<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1001 to 1015.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/open-workshop-on-digital-empire-s-perspectives-from-asia-and-africa"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-chronicle-november-21-2018-open-street-maps-help-tackle-disaster-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-letter-to-siam-on-rfid%20installation-in-vehicles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/open-letter-to-kolaveri-di"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/open-letter-to-hillary-clinton"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/open-house-on-information-breaches"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni">
    <title>Or-bits.com — A Talk by Marialaura Ghidini</title>
    <link>https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni</link>
    <description>
        &lt;b&gt;On Friday, April 19, 2013, at the Centre for Internet and Society,  Marialaura Ghidini will give a talk about the creation and activities of or-bits.com, a web-based curatorial platform that she founded in 2009.

 &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Or-bits.com is devoted to supporting and developing practices, critical dialogues and audience engagement around artistic production, display and distribution online. Through presenting online group exhibitions and critical writing on its blog, the development of offsite gallery projects, print publishing and workshops, or-bits.com aims to instigate an exploration of the phenomena related to the spread and simplification of web-based technology across disciplines. It aims to propagate a model of artistic work that uses and reflects on the web as a language and a medium of production, display and distribution of contemporary art, both online and offline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Marialaura's talk will then open up to present some issues related to  curatorial/artistic work online and its relationship with offline  activities of production, display and distribution in order to trigger  further discussion in the form of a Q&amp;amp;A session.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/CISImageTalk.png" alt="Orbit.com" class="image-inline" title="Orbit.com" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;Marialaura Ghidni&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Marialaura Ghidini is a curator, writer and researcher based in the UK. She is founder director of &lt;a class="external-link" href="http://www.or-bits.com/"&gt;or-bits.com&lt;/a&gt; and an AHRC-funded PhD researcher with &lt;a href="http://www.crumbweb.org/"&gt;CRUMB&lt;/a&gt; at the University of Sunderland, where she explores the field of online curation with a specific interest in the theory and practice of artists and curators operating through web-based platforms and in-between online and offline dimensions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She has been in India since January as an International Research Fellow at SARAI/CSDS in Delhi and now as a curatorial resident with T.A.J. Residency &amp;amp; SKE Projects in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also see &lt;a class="external-link" href="http://marialaura-ghidini.hotglue.me"&gt;http://marialaura-ghidini.hotglue.me&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni'&gt;https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-16T14:34:36Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must">
    <title>Opposition questions govt move to make Aadhaar must</title>
    <link>https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must</link>
    <description>
        &lt;b&gt;Congress leader Jairam Ramesh claimed that the Aadhaar system was becoming an instrument of social exclusion rather than one of identity. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was &lt;a class="external-link" href="http://www.livemint.com/Politics/nwqpFParHM0Ym8F4Dwt3yL/Rajya-Sabha-debates-Aadhaar-Opposition-points-to-flaws.html"&gt;published in Livemint&lt;/a&gt; on April 11, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Rajya Sabha on Monday witnessed a lively debate on Aadhaar, with the opposition questioning the government’s move to make the 12-digit unique identification number mandatory for a host of welfare benefits.&lt;br /&gt;&lt;br /&gt;Congress leader Jairam Ramesh claimed that the Aadhaar system was becoming an instrument of social exclusion rather than one of identity.&lt;br /&gt;&lt;br /&gt;“My major concern is implementation, how Aadhaar is being used to exclude people to avail benefits of the schemes which have been designed for them…If you need to apply to avail benefits, it’s as good as mandatory,” said Ramesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The former cabinet minister argued that over 25% of the population will stand excluded.&lt;br /&gt;&lt;br /&gt;“The Rs50,000 crore savings due to Aadhaar linkage as given by the government is highly questionable,” he said, adding that according to Comptroller and Auditor General (CAG) reports, 92% of the savings on domestic gas subsidies is not on account of Aadhaar implementation or direct benefit transfer. “Instead, it is because of the fall in international oil prices,” Ramesh argued.&lt;br /&gt;&lt;br /&gt;Trinamool Congress member Derek O’Brien said that for manual labourers, biometric identification does not always match and that can deprive them of welfare.&lt;br /&gt;&lt;br /&gt;He gave the example of Andhra Pradesh, where almost half the 85,000 ration card holders in 2014 were unable to get subsidized foodgrains due to faulty point of sale machines and biometrics not matching.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;K.T.S Tulsi, member of Parliament and senior Supreme Court advocate, said, “Not in my whole career have I come across a greater mutilation of a statutory provision than what has taken place in the case of Aadhaar.” He said Section 29 of the Aadhaar Act doesn’t permit data stored with the Unique Identification Authority of India (UIDAI) to be shared with anyone but a provision was later made for voluntary agreement to allow the sharing of data.&lt;br /&gt;&lt;br /&gt;IT and law minister Ravi Shankar Prasad said, “No religion, income, medical history, ethnicity or education is asked in Aadhaar. Even email ID and phone number is optional.”&lt;br /&gt;&lt;br /&gt;“The right of privacy of individuals must be respected. The privacy of the data cannot be breached by us except in the case of national security,” Prasad added.&lt;br /&gt;&lt;br /&gt;He claimed that the government has been blacklisting operators that share data from the Aadhaar system. It has blacklisted 34,000 operators, and has taken action against 1,000 of them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasad also said that UIDAI will be accountable to the Parliament.&lt;br /&gt;&lt;br /&gt;Expressing concern on mandating the use of Aadhaar for different services, Pranesh Prakash, Policy director of the Centre for Internet and Society, said, “As an enabler, people would want to have Aadhaar. But when it is made mandatory, it becomes more of a disenabler instead of an enabler.”&lt;br /&gt;&lt;br /&gt;“With the move towards a digital economy, setting up of a data protection authority as recommended by the Shah committee is important along with mass surveillance and greater accountability from the government,” he added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must'&gt;https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-12T14:19:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now">
    <title>OPINION | Data is New Oil and Human Mind the New Battlefield. India Must Wake Up Now</title>
    <link>https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now</link>
    <description>
        &lt;b&gt;In information warfare, the battlespace is the human mind. This is where the privacy of an individual intersects with national security. Fighting this battle will require a new paradigm in thought and action.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Lt. General (Retd.) D. S. Hooda was published by &lt;a class="external-link" href="http://www.news18.com/news/india/opinion-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now-1573747.html"&gt;News18.com&lt;/a&gt; on November 11, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A few days ago, the Army Headquarters took out a public advisory  warning about a “deliberate misinformation campaign being launched by  vested interests some of which is being initiated from countries  bordering our nation.” This is an acknowledgment of the use of social  media for what is today considered the most dominant form of warfare —  ‘information warfare’. It has been extensively used by our adversaries  in Jammu and Kashmir to show the government and security forces in poor  light.&lt;br /&gt; &lt;br /&gt; Deception, propaganda and misinformation have always been a part of  warfare but what is different today is that the tools of information  warfare have acquired a new dimension. An integration of massive amounts  of data with Artificial Intelligence (AI) has given a significant  weapon in the hands of information warriors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cost of saving data has been plummeting, with the cost being halved  about every 15 months. Now more and more data about individuals is being  saved, both by corporations and governments. In his book, &lt;i&gt;Data and Goliath&lt;/i&gt;,  Bruce Schneier writes that worldwide, Google has the capacity to store  15 exabytes of data. To put it in context, one exabyte is 500 billion  pages of text. Bruce also quotes the case of Max Schrems, an Austrian  law student, who in 2011 demanded all his personal data from Facebook.  After a two year legal battle, Facebook gave him a CD with 1200 pages of  PDF. This is how much Facebook knows about you, and it does not forget  because it is all saved.&lt;br /&gt; &lt;br /&gt; All this big data would be useless unless it can be utilised for  decision making and this is where advances in AI have provided the  breakthrough. Smart machines mine the data and detect trends, patterns,  habits, ideology and desires. These personal characteristics of  individuals are being used by corporations to send targeted  advertisements to influence commercial decisions.&lt;br /&gt; &lt;br /&gt; The same technique is used in information warfare. On November 1, the US  House Intelligence Committee released Facebook advertisements bought by  Russian operatives to influence the 2016 elections. Washington Post  wrote, “The ads made visceral appeals to voters concerned about illegal  immigration...African American political activism, rising prominence of  Muslims” among other issues. Senator Angus King said, “The strategy is  to take a crack in our society and turn it into a chasm.”&lt;br /&gt; &lt;br /&gt; Data is the new oil and that is exactly how it is being traded and sold.  In the absence of any legal provisions, companies and ‘data brokers’  are sharing and selling personal data. Can this personal data find its  way to a hostile government? Last month, the US Army brought out that  their troops in the Baltic had reported instances of cell phone hacking.  However, more worrisome was the fact the hackers knew personal details  of the soldiers. Direct threats against family members of the military  can have a negative psychological impact during conflict.&lt;br /&gt; &lt;br /&gt; India has its share of political, social and ethnic differences, just as  in many societies. In recent times these differences have been  magnified as nationalism has taken centre stage. It is difficult to  imagine why these fault lines will not be exploited by inimical forces  as India enters the election mode in 2018. Looking at examples from the  US and French elections, Brexit and the cyber battle during the  Catalonia referendum, I think we have no option but to be prepared.&lt;br /&gt; &lt;br /&gt; The preparation for this war (and I do not use this word lightly) lies in three spheres — concepts, practices and structures.&lt;br /&gt; &lt;br /&gt; Conceptually, our current shortcoming is that we are viewing this issue  through a technical prism rather than the broader spectrum of  information warfare. CERT and NTRO can technically protect our critical  infrastructure but they do not have an equal understanding of the human  dimension, which is more strategic than scientific. The Americans, world  leaders in information technology, have not been able to prevent a  perceived subversion of their democratic process.&lt;br /&gt; &lt;br /&gt; Our practices need to improve. The security of personal data is a major  concern. The Supreme Court has declared privacy as a fundamental right,  but there are no privacy laws to back it up. Even data stored in India  is not safe as the owners of our data are the giant technology  companies, mostly based in the US and not under our legal control. In  September 2017, it was reported that Google has quietly stopped  challenging most search warrants from US judges in which the data  requested is stored on overseas servers.&lt;br /&gt; &lt;br /&gt; A May 2017, report by the Centre for Internet and Society estimated that  135 million Aadhaar numbers could have been leaked from official  portals. This was not due to a security breach but due to poor privacy  practices.&lt;br /&gt; &lt;br /&gt; Our continued reliance on foreign hardware and software is extremely  worrisome. There was clear evidence that Cisco systems had been  back-doored by the American National Security Agency but the Indian  military continues to procure hardware from Cisco. There is a similar  story with Chinese equipment in our telecommunication and power sectors.  An attempt to introduce an Indian operating system to replace Windows  in the Army has been mired in controversy.&lt;br /&gt; &lt;br /&gt; In case of a targeted cyber attack on India, there is little we can do  except issue advisories. The solutions will have to come from foreign  manufactures or developers whose equipment we are using. There is an  urgent need to give a fillip to developing indigenous solutions for our  critical infrastructure.&lt;br /&gt; &lt;br /&gt; And finally, structures. An organisation to execute information warfare  would have to be led by the Ministry of Defence, because the threat is  mainly from external players. It would be a combination of military  planners, specialists from the field of intelligence, government  agencies, media and cyber warfare experts. Such an organisation does not  currently exist, though the raising of the Cyber Command could fill  this gap.&lt;br /&gt; &lt;br /&gt; In information warfare, the battlespace is the human mind. This is where  the privacy of an individual intersects with national security.  Fighting this battle will require a new paradigm in thought and action.&lt;br /&gt; &lt;br /&gt; &lt;i&gt;&lt;b&gt;(The author is former Northern Commander, Indian Army, under  whose leadership India carried out surgical strikes against Pakistan in  2016. Views are personal.)&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now'&gt;https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T03:28:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/open-workshop-on-digital-empire-s-perspectives-from-asia-and-africa">
    <title>Open Workshop on 'Digital Empire(s): Perspectives from Asia and Africa</title>
    <link>https://cis-india.org/internet-governance/news/open-workshop-on-digital-empire-s-perspectives-from-asia-and-africa</link>
    <description>
        &lt;b&gt;Monish will be a part of a collaborative network which is organising an open workshop on 'Digital Empire(s): Perspectives from Asia and Africa', on December 4, 2019 at Centre de Sciences Humaines (CSH) Delhi.&lt;/b&gt;
        &lt;p&gt;Click to view the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/digital-empires.pdf"&gt;agenda&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/open-workshop-on-digital-empire-s-perspectives-from-asia-and-africa'&gt;https://cis-india.org/internet-governance/news/open-workshop-on-digital-empire-s-perspectives-from-asia-and-africa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    

   <dc:date>2019-11-13T14:36:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-chronicle-november-21-2018-open-street-maps-help-tackle-disaster-experts">
    <title>Open Street Maps help tackle disasters: Experts</title>
    <link>https://cis-india.org/internet-governance/news/deccan-chronicle-november-21-2018-open-street-maps-help-tackle-disaster-experts</link>
    <description>
        &lt;b&gt;Speakers showed how participatory maps were used to bring to light lapses in delivery of civic services.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="https://www.deccanchronicle.com/nation/current-affairs/211118/open-street-maps-help-tackle-disasters-experts.html"&gt;Deccan Chronicle&lt;/a&gt; on November 21, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Maps come in handy when you have lost your way, but they can also be great tools during natural disasters, like the recent, unprecedented floods in Kerala. During the disaster, 2,200 mapping volunteers from around the world added 4,00,000 data points to the Open Street Map, helping the government reach relief fast to the affected, said Manoj Karingamadathil.&lt;br /&gt;&lt;br /&gt;On Tuesday, over 300 mappers from 12 countries got together in the city to discuss and present innovative solutions to mobilise, sustain and grow more inclusive open mapping communities. The event, hosted at the Indian Institute of Management-Bangalore, deliberated on how mapping is being used for disaster management in Asia, the role of local languages in tagging places, methods to sustain the community and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speakers showed how participatory maps were used to bring to light lapses in delivery of civic services. The maps, used both in rural and urban areas, brought out issues at the neighbourhood, city, state and national levels. &lt;br /&gt;&lt;br /&gt;For instance, Anindita Nayak explored safety in public spaces in Bengaluru by mapping lack of streetlights. Ankit Bhargava presented how Open Street Maps led to a participatory design process to create a very detailed and informative public map of Cubbon Park. Jaisen Nedumpala, a panchayat officer from Koorachundu in Kerala, used open source tools and community participation to fix land record boundaries for the village. Harry Mahardhika Machmud shared his experience on how citizen-led surveys in Indonesian cities helped the government prepare disaster response maps.&lt;br /&gt;&lt;br /&gt;Dr Anita Patil-Deshmukh, the first keynote speaker, said that official maps did not account for the majority of under-served communities in Mumbai. These people felt empowered through community-based mapping and it helped them engage better with stakeholders for effective delivery of services. &lt;br /&gt;&lt;br /&gt;Other speakers supported Dr Patil-Deshmukh's call to create more capacity within grassroots communities. Airin Akter stressed on the importance of maps in local languages for effective dissemination of public information in Bangladesh. &lt;br /&gt;&lt;br /&gt;Pradip Khatiwada spoke about the need to create innovative training and internship programmes, digital activism, and demonstrated how maps have been used successfully in Nepal. Siddharth Hande, the closing keynote speaker, affirmed the need to empower communities through data-driven initiatives in his engagement with cyclical waste management economies.&lt;br /&gt;&lt;br /&gt;Jointly organised by the Centre for Public Policy and the Centre for Software and IT Management (CSITM) of IIMB, Open Street Map (OSM) India, and Centre for Internet and Society, the inauguration of the event itself added meaning to the purpose as Prof. Abhoy K. Ojha, Dean of Academic Programmes at IIMB, contributed to the OSM project by adding the name of the building where the conference was hosted.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-chronicle-november-21-2018-open-street-maps-help-tackle-disaster-experts'&gt;https://cis-india.org/internet-governance/news/deccan-chronicle-november-21-2018-open-street-maps-help-tackle-disaster-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-11-28T01:58:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly">
    <title>Open standards can disrupt Facebook’s messaging monopoly</title>
    <link>https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly</link>
    <description>
        &lt;b&gt;Facebook made the news last week when The New York Times’ Mike Isaac reported that CEO Mark Zuckerberg intended to integrate the company’s three messaging platforms: WhatsApp, Messenger, and Instagram.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Abhimanyu Ghoshal was &lt;a class="external-link" href="https://thenextweb.com/facebook/2019/01/28/open-standards-can-help-disrupt-facebook-messaging-monopoly/"&gt;published in The Next Web&lt;/a&gt; on January 30, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;We don’t have all the details of exactly how this will work. The plan is still in its early stages, and there are plenty of moving parts – legal and technical – to take care of. What’s clear is this: with more than 2.6 billion users between the platforms, this is set to impact a lot of people if it goes through – and potentially many hundreds of millions more in the following years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the specifics of the move are yet to be revealed, a move like  this could help Facebook create more detailed profiles of its users.  Even if the company encrypts communications end-to-end as it seemed to  imply in its responses to NYT, it could still leverage communications  metadata to target ads more accurately than you might think.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here’s an example: without looking at your messages (because they’re  encrypted), Facebook could gather data on who you chat with most often  and for how long, later correlating that with the recipients’ interests  from Instagram. It could then show you ads for gifts that contact may  like, right around the time their birthday comes up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Integrating these platforms could also bolster Facebook’s efforts to  keep users tied into its ecosystem. That’s problematic, when you  consider the larger your network of contacts is on the company’s  services, the harder it is for you to leave them and use an alternative  you’re more comfortable with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is there a way out? &lt;a href="https://www.linkedin.com/in/praneshprakash/" rel="nofollow noopener" target="_blank"&gt;Pranesh Prakash&lt;/a&gt; – a Fellow at the &lt;a href="https://cis-india.org/" rel="nofollow noopener" target="_blank"&gt;Center for Internet and Society&lt;/a&gt;, as well as a Fellow at the &lt;a href="https://www.newamerica.org/" rel="nofollow noopener" target="_blank"&gt;New America&lt;/a&gt; think tank – believes that the answer lies not in breaking up Facebook  over privacy laws, but in competition, and regulators at the government  level should demand Facebook use open standards for its messaging  platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash explained that standards like SMTP and IMAP, which are used  for facilitating email exchanges, allow for interoperability between  services run by different organizations. They also let users choose the  client apps they prefer for accessing their inboxes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook’s messaging services, meanwhile, run on closed standards and don’t play nice with platforms created by third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This results in people becoming trapped in Facebook’s ecosystem: even  if you’re opposed to using the company’s products, you can’t  realistically ditch them all because your friends and family are all  using its platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case you’re worried about open-source protocols not being up to  the task of serving massive networks like the ones Facebook operates,  consider the fact that &lt;a href="https://mycodeplex.wordpress.com/2016/03/08/inside-of-whatsapp-part-1/" rel="nofollow noopener" target="_blank"&gt;WhatsApp runs on FunXMPP&lt;/a&gt;, a customized version of &lt;a href="https://xmpp.org/" rel="nofollow noopener" target="_blank"&gt;the open XMPP set of standards&lt;/a&gt; that anyone can use for their own projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If Facebook is doing the difficult legwork of unifying the underlying  technical infrastructure of its three apps, Prakash argues, &lt;a href="https://www.hindustantimes.com/analysis/privacy-laws-cannot-make-facebeook-and-google-accountable/story-Yne6DwUoGb0eO9mRxaDTaL.html" rel="nofollow noopener" target="_blank"&gt;it’d do well to make its new protocol public and open-source&lt;/a&gt;.  That way, anyone should be able to use the company’s services to reach  people just the same as when they choose to use a service created by a  separate entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash said that the only way diminishing Facebook’s power in this  regard is to open up access to its network of users. In doing so, it  will see people stick with the company’s services because they like  using them, not because they can’t stay in touch with their contacts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions surrounding Facebook’s monopolistic domination of the  messaging space will inevitably crop up when the company implements  Zuckerberg’s plan, and this sounds like a healthy way to tackle those  issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Naturally, that seems like it’d hurt Facebook’s bottom line – but  it’s important to start thinking about realistic measures to comply with  antitrust law – or risk being booted from countries that don’t  appreciate the way the company does business.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly'&gt;https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T01:59:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame">
    <title>Open sesame</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame</link>
    <description>
        &lt;b&gt;The government’s email is shockingly vulnerable.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.thehindubusinessline.com/opinion/open-sesame/article7678142.ece"&gt;Hindu&lt;/a&gt; on September 22, 2015. CIS research on private email accounts is mentioned.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the Centre moves towards smart cities and a Digital  India, some critics have cited the country’s increased vulnerability to  cyber attacks. To be sure, cyber threat groups could disrupt our  infrastructure by taking control of many systems. Such attacks could be  quite damaging. Yes, they are rare today, but are much more likely to  arise in conjunction with traditional armed conflicts. Cyber criminal  groups target Indian organisations on a daily basis.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Almost  two years ago, the IT minister’s office triggered national outrage when  it used a public email service for official communication. There was  much hand-wringing about security practices in a ministry responsible  for setting the technology direction (secure email policy) for the  country. Then in December 2013, the Centre for Internet and Society  revealed that up to 90 per cent of Indian government officials used  private email accounts for professional purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A big deal&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Between  then and now, we’ve read about a new email policy and revelations of  several cyber attacks on government officials. And FireEye revealed a  decade-long cyber espionage operation by a group we call ‘APT30’, which  is likely to be sponsored by China. How did they break in? By sending  targeted ‘spear-phish’ emails with malware attached.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Email  doesn’t sound like a big deal. Most of us have been using it for over a  decade, and think we know how to use it right. But when you’re in a  position of authority with access to sensitive information, you  shouldn’t leave it to chance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Today, state-sponsored  attackers craft these spear-phishing emails after considerable  research. APT30 carefully researched their targets and crafted mails  which would appear extremely relevant, with interesting content. The  moment a victim would open an attachment, an exploit would secretly  install a backdoor. Through that backdoor, groups can compromise the  employee’s entire network and extricate sensitive data. Groups bent on  destruction can deploy malware to destroy the data. They could also take  control of systems managing infrastructure or industrial processes and  create havoc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Spear-phishing has an open rate of 70  per cent, while regular mass emails had an open rate of just 3 per cent.  Email is the front- door for today’s threat groups. That’s why  governments around the world are improving the security of their email  systems to fend off these spear-phishing threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Public concerns&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;When  government employees use webmail for official business, they trade away  their security for convenience. The emails they receive are no longer  screened by cyber security solutions, which detect advanced targeted  email attacks before they reach the inbox. In addition, because people  typically retrieve their webmail in a browser, attackers have a larger  attack surface to exploit when carrying out their attacks. For example,  attackers can coax victims to click on a link to a website, which  delivers an exploit via Adobe Flash.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Webmail opens  the door to threats that would otherwise have been intercepted. When our  government employees use webmail for official business, they leave the  front door wide open to threats. One of the best steps we can take  towards improving our government’s cyber security defences is abandoning  public email services.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;The writer is a software architect at the cyber security firm FireEye&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame'&gt;https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:31:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets">
    <title> Open Secrets</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets</link>
    <description>
        &lt;b&gt;We need to think of privacy in different ways — not only as something that happens between people, but between you and corporations.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's article was originally &lt;a class="external-link" href="http://www.indianexpress.com/news/open-secrets/1187814/0"&gt;published in the Indian Express&lt;/a&gt; on October 27.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If you are a part of any social networking site, then you know that privacy is something to be concerned about. We put out an incredible amount of personal data on our social networks. Pictures with family and friends, intimate details about our ongoing drama with the people around us, medical histories, and our spur-of-the-moment thoughts of what inspires, peeves or aggravates us. In all this, the more savvy use filters and group settings which give them some semblance of control about who has access to this information and what can be done with it.&lt;br /&gt;&lt;br /&gt;But it is now a given that in the world of the worldwide web, privacy is more or less a thing of the past. Data transmits. Information flows. What you share with one person immediately gets shared with thousands. Even though you might make your stuff accessible to a handful of people, the social networks work through a "friend-of-a-friend effect", where others in your networks use, like, share and spread your information around so that there is an almost unimaginable audience to the private drama of our lives. Which is why there is a need for a growing conversation about what being private in the world of big data means.&lt;br /&gt;&lt;br /&gt;Privacy is about having control over the data and some ownership about who can use it and for what purpose. Interface designs and filters that allow limited access help this process. The legal structures are catching up with regulations that control what individuals, entities, governments and corporations can do with the data we provide. However, most people think of privacy as a private matter. Just look at last month's conversations around Facebook's new privacy policies, which no longer allow you to hide. If you are on Facebook, people can find you using all kinds of parameters — meta data — other than just your name. They might find you through hobbies, pages you like, schools you have studied in, etc. This can be scary because it means that based on particular activities, people can profile and follow you. Especially for people in precarious communities — the young adults, queer people who might not be ready to be out of the closet, women who already face increased misogyny and hostility online. This means they are officially entering a stalkers' paradise.&lt;br /&gt;&lt;br /&gt;While those concerns need to be addressed, there is something that seems to be missing from the debate. Almost all of these privacy alarms are about what people can do to people. That we need to protect ourselves from people, when we are in public — digital or otherwise. We are reminded that the world is filled with predators, crackers and scamsters, who can prey on our personal data and create physical, emotional, social and financial havoc. But this is the world we already know. We live in a universe filled with perils and we have learned and coped with the fact that we navigate through dangerous spaces, times and people all the time. The digital is no different than the physical when it comes to the possible perils that we live in, though digital might facilitate some kinds of behaviour and make data-stalking easier.&lt;br /&gt;&lt;br /&gt;What is different with the individualised, just-for-you crafted world of the social web is that there are things which are not human, which are interacting with you in unprecedented ways. Make a list of the top five people you interact with on Facebook. And you will be wrong. Because the thing that you interact with the most on Facebook, is Facebook. Look at the amount of chatter it creates — How are you feeling today?; Your friend has updated their status; Somebody liked your comment… the list goes on. In fact, much as we would like to imagine a world that revolves around us, we know that there are a very few people who have the energy and resources to keep track of everything we do. However, no matter how boring your status message or how pedestrian your activity, deep down in a server somewhere, an artificial algorithm is keeping track of everything that you do. Facebook is always listening, and watching, and creating a profile of you. People might forget, skip, miss or move on, but Facebook will listen, and remember long after you have forgotten.&lt;br /&gt;&lt;br /&gt;If this is indeed the case, we need to think of privacy in different ways — not only as something that happens between people, but between people and other entities like corporations. The next time there is a change in the policy that makes us more accessible to others, we should pay attention. But what we need to be more concerned about are the private corporations, data miners and information gatherers, who make themselves invisible and collect our personal data as we get into the habit of talking to platforms, gadgets and technologies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets'&gt;https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-30T08:21:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-letter-to-siam-on-rfid%20installation-in-vehicles">
    <title>Open Letter to Prevent the Installation of RFID tags in Vehicles</title>
    <link>https://cis-india.org/internet-governance/blog/open-letter-to-siam-on-rfid%20installation-in-vehicles</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) has sent this open letter to the Society of Indian Automobile Manufacturers (SIAM) to urge them not to intall RFID tags in vehicles in India. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;

&lt;p class="western" style="text-align: justify; "&gt;This letter is with regards to the installation of Radio Frequency Identification Tags (RFID) in vehicles in India.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;On behalf of the Centre for Internet and Society, we urge you to prevent the installation of RFID tags in vehicles in India, as the legality, necessity and utility of RFID tags have not been adequately proven. Such technologies raise major ethical concerns, since India lacks privacy legislation which could safeguard individuals' data.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;The proposed rule 138A of the Central Motor Vehicle Rules, 1989, mandates that RFID tags are installed in all light motor vehicles in India. However, section 110 of the Motor Vehicles Act (MV Act), 1988, does not bestow on the Central Government a specific empowerment to create rules in respect to RFID tags. Thus, the legality of the proposed rule 138A is questioned, and we urge you to not proceed with an illegal installation of RFID tags in vehicles until the Supreme Court has clarified this issue.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;The installation of RFID tags in vehicles is not only currently illegal, but it also raises majors privacy concerns.  RFID tags yield locational information, and thus reveal information as to an individual’s whereabouts. This could lead to a serious invasion of the right to privacy, which is at the core of personal liberty, and constitutionally protected in India. Moreover, the installation of RFID tags in vehicles is not in compliance with the privacy principles of the Report of the Group of Experts on Privacy, as, among other things, the architecture of RFID tags does not allow for consent to be taken from individuals for the collection, use, disclosure, and storage of information generated by the technology.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;The Centre for Internet and Society recently drafted the Privacy (Protection) Bill 2013 – a citizen's version of a possible privacy legislation for India.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt;The Bill defines and establishes the right to privacy and regulates the interception of communications and surveillance, and would include the regulation of technologies like RFID tags. As this Bill has not been enacted into law and India lacks a privacy legislation which could safeguard individuals' data, we strongly urge you to not require the mandatory installation of RFID tags in vehicles, as this could potentially violate individuals' right to privacy and other human rights.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;As the proposed rule 138A, which mandates the installation of RFID tags in vehicles, is currently illegal and India lacks privacy legislation which would regulate the collection, use, sharing of, disclosure and retention of data, we strongly urge you to ensure that RFID tags are not installed in vehicles in India and to play a decisive role in protecting individuals' right to privacy and other human rights.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;Thank you for your time and for considering our request.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;Sincerely,&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;Centre for Internet and Society (CIS)&lt;/p&gt;
  
&lt;p&gt; &lt;/p&gt;
&lt;p id="sdfootnote1"&gt; &lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Report of the Group of Experts on Privacy: http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].Draft Privacy (Protection) Bill 2013: http://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-letter-to-siam-on-rfid%20installation-in-vehicles'&gt;https://cis-india.org/internet-governance/blog/open-letter-to-siam-on-rfid%20installation-in-vehicles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T10:59:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee">
    <title>Open Letter to Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee  </title>
    <link>https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee</link>
    <description>
        &lt;b&gt;An open letter was sent to the Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee on the proposed EU Regulation. The letter was apart of an initiative that Privacy International and a number of other NGO's are undertaking.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;Dear Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee&lt;/b&gt;,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On behalf of The Centre for Internet and Society, Bangalore, India,  we are writing to express our support of the European Commission’s proposed General Data Protection Regulation (COM (2012) 11).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legal framework established under the 1995 Data Protection Directive (95/46/EC) in Europe has positively influenced many existing privacy regimes worldwide, serving as a model legal framework in jurisdictions that are in the process of developing privacy regimes, including India. The positive impact of the Data Protection Directive shows the potential of the Regulation to become a global model for the protection of personal data. The Regulation seeks to address new scenarios that have arisen in the context of rapidly changing technologies and practices, increasing its potential for positively influencing privacy rights for individuals globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is currently in the process of considering the enactment of privacy legislation, in part with the aim of ensuring adequate safeguards to enable and enhance information flows into India from countries around the world, including Europe. At the same time, India is seeking  Data Secure Status from the EU, on the basis of its current regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that the EU framework for data protection has a major influence on the current and emerging privacy regime in India. India is only one country of many that are in the beginning stages of developing a comprehensive privacy regime. Thus, we ask that you keep in mind how the Regulation will impact the rights of individual in countries outside of Europe, particularly in countries that are in the process of developing privacy regimes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We ask that you take into consideration the four following points that we believe need to be addressed in the Regulation to help ensure adequate protection of the rights of individuals in the European Union and around the world.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Strengthen the principle of purpose limitation: &lt;/b&gt;The Regulation should incorporate a strong purpose limitation principle that strictly limits present and future uses of personal data to the purposes for which it was originally collected. Currently, Article 6(4) allows for the further processing of data when the processing is &lt;i&gt;“not compatible with the one for which the personal data have been collected”. &lt;/i&gt;Though the provision establishes legal requirements, one of which must be before information can be used for a further purpose, this is has proven insufficient in the existing Directive. The current provision in the Regulation dilutes the principle of purpose limitation as well as weakening an individual’s ability to make informed decisions about their personal data.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Define principles for interpretation of broad terms: &lt;/b&gt;The Regulation should create principles for interpreting broad terms such as “legitimate interest” and “public interest”. These vague terms are used throughout the Regulation, and create the potential for loopholes or abuse. Because these terms can be interpreted in many different ways, it is important to create a set of principles to guide their interpretation  by data protection authorities and courts to avoid inconsistent application and enforcement of the Regulation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Clarify the scope of the Regulation:&lt;/b&gt; The Regulation should clearly describe the jurisdictional scope and reach of its provisions. Currently Article 3(1) states that the Regulation will apply to the processing of data “in the context of the activities of an establishment of a controller or a processor in the Union”.  The flow of information on the online environment coupled with trends such as cloud computing, outsourcing, and cross border business creates a scenario where defining what constitutes “context of the activities of an establishment”, is difficult and could lead to situations where personal data is not protected, as the collection, use, or storage of it does not necessarily fall within the “context of the activities”. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Address access by foreign alliance bodies&lt;/b&gt;: In light of growing demands by law enforcement for access, use, and transfer of personal information for investigative purposes across jurisdictions– the Regulation should define the circumstances in which personal data protected by its provisions can be accessed and used by foreign intelligence bodies, and the procedure by which to do so. The Regulation should address challenges such as access by foreign intelligence bodies to data stored on the cloud and data that has passed through/is stored on foreign networks/servers. &lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee'&gt;https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-23T05:00:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/open-letter-to-kolaveri-di">
    <title>Open letter to Kolaveri Di makers: How Dare You!</title>
    <link>https://cis-india.org/internet-governance/open-letter-to-kolaveri-di</link>
    <description>
        &lt;b&gt;When it comes to piracy, you are sure to have an opinion. You might either make a virtue out of it, talking about cultural commons and collaborative conditions of production. Or you might vilify it as the social fault-line that is destroying the very pillars of commerce and cultural negotiations.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/open-letter-to-kolaveri-di-makers-how-dare-you-317703.html#disqus_thread"&gt;This article by Nishant Shah was published in First Post on May 22, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;No matter which part of the fault-line you fall under, this is the time for all good (and otherwise ambiguously identified) people to come to the aid of the party. This is an open call for anybody who has been on the interwebz, to share and distribute one particular object whose rights protector have recently taken your right to access countless platforms which are a part of your everyday life online.&lt;/p&gt;
&lt;p&gt;If you haven’t yet grasped it, I am referring to the recent events where, following a John Doe order from the High Court of Chennai, all kinds of file sharing platforms are suddenly being blocked by Internet Service Providers (ISPs) across India.&lt;/p&gt;
&lt;p&gt;The film producers of ‘3’, the movie whose claim to fame has been the spectacular viral success of the &lt;em&gt;Kolaveri Di &lt;/em&gt;song, have moved the courts to issue a blanket order that has suddenly made it impossible for Indian netizens to access file sharing, user-generated-content hosting websites which allowed for digital cultural texts – from print to music to movies to presentations – to be shared and disseminated freely online.&lt;/p&gt;
&lt;p&gt;The producers and those who support them, are glorying in this legal battle where they have identified nodes in our networks, through which their copyright information was potentially being pirated. They are hoping that by ensuring this lack of digital mobility for their film, they will be able to entice audiences to come into the theatres and spend their money ‘legitimately’ on the film.&lt;/p&gt;
&lt;p&gt;They are revelling in the fact that hundreds of thousands of users have been thwarted in their attempts at copyright infringement. What they haven’t realised is that they have justified their box-office greed by infringing on your and my rights to perform everyday activities online.&lt;/p&gt;
&lt;p&gt;I am sure there is going to be a smart-aleck riding a moral high horse, who will applaud this move and point out to me about the rights of the producers to protect their content. There are many who support this high-censorship which not only betrays the power of the Music And Film Industry Association (MAFIA, to friends) to curb us of our rights, but also the completely depraved technology apparatus of the State which seems to have no understanding of how the internet actually works.&lt;/p&gt;
&lt;p&gt;However, i want to shift the focus from the rights of these victimised producers and right-holders to the right of the individual who is actually the structural unit of cyberspaces. And I want to suggest to you that these right-holders, who incidentally, have such global value only because the &lt;em&gt;Kolaveri Di&lt;/em&gt; song put them on the global meme map, have now infringed upon my right to access my content which I had put out to share.&lt;/p&gt;
&lt;p&gt;There are open content videos on Vimeo that we have produced through years of research and a huge amount of financial investment, which are now no longer available to people who want to view them.&lt;/p&gt;
&lt;p&gt;There are powerpoint presentations and publications on file sharing sites, seeded through torrents, which are now impossible to access for people in India. A large amount of our personal research and lectures, which we have shared for educational purposes, are now not even available for us to download.&lt;/p&gt;
&lt;p&gt;And we are not alone in this. Hundreds of thousands of individuals, who have shared openly licensed material, have now lost the ability to access that information because one private company wanted to make sure it made its profits.&lt;/p&gt;
&lt;p&gt;I am not going to write a manifesto for the digital world, but I do want to put it out there, this new cultural MAFIA, grant to me my rights which their actions have violated. For every site that they have included in their banned list, they have disrespected the open, collaborative licenses that enabled sharing of information whose value, usage and worth is more than their commercial pot boiler, which shall hopefully be forgotten before we realise it was released in the markets.&lt;/p&gt;
&lt;p&gt;Their commercially driven arrogance has suddenly demanded that we pay a price for the shared information, and that price should be to those who hold rights over the movie.&lt;/p&gt;
&lt;p&gt;And so I am writing this open call, for you to come and demand your right. If that movie producer has the right to protect his interests, you and I have the right to protect ours. I demand that for every site that I am not able to access, for public domain information that I am entitled to, they pay us a penalty.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/open-letter-to-kolaveri-di'&gt;https://cis-india.org/internet-governance/open-letter-to-kolaveri-di&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-05-23T07:02:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/open-letter-to-hillary-clinton">
    <title>Open letter to Hillary Clinton on Internet Freedom</title>
    <link>https://cis-india.org/internet-governance/open-letter-to-hillary-clinton</link>
    <description>
        &lt;b&gt;Last month I wrote an open letter to Hillary Clinton. It was based on a presentation I that I made during a panel discussion at a Google sponsored conference titled Internet at Liberty 2012 in Washington DC on May 24, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham's article was &lt;a class="external-link" href="http://thinkingaloud.in/ArticleComments.aspx?ArtId=1097"&gt;published&lt;/a&gt; in Thinking Aloud on July 17, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The question that my panel tried to grapple with was "In a world where nearly nine out of ten Internet users are not American, what is the responsibility of United States institutions in promoting internet freedom?" My co-panelists were Cynthia Wong who is with the Centre for Democracy and Technology, Mohamed El Dahshan a writer and journalist, Dunja Mijatovic the OSCE Representative on Freedom of the Media.&lt;br /&gt;&lt;br /&gt;Internet freedom is a curious subject. It is a technology specific liberty - for a moment consider television freedom. The US has more Muslims than India has Christians. But Indian television in the average hotel comes in hundreds and there are at least 3 channels of Christian preaching. But US television in hotels is usually less than 50 channels with no channels of Islamic preaching. In fact even the reception of secular channels from the Islamic World like Al Jazeera is still difficult in America. Can we accuse the US of not having television freedom since their television features Christian evangelists but not Muslim evangelists? Should it be part of India's foreign policy to evangelize television freedom given that there is a large domestic industry with clear international potential?&lt;br /&gt;&lt;br /&gt;In an ideal world - citizens will possess technology-neutral freedom to communication and expression. But nothing can be farther from the truth. Communication technologies are regulated using a plethora of policies and practices and very often these have a chilling effect on freedoms.&lt;br /&gt;&lt;br /&gt;The following is my response to the technology-specific demands for deregulation from the US Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Text of the Open Letter[2]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise Access to Knowledge (A2K) as pre-condition for freedom of expression&lt;/b&gt;: There is no difference between aggressive enforcement of imbalanced and obsolete intellectual property laws and censorship. The need of the moment is not more enforcement to protect obsolete business models against the everyday practices of ordinary netizens but rather the reform of intellectual property law (levies, broader exceptions and limitations, pools, statutory and compulsory licenses, prizes etc.) to keep pace with innovations in technology and the production of knowledge and culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise privacy as pre-condition for security:&lt;/b&gt; The alleged tension between privacy and security is a false dichotomy. Blanket surveillance by design compromises security. &lt;b&gt;Surveillance is like salt in cooking — essential in very small quantities but dangerous even if slightly in excess. Blanket surveillance technologies are only going make things easier for — and will only serve as targets for — current and future online villains.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Don't lose the moral high-ground:&lt;/b&gt; Remember, with great power comes great responsibility. Other countries are waiting to cherry pick from your worst practices. Also don't use trade agreements to selectively export components of US policy without the accompanying safeguards for civil liberties and rights. Citizens in oppressive and authoritarian states are depending on the US government, courts and civil society to protect their rights online. Don't undermine their capacity to shame their governments by holding up the US as the example of 'how to get things right'. They urgently need the US government to lead by example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise that freedom of expression has become a trade issue:&lt;/b&gt; This is unfortunate but this is true — thanks to the precedent set by the developed world when it came to asymmetric trade negotiations. Just as the US is interested in protecting the interests of its corporations in global markets — other governments are keen protect the interests of their own corporations. The optimal solution in this case is where all countries and corporations are equally unsatisfied. This will remain a continuing discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Address developing country anxieties around critical internet infrastructure:&lt;/b&gt; Security by obscurity will no longer do — security by transparency through open standards, technologies and governance is the only way to fears and build a trust-worthy and secure Internet for all of us. For example, there is urgent need to develop standards for supply chain audits of information infrastructure. The US has dealt with the fear of back doors by banning the use of hardware and software from countries it does not trust. The developing world is not sure if there are back-doors in hardware and software manufactured by US corporations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Time has comes to address this and other related anxieties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Appreciate diversity in nomenclature:&lt;/b&gt; 'Freedom' and 'liberty' may be appropriate terms to use in the United States of America. But openness may be more in countries that are not yet full and robust liberal democracies. The Internet Governance Forum for example uses 'openness' instead of 'freedom'. Openness is also preferred because it includes 'freedom of expression', 'freedom of information' (also known as right to information, access to information or public and 'free knowledge' (free software, open standards, open content, open access, open data, open educational resources, etc.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Don't be too instrumental in your interventions:&lt;/b&gt; Don't undermine the local credibility of like-minded civil society, think-tanks and research organisations by being too directive in your support. Managerialism will undermine reform of policies and practices in information societies and so does inappropriate/premature monitoring and evaluation (for example, looking for explicit attribution in terms of casual connections between your actions and outcomes). There is a need to support greater reflexivity in the global information society by developing institutional capacity in developing countries through unrestricted funding. True critical thinking is the foundation of both scientific progress and open societies. Go out of your way to find and support those who disagree with you. Protect the plural foundation of our networked society!&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham was a speaker along with Cynthia Wong, Mohamed El Dahshan and Dunja Mijatovic in Plenary IV Debate 3 at the &lt;b&gt;Internet at Liberty 2012 &lt;/b&gt;event&lt;b&gt; &lt;/b&gt;organised by Google on May 24, 2012. &lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/9YMte4hdYu0" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.youtube.com/watch?v=9YMte4hdYu0"&gt;View the video on YouTube&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/open-letter-to-hillary-clinton'&gt;https://cis-india.org/internet-governance/open-letter-to-hillary-clinton&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-09-04T08:28:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation">
    <title>Open Letter to "Not" Recognize India as Data Secure Nation till Enactment of Privacy Legislation</title>
    <link>https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation</link>
    <description>
        &lt;b&gt;India shouldn't be granted the status of "data secure nation" by Europe until it enacts a suitable privacy legislation, points out the Centre for Internet and Society in this open letter.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This letter is with regards to both the request from the Confederation of Indian Industry that the EU recognize India as a data secure nation made on April 29th 2013, &lt;a href="https://cis-india.org/accessibility/blog/#fn1" name="fr1"&gt;[1]&lt;/a&gt; and the threat from India to stall  negotiations on the Free Trade Agreement with the EU unless recognized  as data secure nation made on May 9th 2013.&lt;a href="https://cis-india.org/accessibility/blog/#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On behalf of the Centre for Internet and Society, we request that you  urge the European Parliament and the EU ambassador to India to reject  the request, and to not recognize India as a data secure nation until a  privacy legislation has been enacted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society believes that if Europe were to  grant India status as a data secure nation based only on the protections  found in the “Information Technology (Reasonable Security Practices and  Procedures and Sensitive Personal Data or Information) Rules 2011”, not  only will India be protected through inadequate standards, but the government will not have an incentive to enact a legislation that  recognizes privacy as a comprehensive and fundamental human right. Since 2010 India has been in the process of realizing a privacy  legislation.  In 2011 the “Draft Privacy Bill 2011” was leaked.&lt;a href="https://cis-india.org/accessibility/blog/#fn3" name="fr3"&gt;[3]&lt;/a&gt; In   2012 the “Report of the Group of Experts on Privacy” was released. The  Report recommends a comprehensive right to privacy for India, nine  national privacy principles, and a privacy framework of co-regulation  for India to adopt. &lt;a href="https://cis-india.org/accessibility/blog/#fn4" name="fr4"&gt;[4]&lt;/a&gt; In 2013 the need for a stand alone privacy  legislation was highlighted by the Law Minister.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; The Centre for Internet and Society has recently drafted the “Privacy  Protection Bill 2013” - a citizen's version of a possible privacy  legislation for India.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Currently, we are hosting a series of six  “Privacy Roundtables” across India in collaboration with FICCI and DSCI  from April 2013 - August 2013.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; The purpose of the roundtables is to  gain public feedback to the text of the “Privacy Protection Bill 2013”,  and other possible frameworks for privacy in India. The discussions and  recommendations from the meeting will be published into a compilation  and presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Center for Internet and Society will also be submitting the  “Privacy Protection Bill 2013” and the public feedback to the Department  of Personnel and Training (DoPT) with the hope of contributing to and  informing a privacy legislation in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been researching privacy since  2010 and was a member of the committee which compiled the “Report of the  Group of Experts on Privacy”. We have also submitted comments on the  “Information Technology (Reasonable Security Practices and Procedures  and Sensitive Personal Data or Information) Rules 2011” to the Committee  on Subordinate Legislation  of the 15th Lok Sabha.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We hope that you will consider our request and urge the European  Parliament and the EU ambassador to India to not recognize India as a  data secure nation until a privacy legislation has been enacted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. CII asks EU to accept India as 'Data Secure' nation: &lt;a class="external-link" href="http://bit.ly/15Z77dH"&gt;http://bit.ly/15Z77dH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. India threatens to stall trade talks with EU: &lt;a class="external-link" href="http://bit.ly/1716aF1"&gt;http://bit.ly/1716aF1&lt;/a&gt;&lt;a class="moz-txt-link-freetext" href="http://www.business-standard.com/article/economy-policy/india-threatens-to-stall-trade-talks-with-eu-113050900020_1.html"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. New privacy Bill: Data Protection Authority, jail term for  offence: &lt;a class="external-link" href="http://bit.ly/emqkkH"&gt;http://bit.ly/emqkkH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The Report of the Group of Experts on Privacy &lt;a class="external-link" href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Law Minister Seeks stand along privacy legislation, writes PM: &lt;a class="external-link" href="http://bit.ly/16hewWs"&gt;http://bit.ly/16hewWs&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. The Privacy Protection Bill 2013 drafted by CIS: &lt;a class="external-link" href="http://bit.ly/10eum5d"&gt;http://bit.ly/10eum5d&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Privacy Roundtable: &lt;a class="external-link" href="http://bit.ly/12HYoj5"&gt;http://bit.ly/12HYoj5&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data Information) Rules, 2011: &lt;a class="external-link" href="http://bit.ly/Z2FjX6"&gt;http://bit.ly/Z2FjX6&lt;/a&gt;&lt;/p&gt;
&lt;div id="_mcePaste"&gt;﻿&lt;b&gt;Note: CIS sent the letters to Data Protection Commissioners across Europe.&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation'&gt;https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:07:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech">
    <title>Open House on Security Practices in FinTech </title>
    <link>https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech</link>
    <description>
        &lt;b&gt;CIS in collaboration with Has Geek is organizing an Open House on security practices in FinTech.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The prevalence of fintech companies operating in India is growing with new actors entering the sector and traditional actors such as banks beginning to offer digital financial services. The push to digital payments has been particularly strong after the demonetization policy, the development and implementation of Aadhaar and India Stack. Services offered by Fintech firms can range from offering a loan or credit to a digital wallet and digital banking and payment services. &lt;br /&gt;&lt;br /&gt;Presently, there is a regulatory gap for many of the fintech services and business models. The Reserve Bank of India has published consultation papers on Peer-to-Peer lending platforms as well as Account Aggregators, but comprehensive regulations, especially those surrounding minimum security practices, have yet to emerge – presenting a critical policy and research window. Furthermore, under Section 43A of the IT Act and its associated Rules, ‘body corporates’ are required to implement reasonably security procedures compliant with ISO27001 or a sectoral standard approved by the Central Government. However, currently such a sectoral standard is absent for the FinTech and Digital Payments space. &lt;br /&gt;&lt;br /&gt;The growing prevalence of these fintech technologies and the criticality of security of the same to engender citizen trust, protect rights, and comprehensive national security posture demands debate and discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On November 17th, the HasGeek in collaboration with the Centre for Internet and Society will be holding an Open House from 6pm - 8pm to discuss security practices in the fintech industry.&lt;/p&gt;
&lt;p dir="ltr" id="docs-internal-guid-4d88330a-afbb-67f0-a4de-5b60a3db94bc" style="text-align: justify; "&gt;&lt;span&gt;Pressing questions for discussion include: How secure are these services? What security standards are they adhering to? Who is holding them accountable for adherence to security standards? What can individuals do if there financial data is compromised? &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Please join us for a robust discussion on these issues @HasGeek House&lt;/span&gt;&lt;span&gt;, 2699, 19th Main Rd, HAL 2nd Stage, Indiranagar, 19th Main Rd, HAL 2nd Stage, Indiranagar, Bengaluru, Karnataka 560008 from &lt;/span&gt;&lt;span&gt;6PM - 8 PM on &lt;/span&gt;&lt;span&gt;November 17th.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech'&gt;https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-12T10:18:09Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/open-house-on-information-breaches">
    <title>Open house on information breaches</title>
    <link>https://cis-india.org/internet-governance/news/open-house-on-information-breaches</link>
    <description>
        &lt;b&gt;On May 26, 2017 at the Has Geek open house participants discussed the state of information security in India the legal and regulatory measures that companies must comply with, and consumers should be aware of. Udbhav Tiwari was a speaker at the event organized by Has Geek in Bengaluru.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sandesh Anand–InfoSec professional at Cigital was the other speaker. Alok Prasanna Kumar, former Supreme Court advocate and Senior Resident Fellow at the Vidhi Centre for Legal policy, moderated the discussion. Udbhav spoke about Breach Notifications and the legal and regulatory positions  behind it in India. His presentation from the event can be found here: &lt;a href="https://goo.gl/51GDba"&gt;https://goo.gl/51GDba&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/open-house-on-information-breaches'&gt;https://cis-india.org/internet-governance/news/open-house-on-information-breaches&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T00:41:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
