<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1056 to 1070.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/10th-nlsir-symposium-regulating-e-commerce-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-samarth-bansal-december-5-2016-your-digital-wallet-can-be-a-pickpocket"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-december-2-2016-alnoor-peermohammed-no-laws-in-india-to-protect-customers-if-they-lose-money-during-digital-transactions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-december-1-2016-neha-alawadhi-lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/technology-behind-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-to-bis-on-smart-cities-indicators"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-november-22-2016-chetana-divya-vasudev-caught-in-a-filter-bubble"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-november-20-2016-the-thrill-of-saving-india-from-cybercrime"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/conference-on-the-digitalization-of-the-indian-legal-system"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/10th-nlsir-symposium-regulating-e-commerce-in-india">
    <title>10th NLSIR Symposium - Regulating E-Commerce in India</title>
    <link>https://cis-india.org/internet-governance/news/10th-nlsir-symposium-regulating-e-commerce-in-india</link>
    <description>
        &lt;b&gt;Vidushi Marda participated in a panel at the "10th NLSIR Symposium on Regulating E-Commerce in India" at NSLIU on November 27, 2016 in Bengaluru. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The topic for my session was "Liability Regimes - Ensuring Compliance". I spoke about the various kinds of E-Commerce businesses to consider (from aggregators to platforms to the sharing economy) and focussed on issues surrounding intermediary liability and data protection. The panelists were:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Pranav Mehra, Snapdeal&lt;/li&gt;
&lt;li&gt;Vidushi Marda, Centre for Internet Society&lt;/li&gt;
&lt;li&gt;Arun Prabhu, Partner, Cyril Amarchand Mangaldas&lt;/li&gt;
&lt;li&gt;Arun Binoy Mattamana, Hewlett Packard Enterprise&lt;/li&gt;
&lt;li&gt;Aditya Mudgal, Hindustan Unilever Ltd&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/nlsr-symposium-on-regulating-e-commerce-in-india/view"&gt;Click to see more info&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/10th-nlsir-symposium-regulating-e-commerce-in-india'&gt;https://cis-india.org/internet-governance/news/10th-nlsir-symposium-regulating-e-commerce-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-06T15:48:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-samarth-bansal-december-5-2016-your-digital-wallet-can-be-a-pickpocket">
    <title>Your digital wallet can be a ‘pickpocket’ </title>
    <link>https://cis-india.org/internet-governance/news/hindu-samarth-bansal-december-5-2016-your-digital-wallet-can-be-a-pickpocket</link>
    <description>
        &lt;b&gt;If you have installed a wallet app on your smartphone, be careful. Many such apps can access data, even sensitive personal information, and have features that do more than just make payments. All that, with your due “permission”.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Samarth Bansal was &lt;a href="http://www.thehindu.com/news/national/Your-digital-wallet-can-be-a-%E2%80%98pickpocket%E2%80%99/article16760772.ece?utm_source=RSS_Feed&amp;amp;utm_medium=RSS&amp;amp;utm_campaign=RSS_Syndication"&gt;published           in the Hindu&lt;/a&gt; on December 5, 2016. Pranesh Prakash was         quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;When installing them, the apps display a list of permissions. The user is prompted to either grant permission to access to SMSs, call records and so on or decline, but the latter means rejecting the download. Barring a small fraction of tech-savvy users, most go with the flow, ignoring the permissions section.&lt;br /&gt;&lt;br /&gt;The Hindu reviewed permissions sought by five wallet applications: MobiKwik, Freecharge, PayTM, Jio Money and Airtel Money.&lt;br /&gt;&lt;br /&gt;Freecharge and Jio Money seek permission to “directly call phone numbers”. The app can call up numbers without notifying you. In fact, Freecharge asks to “read call log”. All five require permission to “read contacts”, which, as PayTM mentions, “gives you the ability to pick a number from contacts for a quick recharge or bill payment” or “helps you send and request money from friends”. FreeCharge and PayTM ask permission to “modify contacts” and “record audio”.&lt;br /&gt;&lt;br /&gt;PayTM is the only one that requests to “read your web bookmarks and history”. According to AndroidPit, an Android-centred news portal, this permission is needed for alternative browsers, back-up tools and possibly some social networking apps. For the rest, it is possibly a way to “spy on user’s browsing behaviour”, the portal says.&lt;br /&gt;Wealth of data&lt;br /&gt;&lt;br /&gt;Pranesh Prakash, policy director at the Centre for Internet and Society, told The Hindu that access to a wealth of data about the user enables various other business models.&lt;br /&gt;&lt;br /&gt;“A mobile wallet application, using location tracking data, can tell a user about the discounts available on a nearby store if the payment is conducted using that platform. If the user is not explicitly made aware of such usage of data, I would call it a misuse of information,” he said. Note that “precise” location tracking feature, via GPS or mobile network, is a feature requested by all.&lt;br /&gt;&lt;br /&gt;For PayTM, there is a mismatch between the complete set of permissions it asks for — as stated in the app store — and the ones it mentions on a dedicated page on its website explaining “PayTM app permissions”. Apart from the six basic features, there is no mention about functions like location tracking or reading web history — which it requires — on the web page.&lt;br /&gt;&lt;br /&gt;“In this regard, PhonePe [another wallet app] is the model to follow: it clearly states the permissions it is seeking and explains why it needs each one of those at the time of set-up.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-samarth-bansal-december-5-2016-your-digital-wallet-can-be-a-pickpocket'&gt;https://cis-india.org/internet-governance/news/hindu-samarth-bansal-december-5-2016-your-digital-wallet-can-be-a-pickpocket&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-05T01:44:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app">
    <title>Developer team fixed vulnerabilities in Honorable PM's app and API</title>
    <link>https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app</link>
    <description>
        &lt;b&gt;The official app of Narendra Modi, the Indian Prime Minister, was found to contain a security flaw in 2015 that exposed millions of people's personal data.  A few days ago a very similar flaw was reported again.  This post by Bhavyanshu Parasher, who found the flaw and sought to get it fixed last year, explains the technical details behind the security vulnerability.&lt;/b&gt;
        &lt;p&gt;&lt;strong&gt;This blog post has been authored by Bhavyanshu Parasher&lt;/strong&gt;. The original post can be&lt;a class="external-link" href="https://bhavyanshu.me/major-security-flaw-pm-app/09/29/2015"&gt; read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;What were the issues?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The main issue was how the app was communicating with the API served by narendramodi.in.&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;ol&gt;
&lt;li&gt;I was able to extract private data, like email addresses, of each registered user just by iterating over user IDs.&lt;/li&gt;
&lt;li&gt;There was no authentication check for API endpoints. Like, I was able to comment as any xyz user just by hand-crafting the requests.&lt;/li&gt;
&lt;li&gt;The API was still being served over HTTP instead of HTTPS.&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;Fixed&lt;/h3&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The most important issue of all. Unauthorized access to personal info, like email addresses, is fixed. I have tested it and can confirm it.&lt;/li&gt;
&lt;li&gt;A check to verify if a valid user is making the request to API endpoint is fixed. I have tested it and can confirm it.&lt;/li&gt;
&lt;li&gt;Blocked HTTP. Every response is served over HTTPS. The people on older versions (which was serving over HTTP) will get a message regarding this. I have tested it. It says something like “Please update to the latest version of the Narendra Modi App to use this feature and access the latest news and exciting new features”. It’s good that they have figuered out a way to deal with people running older versions of the app. Atleast now they will update the app.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;Detailed Vulnerability Disclosure&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Found major security loophole in how the app accesses the “api.narendramodi.in/api/” API. At the time of disclosure, API was being served over “HTTP” as well as “HTTPS”. People who were still using the older version of the app were accessing endpoints over HTTP. This was an issue because data (passwords, email addresses) was being transmitted as plain text. In simple terms, your login credentials could easily be intercepted. MITM attack could easily fetch passwords and email addresses. Also, if your ISP keeps log of data, which it probably does, then they might already have your email address, passwords etc in plain text. So if you were using this app,&lt;strong&gt; I would suggest you to change your password immediately&lt;/strong&gt;. Can’t leave out a possibility of it being compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another major problem was that the token needed to access API was giving a false sense of security to developers. The access token could easily be fetched &amp;amp; anyone could send hand-crafted HTTP requests to the server. It would result in a valid JSON response without authenticating the user making the request. This included accessing user-data (primarily email address, fb profile pictures of those registered via fb) for any user and posting comments as any registered user of the app. There was no authentication check on the API endpoint. Let me explain you with a demo.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The API endpoint to fetch user profile information (email address) was getprofile. Before the vulnerability was fixed, the endpoint was accessible via “http://www.narendramodi.in/api/getprofile?userid=useridvalue&amp;amp;token=sometokenvalue”. As you can see, it only required two parameters. userid, which we could easily iterate on starting from 1 &amp;amp; token which was a fixed value. There was no authentication check on API access layer. Hand-crafting such requests resulted in a valid JSON response which exposed critical data like email addresses of each and every user. I quickly wrote a very simply script to fetch some data to demonstrate. Here is the sample output for xrange(1,10).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/App.png/@@images/7bec3ca6-0808-4d19-9711-bc084b507f61.png" alt="App" class="image-inline" title="App" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not just email addresses, using this method you could spam on any article pretending to be any user of the app. There was no authentication check as to who was making what requests to the API. See,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_App.png/@@images/2e499adb-b621-4bc4-a490-f8957c9ac1d7.png" alt="App" class="image-inline" title="App" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They have fixed all these vulnerabilities. I still believe it wouldn’t have taken so long if I would have been able to get in touch with team of engineers directly right from the beginning. In future, I hope they figure out an easier way to communicate. Such issues must be addressed as soon as they are found but the communication gap cost us lot of time. The team did a great job by fixing the issues and that’s what matters.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;Disclosure to officials&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The email address provided on Google play store returned a response stating “The email account that you tried to reach is over quota”. Had to get in touch with authorities via twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vulnerability disclosed to authorities on 30th sep, 2015 around 5:30 AM&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet1.png" alt="Tweet 1" class="image-inline" title="Tweet 1" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After about 30 hours of reporting the vulnerabillity&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet2.png" alt="Tweet 2" class="image-inline" title="Tweet 2" /&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Proposed Solution&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Consulted &lt;/span&gt;&lt;a href="https://twitter.com/pranesh_prakash"&gt;@pranesh_prakash&lt;/a&gt;&lt;span&gt; as well regarding the issue.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;img src="https://cis-india.org/home-images/Tweet3.png" alt="Tweet 3" class="image-inline" title="Tweet 3" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After this, I mailed them a solution regarding the issues.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion with developer&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Received &lt;strong&gt;phone call&lt;/strong&gt; from a developer. Discussed possible solutions to fix it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;The solution that I proposed could not be implemented &lt;/strong&gt;since the vulnerability is caused by a design flaw that should have been thought about right from the beginning when they started developing the app. It just proved how difficult it is to fix such issues for mobile apps. For web apps, it’s lot easier. Why? Because for mobile apps, you need to consider backward compatibility. If they applied my proposed solution, it would crash app for people running the older versions. Main problem is that &lt;strong&gt;people don’t upgrade to latest versions leaving themselves vulnerable to security flaws&lt;/strong&gt;. The one I proposed is a better way of doing it I think but it will break for people using older versions as stated by the developer. Though, they (developers) have come up with solutions that I think would fix most of the issues and can be considered an alternative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet4.png" alt="Tweet 4" class="image-inline" title="Tweet 4" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Oct 3rd, I received mail from one of the developers who informed me they have fixed it. I could not check it out at that time as I was busy but I checked it around 5 PM. &lt;strong&gt;I can now confirm they have fixed all three issues&lt;/strong&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;Update 12/02/2016&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.dailyo.in/variety/narendra-modi-namo-app-hacker-security-concerns-javed-khatri-demonetisation-survey-bjp-voter-data/story/1/14347.html"&gt;This vulnerability&lt;/a&gt; in NM app is similar to the one I got fixed last year. Like I said before also, the vulnerability is because of how the API has been designed. They released the same patch which they did back then. Removing email addresses from the JSON output is not really a patch. I wonder why would they introduce personal information in JSON output again if they knew that’s a privacy problem and has been reported by me a year back. He showed how he was able to follow any user being any user. Similarly, I was able to comment on any post using account of any user of the app. When I talked to the developer back then he mentioned it will be difficult to migrate users to a newer/secure version of the app so they are releasing this patch for the meantime. It was more of a backward compatibility issue because of how API was designed. The only solution to this problem is to rewrite the API from scratch and add standard auth methods for API. That should take care of most of vulnerabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also read:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.newindianexpress.com/nation/2016/dec/02/narendra-modi-app-hacked-by-youngster-points-out-risk-to-7-million-users-data-1544933--1.html"&gt;Narendra Modi app hacked by youngster, points out risk to 7 million users’ data&lt;/a&gt; (New Indian Express; December 2, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://indiatoday.intoday.in/story/security-22-year-old-hacks-modi-app-private-data-7-million/1/825661.html"&gt;Security flaw: 22-year-old hacks Modi app and accesses private data of 7 million people&lt;/a&gt; (India Today; December 2, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://thewire.in/84148/tech-security-namo-api/"&gt;The NaMo App Non-Hack is Small Fry – the Tech Security on Government Apps Is Worse&lt;/a&gt; (The Wire; December 3, 2016)&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app'&gt;https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Hacking</dc:subject>
    
    
        <dc:subject>Mobile Apps</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    

   <dc:date>2016-12-04T19:08:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-december-2-2016-alnoor-peermohammed-no-laws-in-india-to-protect-customers-if-they-lose-money-during-digital-transactions">
    <title>No laws in India to protect customers if they lose money during digital transactions</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-december-2-2016-alnoor-peermohammed-no-laws-in-india-to-protect-customers-if-they-lose-money-during-digital-transactions</link>
    <description>
        &lt;b&gt;The lack of basic privacy and security laws pertaining to digital payments in India puts the onus on consumers who use such services.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Alnoor Peermohamed was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/no-laws-in-india-to-protect-customers-if-they-lose-money-during-digital-transactions-116120200342_1.html"&gt;published by Business Standard &lt;/a&gt;on December 2, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India lacks laws to protect consumers if they lose money during &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Digital+Transactions" target="_blank"&gt;digital transactions &lt;/a&gt;even as the government pushes for a less-cash economy after it withdrew Rs 500 and Rs 1,000 currency notes as the legal tender.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Modi government's &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Demonetisation" target="_blank"&gt;demonetisation &lt;/a&gt;move  might have warranted an increase in transaction activity on digital  wallets, but measures to ensure the underlying cyber security parameters  for digital payments is still kept largely under the ambit of the  Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We don't have any dedicated law on digital payments. That's very  important to grant complete legality and remove and doubts and  clarifications pertaining to legal efficacies and legal validity of  digital payments," says Pavan Duggal, an advocate in the Supreme Court  specialising in cyber law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Reserve Bank of India usually sets security and privacy  standards for banks in the country, the various digital wallets such as  Paytm, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Freecharge" target="_blank"&gt;Freecharge &lt;/a&gt;and  Mobikwik fall under the category of Non-banking Financial Corporations  (NBFCs) excluding them from this. For FinTech companies, security  compliance falls under just Section 43 A of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today, transactions between a user and a mobile wallet service provider  are merely contractual agreements which can always be repudiated.  There's a heightened need to legally back digital payments in India, not  only to ensure the safety of consumer money but also for the safety of  these companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;Since the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Demonetisation" target="_blank"&gt;demonetisation &lt;/a&gt;on November 8, digital wallet firms such as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Paytm" target="_blank"&gt;Paytm &lt;/a&gt;have seen  35 million transactions by users to either buy goods and services, or transfer funds to another account. Rival &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Freecharge" target="_blank"&gt;Freecharge &lt;/a&gt;has tied up with police forces of Mumbai to pay traffic fines using its platform.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;Research by  Bengaluru-based think tank Centre for Internet and Society (CIS)  shows that some of India's largest technology companies still do not comply with Section 43 A.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;"We have a minimal data protection law in our IT Act and that will apply to all the FinTech players. But our ISPs and Telcos don't comply with Section 43 A, so you can imagine in the FinTech sector the compliance will be even lower," says Sunil Abraham, Executive Director at CI&lt;br /&gt;&lt;br /&gt;The lack of basic privacy and security laws pertaining to digital payments in India puts the onus on consumers who use such services. While the issue is not being completely ignored by the authorities, some of the proposed workarounds such as creating a virtual sandbox around digital payment services raised questions.&lt;br /&gt;&lt;br /&gt;The RBI limits the maximum balance on digital wallets to Rs 10,000 per user, ensuring that in the case of a breach the damage caused to a consumer is minimal but on November 23, the banking regulator increased the limit to Rs 20,000 .&lt;br /&gt;&lt;br /&gt;Just last week India's largest digital wallet provider Paytm rolled out the option for customers to increase their wallet balance to a maximum of Rs 100,000 by getting a KYC check done.&lt;br /&gt;&lt;br /&gt;"There are no legal mechanisms available should there be disputes pertaining to digital payments,"aid Duggal. He added that there are  no effective remedy mechanisms available in case money  in the digital payment ecosystem gets lost, hacked, stolen or misused.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;While laws might take years to be framed and implemented, Abraham says there are temporary workarounds with which the overall cyber security of digital payment services can be improved. Under Section 43 A there are provisions to allow a sector to form a consortium that mutually agrees to set security standards, which all players must follow and is valid in the court of law during dispute resolution.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;This move is encouraged by experts as governments often lack the bandwidth to define sectoral specific laws but is where private sector expertise can go a long way. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-december-2-2016-alnoor-peermohammed-no-laws-in-india-to-protect-customers-if-they-lose-money-during-digital-transactions'&gt;https://cis-india.org/internet-governance/news/business-standard-december-2-2016-alnoor-peermohammed-no-laws-in-india-to-protect-customers-if-they-lose-money-during-digital-transactions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-02T17:07:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-december-1-2016-neha-alawadhi-lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome">
    <title>Lack of clarity about cashless and online transactions makes digital payments more worrisome</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-december-1-2016-neha-alawadhi-lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome</link>
    <description>
        &lt;b&gt;Even as demonetisation pushes for more and more cashless and online transactions through, e-wallets, banks and other such apps, there is a serious lack of clarity on how these companies handle customer data, and how it is shared with other entities.  "Data is the new oil," is an oft repeated phrase in nearly every technology related conversation that comes up anywhere in India today.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neha Alawadhi was &lt;a class="external-link" href="http://economictimes.indiatimes.com/industry/banking/finance/banking/lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome/articleshow/55714435.cms"&gt;published in the Economic Times&lt;/a&gt; on December 1, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;However, the handling of this data, most of which carries some of our most personal information, has little protection if it is misused by a private or government entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sample this: at an industry event, a Bengaluru-based startup claimed to solve the problem of credit worthiness of individuals for small loans by using some unusual means. To determine credit worthiness, the company maps everything in your phone — right from how many SMSes you receive for non-payment of dues, to how you fill out your loan application form. The company also claims that it can map, using your phone data, the area of your residence and office.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several other companies, especially those in the financial technology (fintech) space, doing similar mapping. The Wall Street Journal on Monday reported that more than three dozen local governments across China are compiling digital records of social and financial behaviour to rate credit worthiness. A person gets a score deduction for violations such as fare cheating, jaywalking and violating family-planning rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Lack of clarity about cashless and online transactions makes digital payments more worrisome" class="gwt-Image" src="http://img.etimg.com/photo/55714471/untitled-27.jpg" title="Lack of clarity about cashless and online transactions makes digital payments more worrisome" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India may be some distance away from such a credit scoring system, but the increased use of online transactions — financial or otherwise — is sure to lead to similar business models.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"You have no clue what data you are sharing with fintech companies. They are collecting data from other sources and combining it to assess your credit score," said Sunil Abraham, executive director of the Centre for Internet Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, there is no clarity on what an e-wallet company does with your details and transaction history even after you delete the app. "If there is large level of customer migration of users from an app company, they will just become a data analytics company. The bigger danger in future is the growth of large data intermediaries which are similar to Visa and Mastercard networks, which purchase big databases and further sell this data and build their services or product on top of that. There are large privacy concerns there," said Apar Gupta, advocate and Internet policy expert. While lack of a privacy law or controller has been a long standing concern, the existing law for data protection — Section 43(A) of the Information Technology Act— also offers only very basic protection and is "grossly inadequate", according to Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To make matters worse, they also lack a strict enforcement mechanism. "We don’t know what are the data practices (adopted by apps). There is no privacy controller or some other body, so it is very difficult for a user to know what are the actual ways their data is being implemented," said Gupta.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have also been cases of government entities making sensitive and personal information public. Earlier this year, DataMeet, a community of data science enthusiasts, found that Bengaluru Police released 13,000 call data records (CDR) of potential on-going investigations during a hackathon with focus on solving problems of cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There has been very little talk about data ethics and data practices in India. But cases of misuse of data are frequent," noted DataMeet member Srinivas Kodali in a blogpost.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-december-1-2016-neha-alawadhi-lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome'&gt;https://cis-india.org/internet-governance/news/economic-times-december-1-2016-neha-alawadhi-lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-02T16:20:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/technology-behind-big-data">
    <title>The Technology behind Big Data</title>
    <link>https://cis-india.org/internet-governance/blog/technology-behind-big-data</link>
    <description>
        &lt;b&gt;The authors undertakes a high-level literature review of the most commonly used technological tools and processes in the big data life cycle. The big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/technology-behind-big-data.pdf/view"&gt;Download the Paper&lt;/a&gt; (PDF, 277 kb)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Defining big data is a disputed area in the field of computer science&lt;a name="_ftnref1" href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, there is some consensus on a basic structure to its definition&lt;a name="_ftnref2" href="#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. Big data is data that is collected in the form of datasets that has three main criteria: size, variety &amp;amp; velocity, all of which operate at an immense scale&lt;a name="_ftnref3" href="#_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. It is ‘big’ in size, often running into petabytes of information, has vast variety within its components, and is created, captured and analysed at an incredibly rapid velocity. All of this also makes big data difficult to handle using traditional technological tools and techniques.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This paper will attempt to perform a high-level literature review of the most commonly used technological tools and processes in the big data life cycle. The big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes. The big data life cycle consists of four components, which will also be the key structural points of the paper, namely: Data Acquisition, Data Awareness, Data Analytics &amp;amp; Data Governance.&lt;strong&gt;&lt;sup&gt;4&lt;/sup&gt; &lt;/strong&gt;The paper will focus on the aspects that the author believes are relevant for analysing the technological impact of big data on both technology itself and society at large.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Scope: &lt;/strong&gt;The scope of the paper is to study the technology used in big data using the "Life Cycle of Big Data" as model structure to categorise &amp;amp; study the vast range of technologies that are involved in big data. However, the paper will be limited to the study of technology related directly to the big data life cycle. It shall specifically exclude the use/utilisation of big data from its scope since big data is most often being fed into other, unrelated technologies for consumption leading to rather limitless possibilities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Goal:&lt;/strong&gt; Goal of the paper is twofold: a.) to use the available literature on the technological aspects of big data, to perform a brief overview of the technology in the field and b.) to frame the relevant research questions for studying the technology of big data and its possible impact on society.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Acquisition&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Acquiring big data has two main sub components to it, the first being sensing the existence of the data’ itself and the second, the stage of collecting and storing this data. Both of these subcomponents are incredibly diverse fields, with lots of rapid change occurring in the technology utilised to carry out these tasks. The section will provide a brief overview of the subcomponents and then discuss the technology used to fulfil the tasks.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Sensing&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data does not exist in a vacuum and is always created as a part of a larger process, especially in the aspect of modern technology. Therefore, the source of the data itself plays a vital role in determining how it can be captured and analysed in the larger scheme of things. Entities constantly emit information into the environment that can be utilised for the purposes of big data, leading to two main kinds of data: data that is “born digital” or “born analogue.”&lt;a name="_ftnref4" href="#_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Born Digital Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Information that is “born digital,” is created, by a user or by a digital system, specifically for use by a computer or data‐processing system. This is a vast range of information and newer fields are being added to this category on a daily basis. It includes, as a short, indicative list: email and text messaging, any form of digital input, including keyboards, mouse interactions and touch screens, GPS location data, data from daily home appliances (Internet of Things), etc. All of this data can be tracked and tagged to users as well as be aggregated to form a larger picture, massively increasing the scope of what may constitute the ‘data’ in big data.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Some indicative uses of how such born digital data is catalogued by technological solutions on the user side, prior to being sent for collection/storage are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a.) Cookies - There are small, often just text, files that are left on user devices by websites in order to that visit, task or action (for example, logging into an email account) with a subsequent event.&lt;a name="_ftnref5" href="#_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (for example, revisiting the website)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b.) Website Analytics&lt;a name="_ftnref6" href="#_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - Various services, such as Google Analytics, Piwik, etc., can use JavaScript and other web development languages to record a very detailed, intimate track of a user's actions on a website, including how long a user hovers above a link, the time spent on the website/application and in some cases, even the time spent specific aspects of the page.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c.) GPS&lt;a name="_ftnref7" href="#_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - With the almost pervasive usage of smartphones with basic location capabilities, GPS sensors on these devices are used to provide regular, minute driven updates to applications, operating systems and even third parties about the user's location. Modern variations such as A-GPS can be used to provide basic positioning information even without satellite coverage, vastly expanding the indoor capabilities of location collection.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;All of these instances of sensing born digital data are common terms, used in daily parlance by billions of people from all over the world, which is a symbolic of just how deeply they have pervaded into our daily lifestyle. Apart from privacy &amp;amp; security concerns this in turn also leads to an exponential increase in the data available to collect for any interested party.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Sensor Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Information is said to be&amp;nbsp; “analogue” when it contains characteristics of the physical world, such as images, video, heartbeats, etc.&amp;nbsp; Such information becomes electronic when processed by a “sensor,” a device that can record physical phenomena and convert it into digital information. Some examples to better illustrate information that is born analogue but collected via digital means are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a.) Voice and/or video content on devices - Apart from phone calls and other forms communication, video and voice based interactions have started to regularly be captured to provide enhanced services. These include Google Now&lt;a name="_ftnref8" href="#_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Cortana&lt;a name="_ftnref9" href="#_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and other digital assistants as well as voice guided navigation systems in cars, etc.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b.) Personal health data such as heartbeats, blood pressure, respiration, velocity, etc. - This personal, potentially very powerful information is collected by dedicated sensors on devices such as Fitbit&lt;a name="_ftnref10" href="#_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Mi Band&lt;a name="_ftnref11" href="#_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, etc. as well as by increasingly sophisticated smartphone applications such as Google Fit that can do so without any special device.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c.) Camera on Home Appliances - Cameras and sensors on devices such as video game consoles (Kinect&lt;a name="_ftnref12" href="#_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; being a relevant example) can record detailed human interactions, which can be mined for vast amounts of information apart from carrying out the basic interactions with the devices itself.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While not as vast a category as born digital data, the increasingly lower costs of technology and ubiquitous usage of digital, networked devices is leading to information that was traditionally analogue in nature to be captured for use at a rapidly increasing rate.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Collection &amp;amp; Storage&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Traditional data was normally processed using the Extract, Transform, Load (ETL) methodology, which was used to collect the data from outside sources, modify the data to fit needs, and then upload the data into the data storage system for future use.&lt;a name="_ftnref13" href="#_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Technology such as spreadsheets, RDBMS databases, Structured Query Languages (SQL), etc. were all initially used to carry out these tasks, more often than not manually. &lt;a name="_ftnref14" href="#_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, for big data, the methodology traditionally followed is both inefficient and insufficient to meet the demands of modern use. Therefore, the Magnetic, Agile, Deep (MAD) process is used to collect and store data&lt;a name="_ftnref15" href="#_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref16" href="#_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The needs and benefits of such a system are: attracting all the data sources regardless of their quality (magnetic), logical and physical contents of storage systems adapting to the rapid data evolution in big data (agile) and complex algorithmic statistical analysis required of big data on a very short notice&lt;a name="_ftnref17" href="#_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. (deep)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The technology used to perform data storage using the MAD process requires vast amount of processing power, which is very difficult to create in a single, physical space/unit for nonstate or research entities, who cannot afford supercomputers. Therefore, most solutions used in big data rely on two major components to store data: distributed systems and Massive Parallel Processing&lt;a name="_ftnref18" href="#_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (MPP) that run on non-relational (in-memory) database systems. Database performance and reliability is traditionally gauged using pure performance metrics (FLOPS per second, etc.) as well as the Atomicity, consistency, isolation, durability (ACID) criteria.&lt;a name="_ftnref19" href="#_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The most commonly used database systems for big data applications are given below. The specific operational qualities and performance of each of these databases is beyond the scope of this review but the common criteria that makes them well suited for big data storage have been delineated below.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Non-relational databases&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Databases traditionally used to be structured entities that operated solely on the ability to correlate information stored in them using explicitly defined relationships. Even prior to the advent of big data, this outlook was turning out to be a limiting factor in how large amounts of stored information could be leveraged, this led to the evolution of non relational database systems. Before going into them in detail, a basic primer on their data transfer protocols will be helpful in understanding their operation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A protocol is a model that structures instructions in a particular manner so that it can be reproduced from one system to another&lt;a name="_ftnref20" href="#_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref21" href="#_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The protocols which govern technology in the case of big data have gone through many stages of evolution, starting off with simple HTML based systems&lt;a name="_ftnref22" href="#_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which then evolved to XML driven SOAP systems&lt;a name="_ftnref23" href="#_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which led to JavaScript Object Notation, or JSON&lt;a name="_ftnref24" href="#_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the currently used form for in most big database systems. JSON is an open format used to transfer data objects, using human-readable text and is the basis for most of the commonly used non-relational database management systems. Examples of Non-relational databases also known as NoSQL databases, include MongoDB&lt;a name="_ftnref25" href="#_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Couchbase&lt;a name="_ftnref26" href="#_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, etc. They were developed for both managing as well as storing unstructured data. They aim for scaling, flexibility, and simplified development. Such databases rather focus on the high-performance scalable data storage, and allow tasks to be written in the application layer instead of databases specific languages, allowing for greater interoperability.&lt;a name="_ftnref27" href="#_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;In-Memory Databases&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In order to overcome performance limitation of traditional database systems, some modern databases now use in-memory databases. These systems manage the data in the RAM memory of the server, thus eliminating storage disk input/output. This allows for almost realtime responses from the database, in comparisons to minutes or hours required on traditional database systems. This improvement in the performance is so massive that, entirely new applications are being developed for using IMDB systems.&lt;a name="_ftnref28" href="#_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These IMDB systems are also being used for advanced analytics on big data, especially to increase the access speed to data and increase the scoring rate of analytic models for analysis.&lt;a name="_ftnref29" href="#_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Examples of IMDB include VoltDB&lt;a name="_ftnref30" href="#_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, NuoDB&lt;a name="_ftnref31" href="#_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, SolidDB&lt;a name="_ftnref32" href="#_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Apache Spark&lt;a name="_ftnref33" href="#_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Hybrid Systems&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;These are the two major systems used to store data prior to it being processed or analysed in a big data application. However, the divide between data storage and data management is a slim one and most database systems also contain various unique attributes that cater them to specific kinds of analysis. (as can be seen from the IMDB example above) One example of a very commonly used Hybrid system that deals with storage as well as awareness of the data is Apache Hadoop&lt;sup&gt;33&lt;/sup&gt;, which is detailed below.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Apache Hadoop&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Hadoop consists of two main components: the HDFS for the big data storage, and MapReduce for big data analytics, each of which will be detailed in their respective section.&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;The HDFS&lt;a name="_ftnref34" href="#_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref35" href="#_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; storage function in Hadoop provides a reliable distributed file system, stored across multiple systems for processing &amp;amp; redundancy reasons. The file system is optimized for large files, as single files are split into blocks and spread across systems known as cluster nodes.&lt;a name="_ftnref36" href="#_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Additionally, the data is protected among the nodes by a replication mechanism, which ensures availability even if any node fails. Further, there are two types of nodes: Data Nodes and Name Nodes.&lt;a name="_ftnref37" href="#_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Data is stored in the form of file blocks across the multiple Data Nodes while the Name Node acts as an intermediary between the client and the Data Node, where it directs the requesting client to the particular Data Node which contains the requested data.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;This operating structure for storing data also has various variations within Hadoop such as HBase for key/value pair type queries (a NoSQL based system), Hive for relational type queries, etc. Hadoop’s redundancy, speed, ability to run on commodity hardware, industry support and rapid pace of development have led to it being almost co-equivalently associated with big data.&lt;a name="_ftnref38" href="#_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Awareness&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Awareness, in the context of big data, is the task of creating a scheme of relationships within a set of data, to allow different users of the data to determine a fluid yet valid context and utilise it for their desired tasks.&lt;a name="_ftnref39" href="#_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is a relatively new field, in which most of the work is currently being done on semantic structures to allow data to gain context in an interoperable format, in contrast to the current system where data is given context using unique, model specific constructs.&lt;a name="_ftnref40" href="#_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (such as XML Schemes, etc.)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Some of the original work on this field was carried out in the form of utilising the Resource Description Framework (RDF), which was built primarily to allow describing of data in a portable manner, especially being agnostic towards platforms and systems for Semantic Web at the W3C. SPARQL is the language used to implement RDF based designs but both largely remain underutilised in both the public domain as well as big data. Authors such as Kurt&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Cagle&lt;a name="_ftnref41" href="#_ftn41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Bob DuCharme&lt;a name="_ftnref42" href="#_ftn42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; predict its explosion in the next couple of years. Companies have also started realising the value of interoperable context, with Oracle Spatial&lt;a name="_ftnref43" href="#_ftn43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and IBM’s DB2&lt;a name="_ftnref44" href="#_ftn44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; already including RDF and SPARQL support in the past 3 years.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While underutilised, the rapid developments taking place in the field will make the impact that data awareness may have on big data as big as Hadoop and maybe even SQL. Some aspects of it are already beginning to be used in Artificial Intelligence, Natural Language Processing, etc. with tremendous scope for development.&lt;a name="_ftnref45" href="#_ftn45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Processing &amp;amp; Analytics&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Processing largely has three primary goals: a. determines if the data collected is internally consistent; b. make the data meaningful to other systems or users using either metaphors or analogy they can understand; and (what many consider most importantly) provide predictions about future events and behaviours based upon past data and trends.&lt;a name="_ftnref46" href="#_ftn46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Being a very vast field with rapidly changing technologies governing its operation, this section will largely concentrate on the most commonly used technologies in data analytics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Data analytics requires four primary conditions to be met in order to carry out effective processing: fast, data loading, fast query processing, efficient utilisation of storage and adaptivity to dynamic workload patterns. The analytical model most commonly associated with meeting this criteria and with big data in general is MapReduce, detailed below. There are other, more niche models and algorithms (such as Project Voldemort&lt;a name="_ftnref47" href="#_ftn47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; used by LinkedIn), which are used in big data but they are beyond the scope of the review, and more information about them can be read at article linked in the previous citation. (Reference architecture and classification of technologies, products and services for big data system)&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;MapReduce&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;MapReduce is a generic parallel programming concept, derived from the “Map” and “Reduce” of functional programming languages, which makes it particularly suited for big data operations. It is at the core of Hadoop&lt;a name="_ftnref48" href="#_ftn48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and performs the data processing and analytics functions in other big data systems as well.&lt;a name="_ftnref49" href="#_ftn49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The fundamental premise of MapReduce is scaling out rather than scaling up, i.e., (adding more numerical resources, rather than increasing the power of a single system)&lt;a name="_ftnref50" href="#_ftn50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;MapReduce operates by breaking a task down into steps and executing the steps in parallel, across many systems. This comes with two advantages, a reduction in the time needed to finish the task and also a decrease in the amount of resources one has to expend to perform the task, in both power and energy. This model makes it ideally suited for the large data sets and quick response times required of big data operations generally.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The first step of a MapReduce job is to correlate the input values to a set of keys/value pairs as output. The “Map” function then partitions the processing tasks into smaller tasks, and assigns them to the appropriate key/value pairs.&lt;a name="_ftnref51" href="#_ftn51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This allows unstructured data, such as plain text, to be mapped to a structured key/value pair. As an example, the key could be the punctuation in a sentence and the value of the pair could be the number of occurrences of the punctuation overall. This output of the Map function is then passed on “Reduce” function.&lt;a name="_ftnref52" href="#_ftn52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Reduce then collects and combines this output, using identical key/value pairs, to provide the final result of the task.&lt;a name="_ftnref53" href="#_ftn53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These steps are carried using the Job Tracker &amp;amp; Task Tracker in Hadoop but different systems have different methodologies to carry out similar tasks.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Governance&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Governance is the act of managing raw big data as well as the processed information that arises from big data in order to meet legal, regulatory and business imposed requirements. While there is no standardized format for data governance, there have been increasing call with various sectors (especially healthcare) to create such a format to ensure reliable, secure and consistent big data utilisation across the board. The following tactics and techniques have been utilised or suggested for data governance, with varying degrees of success:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Zero-knowledge systems&lt;/strong&gt;: This technological proposal maintains secrecy with respect to the low-level data while allowing encrypted data to be examined for certain higherlevel abstractions.&lt;a name="_ftnref54" href="#_ftn54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For the system to be zero-knowledge, the client’s system will have to encrypt the data and send it to the storage provider. Due to this, the provider stores the data in the encrypted format and cannot decipher the same unless he/she is in possession of the key which will decrypt the data into plaintext. This allows the individual to store his data with a storage provider while also maintaining anonymity of the details contained in such information. However, these are currently just beginning to be used in simple situations. As of now, they are not expandable to unstructured and complex cases and have to be developed marginally before they can be used for research and data mining purposes.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Homomorphic encryption&lt;/strong&gt;: Homomorphic encryption is a privacy preserving technique which performs searches and other computations over data that is encrypted while also protecting the individual’s privacy.&lt;a name="_ftnref55" href="#_ftn55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This technique has however been considered to be impractical and is deemed to be an unlikely policy alternative for near future purposes in the context of preserving privacy in the age of big data.&lt;a name="_ftnref56" href="#_ftn56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-party computation&lt;/strong&gt;: In this technique, computation is done on encrypted distributed data stores.&lt;a name="_ftnref57" href="#_ftn57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This mechanism is closely related to homomorphic encryption where individual data is kept private using encryption algorithms called “collusion-robust” while the same is used to calculate statistics.&lt;a name="_ftnref58" href="#_ftn58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The parties involved are aware of some private data and each of them use a protocol which produces results based on the information they are aware of and the information they are not aware of, without revealing the data they are not already aware of.&lt;a name="_ftnref59" href="#_ftn59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Multi-party computations thus help in generating useful data for statistical and research purposes without compromising the privacy of the individuals.&lt;/li&gt;&lt;/ol&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Differential Privacy&lt;/strong&gt;: Although this technological development is related to encryption, it follows a different technique. Differential privacy aims at maximizing the precision of computations and database queries while reducing the identifiability of the data owners who have records in the database, usually through obfuscation of query results.&lt;a name="_ftnref60" href="#_ftn60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This is widely applied today in the existence of big data in order to ensure preservation of privacy while trying to reap the benefits of large scale data collection.&lt;a name="_ftnref61" href="#_ftn61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Searchable encryption&lt;/strong&gt;: Through this mechanism, the data subject can make certain data searchable while minimizing exposure and maximizing privacy.&lt;a name="_ftnref62" href="#_ftn62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The data owner can make his information available through search engines by providing the data in an encrypted format but by adding tags consisting of certain keywords which can be deciphered by the search engine. This encrypted data shows up in the search results when searched with these particular keywords but can only be read when the person is in possession of the key which is required for decrypting the information.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;This technique of encryption provides maximum security to the individual’s data and preserves privacy to the greatest possible extent.&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;K-anonymity&lt;/strong&gt;: The property of k-anonymity is being applied in the present day in order to preserve privacy and avoid re-identification.&lt;a name="_ftnref63" href="#_ftn63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A certain data set is said to possess the property of k-anonymity if individual specific data can be released and used for various purposes without re-identification. The analysis of the data should be carried out without attributing the data to the individual to whom it belongs and should give scientific guarantees for the same.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identity Management Systems&lt;/strong&gt;: These systems enable the individuals to establish and safeguard their identities, explain those identities with the help of attributes, follow the activity of their identities and also delete their identities if they wish to.&lt;a name="_ftnref64" href="#_ftn64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It uses cryptographic schemes and protocols to make anonymous or pseudonymous the identities and credentials of the individuals before analysing the data.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Privacy Preserving Data Publishing&lt;/strong&gt;: This is a method in which the analysts are provided with the individual’s personal information with the ability to decipher particular information from the database while preventing the inference of certain other information which might lead to a breach of privacy.&lt;a name="_ftnref65" href="#_ftn65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Data which is essential for the analysis will be provided for processing while sensitive data will not be disclosed. This tool primarily focuses on microdata.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Privacy Preserving Data Mining&lt;/strong&gt;: This mechanism uses perturbation methods and randomization along with cryptography in order to permit data mining on a filtered version of the data which does not contain any form of sensitive information. PPDM focuses on data mining results unlike PPDP.&lt;a name="_ftnref66" href="#_ftn66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/li&gt;&lt;/ol&gt;
&lt;h2 style="text-align: justify;"&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Studying the technology surrounding big data has led to two major observations: the rapid pace of development in the industry and the stark lack of industry standards or government regulations directed towards big data technologies. These observations have been the primary motivating factor for framing further research in the field. Understanding how to deal with big data technologically, rather than just the potential regulation of possible harms after the technological processes have been performed might be critical for the human rights dialogue as these processes become even more extensive, opaque and technologically complicated.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; EMC: Data Science and Big Data Analytics. In: EMC Education Services, pp. 1–508 (2012)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; Bakshi, K.: Considerations for Big Data: Architecture and Approaches. In: Proceedings of the IEEE Aerospace Conference, pp. 1–7 (2012)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt; Adams, M.N.: Perspectives on Data Mining. International Journal of Market Research 52(1), 11–19 (2010) &lt;sup&gt;4&lt;/sup&gt; Elgendy, N.: Big Data Analytics in Support of the Decision Making Process. MSc Thesis, German University in Cairo, p. 164 (2013)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt; Big Data and Privacy: A Technological Perspective - President’s &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Council of Advisors on Science and&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Technology (May 2014)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt; Chen, Hsinchun, Roger HL Chiang, and Veda C. Storey. "Business Intelligence and Analytics: From Big Data to Big Impact." MIS quarterly 36.4 (2012): 1165-1188.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt; Chandramouli, Badrish, Jonathan Goldstein, and Songyun Duan. "Temporal analytics on big data for web advertising." 2012 IEEE 28th international conference on data engineering. IEEE, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt; Laurila, Juha K., et al. "The mobile data challenge: Big data for mobile computing research." Pervasive Computing. No. EPFL-CONF-192489. 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt; Lazer, David, et al. "The parable of Google flu: traps in big data analysis." &lt;em&gt;Science&lt;/em&gt; 343.6176 (2014): 12031205.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt; Banaee, Hadi, Mobyen Uddin Ahmed, and Amy Loutfi. "Data mining for wearable sensors in health monitoring systems: a review of recent trends and challenges." &lt;em&gt;Sensors&lt;/em&gt; 13.12 (2013): 17472-17500.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt; Chung, Eric S., John D. Davis, and Jaewon Lee. "Linqits: Big data on little clients." &lt;em&gt;ACM SIGARCH Computer Architecture News&lt;/em&gt;. Vol. 41. No. 3. ACM, 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt; Kornelson, Kevin Paul, et al. "Method and system for developing extract transform load systems for data warehouses." U.S. Patent No. 7,139,779. 21 Nov. 2006.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt; Henry, Scott, et al. "Engineering trade study: extract, transform, load tools for data migration." &lt;em&gt;2005 IEEE Design Symposium, Systems and Information Engineering&lt;/em&gt;. IEEE, 2005.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt; Cohen, Jeffrey, et al. "MAD skills: new analysis practices for big data." &lt;em&gt;Proceedings of the VLDB Endowment&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt; .2 (2009): 1481-1492.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt; Elgendy, Nada, and Ahmed Elragal. "Big data analytics: a literature review paper." &lt;em&gt;Industrial Conference on Data Mining&lt;/em&gt;. Springer International Publishing, 2014.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt; Wu, Xindong, et al. "Data mining with big data." &lt;em&gt;IEEE transactions on knowledge and data engineering&lt;/em&gt; 26.1 (2014): 97-107.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt; Supra Note 17&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt; Hu, Han, et al. "Toward scalable systems for big data analytics: A technology tutorial." &lt;em&gt;IEEE Access&lt;/em&gt; 2 (2014):&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt; -687.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt; Kurt Cagle, Understanding the Big Data Lifecycle - LinkedIn Pulse (2015)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt; Coyle, Frank P. &lt;em&gt;XML, Web services, and the data revolution&lt;/em&gt;. Addison-Wesley Longman Publishing Co., Inc., 2002.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt; Pautasso, Cesare, Olaf Zimmermann, and Frank Leymann. "Restful web services vs. big'web services: making the right architectural decision." &lt;em&gt;Proceedings of the 17th international conference on World Wide Web&lt;/em&gt;. ACM, 2008.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt; Banker, Kyle. &lt;em&gt;MongoDB in action&lt;/em&gt;. Manning Publications Co., 2011&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt; McCreary, Dan, and Ann Kelly. "Making sense of NoSQL." &lt;em&gt;Shelter Island: Manning&lt;/em&gt; (2014): 19-20.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn27" href="#_ftnref27"&gt;[27]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn28" href="#_ftnref28"&gt;[28]&lt;/a&gt; Zhang, Hao, et al. "In-memory big data management and processing: A survey." &lt;em&gt;IEEE Transactions on Knowledge and Data Engineering&lt;/em&gt; 27.7 (2015): 1920-1948.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn29" href="#_ftnref29"&gt;[29]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn30" href="#_ftnref30"&gt;[30]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn31" href="#_ftnref31"&gt;[31]&lt;/a&gt; Supra Note 20&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn32" href="#_ftnref32"&gt;[32]&lt;/a&gt; Ballard, Chuck, et al. &lt;em&gt;IBM solidDB: Delivering Data with Extreme Speed&lt;/em&gt;. IBM Redbooks, 2011.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn33" href="#_ftnref33"&gt;[33]&lt;/a&gt; Shanahan, James G., and Laing Dai. "Large scale distributed data science using apache spark." &lt;em&gt;Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining&lt;/em&gt;. ACM, 2015. &lt;sup&gt;33&lt;/sup&gt; Shvachko, Konstantin, et al. "The hadoop distributed file system." &lt;em&gt;2010 IEEE 26th symposium on mass storage systems and technologies (MSST)&lt;/em&gt;. IEEE, 2010.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn34" href="#_ftnref34"&gt;[34]&lt;/a&gt; Borthakur, Dhruba. "The hadoop distributed file system: Architecture and design." &lt;em&gt;Hadoop Project Website&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn35" href="#_ftnref35"&gt;[35]&lt;/a&gt; .2007 (2007): 21.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn36" href="#_ftnref36"&gt;[36]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn37" href="#_ftnref37"&gt;[37]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn38" href="#_ftnref38"&gt;[38]&lt;/a&gt; Zikopoulos, Paul, and Chris Eaton. &lt;em&gt;Understanding big data: Analytics for enterprise class hadoop and streaming data&lt;/em&gt;. McGraw-Hill Osborne Media, 2011.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn39" href="#_ftnref39"&gt;[39]&lt;/a&gt; Bizer, Christian, et al. "The meaningful use of big data: four perspectives--four challenges." &lt;em&gt;ACM SIGMOD Record&lt;/em&gt; 40.4 (2012): 56-60.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn40" href="#_ftnref40"&gt;[40]&lt;/a&gt; Kaisler, Stephen, et al. "Big data: issues and challenges moving forward." &lt;em&gt;System Sciences (HICSS), 2013 46th Hawaii International Conference on&lt;/em&gt;. IEEE, 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn41" href="#_ftnref41"&gt;[41]&lt;/a&gt; Supra Note 21&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn42" href="#_ftnref42"&gt;[42]&lt;/a&gt; DuCharme, Bob. "What Do RDF and SPARQL bring to Big Data Projects?." &lt;em&gt;Big Data&lt;/em&gt; 1.1 (2013): 38-41.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn43" href="#_ftnref43"&gt;[43]&lt;/a&gt; Zhong, Yunqin, et al. "Towards parallel spatial query processing for big spatial data." &lt;em&gt;Parallel and &lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Distributed Processing Symposium Workshops &amp;amp; PhD Forum (IPDPSW), 2012 IEEE 26th International&lt;/em&gt;. IEEE, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn44" href="#_ftnref44"&gt;[44]&lt;/a&gt; Ma, Li, et al. "Effective and efficient semantic web data management over DB2." &lt;em&gt;Proceedings of the 2008 ACM SIGMOD international conference on Management of data&lt;/em&gt;. ACM, 2008.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn45" href="#_ftnref45"&gt;[45]&lt;/a&gt; Lohr, Steve. "The age of big data." &lt;em&gt;New York Times&lt;/em&gt; 11 (2012).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn46" href="#_ftnref46"&gt;[46]&lt;/a&gt; Pääkkönen, Pekka, and Daniel Pakkala. "Reference architecture and classification of technologies, products and services for big data systems." &lt;em&gt;Big Data Research&lt;/em&gt; 2.4 (2015): 166-186.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn47" href="#_ftnref47"&gt;[47]&lt;/a&gt; Sumbaly, Roshan, et al. "Serving large-scale batch computed data with project voldemort." &lt;em&gt;Proceedings of the 10th USENIX conference on File and Storage Technologies&lt;/em&gt;. USENIX Association, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn48" href="#_ftnref48"&gt;[48]&lt;/a&gt; Bar-Sinai, Michael. "Big Data Technology Literature Review." &lt;em&gt;arXiv preprint arXiv:1506.08978&lt;/em&gt; (2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn49" href="#_ftnref49"&gt;[49]&lt;/a&gt; ibid&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn50" href="#_ftnref50"&gt;[50]&lt;/a&gt; Condie, Tyson, et al. "MapReduce Online." &lt;em&gt;Nsdi&lt;/em&gt;. Vol. 10. No. 4. 2010.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn51" href="#_ftnref51"&gt;[51]&lt;/a&gt; Supra Note 47&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn52" href="#_ftnref52"&gt;[52]&lt;/a&gt; Dean, Jeffrey, and Sanjay Ghemawat. "MapReduce: a flexible data processing tool." &lt;em&gt;Communications of the ACM&lt;/em&gt; 53.1 (2010): 72-77.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn53" href="#_ftnref53"&gt;[53]&lt;/a&gt; ibid&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn54" href="#_ftnref54"&gt;[54]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn55" href="#_ftnref55"&gt;[55]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Big data for all: Privacy and user control in the age of analytics." &lt;em&gt;Nw. J. Tech. &amp;amp; Intell. Prop.&lt;/em&gt; 11 (2012): xxvii.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn56" href="#_ftnref56"&gt;[56]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn57" href="#_ftnref57"&gt;[57]&lt;/a&gt; Privacy by design in big data, ENISA&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn58" href="#_ftnref58"&gt;[58]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn59" href="#_ftnref59"&gt;[59]&lt;/a&gt; Id&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn60" href="#_ftnref60"&gt;[60]&lt;/a&gt; Id&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn61" href="#_ftnref61"&gt;[61]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Privacy in the age of big data: a time for big decisions." &lt;em&gt;Stanford Law Review Online&lt;/em&gt; 64 (2012): 63.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn62" href="#_ftnref62"&gt;[62]&lt;/a&gt; Lane, Julia, et al., eds. &lt;em&gt;Privacy, big data, and the public good: Frameworks for engagement&lt;/em&gt;. Cambridge University Press, 2014.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn63" href="#_ftnref63"&gt;[63]&lt;/a&gt; Crawford, Kate, and Jason Schultz. "Big data and due process: Toward a framework to redress predictive privacy harms." &lt;em&gt;BCL Rev.&lt;/em&gt; 55 (2014): 93.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn64" href="#_ftnref64"&gt;[64]&lt;/a&gt; http://homes.esat.kuleuven.be/~sguerses/papers/DanezisGuersesSurveillancePets2010.pdf&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn65" href="#_ftnref65"&gt;[65]&lt;/a&gt; Seda Gurses and George Danezis, A critical review of 10 years of privacy technology, August 12th 2010, http://homes.esat.kuleuven.be/~sguerses/papers/DanezisGuersesSurveillancePets2010.pdf&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn66" href="#_ftnref66"&gt;[66]&lt;/a&gt; Id&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/technology-behind-big-data'&gt;https://cis-india.org/internet-governance/blog/technology-behind-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Geethanjali Jujjavarapu and Udbhav Tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-12-04T09:53:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-to-bis-on-smart-cities-indicators">
    <title>Comments to the BIS on Smart Cities Indicators</title>
    <link>https://cis-india.org/internet-governance/blog/comments-to-bis-on-smart-cities-indicators</link>
    <description>
        &lt;b&gt;The Bureau of Indian Standards released the Smart Cities - Indicator on 30 September 2016. The Centre for Internet &amp; Society (CIS) presented its views. &lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/bis-on-smart-cities-indicators.pdf"&gt;&lt;b&gt;View the PDF &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Name of the Commentator/ Organisation: The Centre for Internet and Society, India&lt;/b&gt;&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;b&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p&gt;PRELIMINARY&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt;
&lt;li&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ​Smart Cities - Indicators (dated 30 September 2016), released by the Bureau of Indian Standards (“BIS”).&lt;/li&gt;
&lt;li&gt;CIS is thankful for the opportunity to put forth its views.&lt;/li&gt;
&lt;li&gt;This submission is divided into three main parts. The first part, ‘Preliminary’, introduces the document; the second part, ‘About CIS’, is an overview of the organization; and, the third part contains the ‘Comments’.&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt;
&lt;p&gt;ABOUT CIS&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;CIS is a non-​profit organisation&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, freedom of speech and expression, intermediary liability, digital privacy, and cybersecurity.​&lt;/li&gt;
&lt;li&gt;CIS values the fundamental principles of justice, equality, freedom and economic development. This submission is consistent with CIS' commitment to these values, the safeguarding of general public interest and the protection of India's national interest at the international level. Accordingly, the comments in this submission aim to further these principles.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;III. Comments&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Clause/ Para/ Table/ Figure No. commented &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Comments/Modified Wordings &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Justification of Proposed Change &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;General Comment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The indicators could generally utilize more of smart data, from both&lt;/p&gt;
&lt;p&gt;analog and digital sources, to better reflect the performance of various&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Using technology to gather information rather than limiting its scope to existing mostly non-digital sources of data. There is a lot of potential information,&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;indicators.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;already collected, that simply goes unused or underutilized. Principled use of such information to make informed decisions on key aspects of urban development will lead to ‘truly’ smart cities. Further, the indicators should include actionable aspects and include avenues to leverage research to better their performance. Moreover, indicators that allow for audits for rights and transparency should be focused on as core indicators.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;General Comment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Indicators are limited in scope to basic sustainability.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The indicators in their current form restrict themselves to sustainability, focused on basic sustenance, which seems to limit the scope of the Smart Cities project. Having a core set of indicators that is more relevant to India but also have an optional, more ambitious set of indicators for cities to become truly advanced and for the standard to be more dynamic. Encourage them by leveraging technology in a sustainable, human welfare and development-oriented approach, which the indicators can inculcate.&lt;/p&gt;
&lt;p&gt;Further, policy pivots being driven by these indicators could be given to make the decision making in smart cities more transparent and accountable.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Economy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Granularity of information pertaining to macro-level economic indicators&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;All the indicators in the Economic section pertain to macro-level standards/ indicators. Their limitation is that they provide very little  information about the diversity of the economy of a city, the factors  responsible for positive or negative effects and offer no real way to  encourage microeconomic changes that can lead to the improvement of the  economic condition of a city, aided by modern technology. Example  indicators could be: average GDP of districts within a city, and total  number of operating businesses and merchants in sub-localities in the  city. ​ All of this data can also be used to drive micro policies to  enable localized development.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Education&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Include data at city-level and indicators for higher education.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The indicators measured in the Education section only look at city level information about schools, ignoring district and even school level information already recorded and present in the system. Teacher and student attendance rates, level of basic infrastructure present in schools, presence of toilets for both genders, provisions for meals, etc. are some of the parameters that can be included in the indicator list.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the list completely excludes college  education (both degree and diploma level) as a relevant indicator, nor does it include indicators for the average education of the population of the city, both of which can be easily measured using census data.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Further, d​ata that allows for a holistic decision making process - poverty levels, distance to schools, transportation levels, access to higher learning, etc. can also be used as supporting indicators. These could come from studies already done that call out the factors.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5. Education 5.1, 5.2, 5.3, 5.5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Include gender-specific indicators for students completing primary education, secondary education, and higher education, and enrolled in education institutions.&lt;/p&gt;
&lt;p&gt;Change the term “survival rate” to “retention rate”.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Indicators for the “survival rate” (may be better represented as retention rate) of students who identify as female or transgender in schools and universities, and enrollment of school-aged and college-aged girls, women and transgender students would help work towards an inclusive smart city.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Energy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Better utilisation of data from digital electricity meters.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The advent of digital meters allows for home/business level capturing of energy usage. This information can be leveraged to better target energy leaks, theft, repair work, pricing and even renewable energy incentives.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Finance&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Indicators for digital and cashless payment and transaction systems.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The strong push by the government towards digital payments could also be reflected on the list of indicators, such as the “number of establishments accepting (and not accepting) digital payment systems” being a supporting indicator. Similar standards can be extended to include microfinance (number of avenues available for lending, successful payback of loans, et cetera.)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Governance&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Recommended inclusion of indicators pertaining to the Right to Information Act, 2005&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The number of requests made under the Right to Information Act, 2005, and the time taken by the responding office to reply to them (in terms of the number of days) by the government offices in the city as a relevant factor to gauge transparency and accountability of the governance structures. The same can also be extended to map the parliamentary performance of the elected officials from the city at the state and national level, especially for the interests of the city. Parliamentary performance here would mean attendance records, number of question raised, resources spent on constituency development, et cetera.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10. Governance&lt;/p&gt;
&lt;p&gt;10.2, 10.3, 10.6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Indicators for the number of women and  transgenders elected to public office in the city, employed in the&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;government workforce in the city in reserved positions. Indicators for women and transgendered voters registered as a percentage of the voting-age population.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;In the interest of inclusive smart cities, this indicator would help fathom if positions reserved for women and transgenders are filled out and the possible reasons, if any, for some of them going vacant.The number of women and transgender voters would help track the participation of women and transgendered voters in democracy. Further, inclusion of indicators that check voter fraud, political participation levels and technologies that enable secure voter participation and involvement would also be beneficial.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Health&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;“Cost of basic health services” and number of​ healthcare facilities as a​ supporting indicator.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The cost, quality and access of public primary healthcare services, which can be easily measured using digital systems, should also be included in the overall scheme as a supporting indicator.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Recreation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;“Utilisation of public spaces” as a supporting indicator.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information about the utilisation of public spaces, such as parks  and grounds. can be included as a supporting indicator. Relevant information could footfalls per month or year, number of public events held at these locations, et cetera.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of this information is already present via figures for ticket sales while the rest could be collected using digital attendance systems. Other supporting indicators could include green space per resident, play area/park space per child, quality of the public space - (lack of garbage, sewage, etc).&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Safety&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;“Overall crime reporting statistics”as a core indicator.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The overall incidence rates of various crimes reported, crimes solved, and data regarding investigations (such as mapping of the crime to a map, number of FIR's filed, not filed, outcomes of investigations, etc.) should all be included as core indicators to better gauge the safety record of the city.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Safety 13.3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Include “crimes carried out using technology or the Internet, as per the Criminal Procedure Code and Information Technology Act, 2008 (Amended)”.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This indicator will expand the scope of crimes against women to include acts of crime carried out using the Internet as well.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Safety 13.4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Include “Response time of the police department from the initial call in instances of crimes against women”&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This would include crimes against women as defined in 13.3. This indicator gives more granular information about safety in general and women’s safety in particular, and of the perception of certain kinds of crimes not being serious enough for the police to respond to.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Shelter&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Expansion of indicators to include per capita living space, basic amenities within the houses.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The scope of shelter should be expanded to include per capita living space in housing units as well as availability of basic home amenities to provide a more wholesome view of the living situation in a city. Some basic amenities that could be included are electricity uptime, water distribution (in liters/ per household), number of residents in the household, kind of house roofing, etc.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Telecommunication and Innovation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Inclusion of indicators on mobile phone usage, mobile network connectivity and computer literacy.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;There are no indicators for mobile phone usage and computer literacy, both of which are essential for the healthy functioning of any city. Indicators to gauge this could include number of mobile phone users, number of (active) mobile connections, number of computer literate people, etc. Similar indicators should also be included for cellphone network coverage, public WiFi connectivity and digital public service provisions as well. Indicators for the same could be number of neighbourhoods/ localities/ suburbs covered by 2G/3G/4G/ 5G out of the total number in city, total number of Public WiFi spots per unit area, etc.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Transportation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Inclusion of indicators for efficiency, sustainability and planning of city-level transportation.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The current set of indicators do not include indicators to measure the efficiency, fuel consumption, sustainability and reach of public transport, especially in the outskirts or suburban areas. These can be included as supporting indicators: the number of GPS-connected public transport vehicles to the total number, number of vehicles equipped with panic buttons, quantum of vehicles in the city using renewable energy sources as fuel, automation of toll booths, automation of points where traffic offences can be logged (e.g illegal honking) or overspeeding.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Urban Planning&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Digital information, such as geospatial data, remote sensing and digital mapping can be used to provide better and more sustainable core indicators.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Geo-spatial information (from surveys and satellites) can be utilised to provide macro-level data that can then be utilised to factor city expansions, illegal structures, suburban development, etc. Digital mapping and remote sensing capabilities can be leveraged to provide this information and the utilisation of such information in city development can be made a supporting indicator.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sewerage and Sanitation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Indicators governing community hygiene and sanitation.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information about covered toilets per capita of the population, sewage treatment plants, etc. are either absent or too vaguely detailed in the current set of indicators, despite the push from the government towards the Swachh Bharat programme. They should be included as Core Indicators to encourage sanitation at a citizen level.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Water Supply&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Indicators for digital measurement of water&lt;/p&gt;
&lt;p&gt;consumption per capita and at the city-level.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Digital water meters are starting to become pervasive and can provide detailed information about water consumption at a household level that was previously unavailable in city planning. A supporting indicator at a minimum can be included to further bolster information aware governance in the field.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; This submission is authored, in alphabetical order, by Elonnai Hickok (&lt;span&gt;​&lt;/span&gt;&lt;span&gt;elonnai@cis-india.org&lt;/span&gt;&lt;span&gt;​&lt;/span&gt;), Rohini Lakshané (&lt;span&gt;​&lt;/span&gt;&lt;span&gt;rohini@cis-india.org&lt;/span&gt;&lt;span&gt;​&lt;/span&gt;) and Udbhav Tiwari (&lt;span&gt;​&lt;/span&gt;&lt;span&gt;udbhav@cis-india.org&lt;/span&gt;&lt;span&gt;​&lt;/span&gt;) on behalf of the Centre for Internet and Society, India.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; See The Centre for Internet and Society,available at http://cis​india.org for details of the organization, and our work.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-to-bis-on-smart-cities-indicators'&gt;https://cis-india.org/internet-governance/blog/comments-to-bis-on-smart-cities-indicators&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Rohini Lakshané and Udbhav Tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Smart Cities</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-11T07:56:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion">
    <title>Navigating the 'Reconsideration' Quagmire (A Personal Journey of Acute Confusion)</title>
    <link>https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion</link>
    <description>
        &lt;b&gt;An ​earlier analysis of ICANN’s Documentary Information Disclosure Policy already brought to light our concerns about the lack of transparency in ICANN’s internal mechanisms. Carrying my research forward, I sought to arrive at an understanding of the mechanisms used to appeal a denial of DIDP requests. In this post, I aim to provide a brief account of my experiences with the Reconsideration Request process that ICANN provides for as a tool for appeal.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Backdrop: What is the Reconsideration Request Process?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Reconsideration Request process has been laid down in Article IV, Section 2 of the&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN Bylaws. Some of the key aspects of this provision have been outlined below&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;,&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;ICANN is obligated to institute a process by which a person ​&lt;i&gt;materially affected &lt;/i&gt;​by ICANN action/inaction can request review or reconsideration.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;To file this request, one must have been adversely affected by actions of the staff or the board that contradict ICANN’s policies, or actions of the Board taken up without the Board considering material information, or actions of the Board taken up by relying on false information.&lt;/li&gt;
&lt;li&gt;A separate Board Governance Committee was created with the specific mandate of reviewing Reconsideration requests, and conducting all the tasks related to the same.&lt;/li&gt;
&lt;li&gt;The Reconsideration Request must be made within 15 days of:  
&lt;ul&gt;
&lt;li&gt;FOR CHALLENGES TO BOARD ACTION: the date on which information about the challenged Board action is first published in a resolution, unless the posting of the resolution is not accompanied by a rationale, in which case the request must be submitted within 15 days from the initial posting of the rationale;&lt;/li&gt;
&lt;li&gt;FOR CHALLENGES TO STAFF ACTION: the date on which the party submitting the request became aware of, or reasonably should have become aware of, the challenged staff action, and&lt;/li&gt;
&lt;li&gt;FOR CHALLENGES TO BOARD OR STAFF INACTION: the date on which the affected person reasonably concluded, or reasonably should have concluded, that action would not be taken in a timely manner&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;.The Board Governance Committee is given the power to summarily dismiss a reconsideration request if:  
&lt;ul&gt;
&lt;li&gt;the requestor fails to meet the requirements for bringing a Reconsideration Request;&lt;/li&gt;
&lt;li&gt;it is frivolous, querulous or vexatious; or &lt;/li&gt;
&lt;li&gt;the requestor had notice and opportunity to, but did not, participate in the public comment period relating to the contested action, if applicable&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;If not summarily dismissed, the Board Governance Committee proceeds to review and reconsider.&lt;/li&gt;
&lt;li&gt;A requester may ask for an opportunity to be heard, and the decision of the Board Governance Committee in this regard is final.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The basis of the Board Governance Committee’s action is public written record ­ information submitted by the requester, by third parties, and so on.&lt;/li&gt;
&lt;li&gt;The Board Governance Committee is to take a decision on the matter and make a final determination or recommendation to the Board within 30 days of the receipt of the Reconsideration request, unless it is impractical to do so, and it is accountable to the Board to make an explanation of the circumstances that caused the delay.&lt;/li&gt;
&lt;li&gt;The determination is to be made public and posted on the ICANN website.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;ICANN has provided a neat infographic to explain this process in a simple fashion, and I am reproducing it here:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Reconsideration.jpg" alt="Reconsideration" class="image-inline" title="Reconsideration" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(Image taken from &lt;span&gt;​&lt;/span&gt;&lt;span&gt;https://www.icann.org/resources/pages/accountability/reconsideration­en&lt;/span&gt;​)&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Our Tryst with the Reconsideration Process&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Grievance&lt;/b&gt;&lt;br /&gt;Our engagement with the Reconsideration process began with the rejection of two of our requests (made on September 1, 2015) under ICANN’s Documentary Information Disclosure Policy. The requests sought information about the registry and registrar compliance audit process that ICANN maintains, and asked for various documents pertaining to the same&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Copies of the registry/registrar contractual compliance audit reports for all the audits carried out as well as external audit reports from the last year (2014­2015).&lt;/li&gt;
&lt;li&gt;A generic template of the notice served by ICANN before conducting such an audit.&lt;/li&gt;
&lt;li&gt;A list of the registrars/registries to whom such notices were served in the last year.&lt;/li&gt;
&lt;li&gt;An account of the expenditure incurred by ICANN in carrying out the audit process.&lt;/li&gt;
&lt;li&gt;A list of the registrars/registries that did not respond to the notice within a reasonable period of time.&lt;/li&gt;
&lt;li&gt;Reports of the site visits conducted by ICANN to ascertain compliance.&lt;/li&gt;
&lt;li&gt;Documents which identify the registries/registrars who had committed material discrepancies in the terms of the contract.&lt;/li&gt;
&lt;li&gt;Documents pertaining to the actions taken in the event that there was found to be some form of contractual non­compliance.&lt;/li&gt;
&lt;li&gt;A copy of the registrar self­assessment form which is to be submitted to ICANN.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;ICANN integrated both the requests and addressed them via one response on 1 October, 2015 (which can be found &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​). In their response, ICANN inundated us with already available links on their website explaining the compliance audit process, and the processes ancillary to it, as well as the broad goals of the programme ­ none of which was sought for by us in our request. ICANN then went on to provide us with information on their Three­Year Audit programme, and gave us access to some of the documents that we had sought, such as the pre­audit notification template, list of registries/registrars that received an audit notification, the expenditure incurred to some extent, and so on .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Individual contracted party reports were denied to us on the basis of their grounds for non­disclosure. Further, and more disturbingly, ICANN refused to provide us with the names of the contracted parties who had been found under the audit process to have committed discrepancies. Therefore, a large part of our understanding of the way in which the compliance audit process works remains unfinished.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What we did&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Dissatisfied with this response, I went on to file a Reconsideration request (number 15­22) as per their standard format on November 2, 2015. (The request filed can be accessed &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​).As grounds for reconsideration, I stated that “​&lt;i&gt;As a part of my research I was tracking the ICANN compliance audit process, and therefore required access to audit reports in cases where discrepancies where formally found in their actions. This is in the public interest and therefore requires to be disclosed...While providing us with an array of detailed links explaining the compliance audit process, the ICANN staff has not been able to satisfy our actual requests with respect to gaining an understanding of how the compliance audits help in regulating actions of the registrars, and how they are effective in preventing breaches and discrepancies.&lt;/i&gt;​” Therefore, I requested them to make the records in question publicly available ­ “​&lt;i&gt;We request ICANN to make the records in question, namely the audit reports for individual contracted parties that reflect discrepancies in contractual compliance, which have been formally recognised as a part of your enforcement process. We further request access to all documents that relate to the expenditure incurred by ICANN in the process, as we believe financial transparency is absolutely integral to the values that ICANN stands by.&lt;/i&gt;​”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Board Governance Committee’s response&lt;/b&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The determination of the Board Governance Committee was that our claims did not merit reconsideration, as I was unable to identify any “​&lt;i&gt;misapplication of policy or procedure by the ICANN Staff&lt;/i&gt;​”, and my only issue was with the substance of the DIDP Response itself, and &lt;i&gt;substantial disagreements with a DIDP response are not proper bases for reconsideration &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(emphasis supplied).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The response of the Board Governance Committee was educative of the ways in which they determine Reconsideration Requests. Analysing the DIDP process, it held that ICANN was well within its powers to deny information under its defined Conditions for Non­Disclosure, and denial of substantive information did not amount to a procedural violation. Therefore, since the staff adhered to established procedure under the DIDP, there was no basis for our grievance, and our request was dismissed..&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, as a post­script, it is interesting to note that the Board Governance Committee delayed its response time by over a month, by its own admission ­ “​&lt;i&gt;In terms of the timing of the BGC’s recommendation, it notes that Section 2.16 of Article IV of the Bylaws provides that the BGC shall make a final determination or recommendation with respect to a reconsideration request within thirty days, unless impractical. To satisfy the thirty­day deadline, the BGC would have to have acted by 2 December 2015. However, due to the timing of the BGC’s meetings in November and December, the first practical opportunity for the BGC to consider Request 15­22 was 13 January 2016.&lt;/i&gt;​”&lt;sup&gt;4&lt;/sup&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Whither do I wander now?&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To me, this entire process reflected the absurdity of the Reconsideration request structure as an appeal mechanism under the Documentary Information Disclosure Policy. As our experience indicated, there does not seem to be any way out if there is an issue with the substance of ICANN’s response. ICANN, commendably, is particular about following procedure with respect to the DIDP. However, what is the way forward for a party aggrieved by the flaws in the existing policy? As I had &lt;span&gt;​&lt;/span&gt;&lt;span&gt;analysed&lt;/span&gt; &lt;span&gt;earlier&lt;/span&gt;​, the grounds for ICANN to not disclose information are vast, and used to deny a large chunk of the  information requests that they receive. How is the hapless requester to  file a meaningful appeal against the outcome of a bad policy, if the  only ground for appeal is non­compliance with the procedure of said bad  policy? This is a serious challenge to transparency as there is no other  way for a requester to acquire information that ICANN may choose to  withold under one of its myriad clauses. It cannot be denied that a good  information disclosure law ought to balance the free  disclosure of  information with the holding back of information that truly needs to be  kept private.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, it is this writer’s firm opinion that even instances where  information is witheld, there has to be a stronger explanation for the  same, and moreover, an appeals process that does not take into account  substantive issues which might adversely affect the appellant falls  short of the desirable levels of transparency. Global standards dictate  that grounds for appeal need to be broad, so that all failures to apply  the information disclosure law/policy may be remedied.&lt;sup&gt;6&lt;/sup&gt; Various laws across the world relating to information disclosure often  have the following as grounds for appeal: an inability to lodge a  request, failure to respond to a request within the set time frame, a  refusal to disclose information, in whole or in part, excessive fees and  not providing information in the form sought, as well as a catch­all  clause for other failures.&lt;sup&gt;7&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, independent oversight is the heart of a proper appeal mechanism in such situations&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;;  the power to decide the appeal must not rest with those who also have  the discretion to disclose the information, as is clearly the case with  ICANN, where the Board Governance Committee is constituted and appointed  by the ICANN Board itself [one of the bodies against whom a grievance  may be raised].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Suggestions&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We believe ICANN, in keeping with its global, multistakeholder, accountable spirit, should adopt these standards as well, especially now that the transition looms around the corner. Only then will the standards of open, transparent and accountable governance of the Internet ­ upheld by ICANN itself as the ideal ­ be truly, meaningfully realised. Accordingly, the following standards ought to be met with:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Establishment of an independent appeals authority for information disclosure cases&lt;/li&gt;
&lt;li&gt;Broader grounds for appeal of DIDP requests&lt;/li&gt;
&lt;li&gt;Inclusion of disagreement with the substantive content of a DIDP response as a ground for appeal.&lt;/li&gt;
&lt;li&gt;Provision of proper reasoning for any justification of the witholding of information that is necessary in the public interest.&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr style="text-align: justify; " /&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Article IV, Section 2, ICANN Bylaws, 2014 ​&lt;i&gt;available at &lt;/i&gt;https://www.icann.org/resources/pages/governance/bylaws­en/#IV&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Copies of the request can be found ​ &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​ and &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Katherine Chekouras, ​&lt;i&gt;Balancing National Security with a Community's Right­to­Know: Maintaining &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Public Access to Environmental Information Through EPCRA 's Non­Preemption Clause&lt;/i&gt;​, 34 B.C. Envtl. Aff. L. Rev 107, (2007).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Toby Mendel, &lt;i&gt;Freedom of Information: A Comparative Legal Study&lt;/i&gt;​ ​ 151 (2nd edn, 2008).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;​&lt;i&gt;Id&lt;/i&gt;​, at 152&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;sup&gt;3&lt;/sup&gt;4 Available &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​. https://www.icann.org/en/system/files/files/reconsideration­15­22­cis­final­determination­13jan16­en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Mendel, ​&lt;i&gt;supra &lt;/i&gt;​note 6.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion'&gt;https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah and Geetha Hariharan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-30T13:48:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user">
    <title>Demonetisation Survey Limits the Range of Feedback that can be Provided by the User</title>
    <link>https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user</link>
    <description>
        &lt;b&gt;The government has faced increasingly targeted attacks by the Opposition and the public on the merits of the demonetisation move carried out a fortnight ago. In an attempt to placate this ire and to create a feedback loop that directly engages with the public, the government has decided to conduct a mass survey to gauge public perception. The survey is hosted on the Narendra Modi mobile application that can be found on the Android and iOS app stores. This article will attempt to analyse the mobile application by looking at the design principles followed in the survey and the scope given to survey takers to express their true opinion of the demonetisation move.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.firstpost.com/india/how-narendra-modis-survey-limits-the-range-of-feedback-that-can-be-provided-by-user-3121948.html"&gt;published by First Post&lt;/a&gt; on November 24, 2016.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;At the time of writing, &lt;a href="http://www.firstpost.com/india/demonetisation-despite-fortnight-of-hardship-cash-strapped-india-stands-by-modi-3121690.html" target="_blank"&gt;90 percent of respondents&lt;/a&gt; expressed the feeling that the government's move was 'brilliant/nice'.  However, one must look into the merits of the survey and its limitations  to understand the true value and nature of the results of the survey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first step required in order to take the survey, is  downloading the application itself, which forces the user to  automatically grant access to Contacts, Phone and Storage functions of  their phone. While there are ostensible reasons for these permissions,  (sharing the data from within the application, storing downloaded  information, etc.) unless the user is running Android 6.0 or above, the  user doesn’t have a choice in giving these permissions. This leaves the  application with the potential to collect the entire phone book of the  user as as well as access any files stored on the user’s device. This is  independent of the survey and provides a large scope for massive data  collection from any user just choosing to install the application in the  first place. It is easily possible to create a version of the  application that carries out a vast majority of its current functions  without these permissions and the government (along with the application  developer) should endeavour to do so at the earliest. In the  alternative, they should have a clear and distinct privacy policy that  informs users of the data collection and its possible use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  second major step required to take the survey is the long and tedious  registration process, which requires all sorts of details with massive  privacy implications. This includes the name, email ID, phone number,  residency details, profession and interests, all of which are compulsory  fields. Why all of these details are necessary to take a supposedly  simple survey and what possible use this information can be put to by  the government is both unclear and problematic. It is also possible to  register using Google, Facebook, Twitter and other social networking  sites where there is a varying standard of equally private and  unnecessary information that is being collected by the application from  these websites. There are no privacy notices or consent forms that  govern this information collection nor is their any indication of how  this information will be put to use beyond the scope of the survey. The  generic, standard form privacy policy (less than 10 lines long) on the &lt;a class="auto-link" href="http://www.firstpost.com/topic/person/narendra-modi-profile-20711.html" target="_blank" title="Narendra Modi"&gt;Narendra Modi&lt;/a&gt; website is hidden at the bottom of the application download page (not  in the application itself) and leaves a lot to be desired to safeguard  user interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the registration is complete, the  user is presented with the survey, which has a total of 10 questions of 3  broad categories. 6 of these questions have multiple choice answers, 3  of them have a sliding rating meter and 1 question has general  comments/suggestion page.  The article will now look at these categories  and analyze the design of the questions, the extent of the choice they  give to the users and finally if the survey has a coercive or limiting  effect on the feedback that can be given by the user via the application  regarding the demonetisation move.&lt;/p&gt;
&lt;div class="alignnone wp-caption" id="attachment_3122038" style="text-align: justify; "&gt;&lt;a href="http://s4.firstpost.in/wp-content/uploads/2016/11/Choice_Limiting_Namo.jpg"&gt;&lt;img width="825" alt="Choice limiting multiple=" title="Demonetisation Survey Limits the Range of Feedback that can be Provided by the User" src="https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user" /&gt;&lt;/a&gt;
&lt;p class="wp-caption-text"&gt;Choice limiting multiple choice questions.&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The  first category of questions, the multiple choice questions (MCQ), have  varying degree of choices that the user can select from. However,  regardless of the extent of the choices, their exact nature is severely  limiting and makes it almost impossible to express a truly negative  opinion of the survey. This is done in two ways, first the explicit  restriction of choices and second the more subtle negative colouring of  responses by cleverly phrasing questions. An example of the explicit  restriction of choices can be seen in Question No 7. “Demonetisation  will bring  real estate, higher education, healthcare in common man’s  reach” which has three options, “Completely Agree, Partially Agree and  Can’t Say.” There is no option to disagree with the paradigm set by the  question and neither is there an option for the user to further explain  or elucidate upon the answer, if he/she choose Can’t Say as an option.  This also means that there will be no answers that will have “No” as an  answer to the fairly open ended question, which can have a myriad of  responses. The same can be said for Question No. 6 regarding the  demonetisation move’s effectiveness in curbing illegal activities to  which, once again, “No” is not an answer, with “Don’t Know” being the  best a user disagreeing can do with the survey question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  second, more subtle aspect of the MCQ questions are questions that  serve as bait to demand a positive answer, which can be used to later  bolster the survey's results in a positive light. For example, Question  No. 1 reads “Do you think Black Money exists in India” and Question No. 2  reads “Do you think the evil of Corruption &amp;amp; Black Money needs to  be fought and eliminated?” both of which have simple “Yes” and “No” as  the only two possible responses. These rhetorical questions, which  demand a positive answer, provide almost no aspect for the user to  subtly or explicitly disagree with motivating factor behind the  demonetisation move. The placement of these questions and the lack of  choice in responses that can be given to them leaves huge potential to  tilt the survey results in the favour of the government’s move. For  example, you can’t simultaneously agree that black money is a problem  and think the demonetisation move is a bad idea, simply because you  can’t express that view in a single question within the survey.&lt;/p&gt;
&lt;div class="alignnone wp-caption" id="attachment_3122056" style="text-align: justify; "&gt;&lt;a href="http://s3.firstpost.in/wp-content/uploads/2016/11/Positive-bias.jpg"&gt;&lt;img width="825" alt="Positive bias driven multiple=" title="Demonetisation Survey Limits the Range of Feedback that can be Provided by the User" src="https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user" /&gt;&lt;/a&gt;
&lt;p class="wp-caption-text"&gt;Positive bias driven multiple choice question.&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The  other two categories of questions do not suffer from the overt problems  of encouraging positive bias that the MCQ questions do but leave a fair  bit to be desired in their outlook towards individuals who disagree  with the move. In the sliding rating meter questions, there are strong  visual cues that hint that disagreeing with the demonetisation move is a  negative, undesirable idea. They do so by using a large, danger red  frown as the icon for Question No. 5 that asks for the survey takers  opinion on the ban on old 500 and 1000 rupee notes. The same goes for  Question No. 3 that deals with the general moves of the government to  tackle black money. This makes any opinion or answer that disagrees with  the validity of the move an answer that is portrayed in a negative  light. Similarly, the general comments/suggestion section in Question  No. 10 is the only place for anyone to express a negative or  non-concurring opinion, which there is no way to measure statistically  in the overall survey results and will mostly likely not be counted in  the final survey results.&lt;/p&gt;
&lt;div class="alignnone wp-caption" id="attachment_3122120" style="text-align: justify; "&gt;&lt;a href="http://s1.firstpost.in/wp-content/uploads/2016/11/Jan_Jan.jpg"&gt;&lt;img alt="Visual cues. " class="wp-image-3122120 size-full" height="500" src="http://s1.firstpost.in/wp-content/uploads/2016/11/Jan_Jan.jpg" width="825" /&gt;&lt;/a&gt;
&lt;p class="wp-caption-text"&gt;Visual cues.&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;All  of the above points clearly show that the design of both the Narendra  Modi mobile application and its survey have huge potential for coercing a  biased viewpoint upon any  survey taker and ensure that it is almost  possible to express a stark, negative opinion against the demonetisation  move via the survey. This can and should be remedied by the government  to allow for a more open, conducive and critical discourse to take place  regarding the move among the public. It is only when such opinion is  allowed to exist in the first place, that the government can understand,  engage and respond to the various valid critiques of the move. The  chilling effect that would take place in the current form of the survey  would be counterproductive to the original intent behind its creation,  which was to create a direct constructive feedback loop between the  public and the government.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user'&gt;https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-24T14:50:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-november-22-2016-chetana-divya-vasudev-caught-in-a-filter-bubble">
    <title>Caught in a filter bubble</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-november-22-2016-chetana-divya-vasudev-caught-in-a-filter-bubble</link>
    <description>
        &lt;b&gt;The country seems to be polarised over demonetisation and its after-effects. And more likely than not, you’ve had plenty of news stories to read that corroborate what you believe, regardless of whether you think the scrapping of the Rs 500 and Rs 1,000 notes was an ingenious plan or not, especially if you get most of your news on social media.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Chetana Divya Vasudev was &lt;a class="external-link" href="http://www.deccanherald.com/content/582345/caught-filter-bubble.html"&gt;published by Deccan Herald&lt;/a&gt; on November 22, 2016. Rohini &lt;span class="st"&gt;Lakshané&lt;i&gt; &lt;/i&gt;&lt;/span&gt;was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;However, does the news you’re consuming give you a clear picture of everything going on around you or is it merely helping you live in your own bubble? This has become a hot topic of discussions post the US Presidential elections, with Facebook also coming under fire for it.&lt;br /&gt;&lt;br /&gt;Social media sites in particular and the internet in general have been serving people stories that put forth points of view they largely agree with. “This is a phenomenon called the social media filter bubble,” says Rohini Lakshane, programme officer, Centre for Internet and Society. This means that because most people in your network think like you, what you read mostly concurs with your opinions, reinforces your bias, reducing your chances of coming across opposing viewpoints, she explains. “It’s all-pervasive, Twitter also tailors your feeds and the ‘while you were away’ section, unless you uncheck it in your settings,” she says. Using incognito mode for Google searches and clearing cookies are a couple of other steps you could take to check this filter bubble, she adds.&lt;br /&gt;&lt;br /&gt;“As someone into policy research, I can’t let my personal prejudices affect what I read or understand,” she offers. “So I also ensure I constantly interact with people from different walks of life.” Keeping an open mind to multiple perspectives could help people remain more informed, she suggests.&lt;br /&gt;&lt;br /&gt;Entrepreneur Devashish Mamgain says he makes a conscious effort to search for stories he knows he wouldn’t agree with. “I do this because I’m already up to date with what I like or support, and I think it’s important to know the other side as well,” he says. He doesn’t rely on social media for his news but knows many who do and thinks it limits their knowledge.&lt;br /&gt;&lt;br /&gt;Savitha A Isaac, a content writer, says she unsubscribes to newsfeeds on Facebook she doesn’t want to read. “I get annoyed when it shows up what’s trending — videos and memes that are going viral. I feel most of this is US-centric; almost like it’s telling us we have to care about what’s happening there. My husband and I have noticed that Google keeps tabs on what you’re searching for and comes up with suggestions,” she says. This is also true of Facebook.&lt;br /&gt;&lt;br /&gt;“I usually read a lot of investigative and feminist stories from certain sites. And when such links pop up as suggestions on your wall — or is reflected in the adds you see — it feels really nice. But it also feels wrong,” she says. “It’s creepy, almost as if someone’s stalking you.”&lt;br /&gt;&lt;br /&gt;Uroosa Ayman Fathima, her colleague, believes most content on social media is not accurate. “I only click on a link if it’s that of a news website I trust to be at least 80 per cent accurate,” she says. And she verifies what catches her interest with news in the print media, a more credible source, she believes.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-november-22-2016-chetana-divya-vasudev-caught-in-a-filter-bubble'&gt;https://cis-india.org/internet-governance/news/deccan-herald-november-22-2016-chetana-divya-vasudev-caught-in-a-filter-bubble&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-24T01:45:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-november-20-2016-the-thrill-of-saving-india-from-cybercrime">
    <title>The thrill of saving India from cybercrime</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-november-20-2016-the-thrill-of-saving-india-from-cybercrime</link>
    <description>
        &lt;b&gt;Geeks seize the chance to help the government, defence forces and banks draw up fences against tech crimes.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://www.thehindu.com/business/Industry/the-thrill-of-saving-india-from-cybercrime/article9367640.ece"&gt;article by Peerzada Abrar was published in the Hindu &lt;/a&gt;on November 20, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Saket Modi loves long flights. The 26-year-old hacker  likes to do most of his reasoning while criss-crossing the world. It was  on one such flight from the United States to India that the co-founder  of cybersecurity start-up Lucideus Tech read about India's largest data  security breaches. While surfing the in-flight Internet he came to know  that the security of about 3.2 million debit cards had been compromised.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“I was not surprised but I started thinking about  how it would have happened. What was the ‘exploit’ used, how long was it  there,” said Mr. Modi. Soon after reaching New Delhi, he received  multiple requests from several banks and organisations to protect them  from the hacking incident, which is just one of the thousands of  cybercrimes that the country is facing.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In India,  there has been a surge of approximately 350 per cent of cybercrime cases  registered under the Information Technology (IT) Act, 2000 from the  year of 2011 to 2014, according to a joint study by The Associated  Chambers of Commerce and Industry of India and consulting firm  PricewaterhouseCoopers. The Indian Computer Emergency Response Team  (CERT-In) has also reported a surge in the number of incidents handled  by it, with close to 50,000 security incidents in 2015, noted the  Assocham-PwC joint study.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Ethical hackers&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Mr.  Modi is among a new breed of ethical hackers-turned-entrepreneurs who  are betting big on this opportunity. An ethical hacker is a computer  expert who hacks into a computer network on the behalf of its owner in  order to test or evaluate its security, rather than with malicious or  criminal intent.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“You cannot live in a world where  you think that you can't be hacked. It doesn’t matter who you are,” said  Mr. Modi who cofounded Lucideus four years ago. The company clocked  revenues of Rs.4 crore in the last fiscal. This compares with the Rs.2.5  lakh revenues in the first year. The New Delhi-based firm now counts  Reserve Bank of India, Ministry of Defence and Standard Chartered among  its top clients.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Mr. Modi, who is also a pianist,  discovered his skills for hacking into secure computer systems while  preparing for his board exams. He hacked into his school computer and  stole the chemistry question paper, after realising that he would not be  able to clear the test conducted by his school. However, a guilty  conscience compelled him to confess to his teacher who permitted him to  still take the test. The incident transformed him to use his skills to  protect and not misuse them. This year, Lucideus was hired by National  Payments Corporation of India (NPCI) along with other information  security specialists to protect its most ambitious project, the Unified  Payment Interface (UPI) platform, from cyber attacks. UPI aims to bring  digital banking to 1.2 billion people in the country. Lucideus has a  team of 70 people mostly fresh college graduates who do hacking with  authorisation.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The reason behind choosing Lucideus  was their young, energetic and knowledgeable team," said Bhavesh  Lakhani, chief technology officer of DSP BlackRock, one of the premier  asset management companies. Mr. Lakhani said that India is currently the  epicentre of financial and technological advancements which make it a  probable target of cyber-attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hacking lifeline&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Indeed,  a new breed of cyber criminals has emerged, whose main aim is not just  financial gains but also cause disruption and chaos to businesses in  particular and the nation at large, according to the Assocham-PwC study.  Attackers can gain control of vital systems such as nuclear plants,  railways, transportation and hospitals. This can subsequently lead to  dire consequences such as power failures, water pollution or floods,  disruption of transportation systems and loss of life, noted the study.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The  hacker doesn’t care whether he is attacking an Indian or a U.S.  company. It is bread and butter for him and he wants to eat it wherever  he gets it from,” said Trishneet Arora, a 22-year-old ethical hacker. In  an office tucked away in Mohali, a commercial hub lying adjacent to the  city of Chandigarh in Punjab, Mr.Arora fights these cyberattacks on a  daily basis to protect his clients. His start-up TAC Security provides  an emergency service to customers who have been hacked or are  anticipating a cyberattack. It alerted a hospital in the U.S. after  detecting vulnerabilities in their computer network.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Mr.Arora  said that the hackers could have easily shut down the intensive care  unit which was connected to it and remotely killed the patients. TAC  said the data server of a bank in the UAE containing critical  information got hacked recently. The bank also lost access to the  server. TAC said that it not only helped the organisation to get back  access to the server but also traced the hacker’s identity.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A  school drop out, Mr.Arora founded TAC three years ago. But he initially  found it tough to convince enterprises about his special skills. “I was  a backbencher in the classroom and not good in studies, but I loved  playing video games and hacking,” he said. He conducted workshops on  hacking and provided his expertise to law enforcement agencies such as  the Central Bureau of Investigation and various State police  departments. His firm now provides its services to customers such as  Reliance Industries, dairy brand Amul and tractor manufacturer Sonalika.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“We  were surprised by their expertise,” said R.S. Sodhi, managing director  of Amul. “We wanted to be sure that the company’s vital IT  infrastructure is in the right hands – the big question was, ‘Who can  that be?’ In TAC, we found that team.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;TAC expects to cross revenues of $5 million (Rs.33 crore) and employ about 100 ethical hackers by next year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Budget woes&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Security  watchers such as Sunil Abraham, executive director of Bengaluru-based  think tank Centre for Internet and Society said that India’s  cybersecurity budget is woefully inadequate when compared to the  spending by other countries. In 2014-15, the government doubled its  cybersecurity budget by earmarking Rs.116 crore. “We require a budget of  $1 billion per annum or every two years to build the cybersecurity  infrastructure. The current cyber security policy has no such budget,”  said Mr. Abraham.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;According to Data Security Council  of India (DSCI), India's cybersecurity market is expected to grow  nine-fold to $35 billion by 2025, from about $4 billion. This would  mainly be driven by an ecosystem to promote the growth of indigenous  security product and services start-up companies.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The  Cyber Security Task Force (CSTF) set up by DSCI and industry body  Nasscom expects to create a trained base of one million certified and  skilled cybersecurity professionals. It also aims to build more than 100  successful security product companies from India. Investors who  normally focus on e-commerce ventures or public markets are now taking  note of this opportunity and are betting on such ventures. Amit  Choudhary, director, MotilalOswal Private Equity and an investor in  Lucideus, said he saw tremendous opportunity in the cybersecurity market  as hackers are shifting their focus from developed countries to  emerging countries like India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“There is a huge  opportunity. The recent security breaches of a few Indian banks are an  example,” said Vijay Kedia an ace stock picker and an investor in TAC  Security. He said that organisations are still unaware of the widespread  damage that can be caused by hackers. “The next war will be a  ‘cyberwar’,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-november-20-2016-the-thrill-of-saving-india-from-cybercrime'&gt;https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-november-20-2016-the-thrill-of-saving-india-from-cybercrime&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    

   <dc:date>2016-11-21T02:42:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper">
    <title>Free Net advocates flay Trai's public Wi-Fi paper </title>
    <link>https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper</link>
    <description>
        &lt;b&gt;Stakeholders vouching for a cheap and open Internet have flagged concerns over privacy and regulatory hurdles. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The article by Anita Babu was &lt;a class="external-link" href="http://www.business-standard.com/article/companies/free-net-advocates-flay-trai-s-public-wi-fi-paper-116111900644_1.html"&gt;published in the Business Standard&lt;/a&gt; on November 20, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;With the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Telecom+Regulatory+Authority+Of+India" target="_blank"&gt;Telecom Regulatory Authority of India &lt;/a&gt;releasing its consultation paper on public &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;this week, stakeholders vouching for a cheap and open Internet have flagged concerns over privacy and regulatory hurdles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Internet+Freedom+Foundation" target="_blank"&gt;Internet Freedom Foundation &lt;/a&gt;has  pointed out that the proposed regulations might lead to invasion of  privacy and interfere with the freedom of hotspot providers to operate  freely.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While we welcome Trai’s vision that increasing the number of public &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;hotspots  could be the way to bringing the majority of Indians online, the  proposals turn out to be regressive and poorly thought out,” said  Aravind Ravi Sulekha, co-founder of the Internet Freedom Foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulator in its consultation paper issued earlier this week  proposed hotspot providers would have to register with the government  and users could access hotspots only after paying using a service tied  to their &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;number. It wants to utilise Aadhaar, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Electronic-know+Your+Customer" target="_blank"&gt;electronic-Know Your Customer &lt;/a&gt;(e-KYC) and the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Unified+Payment+Interface" target="_blank"&gt;Unified Payment Interface &lt;/a&gt;(UPI) to build a standard authentication mechanism for access to public &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;in India. While the aim of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;is to increase the number of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;hotspots in India, proponents of free Internet fear these proposed rules might have a contrary effect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hotspot providers will have to incur costs on account of hardware  installations for one-time password verification in addition to the  costs of sending out the passwords. This might discourage  entrepreneurs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This system of verification makes it harder for entrepreneurs to set  up hotspots and for people to access them. It is impossible for  broadband to proliferate in any significant way if &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;insists on applying ineffective and cumbersome regulations on those who wish to set up their own hotspots,” &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Internet+Freedom+Foundation" target="_blank"&gt;Internet Freedom Foundation &lt;/a&gt;said in its comments to Trai’s consultation paper.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposals have excluded individuals who do not have an &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;account  from accessing public Wi-Fi. “This not only brings concerns of costs  and exclusion but also privacy, given the constitutionality of the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;project, and its government-mandated use, is pending adjudication in the Supreme Court,” the foundation pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposals also come at the cost of anonymity. The foundation,  cofounded by the crusaders of last year’s SaveTheInternet campaign,  trashed the argument that imposing eKYC norms would help in countering  terrorism and other crimes. “This prohibition on anonymous communication  is a violation of Indians’ freedom of expression… making a call at a  PCO, sending a telegram and posting a letter have always been possible  without showing ID — even though criminals and terrorists occasionally  abused these services… KYC measures are ineffective in preventing crime  and terrorism, as tools like VPNs, TOR, and proxies can easily mask the  identity of an Internet user,” it stated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The solution proposed by &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;is a classic example of centralism and over-regulation. It turns out that &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;is  unclear about the problem to be solved,” said Pranesh Prakash, policy  director at the Centre for Internet and Society. He added that the new  proposals had also failed to address the limitations on foreigners or  tourists in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Current regulations prevent foreigners without a local mobile number from accessing public &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;connections. While &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;had identified the problem, it failed to come up with a plausible solution.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper'&gt;https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-20T03:21:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem">
    <title>CERT-In's Proactive Mandate - A Report on the Indian Computer Emergency Response Team’s Proactive Mandate in the Indian Cyber Security Ecosystem</title>
    <link>https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem</link>
    <description>
        &lt;b&gt;CERT-IN’s proactive mandate is defined in the IT Act, 2000 as well as in the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Function and Duties ) Rules, 2013 (CERT-In Rules, 2013) both of which postdate the existence of the organisation itself, which has been operational since 2004. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Regarding the proactive mandate, the IT Act and CERT-In Rules include the following areas where CERT-In is required to carry out proactive measures in the interests of cyber security:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Forecast and alert cyber security incidents (IT Act, 2000) &amp;amp; Predict and prevent cyber security incidents (CERT-In Rules, 2013)&lt;/li&gt;
&lt;li&gt;Issue guidelines, advisories and vulnerability notes etc. relating to information security practices, procedures, prevention, response and reporting (IT Act, 2000)&lt;/li&gt;
&lt;li&gt;Information Security Assurance (CERT-In Rules, 2013)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This article will track and analyse the CERT-In’s operations in each of these areas over the past twelve years, by analysing the information available on CERT-In’s website as well as other media in the public domain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The analysis will be carried out using a mixed methodology. The basic quantitative analysis of the information available on the CERT-In’ website will be carried out in the form of simple comparatives of updates, bulletins and other forms of publicly available interaction and critical information dispersal on CERT-In’s website. The qualitative sections, on the other hand, will contain a comparative analysis of the content present in the technical documents of the CERT-In with the equivalent documentation (where present) of similar bodies in the USA and EU. Each section will then illustrate normative suggestions as to how CERT-In’s performance of that respective obligation can be improved to better serve its cyber security mandate.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cert-ins-proactive-mandate.pdf"&gt;Read the full article&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The image is published under Creative Commons License CC BY-SA. Anyone  can distribute, remix, tweak, and build upon this document, even for  commercial purposes, as long as they credit the creator of this document  and license their new creations under the terms identical to the  license governing this document&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem'&gt;https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-19T04:14:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did">
    <title>How The U.K. Got A Better Deal From Facebook Than India Did </title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did</link>
    <description>
        &lt;b&gt;The U.K.’s Information Commissioner’s Office (ICO) and India’s Karmanya Sareen shared a similar concern – how messenger application WhatsApp’s decision to share user data with parent Facebook is a violation of the promise of privacy.&lt;/b&gt;
        &lt;p&gt;The blog post by Payaswini Upadhyay was &lt;a class="external-link" href="http://www.bloombergquint.com/business/2016/11/17/how-the-uk-got-a-better-deal-from-facebook-than-india-did"&gt;published in Bloomberg Quint&lt;/a&gt; on November 17, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Last week, Facebook agreed to address the concerns of the ICO; in India, it didn’t have to.&lt;/p&gt;
&lt;h3&gt;WhatsApp: New Privacy Policy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In August 2016, WhatsApp issued a revised privacy policy that allowed it to share user information with parent company Facebook. Any user who didn’t want her information to be shared with Facebook had a 30-day period to opt out of the policy. Opting out meant that a user’s account information would not be shared with Facebook to improve ads and product experiences. But, there was a caveat.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;The Facebook family of companies will still receive and use this information for other purposes such as improving infrastructure and delivery systems, understanding how our services or theirs are used, securing systems, and fighting spam, abuse, or infringement activities.&lt;br /&gt;&lt;b&gt;WhatsApp Support Team statement on its website &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Facebook’s Commitment To ICO&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ICO decided to delve deeper into what Facebook intended to do with the WhatsApp user data. Elizabeth Denham, Information Commissioner, ICO stated in her blog that users haven’t been given enough information about what Facebook plans to do with the information, and WhatsApp hasn’t got valid consent from users to share the information.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;I also believe users should be given ongoing control over how their information is used, not just a 30-day window.&lt;br /&gt;&lt;b&gt;Elizabeth Denham, Information Commissioner, ICO&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Denham further elaborated ICO’s stand - that it’s important users have control over their personal information, even if services don’t charge them a fee.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;We’ve set out the law clearly to Facebook, and we’re pleased that they’ve agreed to pause using data from U.K. WhatsApp users for advertisements or product improvement purposes.&lt;br /&gt;&lt;b&gt;Elizabeth Denham, Information Commissioner, ICO&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ICO has now asked Facebook and WhatsApp to sign an undertaking committing to better explaining to users how their data will be used, and to giving users ongoing control over that information. Additionally, the ICO also wants WhatsApp to give users an unambiguous choice before Facebook starts using that information and for them to be given the opportunity to change that decision at any point in the future. Facebook and WhatsApp are yet to agree to this, Denham stated.&lt;/p&gt;
&lt;pre style="text-align: justify; "&gt;If Facebook starts using the data without valid consent, it may face enforcement action from my office.&lt;br /&gt;&lt;b&gt;Elizabeth Denham, Information Commissioner, ICO&lt;/b&gt;&lt;/pre&gt;
&lt;p style="text-align: justify; "&gt;In the U.K., protections in the European Data Protection Directive have been incorporated into local law via the Data Protection Act 1998. The ICO is both the privacy regulator and the transparency (right to information) regulator, Sunil Abraham, executive director at the Centre for Internet and Society pointed out. The regulator can issue enforcement notices and also fine errant actors in the market place, he said.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;This is a regulator with expertise, experience and teeth. Come May 25, 2018, the General Data Protection Regulation will come into force and this will give more comprehensive powers to the regulator to investigate and remedy cases like this. The regulator will take each principle from the Directive or Regulation and examine Facebook’s actions comprehensively before deciding on a response. &lt;br /&gt;&lt;b&gt;Sunil Abraham, Executive Director, Centre for Internet and Society&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, if the regulator determines that the principle of choice and consent has not been complied with, it can force Facebook to reverse its decisions and provide greater transparency and clearer choices, Abraham added.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Karmanya Sareen’s Grievance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Back home in India, just two months ago, Karmanya Sareen, a WhatsApp user, argued before the Delhi High Court against the company’s new privacy policy. The argument was that WhatsApp’s August 2016 notice to its users about the proposed change in the privacy policy violated the fundamental rights of users under Article 21 of the Constitution. Article 21 promises protection of life and personal liberty.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Proposed change in the privacy policy of WhatsApp would result in altering/changing the most valuable, basic and essential feature of WhatsApp i.e. the complete protection provided to the privacy of details and data of its users.&lt;br /&gt;&lt;b&gt;Karmanya Sareen vs Union of India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Delhi High Court struck down the Article 21 argument saying that the Supreme Court was still deliberating over including right to privacy as a fundamental right. It also pointed to WhatsApp’s 2012 Privacy Policy that allowed the company to transfer user information in case of an acquisition or merger with a third party. The 2012 policy also allowed WhatsApp to change the terms periodically.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, the Delhi High Court held that it is not open to the users now to contend that WhatsApp should be compelled to continue the same terms of service. However, the court gave WhatsApp two directions to protect users.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WhatsApp to delete from its servers and not share with Facebook or its group companies any information belonging to users who delete their account.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Users who continue to be on WhatsApp, their existing information up to September 25, 2016 cannot be shared with Facebook or any of its group companies.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Did The Delhi High Court Go Easy On Facebook And WhatsApp?&lt;/h3&gt;
&lt;p&gt;Apar Gupta, an advocate specializing in information technology, points out that the directions given by the Delhi High Court to WhatsApp did not contemplate any additional protection to a user than what was already provided by WhatsApp.&lt;/p&gt;
&lt;p class="callout"&gt;The Delhi Court essentially reproduced WhatsApp’s privacy policy. It did not compel or provide any additional safeguard.&lt;br /&gt;&lt;b&gt;Apar Gupta, Lawyer&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Apar attributes this to the absence of a regulatory framework.&lt;/p&gt;
&lt;p class="callout"&gt;The lack of substantive safeguard and enforcement framework in India led to the Delhi High Court upholding WhatsApp’s new privacy policy.&lt;br /&gt;&lt;b&gt;Apar Gupta, Lawyer&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham added that the court did not examine the privacy policy from the perspective of data protection principles as would have been the case in EU or any other jurisdictions with a proper data protection law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court too admitted this in its order that there existed a regulatory vacuum in India and asked TRAI to look into the matter. Facebook did not respond to BloombergQuint’s query on whether it would implement its U.K. commitments in India as well.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-18T01:56:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/conference-on-the-digitalization-of-the-indian-legal-system">
    <title>Conference on the Digitalization of the Indian Legal System</title>
    <link>https://cis-india.org/internet-governance/blog/conference-on-the-digitalization-of-the-indian-legal-system</link>
    <description>
        &lt;b&gt;On Legal Services Day, November 9, 2016, LegalDesk.com collaborated with iSPIRT to host a conference on the “Digitalization of the Indian Legal System”. The event invited prominent speakers to present their organizations’ work and to participate in a panel discussion followed by a Q&amp;A period for the audience.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The co-founder of DAKSH Society of India, Kishore Mandyam, opened the event with a thought-provoking presentation on the efficiency levels of the current legal system and the kinds of progress that can be brought about by technological reforms. Members of LegalDesk.com then presented their ideas and then introduced their newest white paper on Legal Digitalization, providing a brief overview of the study and summarizing the most relevant sections. The panel discussion then proceeded, moderated by Sanjay Khan Nagra, a policy expert at iSPIRT Foundation. He facilitated an insightful and conducive discussion around the advantages, disadvantages, risks and incentives of digitalizing the Indian legal system. On the discussion panel was Kishore Mandyam from DAKSH Society and Prabhuling K Navadgi, the Additional Solicitor General of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The objectives to the conference, as per its website, were to: (1) examine the current legal framework and the possibility of amendments in laws to facilitate digitalization of the system, (2) asses the potential of India Stack in digitalizing the legal system, (3) to identify statutes which require amendment, (4) identify the hurdles and roadblocks in the path towards digital reform of the legal ecosystem, and (5) suggest amendments to the act and potential areas of improvement. With those objectives in mind, this blog post intends to provide a brief overview of the main narratives shared in the conference and to identify some of the loopholes and unanswered questions that I was left with by the end.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Improved efficiency is the dominant narrative used to advocate for the digitalization of the Indian legal system. According to LegalDesk.com, the current Indian legal system relies mostly on paperwork, resulting in thousands of courts and over a million advocates accumulating lackhs of ongoing cases and an enormous pile of pending cases, mostly due to insufficient information. It is stated that the traditional methods of legal documentation, paperwork and court work must change through awareness, technology and pursuance by the government, as it needs to be implemented throughout the country. The key idea here is that digital transactions are faster and simplify the process of storing information. The ultimate desired outcome here, then, is increased efficiency and transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One must question, however, if this narrative may be overly generous with the credit it gives to technology. IT systems, like many other manmade structures, are always bound to glitch and crash. It would be useful, then, to question whether the legal system is a department that can afford the complications that inevitably accompany a digital transformation. If portals or servers fail at critical times (i.e. when a person needs to confirm their trial date, submit a document before a deadline, or any other pressing procedures), the consequences may in fact outweigh the convenience brought about by overall digitalization. This is not to imply that the legal system cannot or should not undergo a digital transformation. Rather, it is to pose the question of whether the government will dedicate sufficient funds and expertise towards developing a resilient and reliable IT system for the courts. The conference was strongly centered on the concept that &lt;i&gt;technology is always the way forward&lt;/i&gt;. This is a positive idea but one must pay special attention to the complications that may arise with the digitalization of a system that must function in a particularly time-sensitive manner – and to ensure that these complications can be managed efficiently and effectively should they arise. This then, requires more than a mere push for digitalization. Introducing new technological platforms is a positive step towards digitalization. However, there is a need for a detailed, government-authorized plan on how the judicial system will efficiently and smoothly undergo this digital transformation in a sustainable and resilient manner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A presenter from LegalDesk.com mentioned Estonia’s model of complete digital governance as an example of successful digitalization: “If a small country like Estonia can do it, why can’t we?” While it is useful to draw examples and lessons from other countries, it is also crucial to recognize the contextual differences between countries. The presenter’s point was that Estonia is small in both size and population and has just recently gained independence in 1991—and has nonetheless been able to undergo technological reform and completely digitalize governance systems. India’s case is extremely different as one can logically argue that digital inclusion is more difficult to accomplish for large, spatially dispersed populations. Furthermore, the socioeconomic disparities in India, particularly in income and literacy, contribute to an immense digital divide that Estonia did not, to any comparable extent, face in order to digitalize governance over 1.3 million individuals. This is not to suggest that India cannot become a world leader in digital governance, or become comparable to Estonia. Rather, this is to highlight the importance of recognizing historical, political and sociocultural differences between countries when comparing governance models and digitalization processes. There is a need to indigenize digital reform strategies and platforms in India to cater to its unique context and vast diversity. This can be done by focusing on issues such as the language of digital governance, ensuring sufficient distribution of access to public digital platforms, and prioritizing the inclusion of all socioeconomic classes. I would argue that digitalization could come at a greater cost than benefit if it perpetuates the exclusion of the underprivileged members of society, especially from a system as critical as the judiciary. These topics were alarmingly overlooked in the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The topic of privacy was also quite overlooked in the conference. As a step towards digital transformation, LegalDesk.com presented the new eNotary technology, which would be implemented by utilizing a combination of Adhaar based authentication, eSign, digilocker systems such as India Stack and video/audio recorded interviews. With the eNotary system, attestation, authentication and verification of legal instruments can be done remotely.  This is expected to make paperwork easier, faster and more secure, as individuals would log into digital platforms using their Adhaar numbers to perform their judiciary procedures. A member of the audience asked about privacy concerns associated with digitalizing the legal records or property ownership information of individuals. Kishore Mandyam, from DAKSH, answered confidently with a statement that privacy is not a pressing issue here. He asserted that privacy concerns are a western construct that we have adopted in urban parts of India but that is not a concern for the majority of locals. It is clear, however, from examples such as the United States’ predictive policing practices, that accumulating data regarding the legal affiliations of individuals can result in discriminatory practices if this data does not remain strictly confidential to protect the privacy rights of citizens. This is not to mention the other forms of discrimination that can arise from the accumulation of such data, such as the targeting of certain demographics by corporate marketing and credit scoring practices that rely on trends in big data. To keep citizens’ legal records and affairs out of these databases, a digital legal system must be securely encrypted and protected by rigid privacy policies. India may have a varying context that leads to different privacy concerns with regards to a digital legal system. In any case, special attention must be given to privacy and security rights of individuals as their Adhaar numbers become attached to all their online personal data, including their legal records and judicial affairs.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/conference-on-the-digitalization-of-the-indian-legal-system'&gt;https://cis-india.org/internet-governance/blog/conference-on-the-digitalization-of-the-indian-legal-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Leilah Elmokadem</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-16T15:34:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
