<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 841 to 855.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-may-29-2017-bharat-joshi-bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/inc42-may-23-2017-shweta-modgil-sharad-sharma-aplogises-for-trolling-aadhaar-critics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/open-house-on-information-breaches"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-may-24-2017-shalina-pillai-anand-j-ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/catch-news-may-25-2017-sharad-sharma-apos-case-shows-how-rampant-troll-culture-has-become-under-modi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/consilience-2017-a-conference-on-artificial-intelligence-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/4th-national-standards-conclave-evolving-a-comprehensive-national-strategy-for-standards-sectoral-and-regional-inclusiveness"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-may-20-2017-anumeha-yadav-will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-may-29-2017-bharat-joshi-bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website">
    <title>BBMP faces ire for publishing pourakarmikas' Aadhaar details on website</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-may-29-2017-bharat-joshi-bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website</link>
    <description>
        &lt;b&gt;The Bruhat Bengaluru Mahanagara Palike (BBMP) has published the Aadhaar details and other personal information of thousands of its pourakarmikas - civic workers who sweep streets and collect waste door-to-door.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This has angered activists who believe it could be misused. BBMP claims it was done to bring transparency in the city's solid waste management. &lt;i&gt;The article by Bharat Joshi was published in the &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/politics-and-nation/bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website/articleshow/58889617.cms"&gt;Economic Times&lt;/a&gt; on May 29, 2017&lt;/i&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar number, provident fund number, employee state insurance  (ESIC) number and residential addresses of thousands of pourakarmikas  are available ward-wise on the civic body's website. ET accessed as many  as 4,215 Aadhaar numbers and 5,744 PF and ESI numbers of pourakarmikas  from 58 wards. The number could be much higher across the city's 198  wards. An ESI number grants access to personal details of an employee on  the esic.nic.in website, such as father's name and date of birth.  &lt;br /&gt; &lt;br /&gt; The city has over 30,000 pourakarmikas, most of them Dalit women and  employed by contractors. The disclosure of their Aadhaar numbers comes  at a time when the Modi administration's push for wider application of  the unique identification number has triggered a nationwide debate on &lt;a href="http://economictimes.indiatimes.com/topic/privacy" target="_blank"&gt;privacy&lt;/a&gt;.  &lt;br /&gt; &lt;br /&gt; "(Disclosure) happens because authorities don't read the law," Supreme  Court advocate KV Dhananjay said. "There is every possibility of  misuse, especially identity theft. What hackers do is they start  aggregating such information because the Aadhaar is used as a platform  for transfer of benefits. And with Aadhaar set to become the anchor for  many things, the BBMP should immediately remove those details."  &lt;br /&gt; &lt;br /&gt; A recent report by city-based Centre for Internet and Society flagged  four government agencies for publishing Aadhaar and other financial  data. It blamed the Unique Identification Authority of India (UIDAI) for  turning a blind eye to the lack of standards prescribed for how other  agencies deal with data, such cases of massive public disclosure and  "the myriad ways in which it could be used for mischief."  &lt;br /&gt; &lt;br /&gt; Earlier this month, UIDAI chief executive officer Ajay Bhushan Pandey  wrote to chief secretaries of all states, reminding them that publishing  an Aadhaar number is prohibited under Sections 29(2), 29(3) and 29(4)  of the Aadhaar Act, 2016. "Our intention was not to cause anyone any  harm," BBMP Joint Commissioner (solid waste management) Sarfaraz Khan  said. The idea was to prevent contractors from taking payments against  non-existent pourakarmikas. "We're also planning to make public details  of which exact street a pourakarmika is working on."  &lt;br /&gt; &lt;br /&gt; He added that he would discuss the disclosure with the Commissioner,  "If there is any violation, the Aadhaar numbers will be removed."  &lt;br /&gt; &lt;br /&gt; This points to the need for BBMP to have a policy on data and privacy,  said Vinay K Sreenivasa of the Alternative Law Forum. "Of what use is  an Aadhaar number to the BBMP? Names and photographs would have sufficed  to ensure transparency."  &lt;br /&gt; &lt;br /&gt; &lt;b&gt;ET Follow-up on Scare in Malleswaram&lt;/b&gt; &lt;br /&gt; BBMP Joint Commissioner Sarfaraz Khan was unaware that publishing  Aadhaar data is a punishable offence. However, the election wing of the  BBMP has ordered a probe after ET reported how a certain Hanumantharaju,  claiming to be a municipal official, collected Aadhaar details from  residents of the Atma KT Apartment in Malleswaram.  &lt;br /&gt; &lt;br /&gt; Residents also filed a complaint with the Malleswaram police. "We called  the man's mobile number but a woman picked up. Further investigation is  underway and BBMP is also checking its records," a police officer said.   &lt;br /&gt; &lt;br /&gt; Residents also plan to submit a representation to  Malleswaram MLA CN Ashwathnarayan. "We have taken this seriously and are  awaiting a report from the Malleswaram BBMP revenue office," Assistant  Commissioner (election) TR Shobha told ET.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-may-29-2017-bharat-joshi-bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website'&gt;https://cis-india.org/internet-governance/news/economic-times-may-29-2017-bharat-joshi-bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-06T14:27:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/inc42-may-23-2017-shweta-modgil-sharad-sharma-aplogises-for-trolling-aadhaar-critics">
    <title>Sharad Sharma Apologises for Trolling Aadhaar Critics; Unmasking Ispirit's Controversial Trolling Program</title>
    <link>https://cis-india.org/internet-governance/news/inc42-may-23-2017-shweta-modgil-sharad-sharma-aplogises-for-trolling-aadhaar-critics</link>
    <description>
        &lt;b&gt;Last weekend I was at Aditi Mittal’s standup comedy show in Mumbai where she made a cheeky remark that stayed with me – “Do you guys know what India’s soft power is today? It is trolling!” &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Shweta Modgil was &lt;a class="external-link" href="https://inc42.com/buzz/sharad-sharma-trolling-aadhaar/"&gt;published by Inc 42&lt;/a&gt; on May 23, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;While she was poking fun at the Snapchat-Snapdeal-Evan Spiegel controversy, in a bizarre coincidence those words came back to haunt me three days later. That was when one of biometric authentication system Aadhaar’s most vocal critics, Kiran Jonnalagadda, co-founder of Internet Freedom Foundation (IFF), an advocacy group, revealed in a series of tweets that @Confident_India, one of the anonymous accounts arguing in favour of Aadhaar and attacking its critics on Twitter, was being operated by none other than Sharad Sharma, the founder of software products think tank iSPIRT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the time, &lt;b&gt;Sharad had completely denied that he was tweeting from an anonymous account&lt;/b&gt;. But today, on Twitter, Sharad apologised for the anonymous trolling &lt;a class="external" href="https://twitter.com/sharads/status/866943195678035968/photo/1" rel="noopener noreferrer nofollow" target="_blank"&gt;on Twitter&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a tweet, Sharad stated that “There was a lapse of judgement on my part. I condoned tweets with uncivil comments. So I’d like to unreservedly apologise to everybody who was hurt by them.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that “Anonymity seemed easier than propriety, and tired as I was by personal events and attacks on iSPIRT’s reputation, I slipped.” Furthermore, he stated that he would not be part of anything like this again or allow such behaviour to continue. He also revealed that an iSPIRT Guidelines and Compliance Committee (IGCC) has been set up to investigate the matter and recommend corrective action.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;On Catching a Troll&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 17 May, Kiran tweeted out a revelation, which shook a lot of people – “Have we caught an Aadhaar troll?” Kiran used Twitter’s account reset option on Confident_India with Sharad Sharma’s number to see if it is was accepted. And, as per a screenshot posted by him, it did.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was further corroborated by many other Twitter users. Medianama’s Nikhil Pahwa (and co-founder of IFF) also confirmed the same, tweeting that the troll account does link to Sharad Sharma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a &lt;a class="external-link" href="https://medium.com/@jackerhack/inside-the-mind-of-indias-chief-tech-stack-evangelist-ca01e7a507a9"&gt;detailed&lt;/a&gt; Medium post, Kiran then revealed how he investigated the rise of anonymous Twitter accounts and trolls responding to critics of Aadhaar. But what he revealed next was the shocking part – that at the 27th Fellows meeting of the think tank, a plan was hatched to respond to critics of India Stack which involved the use of trolls. A group called Sudham, created earlier, divided people who were broadcasting different views on Aadhaar, into different categories and then underlined various proposals on dealing with them. One of the groups called “archers” was entrusted to carry out the mainstream debate, while another group of “swordsmen” was entrusted to challenge people who were categorised as informed yet “trolling.” Swordsmen would do this by coordinating on WhatsApp with quick responses and in numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/WhatCanYoDo.jpg" alt="Trolled" class="image-inline" title="Trolled" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kiran got a hold of the presentation and also shared how one controversial slide also showed a detractor matrix.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is this slide which Kiran uses to illustrate the fact that: “ iSPIRT has an officially sanctioned trolling program where the trolls coordinate on WhatsApp and attack together on Twitter, exactly the behaviour seen in all the tweets above—and I’ve only covered the leader’s tweets. There are at least a dozen known troll accounts that attack in packs.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;First Denial&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Back when the information was first revealed, Sharad Sharma responded by denying that he was tweeting from the &lt;a class="external" href="https://twitter.com/Confident_India" rel="nofollow" target="_blank"&gt;@&lt;b&gt;Confident_India&lt;/b&gt;&lt;/a&gt; Twitter account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He further added that he was in for a family emergency in the US. And that he was clueless as to why his number was linked with that account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, interestingly, what roused the investigator’s suspicions was that Sharad shared the same denial from another troll account @indiaforward2 – which was captured by another Twitter user before it was deleted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The denial from Sharad’s true account came half an hour later. But the damage had been done and all fingers pointed in the direction of Sharad Sharma engaging in trolling from those accounts. Kiran then wrote another damning post on Sharad’s &lt;a class="external-link" href="https://medium.com/@jackerhack/sharad-sharmas-dubious-denial-b0b9aa6c6b8f"&gt;dubious denial&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As can be guessed, all the tweets related to this matter from Sharad’s and Indiaforward’s accounts have been deleted. The last tweet from Confident India’s account on 17 May professed that he is not Sharad Sharma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, iSPIRT finally &lt;a class="external-link" href="https://medium.com/@mtrajan/ispirt-response-to-kiran-jonnalagadda-3f977fb91df4"&gt;responded&lt;/a&gt; to Kiran’s revelations on Medium –“We want to categorically state that the allegations against iSPIRT coordinating and/or promoting any troll campaign are false and the evidence presented is a deliberate misreading of our intent to engage with those speaking against India Stack.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The post further explained that in its Fellows meeting held in February and April 2017, it did address the issue of the chatter around India Stack. It says, “Our volunteer, Tanuj Bhojwani, led the discussion and we outlined our strategy for dealing with our detractors. The slide in question is clearly titled “Detractor Matrix.” The slide outlines how we classify those speaking against India Stack, and how we are engaging with them. We called one category of people “informed yet trolling (IYT),” a category of people deliberately misleading people, despite understanding the nuance behind the debate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The post admitted that the think tank encouraged volunteers to respond to these IYT Twitter handles directly from their own personal handles. However, at no point did it endorse or recommend anonymous trolling.&lt;br /&gt;&lt;br /&gt;“We are aware that some volunteers and their friends have created an anonymous campaign to Support Aadhaar. This is not a troll campaign, but an informational one. It is also not an iSPIRT campaign.”&lt;br /&gt;&lt;br /&gt;It concluded with: “Kiran’s motivated misrepresentation of the slides perhaps speaks to his biases against iSPIRT.” The post added that it plans to investigate the confusion around the alleged mobile number and account link and clarify all outstanding questions.&lt;br /&gt;&lt;br /&gt;Meanwhile coming back to trolling from where we started. Though Sharad’s apology did not say directly whether he operated the two Twitter accounts — @Confident_ India and @Indiaforward2 — which he was suspected of using for trolling- he signs off by saying that he requests “those who I have disappointed to look at this as an exception.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Aadhaar Controversy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While the series of incidents raises many doubts over an esteemed organisation such as iSPIRT, the controversy over Aadhaar, India’s massive biometric identification programme, has been raging for many months now.&lt;br /&gt;&lt;br /&gt;Over the last few months, it has come under fire for not addressing the privacy concerns of an individual and leaking individual data. Aadhaar critics have pointed out that it is more a mass surveillance tool, can lead to identity thefts, and linking basic services with it spells doom.&lt;br /&gt;&lt;br /&gt;&lt;a class="external-link" href="http://timesofindia.indiatimes.com/business/india-business/aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report/articleshow/58529002.cms"&gt;This month&lt;/a&gt;, a CIS (Centre for Internet and Society ) report revealed that Aadhaar numbers and personal information of as many as 135 million Indians could have been leaked from four government portals, due to lack of IT security practices. The report claimed that the absence of “proper controls” in populating the databases could have disastrous results as it may divulge sensitive information about individuals, including details about the address, photographs, and financial data. It also added that as many as 100 Mn bank account numbers could have been “leaked.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, on May 16, the CIS &lt;a class="external-link" href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof/view"&gt;updated its report&lt;/a&gt; and clarified that although the term ‘leak’ was originally used 22 times in its report, &lt;b&gt;it is at “best characterised as an illegal data disclosure or publication and not a breach or a leak.&lt;/b&gt;” It also claimed that some of its findings were “misunderstood or misinterpreted” by the media and that it never suggested that the biometric database had been breached.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, the Aadhaar-issuing authority UIDAI has asked CIS to explain its sensational claim that 13 crore Aadhaar numbers were “leaked” and provide details of servers where they are stored. The UIDAI also wants CIS to clarify what kind of “sensitive data” is still with the Centre or anyone else. The UIDAI has strongly denied any breach of its database and has asked CIS to provide details such as the servers where the downloaded “sensitive data” is stored.&lt;br /&gt;&lt;br /&gt;While the security of the above-mentioned Aadhaar data is still being debated, the government’s push towards making it compulsory across industries has become a major topic of debate in India.&lt;br /&gt;&lt;br /&gt;From linking bank accounts, to PAN numbers, to obtaining free gas connections under the Pradhan Mantri Ujjwala Yojana, to linking scholarships to linking Aadhaar numbers to social welfare schemes for electronically disbursing money to specific beneficiaries, or the Aadhaar-enabled Payment System (AEPS), the government has been pushing on with Aadhaar to make it a mandatory ID rather than the voluntary one it was envisaged to be originally. India still does not have a data protection and privacy law and making Aadhaar mandatory in such a country is not without risks.&lt;br /&gt;&lt;br /&gt;Given the fact that the UIDAI cannot afford to carry out authentication-based rollouts across schemes in haste as the failure rate of AEPS can lead to denial of direct benefits, it makes more sense to retain Aadhaar as a voluntary authenticator, at least until the government solves on-ground issues around Aadhaar-based authentication. Because any failure can erode public faith in Aadhaar as the beneficiary would not get his rightful ration over authentication failure— and, to that extent, in the government itself. So, for beneficiaries who depend on public distribution systems (PDS) for rice, sugar, kerosene or oil, authentication failure is a serious problem.&lt;br /&gt;&lt;br /&gt;It is to this effect that PILs (public interest litigation suits) have been filed in the Supreme Court stating that making Aadhaar compulsory is illegal and would virtually convert citizens into “slaves” as they would be under the government’s surveillance all the time. The Supreme Court had itself stated in August 2015 that Aadhaar cards will not be mandatory for availing benefits of government’s welfare schemes and had also barred authorities from sharing personal biometric data collected for enrollment under the scheme.&lt;br /&gt;&lt;br /&gt;Last month too, it lambasted the Narendra Modi-led BJP government at the Centre for making Aadhaar card a mandatory prerequisite to avail government services. The court will examine all applications against Aadhaar on June 27 2017, while the government remains steadfast on not extending the deadline of June 30 by which various schemes such as the grant of scholarships, Sarva Shiksha Abhiyan and various other social welfare schemes were to seek mandatory Aadhaar number.&lt;br /&gt;&lt;br /&gt;While the debate rages on, controversies keep on piling up. Recently, linking people living with HIV/ AIDS with Aadhaar cards has allegedly driven away patients from hospitals and antiretroviral therapy (ATR) centres in Madhya Pradesh. As per health department sources, the MP State AIDS Control Society made Aadhaar card number compulsory from February this year for those affected by the virus to get free medicines and treatment in accordance with the Central government’s policy making Aadhaar mandatory to avail benefits of any government scheme.&lt;br /&gt;&lt;br /&gt;However, this led to negative fallout as many patients and suspected victims started avoiding ATR centres and district hospitals after the new rule came into effect. The patients feared that the compulsory submission of Aadhaar card to get free medicines and medical check-ups could lead to the disclosure of their identity, inviting social stigma.&lt;br /&gt;&lt;br /&gt;While there is no denying the fact that, in a welfare state, technology can play a big role in enabling the state to hand out entitlements more efficiently and distribute public services at scale. But doing the same at the cost of an individual citizen’s privacy and resting it all on one mandatory number whose authentication is still not completely foolproof, is hardly the way a welfare state would like to operate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/inc42-may-23-2017-shweta-modgil-sharad-sharma-aplogises-for-trolling-aadhaar-critics'&gt;https://cis-india.org/internet-governance/news/inc42-may-23-2017-shweta-modgil-sharad-sharma-aplogises-for-trolling-aadhaar-critics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-26T01:08:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/open-house-on-information-breaches">
    <title>Open house on information breaches</title>
    <link>https://cis-india.org/internet-governance/news/open-house-on-information-breaches</link>
    <description>
        &lt;b&gt;On May 26, 2017 at the Has Geek open house participants discussed the state of information security in India the legal and regulatory measures that companies must comply with, and consumers should be aware of. Udbhav Tiwari was a speaker at the event organized by Has Geek in Bengaluru.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sandesh Anand–InfoSec professional at Cigital was the other speaker. Alok Prasanna Kumar, former Supreme Court advocate and Senior Resident Fellow at the Vidhi Centre for Legal policy, moderated the discussion. Udbhav spoke about Breach Notifications and the legal and regulatory positions  behind it in India. His presentation from the event can be found here: &lt;a href="https://goo.gl/51GDba"&gt;https://goo.gl/51GDba&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/open-house-on-information-breaches'&gt;https://cis-india.org/internet-governance/news/open-house-on-information-breaches&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T00:41:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-may-24-2017-shalina-pillai-anand-j-ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics">
    <title>iSpirt's Sharad Sharma: Sorry, I trolled Aadhaar critics</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-may-24-2017-shalina-pillai-anand-j-ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics</link>
    <description>
        &lt;b&gt;Sharad Sharma, the man who is seen as one of the critical backbones of India's digital drive, profusely apologized on Tuesday for anonymously trolling those arguing for better privacy and security standards in Aadhaar.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shalina Pillai and Anand J was published in the &lt;a class="external-link" href="http://timesofindia.indiatimes.com/people/ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics/articleshow/58817320.cms"&gt;Times of India&lt;/a&gt; on May 24, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The apology came a few days after &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Kiran-Jonnalagadda"&gt;Kiran Jonnalagadda&lt;/a&gt;,  co-founder of developer community platform HasGeek and one of those who  were at the receiving end of the trolling, used internet tools to  discover the faces behind the trolling.   &lt;br /&gt; &lt;br /&gt; The trolls allegedly included several other members of iSpirt, the  software product association co-founded by Sharma and which leads  IndiaStack, a set of technologies that can be used to digitise many  everyday processes used by common people. The issue has divided India's  nascent startup community like never before, and coming soon after the  division over the arrest of &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Stayzilla"&gt;Stayzilla&lt;/a&gt; co-founder Yogendra Vasupal, there are many who now worry for the  ecosystem.This may also explain the apology by Sharma, who has been at  the forefront of building this ecosystem.   &lt;br /&gt; &lt;br /&gt; In the apology mail that he tweeted, Sharma said: "There was a lapse  of judgment on my part. I condoned tweets with uncivil comments. So I  would like to unreservedly apologise to everybody who was hurt by them.  Anonymity seemed easier than propriety, and tired as I was by personal  events and attack on iSpirt's reputation, I slipped. I won't be part of  anything like this again nor passively allow such behaviour to happen,  even in the worst of times."   &lt;br /&gt; &lt;br /&gt; &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Nandan-Nilekani"&gt;Nandan Nilekani&lt;/a&gt; tweeted in response to Sharma's apology that it was brave of him to do  so. Several others in iSpirt also backed Sharma after the public apology  . There was a surge of tweets in response to Sharma's and Nilekani's  tweets, some welcoming the turn of events and others saying it wasn't  enough. Jonnalagadda is among those who are not satisfied. "There were  several individuals at iSpirt behind these trolls and Sharma's apology  is not enough," he told TOI.   &lt;br /&gt; &lt;br /&gt; Aadhaar, aggressively pushed by the government, is being fiercely  questioned by privacy and security advocates. Though most of these  activists say they are asking for implementation of safeguards, the  Twitter hashtags used by some of them include #antiaadhaar,  #destroyaadhaar and #attackaadhaar, which seem to suggest they are  entirely opposed to the authentication mechanism.   &lt;br /&gt; &lt;br /&gt; Both sides have used intemperate and often abusive language on social  media -many using anonymous names. The latest flashpoint was a report by  the Centre for Internet and Society (CIS) released earlier this month  that said some 135 million Aadhaar numbers were leaked through  government databases. There have also been accusations that private  companies that verify Aadhaar credentials often get access to the full  Aadhaar information of individuals. These provoked the proAadhaar  trolls. Jonnalagadda, Nikhil Pahwa, co-founder of the Internet Freedom  Foundation, which works on issues including net neutrality, and free  expression and privacy on the internet, and Sunil Abraham of CIS were  under particular attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the iSpirt fellows and volunteers TOI spoke to had little  remorse. "I am not saying iSpirt should have done what it did. But I can  imagine why iSpirt reacted like this as we all have been under constant  personal attack for a year now," said an iSpirt fellow, who did not  want to be identified. Jas Gulati, co-founder and CEO at &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Nowfloats"&gt;Nowfloats&lt;/a&gt; and a volunteer at iSprit, said iSpirt was an open organisation. "Sharad was upfront about it and I think it's very positive."   &lt;br /&gt; &lt;br /&gt; The Aadhaar privacy advocates, including Jonnalagadda and Pahwa, are  clear they value iSpirt, but say it was undermining itself by its  actions. One pointed to a February meeting of iSpirt where they created a  programme called Sudham that distributed prominent Aadhaar critiques  into four quadrants -`Misinformed, fearful and engaging', `Informed,  fearful and engaging', `Misinformed and trolling' and `Informed and  trolling' -and assigned different members to deal with each quadrant.  Some of those who were assigned responsibilities appear to have taken  their job too seriously .   &lt;br /&gt; &lt;br /&gt; Pahwa told TOI, "The work done by the Product Nation initiative at  iSpirt is what makes it an important organization. But when people raise  questions of IndiaStack and Aadhaar, many in that team respond with  venom. iSpirt is unique, in that it is a thinktank that plays the role  of an activist and lobbyist with a high degree of influence with the  government and so they must develop processes for better governance,  transparency and accountability ."   &lt;br /&gt; &lt;br /&gt; Anand Venkatanarayanan, a senior engineer at &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/NetApp"&gt;NetApp&lt;/a&gt; and independent Aadhaar researcher, said iSpirt should not be judged  based on what Sharma did. "What we are trying to do is strengthen the  Aadhaar system. Currently, they do not even have a process to report  bugs. Large companies all have SOPs (standard operating procedures) to  deal with issues. UIDAI does not," he said, noting that his views are  personal and not that of his employer's.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-may-24-2017-shalina-pillai-anand-j-ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-may-24-2017-shalina-pillai-anand-j-ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-26T00:13:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders">
    <title>Aadhaar Card: One Identity, Multiple Disorders</title>
    <link>https://cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders</link>
    <description>
        &lt;b&gt;It is still hazy to see the desperation of the union government to imposing the Aadhaar Card mandatory when matters related to Aadhaar Card are already sub judice. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was blog post by Gaurav Raj was &lt;a class="external-link" href="http://theindiasaga.com/politics-governance/aadhaar-card-one-identity-multiple-disorders"&gt;published by India Saga&lt;/a&gt; on May 25, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The constitutionality of Aadhaar is yet to be decided by the Supreme Court, however, the enrolment of Aadhaar has reached the mark of more than one billion. Recently, the government declared Aadhaar mandatory to file Income Tax Return (ITR) while the Supreme Court is opined not to treat Aadhaar mandatory, but voluntarily. Now it is imperative of the government to confide the citizens that the Aadhaar information- demography and biometrics-are in safe hands, a debate which has been heating up, and the contempt of the court’s decision by the government is for greater good. But the uproar against the speculation of identity revelation threat and possible misuse of Aadhaar details by the government-corporate nexus, plausible reasons to doubt the security of privacy, which is a fundamental right of Indian citizen. Ironically, after the Finance Minister Arun Jaitley defended the ‘Aadhaar Money Bill controversy’ filed by former congress MP Jairam Ramesh in the court, the Supreme Court is in dilemma and yet to decide whether ‘Right to Privacy' is a fundamental right or not.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why Aadhaar Card Mandatory?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nandan Nilekani, the co-founder of Infosys and the ideologue of Aadhaar, said that Aadhaar will change the PDS system in India since it ensures no ghost or fake beneficiaries to avail unentitled benefits of the various welfare schemes and subsidies. Nilekani also says that there might be margin of error up to 5 per cent in distributing the subsidies or benefits of various welfare schemes to the masses. The top-honcho technocrat has also defended Aadhaar that any breach of privacy of citizens is not possible as the Unique Identification Authority of India (UIDAI) is efficient to secure the public data under CIDR.&lt;br /&gt;&lt;br /&gt;The government claims that the corruption-mounted Public Distribution System (PDS) in India is reformed due to the introduction of the 12 digit unique identification number. More than 40000 crore have been saved in the form of exchequer due to curb of fake and ghost beneficiaries in the PDS system. Now if we believe Nilekani claim of 5% error, then more than 5 crore beneficiaries would be losing their benefits due the error in the biometric identification. The Infosys co-founder later said that if there is a margin of error then ‘One Time Password’ (OTP) comes in. However, he didn’t define what if there is a congestion of network in the remotest Indian villages where phone signals are rare? Standing on the PDS shop waiting for food grains and network, is certainly not an ideal way to avail the benefits of the government welfare schemes. In 2011, activist and writer Ruchika Gupta said in an interview to Tahalka, “The UID cannot address the bulk of delivery problems in the two of the biggest social sectors programmes like MGNREGA and PDS. Linking UID with social sector legislation is completely baseless.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;PAN Card Linked with Aadhaar Card?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The government has directed the Reserve Bank of India to make Aadhaar mandatory for Income Tax Return filing. Currently, there are approximately 24.37 crores PAN holders in India, however 3.8 crore people file income tax return every year. There have been cases of people owned not more than one but 100 PAN Cards with them. PAN cards in India are mostly used by the citizens as a proof of identity. The government believes that PAN card linking with Aadhaar will curb the tax evasion.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How Safe Is Your Data In This Panopticon Model Of Mass Surveillance?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the late 18th century, the well-known English social reformer and jurist Jeremy Bentham wanted to build a ‘panoptican’ for a mass surveillance of the prisoners in England. He advocated designing an institutional building be used to keep an eye on all the jail inmates by a single watchman. Very similarly, India is witnessing the biggest surveillance program ever under the name of single identity and availing benefits of governments’ schemes. Another logic behind enrolment of Aadhaar is the ‘national security’. National security? How can any government ensure national security backing Aadhaar, when international companies have been hired in consortium to collect residents’ biometric and demography details? In 2010, Accenture, Mahindra-Satyam Morpho and L1 identity solutions were pooled in by UIDAI for leveraging de-duplication exercise of Aadhaar and data collection.  L1 Identity Solutions’ top brasses are the former Director CIA George Tenet and former Homeland Security deputy secretary Adm James. With its headquarters in Connecticut, this company is one of the biggest defence contractors specialised in facial recognition and biometrics. L1 Identity Solutions and Accenture work in a close affinity to US intelligence agencies. This is an age of information. Corporate houses and big telecom players are dying to get details of consumers. Obvious are the concerns about the safety and security of the people’s data. It is feared that the database can be used for various marketing and business purposes.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;CIDR, A Single Database Of People’s Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Central Identities Data Repository (CIDR) is a data management and storing agency in India which is initiated for the Aadhaar project. It is regulated by the statutory body of Unique Identification Authority of India (UIDAI). This centralised database is probably one of the biggest repositories on this planet.&lt;br /&gt;&lt;br /&gt;In 2010, experts had claimed that more than a thousand government sites and portals were attacked more than 4000 times by China alone in one year. In April 2011, 77 million Sony Playstations and digital media delivery service Qriocity were hacked which resulted into a shutdown of the network for a week. The London School of Economics also reported that a central database of vulnerable to hacking and other terrorist and cyber crime activities. Recently Wannacry Ransomware virus hits the globe. More than 99 countries were affected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building one single repository for billions of Aadhaar Card data seems to be a big risk in the most vulnerable country where dat breach is at most.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Leak Crisis&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;UIDAI has so far spent approximately 5982.62 crores for more than a billion enrolments of Aadhaar Cards. 1615.34 crores have been spent between the financial year 2015-2016. Centre for Internet and Society, Bengaluru-based organization (CIS) has learned that data of more than 130 million Aadhaar card holders has been leaked from four government websites. They are National Social Assistance Programme, National Rural Employment Guarantee Scheme, Chandranna Bima Scheme and Daily Online Payments Reports of NREGA. It also includes Bank details and other confidential details of millions of residents.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What is Next?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Lok Sabha has passed the Aadhaar Bill as Money Bill. Mukul Rohatgi said in the Supreme Court that according to Article 110 of the constitution, there is use of consolidated funds of India so the bill is a Money bill. Chief Justice Khehar said, “Your object might be good but whether it is a ‘Money Bill’ or not is the question.” Justice Ramana referred to a 2014 judgment passed by the Apex court that courts had no jurisdiction over procedurals matters of legislative.” In response P. Chidambram, the counsel for Jairam Ramesh said, “This petition is not about a procedural matter. There has been substantive infraction.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders'&gt;https://cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-26T00:01:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/catch-news-may-25-2017-sharad-sharma-apos-case-shows-how-rampant-troll-culture-has-become-under-modi">
    <title>Sharad Sharma's case shows how rampant troll culture has become under Modi</title>
    <link>https://cis-india.org/internet-governance/news/catch-news-may-25-2017-sharad-sharma-apos-case-shows-how-rampant-troll-culture-has-become-under-modi</link>
    <description>
        &lt;b&gt;Sharad Sharma's case shows how rampant troll culture has become under Modi.

&lt;/b&gt;
        &lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://in.news.yahoo.com/sharad-sharma-apos-case-shows-175500605.html"&gt;Catch News&lt;/a&gt; on May 25, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Noam Chomsky once said: “Propaganda is to a democracy what violence is to a dictatorship”.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;This  couldn't be more true than in the Indian context. Abusive right-wing  trolls, in this sense, can be seen as stormtroopers of the Narendra Modi  government.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;They  are no different from political goons, using every means at their  disposal – intimidation, abuse, hacking attempts, sexual harassment – to  silence voices that speak against the regime.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Try  tweeting about human rights violations in Kashmir or police atrocities  against in Bastar, invariably an anonymous troll will appear and call  you “anti-national”. Even criticising government schemes or raising  questions about industrial houses supposedly close to the government,  can invite abuse.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Some of the trolls are paid, some are ideologically driven while many are just plain frustrated.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;But  what happens when you come to know that the anonymous troll calling you  an ISI agent, is actually the high profile founder of a company working  with the government?&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Meet  Sharad Sharma, co-founder of iSpirt, a think tank that closely worked  with Aadhaar. Sharma has been exposed as the man behind the  twitter-handle @confident_India- that used to troll all Aadhar critics  on the micro-blogging website.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;He has apologised from his original twitter account, calling it “a lapse  of judgment” and that 'anonymity seemed easier than propriety'.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Through his anonymous twitter handle, Sharma constantly accused Center  for Internet and Society (CIS), of being foreign-funded and violating  the FCRA (Foreign Contribution Regulation Act) laws, without giving any  proof.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;In  a recently published study, CIS had alleged that Aadhaar numbers of  over 13 crore people and bank account details of about 10 crore people  were leaked through government portals due to to poor security measures,  putting them at risk of financial fraud and identity theft.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;accepted the data breach in the Supreme Court." data-reactid="36"&amp;gt;Later, the government &lt;a href="http://indianexpress.com/article/india/govt-admits-aadhaar-data-leak-critics-cite-civil-liberties-4639819/" rel="nofollow noopener" target="_blank"&gt;accepted &lt;/a&gt;the data breach in the Supreme Court.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Given  Sharma's proximity with the government, it is quite possible that he  was aware of the leaks himself. Yet to defend the government on social  media, he chose the FCRA card against CIS, providing a hint of what  could be in store for the public advocacy group.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Kiran  Jonnalagadda, founder of the Freedom Foundation, who first exposed that  it was Sharad Sharma anonymously using the @Confident_ India handle,  says that “FCRA threats are a way to stop people from questioning  Aadhar".&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;FCRA  seems to have been a useful tool for the NDA government against  organisations that question government policies. In April this year, the  government suspended registration of environmental advocacy NGO  Greenpeace. While the government is well within its right to use the  FCRA law against those who violate it, but if a law is used only against  those who speak against the regime, questions are likely to be raised.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;While  Sharma has apologised for trolling the government's critics by accusing  them of foreign exchange violations and being CIA stooges, there are  several handles that go to the extent of giving giving rape and death  threats to those who dare to speak against the establishment.&lt;/p&gt;
&lt;h4 class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;When PM follows trolls&lt;/h4&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Recently,  Trinamool Congress MP, Derek O’Brien accused Prime Minister Narendra  Modi of encouraging hatred by following people who run hate campaigns on  social media.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;“26  Twitter handles that give out rape threats, communal threats are  followed by the Prime Minister (Narendra Modi),” O‘Brien said in the  Rajya Sabha.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;In  a recently published book, “ I am a troll” journalist Swati Chaturvedi  has given an account of a former BJP volunteer Sadhavi Khosla who  alleged that the BJP's social media cell was responsible for putting  pressure on e-commerce company Snapdeal to drop actor Aamir Khan as its  brand ambassador after the latter made strong comments on the  intolerance issue.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;It  would be wrong to say that only BJP and Modi have (mis)used social  media trolls to harass their critics. Parties like AAP and Congress also  have a significant presence of anonymous twitter handles as well. But  pro-Modi trolls are unmatched in the kind of threats and abuse they  indulge in.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Unfortunately,  trolls aren't taken to task for their behaviour. Even Sharma, after  being caught, received a pat on the back from none less than Nandan  Nilekani, for coming clean.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/catch-news-may-25-2017-sharad-sharma-apos-case-shows-how-rampant-troll-culture-has-become-under-modi'&gt;https://cis-india.org/internet-governance/news/catch-news-may-25-2017-sharad-sharma-apos-case-shows-how-rampant-troll-culture-has-become-under-modi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-06-07T12:29:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager">
    <title>Zomato hack: You need to enhance online security with a password manager</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager</link>
    <description>
        &lt;b&gt;Hacking incident at Zomato underlines need to employ different passwords for different accounts.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/companies/zomato-hack-you-need-to-enhance-online-security-with-a-password-manager-117052201261_1.html"&gt;Business Standard&lt;/a&gt; on May 23, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, food-tech company &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;suffered  a security breach where 17 million user records were stolen, including  email addresses and passwords. Such hacking incidents can have wider  consequences, including, in the gravest of scenarios, financial losses.  They emphasise the need for people to adopt newer protection mechanisms,  such as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Zomato's case, the passwords are said to be hashed, which means they  were converted into unintelligible characters. However, experts say  that depending on the hashing protocol used, hashes can be re-engineered  to generate the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password.&lt;/a&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="float: left; "&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The hacking of one account can have wider ramifications. "By hacking one account, hackers get access to your email ID and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password.&lt;/a&gt; To save themselves the bother of remembering many passwords, users often use the same &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;in all their accounts. So, the hackers get access to your email and other accounts. Sometimes, they use your email account to reset the passwords in your other accounts," explains Shomiron Das Gupta of NetMonastery, a threat management provider. He adds that people often store sensitive information, including their net banking and credit card numbers and passwords within their email accounts. Also, on a website like Amazon, you can only view the last four digits of your credit card number. Other websites may not blur this information, in which case hackers would get access to this and other sensitive information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts recommend you create complex passwords and use different ones  for different accounts. Since generating complex passwords and  remembering them all is difficult, you should use a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager. Some of the good ones are LastPass, 1Password, Dashlane and TrueKey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;Password &lt;/a&gt;managers  can generate long and complex passwords that are difficult to  replicate. They also remember on your behalf the passwords on all the  sites and apps you use. Also, hackers sometimes steal passwords by  inserting a malware that copies keystrokes. Since a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager  inputs the password, you don't have to type them in, thereby doing away  with the risk of your keystrokes being captured and stolen.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="p-content"&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="float: left; "&gt;&lt;img align="left" alt="graph" class="imgCont" height="352" src="http://bsmedia.business-standard.com/_media/bs/img/article/2017-05/22/full/1495477165-3235.jpg" style="float: left; " title="graph" width="220" /&gt;&lt;/div&gt;
A &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager is a secure vault that stores all your passwords. You get access to the vault with a master &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password.&lt;/a&gt; Instead of remembering many passwords, you have to remember just one.&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Browsers like &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Google+Chrome" target="_blank"&gt;Google Chrome &lt;/a&gt;and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mozilla+Firefox" target="_blank"&gt;Mozilla Firefox &lt;/a&gt;also offer &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers. However, if you wish to use your &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager across browsers and apps, use a third-party one like those mentioned above. And while a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager  that is stored locally is safer, one that is cloud-based is more  convenient, since you can use it across devices having internet  connection. &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;Password &lt;/a&gt;managers also offer two-factor authentication. They either send a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;to your phone or generate it on your device. Unless your device also gets stolen, the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager is difficult to break into.&lt;/p&gt;
&lt;p&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for whether &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers  are themselves safe, experts concede they are a prime target for  hackers who know that the information stored within will be valuable.  "The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager is safe provided you set a strong master &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password.&lt;/a&gt; Your &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;should  have at least 13 characters of which two should be small, two should be  in capital, two should be random numbers, and two should be special  characters. Using a word that is not there in the dictionary will  enhance its strength. Keep changing your master &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;every  three-six months," says Udbhav Tiwari, policy officer at the Centre for  Internet and Society, Bengaluru. Since their primary job is to provide  security, most &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers do have strong security practices, he adds.&lt;/p&gt;
&lt;p&gt;&lt;span class="p-content"&gt;Most &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers offer a free account but you have to pay to use their advanced security features.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager'&gt;https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-23T15:54:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack">
    <title>Chinese state media says U.S. should take some blame for cyber attack</title>
    <link>https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack</link>
    <description>
        &lt;b&gt;"WannaCry is far and away the most severe malware attack so far in 2017, and the spread of this troubling ransomware is far from over". Since the global attack was launched on Friday, several thousand more computers were discovered to be infected, particularly in Asia as the work day began on Monday. "We've seen that the slowdown of the infection rate over Friday night, after a temporary fix around it, has now been overcome by a second variation the criminals have released".&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ellis Neal was published in the &lt;a class="external-link" href="http://thevillagessuntimes.com/2017/05/21/chinese-state-media-says-u-s-should-take-some-blame-for/"&gt;Villages Suntimes&lt;/a&gt; on May 21, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Microsoft called the incident a "wake-up" call for governments and customers to take security seriously, but in a letter to the Times Sir David Omand, GCHQ director from 1996 to 1997, pins the blame squarely on the technology firm for failing to maintain support for its ageing Windows XP platform. If they wanted their files decrypted, the program said all they had to do was pay $300 worth of Bitcoin to the specified address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, a cyber security expert working with the Centre for Internet  and Society, Udbhav Tiwari working on vulnerabilities such as these,  said as most ATMs in the country especially of the public-sector banks  run on outdated operating systems, or are not updated regularly, they  can be easily compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When Microsoft sells its operating  system software it does so through a licence agreement that states the  company is not liable for any security breaches, thus shielding it from  any legal complaints, &lt;a href="https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/" target="_blank"&gt;points out&lt;/a&gt; Michael Scott, a professor at Southwestern Law School.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft  has blamed the U.S. government for creating the software code that was  used by hackers to launch the cyber-attacks. USA and European officials  did not rule out North Korea as a possible suspect in the cyberattack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/"&gt;In a blog post&lt;/a&gt;,  Microsoft admonished governments around the world for keeping software  vulnerabilities to themselves, instead of reporting them to the  developers. EternalBlue and DoublePulsar, two tools the NSA used to  infiltrate computer networks, were stolen from the agency and &lt;a href="https://techcrunch.com/2017/04/14/the-shadow-brokers-april-exploits-swift-windows/"&gt;leaked online in April as part of a massive data dump by the Shadow Brokers hacker group&lt;/a&gt;. An investigation is on-going regarding how the codes got out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  cyber experts have warned of a huge risk in near future as most  institutions and individuals in Bangladesh use pirated software. We can  not expect criminal hackers to be held accountable for their actions,  but we should hold our government agencies accountable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since  China and Russian Federation are two of the countries where a major  share of computers are running pirated Windows, these are also the  countries with the biggest rate of &lt;b&gt;WannaCry&lt;/b&gt; infections, as stated by F-Secure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Malware  cases have been spreading in recent years as the malicious software  trend has been gaining ground, with new forms of ransomware hitting the  scene.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack'&gt;https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T01:12:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack">
    <title> Noida cyber cell gives tips on preventing WannaCry attack </title>
    <link>https://cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack</link>
    <description>
        &lt;b&gt;The attackers targeted a weakness found in older versions of Microsoft Windows.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Juana McKenzie was published in the &lt;a class="external-link" href="http://theworldnewsjournal.com/2017/05/20/noida-cyber-cell-gives-tips-on-preventing-wannacry-attack/"&gt;World News Journal&lt;/a&gt; on May 20, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Since late last week, the WannaCry cyber scourge has blocked  customers the world over from accessing their data - unless they paid a  ransom using Bitcoin. Here's what you should do to protect yourself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third,  and perhaps more important: like the emperor's new clothes, even this  new-fangled ransomware isn't as sophisticated as it's cracked up to be.  If you're unsure about the legitimacy of something, delete it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When  Microsoft sells software it does so through a licensing agreement that  states the company is not liable for any security breaches, said Michael  Scott, a professor at Southwestern Law School.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It pays to know the proper file extensions that are available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If  you happen to come across files such as worklog.doc.exe, or  financial_statement.xls.scr, do not open them as the files are most  likely malicious.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;'And this most recent attack represents a  completely unintended but disconcerting link between the two most  serious forms of cyber security threats in the world today -  nation-state action and organised criminal action'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then there's the USA government, whose Windows hacking tools were &lt;a href="https://www.theguardian.com/media/2017/mar/07/wikileaks-publishes-biggest-ever-leak-of-secret-cia-documents-hacking-surveillance"&gt;leaked&lt;/a&gt; to the internet and got into the hands of cybercriminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  a cyber security expert working with the Centre for Internet and  Society, Udbhav Tiwari working on vulnerabilities such as these, said as  most ATMs in the country especially of the public-sector banks run on  outdated operating systems, or are not updated regularly, they can be  easily compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No. This strain of ransomware was &lt;a href="http://www.reuters.com/article/us-cyber-attack-puzzle-idUSKCN18C12S" target="_blank"&gt;spread&lt;/a&gt; from device to device by taking advantage of an old security hole in some versions of Microsoft's Windows operating system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft &lt;a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx"&gt;released a patch for this vulnerability&lt;/a&gt; in March and, on the heels of the attack Friday, even took the unusual  step of releasing fixes for older versions of Windows that are no longer  supported, such as Windows XP, Windows Server 2013, and Windows 8. This  included the &lt;a href="https://arstechnica.com/security/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/" target="_blank"&gt;release&lt;/a&gt; of the patch in March and an update on Friday to &lt;a href="https://www.microsoft.com/en-us/windows/windows-defender"&gt;Windows Defender&lt;/a&gt; to detect the WannaCrypt attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As there are different types of ransomware, there is no single, easy solution to restore your computer if it has been &lt;a href="http://www.bbc.com/news/technology-39920141"&gt;infected&lt;/a&gt;.  Enterprises need to test patches before installing them to ensure that  they don't have compatibility issues with existing applications and  break existing workflows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security experts have hailed Microsoft's  decision to publicly call out the U.S. government and the NSA's  decision to stockpile cyberweapons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As software has become ever  more complex, interdependent and interconnected, our reputation as a  company has in turn become more vulnerable", Gates &lt;a href="https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/" target="_blank"&gt;wrote&lt;/a&gt; in an email to employees identifying trustworthy computing as  Microsoft's top priority. Such software will act as the first line of  defence by blocking auto downloads and actively scan for suspected  threats on the PC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The culprit was "ransomware" known as WanaCryptOr 2.0, or &lt;b&gt;WannaCry&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Europol  said a special task force at its European Cybercrime Centre was  "specially created to assist in such investigations and will play an  important role in supporting the investigation".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kaspersky said it  was seeking to develop a decryption tool "as soon as possible". If the  ransomware has locked your entire PC, as &lt;b&gt;WannaCry&lt;/b&gt; has done, combating it is more hard. Backups often are also out of date and missing critical information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cloud  storage services such as Google Drive, Microsoft OneDrive, Dropbox and  Box offer large amount of storage space for a monthly or yearly  subscription fee.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack'&gt;https://cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T01:18:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/consilience-2017-a-conference-on-artificial-intelligence-law">
    <title>Consilience 2017 - A Conference on Artificial Intelligence &amp; Law</title>
    <link>https://cis-india.org/internet-governance/news/consilience-2017-a-conference-on-artificial-intelligence-law</link>
    <description>
        &lt;b&gt;The Law and Technology Society, NLSIU organized their annual conference, Consilience, on the theme 'Artificial Intelligence and the Law' on May 20, 2017 in Bengaluru. Vidushi Marda took part in the event as a panelist.&lt;/b&gt;
        &lt;p&gt;The panel consisted of the following speakers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arun S. Prabhu (Moderator) Partner, Cyril Amarchand Mangaldas,Bangalore)&lt;/li&gt;
&lt;li&gt;Chinmayi Arun (Faculty Associate, Berkman Klein Centre for Internet and Society)&lt;/li&gt;
&lt;li&gt;Amlan Mohanty  (Founder, Techlawtopia)&lt;/li&gt;
&lt;li&gt;Vidushi Marda  (Programme Officer, Centre for Internet and Society)&lt;/li&gt;
&lt;li&gt;Anirudh Rastogi (Partner, TRA Law)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more information, &lt;a class="external-link" href="https://www.eventshigh.com/detail/bangalore/b5b97cd421ca7cfe67ac7d206e8aa74d-consilience-2017-a-conference-on"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/consilience-2017-a-conference-on-artificial-intelligence-law'&gt;https://cis-india.org/internet-governance/news/consilience-2017-a-conference-on-artificial-intelligence-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-06-07T01:47:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2017-newsletter">
    <title>April 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/april-2017-newsletter</link>
    <description>
        &lt;b&gt;Welcome to the CIS newsletter for April 2017. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dear readers,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In a &lt;a class="external-link" href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;report on the information security practices of Aadhaar&lt;/a&gt;, Amber Sinha and Srinivas Kodali documented numerous instances of publicly available Aadhaar numbers along with other personally identifiable information of individuals on government websites. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS along with like minded organizations &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/mobile-accessibility-practices"&gt;made a submission to the Government of India&lt;/a&gt; to frame a feasible accessibility guidelines for mobile apps since there is no single standard in existence at the moment.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/sambad-100-women-edit-a-thon"&gt;two-day 100 Women Edit-a-thon&lt;/a&gt; was held in March 2017 by CIS-A2K team along with Odisha's biggest newspaper Sambad. The event was inspired by BBC’s 100 Women series and edit-a-thons with the same name in December 2016. More than 20 female journalists participated and registered as new Odia Wikipedians.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On March 31, 2017, the Ministry of Personnel, Public Grievances and Pensions, Department of Personnel and Training released a Circular framing rules under the Right to Information Act, 2005 (“RTI Rules”). The Ministry invited comments on on the RTI Rules. &lt;a class="external-link" href="http://cis-india.org/openness/blog-old/comments-on-the-right-to-information-rules-2017"&gt;CIS submitted its comments&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In an article originally published in &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-hindu-businessline-march-31-2017-sunil-abraham-its-the-technology-stupid"&gt;Hindu Businessline&lt;/a&gt; on March 31, Sunil Abraham lists out 11 reasons why Aadhaar is not just non-smart but also insecure.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shuttleworth Foundation has announced &lt;a class="external-link" href="http://cis-india.org/internet-governance/news/shuttleworth-foundation-april-19-2017-sunil-abraham-honorary-steward-september-2017"&gt;Sunil Abraham as Honorary Steward&lt;/a&gt; for its September 2017 fellowship round. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS worked on a three part case study. The first case study on digital protection of traditional knowledge was published by GIS Watch in December 2016. The other two case studies along with the synthesis overview &lt;a class="external-link" href="http://cis-india.org/openness/apc-april-23-2017-sunil-abraham-and-vidushi-marda-economic-social-and-cultural-rights-in-india"&gt;has also been published&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CIS in the news:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown"&gt;NGOs, individuals urge state CMs to curb Internet shutdown&lt;/a&gt; (The Times of India; April 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/buzzfeednews-pranav-dixit-april-4-2017-indias-national-id-program-may-be-turning-the-country-into-a-surveillance-state"&gt;India’s National ID Program May Be Turning The Country Into A Surveillance State&lt;/a&gt; (Pranav Dixit; BuzzFeed News; April 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/india-today-neha-vashishth-april-6-2017-privacy-what-bengaluru-police-leaks-phone-numbers-on-twitter"&gt;Privacy, what? Bengaluru police leaks 46,000 phone numbers on Twitter&lt;/a&gt; (Neha Vashishth; India Today; April 6, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-april-6-2017-umesh-yadav-bengaluru-cops-twitter-handle-in-ethical-storm"&gt;Bengaluru cops' twitter handle in ethical storm&lt;/a&gt; (Umesh Yadav; The Times of India; April 6, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must"&gt;Opposition questions govt move to make Aadhaar must&lt;/a&gt; (Komal Gupta; Livemint; April 12, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net"&gt;Aadhaar: A widening net&lt;/a&gt; (Komal Gupta, Apurva Vishwanath and Suranjana Roy; Livemint; April 21, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/ians-april-24-2017-chemistry-research-in-india-still-not-in-big-league"&gt;Chemistry research in India 'still not in big league'&lt;/a&gt; (IANS and India Online News Portal; April 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-world-regina-mihindukulasuriya-april-26-2017-stop-the-haphazard-internet-shutdown-says-mp-jay-panda"&gt;Stop the Haphazard Internet Shutdown Says MP Jay Panda&lt;/a&gt; (Regina Mihindukulasuriya; Businessworld; April 26, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too"&gt;Now, Aadhaar details displayed in Mizoram too&lt;/a&gt; (Sebastian P.T.; National Herald; April 26, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/the-news-minute-priyanka-thirumurthy-april-26-2017-after-spb-ilaiyaraaja-sony-music-and-sun-network-lock-horns-over-copyrights"&gt;After SPB-Ilaiyaraaja, Sony Music and Sun Network lock horns over copyrights&lt;/a&gt; (Priyanka Thirumurthy; Newsminute; April 26, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right"&gt;Analysis: Data Protection in India - Getting It Right&lt;/a&gt; (Suparna Goswami and Varun Haran; Info Risk Today; April 26, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-telegraph-april-27-2017-india-bans-social-media-in-kashmir-for-one-month"&gt;India bans social media in Kashmir for one month&lt;/a&gt; (Telegraph; April 27, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/indian-express-april-28-2017-shruti-dhapola-j-k-social-media-ban"&gt;J&amp;amp;K social media ban: Use of 132-year-old Act can’t stand judicial scrutiny, say experts&lt;/a&gt; (Shruti Dhapola; Indian Express; April 28, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;br /&gt;CIS members wrote the following articles:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it"&gt;How Aadhaar compromises privacy? And how to fix it?&lt;/a&gt; (Sunil Abraham; Hindu; April 1, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave"&gt;Digital native: You can check out, you can never leave&lt;/a&gt; (Nishant Shah; Indian Express; April 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/hindustan-times-pranesh-prakash-april-3-2017-aadhaar-marks-a-fundamental-shift-in-citizen-state-relations"&gt;Aadhaar marks a fundamental shift in citizen-state relations: From ‘We the People’ to ‘We the Government’&lt;/a&gt; (Pranesh Prakash; Hindustan Times; April 3, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-hindu-businessline-march-31-2017-sunil-abraham-its-the-technology-stupid"&gt;It’s the technology, stupid&lt;/a&gt; (Sunil Abraham; Hindu Businessline; April 7, 2017). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data"&gt;Privacy in the Age of Big Data&lt;/a&gt; (Amber Sinha; Asian Age; April 10, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-april-17-2017-digital-native-are-you-still-having-fun"&gt;Digital native: Are You Still Having Fun?&lt;/a&gt; (Nishant Shah; Indian Express; April 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-april-30-2017-digital-native-snap-out-of-outrage-mode"&gt;Digital native: Snap out of outrage mode&lt;/a&gt; (Nishant Shah; Indian Express; April 30, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't    have access to read printed materials due to some form of physical,    sensory, 	cognitive or other disability. As part of our endeavour to    make available accessible content for persons with disabilities, we are    developing a text-to-speech software in 15 languages with support from    the Hans Foundation. The progress made so far in the project can be    accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/mobile-accessibility-practices"&gt;Mobile Accessibility Practices&lt;/a&gt; (Nirmita Narasimhan; April 12, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/events/global-accessibility-awareness-day-2017"&gt;Global Accessibility Awareness Day 2017&lt;/a&gt; (Organized by Prakat Solutions, Mithra Jyothi and CIS; Bengaluru; May 18, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt;Our    Access to Knowledge programme currently consists of two projects. The    Pervasive Technologies project, conducted under a grant from the    International Development Research Centre (IDRC), aims to conduct    research on the complex interplay between low-cost pervasive    technologies and intellectual property, in order to encourage the    proliferation and development of such technologies as a social good. The    Wikipedia project, which is under a 	grant from the Wikimedia    Foundation, is for the growth of Indic language communities and projects    by designing community collaborations and partnerships 	that recruit    and cultivate new editors and explore innovative approaches to  building   projects.&lt;/p&gt;
&lt;p&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by    organizing more than 100 outreach events and catalysed the release of    encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0)    license in four Indian languages (21 books in Telugu, 13 in Odia, 4    volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book    on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Note: All the following events were held earlier but the reports were published in the month of April:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/womens-day-edit-a-thon-in-pune"&gt;Women's Day Edit-a-thon at Jeewan Jyoti Women's Empowerment Centre, Pune&lt;/a&gt; (Subodh Kulkarni; April 10, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/marathi-wikipedia-edit-a-thon-at-savitribai-phule-mahila-ekatma-samaj-mandal-aurangabad"&gt;Marathi Wikipedia Edit-a-thon at Savitribai Phule Mahila Ekatma Samaj Mandal, Aurangabad&lt;/a&gt; (Subodh Kulkarni; April 13, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/google-translated-telugu-articles-prioritisation-exercise-january-iteration"&gt;Google-translated Telugu articles prioritisation exercise: January iteration&lt;/a&gt; (Pavan Santhosh; April 15, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/telugu-wikipedia-stall-at-vijayawada-book-festival"&gt;Telugu Wikipedia stall at Vijayawada Book Festival&lt;/a&gt; (Pavan Santhosh; April 15, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/womens-day-edit-a-thon-at-jnana-prabodhini"&gt;Women's Day Edit-a-thon at Jnana Prabodhini&lt;/a&gt; (Subodh Kulkarni; April 15, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/bargarh-manuscript-digitisation-project"&gt;Bargarh Manuscript Digitisation Project&lt;/a&gt; (Sailesh Patnaik; April 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/imperial-college-orientation-program-bargarh"&gt;Imperial College Orientation Program, Bargarh&lt;/a&gt; (Sailesh Patnaik; April 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/orientation-training-session-for-environmental-activists-in-satara-on-13th-february-2017"&gt;Orientation &amp;amp; Training session for Environmental Activists in Satara&lt;/a&gt; (Subodh Kulkarni; April 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/marathi-wikipedia-edit-a-thon-at-rajarshi-chhatrapati-shahu-college-kolhapur"&gt;Marathi Wikipedia Edit-a-thon at Rajarshi Chhatrapati Shahu College, Kolhapur&lt;/a&gt; (Subodh Kulkarni; April 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/marathi-wikipedia-edit-a-thon-at-shivaji-university-kolhapur"&gt;Marathi Wikipedia Edit-a-thon at Shivaji University, Kolhapur&lt;/a&gt; (Subodh Kulkarni; April 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/marathi-wikipedia-edit-a-thon-at-sangli-maharashtra"&gt;Marathi Wikipedia Edit-a-thon at Sangli, Maharashtra&lt;/a&gt; (Subodh Kulkarni; April 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/orientation-training-session-of-jalbiradari-activists"&gt;Orientation &amp;amp; Training session of Jalbiradari Activists&lt;/a&gt; (Subodh Kulkarni; April 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/free-license-wings-to-your-books-in-guntur"&gt;"Free-license Wings To Your Books" in Guntur&lt;/a&gt; (Pavan Santhosh; April 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/free-license-wings-to-your-books-in-vijayawada"&gt;"Free-license Wings To Your Books" in Vijayawada&lt;/a&gt; (Pavan Santhosh; April 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/adikavi-nannaya-university-telugu-wikipedia-workshop-1"&gt;Adikavi Nannaya University Telugu Wikipedia Workshop&lt;/a&gt; (Pavan Santhosh; April 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/odia-wikipedia-workshop-in-iimc-dhenkanal"&gt;Odia Wikipedia Workshop in IIMC, Dhenkanal&lt;/a&gt; (Sailesh Patnaik; April 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/sambad-100-women-edit-a-thon"&gt;Sambad 100 Women Edit-a-thon&lt;/a&gt; (Ting Yi Chang and Sailesh Patnaik; April 18, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/google-translated-telugu-articles-prioritisation-exercise-february-iteration"&gt;Google-translated Telugu articles prioritisation exercise: February iteration&lt;/a&gt; (Pavan Santhosh; April 18, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Copyright and Patent&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/national-conference-on-intellectual-property-rights-and-public-interest"&gt;National Conference on Intellectual Property Rights and Public Interest&lt;/a&gt; (Organized by Indian Law Institute; New Delhi; April 7 - 8, 2017). Maggie Huang took part in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our  work in the Openness programme   focuses on open data, especially open  government data, open access,  open  education resources, open knowledge  in Indic languages, open  media, and  open technologies and standards -  hardware and software. We  approach  openness as a cross-cutting  principle for knowledge  production and  distribution, and not as a  thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Publication&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/apc-april-23-2017-sunil-abraham-and-vidushi-marda-economic-social-and-cultural-rights-in-india"&gt;Economic, Social and Cultural Rights in India: Opportunities for Advocacy in Intellectual Property&lt;/a&gt; (Sunil Abraham and Vidushi Marda; GIS Watch and Association for Progressive Communications; April 23, 2017). Total 4 reports: &lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india"&gt;Synthesis Overview&lt;/a&gt;, &lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india-opportunities-for-advocacy-in-intellectual-property-rights-access-to-mobile-technology"&gt;Access to Mobile Technology&lt;/a&gt;, &lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india-opportunities-for-advocacy-in-intellectual-property-rights-the-traditional-knowledge-digital-library"&gt;Traditional Knowledge Digital Library&lt;/a&gt;, and &lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india-foss/"&gt;FOSS and Open Standards&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/blog-old/comments-on-the-right-to-information-rules-2017"&gt;Comments on the Right to Information Rules, 2017&lt;/a&gt; (Amber Sinha; April 27, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Event Organized &lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/events/nasa-space-apps-challenge-2017"&gt;NASA Space Apps Challenge 2017&lt;/a&gt; (CIS, Bengaluru, April 22, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;b&gt; -----------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As  part of its research on privacy and   free speech, CIS is engaged with  two different projects. The first  one  (under a grant from Privacy  International and IDRC) is on  surveillance  and freedom of expression  (SAFEGUARDS). The second one  (under a grant  from MacArthur Foundation)  is on restrictions that the  Indian government  has placed on freedom of  expression online.&lt;/p&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations"&gt;Analysis of Key Provisions of the Aadhaar Act Regulations&lt;/a&gt; (Amber Sinha; April 3, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/right-to-be-forgotten-a-tale-of-two-judgments"&gt;Right to be Forgotten: A Tale of Two Judgements&lt;/a&gt; (Amber Sinha; April 7, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
►Free Speech and Expression&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/yameen-rasheed-human-rights-maldives"&gt;Killing of Yameen Rasheed Reveals Worsening Human Rights Situation in the Maldives&lt;/a&gt; (Pranesh Prakash; April 25, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/internet-shutdowns-in-2016"&gt;Internet Shutdowns in 2016&lt;/a&gt; (Japreet Grewal; April 27, 2016).&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;►Miscellaneous&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/regulating-bitcoin-in-india"&gt;Regulating Bitcoin in India&lt;/a&gt; (Vipul Kharbanda; April 20, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05"&gt;Amutha Arunachalam - Stand Shielded of Digital Rights&lt;/a&gt; (CIS; New Delhi; May 5, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Participation in Event&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/iso-iec-jtc1-sc-27-meetings"&gt;ISO/IEC JTC1/SC 27 Meetings&lt;/a&gt; (Organized by Bureau of Indian Standards; University of Waikato and Novotel; New Zealand; April 18 - 25, 2017). Udbhav Tiwari attended the meetings.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p&gt;►Cyber Security&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/firstfridayatcisindia-dr-madan-oberoi-digital-forensics-april-07"&gt;Dr. Madan M. Oberoi - Digital Forensics and Cyber Investigations&lt;/a&gt; (CIS; New Delhi; April 7, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/brainstorming-session-on-the-global-conference-on-cyberspace-gccs-2017"&gt;Brainstorming Session on the Global Conference on Cyberspace&lt;/a&gt; (GCCS 2017) (Organized by the Ministry of Electronics &amp;amp; Information Technology; New Delhi; April 12, 2017). Japreet Grewal attended the session.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;b&gt;----------------------------------- &lt;/b&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation    that undertakes interdisciplinary research on internet and digital    technologies from 	policy and academic perspectives. The areas of focus    include digital accessibility for persons with disabilities,  access   to knowledge, intellectual 	property rights, openness (including  open   data, free and open source software, open standards, open access,  open   educational resources, and open video), 	internet governance,    telecommunication reform, digital privacy, and cyber-security. The    academic research at CIS seeks to understand the reconfigurations 	of    social and cultural processes and structures as mediated through the    internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="text-align: justify; "&gt;Please  help us defend consumer and   citizen rights on the Internet! Write a  cheque in favour of 'The Centre   for Internet and Society' and mail it  to us at No. 	194, 2nd 'C'  Cross,  Domlur, 2nd Stage, Bengaluru - 5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;We  invite researchers, practitioners,   artists, and theoreticians, both  organisationally and as individuals,  to  engage with us on topics  related internet 	and society, and improve  our  collective understanding  of this field. To discuss such  possibilities,  please write to Sunil  Abraham, Executive Director, at 	  sunil@cis-india.org (for policy  research), or Sumandro Chattapadhyay,   Research Director, at  sumandro@cis-india.org (for academic research),   with an 	indication of  the form and the content of the collaboration  you  might be interested  in. To discuss collaborations on Indic  language  Wikipedia projects, 	 write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;i&gt;CIS  is grateful to its primary   donor the Kusuma Trust founded by Anurag  Dikshit and Soma Pujari,   philanthropists of Indian origin for its core  funding and 	support for   most of its projects. CIS is also grateful to  its other donors,   Wikimedia Foundation, Ford Foundation, Privacy  International, UK, Hans  	 Foundation, MacArthur Foundation, and IDRC for  funding its various   projects&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2017-newsletter'&gt;https://cis-india.org/about/newsletters/april-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2017-05-20T12:59:17Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call">
    <title>Microsoft says WannaCry ransomware must be a wake-up call for governments </title>
    <link>https://cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call</link>
    <description>
        &lt;b&gt;Computer security experts said the current attack could have been much worse but for the quick action of a young researcher in Britain who discovered a vulnerability in the ransomware itself, known as WanaCryptor 2.0. It has, however, retweeted a blog post by Brad Smith, president and chief legal officer at Microsoft, who directs much of the blame toward the USA government, arguing that it should have alerted the $524 billion tech titan about the problem.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://journaldumaghreb.com/2017/05/20/microsoft-says-wannacry-ransomware-must-be-a-wake-up-call/"&gt;Journaldu Maghreb&lt;/a&gt; on May 20, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"This is an emerging pattern in 2017", he continued. "We have seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world", wrote Smith in a blog post on Sunday. Then there's the US government, whose Windows hacking tools were leaked to the internet and got into the hands of cybercriminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen", Mr Smith wrote. Brad Smith, Microsoft's top lawyer, criticized US intelligence agencies for "stockpiling" software code that can be used by hackers. In February, Smith first called for the creation of what he has dubbed a Geneva Convention for cyberspace, which would outlaw nation-state cyberattacks on critical infrastructure and tech companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber-security firm HumanFirewall said that on account of high use of pirated Windows operating system in India, it was more susceptible to the attack. Microsoft has connected previous exploits of its products released by the mysterious Shadow Brokers group to tools which were stolen from NSA cyber warfare operations. "All our systems are updated as required". This sophisticated, self-propagating malware was created to spread to all other computers on the same network after infecting one machine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Estimates by law enforcement agency Europol estimated yesterday that more than 200,000 computers in 150 countries were infected, but with the worm continuing to spread to vulnerable Windows machines, that number will surely rise. When 22 year olds are the heroes of the anti-cyber attack fight, rather than the agencies tasked to defend countries against these types of threats, it is perhaps time to question what these organisations have been doing all this time? NHS staff shared screenshots of the WannaCry programme, which demanded a payment of $300 (£230) in virtual currency Bitcoin to unlock the files for each computer. That dump included a vulnerability codenamed EternalBlue, which preys on a flaw in Microsoft Word to transmit malicious software from one Windows Computer to another. Usually used by cyber criminals, ransomware is a popular means of making illicit money from victims who have to pay the criminals in order to have their data decrypted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today is likely to be painful for many organizations all over the world that took the weekend off and are returning to the work-week to find hundreds or thousands of computers on their networks encrypted by WannaCry ransomware, which surfaced Friday and has been propagating ever since. It was a stress-filled weekend for many IT workers this past weekend as the WannaCry ransomware attack spread, crippling Windows systems worldwide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security firm BinaryEdge, which specializes in internet-wide scans, has detected more than 1 million Windows systems that have the SMB service exposed to the internet. "Otherwise they're literally fighting the problems of the present with tools from the past", he said. However, a cyber security expert working with the Centre for Internet and Society, Udbhav Tiwari working on vulnerabilities such as these, said as most ATMs in the country especially of the public-sector banks run on outdated operating systems, or are not updated regularly, they can be easily compromised. This allowed users of the older systems to secure their computers without requiring an upgrade to the latest operating software.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call'&gt;https://cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T00:55:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/4th-national-standards-conclave-evolving-a-comprehensive-national-strategy-for-standards-sectoral-and-regional-inclusiveness">
    <title>4th National Standards Conclave Evolving a Comprehensive National Strategy for Standards Sectoral and Regional Inclusiveness</title>
    <link>https://cis-india.org/internet-governance/news/4th-national-standards-conclave-evolving-a-comprehensive-national-strategy-for-standards-sectoral-and-regional-inclusiveness</link>
    <description>
        &lt;b&gt;Udbhav Tiwari represented CIS in the 4th National Standards Conclave held on the May 1 and 2, 2017 at The Lalit, New Delhi. The event was organized by the Ministry of Commerce and Industry and the Confederation of Indian Industry.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The event looked at creating a National Standards Strategy to focus on  India's standardisation efforts in the global stage. The event also  focused on the release on the National Standards Portal, a website that  creats a one stop access of standards, technical regulations and TBT  information. There were a few sessions that were useful in particular - the IT  Standardisation, the Standards Portal and the theme paper for National  Standards Strategy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/fourth-national-standards-conclave.pdf"&gt;Download the Agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/4th-national-standards-conclave-evolving-a-comprehensive-national-strategy-for-standards-sectoral-and-regional-inclusiveness'&gt;https://cis-india.org/internet-governance/news/4th-national-standards-conclave-evolving-a-comprehensive-national-strategy-for-standards-sectoral-and-regional-inclusiveness&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-05-20T08:06:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-may-20-2017-anumeha-yadav-will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes">
    <title>Will Aadhaar leaks be used as an excuse to shut out scrutiny of welfare schemes?</title>
    <link>https://cis-india.org/internet-governance/news/scroll-may-20-2017-anumeha-yadav-will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes</link>
    <description>
        &lt;b&gt;Aadhaar data of all 23 crore beneficiaries of Direct Benefit Transfer schemes could be publicly available, says a report by Centre for Internet and Society. &lt;/b&gt;
        &lt;div class="article-body" style="text-align: justify; "&gt;
&lt;p&gt;The blog post by Anumeha Yadav was &lt;a class="external-link" href="https://scroll.in/article/837717/will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes"&gt;published on Scroll &lt;/a&gt;on May 20, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In the past three months, there have been several &lt;a href="https://scroll.in/article/835546/the-centres-casual-response-to-aadhaar-data-breaches-spells-trouble"&gt;reports&lt;/a&gt; about caches of Aadhaar data being publicly displayed on government websites across the country.&lt;/p&gt;
&lt;p&gt;Personal  information associated with the biometric-based 12-digit unique  identification number, which the government wants every Indian resident  to have, is mandated to be confidential under the Aadhaar Act, 2016.&lt;/p&gt;
&lt;p&gt;But exactly how much Aadhaar data has been compromised by negligent government departments?&lt;/p&gt;
&lt;p&gt;On  May 2, researchers at the non-profit Centre for Internet and Society  released a comprehensive report on the extent of the data breaches. They  documented four government portals using Aadhaar for making payments  and found that sensitive personal and financial information of nearly 13  crore people was being displayed on them, including details of about 10  crore bank accounts.&lt;/p&gt;
&lt;p&gt;Two of the portals, for the Mahatma Gandhi  National Rural Employment Guarantee Act and the National Social  Assistance Programme, belong to the Union rural development ministry.  The others are run by the Andhra Pradesh government for the workers’  insurance scheme Chandranna Bima and for filing Daily Online Payment  Reports of MNREGA.&lt;/p&gt;
&lt;p&gt;The researchers estimated that Aadhaar data of  all 23 crore beneficiaries of the central government’s various Direct  Benefit Transfer schemes could be publicly available. This means nearly a  fifth of India’s population is potentially exposed to irreversible  privacy harm, and financial and &lt;a href="https://scroll.in/article/833230/explainer-aadhaar-is-vulnerable-to-identity-theft-because-of-its-design-and-the-way-it-is-used"&gt;identity fraud&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The Unique Identification Authority of India, the agency which manages the Aadhaar database, however, and had earlier &lt;a class="link-external" href="http://timesofindia.indiatimes.com/india/no-leak-biometric-data-safe-says-uidai/articleshow/58486390.cms" rel="nofollow" target="_blank"&gt;denied any breach&lt;/a&gt; of confidential data, has now reportedly said that such a data leak could only be the result of a potentially &lt;a class="link-external" href="http://timesofindia.indiatimes.com/india/provide-hacker-details-outfit-that-claimed-data-leak-told/articleshow/58725132.cms?from=mdr" rel="nofollow" target="_blank"&gt;illegal hack attack&lt;/a&gt; and asked CIS to provide details of the persons involved in the data theft.&lt;/p&gt;
&lt;p&gt;The  rural development ministry, on its part, has changed how its MNREGA  database is accessed, redacting Aadhaar numbers and bank account details  of the beneficiaries. Senior officials of the ministry, however, denied  making systemic changes in the wake of the Centre for Internet and  Society report.&lt;/p&gt;
&lt;p&gt;“The researchers claimed that financial  information of over 10 crore individuals was available publicly, on  pension and MNREGA portals,” said Nagesh Singh, additional secretary in  the ministry, “but bank account details were displayed only on two state  department websites of Andhra Pradesh and Telangana as these states are  far advanced in transparency practices.”&lt;/p&gt;
&lt;p&gt;“For all other states,”  Singh added, “financial information and Aadhaar numbers were removed or  masked last year. For pension schemes we masked the data in June 2016,  and for MNREGA this data was removed in December. Even if any data was  showing, it would only be for the particular block the resident is in,  not for any other state workers.”&lt;/p&gt;
&lt;p&gt;All this was done, he said,  “because the UIDAI communicated to us that this information is sensitive  and should not be displayed and the Aadhaar regulations prohibit  display of Aadhaar numbers”. The Aadhaar (Sharing of Information)  Regulations were introduced last September.&lt;/p&gt;
&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="https://d1u4oo4rb13yy8.cloudfront.net/grvhfkothd-1494862823.png" /&gt;&lt;/figure&gt;
&lt;p&gt;Contrary  to Singh’s claims, social activists outside Andhra Pradesh and  Telangana confirmed they could access bank account details of MNREGA  workers until May 3. Only on May 4, two days after the Centre for  Internet and Society report was released, did the details stop showing  on the Management Information System.&lt;/p&gt;
&lt;p&gt;“We could no longer access  the electronic muster roll, and it started returning error messages,”  said Ashish Ranjan of Jan Jagran Shakti Sangathan, a registered union of  unorganised workers in Araria, Bihar. But until early May, he added,  the Management Information System allowed anyone in any state to access  the personal information of workers, even from other states.&lt;/p&gt;
&lt;p&gt;Activists  and beneficiaries relied on this system for two things. “Several of the  new bank accounts have errors, and accessing this information directly  helped get the discrepancies corrected without going to block level  officials,” Ranjan explained. “It also helped track where the wages of  workers were stuck.”&lt;/p&gt;
&lt;p&gt;When activists asked why the data was no  longer accessible, Ranjan said, rural development department officials  said the Management Information System was changed “on the directions of  the Supreme Court and the Union cabinet secretary.”&lt;/p&gt;
&lt;p&gt;“This has  been the pattern with the MNREGA MIS for long,” Ranjan said, referring  to the information system. “Senior officials change access to a feature  as they wish without clear processes or explanations.”&lt;/p&gt;
&lt;p&gt;James  Herenj, an activist with NREGA Watch, a non-profit which monitors the  implementation of MNREGA in Jharkhand, had the same experience. “Bank  account details were removed from the website last week,” he said, “this  is a problem as we can no longer help MNREGA workers get data entry  errors corrected.”&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society researchers  too contested the rural development ministry’s claim that Aadhaar  numbers and bank account details were displayed only on Andhra Pradesh  and Telangana government websites. They released a video clip showing  them accessing bank account details and Aadhaar numbers of 801 MNREGA  workers of Agara panchayat in Bengaluru through an internet search on  March 25.&lt;/p&gt;
&lt;figure class="has-subtext cms-block-image cms-block"&gt;&lt;img alt="Screenshot of a Chandigarh Union Territory website displaying Aadhaar information." src="https://scroll-img-process.s3.amazonaws.com/original/ogghbkwxim-1493054055.png" title="Screenshot of a Chandigarh Union Territory website displaying Aadhaar information." /&gt;Screenshot of a Chandigarh Union Territory website displaying Aadhaar information.&lt;/figure&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Consent, please?&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;The &lt;a class="link-external" href="https://uidai.gov.in/images/the_aadhaar_act_2016.pdf" rel="nofollow" target="_blank"&gt;Aadhaar Act&lt;/a&gt;,  2016 requires both government and private agencies to take informed  consent before using a person’s Aadhaar for authentication, but there is  little evidence that consent is sought before Aadhaar is seeded with  personal and financial information.&lt;/p&gt;
&lt;p&gt;Indeed, when the Supreme Court  first permitted the voluntary use of Aadhaar for MNREGA in October  2015, Aadhaar numbers of 2.36 crore workers had already been seeded to  their bank accounts, without the consent of over 99% of them.&lt;/p&gt;
&lt;p&gt;The rural development ministry’s &lt;a class="link-external" href="http://nrega.nic.in/Netnrega/WriteReaddata/Circulars/1669D.O._letter_MGNREGA_dtd_10.06.2016.pdf" rel="nofollow" target="_blank"&gt;data&lt;/a&gt; shows that until June 2016, only about 4,10,000, or less than 1% of the  10.7 crore MNREGA workers, had agreed to Aadhaar-based payments. The  ministry worked around this by organising “consent camps” to  retrospectively collect proof of consent.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Poor standards&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Writing in &lt;i&gt;The Economic Times&lt;/i&gt;,  Ram Sewak Sharma, chairperson of the Telecom Regulatory Authority of  India and former director general of the Unique Identification Authority  of India, &lt;a class="link-external" href="http://blogs.economictimes.indiatimes.com/et-commentary/there-has-been-no-aadhaar-data-leak/" rel="nofollow" target="_blank"&gt;argued&lt;/a&gt; that the reports about “Aadhaar leaks” on government websites failed to  account for provisions of the Right to Information Act, 2005. Section 4  of this law provides for proactive disclosure of government decisions  while Section 8 mandates public authorities to publish all information  on welfare schemes, including details of beneficiaries.&lt;/p&gt;
&lt;p&gt;This has  created a situation, Sharma pointed out, where the transparency law may  require even Aadhaar numbers of beneficiaries to be made public even  though the Aadhaar Act mandates them to be confidential.&lt;/p&gt;
&lt;p&gt;Right  to Information activists, however, said the authorities were anything  but devoted to the transparency law. Crucial information they seek on  the &lt;a href="https://scroll.in/article/833060/how-efficient-is-aadhaar-theres-no-way-to-know-as-the-government-wont-tell"&gt;efficacy of Aadhaar&lt;/a&gt; in welfare schemes is routinely denied.&lt;/p&gt;
&lt;p&gt;“The  government is willfully manipulating information systems to subvert  details of biometric failures,” said Amrita Johri, a member of the  National Campaign for People’s Right to Information and an activist with  the Right to Food campaign, which has petitioned the Delhi High Court  against Aadhaar being mandatory for food rations. “We have come across  instances of ration cardholders being turned back because of  fingerprints being falsely rejected, or network failure, but on the  Delhi government’s website, this is shown as the beneficiaries not  having come to the ration shop at all.”&lt;/p&gt;
&lt;p&gt;“Similarly, the government  claims it has removed bogus ration cards through Aadhaar,” Johri added,  “but they do not show any administrative action if such bogus cards  were really found through Aadhaar even though Section 4 of the RTI Act  requires disclosure of such decisions.”&lt;/p&gt;
&lt;figure class="has-subtext cms-block-image cms-block"&gt;&lt;img alt="Jharkhand Directorate of Social Security displayed Aadhaar numbers, bank accounts numbers and transaction details of over 15 lakh pensioners." src="https://d1u4oo4rb13yy8.cloudfront.net/rzxkohofbe-1493106358.jpg" title="Jharkhand Directorate of Social Security displayed Aadhaar numbers, bank accounts numbers and transaction details of over 15 lakh pensioners." /&gt;Jharkhand  Directorate of Social Security displayed Aadhaar numbers, bank accounts  numbers and transaction details of over 15 lakh pensioners.&lt;/figure&gt;
&lt;p&gt;Johri  is concerned that the “Aadhaar leaks” could become an excuse to deny  people “other useful information”. “When we requested officials to  display how many biometric transaction were not successful, they told us  that in a few days, they will remove the entire MIS as there had  received orders from the food ministry to not display demographic data  associated with Aadhaar,” she said. “But we pointed out that it was the  creation of a single identification number that is the problem. Why  should information on all other government schemes be removed?”&lt;/p&gt;
&lt;p&gt;The  Centre for Internet and Society report points out that while the law  now makes Aadhaar numbers confidential, the government has failed to  specify data masking standards. Section 6 of the Aadhaar Regulations  lays down that no government or private agency should publish Aadhaar  numbers unless they are redacted or blacked out “through appropriate  means”.&lt;/p&gt;
&lt;p&gt;But this is too vague, the report points out. “In some  instances, the first four digits are masked while in others the middle  digits are masked,” Srinivas Kodali, one of the authors of the report,  explained, “which means someone with access to different databases can  use tools for aggregation to reconstruct information hidden or masked in  a particular database.”&lt;/p&gt;
&lt;p&gt;Kodali said that for information other  than Aadhaar numbers, each ministry and department is required to  classify the data that is sensitive, restricted or open, which they have  failed to do. “The National Data Sharing and Accessibility Policy, 2012  requires securing information of sensitive and restricted data but it  does not recommend the ways to do it,” he said. “The standards around  information disclosure and control do not exist, and the Ministry of  Statistics expert committee on this was &lt;a class="link-external" href="http://www.mospi.gov.in/sites/default/files/publication_reports/SDC_Report_30mar17.pdf?download=1" rel="nofollow" target="_blank"&gt;unable to suggest&lt;/a&gt; one last month.”&lt;/p&gt;
&lt;p&gt;“Even  for MNREGA data,” Kodali continued, “the Ministry of Rural  Development’s chief data officer should have classified the financial  information as restricted or open when the database was first created.  But did they do this.”&lt;/p&gt;
&lt;p&gt;Nagesh Singh, the additional secretary,  however said his ministry “does not have a chief data officer to do  this”. “The ministry’s economic advisor is the official responsible for  categorising data and advises us on this,” he added.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-may-20-2017-anumeha-yadav-will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes'&gt;https://cis-india.org/internet-governance/news/scroll-may-20-2017-anumeha-yadav-will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anumeha Yadav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T07:09:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns">
    <title>Aadhaar assurances fail to assuage privacy concerns</title>
    <link>https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns</link>
    <description>
        &lt;b&gt;While Aadhaar may be secure from external attacks, a failsafe system hasn’t been developed to protect it from Edward Snowden-style leakages and hacks.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anirban Sen was &lt;a class="external-link" href="http://www.livemint.com/Politics/clV1RHlNttIVTJNkQt8WqM/Aadhaar-assurances-fail-to-assuage-privacy-concerns.html"&gt;published by Livemint &lt;/a&gt;on May 5, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;As calls for a privacy and data protection law grow louder with each passing day amid reports of a central government ministry having made up to 130 million Aadhaar numbers public on its website, widespread concerns continue to emerge over loopholes in the security of the unique identification programme, though the man who created the system continues to defend the security and integrity of the system.&lt;br /&gt;&lt;br /&gt;Most worryingly, a consensus is emerging among security and privacy experts, who have argued that while the Aadhaar system may be secure from external attacks, a failsafe system has not been developed to protect it from Edward Snowden-style internal leaks or hacks.&lt;br /&gt;&lt;br /&gt;“(What has been suggested by the Unique Identification Authority of India and Nandan Nilekani) is that there will never be a data breach like what we saw in the US with the National Security Agency, Central Intelligence Agency, or Office of Personnel and Management breaches (data of federal government personnel, including more than 5.6 fingerprints, was leaked), or in Mexico or Turkey, or even in India when the department of defence was breached for cyber-espionage for multiple years without detection,” said Pranesh Prakash, policy director at the Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;“While the system may be secure from external attacks, there is no failsafe system to make it invulnerable to Snowden-style breaches,” he added.&lt;br /&gt;&lt;br /&gt;In an interview, former UIDAI chairman and Infosys Ltd co-founder Nandan Nilekani continued to defend the security of the system and said steps are being taken everyday to enhance the failsafe processes surrounding the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I think the Aadhaar system is extremely well-designed. It’s not an online system that is exposed to the Internet. When enrolment happens, the packet is encrypted at source and sent, so that there can’t be a man-in-the-middle attack. And when the authentication happens, that is also encrypted—not compared to the original data, but to a digital minutiae. The point is that the system is very, very secure. So, if the objection is to centralization, then you should not have clouds. Clouds are also centralized,” said Nilekani. He added that Aadhaar was also safe from internal breaches, an assumption that is being challenged by security experts all across.&lt;br /&gt;&lt;br /&gt;“Within seven years of its launch, the Aadhaar system has made a remarkable leap in terms of its security and privacy and it will keep improving things. Technology does not come through immaculate conception, where one morning some perfect technology is born. It has to evolve. It’s called learning by doing,” added Nilekani. He added that improving the security of the system is an ongoing process and conceded that a data protection and privacy law needs to be in place to supplement the current Aadhaar law.&lt;br /&gt;&lt;br /&gt;“I know the government has sent a notice to everyone. If somebody has done it; they ought not to have done it—there’s a law for that,” said Nilekani when asked about recent instances of Aadhaar numbers being made public by government departments.&lt;br /&gt;&lt;br /&gt;“We should have a data protection and privacy law which is an umbrella law, which looks at all these phenomena and certainly Aadhaar should be part of that. That’s perfectly fine—but people are behaving as if Aadhaar is the only reason why we should have a privacy law,” added Nilekani.&lt;br /&gt;&lt;br /&gt;The last few weeks and months have witnessed a steady stream of negative news surrounding Aadhaar and three main cases are currently being fought in the Supreme Court, including one challenging the government’s decision to make the 12-digit ID mandatory for filing income tax returns as well as for obtaining and retaining a PAN Card.&lt;br /&gt;&lt;br /&gt;Meanwhile, as Mint reported in April, questions are being raised on the Aadhaar biometric authentication failure rate in the rural job guarantee scheme in areas such as Telangana.&lt;br /&gt;&lt;br /&gt;The report of Aadhaar numbers being listed on the government ministry website has caused widespread uproar, although a lawyer pointed out that it is not due to a breach in the Aadhaar system.&lt;br /&gt;&lt;br /&gt;“It’s a misnomer to say this a leak because this was voluntarily, very actively put up there. A leak is when some information being kept securely gets breached somehow and comes out. Now, why is this information up on government websites? This is the problem of our government’s perception of transparency...The fact that the Aadhaar numbers are on the government website is not a flaw of the Aadhaar system, but it is a flaw of the understanding of what needs to be done to demonstrate transparency,” said Rahul Matthan, partner at Trilegal.&lt;br /&gt;&lt;br /&gt;In a column in Mint, Matthan had also pointed out that while Aadhaar has been a transformative project, there remains enough scope of misusing the database.&lt;br /&gt;&lt;br /&gt;“There is a legitimate fear that this identity technology will open us all up to discrimination, prejudice and the risk of identity theft,” Matthan wrote. “Aadhaar has given us the tools to harness data in large volumes. If used wisely, this technology can transform the nation. If not, it can cause us untold harm. We need to be prepared for the impending flood of data—we need to build dams, sluice gates and canals in its path so that we can guide its flow to our benefit.”&lt;br /&gt;&lt;br /&gt;Even as both sides debate the issue of Aadhaar’s security, calls are getting louder to revamp the unique identification database.&lt;br /&gt;&lt;br /&gt;“The point is that the UIDAI knows the device ID of the machine with which the biometric transaction took place along with the time and date, which means that by just using basic data analytics, any one with access to the transaction logs from the UIDAI (which have to be kept for a period of 5 years and 6 months) can have a complete view of a person’s Aadhaar-based interactions that are increasing day by day.”&lt;br /&gt;&lt;br /&gt;“Further, the UIDAI has built up a biometric profile of the entire country. This means that courts can order UIDAI to provide law enforcement agencies the biometrics for an entire state (as the Bombay high court did) to check if they match against the fingerprints recovered from a crime scene. This too is surveillance, since it collects biometrics of all residents in advance rather than just that of criminal suspects,” said Prakash of CIS.&lt;br /&gt;&lt;br /&gt;“The UIDAI could have chosen to derive unique 16 digit numbers from your Aadhaar number and provide a different one to each requesting entity. That would have prevented much of these fears. But the UIDAI did not opt for that more privacy-friendly design,” he added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns'&gt;https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T06:23:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
