<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1011 to 1025.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/open-letter-to-kolaveri-di"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/open-letter-to-hillary-clinton"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/open-house-on-information-breaches"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/open-forum-dinl-digital-infrastructure-association"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/online-pre-censorship-harmful-impractical"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/online-or-offline-protest-goes-on"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/online-interest-in-advani-rises"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/open-letter-to-kolaveri-di">
    <title>Open letter to Kolaveri Di makers: How Dare You!</title>
    <link>https://cis-india.org/internet-governance/open-letter-to-kolaveri-di</link>
    <description>
        &lt;b&gt;When it comes to piracy, you are sure to have an opinion. You might either make a virtue out of it, talking about cultural commons and collaborative conditions of production. Or you might vilify it as the social fault-line that is destroying the very pillars of commerce and cultural negotiations.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/open-letter-to-kolaveri-di-makers-how-dare-you-317703.html#disqus_thread"&gt;This article by Nishant Shah was published in First Post on May 22, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;No matter which part of the fault-line you fall under, this is the time for all good (and otherwise ambiguously identified) people to come to the aid of the party. This is an open call for anybody who has been on the interwebz, to share and distribute one particular object whose rights protector have recently taken your right to access countless platforms which are a part of your everyday life online.&lt;/p&gt;
&lt;p&gt;If you haven’t yet grasped it, I am referring to the recent events where, following a John Doe order from the High Court of Chennai, all kinds of file sharing platforms are suddenly being blocked by Internet Service Providers (ISPs) across India.&lt;/p&gt;
&lt;p&gt;The film producers of ‘3’, the movie whose claim to fame has been the spectacular viral success of the &lt;em&gt;Kolaveri Di &lt;/em&gt;song, have moved the courts to issue a blanket order that has suddenly made it impossible for Indian netizens to access file sharing, user-generated-content hosting websites which allowed for digital cultural texts – from print to music to movies to presentations – to be shared and disseminated freely online.&lt;/p&gt;
&lt;p&gt;The producers and those who support them, are glorying in this legal battle where they have identified nodes in our networks, through which their copyright information was potentially being pirated. They are hoping that by ensuring this lack of digital mobility for their film, they will be able to entice audiences to come into the theatres and spend their money ‘legitimately’ on the film.&lt;/p&gt;
&lt;p&gt;They are revelling in the fact that hundreds of thousands of users have been thwarted in their attempts at copyright infringement. What they haven’t realised is that they have justified their box-office greed by infringing on your and my rights to perform everyday activities online.&lt;/p&gt;
&lt;p&gt;I am sure there is going to be a smart-aleck riding a moral high horse, who will applaud this move and point out to me about the rights of the producers to protect their content. There are many who support this high-censorship which not only betrays the power of the Music And Film Industry Association (MAFIA, to friends) to curb us of our rights, but also the completely depraved technology apparatus of the State which seems to have no understanding of how the internet actually works.&lt;/p&gt;
&lt;p&gt;However, i want to shift the focus from the rights of these victimised producers and right-holders to the right of the individual who is actually the structural unit of cyberspaces. And I want to suggest to you that these right-holders, who incidentally, have such global value only because the &lt;em&gt;Kolaveri Di&lt;/em&gt; song put them on the global meme map, have now infringed upon my right to access my content which I had put out to share.&lt;/p&gt;
&lt;p&gt;There are open content videos on Vimeo that we have produced through years of research and a huge amount of financial investment, which are now no longer available to people who want to view them.&lt;/p&gt;
&lt;p&gt;There are powerpoint presentations and publications on file sharing sites, seeded through torrents, which are now impossible to access for people in India. A large amount of our personal research and lectures, which we have shared for educational purposes, are now not even available for us to download.&lt;/p&gt;
&lt;p&gt;And we are not alone in this. Hundreds of thousands of individuals, who have shared openly licensed material, have now lost the ability to access that information because one private company wanted to make sure it made its profits.&lt;/p&gt;
&lt;p&gt;I am not going to write a manifesto for the digital world, but I do want to put it out there, this new cultural MAFIA, grant to me my rights which their actions have violated. For every site that they have included in their banned list, they have disrespected the open, collaborative licenses that enabled sharing of information whose value, usage and worth is more than their commercial pot boiler, which shall hopefully be forgotten before we realise it was released in the markets.&lt;/p&gt;
&lt;p&gt;Their commercially driven arrogance has suddenly demanded that we pay a price for the shared information, and that price should be to those who hold rights over the movie.&lt;/p&gt;
&lt;p&gt;And so I am writing this open call, for you to come and demand your right. If that movie producer has the right to protect his interests, you and I have the right to protect ours. I demand that for every site that I am not able to access, for public domain information that I am entitled to, they pay us a penalty.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/open-letter-to-kolaveri-di'&gt;https://cis-india.org/internet-governance/open-letter-to-kolaveri-di&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-05-23T07:02:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/open-letter-to-hillary-clinton">
    <title>Open letter to Hillary Clinton on Internet Freedom</title>
    <link>https://cis-india.org/internet-governance/open-letter-to-hillary-clinton</link>
    <description>
        &lt;b&gt;Last month I wrote an open letter to Hillary Clinton. It was based on a presentation I that I made during a panel discussion at a Google sponsored conference titled Internet at Liberty 2012 in Washington DC on May 24, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham's article was &lt;a class="external-link" href="http://thinkingaloud.in/ArticleComments.aspx?ArtId=1097"&gt;published&lt;/a&gt; in Thinking Aloud on July 17, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The question that my panel tried to grapple with was "In a world where nearly nine out of ten Internet users are not American, what is the responsibility of United States institutions in promoting internet freedom?" My co-panelists were Cynthia Wong who is with the Centre for Democracy and Technology, Mohamed El Dahshan a writer and journalist, Dunja Mijatovic the OSCE Representative on Freedom of the Media.&lt;br /&gt;&lt;br /&gt;Internet freedom is a curious subject. It is a technology specific liberty - for a moment consider television freedom. The US has more Muslims than India has Christians. But Indian television in the average hotel comes in hundreds and there are at least 3 channels of Christian preaching. But US television in hotels is usually less than 50 channels with no channels of Islamic preaching. In fact even the reception of secular channels from the Islamic World like Al Jazeera is still difficult in America. Can we accuse the US of not having television freedom since their television features Christian evangelists but not Muslim evangelists? Should it be part of India's foreign policy to evangelize television freedom given that there is a large domestic industry with clear international potential?&lt;br /&gt;&lt;br /&gt;In an ideal world - citizens will possess technology-neutral freedom to communication and expression. But nothing can be farther from the truth. Communication technologies are regulated using a plethora of policies and practices and very often these have a chilling effect on freedoms.&lt;br /&gt;&lt;br /&gt;The following is my response to the technology-specific demands for deregulation from the US Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Text of the Open Letter[2]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise Access to Knowledge (A2K) as pre-condition for freedom of expression&lt;/b&gt;: There is no difference between aggressive enforcement of imbalanced and obsolete intellectual property laws and censorship. The need of the moment is not more enforcement to protect obsolete business models against the everyday practices of ordinary netizens but rather the reform of intellectual property law (levies, broader exceptions and limitations, pools, statutory and compulsory licenses, prizes etc.) to keep pace with innovations in technology and the production of knowledge and culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise privacy as pre-condition for security:&lt;/b&gt; The alleged tension between privacy and security is a false dichotomy. Blanket surveillance by design compromises security. &lt;b&gt;Surveillance is like salt in cooking — essential in very small quantities but dangerous even if slightly in excess. Blanket surveillance technologies are only going make things easier for — and will only serve as targets for — current and future online villains.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Don't lose the moral high-ground:&lt;/b&gt; Remember, with great power comes great responsibility. Other countries are waiting to cherry pick from your worst practices. Also don't use trade agreements to selectively export components of US policy without the accompanying safeguards for civil liberties and rights. Citizens in oppressive and authoritarian states are depending on the US government, courts and civil society to protect their rights online. Don't undermine their capacity to shame their governments by holding up the US as the example of 'how to get things right'. They urgently need the US government to lead by example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise that freedom of expression has become a trade issue:&lt;/b&gt; This is unfortunate but this is true — thanks to the precedent set by the developed world when it came to asymmetric trade negotiations. Just as the US is interested in protecting the interests of its corporations in global markets — other governments are keen protect the interests of their own corporations. The optimal solution in this case is where all countries and corporations are equally unsatisfied. This will remain a continuing discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Address developing country anxieties around critical internet infrastructure:&lt;/b&gt; Security by obscurity will no longer do — security by transparency through open standards, technologies and governance is the only way to fears and build a trust-worthy and secure Internet for all of us. For example, there is urgent need to develop standards for supply chain audits of information infrastructure. The US has dealt with the fear of back doors by banning the use of hardware and software from countries it does not trust. The developing world is not sure if there are back-doors in hardware and software manufactured by US corporations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Time has comes to address this and other related anxieties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Appreciate diversity in nomenclature:&lt;/b&gt; 'Freedom' and 'liberty' may be appropriate terms to use in the United States of America. But openness may be more in countries that are not yet full and robust liberal democracies. The Internet Governance Forum for example uses 'openness' instead of 'freedom'. Openness is also preferred because it includes 'freedom of expression', 'freedom of information' (also known as right to information, access to information or public and 'free knowledge' (free software, open standards, open content, open access, open data, open educational resources, etc.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Don't be too instrumental in your interventions:&lt;/b&gt; Don't undermine the local credibility of like-minded civil society, think-tanks and research organisations by being too directive in your support. Managerialism will undermine reform of policies and practices in information societies and so does inappropriate/premature monitoring and evaluation (for example, looking for explicit attribution in terms of casual connections between your actions and outcomes). There is a need to support greater reflexivity in the global information society by developing institutional capacity in developing countries through unrestricted funding. True critical thinking is the foundation of both scientific progress and open societies. Go out of your way to find and support those who disagree with you. Protect the plural foundation of our networked society!&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham was a speaker along with Cynthia Wong, Mohamed El Dahshan and Dunja Mijatovic in Plenary IV Debate 3 at the &lt;b&gt;Internet at Liberty 2012 &lt;/b&gt;event&lt;b&gt; &lt;/b&gt;organised by Google on May 24, 2012. &lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/9YMte4hdYu0" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.youtube.com/watch?v=9YMte4hdYu0"&gt;View the video on YouTube&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/open-letter-to-hillary-clinton'&gt;https://cis-india.org/internet-governance/open-letter-to-hillary-clinton&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-09-04T08:28:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation">
    <title>Open Letter to "Not" Recognize India as Data Secure Nation till Enactment of Privacy Legislation</title>
    <link>https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation</link>
    <description>
        &lt;b&gt;India shouldn't be granted the status of "data secure nation" by Europe until it enacts a suitable privacy legislation, points out the Centre for Internet and Society in this open letter.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This letter is with regards to both the request from the Confederation of Indian Industry that the EU recognize India as a data secure nation made on April 29th 2013, &lt;a href="https://cis-india.org/accessibility/blog/#fn1" name="fr1"&gt;[1]&lt;/a&gt; and the threat from India to stall  negotiations on the Free Trade Agreement with the EU unless recognized  as data secure nation made on May 9th 2013.&lt;a href="https://cis-india.org/accessibility/blog/#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On behalf of the Centre for Internet and Society, we request that you  urge the European Parliament and the EU ambassador to India to reject  the request, and to not recognize India as a data secure nation until a  privacy legislation has been enacted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society believes that if Europe were to  grant India status as a data secure nation based only on the protections  found in the “Information Technology (Reasonable Security Practices and  Procedures and Sensitive Personal Data or Information) Rules 2011”, not  only will India be protected through inadequate standards, but the government will not have an incentive to enact a legislation that  recognizes privacy as a comprehensive and fundamental human right. Since 2010 India has been in the process of realizing a privacy  legislation.  In 2011 the “Draft Privacy Bill 2011” was leaked.&lt;a href="https://cis-india.org/accessibility/blog/#fn3" name="fr3"&gt;[3]&lt;/a&gt; In   2012 the “Report of the Group of Experts on Privacy” was released. The  Report recommends a comprehensive right to privacy for India, nine  national privacy principles, and a privacy framework of co-regulation  for India to adopt. &lt;a href="https://cis-india.org/accessibility/blog/#fn4" name="fr4"&gt;[4]&lt;/a&gt; In 2013 the need for a stand alone privacy  legislation was highlighted by the Law Minister.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; The Centre for Internet and Society has recently drafted the “Privacy  Protection Bill 2013” - a citizen's version of a possible privacy  legislation for India.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Currently, we are hosting a series of six  “Privacy Roundtables” across India in collaboration with FICCI and DSCI  from April 2013 - August 2013.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; The purpose of the roundtables is to  gain public feedback to the text of the “Privacy Protection Bill 2013”,  and other possible frameworks for privacy in India. The discussions and  recommendations from the meeting will be published into a compilation  and presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Center for Internet and Society will also be submitting the  “Privacy Protection Bill 2013” and the public feedback to the Department  of Personnel and Training (DoPT) with the hope of contributing to and  informing a privacy legislation in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been researching privacy since  2010 and was a member of the committee which compiled the “Report of the  Group of Experts on Privacy”. We have also submitted comments on the  “Information Technology (Reasonable Security Practices and Procedures  and Sensitive Personal Data or Information) Rules 2011” to the Committee  on Subordinate Legislation  of the 15th Lok Sabha.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We hope that you will consider our request and urge the European  Parliament and the EU ambassador to India to not recognize India as a  data secure nation until a privacy legislation has been enacted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. CII asks EU to accept India as 'Data Secure' nation: &lt;a class="external-link" href="http://bit.ly/15Z77dH"&gt;http://bit.ly/15Z77dH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. India threatens to stall trade talks with EU: &lt;a class="external-link" href="http://bit.ly/1716aF1"&gt;http://bit.ly/1716aF1&lt;/a&gt;&lt;a class="moz-txt-link-freetext" href="http://www.business-standard.com/article/economy-policy/india-threatens-to-stall-trade-talks-with-eu-113050900020_1.html"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. New privacy Bill: Data Protection Authority, jail term for  offence: &lt;a class="external-link" href="http://bit.ly/emqkkH"&gt;http://bit.ly/emqkkH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The Report of the Group of Experts on Privacy &lt;a class="external-link" href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Law Minister Seeks stand along privacy legislation, writes PM: &lt;a class="external-link" href="http://bit.ly/16hewWs"&gt;http://bit.ly/16hewWs&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. The Privacy Protection Bill 2013 drafted by CIS: &lt;a class="external-link" href="http://bit.ly/10eum5d"&gt;http://bit.ly/10eum5d&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Privacy Roundtable: &lt;a class="external-link" href="http://bit.ly/12HYoj5"&gt;http://bit.ly/12HYoj5&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data Information) Rules, 2011: &lt;a class="external-link" href="http://bit.ly/Z2FjX6"&gt;http://bit.ly/Z2FjX6&lt;/a&gt;&lt;/p&gt;
&lt;div id="_mcePaste"&gt;﻿&lt;b&gt;Note: CIS sent the letters to Data Protection Commissioners across Europe.&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation'&gt;https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:07:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech">
    <title>Open House on Security Practices in FinTech </title>
    <link>https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech</link>
    <description>
        &lt;b&gt;CIS in collaboration with Has Geek is organizing an Open House on security practices in FinTech.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The prevalence of fintech companies operating in India is growing with new actors entering the sector and traditional actors such as banks beginning to offer digital financial services. The push to digital payments has been particularly strong after the demonetization policy, the development and implementation of Aadhaar and India Stack. Services offered by Fintech firms can range from offering a loan or credit to a digital wallet and digital banking and payment services. &lt;br /&gt;&lt;br /&gt;Presently, there is a regulatory gap for many of the fintech services and business models. The Reserve Bank of India has published consultation papers on Peer-to-Peer lending platforms as well as Account Aggregators, but comprehensive regulations, especially those surrounding minimum security practices, have yet to emerge – presenting a critical policy and research window. Furthermore, under Section 43A of the IT Act and its associated Rules, ‘body corporates’ are required to implement reasonably security procedures compliant with ISO27001 or a sectoral standard approved by the Central Government. However, currently such a sectoral standard is absent for the FinTech and Digital Payments space. &lt;br /&gt;&lt;br /&gt;The growing prevalence of these fintech technologies and the criticality of security of the same to engender citizen trust, protect rights, and comprehensive national security posture demands debate and discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On November 17th, the HasGeek in collaboration with the Centre for Internet and Society will be holding an Open House from 6pm - 8pm to discuss security practices in the fintech industry.&lt;/p&gt;
&lt;p dir="ltr" id="docs-internal-guid-4d88330a-afbb-67f0-a4de-5b60a3db94bc" style="text-align: justify; "&gt;&lt;span&gt;Pressing questions for discussion include: How secure are these services? What security standards are they adhering to? Who is holding them accountable for adherence to security standards? What can individuals do if there financial data is compromised? &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Please join us for a robust discussion on these issues @HasGeek House&lt;/span&gt;&lt;span&gt;, 2699, 19th Main Rd, HAL 2nd Stage, Indiranagar, 19th Main Rd, HAL 2nd Stage, Indiranagar, Bengaluru, Karnataka 560008 from &lt;/span&gt;&lt;span&gt;6PM - 8 PM on &lt;/span&gt;&lt;span&gt;November 17th.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech'&gt;https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-12T10:18:09Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/open-house-on-information-breaches">
    <title>Open house on information breaches</title>
    <link>https://cis-india.org/internet-governance/news/open-house-on-information-breaches</link>
    <description>
        &lt;b&gt;On May 26, 2017 at the Has Geek open house participants discussed the state of information security in India the legal and regulatory measures that companies must comply with, and consumers should be aware of. Udbhav Tiwari was a speaker at the event organized by Has Geek in Bengaluru.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sandesh Anand–InfoSec professional at Cigital was the other speaker. Alok Prasanna Kumar, former Supreme Court advocate and Senior Resident Fellow at the Vidhi Centre for Legal policy, moderated the discussion. Udbhav spoke about Breach Notifications and the legal and regulatory positions  behind it in India. His presentation from the event can be found here: &lt;a href="https://goo.gl/51GDba"&gt;https://goo.gl/51GDba&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/open-house-on-information-breaches'&gt;https://cis-india.org/internet-governance/news/open-house-on-information-breaches&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T00:41:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar">
    <title>Open Governance and Privacy in a Post-Snowden World : Webinar</title>
    <link>https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar</link>
    <description>
        &lt;b&gt;On 10th September 2015, the OGP Support Unit, the Open Government Guide, and the World Bank held a webinar on “Open Governance and Privacy in a Post-Snowden World” presented by Carly Nyst, Independent consultant and former Legal Director of Privacy International and Javier Ruiz, Policy Director of Open Rights Group. This is a summary of the key issues that were discussed by the speakers and the participants.&lt;/b&gt;
        &lt;p&gt;See &lt;a href="https://events-na4.adobeconnect.com/content/connect/c1/833642795/en/events/event/private/877773861/1209689848/event_landing.html?sco-id=1253823513"&gt;Open Governance and Privacy in a Post-Snowden World&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Summary&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The webinar discussed how Government surveillance has become an important and key issue in the 21&lt;sup&gt;st&lt;/sup&gt; century, thanks to Edward Snowden. The main concern raised was with respect to what a democracy should look like in the present day. Should the states’ use of technology enable state surveillance or an open government? Typically, there is a balance that must be achieved between the privacy of an individual and the security of the state – particularly as the former is primarily about social rights and collective interest of citizens.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;At the international level, the right to privacy has been recognized as a basic human right and an enabler of other individual freedoms. This right encapsulates protection of personal data where citizens have the authority to choose whether to share or reveal their personal data or not. Due to technological advancement that has enabled collection, storage and sharing of personal data, the right to privacy and data protection frameworks have become of utmost importance and relevance with regard to open government efforts. Therefore, it is important for Governments to be transparent in handling sensitive data that they collect and use.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Many countries have also introduced laws to balance the right to privacy and right to information.  The role of the private sector and NGOs involved in enabling an open and transparent government must also be duly addressed at a national level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Key Questions:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why should the government release information?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;There are multiple reasons for doing so including:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the purposes of research and public policy (which relates to healthcare, social issues, economics, national statistics, census, etc.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Transparency and accountability (politicians, registers, public expenses, subsidies, fraud, court records, education)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Public participation and public services (budgets, anti-corruption, engagement, and e-governance).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, all these have certain risks and privacy implications:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Risk of identification of individual: Any individual whose information is released has the risk of identification, followed by issues like identity theft, discrimination, stigmatization or repression. Normally, the solution for this would be anonymization of the data; however, this is not an absolute solution. Privacy laws can generally cope with such risks, but with pseudonymous data it becomes difficult in preventing identification.&lt;/li&gt;
&lt;li&gt;Profiling of social categories which can lead to discrimination: In such a situation, policies and other legislations regulating the use of data and providing remedy for violations can help.&lt;/li&gt;
&lt;li&gt;Exploitation and unfair/unethical use of information: When understanding the potential exploitation of information it is useful to consider who is going to benefit from the release of information.  For example, in UK, with respect to release of Health Data, the main concern is that people and companies will benefit commercially from the information released, despite of the result potentially being improved drugs and treatment. &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;What are the Solutions?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The webinar also discussed potential solutions to the questions and challenges posed. For example, when &lt;a href="http://www.opengovguide.com/"&gt;commitments of Open Government Data Partnership&lt;/a&gt; are considered, privacy legislations must also be proposed. Further, key stakeholders must make commitments to take pro-active measures to reduce informational asymmetries between the state and citizens.  To reduce the risks, measures must be taken to publish what information the State has or what the Government knows about the citizens. For example, in UK, within the civil society network, it is being duly considered in the national plan that the government will publicize how it will share data and have a centralized view on the process of information handling and usage of the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Open Government Guide provides for Illustrative Commitments like enactment of data protection legislation, establishing programmes for awareness and assessment of their impact, giving citizens control of their personal information and the right to redress when that information is misused, etc. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue of surveillance and the role of privacy in an open government context was also discussed.  The need for creating a balance between the legitimate interest of national security and the privacy of individuals was emphasized. With the rise of digital technologies, many governmental measures pertaining to surveillance intervene in individual privacy. There are many forms of surveillance and this has serious privacy implications, especially in developing countries. For example:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Communications surveillance &lt;/li&gt;
&lt;li&gt;Visual surveillance &lt;/li&gt;
&lt;li&gt;Travel surveillance &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This raises the question: When is surveillance legitimate and when must it be allowed?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://en.necessaryandproportionate.org/"&gt;The International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt; acts as a soft law and tries to set out what a good surveillance system looks like by ensuring that governments are in compliance with international human rights law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In essence surveillance does not violate privacy, however, there must be a clear and foreseeable legal framework laying circumstances when the government has the power to collect data and when individuals might be able to foresee when they might be under surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, a competent judicial authority must be established to oversee surveillance and keep a check on executive power by placing restrictions on privacy invasions. The actions of the government must be proportionate and the benefits must not outweigh harm caused by surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Role of openness in a “mass surveillance” state &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance measures that are being undertaken by governments are increasingly secretive. The European court of Human Rights has held that Secret surveillance may undermine democracy under the cloak of protecting it. Hence, open government and openness will work towards protecting privacy and not undermining it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To balance the measure of government surveillance with privacy, there is a need to publish laws regulating such powers; publish transparency reports about surveillance, interception and access to communications data; reform legislations relating to surveillance by state agencies to ensure it complies with human rights and establish safeguards to ensure that new technologies used for surveillance and interception respect the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conclusion one can draw is that Privacy concerns have gained importance in today’s data driven world. The main question that needs to be answered is whether Government’s should adopt surveillance measures or adopt an Open Government?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering equal importance of national security and privacy of individuals, it is required that a balance must be crafted between the two. This could be possibly done by enacting foreseeable and clear laws outlining scope of surveillance by the Government on one hand, and informing citizens about such measures on the other. Establishment of a competent judicial authority to keep a check on Government actions is also suggested to work out the delicate balance between surveillance and privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar'&gt;https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-04T11:09:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/open-forum-dinl-digital-infrastructure-association">
    <title> Open Forum - DINL, Digital Infrastructure Association</title>
    <link>https://cis-india.org/internet-governance/news/open-forum-dinl-digital-infrastructure-association</link>
    <description>
        &lt;b&gt;Internet Governance Forum (IGF) 2015 will be held at Jao Pessoa in Brazil from November 10 to 13, 2015. The theme of IGF 2015 is Evolution of Internet Governance: Empowering Sustainable Development.  Digital Infrastructure Netherlands Foundation is organizing this workshop at IGF on Tuesday, November 10, 2015. Jyoti Panday will be speaking at this workshop.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In this open forum we wish to discuss the increase in  government engagement with “the internet” to protect their citizens  against crime and abuse and to protect economic interests and critical  infrastructures. The fact that the traditional benign neglect of states  towards the internet is increasingly replaced with political interest  has positive and negative effects. We are particularly concerned with  those state interventions – often for reasons of national security or  economic interest - that impact on the technical and logical ‘core’ of  the internet ecosystem – such as interventions in the DNS - and in the  impact on organizations and businesses that are traditionally thought of  as ‘technical’ and whose roles are in danger of being politicized, such  as ISPs, CERTs and hard- and software developers. There is a growing  need to separate out the legitimate interests of states from political  overreach into the technical and logical core of the internet. A  cooperative or constructive approach towards interaction, founded in  firm principles, may strengthen the balance and lead to a sustainable  protection of Internet values. In this open forum we will present ideas  about an agenda for the international protection of ‘the public core of  the internet’ and seek to collect and discuss ideas for the formulation  of norms and principles and for the identification of practical steps  towards that goal. More specifically we aim to discuss: A definition of a  public core of the internet: this would comprise the core protocols and  infrastructure of the internet which all governments should consider as  a global public good, governed by the Internet community and protected  from direct activities and involvement by any government Definitions of  proper interfaces: outlining norms and mutual expectations that should  govern the relations between governments and various central actors in  the technical and economic internet ecosystem, such as ISPs, CERTs and  hard- and software developers when it comes to fighting cybercrime,  retrieve information, mandate takedowns, request information and more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Speakers &lt;/b&gt;&lt;br /&gt;In this IGF open forum DINL wants to  explore these ideas and discuss them with thought leaders from other  countries. Speakers include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bastiaan Goslings (AMS-IX, NL)&lt;/li&gt;
&lt;li&gt;Jyoti Panday (CIS, India)&lt;/li&gt;
&lt;li&gt;Marilia Maciel (FGV, Brasil)&lt;/li&gt;
&lt;li&gt;Dennis Broeders (NL Scientific Council for Government Policy) and will be chaired by Michiel Steltman (DINL), but aims to broaden the debate on this issue with those present.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;More information on &lt;a class="external-link" href="https://igf2015.sched.org/event/dd32b296391440863b925afb04d7b103"&gt;IGF website here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/open-forum-dinl-digital-infrastructure-association'&gt;https://cis-india.org/internet-governance/news/open-forum-dinl-digital-infrastructure-association&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-07T14:45:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments">
    <title>Open Call for Comments: The Privacy Protection Bill 2013 drafted by the Centre for Internet and Society</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is announcing an Open Call for Comments to the CIS Privacy Protection Bill 2013.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In early 2013 the Centre for Internet and Society drafted the Privacy (Protection) Bill 2013 as a citizen’s version of privacy legislation for India. The Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been collecting comments to the Privacy Protection Bill since April 2013 with the intention of submitting the Bill to the Department of Personnel and Training as a citizen’s version of a privacy legislation for India.  If you would like to submit comments on the Privacy Protection Bill to be included as part of the Centre for Internet and Society’s submission to the Department of Personnel and Training, please email comments to &lt;a href="mailto:bhairav@cis-india.org"&gt;bhairav@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf" class="internal-link"&gt;Download the latest version of the Privacy Protection Bill&lt;/a&gt;&lt;/b&gt; (February 2014)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-25T05:38:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please">
    <title>Only digital sex, please</title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please</link>
    <description>
        &lt;b&gt;Many Indian men are getting so dependent on digital sex and online pornography that they can’t handle real relationships. And a new book says this is happening the world over. Prasun Chandhuri and Avijit Chatterjee turn the spotlight on the trend&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.telegraphindia.com/1150531/jsp/7days/story_23033.jsp"&gt;published in the Telegraph&lt;/a&gt; on May 31. Rohini is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;P. Sharath doesn't know how to handle women. The 31-year-old software  engineer, who works for a multinational company in Bangalore, thinks he  doesn't need them either. The man who grew up in Hubli in Karnataka and  now earns an eight-figure annual salary has his virtual world. That  gives him his sexual satisfaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Socially awkward, Sharath did try to date a woman, but the  relationship broke within a few months because he found that she was  getting to be "clingy" and "boring". An attempt by his family to fix a  marriage with a woman failed when he groped her in a cinema hall. His  online women, on the other hand, need no pampering, and do not complain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sharath, however, is not happy. "He no longer gets any gratification  from online sex and has been suffering from anxiety and depression,"  says Dr Ali Khwaja, a Bangalore-based psychologist and founder of the  Banjara Academy, a counselling centre.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Increasingly, counsellors in urban India are coming across such cases  of people who are so used to digital sex that they can't cope with real  relationships any more. Khwaja refers to them as "hollow men" - people  who go through despair after relations fail because of their dependence  on digital pornography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Almost every week I meet a young man addicted to porn," says  Mumbai-based counsellor Shefali Batra, author of the recently published  book &lt;i&gt;Teen Matters&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It's a pattern that many counsellors have noticed. As teenagers,  young boys get hooked on to digital sex. "But it becomes a vicious  addiction over time, playing havoc with their social and sexual  development," Batra says. The women they meet do not match up to the  large breasted and oversexed digital women - and the boys become men who  cannot sustain marriages and relationships.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pornography has always existed, and some counsellors do not believe  that it is always harmful. But the spread of the Internet, the easy  availability of smartphones and the profusion of sophisticated sex games  and other platforms have led to a situation where men merely log on for  sexual satisfaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet is bursting at the seams with sex sites. There are  various types of sex games, including cartoon sex games, 3D sex games,  virtual reality sex games and so on where the viewer can indulge in sex  with three or four imaginary characters. Some online games offer virtual  simulation sex. In a new genre of digital porn, users can enjoy 3D porn  with a special virtual reality headset that allows them to step inside  their favourite games and completely immerse themselves in a sexual  fantasy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And this is happening across the world. In a recently released book, &lt;i&gt;Men (Dis)Connected: How technology has sabotaged what it means to be male&lt;/i&gt;, psychologist Philip Zimbardo holds that "masculinity" is being destroyed by online pornography and gaming technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We have surveyed over 20,000 young people in many countries. Even  though we don't have data on Indian men, we assume that the impact of  freely available porn is creating a new breed of addicts in every  country," he says in an email interview. "These men prefer to masturbate  to visual images than have live sexual relations with real women."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikita Coulombe, co-author of &lt;i&gt;Men (Dis)Connected&lt;/i&gt;, adds that  it is an "endless novelty" and a "virtual harem" for the men. "In 10  minutes you can see more 'mates' than your ancestors would have seen in  their lifetime."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was a time when people shrugged and said, it's just a phase.  But Zimbardo believes that this addiction has gone beyond that and will  have a "permanent negative impact" on young men everywhere because the  porn industry is big business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The professor emeritus at Stanford discovered this phenomenon when he  found that many of his male students were shy and spent too much time  poring over screens. Closer home, academic and writer Shiv Visvanathan  had a similar experience while teaching at the O.P. Jindal University in  Haryana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Many of these guys do not know how to talk to a girl - they'd rather  convey their feelings through text messages or through social networks  or mobile phones. Sometimes you'll even see two people sitting close  together but talking over the phone, just to avoid a face-to-face  conversation," Visvanathan says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What this means is that young men are not just wary of getting into  relationships - they are not missing them either. "Porn gives them  instant gratification which can be repeated, say, 200 times. Moreover,  the virtual body seems more transformable than the actual body and it's  fast," Visvanathan points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is an addiction that draws men more than women, primarily because  the majority of Internet porn is male-centric and, more than teenage  women, boys are addicted to computer games and associated thrills.  "Research has affirmed that this is truer for the male brain in  comparison to the female brain," explains Batra. "The male brain is more  thrill and pleasure seeking and these exciting virtual realities  provide an immense rush of pleasure in the brain."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zimbardo's survey underlines this. It found that three out of five  men expressed a "lack of interest in pursuing and maintaining a romantic  relationship" while three out of four women between the ages of 18 and  30 said they were concerned about the "emotional immaturity or the  unavailability" of men.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the celebrated psychologist plans to conduct a similar survey  in India, concerns are already rising because the lack of sex education  in schools and colleges - coupled with repressed backgrounds and  exaggerated pornographic images - gives the young a warped idea of sex  and relationships.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"In a society where talking about sex is taboo, their only avenue to  satisfy sexual curiosities becomes porn," says Rohini Lakshane,  researcher, Centre for Internet and Society, Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is why sexologist Prakash Kothari often encounters young men who  yearn for a "14-inch organ" and suffer from performance anxiety and  depression. "Proper sex education can teach them just two inches and  oodles of erotic love are enough to satisfy your female partner," says  Kothari.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The experts stress that they are not against pornography. "One should  not shoot the messenger," contends Audrey D'Mello, programme director,  Majlis, a legal counselling centre in Mumbai. "If used properly it can  be an aphrodisiac," Kothari adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But many of the images that the young today see are violent and  bestial. "These twisted forms of sex are being consumed by young men and  boys through smartphones across the country," laments Ira Trivedi,  author of &lt;i&gt;India in Love&lt;/i&gt;. Lakshane believes that easy access to  violent pornography "degrades and objectifies women", giving men and  boys a "skewed view of sex and intimacy".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Calcutta-based Subhrangshu Aditya counselled a woman who wanted a  divorce because her husband forced her to replicate all that he watched  on porn. "It was torture for her, devoid of romantic love or eroticism,"  Aditya says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, the effect on men has an impact on women as well. Trivedi  points out that as men devote themselves to porn, women go for measures  such as vaginal beautification to attract men.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Or women go off sex altogether.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These women have an extreme phobia about sex," says Aindri Sanyal,  an infertility specialist at a Calcutta-based fertility centre. "Some  haven't even got their marriage consummated. So they want to conceive  through artificial insemination."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is there a way out? Experts such as Khwaja are doing what they can.  "I am trying to help Sharath socialise in mixed groups, then spend a few  minutes at a time doing a favour for a woman, or showing a gesture. I  want him to focus on understanding the emotions that girls go through  and eventually make him understand how to interact with another  flesh-and-blood person who has her own romantic and sexual needs," he  says. "The process will take quite a long time."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zimbardo, 82, wants the "socially crippled generation" to hit the  Escape button on their digital devices. He wants to remind them that  real sex involves communicating with a real person, feeling their pain,  earning their trust and making a real connection to their heart. Like  people did, once upon a time.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;If it’s May, it’s got to be India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Some porn stats&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;In 2014, India ranked among the highest consumers of pornographic content in the world, according to Pornhub, an online video hub&lt;/li&gt;
&lt;li&gt;Around 25 per cent of Indian visitors on Pornhub.com were women, 2 per cent higher than the worldwide average of 23 per cent&lt;/li&gt;
&lt;li&gt;Indians seek out pornography most in May and least in October&lt;/li&gt;
&lt;li&gt;More Indians surf porn on their smartphones than on desktops&lt;/li&gt;
&lt;li&gt;On an average, Indians spend 8 minutes and 22 seconds per visit to Pornhub, 30 seconds less than the rest of the world&lt;/li&gt;
&lt;li&gt;Of all states, people from Andhra Pradesh spend the least time on Pornhub — 6 min and 40 sec; people from West Bengal spend 9 min and 5 sec; people from Assam spend 9 min and 55 sec&lt;/li&gt;
&lt;li&gt;Sunny Leone is India’s favourite porn star&lt;/li&gt;
&lt;li&gt;In most places in the world, porn is viewed most on Monday, but in India, it’s on Saturday&lt;/li&gt;
&lt;li&gt;Porn viewing in India dips by over 25 per cent on Diwali, Dussehra, New Year’s Eve and Gandhi Jayanti.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please'&gt;https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-15T01:38:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system">
    <title>Online Trolls Attack Critics of India's Aadhaar State ID System </title>
    <link>https://cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system</link>
    <description>
        &lt;b&gt;India's biometric state ID system has been leaking citizens’ data for months. When this information surfaced in April 2017, it stoked fears that the system could be used as an instrument of surveillance against Indian residents.&lt;/b&gt;
        &lt;p&gt;The blog post by Rohith Jyothish was &lt;a class="external-link" href="https://advox.globalvoices.org/2017/05/31/online-trolls-attack-critics-of-indias-aadhaar-state-id-system/"&gt;published by Global Voices&lt;/a&gt; on May 31, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://uidai.gov.in/about-uidai/about-uidai.html"&gt;Unique Identity Authority of India (UIDAI)&lt;/a&gt;, which administrates the system known as &lt;a href="https://en.wikipedia.org/wiki/Aadhaar"&gt;Aadhaar&lt;/a&gt; (meaning foundation in Hindi) &lt;a href="http://indianexpress.com/article/opinion/columns/criticism-without-aadhaar-4653369/v"&gt;maintains&lt;/a&gt; that it only collects minimal personal data and stores it securely. But critics have firmly expressed &lt;a href="https://advox.globalvoices.org/2017/05/05/is-indias-aadhaar-system-an-instrument-for-surveillance/"&gt;doubts&lt;/a&gt; about these claims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The implications of these leaks, and of any system flaw in Aadhaar  technology, are substantial, especially for Indians who depend on the  Aadhaar system in order to authenticate their identities when they use  any number of government services. The Aadhaar system has become the &lt;a href="https://globalvoices.org/2017/05/02/the-worlds-largest-biometric-database-is-leaking-indian-citizens-data-but-keeps-on-growing/"&gt;gatekeeper of state systems&lt;/a&gt; and services ranging from voting to financial savings to food subsidies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The digital sphere is now starting to see a pushback against Aadhaar  critics through articles and blogposts that describe concerned citizens  and privacy experts as the ‘&lt;a href="https://yourstory.com/2017/05/5-questions-for-the-anti-aadhaar-brigade/"&gt;anti-Aadhaar brigade&lt;/a&gt;‘ and &lt;a href="https://yourstory.com/2017/05/aadhaar-debate-5-more-questions-for-critics/"&gt;accuse them&lt;/a&gt; of publishing “half-truths” and “spread[ing] confusion to advance their own interests.” One such &lt;a href="https://uidai.gov.in/images/news/5_questions_for_the_anti_Aadhaar_brigade_08052017.pdf"&gt;article&lt;/a&gt; was even featured on the UIDAI website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the most &lt;a href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;well-researched critiques&lt;/a&gt; of the system have come from the &lt;a href="http://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; (CIS), an inter-disciplinary research organisation in Bangalore that  has now become a target of the pro-Aadhaar lobby. Shortly after CIS  released a report that pointed out security flaws in the Aadhaar  ecosystem, the UIDAI &lt;a href="http://timesofindia.indiatimes.com/india/provide-hacker-details-outfit-that-claimed-data-leak-told/articleshow/58725132.cms"&gt;accused&lt;/a&gt; the organization of hacking into the Aadhaar system themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, CIS had investigated databases of four specific government websites. Three were available publicly, the fourth one was &lt;a href="https://thewire.in/131698/before-aadhaar-pan-card-verdict-debate-over-bodily-autonomy-and-living-a-dignified-life/"&gt;accessible&lt;/a&gt; by simply changing one of the URL parameters. Following the accusation from UIDAI, CIS &lt;a href="http://tech.firstpost.com/news-analysis/uidais-questioning-of-cis-over-aadhaar-leaks-brings-the-sanctity-of-investigative-activities-into-question-377244.html"&gt;clarified&lt;/a&gt; that  the Aadhaar numbers along with other sensitive personal financial  information like bank account details were made available by government  websites themselves, putting a sizeable portion of Indian citizens at  risk of financial fraud.&lt;/p&gt;
&lt;p&gt;The &lt;a href="https://en.wikipedia.org/wiki/Press_Trust_of_India"&gt;Press Trust of India&lt;/a&gt; (India's largest news agency) &lt;a href="http://www.thehindubusinessline.com/news/national/unique-identification-authority-of-india-puts-posers-to-centre-for-internet-and-society-over-aadhaar-data-leak-claim/article9707647.ece"&gt;referred&lt;/a&gt; to it as a “flip-flop”, which was contested by researchers at CIS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Independent technology news platform Medianama &lt;a href="http://www.medianama.com/2017/05/223-uidai-cis-india-aadhaar/"&gt;reported&lt;/a&gt; that the accusation by the UIDAI is regrettably consistent with  previous actions in which they filed a case against a journalist for&lt;a href="http://www.medianama.com/2017/03/223-uidai-fir-aadhaar/" rel="bookmark" title="UIDAI files FIR against journalist for exposing flaws in Aadhaar enrolment"&gt; exposing flaws&lt;/a&gt; in Aadhaar's enrollment mechanism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A website called ‘&lt;a href="http://supportaadhaar.com/"&gt;Support Aadhaar&lt;/a&gt;‘ and its &lt;a href="https://twitter.com/SupportAadhaar"&gt;Twitter handle&lt;/a&gt; sought to collate opinions supporting Aadhaar and quell those speaking against it. However, most of their &lt;a href="http://supportaadhaar.com/facts-myths/"&gt;messages&lt;/a&gt; appear  to evade or deflect the concerns that critics have raised by touting  the benefits of the system and portraying critics as having a poor  understanding of the benefits of technology.&lt;/p&gt;
&lt;p&gt;Many Twitter users have also begun noticing patterns in the pro-Aadhaar posts:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, several critics of Aadhaar have repeatedly been trolled by anonymous handles on Twitter. These ‘sock puppet’ accounts seemed to be targeting those who criticise Aadhaar on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the most active trolls issued an open challenge to reveal their identity with just their Aadhaar number. Technology entrepreneur Kiran Jonnalagadda accepted the challenge and &lt;a href="https://medium.com/@jackerhack/inside-the-mind-of-indias-chief-tech-stack-evangelist-ca01e7a507a9"&gt;found that&lt;/a&gt; ‘@Confident_India’, one of the many anonymous troll Twitter handles, is Sharad Sharma, the co-founder and director of &lt;a href="http://ispirt.in/"&gt;iSPIRT Foundation&lt;/a&gt; (Indian Software Product Industry Roundtable), the software lobby that built the backbone of the Aadhaar ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sharma accidentally tweeted a denial from the troll account which has  since been deleted. He then tweeted again from his personal handle which  was captured.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iSPIRT &lt;a href="https://medium.com/@mtrajan/ispirt-response-to-kiran-jonnalagadda-3f977fb91df4"&gt;officially denied&lt;/a&gt; allegations  by Jonnalgadda that the “evidence presented is a deliberate misreading  of our intent to engage with those speaking against &lt;a href="https://en.wikipedia.org/wiki/India_Stack"&gt;India Stack&lt;/a&gt;.” India Stack is the digital infrastructure that has been built over Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But several other Twitter users have confirmed that Sharma's phone number is linked to ‘@Confident_India’. By their own admission, iSPIRT seemed to have an &lt;a href="https://thewire.in/137371/aadhaar-ispirt-trolling-sharad-sharma/"&gt;officially sanctioned project&lt;/a&gt; intended  to systematically challenge anti-Aadhaar campaigners in online  platforms. But they refuse to term these actions as “trolling”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Sharma later &lt;a href="https://thewire.in/139188/sharad-sharma-aadhaar-trolling/"&gt;made an apology for trolling&lt;/a&gt; and called it a “lapse of judgement”. CIS Executive Director Sunil Abraham seemed to appreciate the message. He tweeted: Bravo to &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/sharads"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;sharads&lt;/span&gt;&lt;/a&gt; for this! All of us at &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/cis_india"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;cis_india&lt;/span&gt;&lt;/a&gt; look fwd to collaborating with &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/Product_Nation"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;Product_Nation&lt;/span&gt;&lt;/a&gt; &amp;amp; &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/sharads"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;sharads&lt;/span&gt;&lt;/a&gt; to serve Indian s/w sector. &lt;a class="customisable link" dir="ltr" href="https://t.co/TEz0fxnloo" rel="nofollow noopener" target="_blank" title="https://twitter.com/sharads/status/866943195678035968"&gt;&lt;span class="u-hiddenVisually"&gt;https://&lt;/span&gt;twitter.com/sharads/status&lt;span class="u-hiddenVisually"&gt;/866943195678035968 &lt;/span&gt;…&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iSPIRT is an initiative which finds far-reaching support from several IT  industry leaders in India. What is worrying is that there is still no  clarification from iSPIRT on the identities of the other anonymous  trolls and their position on trolling against genuine concerns raised by  citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than a week after the trolling revelations, iSPIRT announced on its website, the results of an investigation carried out by an Internal Guidelines and Compliance Committee over the allegations against Sharma of operating the anonymous handles, ‘@Confident_India’ and ‘@Indiaforward2′. Jonnalgadda was one of the trolling victims who testified in the internal meeting. A summary of the investigation was posted bafflingly by the accused himself in which he says that project Sudham has been dissolved and that he has been told to not make public appearances on behalf of iSPIRT for four months while he remains Director and the face of the organisation. FactorDaily reported that iSPIRT members on the condition of anonymity said that Pallav Nadhani (Founder, Chief Executive, FusionCharts) and Naveen Tewari (Co-founder, InMobi) who quit iSPIRT were upset with their excessive focus on India Stack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One wonders whether this kind of behavior would be treated differently if it took place offline. Is intimidating those who appear to be ‘detractors’ the most effective way of dealing with criticism? Why is a software lobby taking it upon themselves to defend the idea of Aadhaar and India Stack through such means?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many are hoping that experts on both sides of the issue can find a way to debate questions around the privacy and security of Aadhaar's technology — that affect some 1.3 billion people — in a more democratic way.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system'&gt;https://cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T13:34:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security">
    <title>Online privacy should not come at the cost of security: Sunil Abraham</title>
    <link>https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security</link>
    <description>
        &lt;b&gt;Sunil Abraham, Centre for Internet and Society’s executive director, on privacy laws and Internet penetration.&lt;/b&gt;
        &lt;p&gt;Anirban Sen's article was &lt;a class="external-link" href="http://www.livemint.com/Industry/xcmVySyl90ivZknOK9YIBI/Online-privacy-should-not-come-at-the-cost-of-security-Suni.html"&gt;published in LiveMint &lt;/a&gt;on May 19, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;div class="text" id="U191282072761AmC"&gt;
&lt;hr /&gt;
&lt;p class="text" style="text-align: justify; "&gt;The Centre for Internet and Society (CIS), a research thinktank that primarily focuses on issues of Internet governance, is pushing to revise the provisions of the Information Technology (IT) Act and make a stronger case for privacy laws and free speech in India, an issue that has caused widespread concern after the government tried to restrict access to more than a 100 websites last year with little justification.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We want to revise the IT Act...that’s the toughest one and that’s not going to happen very soon because the government is treating it like an ego battle now. They no longer listen to the others,” said &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Sunil Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;, executive director of CIS.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;The IT Act has been at the centre of debate, with some of its provisions such as Section 66A, which criminalizes “causing annoyance or inconvenience” online or electronically, coming under criticism from rights advocates for being too vague and subject to interpretation.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;CIS, which will complete five years on Monday and is organizing a four-day event focusing on issues such as cyber security, surveillance in India and privacy, said it also was working towards creating a privacy law for India within the next 3-4 years. India, which is estimated to have Internet penetration of just 10%, is the third-largest Internet market in the world.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We’re getting closer and closer to that (privacy law),” said Abraham, adding that privacy should not come at the cost of security.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;Over the past five years, Bangalore-based CIS has also been part of some government committees such as the Justice AP Shah Committee, which focused on privacy laws in India, and is also currently working on the country’s telecom policy. The non-government organization, which receives grants from international bodies such as the Wikimedia Foundation, has also worked on policies for the government of Iraq and is currently also doing policy work for the government of Burma.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“Five years ago we were making noise from outside the room, we were not inside any policy making space. That has also changed. From an organization that was mostly outside the room, we’re increasingly being trusted by our own government,” said Abraham, who was one of the most vocal critics of the government’s unique identification (UID) project when it was first launched. Abraham had raised concerns over its overtly broad scope and issues over privacy in the project.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;For CIS, one of the biggest achievements over the past five years was being part of the policy framework for the government of India’s draft national policy on open standards for e-governance, said Abraham, adding that the organization was working towards increasing Internet penetration in the country, especially in rural areas.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We’re hoping that every single mobile phone user in the country will become an Internet user. We’re planning for that future,” he said.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;The CIS event starting on Monday will include speakers such as legal researcher and advocate &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Lawrence Liang"&gt;Lawrence Liang&lt;/a&gt;&lt;/span&gt; and &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Vibodh Parthasarathi"&gt;Vibodh Parthasarathi&lt;/a&gt;&lt;/span&gt;, an associate professor at the Centre for Culture, Media and Governance at the Jamia Millia Islamia university. Both Liang and Parthasarathi are members of the board at CIS.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security'&gt;https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-02T02:27:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/online-pre-censorship-harmful-impractical">
    <title>Online Pre-Censorship is Harmful and Impractical</title>
    <link>https://cis-india.org/internet-governance/online-pre-censorship-harmful-impractical</link>
    <description>
        &lt;b&gt;The Union Minister for Communications and Information Technology, Mr. Kapil Sibal wants Internet intermediaries to pre-censor content uploaded by their users.  Pranesh Prakash takes issue with this and explains why this is a problem, even if the government's heart is in the right place.  Further, he points out that now is the time to take action on the draconian IT Rules which are before the Parliament.&lt;/b&gt;
        
&lt;p&gt;Mr. Sibal is a knowledgeable lawyer, and according to a senior lawyer friend of his with whom I spoke yesterday, greatly committed to ideals of freedom of speech.  He would not lightly propose regulations that contravene Article 19(1)(a) [freedom of speech and expression] of our Constitution.  Yet his recent proposals regarding controlling online speech seem unreasonable.  My conclusion is that the minister has not properly grasped the way the Web works, is frustrated because of the arrogance of companies like Facebook, Google, Yahoo and Microsoft.  And while he has his heart in the right place, his lack of knowledge of the Internet is leading him astray.  The more important concern is the&lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/RNUS_CyberLaw_15411.pdf"&gt; IT Rules&lt;/a&gt; that have been in force since April 2011.&lt;/p&gt;
&lt;h3&gt;Background &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The New York Times scooped a story on Monday revealing that Mr. Sibal and the &lt;a class="external-link" href="http://www.mit.gov.in/"&gt;MCIT&lt;/a&gt; had been &lt;a class="external-link" href="http://india.blogs.nytimes.com/2011/12/05/india-asks-google-facebook-others-to-screen-user-content/?scp=2&amp;amp;sq=kapil%20sibal&amp;amp;st=cse"&gt;in touch with Facebook, Google, Yahoo, and Microsoft&lt;/a&gt;, asking them to set up a system whereby they would manually filter user-generated content before it is published, to ensure that objectionable speech does not get published.  Specifically, he mentioned content that hurt people's religious sentiments and content that Member of Parliament Shashi Tharoor described as &lt;a class="external-link" href="http://zeenews.india.com/news/nation/i-am-against-web-censorship-shashi-tharoor_745587.html"&gt;'vile' and capable of inciting riots as being problems&lt;/a&gt;.  Lastly, Mr. Sibal defended this as not being "censorship" by the government, but "supervision" of user-generated content by the companies themselves.&lt;/p&gt;
&lt;h3&gt;Concerns &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;One need not give lectures on the benefits of free speech, and Mr. Sibal is clear that he does not wish to impinge upon it.  So one need not point out that freedom of speech means nothing if not the freedom to offend (as long as no harm is caused). There can, of course, be reasonable limitations on freedom of speech as provided in Article 19 of the &lt;a class="external-link" href="http://www2.ohchr.org/english/law/ccpr.htm"&gt;ICCPR&lt;/a&gt; and in Article 19(2) of our Constitution.  My problem lies elsewhere.&lt;/p&gt;
&lt;h3&gt;Secrecy &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;It is unfortunate that the New York Times has to be given credit for Mr. Sibal addressing a press conference on this issue (and he admitted as much). What he is proposing is not enforcement of existing rules and regulations, but of a new restriction on online speech.  This should have, in a democracy, been put out for wide-ranging public consultations first.&lt;/p&gt;
&lt;h3&gt;Making intermediaries responsible &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The more fundamental disagreement is that over how the question of what should not be published should be decided, and how that decision should be  and how that should be carried out, and who can be held liable for unlawful speech.  I believe that "to make the intermediary liable for the user violating that code would, I think, not serve the larger interests of the market." Mr. Sibal said that in May this year &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052702304563104576355223687825048.html"&gt;in an interview with the Wall Street Journal&lt;/a&gt;. The intermediaries (that is, all persons and companies who transmit or host content on behalf of a third party), are but messengers just like a post office and do not exercise editorial control, unlike a newspaper.  (By all means prosecute Facebook, Google, Yahoo, and Microsoft whenever they have created unlawful content, have exercised editorial control over unlawful content, have incited and encouraged unlawful activities, or know after a court order or the like that they are hosting illegal content and still do not remove it.)

Newspapers have editors who can take responsibility for content published in the newspaper.  They can afford to, because the number of articles in a newspaper is limited.  YouTube, which has 48 hours of videos uploaded every minutes, cannot.  One wag suggested that Mr. Sibal was not suggesting a means of censorship, but of employment generation and social welfare for censors and editors.  To try and extend editorial duties to these 'intermediaries' by executive order or through 'forceful suggestions' to these companies cannot happen without amending s.79 of the Information Technology Act which ensures they are not to be held liable for their user's content: the users are.

Internet speech has, to my knowledge, and to date, has never caused a riot in India.  It is when it is translated into inflammatory speeches on the ground with megaphones that offensive speech, whether in books or on the Internet, actually become harmful, and those should be targeted instead.  And the same laws that apply to offline speech already apply online.  If such speech is inciting violence then the police can be contacted and a magistrate can take action.  Indeed, Internet companies like Facebook, Google, etc., exercise self-regulation already (excessively and wrongly, I feel sometimes).  Any person can flag any content on YouTube or Facebook as violating the site's terms of use.  Indeed, even images of breast-feeding mothers have been removed from Facebook on the basis of such complaints.  So it is mistaken to think that there is no self-regulation.  In two recent cases, the High Courts of Bombay (&lt;a href="https://cis-india.org/internet-governance/janhit-manch-v-union-of-india" class="internal-link" title="Janhit Manch &amp;amp; Ors. v. The Union of India"&gt;&lt;em&gt;Janhit Manch v. Union of India&lt;/em&gt;&lt;/a&gt;) and Madras (&lt;em&gt;R. Karthikeyan v. Union of India&lt;/em&gt;) refused to direct the government and intermediaries to police online content, saying that places an excessive burden on freedom of speech.&lt;/p&gt;
&lt;h3&gt;IT Rules, 2011 &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;In this regard, the IT Rules published in April 2011 are great offenders.  While speech that is 'disparaging' (while not being defamatory) is not prohibited by any statute, yet intermediaries  are required not to carry 'disparaging' speech, or speech to which the user has no right (how is this to be judged? do you have rights to the last joke that you forwarded?), or speech that promotes gambling (as the government of Sikkim does through the PlayWin lottery), and a myriad other kinds of speech that are not prohibited in print or on TV.  Who is to judge whether something is 'disparaging'?  The intermediary itself, on pain of being liable for prosecution if it is found have made the wrong decision.  And any person may send a notice to an intermediary to 'disable' content, which has to be done within 36 hours if the intermediary doesn't want to be held liable.  Worst of all, there is no requirement to inform the user whose content it is, nor to inform the public that the content is being removed.  It just disappears, into a memory hole.  It does not require a paranoid conspiracy theorist to see this as a grave threat to freedom of speech.

Many human rights activists and lawyers have made a very strong case that the IT Rules on Intermediary Due Diligence are unconstitutional.  Parliament still has an opportunity to reject these rules until the end of the 2012 budget session. Parliamentarians must act now to uphold their oaths to the Constitution.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/online-pre-censorship-harmful-impractical'&gt;https://cis-india.org/internet-governance/online-pre-censorship-harmful-impractical&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Obscenity</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>YouTube</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    

   <dc:date>2011-12-12T17:00:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy">
    <title>Online outcry forces government to withdraw draft encryption policy</title>
    <link>https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy</link>
    <description>
        &lt;b&gt;The article by Naina Khedekar discussing encryption policy was published in First Post on September 23, 2015. Pranesh Prakash has been quoted.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original published by First Post &lt;a class="external-link" href="http://tech.firstpost.com/news-analysis/online-backlash-forces-government-to-withdraw-draft-encryption-policy-282106.html"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Yesterday, the government &lt;a href="http://tech.firstpost.com/news-analysis/after-backlash-govt-exempts-whatsapp-facebook-payment-gateways-from-encryption-policy-282095.html" target="_blank"&gt;&lt;b&gt;released a draft encryption policy&lt;/b&gt;&lt;/a&gt; aimed  at keeping a tab on the use of technology by specifying algorithms and  length of encryption keys used by ‘all’. It wanted businesses, telcos  and Internet companies to store all encrypted data for 90 days in plain  text which should be presented before the law enforcement agencies  whenever asked to. Moreover, failing to do so would mean legal action as  per the laws of the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a huge outcry, most of us woke up to the new proposed addendum  this morning wherein the government has clarified to exempt products  such as social media sites including WhatsApp, Facebook and Twitter;  payment gateways; e-commerce and password based transactions and more  from the draft policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the government has decided to &lt;a href="http://tech.firstpost.com/news-analysis/government-withdraws-controversial-draft-encryption-policy-reports-282170.html"&gt;&lt;b&gt;withdraw the draft encryption policy&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;I have written for that draft to be withdrawn, made changes to and then re-released: RS Prasad : ANI &lt;a href="http://t.co/W2IP4meEGb" rel="nofollow"&gt;pic.twitter.com/W2IP4meEGb&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Firstpost (@firstpost) &lt;a href="https://twitter.com/firstpost/status/646221371932962816" rel="nofollow"&gt;September 22, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;Some sort of encryption policy is there all over the world: Ravishankar Prasad &lt;a href="http://t.co/cDvsOWtjcM" rel="nofollow"&gt;pic.twitter.com/cDvsOWtjcM&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Firstpost (@firstpost) &lt;a href="https://twitter.com/firstpost/status/646222621495812096" rel="nofollow"&gt;September 22, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;What’s fascinating is how the whole process felt like déjà vu.  Haven’t we seen the drama unfold before. While the dust on the net  neutrality sage has barely settled, we’re already facing newer issues  related to encryption and privacy. We never learn from our mistakes, do  we? A new draft policy, public outcry, and then comes the much-needed  changes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="social_media" class="size-full wp-image-235071" height="360" src="http://tech.firstpost.com/wp-content/uploads/2014/09/social_media.jpg" width="640" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government hasn’t just caused anxiety and chaos among the  netizens, but the initial draft completely misguided people. According  to &lt;a href="http://thenextweb.com/in/2015/09/21/india-still-doesnt-understand-how-online-security-works/" rel="nofollow" target="_blank"&gt;&lt;b&gt;TheNextWeb&lt;/b&gt;&lt;/a&gt;,  “The Indian government has made a fool of itself and caused anxiety  among citizens with a woefully misguided proposal for a national  encryption policy that it’s just released to the public for feedback.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While we sit back and talk about Digital India, smarter cities and so  on, the makers of the law seem to be clueless about some major  by-products concerning these initiatives such as security, privacy and  likewise. Each time the government talks about a new initiative meant to  bring in some law and order pertaining to digital rights, it somehow  manages to come up with implications that could affect us far worse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this case, the Indian government is trying to ensure that its law  enforcement agencies have easy access to encrypted information whenever  required, but this could easily compromise security and privacy in the  process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, each time the government releases a proposal for our  digital lives, it’s people who remind the government about the adverse  implications it could have. Does the expert panel writing these reports  know nothing about privacy and how it possibly works? Or is the  government simply looking at a trial balloon policy to gauge reactions  by people. So, next time we don’t react, a draconian rule might just be  governing our digital lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The whole net neutrality saga continued for months with assurance  from the government on how it supports free and equal Internet, and  eventually made ‘certain changes’. This seems headed on a similar path.  Though the new addendum comes with changes, it still leaves us as  muddled as before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash of the CIS has tweeted out how the new clarification clarifies nothing.&lt;/p&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;This clarification by the govt does not clarify anything, but further muddles the encryption policy. &lt;a href="http://t.co/1KK8AFRp6Q" rel="nofollow"&gt;pic.twitter.com/1KK8AFRp6Q&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Pranesh Prakash (@pranesh_prakash) &lt;a href="https://twitter.com/pranesh_prakash/status/646164649436549120" rel="nofollow"&gt;September 22, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;All  OSes will be illegal in India (IV.6 + V.3 of draft encryption policy)  unless Microsoft, Apple, Red Hat, etc, sign agreement w/ govt.&lt;/p&gt;
&lt;p&gt;— Pranesh Prakash (@pranesh_prakash) &lt;a href="https://twitter.com/pranesh_prakash/status/645871490408255489" rel="nofollow"&gt;September 21, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;If  India enacts that National Encryption Policy, their global back-end and  support business will be drastically reduced. If it survives.&lt;/p&gt;
&lt;p&gt;— Lin S (@Just_this_time) &lt;a href="https://twitter.com/Just_this_time/status/645781278244012033" rel="nofollow"&gt;September 21, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;A new &lt;a href="http://www.medianama.com/2015/09/223-india-draft-encryption-policy/" rel="nofollow" target="_blank"&gt;&lt;b&gt;Medianama&lt;/b&gt;&lt;/a&gt; report also points out loopholes in the changes announced. The report  adds how any encrypted service would have to sign an agreement with the  government. With the heavy mobile penetration and increasing number of  encrypted mobile services that people use, it is really feasible for the  government to ink an agreement with all the services that are based  outside the country.&lt;/p&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;Problems with the update to India's draft anti-privacy policy  &lt;a href="http://t.co/gKus1o3uaC" rel="nofollow"&gt;http://t.co/gKus1o3uaC&lt;/a&gt; &lt;a href="http://t.co/adqVJTedFI" rel="nofollow"&gt;pic.twitter.com/adqVJTedFI&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Nikhil Pahwa (@nixxin) &lt;a href="https://twitter.com/nixxin/status/646153774231228416" rel="nofollow"&gt;September 22, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In the past, we’ve seen the blame game around the laws, usually the  ‘hurriedly’ changed laws passed (after the inability to monitor  encrypted messages during the Mumbai terrorist attacks) in the winter  session of 2008 without any debate or discussion by bears the brunt.  Earlier this year, we saw the government crack down the Section 66A of  the 2008 Information Technology Act describing it “unconstitutional” and  “hit at the root of liberty and freedom of expression, the two cardinal  pillars of democracy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Why can’t all the thinking be done before drafts are penned down for  public review. A well thought out report would help avoid  retractions later.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://tech.firstpost.com/wp-content/uploads/2014/09/social_media.jpg"&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy'&gt;https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-01T02:05:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/online-or-offline-protest-goes-on">
    <title>Online or Offline, Protest Goes On</title>
    <link>https://cis-india.org/internet-governance/blog/online-or-offline-protest-goes-on</link>
    <description>
        &lt;b&gt;Strap: Kashmiris say internet blockades have no effect on uprisings&lt;/b&gt;
        &lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Srinagar, J&amp;amp;K: &lt;/b&gt;Ahead of the Srinagar parliamentary by-polls held on 9 April 2017, the Jammu &amp;amp; Kashmir state government suspended mobile data services to prevent protests around the election. The constituency went to polls with strict restrictions on movement, and with no access to mobile internet. As soon as the electoral staff reached their respective polling booths, however, there &lt;i&gt;were &lt;/i&gt;protests. People at dozens of locations in central Kashmir’s Budgam district began to gather to demonstrate against the central and state governments, which they believed had not safeguarded Kashmiri interests.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/JKStonepelters1.png" alt="JK Stonepelters 1" class="image-inline" title="JK Stonepelters 1" /&gt;&lt;br /&gt;&lt;span class="discreet"&gt;Faizan, a 12-year-old schoolboy, was killed in the Dalwan shooting&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/JKStonepelters2.png" alt="JK Stonepelters 2" class="image-inline" title="JK Stonepelters 2" /&gt;&lt;br /&gt;&lt;span class="discreet"&gt;Abbas, 21, was one of the victims of the shooting in Dalwan&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="discreet"&gt;&lt;img src="https://cis-india.org/home-images/JKStonepelters3.png" alt="JK Stonepelters 3" class="image-inline" title="JK Stonepelters 3" /&gt;&lt;br /&gt;Abbas’ home in Dalwan&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="discreet"&gt;&lt;img src="https://cis-india.org/home-images/JKStonepelters4.png" alt="JK Stonepelters 4" class="image-inline" title="JK Stonepelters 4" /&gt;&lt;br /&gt;The school in Dalwan where the shooting occurred&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;Picture Courtesy: Junaid Nabi Bazaz&lt;/i&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;In Dalwan village, a picture-postcard village atop a hill 35 kms from Budgam town, no votes were cast: the officers fled the polling station, and the paramilitary forces and police shot at protesters. Two people – a 21-year-old son of a policeman and a 12-year-old schoolboy – died on the spot.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;People of Dalwan have been voting in droves in every parliamentary, legislative and local body election, even on occasions where much of Kashmir boycotted polls. But in April, residents said they were fed up with legislators not working to ensure uninterrupted power, water supply, concrete roads, or even a permanent doctor at its only dispensary. So, a village that has never demonstrated or produced any militants in the last 30 years of uprisings in the Kashmir Valley erupted in protest that election day. Now, the cemetery in which the two killed civilians are buried has been renamed as Martyr’s Graveyard.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Bazil Ahmad, a resident of Dalwan, says that nothing could have prevented the protests that day. “We protested against state, it was a spontaneous response,” says 22-year-old Ahmad who threw his first stones that day. “If the government believes that an internet blockade could prevent protests, they’re living in a fool’s paradise.” He sees the internet only as a free platform to express his anger and disappointment. “The actual trigger for the anger comes from the denial of rights and state aggression, not because of the internet,” says Ahmad.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;As the news about the killings spread to neighbouring villages word-of-mouth, residents there too protested. Journalists in these villages updated their newsrooms. In a few days, all newspapers in Kashmir carried the news of eight deaths, scores of injuries, and the appalling 6.5% voter turnout in Budgam and Ganderbal districts.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;After the ban was lifted, videos captured on polling day were posted on Facebook, Twitter and WhatsApp. One of them was a video of Farooq Dar, a voter returning from the polling booth, tied to the front bumper of a military vehicle as it patrolled villages. A paper with his name was tied to his chest, and a soldier announced on the loudspeaker, “Look at the fate of the stonepelter.” The video created an uproar internationally. The armed forces were accused of using a civilian as “a human shield”, pushing it to hold an inquiry, and the police to lodge an FIR.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;After these videos emerged, the government on April 26 officially banned 22 social media sites and apps, including Facebook, WhatsApp and Twitter, for over a month. Once again, it seemed to have little effect on the protests – and protestors.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Sajad, who has been throwing stones for the past eight years at the armed forces, says, “The government is miscalculating the use of internet and the occurrence of protests.” The 28-year-old refers to the protests using the Kashmiri phrase &lt;i&gt;kani jung&lt;/i&gt;, loosely translated as ‘stone battle’, which to him conveys a revolutionary zeal. Youths like Sajad who participate in the protests insist that they are provoked each time by an instance of human rights violation that exacerbates the long experience of militarisation, aspiration for “azadi”, and conflict in Kashmir. Internet shutdowns do nothing to erase this trigger, he says, and sometimes heighten their anger.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;In just 2017, there have been 27 internet or social media bans in J&amp;amp;K, according to&lt;a href="http://internetshutdowns.in/"&gt; &lt;/a&gt;&lt;a href="http://internetshutdowns.in/"&gt;internetshutdowns.in&lt;/a&gt;. In the absence of evidence or study about its effects, it’s unclear if these blockades curb the spread of misinformation at all, or prevent the mobilisation of people for protests. For instance, on 15 April 2017, students from Degree College in south Kashmir’s Pulwama district protested against the armed forces for firing teargas and beating them. Though there was an internet ban in place, the incident went live on Facebook. It led to more student protests across the state. Schools, colleges and universities had to be closed for weeks.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Due to the frequency of blockades, several Kashmiris, including ministers, bureaucrats, civilians, protesters and police officers, have found a way out: they have turned to VPNs (Virtual Private Networks).&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;A  VPN allows users to remain secure online and also enables them to access content or websites that are otherwise blocked. Sajad says, "A selective ban on the internet does not help, because we use VPNs. A person gains access to a network, and everyone in the area finds out how. Let the government block everything, it won’t stop protests.” To illustrate his point, Sajad gives the example of uprisings in the summer of 2016, during which internet, pre-paid and post-paid connections were shut for months. “Were there not protests?” he asks. “Kashmir was resisting Indian forces even before the internet existed, so why would it be difficult for us to use the same means now?”&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Gulzar, a 30-year-old who has joined protests since he was 15, says the internet is more often used to disseminate information about the injustice, and not to organise protests. “A guy from Srinagar will only protest in Srinagar, and not go to other places. So, it is not too difficult to find out where protests are going on,” says Gulzar.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;A DSP-rank police officer in the cyber crime cell of the J&amp;amp;K Police, on the condition of anonymity, says that bans have not yielded absolute results, but have been useful in preventing small-scale protests. He cited the example of district-level territorial internet blockades, done during gunfights between militants and the armed forces, to prevent immediate information sharing that may lead to the operation being compromised. “Say some militants are caught during an encounter in a village in Pulwama district. We block the internet as a precautionary measure in that area,” he says. “In case the district is violence-free, we reduce the bandwidth. That has now become the standard operating procedure.”&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The police officer adds that accustomed to the bans, people now record the protests and later post videos on social media once the ban is lifted. “So, in effect, what the internet ban achieved is neutralised as soon as the internet is back on,” he says.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;Names changed to protect identity.&lt;/i&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;b&gt;J&lt;/b&gt;unaid Nabi Bazaz is a Srinagar-based journalist and a member of &lt;a href="https://101reporters.com/"&gt;101Reporters.com&lt;/a&gt;, a pan-India network of grassroots reporters. He has been working as a journalist in Kashmir since 2010. He has covered human rights, economy, administration, crime and health over these years. He has also written for contributoria.com, an independent division of The Guardian.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Shutdown stories are the output of a collaboration between 101 Reporters and CIS with support from Facebook.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/online-or-offline-protest-goes-on'&gt;https://cis-india.org/internet-governance/blog/online-or-offline-protest-goes-on&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Junaid Nabi Bazaz</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Shutdown</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-12-21T14:53:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/online-interest-in-advani-rises">
    <title>Online Interest in Advani Rises </title>
    <link>https://cis-india.org/news/online-interest-in-advani-rises</link>
    <description>
        &lt;b&gt;Article by Sruthi Krishnan in the Hindu, 15 May 2009, quoting CIS Research Director Nishant Shah&lt;/b&gt;
        
&lt;p&gt;Online interest in BJP leader L.K. Advani reached its highest point
in the last 12 months when a slipper was thrown at him. The data on
Google Trends, an application that shows how often a search term has
been sought for on Google over time, also shows that the interest in
Mr. Advani’s name rose steadily as the general elections approached.&lt;/p&gt;
&lt;p&gt;Contrary to what many consider as just another activity on the
Internet, searching is the “backbone of cyberspace,” says Nishant Shah,
Director (Research), Centre for Internet and Society, Bangalore. .&lt;/p&gt;
&lt;p&gt;The search for Prime Minister Manmohan Singh shows a peak in July
2008 in the last 12 months, corresponding to the UPA Government winning
the trust vote. That the interest in searching for public personalities
closely mirrors news interest in the outside world is undeniable, says
Mr. Shah. “The Internet is not as much a broadcast media as a
search-and-find media.” Hence, in this context, the Internet acts as a
“reference book” rather than a “best seller,” he says.&lt;/p&gt;
&lt;p&gt;In the last 12 months, the political event that fired up Google in
India was the launch of Praja Rajyam, coinciding with a spike in the
search for actor Chiranjeevi’s name. This was the highest among the
search history in the last 12 months of the ten most searched
politicians in India on Google – a list released by Google recently.&lt;/p&gt;
&lt;p&gt;The list includes Mr. Advani, Mr. Singh, Uttar Pradesh Chief
Minister Mayawati, Gujarat Chief Minister Narendra Modi and Congress
general secretary Rahul Gandhi.&lt;/p&gt;
&lt;p&gt;However, Mr. Shah cautions that in an emerging information society
like India, an increase in online search for a particular name or event
may not imply that it is popular across the country. “Given the limited
amount of internet access and the almost homogeneous user group that
has interactive access to being online, it means that within that
particular class-language group, a certain event or person is gaining
popularity.”&lt;/p&gt;
&lt;p&gt;The analysis by Google Trends also shows that most of the searches
for Mr. Chiranjeevi were made in Telugu, compared to English.&lt;/p&gt;
&lt;p&gt;While Hyderabad is where the actor’s name was searched the most
number of times, the top 10 cities includes San Jose and Houston in the
United States.&lt;/p&gt;
&lt;p&gt;Interestingly, Sanjay Dutt, the other actor in the list, generated the highest volume of searches in Pakistan.&lt;/p&gt;
&lt;p&gt;-----&lt;/p&gt;
&lt;p&gt;Read the article at the Hindu website &lt;a class="external-link" href="http://www.hindu.com/2009/05/15/stories/2009051559330400.htm"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/online-interest-in-advani-rises'&gt;https://cis-india.org/news/online-interest-in-advani-rises&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sachia</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T15:58:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
