access the internet” message across India.  The success or failure of the saathis (saathi means friend in Hindi) in  the internet literacy project will make or break the programme.&lt;/p&gt;
&lt;p id="U201047203859i5C" style="text-align: justify; "&gt;India,  whose over 400 million data consumers make it the No. 2 market by  internet users, only behind China, is the top focus country in the Next  Billion programme. The project also covers Brazil, Indonesia, Nigeria,  and parts of Africa.&lt;/p&gt;
&lt;p id="U2010472038594EI" style="text-align: justify; "&gt;The  internet saathi programme, run by Google along with Tata Trusts is  designed in such a way that two-three women in a village are handpicked  and trained to use the internet. They, then, further train thousands of  village women—not men—on how to access it. This design is with good  reason: less than one-third of internet users in India are women and the  number is far lower in its villages, explained Rajan Anandan, Google’s  vice president for Southeast Asia and India, in a &lt;i&gt;Mint&lt;/i&gt; newspaper article in April.&lt;/p&gt;
&lt;p id="U2010472038592O" style="text-align: justify; "&gt;&lt;b&gt;Neetu’s story&lt;/b&gt;&lt;/p&gt;
&lt;p id="U2010472038590XE" style="text-align: justify; "&gt;Four  years ago, Neetu Bhagour, now 22, had made news in the village when she  won a state-level wrestling event and was selected at the national  level. But, she never made it to the nationals. “My parents didn’t allow  me to… girls in our villages are not allowed to play much,” Bhagour  said, her disappointment showing in her smile.&lt;/p&gt;
&lt;p id="U201047203859iHB" style="text-align: justify; "&gt;After  leaving wrestling, she decided to pursue studies. The college was far  away from the village and she didn’t attend every day, yet completed her  graduation in science earlier this year—one of the few to do so in  Khaula.&lt;/p&gt;
&lt;p id="U201047203859nWC" style="text-align: justify; "&gt;It  was on one of the days she was home, bunking college, that her uncle  told her that if she had time, she could teach village women how to  access the internet. That was about one-and-a-half years ago.&lt;/p&gt;
&lt;p id="U201047203859sCC" style="text-align: justify; "&gt;“I  had only seen my brother using (the internet). He had an Android phone,  but he would never let us use it,” Bhagour said. “I decided to learn  how to use the internet. People from Google trained us for three-four  days… That was the first time I used the internet.”&lt;/p&gt;
&lt;p id="U201047203859CvF" style="text-align: justify; "&gt;Google  gave her a Lava smartphone and a Celkon tablet—both entry-level  brands—to use and train other village women. The cost of the two devices  was around Rs11,000, a price that the women of Khaula would perhaps  never be able to afford. The trainers also get an umbrella and 2GB of  monthly data for each device—all provided by Google.&lt;/p&gt;
&lt;p id="U201047203859mJB" style="text-align: justify; "&gt;Till  now Google has spent about Rs50 crore on training 35,000 saathis.  That’s a tab of between Rs14,000 and Rs15,000 per saathi which includes  the Rs11,000 spent on the devices, umbrella and data.&lt;/p&gt;
&lt;p id="U201047203859GsE" style="text-align: justify; "&gt;It  was not easy for Bhagour to convince women in her village that learning  to access the internet would be useful. Often they would scoff at her:  “We don’t need it.” She stayed persistent. “It’s okay if you don’t need  the internet, but teach it to your children,” she told them. “Use Google  to know anything in this world.”&lt;/p&gt;
&lt;p id="U2010472038596RD" style="text-align: justify; "&gt;&lt;b&gt;Next billion&lt;/b&gt;&lt;/p&gt;
&lt;p id="U201047203859RHB" style="text-align: justify; "&gt;Bhagour  is one of the 35,000 internet saathis in India Google is backing. And,  in a move atypical of the search giant, it is pouring crores of rupees  training them. “Tata Trusts are equally funding the initiative for us.  Google brings in the devices, the data, and the technical know-how of  training the saathis. And Tata Trusts are managing the on-ground  implementation, the saathi stipend,” said Neha Barjatya, head of ads  marketing &amp;amp; digitizing initiatives, Google India.&lt;/p&gt;
&lt;p id="U201047203859eJB" style="text-align: justify; "&gt;The  saathis are trained on how the web works, especially how to use various  Google products such as Chrome, Search, YouTube, and PlayStore. They  are not trained to use any other product, not Facebook or WhatsApp.&lt;/p&gt;
&lt;p id="U201047203859rqC" style="text-align: justify; "&gt;Since  the beginning of the internet saathis project in 2015, Google has  covered 105,000 villages in 12 states and taught 11.5 million women how  to use the internet—making it the biggest project by Google under its  Next Billion initiative and perhaps the single largest such outreach  programme anywhere in the world.&lt;/p&gt;
&lt;p id="U20104720385923D" style="text-align: justify; "&gt;Google  wants to take the programme to 300,000 villages. “These women discover  the internet (through Google and its products), and eventually discover  how to use the internet for their needs,” said Barjatya.&lt;/p&gt;
&lt;p id="U201047203859vNE" style="text-align: justify; "&gt;&lt;b&gt;Internet hard-sell&lt;/b&gt;&lt;/p&gt;
&lt;p id="U201047203859GmD" style="text-align: justify; "&gt;It wasn’t easy for Bhagour or any of the other &lt;i&gt;saathis&lt;/i&gt;, initially.&lt;/p&gt;
&lt;p id="U201047203859pBI" style="text-align: justify; "&gt;Deepa  Rajput of Dehtora village (near Khaula) is a Ph.D in Hindi. She teaches  at the Shree Jagdamba Degree College in Agra. She was introduced to the  internet &lt;i&gt;saathi&lt;/i&gt; initiative by a friend of her husband’s. “Our  family is one of the progressive ones in the village, so it was easy to  convince my in-laws,” said Rajput.&lt;/p&gt;
&lt;p id="U201047203859ouE" style="text-align: justify; "&gt;But  when she went out to teach, it was a problem. At the start, women  didn’t allow her to take their picture, which is needed to enrol them in  the programme. Some even refused to fill the enrolment form.&lt;/p&gt;
&lt;p id="U201047203859Vx" style="text-align: justify; "&gt;Rajput’s pitch was simple, yet compelling. “&lt;i&gt;Google pe saara vishwa ka jankari prapt kar sakte hai… Agar aapka bhains bimar ho jata hai toh aap uske karan dekh sakte hai&lt;/i&gt; (You can find the entire world’s information on Google… If your buffalo  falls sick, you find the reasons there),” she told the village women.&lt;/p&gt;
&lt;p id="U201047203859bmB" style="text-align: justify; "&gt;Most  women liked the idea but they had to take the permission of their  in-laws and husbands. “Women are weak… their survival depends on how  much their husbands provide,” Rajput said.&lt;/p&gt;
&lt;p id="U201047203859e9D" style="text-align: justify; "&gt;When  Google first went to a few villages in 2013, it started by training  women directly for three-four hours. This was done at a school or the  village community centre. It didn’t work out. The turnout was dismal.  Folks at Google knew that they had to fix it if they had to expand  beyond towns.&lt;/p&gt;
&lt;p id="U201047203859nP" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;div class="bio-box" style="text-align: justify; "&gt;&lt;b&gt;The  saathis are trained on how the web works, especially how to use various  Google products such as Chrome, Search, YouTube, and PlayStore. They  are not trained to use any other product, not Facebook or WhatsApp.&lt;/b&gt;&lt;/div&gt;
&lt;p id="U201047203859mRF" style="text-align: justify; "&gt;A  pilot was done in a village near the Maheshwar town in Madhya Pradesh.  Google piloted something called the internet cart, like an ice cream  cart, which had internet-enabled tablets. Google-contracted agents would  go from village to village, home to home, with these carts and teach  the village women how to use the internet.&lt;/p&gt;
&lt;p id="U2010472038592RC" style="text-align: justify; "&gt;But,  even that wasn’t enough. Google realized that it was important to stay  in the village for a long period of time and keep training the women.  That’s when the internet saathi concept was born.&lt;/p&gt;
&lt;p id="U2010472038595V" style="text-align: justify; "&gt;The  other problem was that women didn’t have devices to access the internet  on. So Google gave them devices and free data. In 2015, Google and Tata  Trusts started identifying trainers. Initially, Google also provided  the saathis with a cycle in 1,500 villages, but stopped it as the women  preferred walking.&lt;/p&gt;
&lt;p id="U201047203859udF" style="text-align: justify; "&gt;&lt;b&gt;Changing lives&lt;/b&gt;&lt;/p&gt;
&lt;p id="U2010472038595NE" style="text-align: justify; "&gt;For  many of these beneficiaries, the internet is the only form of  empowerment. For Deepmala, a primary school teacher in Atus village not  far from Khaula, the internet helps her children learn English.  “Children often ask things we don’t know… I have started using Google to  explain things to children,” she said.&lt;/p&gt;
&lt;p id="U2010472038591NE" style="text-align: justify; "&gt;Deepmala’s  first acquaintance with the internet was when she enrolled to become a  saathi. She has trained 1,500 women since then. It wasn’t easy to  convince her husband to allow her to learn how to use the internet but  his mother stepped in. “My mother-in-law allowed me to learn… she used  to go with me for the training,” she said.&lt;/p&gt;
&lt;p id="U201047203859s1C" style="text-align: justify; "&gt;For  all the world that the internet has opened up for her, some  centuries-old habits haven’t changed. Deepmala doesn’t know much about  her husband’s work or what he earns. All she knows is that her husband  works in a shoe factory near Agra. Without her mother-in-law’s backing,  Deepmala said, she wouldn’t have been able to become a saathi.&lt;/p&gt;
&lt;p id="U201047203859w0E" style="text-align: justify; "&gt;When  she showed the village women the internet, they were initially afraid  to use it. There are a lot of myths about the ills of the internet in  the villages. Rightly so, as often boys and men in the villages click  pictures of girls and upload them to porn sites.&lt;/p&gt;
&lt;p id="U201047203859kRD" style="text-align: justify; "&gt;Women  are shy and shun anything that may intrude on their privacy. It is in  such a context that the world of information—access to Bollywood,  culture, lifestyle, pornography, information, email, voice calling, and  dozens of applications—suddenly opened up to them.&lt;/p&gt;
&lt;p id="U201047203859xvE" style="text-align: justify; "&gt;The  saathis need to have a minimum education of up to Class VIII and should  be comfortable with English. But there are no restrictions on the  saathis to pick educated women. Many of their students don’t know how to  read or write. For them, Deepa Rajput of Dehtora village said, Google  voice commands are the easiest way to search the internet. “Women are  seeing videos condemning domestic violence and oppression of women… That  is a big change,” she said.&lt;/p&gt;
&lt;p id="U201047203859fR" style="text-align: justify; "&gt;&lt;b&gt;Making money&lt;/b&gt;&lt;/p&gt;
&lt;p id="U201047203859iQD" style="text-align: justify; "&gt;Deepmala,  the school teacher saathi, taught women to search for mehendi designs  and facial makeup on Google and YouTube. “Some of them have even started  searching new salwar and blouse designs… The women tailors make more  money for these designs,” she said.&lt;/p&gt;
&lt;p id="U2010472038594xG" style="text-align: justify; "&gt;Some  women have started charging Rs50 for drawing mehendi designs. Others  have started using the internet to look for agriculture and  health-related information.&lt;/p&gt;
&lt;p id="U2010472038595BD" style="text-align: justify; "&gt;There  are other avenues of making money, too. Deepmala and few of the women  she trained landed a contract from research firm Nielsen to do a survey  of the villages and the shops, for which they were paid. A list of 96  shops was given to them with a list of 80 questions. “The form was on  the internet, we surveyed these villages and filled the form. It was  about things like what products are sold, which shops have shut down,  updating contact information…,” said Deepmala.&lt;/p&gt;
&lt;p id="U201047203859fEF" style="text-align: justify; "&gt;Monica  Sisodiya from Barhan village has trained 2,000 women, most of them who  are young. After being trained by Monica, two of them opened a beauty  parlour. “She gets customers from 10-12 villages because of the new ways  she has introduced,” said Monica, who wanted to study law in Agra, but  couldn’t because her family wouldn’t allow her to go to the city. She is  now pursuing a nursing course at Maa Bhagwati College, 7km from her  home.&lt;/p&gt;
&lt;div class="bio-box" style="text-align: justify; "&gt;&lt;b&gt;Google  makes most of its revenue by serving digital ads. As more people join  the internet and as more of them use the worldwide web, Google can  negotiate with brands to get a higher share of the digital advertizing  wallet.&lt;/b&gt;&lt;/div&gt;
&lt;p id="U201047203859lWF" style="text-align: justify; "&gt;Others  like Babita Singh are evidence that the lack of information access is  not a problem of the poor alone. Babita, 20, whose father is an  intelligence officer with the Uttar Pradesh police, lives in a house  that is prosperous by Dehtora standards. Her house has four CCTV cameras  monitoring the front and rear of the building. The images are captured  on a 42-inch LED television on the living room wall.&lt;/p&gt;
&lt;p id="U201047203859rzD" style="text-align: justify; "&gt;Yet,  Babita used the internet for the first time only four months ago after  getting trained by Deepa. Babita refers to the Chrome browser as  ‘kromee’. She said she uses the internet to fill forms for banking  entrance exams. At leisure, she browses designs of cushion covers and  sweaters and tries out new food recipes that she pulls up from the Net.&lt;/p&gt;
&lt;p id="U2010472038596lE" style="text-align: justify; "&gt;Babita’s  neighbour, Malti Rajput, teaches in a school for the mentally  challenged in a nearby village. She isn’t well off and got her first  phone from Google.&lt;/p&gt;
&lt;p id="U201047203859D0" style="text-align: justify; "&gt;“We  have started using the internet in our schools to teach the children  dance steps… They also see craft designs. We sell some of these products  to raise some money for the children,” said Malti.&lt;/p&gt;
&lt;p id="U201047203859v0H" style="text-align: justify; "&gt;&lt;b&gt;It’s business, of course&lt;/b&gt;&lt;/p&gt;
&lt;p id="U201047203859p7C" style="text-align: justify; "&gt;For  Google, this is not any corporate social responsibility activity. It is  about getting every individual in India online. “This is not a social  initiative for us. It is very much a business or marketing objective,”  said Barjatya.&lt;/p&gt;
&lt;p id="U201047203859SnF" style="text-align: justify; "&gt;Getting  more people to use the internet lies at the heart of Google’s business.  Google makes most of its revenue by serving digital ads. As more people  join the internet and as more of them use the worldwide web, Google can  negotiate with brands to get a higher share of the digital advertizing  wallet.&lt;/p&gt;
&lt;p id="U201047203859I6G" style="text-align: justify; "&gt;Barjatya  said Google does not measure what it is getting back from the  initiative. “It’s very much to get these women online and the rest will  follow,” she said. “We are only seeing how many villages and how many  women are coming online, and how does it tie back into our Next Billion  initiative.”&lt;/p&gt;
&lt;p id="U201047203859m3F" style="text-align: justify; "&gt;But  experts say Google alone can’t change rural India. “Google is probably  worried that rural India might end up like Myanmar where most users stay  within Facebook and do not explore the rest of the internet,” said  Sunil Abraham, executive director of Bengaluru-based research  organization Centre for Internet and Society.&lt;/p&gt;
&lt;div id="chart-box" style="text-align: justify; "&gt;&lt;a href="http://www.livemint.com/r/LiveMint/Period2/2017/11/20/Photos/Processed/w_google-internet.jpg" title="Ajay Negi/Mint"&gt;&lt;img class="img-responsive" src="http://www.livemint.com/r/LiveMint/Period2/2017/11/20/Photos/Processed/w_google-internet.jpg" title="Ajay Negi/Mint" /&gt;&lt;/a&gt;
&lt;div class="zoom_icon"&gt;&lt;a class="zoom-icon" href="http://www.livemint.com/r/LiveMint/Period2/2017/11/20/Photos/Processed/w_google-internet.jpg" title="Ajay Negi/Mint"&gt;Click here for enlarge&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p id="U201047203859jgF" style="text-align: justify; "&gt;&lt;b&gt;Moving the needle&lt;/b&gt;&lt;/p&gt;
&lt;p id="U201047203859lwB" style="text-align: justify; "&gt;All  the saathis FactorDaily spoke with said that at their training sessions  they are taught only how to use Google products, apart from handling  the hardware. Those, too, only on Android phones. No Facebook, no  WhatsApp, no Snapchat, no Twitter, no Paytm, no Flipkart...&lt;/p&gt;
&lt;p id="U201047203859gE" style="text-align: justify; "&gt;“This  is a smart business decision for Google but it does not really bridge  the digital divide. We need all stakeholders, including Google to work  together to reduce the cost of hardware and connectivity,” Abraham said.&lt;/p&gt;
&lt;p id="U201047203859rpG" style="text-align: justify; "&gt;Still,  a Google-commissioned study by research firm Ipsos suggests that the  internet giant has made some headway in rural India. Here are some  pointers from the study:&lt;/p&gt;
&lt;p id="U201047203859lF" style="text-align: justify; "&gt;■ 90% of women who have attended the training have a better understanding of the internet&lt;/p&gt;
&lt;p id="U201047203859Ln" style="text-align: justify; "&gt;■ 25% of women continue to use the internet (Gujarat is the highest at 35%)&lt;/p&gt;
&lt;p id="U201047203859fxC" style="text-align: justify; "&gt;■ 7% of women trained under the program feel that their social standing has improved&lt;/p&gt;
&lt;p id="U201047203859rDC" style="text-align: justify; "&gt;■ 33% trained women think that their economic condition has improved by learning new skills&lt;/p&gt;
&lt;p id="U201047203859SOC" style="text-align: justify; "&gt;■ 1% increase in village income in instances where training was conducted&lt;/p&gt;
&lt;p id="U201047203859lHC" style="text-align: justify; "&gt;Even  though most of the women are not taught to use Facebook and WhatsApp,  most of them eventually get on to social media. This is little  consolation for Facebook, which has failed to mainstream itself in rural  India the way Google has.&lt;/p&gt;
&lt;p id="U201047203859VfD" style="text-align: justify; "&gt;While  Google gets a large number of the first-time users, some of the women  have also started buying things online. Mamta Mahour of Bijpuri village  bought earphones and books from Amazon and a saree from Voonik. The  products are delivered at one of the shops in the village and Mamta  collects it from there.&lt;/p&gt;
&lt;p id="U201047203859fWG" style="text-align: justify; "&gt;Some  of the households have also started disconnecting their cable  connections, said Mamta. Her’s and Deepmala’s houses are two, for  instance. Deepmala watches ‘Piya Albela’ and ‘Big Boss’ on YouTube. “We  can watch it anytime. There is so much (power) load-shedding that you  can’t watch an entire episode on television… that’s not the case on  YouTube,” she said.&lt;/p&gt;
&lt;p id="U201047203859URC" style="text-align: justify; "&gt;&lt;b&gt;Slow going&lt;/b&gt;&lt;/p&gt;
&lt;p id="U201047203859s7E" style="text-align: justify; "&gt;Mamta  has taken a Reliance Jio connection. She watches her shows on JioTV and  YouTube. “JioTV is free. I don’t see the need of having a cable  connection at home. Rather I would use that money to recharge my phone,”  she said.&lt;/p&gt;
&lt;p id="U201047203859CoB" style="text-align: justify; "&gt;Still,  the going is grindingly slow. While Google has been successful in  teaching women in these villages to use the internet, three out of four  stop using the internet after the training.&lt;/p&gt;
&lt;p id="U201047203859qkH" style="text-align: justify; "&gt;When  the  saathi project started, internet penetration in villages was about  10%, said Barjatya. A recent report by industry lobby Internet and  Mobile Association of India and market researcher Kantar IMRB shows that  it has gone up to 17%.&lt;/p&gt;
&lt;p id="U2010472038598C" style="text-align: justify; "&gt;Barjatya  said Google spent a lot of time understanding the needs of the rural  India. These 11.5 million women trained by Google have at least been  introduced to the internet. “Over time we have seen that they have found  value in going and buying a smartphone,” Barjatya is optimistic.&lt;/p&gt;
&lt;div class="bio-box" style="text-align: justify; "&gt;&lt;b&gt;The  data story in India is changing, especially after the launch of  Reliance Jio. Google is already in talks with Reliance Jio to provide  4GB of 4G data at Rs149 a month to the saathis. Right now it is 2GB of  2G data.&lt;/b&gt;&lt;/div&gt;
&lt;p id="U201047203859L2" style="text-align: justify; "&gt;The  feedback from the saathis, meanwhile, is that the training module needs  to change: the time is too short to train someone who had never used  the internet, according to them. The saathis were given the target of  training 250 women in a week, based on which they would receive a  stipend from Tata Trust. It varies between Rs4 and Rs8 for each woman  trained.&lt;/p&gt;
&lt;p id="U201047203859nhH" style="text-align: justify; "&gt;Barjatya said the target has been brought down to 100 women a month.&lt;/p&gt;
&lt;p id="U201047203859jmF" style="text-align: justify; "&gt;&lt;b&gt;Changing data story&lt;/b&gt;&lt;/p&gt;
&lt;p id="U201047203859tJC" style="text-align: justify; "&gt;While  Google has set up a call centre to check how many beneficiaries use the  internet after training, there is no way it can ensure that women  continue to use it. Call centre agents make random calls to check if the  training is sufficient and if they are using the internet. Google might  also contemplate returning to the same village to train more women.&lt;/p&gt;
&lt;p id="U201047203859MZ" style="text-align: justify; "&gt;Also,  very few women own devices in male-dominated rural Indian society. “We  haven’t really got into creating access beyond spreading awareness.  However, yes, this is something we are open to and can consider. But  right now it is just the literacy part,” Barjatya said, talking about  subsidising mobile phones for women in villages.&lt;/p&gt;
&lt;p id="U201047203859ob" style="text-align: justify; "&gt;The  data story in India is changing, especially after the launch of  Reliance Jio. Google is already in talks with Reliance Jio to provide  4GB of 4G data at Rs149 a month to the saathis. Right now it is 2GB of  2G data.&lt;/p&gt;
&lt;p id="U201047203859i2D" style="text-align: justify; "&gt;In  the next two years, Google will need more devices and more data. For its  target of covering 300,000 villages, it will need an army of about  100,000 saathis— nearly a 10-fold jump.&lt;/p&gt;
&lt;p id="U201047203859f8G" style="text-align: justify; "&gt;Meanwhile,  back at Khaula, Bhagour, the former wrestler, has started studying for  the entrance test to join Delhi police. YouTube, she said, is handy for  her studies. She is learning tricks to solve math problems quicker.  Something else happened on Dhanteras, the festival to worship wealth,  that made Bhagour proud.&lt;/p&gt;
&lt;p id="U201047203859QPF" style="text-align: justify; "&gt;“I  got Rs4,211 for training the women. I got the money on the day of  Dhanteras,” she said. “I gave the money to my father to get the house  painted.”&lt;/p&gt;
&lt;p id="U201047203859OnB" style="text-align: justify; "&gt;&lt;i&gt;This story has been published in association with &lt;a href="https://factordaily.com/"&gt;FactorDaily.&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/sunny-sen-livemint-november-23-2017-indias-internet-missionaries'&gt;https://cis-india.org/internet-governance/news/sunny-sen-livemint-november-23-2017-indias-internet-missionaries&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-23T02:33:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns">
    <title>Aadhaar seeding: benefits and concerns</title>
    <link>https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns</link>
    <description>
        &lt;b&gt;Products and services such as bank accounts, life insurance policies and phone connections have to be linked with Aadhaar. But is this of any real help? &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shaikh Zoaib Saleem was published by &lt;a class="external-link" href="http://www.livemint.com/Money/Awu9Hz1DmuDzx0VTmQoPvL/Aadhaar-seeding-benefits-and-concerns.html"&gt;Livemint&lt;/a&gt; on November 14, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="A5l" style="text-align: justify; "&gt;The  government has made it mandatory for consumers to link many important  services with Aadhaar. You too may be getting frequent reminders to link  your banks account, mutual fund and mobile number with Aadhaar.  Recently, the Reserve Bank of India also clarified that it is mandatory  to link bank accounts with Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest addition to this  list are insurance policies. In a circular, the Insurance Regulatory and  Development Authority of India (Irdai) has stated that linking of  Aadhaar number to insurance policies is mandatory under the Prevention  of Money-laundering (Maintenance of Records) Second Amendment Rules,  2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue is being discussed intensively, with the  Supreme  Court taking a decision in favour of linking Aadhaar biometrics and the  number with a host of services. Several petitions have been filed  challenging not just the linking of these services with Aadhaar but also  the validity of Aadhaar itself. We spoke to people who support and  those who oppose this linking, to understand how either case impacts  consumers.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;The benefits &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;According to the Unique  Identification Authority of India (UIDAI), government schemes are asking  for Aadhaar as it helps to clean out duplications and fakes, and  provides accurate data to enable implementation of direct benefit  programmes. “Use of Aadhaar reduces the cost of identifying persons and  provides increased transparency to the government in implementation of  its schemes,” the Authority states under frequently asked questions on  its website (read more at: &lt;a href="https://uidai.gov.in/your-aadhaar/help/faqs.html"&gt;https://uidai.gov.in/your-aadhaar/help/faqs.html) &lt;/a&gt;So,  when you link your bank account with your Aadhaar, government benefits  such as subsidy on LPG cylinders is credited directly to that  account. The FAQs, however, do not elaborate how such linking helps an  individual who does not get, or does not wish to get, such subsidies. In  a tweet, UIDAI had said that verifying a bank account using Aadhaar  adds an additional layer of security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nakul Saxena, a  former banker who now works on policy advocacy at the software think  tank iSpirt Foundation, said that linking of Aadhaar with these services  will help eradicate fake accounts, fake insurance policies and  unauthorised mobile connections. “It is possible that there are many  accounts in the system that have been opened using such documents and  copied signatures and even the banks may not be aware of it. Some people  may not even be aware that an account exists in their name. These  accounts need to be verified using Aadhaar now,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government claims to have removed millions of fake beneficiaries for government benefits by Aadhaar linking. As reported by &lt;i&gt;Mint&lt;/i&gt; in May 2017, over 23 million fake ration cards have been scrapped,  potentially saving the government Rs14,000 crore in food subsidy every  year. Another &lt;i&gt;Mint&lt;/i&gt; report in August says, three states discovered that about 2,72,000 fake students were availing the mid-day meal (MDM) scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  those who are against linking Aadhaar disagree with these arguments.  “Initially, Aadhaar was about delivery of services. But linking  everybody’s phone number and bank account is not about that anymore. The  real question is, what purpose this linking serves. If the intention is  to update the databases, then there can be other means to update  those,” said Rahul Narayan, a Supreme Court advocate who is among the  lawyers representing petitioners who have challenged Aadhaar linking in  court.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;The concerns &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The fundamental objection to  this linking of services is that all information on an individual will  be available at a single place, which could make surveillance easier and  also increase the risks if this information is hacked. “As of now, your  bank knows something about you, your insurance company knows something  and your mobile phone company knows something about you. Each of these  are different silos of information. When these converge, which is then  accessible to a single person, that person knows almost everything about  you,” said Narayan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, a user’s Aadhaar number  and fingerprint are permanent identifiers, and at least the Aadhaar  number has been compromised for over 130 million citizens, as per  a study by Centre for Internet &amp;amp; Society, said Nikhil Pahwa,  co-founder of the SaveTheInternet.in (&lt;a href="https://internetfreedom.in"&gt;https://internetfreedom.in) &lt;/a&gt;campaign  for net neutrality in India. “This leaves the users vulnerable to  social hacks, some of which we have already been reading about in the  news. To forcefully and mandatorily link Aadhaar to bank accounts means  that their finances are at risk,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saxena said the data  leaks that have been highlighted have been typically about demographic  details such as name, date of birth and address “which have been  commonly available so far.” However, given the heightened sensitivities  in this digital age, customers must ask their service providers to not  publish such details, nor provide this information freely, he added.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Grievance redressal and data privacy &lt;br /&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Another  major concern is the absence of a clear redressal mechanisms for  consumers in case of a data leak, misuse or hack. “When things go wrong,  consumers need to have access to a proper complaints mechanism. In the  case of Aadhaar, such access is to be provided through the establishment  of ‘contact centres’ under the Regulation 32 of the UIDAI Enrolment and  Update Regulations. To the best of our knowledge, not much beyond  Regulation 32 has yet been specified by the UIDAI,” said Renuka Sane,  associate professor at the National Institute of Public Finance and  Policy, who has worked on data privacy and security issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart  from this, Section 47 of the Aadhaar Act stipulates that only UIDAI or  its authorised officers can file a criminal complaint for violations of  the Act, she added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The UIDAI has been given complete discretion  in determining if and when to file a criminal complaint for violations  of the Act, and an individual aggrieved by actions of a third person is  left to rely upon the bonafide actions of the UIDAI,” Sane added. The  government is also working towards a data privacy legislation, that is  needed to give citizens protection against misuse of their data, and  them having some control over who gets their data, how it is used, and  where it can be shared. “However, a data privacy legislation and  mechanism will not ensure that data remains secure and protected, and  that processes are followed. The Act disallowing people from sharing  Aadhaar numbers did not prevent government departments from publishing  details online,” said Pahwa. He also said that systems can get hacked,  which could include the Aadhaar database, the parallel Aadhaar databases  with state governments, or eKYC databases held with banks and telecom  operators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saxena said the UIDAI has clarified that biometric  information is not stored with user agencies, and stored biometrics  can't be used for Aadhaar authentication or eKYC. “Hence, customers can  be assured when using Aadhaar and biometrics with authorized entities,”  he said. “The data privacy law will address data privacy and protection  in all digital systems, not just Aadhaar. It will equally apply to  social media and mobile apps. It should also go into the aspect of  ‘right to be forgotten’,” said Saxena.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pahwa, however, insists  that the least that should be done is to give citizens the right to not  link their Aadhaar and use other IDs for authentication, plus the  ability to change their ID number if the system gets compromised.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;What you should do &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;For  now, the deadlines for linking bank accounts with Aadhaar is 31  December 2017, and for mobile phones it is 7 February 2018. In its  latest hearing on the matter, the Supreme Court has directed service  providers to mention these deadlines in their reminders. “Right now,  regardless of what they say, nobody is going to shut down your bank  account or disconnect your mobile connection, at least till the  deadline. There are several petitions being heard in the Supreme Court.  The matter is supposed to be taken up by the Supreme Court in the last  week of November. The final word from the court is yet to come and it is  quite possible that at least the deadlines gets extended,” said  Narayan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you have already linked these services with Aadhaar,  you are in no trouble. But if you are having second thoughts, the  linking cannot be undone. If you are concerned about safety or other  aspects, you can wait to get more clarity from the Supreme Court.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns'&gt;https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-23T02:02:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-november-20-2017-government-websites-made-aadhaar-details-public">
    <title>UIDAI admits 210 government websites made Aadhaar details public</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-november-20-2017-government-websites-made-aadhaar-details-public</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI) has admitted that Aadhaar details were leaked on over 200 central and state government websites.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.financialexpress.com/economy/uidai-admits-210-government-websites-made-aadhaar-details-public/940545/"&gt;published in the Financial Express&lt;/a&gt; on November 20, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI) has admitted  that Aadhaar details were made public on over 200 central and state  government websites. According to an RTI reply, these websites publicly  displayed name, address and other details of Aadhaar beneficiaries,  which was removed when the breach was identified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, UIDAI does not have information about the time of the  breach. It also said that Aadhaar details have never been made public by  UIDAI. “However, it was found that approximately 210 websites of the  central government, state government departments including educational  institutes were displaying the list of beneficiaries along with their  name, address, other details and Aadhaar numbers for information of the  general public,” it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI issues Aadhaar — a 12-digit unique identification number —  which acts as a proof of identity and addresses anywhere in the country.  Lately, Aadhaar has been creating furore for security and privacy  reasons, especially after the &lt;a href="http://www.financialexpress.com/tag/narendra-modi/" target="_blank"&gt;Narendra Modi&lt;/a&gt; government began aggressively pushing the identification number to be  linked with social benefits, banks, PAN, mobile number et al. In a  landmark judgement this August, the Supreme Court ruled that privacy was  a fundamental right of citizens, weakening the case for pushing Aadhar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, cases are being heard in the apex court on linking Aadhaar  to banks and mobile numbers. In May, the Centre for Internet and  Society had claimed that Aadhaar numbers of as many as 135  millions could have been leaked. “Based on the numbers available on the  websites looked at, the estimated number of Aadhaar numbers leaked  through these four portals could be around 130-135 million,” the report  by CIS had said. Further, as many as 100 million bank account numbers  could have been “leaked” from the four portals, it had added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI and the government had been vehemently denying that Aadhaar  details can be leaked despite apprehension from different sections of  society. Soon after the RTI reply appeared in media, UIDAI refuted the  news of leaks, calling it a “skewed presentation of facts. “Such report  is a skewed presentation of the facts and poses as if the Aadhaar data  is breached or leaked which is not the true presentation. Aadhaar data  is fully safe and secure and there has been no data leak or breach at  UIDAI,”  press release by PIB said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It said that the data on these websites was placed in public domain as a measure of proactive disclosure under the RTI Act.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-november-20-2017-government-websites-made-aadhaar-details-public'&gt;https://cis-india.org/internet-governance/news/financial-express-november-20-2017-government-websites-made-aadhaar-details-public&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-21T16:03:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/national-privacy-workshop-at-india-international-centre">
    <title>National Privacy Workshop</title>
    <link>https://cis-india.org/internet-governance/events/national-privacy-workshop-at-india-international-centre</link>
    <description>
        &lt;b&gt;Centre for Internet &amp; Society is organizing a round-table to discuss the potential impact of numerous policy developments with wide ranging implications for recognition and governance of privacy in India. The round-table will be held on December 9, 2017 at India International Centre in New Delhi, 10.30 a.m. to 5.00 p.m.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Background&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The recent past in India has seen numerous policy developments with wide ranging implications for recognition and governance of privacy in India. The emphatic and unanimous avowal of the right to privacy by the Supreme Court, the government’s stated commitment to a data protection law and the formation of the Sri Krishna Committee are developments which will continue to inform policymaking around privacy in India for a long time to come. The Supreme Court’s conception of a robust right to privacy encompassing different element - spatial, decisional and informational, and its guidance on strict limiting tests may have a wide impact on a range of issues. The impact of this judgment and a data protection law on informational privacy in India will be immense and it is important to delve in challenges and issues that it may throw up. In last year, we have also seen instances of purported conflict between the transparency instruments such as the right to information and the right to informational privacy. How these conflicts are resolved in law and practice will be key to these two essential human rights in the modern information society. Further, while these general consensus on privacy principles, the appropriate ways to govern and enforce privacy remains an open issue, and the success of any data protection framework will depend as much on what kind of privacy governance models are adopted.This roundtable will look to discuss the potential impact of these policy decisions, what theories should guide the data protection law in India, what models of privacy governance are workable and how privacy can co-exist with transparency principle and robust RTI regime.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Agenda&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.30 - 11.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00 - 11.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Welcome and setting the scene&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 - 12.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Session 1: Policy Developments around Informational Privacy in India&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What do different policy developments indicate about privacy in India?&lt;/li&gt;
&lt;li&gt;What are the (potential) impacts of these developments?&lt;/li&gt;
&lt;li&gt;What questions are being asked and are these the right questions to ask?&lt;/li&gt;
&lt;li&gt;How do we expect the ‘state of privacy’ to change in India in response to these policy developments?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.30 - 13.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Session 2: Approaches to Privacy and Data Protection for India&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What are different approaches to privacy and government the Indian government can take? What cultural/political etc. aspects should be taken into consideration when thinking through this question?&lt;/li&gt;
&lt;li&gt;What are the pros and cons to different approaches?&lt;/li&gt;
&lt;li&gt;What are the pros and cons to the below approaches:&lt;br /&gt; - Privacy as control&lt;br /&gt; - Data as property&lt;br /&gt; - Utilitarian approaches&lt;br /&gt; - Technological Solutions&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.30 - 14.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.30 - 15.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Session 3: Transparency and Privacy&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How can transparency from the private sector enable the right to privacy?&lt;/li&gt;
&lt;li&gt;What are key principles that can guide this relationship?&lt;/li&gt;
&lt;li&gt;Where is transparency from the private sector most needed with respect to privacy?&lt;/li&gt;
&lt;li&gt;What are incentives that governments can adopt to encourage privacy?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.30 - 16.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Governance Models for Data Protection&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What kind of institutional framework is required for governance of privacy in India?&lt;/li&gt;
&lt;li&gt;How do we address questions of liability, penalties and enforcement?&lt;/li&gt;
&lt;li&gt;What role do sectoral players have in a data governance framework?&lt;/li&gt;
&lt;li&gt;What is best way for other stakeholders like industry, civil society and academia in collaborative governance of privacy?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.30 - 17.00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Tea and snacks&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Speakers&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Usha Ramanathan&lt;/li&gt;
&lt;li&gt;Rahul Sharma&lt;/li&gt;
&lt;li&gt;Apar Gupta&lt;/li&gt;
&lt;li&gt;Malavika Raghavan&lt;/li&gt;
&lt;li&gt;Shankar Narayanan&lt;/li&gt;
&lt;li&gt;Ujwala Uppaluri&lt;/li&gt;
&lt;li&gt;Rebecca MacKinnon&lt;/li&gt;
&lt;li&gt;Nikhil Pahwa&lt;/li&gt;
&lt;li&gt;Kamlesh Bajaj&lt;/li&gt;
&lt;li&gt;Manasa Venkatraman&lt;/li&gt;
&lt;li&gt;Smitha K Prasad&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/national-privacy-workshop-at-iic.pdf"&gt;&lt;b&gt;Download the Agenda&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/national-privacy-workshop-at-india-international-centre'&gt;https://cis-india.org/internet-governance/events/national-privacy-workshop-at-india-international-centre&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-05T14:24:16Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/breach-notifications-a-step-towards-cyber-security-for-consumers-and-citizens">
    <title>Breach Notifications: A Step towards Cyber Security for Consumers and Citizens</title>
    <link>https://cis-india.org/internet-governance/blog/breach-notifications-a-step-towards-cyber-security-for-consumers-and-citizens</link>
    <description>
        &lt;b&gt;Through the Digital India project the Indian government is seeking to establish India as a digital nation at the forefront. Increasingly, this means having good cyber-security policies in place and enabling a prosperous business environment for companies that implement sound cyber-security policies. This paper will look at one such policy, which enables investments in cyber-security for IT products and services through giving consumers a way to hold business owners and public authorities to account when their security fails.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Electronic data processing has awarded societies with lots of opportunities for improvements that would not have been possible without them. Low market entrance barriers for new innovators have caused a flood of applications and automations that have the potential to improve citizens’ and consumers’ lives, as well as government operations. But while the increasing prevalence of electronic hardware and programmable software in many different parts of society and industry, combined with the intricate value chains of international communications networks, devices and equipment markets and software markets, have created a large number of opportunities for economic, social and public activity, they have also brought with them a number of specific problems pertaining to consumer rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/breach-notifications.pdf"&gt;&lt;b&gt;Read full report here&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/breach-notifications-a-step-towards-cyber-security-for-consumers-and-citizens'&gt;https://cis-india.org/internet-governance/blog/breach-notifications-a-step-towards-cyber-security-for-consumers-and-citizens&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amelia Andersdotter</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-14T15:38:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/cross-border-sharing-of-data-challenges-and-solutions">
    <title>Cross Border Sharing of Data: Challenges and Solutions</title>
    <link>https://cis-india.org/internet-governance/events/cross-border-sharing-of-data-challenges-and-solutions</link>
    <description>
        &lt;b&gt;Centre for Internet &amp; Society (CIS) has been following the debates around MLAT process taking place globally and researching potential areas of tension in the tools that India uses to access data across borders. As part of this research, CIS is hosting a workshop on cross border sharing of data on December 8, 2017 at India Islamic Centre from 10.30 a.m. to 5.00 p.m.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cross-border-data-sharing.pdf"&gt;Click to read more about the event including the agenda&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/cross-border-sharing-of-data-challenges-and-solutions'&gt;https://cis-india.org/internet-governance/events/cross-border-sharing-of-data-challenges-and-solutions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-20T15:20:18Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech">
    <title>Open House on Security Practices in FinTech </title>
    <link>https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech</link>
    <description>
        &lt;b&gt;CIS in collaboration with Has Geek is organizing an Open House on security practices in FinTech.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The prevalence of fintech companies operating in India is growing with new actors entering the sector and traditional actors such as banks beginning to offer digital financial services. The push to digital payments has been particularly strong after the demonetization policy, the development and implementation of Aadhaar and India Stack. Services offered by Fintech firms can range from offering a loan or credit to a digital wallet and digital banking and payment services. &lt;br /&gt;&lt;br /&gt;Presently, there is a regulatory gap for many of the fintech services and business models. The Reserve Bank of India has published consultation papers on Peer-to-Peer lending platforms as well as Account Aggregators, but comprehensive regulations, especially those surrounding minimum security practices, have yet to emerge – presenting a critical policy and research window. Furthermore, under Section 43A of the IT Act and its associated Rules, ‘body corporates’ are required to implement reasonably security procedures compliant with ISO27001 or a sectoral standard approved by the Central Government. However, currently such a sectoral standard is absent for the FinTech and Digital Payments space. &lt;br /&gt;&lt;br /&gt;The growing prevalence of these fintech technologies and the criticality of security of the same to engender citizen trust, protect rights, and comprehensive national security posture demands debate and discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On November 17th, the HasGeek in collaboration with the Centre for Internet and Society will be holding an Open House from 6pm - 8pm to discuss security practices in the fintech industry.&lt;/p&gt;
&lt;p dir="ltr" id="docs-internal-guid-4d88330a-afbb-67f0-a4de-5b60a3db94bc" style="text-align: justify; "&gt;&lt;span&gt;Pressing questions for discussion include: How secure are these services? What security standards are they adhering to? Who is holding them accountable for adherence to security standards? What can individuals do if there financial data is compromised? &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Please join us for a robust discussion on these issues @HasGeek House&lt;/span&gt;&lt;span&gt;, 2699, 19th Main Rd, HAL 2nd Stage, Indiranagar, 19th Main Rd, HAL 2nd Stage, Indiranagar, Bengaluru, Karnataka 560008 from &lt;/span&gt;&lt;span&gt;6PM - 8 PM on &lt;/span&gt;&lt;span&gt;November 17th.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech'&gt;https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-12T10:18:09Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-comparison-of-legal-and-regulatory-approaches-to-cyber-security-in-india-and-the-united-kingdom">
    <title>A Comparison of Legal and Regulatory Approaches to Cyber Security in India and the United Kingdom</title>
    <link>https://cis-india.org/internet-governance/blog/a-comparison-of-legal-and-regulatory-approaches-to-cyber-security-in-india-and-the-united-kingdom</link>
    <description>
        &lt;b&gt;This report is the first part of a three part series of reports that compares the Indian cyber security framework with that of the U.K, U.S and Singapore.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This report compares laws and regulations in the United Kingdom and India to see the similarities and disjunctions in cyber security policy between them. The first part of this comparison will outline the methodology used to compare the two jurisdictions. Next, the key points of convergence and divergence are identified and the similarities and differences are assessed, to see what they imply about cyber space and cyber security in these jurisdictions. Finally, the report will lay out recommendations and learnings from policy in both jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Read the full report&lt;b&gt; &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/india-uk-legal-regulatory-approaches.pdf"&gt;here&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-comparison-of-legal-and-regulatory-approaches-to-cyber-security-in-india-and-the-united-kingdom'&gt;https://cis-india.org/internet-governance/blog/a-comparison-of-legal-and-regulatory-approaches-to-cyber-security-in-india-and-the-united-kingdom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Authored by Divij Joshi and edited by Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-14T15:26:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot">
    <title>#NAMAprivacy: Data standards for IoT and home automation systems</title>
    <link>https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot</link>
    <description>
        &lt;b&gt;On 5th October, MediaNama held a #NAMAprivacy conference in Bangalore focused on Privacy in the context of Artificial Intelligence, Internet of Things (IoT) and the issue of consent, supported by Google, Amazon, Mozilla, ISOC, E2E Networks and Info Edge, with community partners HasGeek and Takshashila Institution. Part 1 of the notes from the discussion on IoT:&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Link to the original published by Medianama on October 18 &lt;a class="external-link" href="https://www.medianama.com/2017/10/223-namaprivacy-data-standards-for-iot/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The second session of the #NAMAprivacy in Bangalore dealt with the  data privacy in the Internet of Things (IoT) framework. All three  panelists for the session – &lt;b&gt;Kiran Jonnalagadda from HasGeek,  Vinayak Hegde, a big data consultant working with ZoomCar and Rohini  Lakshane a policy researcher from CIS&lt;/b&gt; – said that they were  scared about the spread of IoT at the moment. This led to a discussion  on the standards which will apply to IoT, still nascent at this stage,  and how it could include privacy as well.&lt;/p&gt;
&lt;div class="pBFsgLLI" style="text-align: justify; "&gt;
&lt;div align="center"&gt;
&lt;div id="div-gpt-ad-1506358046991-0"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176794 aligncenter" height="501" src="https://i2.wp.com/www.medianama.com/wp-content/uploads/IOT-panel-Namaprivacy-e1508321963437.jpg?resize=750%2C501&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;div class="gCmHYOrN" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Hedge, a volunteer with the Internet Engineering Task Force (IETF)  which was instrumental in developing internet protocols and standards  such as DNS, TCP/IP and HTTP, said that IETF took a political stand  recently when it came to privacy. “One of the discussions in the IETF  was whether security is really important? For a long time, the pendulum  swung the other way and said that it’s important and that it’s not big  enough a trade-off until the bomb dropped with the Snowden revelations. &lt;b&gt;The  IETF has always avoided taking any political stance. But for the first  time, they did take a political position and they published a request  for comments which said: “Pervasive monitoring is an attack on the  Internet” and that has become a guiding standard for developing the  standards,&lt;/b&gt;” he explained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that this led the development of new standards which took privacy into consideration by default.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“The repercussions has been pervasive across all the  layers of the stack whether it is DNS and the development of DNS Sec.  The next version of HTTP, does not actually mandate encryption but if  you look at all the implementation on the browser side, all of them  without exception have incorporated encryption,” he added.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176747 aligncenter" height="500" src="https://i2.wp.com/www.medianama.com/wp-content/uploads/NAMA-Data-Protection-Bangalore-93-e1508322824147.jpg?resize=750%2C500&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohini added that discussion around the upcoming 5G standard, where  large-scale IoT will be deployed, also included increased emphasis on  privacy. “It is essentially a lot of devices connected to the Internet  and talking to each other and the user. The standards for security and  privacy for 5G are being built and some of them are in the process of  discussion. Different standard-setting bodies have been working on them  and there is a race of sorts for setting them up by stakeholders,  technology companies, etc to get their tech into the standard,” she  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;b&gt;The good thing about those is that they will have time to get security and privacy. Here, I would like to mention &lt;a href="https://ict-rerum.eu/"&gt;RERUM&lt;/a&gt; which is formed from a mix of letters which stands for Reliable,  Resilient, and Secure IoT for smart cities being piloted in the EU. &lt;/b&gt;It  essentially believes that security should include reliability and  privacy by design. This pilot project was thought to allow IoT  applications to consider security and privacy mechanisms early in the  design, so that they could balance reliability. Because once a standard  is out or a mechanism is out, and you implement something as large as a  smart city, it is very difficult to retrofit these considerations,” she  explained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176796 aligncenter" height="499" src="https://i2.wp.com/www.medianama.com/wp-content/uploads/Rohini-Lakshane-CIS-Namaprivacy-e1508322694320.jpg?resize=750%2C499&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Privacy issues in home automation and IoT&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Rohini pointed out a report which illustrates the staggering amount  of data collection which will be generated by home automation. “I was  looking for figures, and I found an FTC report published in 2015 where  one IoT company revealed in a workshop that it &lt;b&gt;provides home  automation to less than 10,000 households but all of them put together  account for 150 million data points per day.&lt;/b&gt; So that’s one data  point for every six seconds per household. So this is IoT for home  automation and there is IoT for health and fitness, medical devices, IoT  for personal safety, public transport, environment, connected cars,  etc.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this sort of situation, the data collected could be used for harms that users did not account for.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“I received some data a couple of years back and the data  was from a water flowmeter. It was fitted to a villa in Hoskote and the  idea was simple where you could measure the water consumption in the  villa and track the consumption. So when I received the data, I figured  out by just looking at the water consumption, you can see how many  people are in the house, when they get up at night, when they go out,  when they are out of station. All of this data can be misused. Data is  collected specifically for water consumption and find if there are any  leakages in the house. But it could be used for other purposes,” &lt;b&gt;Arvind P from Devopedia&lt;/b&gt; said.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176800 aligncenter" height="499" src="https://i1.wp.com/www.medianama.com/wp-content/uploads/Arvind-Devopedia-Namaprivcay-e1508323377344.jpg?resize=750%2C499&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash, policy director at Centre for Internet and Society (CIS)&lt;/b&gt;,  also provided an example of a Twitter handle called “should I be robbed  now” where it correlates a user’s vacation pictures says that they  could be robbed. “What we need to remember is that a lot of correlation  analysis is not just about the analysis but it is also about the use and  misuse of it. A lot of that use and misuse is non-transparent. Not a  single company tells you how they use your data, but do take rights on  taking your data,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176801 aligncenter" height="501" src="https://i1.wp.com/www.medianama.com/wp-content/uploads/Pranesh-Prakash-Namaprivacy-e1508324108535.jpg?resize=750%2C501&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vinayak Hedge also added that the governments are using similar  methods of data tracking to catch bitcoin miners in China and Venezuela  from smart meters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In China, there are all these bitcoin miners. I was reading this story in Venezuela, where bitcoin mining is outlawed. &lt;b&gt;The  way they’re catching these bitcoin miners is by looking at their  electricity consumption. Bitcoin mining uses a huge amount of power and  computing capacity.&lt;/b&gt; And people have come out with ingenious  ways of getting around it. They will draw power from their neighbours or  maybe from an industrial setting. This could be a good example for a  privacy-infringing activity.”&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Pseudonymization&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Srinivas P, head of security at Infosys&lt;/b&gt;, pointed out that a possible solution to provide privacy in home automation systems could be the concept of pseudonymity. &lt;b&gt;Pseudonymization&lt;/b&gt; is  a procedure by which the most identifying fields within a data record  are replaced by one or more artificial identifiers or pseudonyms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There are a number of home automation systems which are similar to  NEST, which is extensively used in Silicon Valley homes, that connect to  various systems. For example, when you are approaching home, it will  know when to switch on your heating system or AC based on the weather.  And it also has information on who stays in the house and what room and  what time they sleep. And in a the car, it gives a full real-time  profile about the situation at home. It can be a threat if it is hacked.  This is a very common threat that is being talked about and how to  introduce pseudo-anonymity. When we use these identifiers, and when the  connectivity happens, how do we do so that the name and user are not  there? Pseudonymity can be introduced so that it becomes difficult for  the hacker to decipher who this guy is,” Srinivas added.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Ambient data collection&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;With IoT, it has never been able to capture ambient data. &lt;b&gt;Ambient data&lt;/b&gt; &lt;b&gt;is information that lies in areas not generally accessible to the user.&lt;/b&gt; An example for this is how users get traffic data from Internet companies. Kiran Jonnalagadda explained how this works:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“When you look at traffic data on a street map, where is that data coming from? &lt;b&gt;It’s  not coming from the fact that there is an app on the phone constantly  transmitting data from the phone. It’s coming from the fact that cell  phone towers record who is coming to them and you know if the cell phone  tower is facing the road, and it has so many connections on it, you  know that traffic is at a certain level in that area&lt;/b&gt;. Now as a  user of the map, you are talking to a company which produces this map  and it is not a telecom company. Someone who is using a phone is only  dealing with a telecom company and how does this data transfer happen  and how much user data is being passed on to the last mile user who is  actually holding the phone.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176802 aligncenter" height="501" src="https://i0.wp.com/www.medianama.com/wp-content/uploads/Kiran-Namaprivacy-e1508324684657.jpg?resize=750%2C501&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jonnalagadda stressed on the need for people to ask who is aggregating this ambient data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Now obviously, when you look at the map, you don’t get to see, who  is around you. And that would be a clear privacy violation and you only  get to see the fact that traffic is at a certain level of density around  the street around you. But at what point is the aggregation of data  happening from an individually identifiable phone to just a red line or a  green line indicating the traffic in an area. We also need to ask who  is doing this aggregation. Is it happening on the telecom level? Is it  happening on the map person level and what kind of algorithms are  required that a particular phone on a cell phone network represents a  moving vehicle or a pedestrian? Can a cell phone company do that or does  a map company do that? If you start digging and see at what point is  your data being anonymized and who is responsible for anonmyzing it and  you think that this is the entity that is supposed to be doing it, we  start realizing that it is a lot more complicated and a lot more  pervasive than we thought it would be,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;#NAMAprivacy Bangalore:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Will artificial Intelligence and Machine Learning kill privacy? [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-artificial-intelligence-privacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Regulating Artificial Intelligence algorithms [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-regulating-artificial-intelligence-algorithms/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Data standards for IoT and home automation systems [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-data-standards-for-iot/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;The economics and business models of IoT and other issues [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-economics-and-business-models-of-iot/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;#NAMAprivacy Delhi:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Blockchains and the role of differential privacy [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-blockchains-role-differential-privacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Setting up purpose limitation for data collected by companies [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-setting-purpose-limitation-data-collected-companies/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;The role of app ecosystems and nature of permissions in data collection [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-role-app-ecosystems-nature-permissions-data-collection/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Rights-based approach vs rules-based approach to data collection [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-rights-based-approach-vs-rules-based-approach-data-collection/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Data colonisation and regulating cross border data flows [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-data-colonisation-and-regulating-cross-border-data-flows/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Challenges with consent; the Right to Privacy judgment [&lt;a href="https://www.medianama.com/2017/09/223-consent-challenges-privacy-india-namaprivacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Consent and the need for a data protection regulator [&lt;a href="https://www.medianama.com/2017/09/223-privacy-india-consent-data-protection-regulator-namaprivacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Making consent work in India [&lt;a href="https://www.medianama.com/2017/09/223-privacy-india-consent-namaprivacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot'&gt;https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2017-11-08T02:15:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot">
    <title>#NAMAprivacy: The economics and business models of IoT and other issues</title>
    <link>https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot</link>
    <description>
        &lt;b&gt;On 5th October, MediaNama held a #NAMAprivacy conference in Bangalore focused on Privacy in the context of Artificial Intelligence, Internet of Things (IoT) and the issue of consent, supported by Google, Amazon, Mozilla, ISOC, E2E Networks and Info Edge, with community partners HasGeek and Takshashila Institution.&lt;/b&gt;
        &lt;p&gt;Link to the original published by Medianama on October 18, 2017 &lt;a class="external-link" href="https://www.medianama.com/2017/10/223-namaprivacy-economics-and-business-models-of-iot/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Part 1 of the notes from the discussion on IoT are &lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-data-standards-for-iot/"&gt;here&lt;/a&gt;. Part 2:&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The session on IoT shifted gears and the participants spoke more  about the economics and business IoT. Participants expressed concern  that data could be linked to very private aspects of their lives and  build business models around them. For example, data from fitness  trackers can be linked to a user’s insurance premiums. Or sensors on a  car that monitors a user’s driving behavior and link motor insurance.&lt;/p&gt;
&lt;div class="b8eaROKM" style="text-align: justify; "&gt;
&lt;div align="center"&gt;
&lt;div id="div-gpt-ad-1506358046991-0"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;“I work for Zoomcar, and these are devices which our lives depend and  are collecting and reporting data. And that data can be used against  you. So it is very hard to know what is fair and what is unfair. Someone  mentioned insurance, I feel it is useful to collect a lot of data and  decide on insurance based on your driving behaviour and we have had  markers for that. But is it fair to the user? The same kind of questions  crops up elsewhere like in the US when it comes to healthcare,” Vinayak  Hegde said.&lt;/p&gt;
&lt;div class="vicuqiWy" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176814 aligncenter" height="499" src="https://i1.wp.com/www.medianama.com/wp-content/uploads/vinayak-hegde-namaprivacy-e1508340779342.jpg?resize=750%2C499&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An audience member pointed out to that in such a scenario, privacy  can help businesses rather than inhibit them and cited a research study  in UC Berkely.  “If I use a health tracking device, some of those  devices can be valuable for health insurance companies and using that  data, they might increase the premiums. But I don’t know actually who  might sell my data to someone,” he explained.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“&lt;b&gt;Because I don’t know which tracking devices sell  my data, I would like not to own the devices itself. So that itself  harms the entire health tracker industry itself.&lt;/b&gt; He (the  researcher) defines privacy as contextual integrity. So a health  tracking device is supposed to help me track my health and not supposed  to be used by insurance people to determine my premium. If the  regulation mandates the contextual integrity of that, it helps that  particular industry to avoid those feedback loops,” he explained.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 style="text-align: justify; "&gt;Are fitness trackers in the hardware or services business?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Kiran Jonnalagadda of HasGeek&lt;/b&gt; added to the point on  fitness trackers. He said that all of IoT is not in the business of  hardware and that they are in the services business.  “I had an unusual  experience for the past one week, I was out in an area with no Internet  connection. But I have two fitness trackers. I bought them mostly  because I’m curious about how these companies operate and what they’re  doing. And the differences between them are the way they think about  things. &lt;b&gt;Now both of these are capable of counting steps without  an Internet connection…. But they cannot do anything to show the step  count on my phone which it connects to until the data is sent to the  Internet and brought back.&lt;/b&gt; So my phone would keep telling me  that I am not moving and tell me the move but the watch is saying that I  am doing 20,000 steps a day and that I am trekking a lot,” he  explained.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“For whatever reason, these companies have decided to operate in this manner &lt;b&gt;where  validation of data happens on the cloud and not on the device. You only  get the most rudimentary data from your device and your phone is just a  conduit and not a processing centre at all,” Jonnalagadda said. &lt;/b&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176815 aligncenter" height="501" src="https://i0.wp.com/www.medianama.com/wp-content/uploads/kiran-namaprivacy-2-e1508340895481.jpg?resize=750%2C501&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He explained both the devices were in the device sales business and  has not asked money from them for enabling this sort of Internet-based  processing of data. “It calls into question, what is the model here. One  could bring the conspiracy theory that they’re selling my data and  therefore they don’t worry about collecting data from me. &lt;b&gt;The  second is to say: be a little bit more charitable and they recognize  that if they piss me off, I won’t buy their device again. And then just  assume that a device has a lifetime of just 2-3 years and if you keep a  person happy for 2-3 years, they will buy the device from you again.&lt;/b&gt; What’s interesting is ultimately not about devices and that it is about  services. And this is what I want to say about IoT that it is not about  hardware at all it is entirely about services. &lt;b&gt;Without  services, the entire business model of IoT breaks down. You do not get  software updates, you get vulnerabilities, you get &lt;/b&gt;broken&lt;b&gt; design, things have stopped working and no one supports you.” &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The economics of processing data locally on a device&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Thejesh GN, co-founder of DataMeet, questioned the need for data to  be processed on the Internet and asked whether the data will be better  protected and have better privacy if it were processed locally.  “Considering the fact that we have such powerful phones which are  affordable, and can do a lot of things without the Internet. I mean the  biggest concept we had in IoT was that we didn’t have CPU or memory and  processing power. Given that and the availability of EDGE devices, how  long will we have economic cases where privacy can be sold as part of  IoT. The processing happens 99% of the times locally without Internet  and requires the Internet only when there is messaging. This could be  true for your fitness trackers that can be connected to your phone. Your  phone has all the capabilities to do all the analysis and doesn’t need  to go to the server,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176816 aligncenter" height="333" src="https://i1.wp.com/www.medianama.com/wp-content/uploads/thejesh-namaprivacy-e1508340996548.jpg?resize=500%2C333&amp;amp;ssl=1" width="500" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash of the CIS countered him and said that the economics for processing data works out cheaper for the companies.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“One on local processing, this I think is a perennial problem and it really is a question of economics versus principles. &lt;b&gt;Free  software is losing out the battle against using other people’s  computers for computing—cloud computing—because of economics. So, you no  longer own the software that you purchase and even the hardware, very  often, with IOT might not actually be yours. It might come with a  license, it might come with data that is tied to the company that is  actually providing you the device.&lt;/b&gt; So the economics of this are  for me clear: it’s much cheaper to do it on other computers than to do  it locally,” Prakash explained.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;He made a case for asserting for individual user’s rights to privacy  in this kind of scenario. “It is a question of principles. Should we  allow for that or should we assert for consumer protection laws and  assert other manners of laws to say that ‘no, people who are purchasing  devices’ ought to have greater control of the devices and the data that  they produce,”  he added.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Group privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The audience also suggested that privacy laws should not just look at  protecting the rights of individuals but should look at protecting the  rights of groups as well. They raised concerns that even in a group and  if the data has been anonymized, it still can be weaponized and cause  harms.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“For example, if there are 10-15 of us in this room and  given our detailed medical histories, I can find a correlation between  some of that. And then I can use that data in some other form when I run  a test to see if I am vulnerable to something or use it as a way to  discriminate further down the line. As a group, privacy matters a lot  because when we talk about devices, we are talking about individuals. &lt;b&gt;Maybe you can target via ethnicity or by age or by class and that can also be weaponized,&lt;/b&gt;” an audience member suggested.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Vinayak Hegde gave an example of how weather data captured by IoT can  cause harms to a society at large. “If I’m using the weather sensor  data and because of global warming, some places like Florida and south  of India are going to be extremely hot, I can use surge pricing for a  person’s electricity. &lt;b&gt;Again I am not getting targeted as an  individual, but as a group, I am being targeted. And sensors are closing  that loop really fast.” &lt;/b&gt;he explained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Srinivas P&lt;/b&gt;, &lt;b&gt;head of security at Infosys, &lt;/b&gt;gave  another example where gyroscopes in a phone could target a family.  “Some companies in the US use gyroscope in a phone to surreptitiously  monitor TV viewing habits. The mobile phone gets activated and over a  period of time, they can tweak the advertisements. It is an interesting  example, because in TV, when you watch at home, you cannot pinpoint TV a  user, because it is shared by a family. &lt;b&gt;This is because the guy  who is watching the maximum amount of TV, their data gets circulated  and the ads will be tailored to them. The person who does not watch that  much amount of TV gets baffled to see advertisements that are not  relevant to them.&lt;/b&gt; So when you want to process data, you want to  assume that, this TV belongs to a user. The TV belongs to a group. And  what if the viewing habits are so different, that once your privacy is  violated, you don’t want your other family member to know what you are  watching,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-large wp-image-176767 aligncenter" height="366" src="https://i2.wp.com/www.medianama.com/wp-content/uploads/NAMA-Data-Protection-Bangalore-58.jpg?resize=550%2C366&amp;amp;ssl=1" width="550" /&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Perception of permissions for sensors&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Rohini Lakshane of CIS raised an important point during the  discussion. The users have different perceptions about the sensors that  are embedded in smartphones. She pointed out that users are generally  unaware that accelerometers are sensors and capture data and most apps  do not ask permissions for the same. An accelerometer is a device used  to measure acceleration forces. It is usually used in devices to measure  movement and vibrations in devices such as fitness trackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176817 aligncenter" height="501" src="https://i2.wp.com/www.medianama.com/wp-content/uploads/Rohini-namaprivacy-e1508341268504.jpg?resize=750%2C501&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“A researcher surveyed a control group and asked them if  their GPS data was taken and their camera was made accessible, whether  they would be comfortable with it? They were hugely uncomfortable.&lt;b&gt; The question came to the accelerometer on the phone and the respondents  said that ‘we are not all that afraid’. The accelerometer only counts  the acceleration. So in that app which counts how many steps we have  taken in a day, it uses the accelerometer and there is no permission  required for it.&lt;/b&gt; The accelerometer is still on the phone and is  still generating the data and you don’t see it because you don’t have  an interface directly with it,” she commented.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;*&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;#NAMAprivacy Bangalore:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Will artificial Intelligence and Machine Learning kill privacy? [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-artificial-intelligence-privacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Regulating Artificial Intelligence algorithms [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-regulating-artificial-intelligence-algorithms/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Data standards for IoT and home automation systems [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-data-standards-for-iot/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;The economics and business models of IoT and other issues [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-economics-and-business-models-of-iot/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;#NAMAprivacy Delhi:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Blockchains and the role of differential privacy [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-blockchains-role-differential-privacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Setting up purpose limitation for data collected by companies [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-setting-purpose-limitation-data-collected-companies/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;The role of app ecosystems and nature of permissions in data collection [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-role-app-ecosystems-nature-permissions-data-collection/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Rights-based approach vs rules-based approach to data collection [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-rights-based-approach-vs-rules-based-approach-data-collection/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Data colonisation and regulating cross border data flows [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-data-colonisation-and-regulating-cross-border-data-flows/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Challenges with consent; the Right to Privacy judgment [&lt;a href="https://www.medianama.com/2017/09/223-consent-challenges-privacy-india-namaprivacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Consent and the need for a data protection regulator [&lt;a href="https://www.medianama.com/2017/09/223-privacy-india-consent-data-protection-regulator-namaprivacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Making consent work in India [&lt;a href="https://www.medianama.com/2017/09/223-privacy-india-consent-namaprivacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot'&gt;https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IoT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-08T02:09:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/telangana-today-november-8-2017-alekhya-hanumanthu-big-data-for-governance">
    <title>Big Data for governance</title>
    <link>https://cis-india.org/internet-governance/news/telangana-today-november-8-2017-alekhya-hanumanthu-big-data-for-governance</link>
    <description>
        &lt;b&gt;Recent times have witnessed an explosion of data as users started leaving a huge data footprint everywhere they go. Interestingly, this period has seen a phenomenal increase in computing power couple by a drop in costs of storage.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Alekhya Hanumanthu was published in &lt;a class="external-link" href="https://telanganatoday.com/big-data-governance"&gt;Telangana Today&lt;/a&gt; on November 4, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;India is now sitting on the data so generated and subjecting it to data analytics for uses in various sectors like insurance, education, healthcare, governance, so on and so forth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Centre for Internet and Society (CIS), in 2015, the Government of Narendra Modi launched Digital India Programme to ensure availability of government services to citizens electronically by improving online infrastructure and Internet connectivity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amongst other things, e-Governance and e-Kranti intend to reform  governance through technology and enable electronic delivery of  services. Needless to say, it will involve large scale digitisation,  electronic collection of data from residents and processing. The Big  data so created will help policy making evolve into a data backed,  action oriented initiative with accountability asserted where it is due.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Let’s take a look at some Big Data based initiatives underway according to analyticsindiamag:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Project insight:&lt;/b&gt; Undertaken up by Indian tax  agencies, Project Insight is an advanced analytical tool that is a  comprehensive platform that encourages compliance of tax while at the  same time it prevents non-compliance. Significantly, it will be used to  detect fraud, support investigations and provide insights for policy  making. For instance, it will detect the social media activity of a  person to glean their spending and check if it is commensurate with the  tax they have paid during that year. Needless to say, this will also  unearth sources of black money.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Economic Development Board in Andhra:&lt;/b&gt; CORE-CM Office  Realtime Executive Dashboard is an integrated dashboard established to  monitor category-wise key performance indicators of various  departments/schemes in real time. Users can check key performance  indicators of various departments, schemes, initiatives, programmes,  etc. With a panoply of services information ranging from Women and Child  Welfare to Street lights monitoring, it has become an exemplary role  model of governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Geo-tagging of assets under Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA):&lt;/b&gt; Under the guidance of Narendra Modi, online monitoring of assets to  check leakages Ministry of Rural development was started. To achieve  this, they were tied up with ISRO and National Informatics Centre to geo  tag MGNREGA assets. According to India Today, the assets created range  from plantations, rural infrastructure, water harvesting structures,  flood control measures such as check dams etc. To do this, a junior  engineer takes a photo of an asset and uploads it on the Bhuvan web  portal run by ISRO’s National Remote Sensing Centre via a mobile app.  Once a photo is uploaded, time and location gets encrypted  automatically. Thus, the Government hopes to hold an ironclad control of  the resources thus disseminated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CAG’s centre for Data Management and Analytics:&lt;/b&gt; According to Comptroller and Auditor General of India, The CAG’s Centre  for Data Management and Analytics (CDMA) is going to play a catalytic  role to synthesise and integrate relevant data into auditing process.  According to an announcement on National Informatics Centre (NIC), it  aims to build up capacity in the Indian Audit and Accounts Department in  Big Data Analytics to explore the data rich environment at the Union  and State levels. What’s more, this initiative of CAG of India, puts it  amongst the pioneers in institutionalising data analytics in government  audit in the international community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Task Force to spruce up Employment Data:&lt;/b&gt; The data  provided by Labour Bureau is limited and not timely enough for  policymakers to assess the need for job creation. To address this gap,  the Government has set up a committee tasked to fill the employment data  gap and ensure the timely availability of reliable information  regarding job creation. Thus the top line of Government has a direct  view of where the employment gaps are so that it can facilitate creation  of appropriate jobs.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What’s the big picture?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Policy making and governance by Indian government have traditionally  been rife with red tape, bureaucracy and corruption. Lack of  accountability on part of Government workforce not only impacted the  quantity and quality of work delivered but also invited corrupt  practices and leakages. So, Big data is a welcome change in direction.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/telangana-today-november-8-2017-alekhya-hanumanthu-big-data-for-governance'&gt;https://cis-india.org/internet-governance/news/telangana-today-november-8-2017-alekhya-hanumanthu-big-data-for-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2017-11-08T01:42:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
