<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1026 to 1040.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-cyber-security-bilateral-agreements-map-dec-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/rankathon-on-digital-rights-delhi-jan-08-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/discussion-on-ranking-digital-rights-in-india-delhi-jan-07-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-indian-express-december-27-2016-christin-philip-mathew-it-hub-karnataka-ranks-12-in-e-deals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/workshop-on-center-for-it-and-society"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-eu-and-free-flows-of-data-data-protection-trade-and-law-enforcement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-in-vinita-govindarajan-shrutisagar-yamunan-with-power-phone-and-internet-services-affected-chennai-is-still-recovering-from-cyclone-vardah"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/decoding-the-digital-winter-school-at-iiit-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/multistakeholder-consultation-on-encryption"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/dsci-nasscom-annual-information-security-summit-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/myanmar-digital-rights-forum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-udbhav-tiwari-december-15-2016-curious-case-of-poor-security-in-indian-twitterverse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-inputs-to-the-working-group-on-enhanced-cooperation-on-public-policy-issues-pertaining-to-the-internet-wgec"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-cyber-security-bilateral-agreements-map-dec-2016">
    <title>Mapping of India’s Cyber Security-Related Bilateral Agreements</title>
    <link>https://cis-india.org/internet-governance/blog/india-cyber-security-bilateral-agreements-map-dec-2016</link>
    <description>
        &lt;b&gt;With the rapid spread of cloud computing and the growth of cyber spaces, large masses of information are now easily transmittable transnationally, necessitating the ratification of new agreements and cooperation efforts amongst states in order to secure cyber spaces and regulate exchanges of information. In an attempt to understand the nature and extent of current international collaborative efforts in cyber security, we have compiled the following data regarding India’s cyber security-related bilateral agreements. The intention of this exercise is to offer a dynamic visualization that demonstrates which countries India has collaborated with on cyber security efforts and initiatives. This is an ongoing map that we will be updating as our research continues.&lt;/b&gt;
        &lt;h4 style="text-align: justify; "&gt;Download: &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/CyberSecurityAgreements_Infographic_04.pdf"&gt;Infographic&lt;/a&gt; (PDF) and &lt;a href="https://github.com/cis-india/website/raw/master/docs/CIS_IndiaCyberSecBilateralAgreementMap_Dec2016.xlsx"&gt;data&lt;/a&gt; (XLSX)&lt;/h4&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; The data used for the info-graphic consists of India’s MLATs, cyber security-related MoUs and Joint Statements, and Cyber Frameworks. An MLAT is an agreement between two or more countries, drafted for the purpose of gathering and exchanging information in an effort to enforce public or criminal laws. A MoU (Memorandum of Understanding) is a nonbinding agreement between two or more states outlining the terms and details of an understanding, including each party’s requirements and responsibility; it is often the first stage in the formation of a formal contract. For the purpose of this research, we have grouped Joint Statements with MoUs, as they both generally entail the informal agreement between two states to strengthen cooperation on certain issues. Lastly, a Cyber Framework consists of standards, guidelines and practices to promote protection of critical infrastructure. The data accounts for agreements centered on cyber security as well as any agreements mentioning cooperation efforts in Cyber Security, information security or cybercrime.&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/MLATAgreement.png/@@images/169c25c6-57a4-48c8-a33e-71aa36ea97ea.png" alt="MLAT Agreement" class="image-inline" title="MLAT Agreement" /&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Mapping of India’s Cybersecurity-related bilateral agreement has been updated on April 12, 2017 with the following changes:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;A new MoU was signed between Australia and India in April 2017, focusing on combating terrorism and civil aviation security. Cybersecurity cooperation is mentioned in the MoU&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A new MoU was signed between Bangladesh and India in April 2017. The Indian Computer Emergency Response Team (CERT-In), Indian Ministry of Electronics and Information Technology and the ICT Division of Bangladesh are the signing parties of the MoU. The agreement focuses on Cooperation in the area of Cyber Security&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A preexisting MoU between France and India was added to the mapping, signed in January of 2016. Officials of both countries agreed to intensify cooperation between the Indian and French security forces in the fields of homeland security, cyber security, Special Forces and intelligence sharing to fight against criminal networks and tackle the common threat of terrorism&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A new MoU was signed between Indonesia and India in March 2017. It focuses on enhancing cooperation in cyber security and intelligence sharing&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A new MoU was signed between Kenya and India in January 2017, with “cyber security” mentioned as one of the key areas of cooperation&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A preexisting MoU between Malaysia and India was added to the mapping, signed in November of 2015. Both sides agreed to promote cooperation and the exchange of information regarding cyber security incident management, technology cooperation and cyber attacks, prevalent policies and best practices and mutual response to cyber security incidents&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A preexisting MoU between Mauritius and India, signed July 2016, was added to the mapping. This is a non-governmental MoU. Leading bourse BSE signed an agreement with Stock Exchange of Mauritius (SEM) for collaboration in areas including cyber security&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A new joint statement between India and Portugal was signed in March 2017. The two countries agreed to set up an institutional mechanism to collaborate in the areas of electronic manufacturing, ITeS, startups, cyber security and e-governance.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;A preexisting MoU, signed between Qatar and India in December of 2016, was added to the mapping. The agreement was regarding a protocol on technical cooperation in cyberspace and combatting cybercrime&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A new MoU was signed between Serbia and India in January 2017, focusing on cooperation in the field of IT, Electronics. The MoU itself does not explicitly mention cybersecurity. However, the MoU calls for cooperation and exchanges in capacity building institutions, which should entail cyber security strengthening&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A preexisting MoU between Singapore and India was added to the mapping. The MoU was signed in January 2016, focusing on the establishment of a formal framework for professional dialogue, CERT-CERT related cooperation for operational readiness and response, collaboration on cyber security technology and research related to smart technologies, exchange of best practices, and professional exchanges of human resource development&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A new joint statement was signed between UAE and India in January 2017, following up on their previous Technical Cooperation MoU signed in February 2016. To further deepen cooperation in this area, they agreed to set up joint Research &amp;amp; Development Centres of Excellence&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A preexisting MoU has been included in the mapping, signed in May of 2016. CERT-In agreed with the UK Ministry of Cabinet Office to promote close cooperation between both countries in the exchange in knowledge and experience in detection, resolution and prevention of security related incidents&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A new MoU between India and the US was signed in March 2017. CERT-In and CERT-US signed a MoU agreeing to promote closer co-operation and exchange of information pertaining to cyber security in accordance with relevant laws, rules and regulations and on the basis of equality, reciprocity and mutual benefit&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A new MoU was signed between Vietnam and India in January 2017, agreeing to promote closer cooperation for exchange of knowledge and experience in detection, resolution and prevention of cyber security incidents between both countries&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;NOTE: Some preexisting MoUs were added as we were initially only including the most recent agreements in the mapping. Upon adding newly signed MoUs, we decided to also keep the preexisting ones and revisit the other entries to include any preexisting MoUs that were initially excluded due to not being the most-recent. In this respect, the visualization will be adjusted to indicate the number of MoUs per country.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt;&lt;a href="http://www.dnaindia.com/india/report-india-australia-sign-mous-on-combating-terrorism-civil-aviation-security-2393843"&gt;http://www.dnaindia.com/india/report-india-australia-sign-mous-on-combating-terrorism-civil-aviation-security-2393843&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt;&lt;a href="http://www.theindependentbd.com/arcprint/details/89237/2017-04-09"&gt;http://www.theindependentbd.com/arcprint/details/89237/2017-04-09&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt;&lt;a href="http://www.thehindu.com/news/resources/Full-text-of-Joint-Statement-issued-by-India-France/article14019524.ece"&gt;http://www.thehindu.com/news/resources/Full-text-of-Joint-Statement-issued-by-India-France/article14019524.ece&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt;&lt;a href="http://indianexpress.com/article/india/indianhome-ministry-indonesian-ministry-of-security-and-coordination/"&gt;http://indianexpress.com/article/india/indianhome-ministry-indonesian-ministry-of-security-and-coordination/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt;&lt;a href="https://telanganatoday.news/india-kenya-focus-defence-security-cooperation-pm"&gt;https://telanganatoday.news/india-kenya-focus-defence-security-cooperation-pm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/news/economy/foreign-trade/india-and-malaysia-sign-3-mous-including-cyber-security/articleshow/49891897.cms"&gt;http://economictimes.indiatimes.com/news/economy/foreign-trade/india-and-malaysia-sign-3-mous-including-cyber-security/articleshow/49891897.cms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt;&lt;a href="http://indiatoday.intoday.in/story/bse-mauritius-stock-exchange-tie-up-to-promote-financial-mkts/1/723635.html"&gt;http://indiatoday.intoday.in/story/bse-mauritius-stock-exchange-tie-up-to-promote-financial-mkts/1/723635.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt;&lt;a href="http://www.tribuneindia.com/news/business/india-portugal-to-collaborate-in-ites-cyber-security/373666.html"&gt;http://www.tribuneindia.com/news/business/india-portugal-to-collaborate-in-ites-cyber-security/373666.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt;&lt;a href="http://naradanews.com/2016/12/india-qatar-sign-agreements-on-visa-cybersecurity-investments/"&gt;http://naradanews.com/2016/12/india-qatar-sign-agreements-on-visa-cybersecurity-investments/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt;&lt;a href="http://ehub.newsforce.in/cabinet-approves-mou-india-serbia-cooperation-field-electronics/"&gt;http://ehub.newsforce.in/cabinet-approves-mou-india-serbia-cooperation-field-electronics/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt;&lt;a href="http://www.businesstimes.com.sg/government-economy/singapore-and-india-strengthen-cooperation-on-cyber-security"&gt;http://www.businesstimes.com.sg/government-economy/singapore-and-india-strengthen-cooperation-on-cyber-security&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt;&lt;a href="http://mea.gov.in/bilateral-documents.htm?dtl/27969/India++UAE+Joint+Statement+during+State+visit+of+Crown+Prince+of+Abu+Dhabi+to+India+January+2426+2017"&gt;http://mea.gov.in/bilateral-documents.htm?dtl/27969/India++UAE+Joint+Statement+during+State+visit+of+Crown+Prince+of+Abu+Dhabi+to+India+January+2426+2017&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt;&lt;a href="http://www.bestcurrentaffairs.com/india-uk-mou-cyber-security/"&gt;http://www.bestcurrentaffairs.com/india-uk-mou-cyber-security/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt;&lt;a href="http://www.dqindia.com/india-cert-signs-an-mou-with-us-cert/"&gt;http://www.dqindia.com/india-cert-signs-an-mou-with-us-cert/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt;&lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=157458"&gt;http://pib.nic.in/newsite/PrintRelease.aspx?relid=157458&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-cyber-security-bilateral-agreements-map-dec-2016'&gt;https://cis-india.org/internet-governance/blog/india-cyber-security-bilateral-agreements-map-dec-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Leilah Elmokadem and Saumyaa Naidu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>International Relations</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Bilateral Agreement</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>MLAT</dc:subject>
    

   <dc:date>2017-04-27T15:14:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/rankathon-on-digital-rights-delhi-jan-08-2017">
    <title>Rankathon on Digital Rights (Delhi, January 08)</title>
    <link>https://cis-india.org/internet-governance/events/rankathon-on-digital-rights-delhi-jan-08-2017</link>
    <description>
        &lt;b&gt;Please join us on Sunday, January 08, at the CIS office in Hauz Khas, Delhi, for a rankathon to visualise, and contribute to the findings of the Ranking Digital Rights study, and critique the underlying methodology. The event will begin at 10:00 in the morning and participants can focus on one or more of three kinds of tasks: 1) visualising the CIS and Ranking Digital Rights data, 2) evaluating additional companies using the RDR methodology, and 3) evaluating the RDR methodology and its suitability for independent use.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://github.com/cis-india/website/raw/master/docs/CIS_RDRIndia-Rankathon_08012017_Invitation.pdf"&gt;Invitation&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;The &lt;a href="https://rankingdigitalrights.org/"&gt;Ranking Digital Rights Corporate Responsibility Index&lt;/a&gt; is a project hosted by the Open Technology Institute at New America Foundation that aims to rank Information and Communications Technology (ICTs) companies with respect to their Governance, Freedom of Expression, and Privacy practices. The inaugural Corporate Accountability Index, released in November 2015, evaluated 16 companies based on the project’s methodology that included 31 indicators in total.&lt;/p&gt;
&lt;p&gt;Towards developing an understanding of how Indian ICT companies are recognising and upholding digital rights of their users, and to raise public awareness about the same, the Center for Internet and Society (CIS), with the support of &lt;a href="https://privacyinternational.org/"&gt;Privacy International&lt;/a&gt;, has studied 8 Indian ICT companies, using the same methodology as the 2015 Corporate Accountability Index, to gain greater insight into company practices and initiate public dialogues.&lt;/p&gt;
&lt;p&gt;Please join us on Sunday, January 08, at the CIS office in Hauz Khas, Delhi, for a rankathon to visualise, and contribute to the findings of the Ranking Digital Rights study, and critique the underlying methodology. The event will begin at 10:00 in the morning and participants can focus on one or more of three kinds of tasks:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;visualising the CIS and Ranking Digital Rights data,&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;evaluating additional companies using the RDR methodology, and&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;evaluating the RDR methodology and its suitability for independent use.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The event is open to all but the venue has limited space. The participants are requested to RSVP by sending an email to &lt;a href="mailto:nisha@cis-india.org?subject=RSVP: Rankathon on Digital Rights"&gt;nisha@cis-india.org&lt;/a&gt;. The final date for registering for the event is &lt;strong&gt;January 04&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;All visualisations and other outputs produced at the event will be published under open licenses. All participants are expected to bring their own laptop or any other items needed for their work. CIS will offer data, help with understanding how the Ranking Digital Rights methodology work, refreshments, and any other support as needed.&lt;/p&gt;
&lt;p&gt;We are also organising a discussion event on Saturday, January 07, at the India Islamic Cultural Centre, Delhi, to present our findings on digital rights practices of 8 Indian ICT companies, followed by an open structured discussion on the methodology of the Ranking Digital Rights study. Please find more details about this &lt;a href="http://cis-india.org/internet-governance/events/discussion-on-ranking-digital-rights-in-india-delhi-jan-07-2017"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We look forward to your participation and contribution to the discussion. Please support us by sharing this invitation with your colleagues and networks.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/rankathon-on-digital-rights-delhi-jan-08-2017'&gt;https://cis-india.org/internet-governance/events/rankathon-on-digital-rights-delhi-jan-08-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2016-12-29T07:10:09Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/discussion-on-ranking-digital-rights-in-india-delhi-jan-07-2017">
    <title>Discussion on Ranking Digital Rights in India (Delhi, January 07)</title>
    <link>https://cis-india.org/internet-governance/events/discussion-on-ranking-digital-rights-in-india-delhi-jan-07-2017</link>
    <description>
        &lt;b&gt;Towards developing an understanding of how Indian ICT companies are recognising and upholding digital rights of their users, and to raise public awareness about the same, the Center for Internet and Society (CIS), with the support of Privacy International, has studied 8 Indian ICT companies, using the same methodology as the 2015 Corporate Accountability Index, to gain greater insight into company practices and initiate public dialogues. Please join us on Saturday, January 07, at the India Islamic Cultural Centre, New Delhi, for a presentation of our findings followed by an open structured discussion on the methodology and implications of the study.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://github.com/cis-india/website/raw/master/docs/CIS_RDRIndia-Discussion_07012017_Invitation.pdf"&gt;Invitation and agenda&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;The &lt;a href="https://rankingdigitalrights.org/"&gt;Ranking Digital Rights Corporate Responsibility Index&lt;/a&gt; is a project hosted by the Open Technology Institute at New America Foundation that aims to rank Information and Communications Technology (ICTs) companies with respect to their Governance, Freedom of Expression, and Privacy practices. The inaugural Corporate Accountability Index, released in November 2015, evaluated 16 companies based on the project’s methodology that included 31 indicators in total.&lt;/p&gt;
&lt;p&gt;Towards developing an understanding of how Indian ICT companies are recognising and upholding digital rights of their users, and to raise public awareness about the same, the Center for Internet and Society (CIS), with the support of &lt;a href="https://privacyinternational.org/"&gt;Privacy International&lt;/a&gt;, has studied 8 Indian ICT companies, using the same methodology as the 2015 Corporate Accountability Index, to gain greater insight into company practices and initiate public dialogues.&lt;/p&gt;
&lt;p&gt;Please join us on Saturday, January 07, at the India Islamic Cultural Centre, New Delhi, for a presentation of our findings followed by an open structured discussion on the methodology and implications of the Ranking Digital Rights study. We will begin at 10:30 am with a round of tea and coffee.&lt;/p&gt;
&lt;p&gt;The event is open to all but the venue has limited space. The participants are requested to RSVP by sending an email to &lt;a href="mailto:nisha@cis-india.org?subject=RSVP: Ranking Digital Rights Discussion"&gt;nisha@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;To further encourage programmers, researchers, journalists, students, and users in general to use and contribute to the findings of the Ranking Digital Rights study, and critique the underlying methodology, we are also organising a “rankathon” on Sunday, January 08, at the CIS office in Delhi. More details can be found &lt;a href="http://cis-india.org/internet-governance/events/rankathon-on-digital-rights-delhi-jan-08-2017"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We look forward to your participation and contribution to the discussion. Please support us by sharing this invitation with your colleagues and networks.&lt;/p&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;10:30-11:00&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Coffee and Tea&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;11:00-11:15&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;11:15-13:00&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Presentation of the Findings and Discussion&lt;/strong&gt; &lt;em&gt;Divij Joshi and Aditya Singh Chawla&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;13:00-14:00&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;14:00-15:00&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Open Discussion #1: Parameters of Evaluation&lt;/strong&gt;&lt;br /&gt;The RDR methodology was based upon evaluating commitments to uphold human rights through their services – in particular towards their commitment to users’ freedom of expression and privacy. Are there other parameters that may be considered in the Indian context?&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;15:00-16:00&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Open Discussion #2: Towards Protecting Digital Rights&lt;/strong&gt;&lt;br /&gt;What steps can be taken by the government, civil society, and industry in India to create an environment that recognizes and protects users digital rights? What are the relevant legal, political, and economic factors to take into consideration towards this? What are steps that other, multinational ICT companies have taken? Would these be realistic for Indian companies to implement?&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;16:00-16:30&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;16:30-17:00&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Coffee and Tea&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/discussion-on-ranking-digital-rights-in-india-delhi-jan-07-2017'&gt;https://cis-india.org/internet-governance/events/discussion-on-ranking-digital-rights-in-india-delhi-jan-07-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Ranking Digital Rights</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2016-12-29T07:07:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-indian-express-december-27-2016-christin-philip-mathew-it-hub-karnataka-ranks-12-in-e-deals">
    <title>‘IT hub’ K’taka ranks No 12 in e-deals</title>
    <link>https://cis-india.org/internet-governance/news/new-indian-express-december-27-2016-christin-philip-mathew-it-hub-karnataka-ranks-12-in-e-deals</link>
    <description>
        &lt;b&gt;Karnataka may be dubbed the ‘IT hub’ of the country but when it comes to e-governance transactions, the state clearly has a long way to go. Statistics from Union government web portal Electronic Transaction Aggregation and Analysis Layer (etaal), which manages e-transactions undertaken by e-governance projects, suggests that Karnataka ranks 12th in the country with just 5.66 crore e-transactions this year as of Monday.&lt;/b&gt;
        &lt;p&gt;The article by Christin Mathew Philip was &lt;a class="external-link" href="http://www.newindianexpress.com/states/karnataka/2016/dec/27/it-hub-ktaka-ranks-no-12-in-e-deals-1553459.html"&gt;published in the New Indian Express&lt;/a&gt; on December 27, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Among the states with maximum number of e-transactions this year so far are Andhra Pradesh, topping the list with 101 crore e-transactions followed by Telangana (80.35 crore e- transactions) and Kerala (75.30 crore e-transactions).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Karnataka’s poor standing on the e-governance transactions front can largely be attributed to a low number of e-services - 86 - in sharp contrast to Andhra Pradesh’s 250. The e-services include registration of births and deaths, land record registration, utility, bill payments and other government related services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This clearly underlines the fact that Karnataka needs to include more government services online and also create more awareness among the people about the existing e-governance projects to achieve ‘digital India’ and cashless payment system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When contacted, Karnataka’s IT minister Priyank Kharge said: “Karnataka is a pioneer in e-governance projects, which includes Bhoomi, Khajane and Mobile-One. Mobile-One is offering nearly 4,500 services, both government and private services at the finger tip. All these initiatives have become the model for other states.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Statistics from Union government web portal Electronic Transaction Aggregation and Analysis Layer (etaal), which manages e-transactions undertaken by e-governance projects, suggests that Karnataka ranks 12th in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commenting on this, IT Minister Priyank Kharge said, “The Centre has also recently ranked Karnataka at No.13 in ease of doing business in the country. I don’t know how they are coming up with such rankings without considering the merit.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of the Centre for Internet Society, a Bengaluru based-research organisation, said: “The government should make e-services friendly to the citizens and also make it more transparent.” He said implementation of proposed Electronic Service Delivery Bill, which will make it mandatory for every government organisation to deliver public services online at a stipulated period, will bring more accountability and attract more people to use government e-services.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-indian-express-december-27-2016-christin-philip-mathew-it-hub-karnataka-ranks-12-in-e-deals'&gt;https://cis-india.org/internet-governance/news/new-indian-express-december-27-2016-christin-philip-mathew-it-hub-karnataka-ranks-12-in-e-deals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-28T01:54:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law">
    <title>Incident Response Requirements in Indian Law</title>
    <link>https://cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law</link>
    <description>
        &lt;b&gt;Cyber incidents have serious consequences for societies, nations, and those who are victimised by them. The theft, exploitation, exposure or otherwise damage of private, financial, or other sensitive personal or commercial data and cyber attacks that damage computer systems are capable of causing lasting harm. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;A recent example of such an attack  that we have seen from India is the recent data breach involving an alleged 3.2 million debit cards in India.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; In the case of this hack the payment processing networks such as National Payments Corporation of India, Visa and Mastercard, informed the banks regarding the leaks, based on which the banks started the process of blocking and then reissuing the compromised cards. It has also been reported that the banks failed to report this incident to the Computer Emergency Response Team of India (CERT-In) even though they are required by law to do so.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; Such risks are increasingly faced by consumers, businesses, and governments. A person who is a victim of a cyber incident usually looks to receive assistance from the service provider and government agencies, which are prepared to investigate the incident, mitigate its consequences, and help prevent future incidents. It is essential for an effective response to cyber incidents that authorities have as much knowledge regarding the incident as possible and have that knowledge as soon as possible. It is also critical that this information is communicated to the public. This underlines the importance of  reporting  cyber incidents as a tool in making the internet and digital infrastructure   secure.. Like any other crime, an Internet-based crime should be reported to those law enforcement authorities assigned to tackle it at a local, state, national, or international level, depending on the nature and scope of the criminal act. This is the first in a series of blog posts highlighting the importance of incident reporting in the Indian regulatory context with a view to highlight the Indian regulations dealing with incident reporting and the ultimate objective of having a more robust incident reporting environment in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Incident Reporting under CERT Rules&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, section 70-B of the Information Technology Act, 2000 (the “&lt;b&gt;IT Act&lt;/b&gt;”) gives the Central Government the power to appoint an agency of the government to be called the Indian Computer Emergency Response Team. In pursuance of the said provision the Central Government issued the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Functions and Duties) Rules, 2013 (the “&lt;b&gt;CERT Rules&lt;/b&gt;”) which provide the location and manner of functioning of the Indian Computer Emergency Response Team (CERT-In). Rule 12 of the CERT Rules gives every person, company or organisation the option to report cyber security incidents to the CERT-In. It also places an obligation on them to mandatorily report the following kinds of incidents as early as possible:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Targeted scanning/probing of critical networks/systems;&lt;/li&gt;
&lt;li&gt;Compromise of critical systems/information;&lt;/li&gt;
&lt;li&gt;Unauthorized access of IT systems/data;&lt;/li&gt;
&lt;li&gt;Defacement of website or intrusion into a website and unauthorized changes such as inserting malicious code, links to external websites, etc.;&lt;/li&gt;
&lt;li&gt;Malicious code attacks such as spreading of virus/worm/Trojan/botnets/spyware;&lt;/li&gt;
&lt;li&gt;Attacks on servers such as database, mail, and DNS and network devices such as routers;&lt;/li&gt;
&lt;li&gt;Identity theft, spoofing and phishing attacks;&lt;/li&gt;
&lt;li&gt;Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks;&lt;/li&gt;
&lt;li&gt;Attacks on critical infrastructure, SCADA systems and wireless networks;&lt;/li&gt;
&lt;li&gt;Attacks on applications such as e-governance, e-commerce, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The CERT Rules also impose an obligation on service providers, intermediaries, data centres and body corporates to report cyber incidents within a reasonable time so that CERT-In may have scope for timely action. This mandatory obligation of reporting incidents casts a fairly wide net in terms of private sector entities, however it is notable that prima facie the provision does not impose any obligation on government entities to report cyber incidents unless they come under any of the expressions “service providers”, “data centres”, “intermediaries” or “body corporate”. This would mean that if the data kept with the Registrar General &amp;amp; Census Commissioner of India is hacked in a cyber incident, then there is no statutory obligation under the CERT Rules on it to report the incident. It is pertinent to mention here that although there is no obligation on a government department under law to report such an incident, such an obligation may be contained in its internal rules and guidelines, etc. which are not readily available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is pertinent to note that although the CERT Rules provide for a mandatory obligation to report the cyber incidents listed therein, the Rules themselves do not provide for any penalty for non compliance. However this does not mean that there are no consequences for non compliance, it just means that we have to look to the parent legislation i.e. the IT Act for the appropriate penalties for non compliance. Section 70B(6) gives the CERT-In the power to call for information and give directions for the purpose of carrying out its functions. Section 70B(7) provides that any service provider, intermediary, data center, body corporate or person who fails to provide the information called for or comply with the direction under sub-section (6), shall be liable to imprisonment for a period up to  1 (one) year or fine of up to 1 (one) lakh or both.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is possible to argue here that sub-section (6) only talks about calls for information by CERT-In and the obligation under Rule 12 of the CERT Rules is an obligation placed by the central government and not CERT-In. It can also be argued that sub-section (6) is only meant for specific requests made by CERT-In for information and sub-section (7) only penalises those who do not respond to these specific requests. However, even if these arguments were to be accepted and we were to conclude that a violation of the obligation imposed under Rule 12 would not attract the penalty stipulated under sub-section (7) of section 70B, that does not mean that Rule 12 would be left toothless. Section 44(b) of the IT Act provides that where any person is required under any of the Rules or Regulations under the IT Act to furnish any information within a particular time and such person fails to do so, s/he may be liable to pay a penalty of upto Rs. 5,000/- for every day such failure continues. Further section 45 provides for a further penalty of Rs.25,000/- for any contravention of any of the rules or regulations under the Act for which no other penalty has been provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Incident Reporting under Intermediary Guidelines&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 2(1)(w) of the IT Act defined the term “intermediary” in the following manner;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“intermediary” with respect to any particular electronic record, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web hosting service providers, search engines, online payment sites, online-auction sites, online market places and cyber cafes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3(9) of the Information Technology (Intermediaries Guidelines) Rules, 2011 (the “&lt;b&gt;Intermediary Guidelines&lt;/b&gt;”) also imposes an obligation on any intermediary to report any cyber incident and share information related to cyber security incidents with the CERT-In. Since neither the Intermediary Guidelines not the IT Act specifically provide for any penalty for non conformity with Rule 3(9) therefore any enforcement action against an intermediary failing to report a cyber security incident would have to be taken under section 45 of the IT Act containing a penalty of Rs. 25,000/-.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Incident Reporting under the Unified License&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause 39.10(i) of the Unified License Agreement obliges the telecom company to create facilities for the monitoring of all intrusions, attacks and frauds on its technical facilities and provide reports on the same to the Department of Telecom (DoT). Further clause 39.11(ii) provides that for any breach or inadequate compliance with the terms of the license, the telecom company shall be liable to pay a penalty amount of Rs. 50 crores (Rs. 50,00,00,000) per breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear from the above discussion that there is a legal obligation service providers to report  cyber incidents to the CERT-In. Presently, the penalty prescribed under Indian law may not be enough to incentivise companies to adopt comprehensive and consistent incident response programmes. , except in cases of telecom companies under the Unified License Agreement. A fine of Rs. 25,000/- appears to be inconsequential  when compared to the possible dangers and damages that may be caused due to a security breach of data containing, for example,  credit card details.. Further, it is also imperative that apart from the obligation to report the cyber incident to the appropriate authorities (CERT-In) there should also be a legal obligation to report it to the data subjects whose data is stolen or is put at risk due to the said breach. A provision requiring notice to the data subjects could go a long way in ensuring that service providers, intermediaries, data centres and body corporates implement the best data security practices since a breach would then be known by general consumers leading to a flurry of bad publicity which could negatively impact the business of the data controller, and for a business entity an economic stimulus may be an effective way  to ensure compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we continue to research incident response, the questions and areas we are exploring include the ecosystem of incidence response including what is reported, how, and when, appropriate incentives to companies and governments to report incidents, various forms of penalties, the role of cross border sharing of information and jurisdiction and best practices for incident reporting and citizen awareness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Published under Creative Commons License CC BY-SA. Anyone can distribute, remix, tweak, and build upon this document, even for commercial purposes, as long as they credit the creator of this document and license their new creations under the terms identical to the license governing this document&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.huffingtonpost.in/2016/10/21/atm-card-hack-what-banks-are-saying-about-india-s-biggest-data/"&gt;http://www.huffingtonpost.in/2016/10/21/atm-card-hack-what-banks-are-saying-about-india-s-biggest-data/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://tech.economictimes.indiatimes.com/news/internet/cert-in-had-warned-banks-on-oct-7-about-expected-targeted-attacks-from-pakistan/54991025"&gt;http://tech.economictimes.indiatimes.com/news/internet/cert-in-had-warned-banks-on-oct-7-about-expected-targeted-attacks-from-pakistan/54991025&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law'&gt;https://cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-28T01:19:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/workshop-on-center-for-it-and-society">
    <title>Workshop on Center for IT and Society</title>
    <link>https://cis-india.org/internet-governance/news/workshop-on-center-for-it-and-society</link>
    <description>
        &lt;b&gt;This workshop was held at IIT, Delhi on December 20, 2016. Amber Sinha attended the workshop. The meeting focused on the curriculum and the way forward, especially with respect to the industry requirements.&lt;/b&gt;
        &lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Session 1 (11:00 - 13:00*): Quick recap of the earlier workshop. Description and focus area of the center. Feedback about the interdisciplinary program in IT and Social Sciences.&lt;/li&gt;
&lt;li&gt;Session 2 (14:00 - 16:00)*: Discussion on industry requirement and absorption criterion.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/workshop-on-center-for-it-and-society'&gt;https://cis-india.org/internet-governance/news/workshop-on-center-for-it-and-society&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-23T14:05:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch">
    <title>How private companies are using Aadhaar to try to deliver better services (but there's a catch)</title>
    <link>https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch</link>
    <description>
        &lt;b&gt;They are gathering more information on you.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;section class="columns large-6 normal-article-content scroll-article-content article-content"&gt;
&lt;div class="article-body"&gt;
&lt;p&gt;The article by M. Rajshekhar was &lt;a class="external-link" href="http://scroll.in/bulletins/40/delays-in-indias-infrastructure-projects-has-a-large-impact-on-key-social-indicators"&gt;published in Scroll.in&lt;/a&gt; on December 22, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In  2006, Ajay Trehan set up AuthBridge, a background verification company  in Gurgaon. That was a time when business process outsourcing was  booming. Global companies like Citibank were relocating back-office  functions to India. Outfits like AuthBridge sprang up in response to  help these companies find qualified staffers. They vetted applicants by  running identity checks, verifying education and employment records,  doing reference checks and more.&lt;/p&gt;
&lt;p&gt;Ten years later, AuthBridge’s  client profile has changed. With rising insecurity over crimes in  India’s cities, like the December 2012 gangrape in Delhi, or the rape of  a young woman in an Uber taxi in 2014, local companies – sizeably from  e-commerce and businesses with delivery services – have also started  vetting employees and partners to check if they have any criminal  history.  “Now, we have about 700-800 clients,” said Trehan. “Of them,  just 20%-30% are foreign companies.”&lt;/p&gt;
&lt;p&gt;AuthBridge’s verification  process has changed too. Earlier, its employees used to physically  verify the credentials of an applicant by travelling to her school or  college, meeting her previous employer, vetting her identity papers with  the government department that issued them, and so on.&lt;/p&gt;
&lt;p&gt;Now they simply run a query on an electronic database.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Aadhaar enters the private sector&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Aadhaar,  as India’s Unique Identity Project is called, aims to give a 12-digit  unique identity number to all residents by collecting their fingerprint  and iris scans. As of September, its database, maintained by the Unique  Identity Authority of India, held the names, addresses and biometric  information of more than 105 crore people.&lt;/p&gt;
&lt;p&gt;The project was created  by the United Progressive Alliance government in 2009 to reduce  leakages in the country’s welfare programmes.&lt;/p&gt;
&lt;p&gt;But, quietly, a  range of private sector companies have started using it. This includes  verification firms like Authbridge, banks like HDFC, telecommunications  companies like Reliance Jio, among others.&lt;/p&gt;
&lt;p&gt;So far, most  discussions on Aadhaar have focused on its utility for welfare delivery  and the risk of government surveillance. But as private sector companies  incorporate Aadhaar into their systems, fresh questions and concerns  are emerging about what this means. A recent tweet by a journalist that  went viral encapsulated these concerns.&lt;/p&gt;
&lt;figure class="cms-block-embed-twitter cms-block-embed cms-block"&gt; &lt;/figure&gt;
&lt;p&gt;To understand the rewards and risks of the use of Aadhaar by  private companies, here is a detailed look at how they are using it.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Five ways of using Aadhaar&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;The first way in which companies are using Aadhaar is &lt;b&gt;pure authentication. &lt;/b&gt;This  is how Authbridge uses Aadhaar. It sends a name and Aadhaar number to  the Unique Identity Authority’s server, which responds to say whether  they have matched.&lt;/p&gt;
&lt;p&gt;Apart from background verification companies,  Aadhaar-based authentication can also be used by employers. “A factory  hiring women or a security agency hiring guards and wanting to be sure  these people are who they claim to be,” said Pramod Varma, the chief  architect and technology advisor for the Aadhaar project.&lt;/p&gt;
&lt;p&gt;It could  also be used by regulated entities with strong Know Your Customer or  KYC norms like banks or telecommunications companies. In the old days of  branch-based banking, KYC was not a problem, said Varma, since “the  bank manager knew all his customers”. But now, KYC is much harder since  banks have moved to “core banking with millions of accounts in the  server”. Instant Aadhaar-authentication, he said, is useful for  verifying customers.&lt;/p&gt;
&lt;p&gt;The second is &lt;b&gt;authentication plus&lt;/b&gt;.  Here, at the time of authentication, a company also downloads the  customer’s data from the Aadhaar database. This is what companies like  Reliance Jio are doing.&lt;/p&gt;
&lt;p&gt;When a customer provides his Aadhaar  number to the company, the company not only runs a query on the Aadhaar  database to verify the name and number, it also downloads other  information about the customer held on the server, like address, date of  birth and gender.&lt;/p&gt;
&lt;p&gt;This data can be used to electronically fill  out the Know Your Customer forms, replacing what is right now a manual  process, said Anupam Varghese, the head (products) of Eko India  Financial Services, a financial services startup in the phone banking  and remittances segment.&lt;/p&gt;
&lt;p&gt;It is a disruptive proposition that  companies find useful. In India, the cost of enrolling customers is so  high, said Abhishek Sinha, the founder of Eko, that it prices a set of  financial products beyond the reach of most Indians. “Authenticating a  credit card customer and vetting her identity papers will cost anywhere  between Rs 150-Rs 200,” he said. A company can recover that investment  only if the customer racks up at least Rs 10,000 on the card, assuming a  2% margin on card transactions.&lt;/p&gt;
&lt;p&gt;With its instant authentication  and automatic form filling, Aadhaar-based electronic Know Your Customer,  said Sinha, slashes those costs and makes it easier for companies to  offer financial products which become viable even with a smaller volume  of transactions. This allows the growth of financial products for less  affluent customer segments.&lt;/p&gt;
&lt;p&gt;Subsequently, these companies might pad up those databases by adding their own data. This is a third model of using Aadhaar: &lt;b&gt;authentication plus private database&lt;/b&gt;.&lt;/p&gt;
&lt;p&gt;For instance, &lt;a href="http://scroll.in/article/805467/how-the-government-gains-when-private-companies-use-aadhaar"&gt;TrustID&lt;/a&gt;,  a mobile app which claims it can verify “your maid, driver,  electrician, tutor, tenant and all service professionals” using Aadhaar,  wants users to rate the services of the people they eventually employ.  In effect, it is &lt;a href="http://scroll.in/article/805467/how-the-government-gains-when-private-companies-use-aadhaar"&gt;creating&lt;/a&gt; a private database.&lt;/p&gt;
&lt;p&gt;Others, like Eko, are adding financial transaction histories to the Aadhaar data.&lt;/p&gt;
&lt;p&gt;While these three uses are built around Aadhaar-based authentication, the remaining three uses – &lt;b&gt;database sharing, data broking, &lt;/b&gt;&lt;b&gt;deduplication&lt;/b&gt;&lt;b&gt; &lt;/b&gt;– pivot around use of just the Aadhaar number. They are based on recent changes in how companies use customer data.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;The customer data boom&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Customer data has acquired centrality for several Indian companies, particularly startups in e-commerce and financial services.&lt;/p&gt;
&lt;p&gt;In  some sectors, Varma said, “the cost of switching [between rival  companies] is very low,” which heightens the need for customisation.  “The better you can serve, they more sticky you get for a customer.” In  other sectors, said Varghese, competition chips away at margins. Which  is another reason to try and come up with better services and products.&lt;/p&gt;
&lt;p&gt;This is where data can help.&lt;/p&gt;
&lt;p&gt;In  a conversation in October, Nandan Nilekani, software entrepreneur and  the first chairperson of the Unique Identity Authority of India,  explained why. “Companies like Ola compete with global companies like  Uber which have a tremendous advantage in that they have more data –  more customers globally – and better algorithms,” he said. If Ola has 5  million customers, Uber has 100 million. Which means Uber’s algorithms –  thanks to pattern recognition and machine learning – will be more  accurate.&lt;/p&gt;
&lt;p&gt;For all these reasons, said Varma, companies in a  handful of business verticals are trying to create “a 360 degree view of  their customer”.&lt;/p&gt;
&lt;p&gt;What has enabled this is a couple of  technological trends. The ability to store and process data, said  Nilekani, has gone up enormously in the last 15 years. At the same time,  data itself has proliferated as electronic devices like mobile phones  create records of voice, photos, messages and the locations of  customers.&lt;/p&gt;
&lt;p&gt;“All this is realtime data. So, on scale, speed and frequency, we have seen a jump,” said Nilekani.&lt;/p&gt;
&lt;p&gt;This rising appetite for data is resulting in a couple of novel outcomes.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Enter, the sharing of customer data&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Indian companies have begun sharing databases.&lt;/p&gt;
&lt;p&gt;A  good example is an experimental partnership between Eko, the banking  and remittances company, and Capital Float, a financial services startup  which gives short term loans.&lt;/p&gt;
&lt;p&gt;The two companies worked out an  arrangement where Eko shared a part of its database about its  distributors with Capital Float. This shared information contained  aggregated and anonymised information on distributors and their working  capital positions, said Varghese. Capital Float evaluated the database  and came back with a list of distributors it could lend to. Eko, then,  forwarded these offers to the distributors. After taking their consent,  data about the distributors who were interested in the loans was shared  with Capital Float.&lt;/p&gt;
&lt;p&gt;On the surface, this is a counter-intuitive  development: if customer data holds the key to competitive advantage,  companies should closely safeguard their data.&lt;/p&gt;
&lt;p&gt;But as it turns out, there are strong reasons to share data.&lt;/p&gt;
&lt;p&gt;Both  Eko and Capital Float, for instance, are small, specialised players in  the financial services market which is dominated by banks. Data sharing  is one way to compete with banks by offering complementary services to  customers.&lt;/p&gt;
&lt;p&gt;It is not clear how endemic data-sharing will get.  According to Varma, it will be used selectively. “I cannot see  organisations sharing databases at will,” he said. “They will be shared  only if they can be used to offer an additional service to the client.”&lt;/p&gt;
&lt;p&gt;But a programmer who works at iSpirt, a product software evangelising association&lt;b&gt; &lt;/b&gt;based  in Bangalore, and who did not want to be identified, said the trend  will grow. In the financial sector, as new players like mobile wallet  companies acquire more customers, banks that refuse to share data will  miss out on emergent markets, he said. “Keeping everything behind closed  doors – not participating in data exchanges – is now harmful,” he said.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, who heads the Centre For Internet and Society,  foresees the rise of another kind of data-sharing – by companies that  aggregate customer data from multiple sources and market that to  clients. These could be data brokers like US-based Acziom, he said.  These could also be more specialised firms like medical transcription  companies, which simultaneously serve hospitals, insurance and  pharmaceutical companies.&lt;/p&gt;
&lt;p&gt;The question is: what does all this have to do with Aadhaar?&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;The utility of Aadhaar&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Aadhaar makes it easier to &lt;b&gt;compare and combine diverse databases.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;This is what India’s microfinance companies are doing. As &lt;i&gt;Scroll.in&lt;/i&gt; reported &lt;a href="http://scroll.in/article/817366/despite-the-supreme-court-you-need-aadhaar-to-get-a-loan-from-microfinance-companies"&gt;recently&lt;/a&gt;,  Microfinance Institutions Network, an association of microlenders, has  told its member companies to seed the Aadhaar numbers of their borrowers  into their databases. By searching the databases for the Aadhaar number  of a prospective borrower, it will be possible to identify if she has  already taken too many loans.&lt;/p&gt;
&lt;p&gt;This is a scenario Nilekani bristles  at. “You do not need Aadhaar for that,” he said. “You can triangulate  databases using email or phone number or name.”&lt;/p&gt;
&lt;p&gt;But the iSpirt  programmer said, “With Aadhaar, the level of certainty is higher than  what you would get by using name, phone number or email.” Between  databases, the spelling of names might vary. Phone numbers change,  especially in a country like India where prepaid mobile connections  outnumber postpaid connections. Only a small part of the country’s  population uses email. With Aadhaar, said the programmer, it gets easier  to correlate databases.&lt;/p&gt;
&lt;p&gt;Aadhaar, added Varma, can also be used  to clean up databases. Banks, he said, can use the Aadhaar number to  create better customer profiles by identifying all accounts owned by a  person. This is the fifth use – &lt;b&gt;deduplication&lt;/b&gt;&lt;b&gt;. &lt;/b&gt;&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;What it all means&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;The  implications are obvious. A lot of companies already had databases  about their customers. Now, as Nilekani said, technology is allowing the  collection of ever greater amounts of information about us. The sharing  of databases means companies will have ever more detailed customer  profiles.&lt;/p&gt;
&lt;p&gt;In a sense, we are entering a future where multiple  databases – including several that we are not even aware of – will  contain information about us. A hospital and an insurance company might  share their records. Or intermediary companies, which service both of  them, might create their own databases.&lt;/p&gt;
&lt;p&gt;This information will  materially affect our lives. As already happens online, companies will  increasingly base their products on algorithms that parse data about our  behaviour and then offer a customised price – which could be geared to  serve or exploit us.&lt;/p&gt;
&lt;p&gt;These algorithms, as &lt;i&gt;Propublica&lt;/i&gt; &lt;a class="link-external" href="https://www.propublica.org/series/machine-bias" rel="nofollow" target="_blank"&gt;reported&lt;/a&gt;, can be &lt;a class="link-external" href="https://www.propublica.org/series/machine-bias" rel="nofollow" target="_blank"&gt;opaque&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In  a sense, much of this is a familiar trajectory. The United States too,  as the iSpirt programmer said, “saw a lot of irresponsible data sharing  without enough control for civilians”.&lt;/p&gt;
&lt;p&gt;That is where India is heading as well. As &lt;i&gt;Scroll &lt;/i&gt;noted in its &lt;a href="http://scroll.in/article/805467/how-the-government-gains-when-private-companies-use-aadhaar"&gt;article&lt;/a&gt; about TrustID, when the company creates scores for the workers who use  its app, they might not always be aware of that rating – or be in a  position to challenge that rating.&lt;/p&gt;
&lt;p&gt;There are large questions here.  Who owns the data about you in a company’s database? Take your  information in, say, Ola’s database – the address from where you get  picked up or dropped, the phone number, the places you visit most often.  Is the data owned by you, Ola or the driver? Should you have a say if a  company wants to share this data? If you grant permission, how does one  ensure it is used correctly?&lt;/p&gt;
&lt;p&gt;Right now, as the next story in this series will show, this is a poorly regulated landscape.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;This is the third part in a series on the expansion of Aadhaar and the concerns around it. The first two parts can be read &lt;a href="http://scroll.in/tags/38792/identity-project"&gt;here.&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;i class="mail-us-section"&gt;We welcome your comments at &lt;a href="mailto:?Subject=How%20private%20companies%20are%20using%20Aadhaar%20to%20try%20to%20deliver%20better%20services%20%28but%20there%27s%20a%20catch%29&amp;amp;to=letters@scroll.in" target="_blank"&gt;letters@scroll.in.&lt;/a&gt;&lt;/i&gt; 
&lt;ul class="article-tags-list"&gt;
&lt;/ul&gt;
&lt;/section&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch'&gt;https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-23T02:04:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-eu-and-free-flows-of-data-data-protection-trade-and-law-enforcement">
    <title>The EU and Free Flows of Data - Data Protection, Trade and Law Enforcement</title>
    <link>https://cis-india.org/internet-governance/news/the-eu-and-free-flows-of-data-data-protection-trade-and-law-enforcement</link>
    <description>
        &lt;b&gt;Amelia Andersdotter, Cofounder of Dataskydd.net, Distinguished Fellow, Centre for Internet and Society and former Member of the European Parliament gave a talk on December 14, 2016 at the Department of European Studies in Manipal. &lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/european-studies-guest-lecture/view"&gt;Download the brochure&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-eu-and-free-flows-of-data-data-protection-trade-and-law-enforcement'&gt;https://cis-india.org/internet-governance/news/the-eu-and-free-flows-of-data-data-protection-trade-and-law-enforcement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-22T16:01:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-in-vinita-govindarajan-shrutisagar-yamunan-with-power-phone-and-internet-services-affected-chennai-is-still-recovering-from-cyclone-vardah">
    <title>With power, phone and internet services affected, Chennai is still recovering from Cyclone Vardah</title>
    <link>https://cis-india.org/internet-governance/news/scroll-in-vinita-govindarajan-shrutisagar-yamunan-with-power-phone-and-internet-services-affected-chennai-is-still-recovering-from-cyclone-vardah</link>
    <description>
        &lt;b&gt;Nearly a week after Cyclone Vardah rattled the city, bringing normal life to a halt for a few days, Chennai is still reeling from the aftershock of the powerful storm.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Vinita Govindarajan and Sruthisagar Yamunan was &lt;a class="external-link" href="http://scroll.in/article/824445/with-power-phone-and-internet-services-affected-chennai-is-still-recovering-from-cyclone-vardah"&gt;published by Scroll.in&lt;/a&gt; on December 20, 2016 quoted Udbhav Tiwari&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;With powerful winds that blew up to the speed of 120 kmph, around one  lakh trees were estimated to have have been uprooted across the city by  the cyclone, causing a loss of almost one-fourth of the city’s foliage,  reported &lt;i&gt;The Hindu&lt;/i&gt;. Many of these trees fell on transmission  lines, damaging them severely and cutting power supply to scores of  residential areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Employees of Chennai’s city corporation and  electricity board were seen hard at work throughout the week, clearing  the streets of fallen trees and repairing electricity lines. But with  frequent power cuts and sporadic phone and internet signals, the city is  still on the long route to restoration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A senior official of the  Tamil Nadu Electricity Board said that their  personnel have been  working every hour to ensure that normalcy returns to  the city as soon  as possible. “We  have restored power to over 80% of Chennai,” he said.  “The rest is also  get  intermittent power. By Monday morning, the whole  city would be covered.”&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;Slow business&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For  Senthil Kumar, who runs a tiffin business in East Tambaram in South  Chennai, there  was no power from Monday, when the cyclone stuck, till  Saturday morning. “For three days after the cyclone, we couldn’t open  our shop,” he said. “On Friday,  we decided to get the food prepared  outside and bring it here. We served  dosas and idlis without chutney  and only sambhar. We’ve lost a week’s  business. But you can’t blame the  government. They have done well to  restore everything so quickly.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Local  businesses depending on internet and phone lines to receive orders were  also deeply affected. Moremilaga, a hyperlocal startup that delivers  homemade food to customers across the city, said that even though they  did not receive their usual number of orders over phone and internet,  they managed to surprise their regular customers with packets of food.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Many  of the people who we give food to are elderly people,” said Ragini  Murali, who is in-charge of the start-up’s operations. “We felt really  bad that we could not give them food for a day because they cannot cook  on their own or buy from a store. They depend on our food and were very  relieved when we delivered food even when they could not reach us.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Business  is slowly coming back to normal except that now Moremilaga is receiving  only 20% of its orders through internet, whereas earlier it was 50%,  said Viji Ganesh, the founder of the enterprise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maligai Kadai, an  online grocery delivery business in Chennai, was shut from Monday  through Wednesday. Satish Sundaram, founder of Maligai Kadai, said that  the online store hardly received any orders this week because of  internet problems across the city. But he said that even delivery of  orders placed prior to the storm was a problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We couldn’t do  anything,” said Sundaram. “We had to postpone the delivery of orders  placed on Sunday because many of our customers left the city immediately  after the storm. In other cases, we could not reach our customers on  phone to find out if their area was accessible. If the roads were  blocked with fallen trees, we would have to come back all the way.”&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;Why no internet?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Five  days after the storm, communication signals were still erratic. Airtel  subscribers across the country received messages that the cyclone in  Chennai had affected one of their undersea network cables which in turn  might slow down internet speeds. Subscribers to BSNL, Vodafone and other  telecommunication operators were also facing similar difficulties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reason for this slow speed, explained Udbhav Tiwari, a policy  officer at The Centre for Internet and Society, was that operators were  having to reroute their traffic to other undersea cables  that travel  using longer, convoluted routes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The data takes long to  travel,  since it does not travel efficiently enough,” he said. “So if you  search for  something on the internet, it will open only after a minute  because the packet had  to travel the other three-fourth of the world to  reach you instead of the  shortest route.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Undersea cables, Tiwari explained, are usually owned by a   combination of telecom companies as well as companies whose sole job is  to lay these cables and rent them to individuals who will run their  traffic through them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These companies map out a route decided by  demand between certain key  points, hire a ship that trawls the ocean  sea floor and lays and  maintains cables, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the  entirety of Asia, the Singaporean and Japanese region are the main hubs  for internet exchange, Tiwari said, since they are considered reliable  and commercially viable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Undersea cables almost always end in  big cites,“ Tiwari said, “because of the  infrastructure required to  operate them. On the eastern  side of India, Chennai is one of  the   best places to set up an end point for an undersea cable since it is a  metropolitan city and closer to hubs like Japan and Singapore.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If  one of these lines near Chennai are broken, he said, it is very  likely  that the data would slow down because they  have to find alternative  routes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A severe cyclone or tsunami definitely has the  potential to disturb or snap these  sea cables,” Tiwari said. “But if  maintenance is not carried out on them regularly enough,  they can break  for far more mundane reasons such as high water pressure, rust, debris  falling from other ships or even sea animals.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-in-vinita-govindarajan-shrutisagar-yamunan-with-power-phone-and-internet-services-affected-chennai-is-still-recovering-from-cyclone-vardah'&gt;https://cis-india.org/internet-governance/news/scroll-in-vinita-govindarajan-shrutisagar-yamunan-with-power-phone-and-internet-services-affected-chennai-is-still-recovering-from-cyclone-vardah&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-20T16:50:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/decoding-the-digital-winter-school-at-iiit-bangalore">
    <title>"Decoding the Digital"- Winter School at IIIT Bangalore</title>
    <link>https://cis-india.org/internet-governance/news/decoding-the-digital-winter-school-at-iiit-bangalore</link>
    <description>
        &lt;b&gt;The Centre for IT and Public Policy at IIIT Bangalore organized a winter school from December 12 to 14, 2016 at the IIIT campus on Decoding the Digital, where the theme for the same was Smart Cities and Social Media. Vanya Rakesh participated in it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The event &lt;span&gt;&lt;span&gt;involved &lt;span&gt;lectures,  interactive discussions, film screenings and group activities on topics  ranging from smart communities, smart phones, intelligent  transportation, big data, privacy, surveillance, etc. For more inflo, &lt;a class="external-link" href="http://citapp.iiitb.ac.in/news-and-events/conferences-workshops/the-winter-school-decoding-the-digital/"&gt;click here&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/decoding-the-digital-winter-school-at-iiit-bangalore'&gt;https://cis-india.org/internet-governance/news/decoding-the-digital-winter-school-at-iiit-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Smart Cities</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-17T01:39:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/multistakeholder-consultation-on-encryption">
    <title>Multistakeholder Consultation on Encryption</title>
    <link>https://cis-india.org/internet-governance/events/multistakeholder-consultation-on-encryption</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) in collaboration with ORF and Takshashila Institution is organizing a Multi-Stakeholder Consultation on Encryption on December 17, 2016 at TERI in Bengaluru. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The consultation is intended to help shape the discussions around the new draft encryption policy slated to be released sometime early next year. The consultation will be divided into two segments: an open house and a panel discussion with high-level government representatives, including Dr. Gulshan Rai, the National Cyber Security Coordinator. The sessions start at 10.30 a.m. on December 17, 2016 and will go on for until approximately 4.30 p.m.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions themselves will highlight inputs from the three main constituents affected by an encryption policy: civil society and end users, the private sector and government. The range of civil liberties and constitutional rights implicated by encryption, as well as the needs of businesses to secure data flows will be discussed. Government officials too are expected to join the consultation and will provide perspectives on encryption and legitimate access to data for law enforcement purpose.&lt;/p&gt;
&lt;p&gt;For more info reach out to Udbhav Tiwari (&lt;a class="moz-txt-link-abbreviated" href="mailto:udbhav@cisindia.org"&gt;udbhav@cisindia.org&lt;/a&gt;) or Bedavyasa Mohanty (&lt;a class="moz-txt-link-abbreviated" href="mailto:bedavyasam@orfonline.org"&gt;bedavyasam@orfonline.org&lt;/a&gt;)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/multistakeholder-consultation-on-encryption'&gt;https://cis-india.org/internet-governance/events/multistakeholder-consultation-on-encryption&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-17T01:22:35Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/dsci-nasscom-annual-information-security-summit-2016">
    <title>11th DSCI-NASSCOM Annual Information Security Summit 2016</title>
    <link>https://cis-india.org/internet-governance/news/dsci-nasscom-annual-information-security-summit-2016</link>
    <description>
        &lt;b&gt;Udbhav Tiwari participated as a panelist in the 11th DSCI-NASSSCOM Annual Information Security Summit 2016 in New Delhi on December 14, 2016. The event was organized by DSCI and NASSCOM. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Panel was on "Designing Privacy in Data Centric Business Architectures - Designing Privacy in Product, Services &amp;amp; Operations". Udbhav's co-panelists were: Gowree Gokhle, Partner, Nishith Desai Associates - Moderator; Sachin Lodha, Principal Scientist, TCS Innovation Labs; and Ankur Jain, Director IT &amp;amp; CISO, PayU.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion primarily focused on:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Core Principles - Privacy should not solely be governed by laws, regulations and industry codes but should instead be guided by a core set of principles that companies choose to follow uniformly across their international presence. In fact, laws and regulations should form a basic, minimum standard of requirements and actual practice should attempt to follow these principles to ensure true compliance to the ideals of privacy. These core, minimal principles are: Notice, Transparency, Accountability, Security and Use Limitation.&lt;/li&gt;
&lt;li&gt;Privacy as an Incentive - Privacy should be looked at not as a isolated right or legal compliance but an inclusive outlook which can be economically beneficial to both consumer and enterprise facing companies. Customers are increasingly starting to value privacy and providing it in an transparent manner (along with ensuring sufficient modern technical infrastructure) to ensure reliable protection can distinguish business in an increasingly crowded marketplace.&lt;/li&gt;
&lt;li&gt;Sound Technological Bedrock - Privacy as a notion in data (and now big data) centric architectures can only be enforced with modern, secure and open technological processes that ensure policy compliance and provide a clear audit trail for any breaches. Measures such as Homomorphic encryption, Multi-party computation, K-anonymity and Identity Management systems must be explored, tested and implemented according to need and requirements of businesses to ensure adequate privacy protection.&lt;/li&gt;
&lt;li&gt;Need for a clear Indian legal framework - India's current legal framework with regard to privacy ranges from scattered to non existent, so there is a strong need for their to be a strong, clear and uniform legal framework to govern privacy for both Indian citizens as well as interactions with data from other jurisdictions. This will ensure that organisations will have a clear standard to follow, will have an easier time implementing privacy policies avoid sectoral clashes and can be held accountable for any breaches of legal standards. A large part of the work required for this has been done by the Justice AP Shah Committee on Privacy as well.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;For more info &lt;a class="external-link" href="http://www.dsci.in/AISS2016/"&gt;see this page&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/dsci-nasscom-annual-information-security-summit-2016'&gt;https://cis-india.org/internet-governance/news/dsci-nasscom-annual-information-security-summit-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-17T01:14:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/myanmar-digital-rights-forum">
    <title>Myanmar Digital Rights Forum</title>
    <link>https://cis-india.org/internet-governance/news/myanmar-digital-rights-forum</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at the Myanmar Digital Rights Forum in Myanmar on December 14 and 15, 2016. The two day event was organized by Phandeeyar, You Can Do IT, Engage Media and Myanmar Centre for Responsible Business with support form the Embassy of Sweden. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;More than 55 representatives from technology companies, government, media and civil society organizations gathered at the innovation lab Phandeeyar to participate in the Myanmar Digital Rights Forum. The event was organized to address critical digital rights challenges in Myanmar. Participants discussed the issues raised by the increasing access, in recent years,  of large numbers of Myanmar citizens to the internet, social media and  mobile phones. For more info &lt;a class="external-link" href="http://yangon.coconuts.co/2016/12/14/myanmar-digital-rights-forum-proposes-path-away-66d"&gt;see here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/myanmar-digital-rights-forum-agenda.pdf"&gt;Click to read the agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/myanmar-digital-rights-forum'&gt;https://cis-india.org/internet-governance/news/myanmar-digital-rights-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-17T00:44:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-udbhav-tiwari-december-15-2016-curious-case-of-poor-security-in-indian-twitterverse">
    <title>The Curious Case of Poor Security in the Indian Twitterverse</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-udbhav-tiwari-december-15-2016-curious-case-of-poor-security-in-indian-twitterverse</link>
    <description>
        &lt;b&gt;What are the technical, legal and jurisdictional issues around the recent Twitter and email hacks claimed by the ‘Legion Crew’, and what can targeted entities do to better protect themselves?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was originally &lt;a class="external-link" href="http://thewire.in/86946/legion-crew-hack-twitter/"&gt;published in the Wire&lt;/a&gt; on December 15, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The term legion, an oft-referred identity in popular culture, has begun to attain recent notoriety in Indian cyberspace due to the spate of hacks being carried out by a group of hackers calling themselves ‘Legion Crew’. The group has compromised four Twitter and/or email accounts in the past two weeks, with confirmed hacks of Rahul Gandhi, Vijay Mallya, Barkha Dutt and Ravish Kumar. Lalit Modi, Apollo Hospitals and the parliament (sansad) have been singled out as future targets, with dire warnings of catastrophic data leaks if the group were to be investigated by the authorities. The ethical impression of the hacks have been divided, with some segments of the public supporting the supposedly hacktivist outlook of the group while others condemning their actions as reckless and invasive. In the meantime, no individuals or entities have been accused of the hacks by the police, with most reports claiming the foreign origin of the hacks being the biggest impediment to the investigations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A technical and legal perspective&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The hacks first began against the politician Gandhi, whose Twitter account was hacked almost two weeks ago, with various demeaning tweets being posted for a few hours before access to the account was restored to the rightful owner. The same hacks were then carried out on business tycoon Mallya’s Twitter account last Friday but this time around, his bank details (apparently obtained from his compromised email accounts) were also leaked to the public via Twitter. Similar hacks targeting both the Twitter and email accounts of Dutt and Kumar were also carried out the past weekend. Sensitive details and data dumps (around 1.5 GB in size) of the journalists were released to the public, along with escalating warnings about future attacks. The data dumps released by the hackers seemed to be indicative that the hackers obtained far more information than they had disclosed via the Twitter hacks and were willing to leverage this data as ransom. Twitter, via both their Indian policy representatives and their international office, has denied any compromise to their systems and has claimed that all accounts were legitimately accessed with valid credentials at the time of the hacks. This leads to three main questions: How were the Twitter and email accounts hacked? What is the recourse, especially in terms of investigation, available to the afflicted parties and the authorities? What can potential targets do to secure their online presence from such attacks?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regarding their technical nature, all of these hacks were sustained compromises that lasted for a few hours each (a long time in cyberspace) and seemed to be reflective of only a fragment of the power the hackers held over the individual’s online presence. Considering Twitter’s denial that the attacks were due to a security flaw on their end as well as the fact that legitimate login details were used to gain access to the accounts, a rather simple investigation can show that the most likely attack vector used by the Legion Crew for these hacks was a DNS Hijacking attack in combination with a Man in the Middle (MITM) attack. These methods abuse the rather simple and (by default) insecure DNS system that is responsible for directing the world’s Internet traffic including email. While the use of DNS to map websites to the IP address of the systems where they are physically hosted (for instance, www.thewire.in maps to 52.76.81.135 at the time of writing this article) is fairly well known, the DNS system also directs most of the world’s email. Similar to DNS A and AAA name records regarding websites, DNS MX records direct email sent to domain names to the correct email servers where they are processed for storage or forwarding, as required. If these MX records are compromised, then hackers can easily redirect emails sent to legitimate email address of the domain name (for instance, xyz@thewire.in) to whatever system they want, including other compromised email addresses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The original operator of the email account is unaware of any email that is redirected in such a way and has no way of knowing the account has been hacked until they notice they are not consistently receiving emails sent to them, which in well planned hacks can be as for many weeks or even months. These attacks can also be further augmented if the hackers also decide to implement an MITM. In an MITM attack, hackers can redirect all traffic attempting to reach an email account via the MX records to a system they operate by changing the MX records on the domain name server to a malicious system. They can access and store all these emails (along with attachments) via the malicious system and also manipulate the information contained in these emails. Then, either in bulk or selectively, they can re-send the emails to the original email accounts they were intended for from their own servers. The owner will then receive the emails in their inboxes with the apparent impression they are private and being received for the first time. This entire MITM process can be setup in a manner that the emails are rerouted to compromised servers by MX records changes, stored for future analysis and then forwarded to the original recipient account in a matter of seconds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the reliance placed by most websites on email IDs being a primary form of identity authentication, compromising an email ID can give access to most of the social networking, entertainment and even banking websites’ login details of the owner to any individual who has the login details of the account. This is because of the password reset or forgotten password feature available in most services that use only email IDs by default as a form of authenticating account ownership and allowing the user to reset their passwords by setting a reset email to their registered email accounts. Once they gain access to the compromised accounts, hackers can perform these resets with impunity, granting them unrestricted access to the online presence of the owner. In fact, hackers can use these attacks to perform password resets on the email accounts themselves, allowing them unlimited access to past conversation, records and login details that may be stored in the email accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Keeping this background in mind, the most likely methodology behind the hacks is quite simple to explain. The Legion Crew most likely first compromised the email systems of these celebrities by changing the DNS MX records of the email IDs which were registered with Twitter as login IDs for these accounts. This allowed them to redirect emails sent to these email IDs to an alternative system of their choosing. They then used the password reset feature of Twitter, which is similar to those provided by most social networking services, to reset the password of these accounts. However, due to the compromise of the MX records of the domain names used by these celebrities, instead of reaching the inboxes of the entities operating the accounts, the password reset emails were sent to the alternative systems set up by the hackers solely for receiving such emails. After receiving this email, it was a simple matter of resetting the account credentials by clicking on the password reset link on the email and changing the passwords of these accounts to unique passwords only known to the hackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hackers then would (and did) have complete control of the account until the service provider itself intervened and provided an emergency reset along with recommending rectifying the MX records from the malicious one’s inserted by the hackers. The only question left to be answered in the methodology followed by the hackers is how they gained access to the MX records, as DNS records can only be changed using the dashboard of the domain name provider, which in turn is protected by a login password. Allegations have arisen that most (if not all) of the compromised accounts used ‘Net4india’ as their domain name provider. Therefore, it is very possible either that it is a vulnerability on the Net4india systems, an internal compromise of the personnel Net4india and so on leading to access detail to domain name accounts from being compromised. Such security and personnel breaches could have been responsible for providing access to the domain name management dashboard of the hacked celebrities email IDs, after which the attack would have followed the methodology described above by changing the MX records to a malicious system.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jurisdictional issues&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The legal avenues available to the affected parties are fairly clear within the Information Technology Act, 2000 and the Indian Penal Code, 1862. Section 66 and Section 66C of the IT Act, which govern hacking and misuse of passwords respectively, would apply along with possible application of the provisions concerning mischief (Section 425), cheating (Section 420) and extortion (Section 383) of the IPC. However, recent investigations have already begun to show that the various jurisdictional symptoms that plague cybercrimes investigations are also hindering investigations for these hacks. The global nature of the internet ensures that the operating servers, attackers, compromised users and unwitting intermediaries are more often than not all located in different jurisdictions, each with their own set of protections, vulnerabilities and laws. For example, investigations by the Delhi police into IP addresses that accessed Gandhi’s Twitter account during the hack have shown that in the period of few hours the account was accessed from the US, Sweden, Canada, Thailand and Romania. Of course, given the pervasive availability of IP spoofing tools, none of these countries is indicative of the actual location of the hacker. Gaining information from these different servers, in order to trace a route of the hacker’s digital geographical journey, is a bureaucratic and legal nightmare with long delays, unanswered Mutual Legal Assistance Treaty requests and unresponsive service providers being the norm. Like in most cybercrime investigation, if the hackers take certain basic steps to mask their identities and geographical location, their odds being caught by traditional law enforcement are negligible. Investigations that have successfully managed to catch such hacker groups, such as the Project Safe Childhood by the FBI against child pornography on the Tor web, take millions of dollars, months of efforts and a high level of skill. Whether these Twitter hacks will generate the sustained, multijurisdictional effort across law enforcement agencies in India required to catch such crimes remains to be seen. Until then, the questions of attribution, liability and justice will remain unanswered like in a majority of large scale cyber hacks.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Possible measures&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Given that various other targets have already been singled out by the hacker group, the need for vigilance and improved security is greater than ever. One basic measure, easily available within Twitter and most other services, that should be carried out is enabling two factor authentication (2FA) on both email and social media accounts.  2FA ensures that the user has to input a One Time Password (OTP) generated on a separate device (such as a mobile phone) at the time of logging in or resetting the password for the account. This would mean that even if the hackers obtain the password or compromise the emails being sent to an account, they will be unable to login into an account without also being in physical possession of the device with the OTP generation application. If this option, which is already available within Twitter, was enabled for the four accounts that were hacked, for example, they would have remained protected despite the email account compromise. Further, domain name service providers should also implement Domain Name System Security Extensions and Domain Keys Identified Mail to prevent DNS and email hijacking, as was carried out on Net4India servers in these Twitter attacks. Using HTTPS on all pages on websites will also go a long way in preventing spoofing and securing user information in transit. Finally, nothing can replace customer education and awareness as the most effective tool to combat the growing cyber threats faced by the average netizen. The weakest link in a digital system is often the end user. A core set of security measures that can be percolated into common practice will serve as the first and best line of defence against such attacks in the future, for both the common man and celebrities alike.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-udbhav-tiwari-december-15-2016-curious-case-of-poor-security-in-indian-twitterverse'&gt;https://cis-india.org/internet-governance/blog/the-wire-udbhav-tiwari-december-15-2016-curious-case-of-poor-security-in-indian-twitterverse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>udbhav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-17T00:28:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-inputs-to-the-working-group-on-enhanced-cooperation-on-public-policy-issues-pertaining-to-the-internet-wgec">
    <title>Inputs to the Working Group on Enhanced Cooperation on Public Policy Issues Pertaining to the Internet (WGEC) </title>
    <link>https://cis-india.org/internet-governance/blog/cis-inputs-to-the-working-group-on-enhanced-cooperation-on-public-policy-issues-pertaining-to-the-internet-wgec</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) submitted inputs to the Working Group on Enhanced Cooperation on Public Policy Issues Pertaining to the Internet (WGEC) on 15 December 2016. The WGEC sought inputs on two questions that will guide the next meeting of the Working Group which is scheduled to take place on the 26-27 January 2017.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;What are the high level characteristics of enhanced cooperation?&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Tunis Agenda leaves the term “enhanced cooperation” unclearly defined. What is clear, however, is that enhanced cooperation is distinct from the Internet Governance Forum. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;According to Paragraph 69 of the Tunis Agenda, enhanced cooperation will enable &lt;i&gt;"governments, on an equal footing, to carry out their roles and responsibilities, in international public policy issues pertaining to the Internet, but not in the day-to-day technical and operational matters, that do not impact on international public policy issues."&lt;/i&gt; In other words enhanced cooperation should result in in the development and enforcement of international public policy and only &lt;i&gt;"day-to-day technical and operational matters"&lt;/i&gt; with no public policy impact and national public policy is exempt from government-to-government enhanced cooperation. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;According to Paragraph 70, enhanced cooperation includes &lt;i&gt;"development of globally-applicable principles on public policy issues associated with the coordination and management of critical Internet resources." According to the paragraph, “organizations responsible for essential tasks associated with the &lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Internet &lt;/i&gt;should create an environment that facilitates this development of these principles using &lt;i&gt;"relevant international organizations"&lt;/i&gt;. In other words, both Internet institutions [ICANN, ISOC and RIRs] and multilateral organisations [WIPO, ITU, UNESCO etc] should be used to develop principles.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Paragraph 71 gives some further clarity. According to this paragraph, the process for enhanced cooperation should 1) be “started by the UN Secretary General” 2) "involve all stakeholders in their respective roles" 3) "proceed as quickly as possible"  4) be "consistent with legal process"  5) "be responsive to innovation". &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Again according to Paragraph 71, enhanced cooperation should be commenced by "relevant organisations" and should involve "all stakeholders". But only the &lt;i&gt;"relevant organisations shall be requested to provide annual performance reports."&lt;/i&gt; Enhanced cooperation as envisioned in the Tunis Agenda, therefore, calls for a multistakeholder model where each constituency leads the process of developing principles and self-regulatory mechanisms that does involve &lt;i&gt;all&lt;/i&gt;​ stakeholders at all stages, but rather, one that requires participation from &lt;i&gt;relevant&lt;/i&gt;​ stakeholders in accordance with the issue at hand at the relevant stage. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For government-to-government enhanced cooperation, governments need to agree on what is within the exclusive realm of "national public policy" for ex. national security, intellectual property policy, and protection of children online. Governments also need to agree on what is within the remit of “international public policy” for ex. cross border taxation, cross border criminal investigations, cross border hate speech. Once this is done, the governments of the world should pursue the development and enforcement of international law and norms at the appropriate forums if they exist or alternatively they must create new forums that are appropriate.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For enhanced cooperation with respect to non-government "relevant organisations" [different sub-groups within the private sector, technical community and civil society], we believe that the requirements of Paragraph 71 can be understood to mean that enhanced cooperation is the “development of self regulatory norms” as a complement to traditional multilateral norm setting and international law making envisioned in Paragraph 69. In​ other words, the real utility of the multi-stakeholder model is self-regulation by the private sector. Besides the government, it is the private sector that has the greatest capacity for harm and therefore is in urgent need of regulation. The multistakeholder model will best serve its purpose if the end result is that the private sector self-regulates. Most of the harm emerging from large corporations can only be addressed if they agree amongst themselves. Having a centralised or homogenous model of enhanced cooperation will not suffice, the model of cooperation should be flexible in accordance with the issue being brought to the table.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Taking into consideration the work of the previous WGEC and the Tunis Agenda, particularly paragraphs 69-71, what kind of recommendations should we consider? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The previous work of the WGEC is useful as a mapping exercise. However, the working group was unable to agree on a definition of Enhanced Cooperation. In our previous response we have clearly indicated that enhanced cooperation is 1) development of international law and norms by governments at appropriate international/multilateral fora 2) articulation of principles by &lt;i&gt;"organizations responsible for essential tasks associated with the Internet" &lt;/i&gt;and &lt;i&gt;"relevant&lt;/i&gt;​&lt;i&gt; international organizations" &lt;/i&gt;and 3) development of self-regulatory norms and enforcement mechanisms by private sector, technical community and civil society with a priority for the private sector because they have the greatest potential after government for harms. To repeat, the Tunis Agenda makes it very clear that enhanced cooperation is distinct from the IGF. If the IGF is only the learning forum, we need a governance forum like ICANN so that different constituencies can develop self regulatory norms and enforcement mechanisms with inputs from other stakeholder constituencies and the public at large.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-inputs-to-the-working-group-on-enhanced-cooperation-on-public-policy-issues-pertaining-to-the-internet-wgec'&gt;https://cis-india.org/internet-governance/blog/cis-inputs-to-the-working-group-on-enhanced-cooperation-on-public-policy-issues-pertaining-to-the-internet-wgec&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sunil Abraham and Vidushi Marda, with inputs from Pranesh Prakash</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-17T00:20:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
