<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1096 to 1110.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/e-g-8-report-internet-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/new-trends-in-industry-self-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/new-rules-for-due-diligence"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/new-media-personalisation-and-the-role-of-algorithms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/outlook-march-26-2018-new-lock-for-eu-digital-mines"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown">
    <title>NGOs, individuals urge state CMs to curb Internet shutdown</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown</link>
    <description>
        &lt;b&gt;Amid rising instances of Internet curbs, a group of individuals and organisations have urged the chief ministers of 12 states to only restrict specific online content rather than resort to complete shutdown.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/business/india-business/ngos-individuals-urge-state-cms-to-curb-internet-shutdown/articleshow/58011598.cms"&gt;published in the Times of India&lt;/a&gt; on April 4, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;SFLC.in, a Delhi-based not-for-profit organisation, along with  various Internet-related firms have sent letters in this regard to the  chief ministers of these states impacted by Internet shutdowns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letters have been written to the chief ministers of Uttar Pradesh, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Nagaland"&gt;Nagaland&lt;/a&gt;, Manipur, Maharashtra, J&amp;amp;K, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Jharkhand"&gt;Jharkhand&lt;/a&gt;, Rajasthan, Meghalaya, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Arunachal-Pradesh"&gt;Arunachal Pradesh&lt;/a&gt;, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Bihar"&gt;Bihar&lt;/a&gt;, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Gujarat"&gt;Gujarat&lt;/a&gt; and Haryana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Internet shutdowns are imposed using state power under Section  144 by these specific states and not by the Union Government. The  central government is bound to follow the process under Section 69 IT  act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These letters to the chief ministers of all 12 states, which have  been affected by Internet shutdowns till date, are an effort by us to  address the source of the problem," SFLC.in President and Legal Director  Mishi Choudhary told .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per Internet Shutdown tracker of SFLC, there have been 28  incidents of Internet closure in Jammu &amp;amp; Kashmir, 9 cases each in  Gujarat and Haryana, 8 in Rajasthan, 3 Nagaland, 2 cases each in Uttar  Pradesh, Bihar and Manipur and 1 incident each in Maharashtra,  Jharkhand, Meghalaya and Arunachal Pradesh since 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the tracker, far India has experienced a record number of 66  such incidents since 2012, with the number increasing more than  two-fold from 14 in 2015 to 31 in 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letters sent to the chief ministers urge them to "take  requisite action that would prohibit the issuance of orders that make  Internet services entirely inaccessible for a particular area, and  rather recommend that Section 69A and the procedure established by the  rules therein be applied to limit the restriction to certain specific  online content."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The signatories of the letters include the Centre for Internet and  Society, Digital Empowerment Foundation, Internet Democracy Project, IT  for Change and Society for Knowledge Commons, individuals like &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Anivar-Aravind"&gt;Anivar Aravind&lt;/a&gt; (Executive Director, Indic Project), IIT Bombay professor &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Kannan-Moudgalya"&gt;Kannan Moudgalya&lt;/a&gt; and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We are hopeful that our efforts will make the government take in  account the enormous effects of Internet shutdowns on the  social-economic condition of our citizens and understand their plight,"  Choudhary said. PRS MKJ&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown'&gt;https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Freedom</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2017-04-07T02:43:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/e-g-8-report-internet-rights">
    <title>NGOs say eG8 report must stress internet rights</title>
    <link>https://cis-india.org/news/e-g-8-report-internet-rights</link>
    <description>
        &lt;b&gt;More than 35 NGOs from around the world signed a joint declaration requesting that issues concerning freedom of speech be included in the report set to be presented to G8 heads of government by the organisers and participants of the eG8 Forum held in Paris. The news was published in TELECOMPAPER on May 26, 2011.&lt;/b&gt;
        
&lt;p&gt;Read the full story in&amp;nbsp;&lt;a class="external-link" href="http://www.telecompaper.com/news/ngos-say-eg8-report-must-stress-internet-rights"&gt;TELECOMPAPER&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/e-g-8-report-internet-rights'&gt;https://cis-india.org/news/e-g-8-report-internet-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-06-22T04:17:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme">
    <title>NGO questions people's privacy in UID scheme</title>
    <link>https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme</link>
    <description>
        &lt;b&gt;Taking a leaf out of the recommendations of the parliamentary standing committee on finance (SCF) that raised objections on the National Identification Authority of India Bill 2010, Delhi-based NGOs have called upon the Jharkhand government to stay the execution of UID projects in the state.  Jaideep Deogharia's article was published in the Times of India on 11 January 2012.&lt;/b&gt;
        
&lt;p&gt;Citing excerpts from the recommendations of the SCF, headed by BJP MP Yashwant Sinha, the NGO activists asserted that the MoU signed by the government on June 25, 2010, was without any legal and constitutional mandate.&lt;/p&gt;
&lt;p&gt;This claim, however, remains unfounded as the UIDAI is functioning under an executive order of the department of planning and has no links with the NIDAI Bill. The issue was recently clarified by the director general and mission director of UIDAI when he addressed the media in the capital during his three-day visit.&lt;br /&gt;&lt;br /&gt;Organizing a round table, report on SCF and its implications for Aadhaar project and National Population register for multipurpose National ID Card (MNIC),&lt;br /&gt;&lt;br /&gt;Citizens Forum for Civil Liberties member Gopal Krishna said given the fact that the Election Commission had shortlisted 15 documents as evidence of identity and citizenship, there was no need to have the 16th instrument (read UID).&lt;br /&gt;&lt;br /&gt;"It violates citizens' basic and constitutional right to privacy because collecting biometric information of an individual was limited to criminals," he said clarifying that even in case of prisoners, the fingerprint data is supposed to be deleted after acquittal under the Prisoner Identification Act.&lt;br /&gt;&lt;br /&gt;JT D'Souza, an expert in biometrics technology, Mumbai, gave a presentation on how biometric information was vulnerable to exploitation. Using a finger print reader, he demonstrated fake finger prints being read by the machine. He said a fingerprint on a semi solid wax slab can be filled up with adhesive and allowed to set for eight hours. "Once the adhesive block is removed, it takes up the exact marks of finger prints using which any finger print reader can be fooled," he said.&lt;/p&gt;
&lt;p&gt;Another participant, Sunil Abraham, director, Centre for Internet and Society, Bangalore, said there is no data protection or privacy law in place. "The UID project was allowed to march on without any protection being put in place," he said.&lt;br /&gt;&lt;br /&gt;"On one hand, the government wants its citizens to be transparent by giving all their biometric and demographic data, but on the other hand, people in higher authorities are making every bid to conceal facts and function in a non-transparent manner," he said.&lt;br /&gt;&lt;br /&gt;D' Souza also raised questions about the uniqueness of fingerprints as it has never been tested on a vast population. Citing examples from foreign countries where fingerprint studies have proved to be ineffectual in establishing non duplication, he said biometric data if hacked could be misused.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/ranchi/NGO-questions-peoples-privacy-in-UID-scheme/articleshow/11452679.cms"&gt;Read the original published in the Times of India&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme'&gt;https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-01-12T11:45:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts">
    <title>NGO invites public to peruse its accounts</title>
    <link>https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts</link>
    <description>
        &lt;b&gt;Domlur-based The Centre for Internet and Society opens its books for anyone to see and track every rupee of the Rs 13.13 crore it received from donors.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Vandana Kamath was&lt;a class="external-link" href="http://www.bangaloremirror.com/index.aspx?page=article&amp;amp;sectid=10&amp;amp;contentid=201305182013051801054529377725430"&gt; published in the Bangalore Mirror&lt;/a&gt; on May 18, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In an unusual but ‘clean’ way of celebrating its fifth anniversary, a  city-based non-governmental organisation (NGO) has invited the general  public to inspect its books of accounts, check out its list of donors  and view contracts. At a time when several NGOs are under the scanner  for trying to shroud financial transactions in secrecy, The Centre for  Internet and Society (CIS), a non-profit research organisation that  defends consumer rights on the Internet, has upped its policy of  transparency a notch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Located in Domlur and largely patronised by Bangalore’s tech  community, CIS’s books of accounts will be available for public scrutiny  during its fifth anniversary celebrations from May 20 to 23 and will  show how the NGO has spent the Rs 13.13 crore it has received from  donors since its launch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking to Bangalore Mirror, CIS executive director Sunil Abraham  admitted that the move was to dispel any lingering doubts on the motives  of his organisation. “These days, many NGOs have been in the news for  misappropriation of donations,” Abraham said. “We want to keep our books  of accounts open to the public. Apart from details like salaries drawn  by each board member, many other details like contractual obligations  with entities, details of donors and official travel expenses by board  members can also be obtained. Anybody can walk into our office and ask  to see the accounts. A photocopy of all the details will also be given  to them at the earliest.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, a recent debate in the Rajya Sabha centred on the lack of  transparency among NGOs receiving contributions from overseas after the  Foreign Contribution Regulation Act (FCRA) was passed in 2010. With 17  donors, a majority of who are from overseas, CIS ensures that every  rupee obtained is well spent and accounted for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We have made public a list of donors and their share of  contributions to our society,” Abraham said. “This will give everybody a  clear picture of the funds we receive and where and how it is being  spent.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is primarily funded by the Kusuma Trust, The Wikimedia  Foundation and The Hans Foundation among others. The society was founded  in 2008 and has 17 staff of whom four are based in Delhi and the rest  in Bangalore. The society also has seven distinguished fellows and five  fellows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It conducts policy research programmes on topics like  accessibility, access to knowledge, openness, internet governance and  telecom. The society has churned out 641 research items in five years  that include essays, books and blog entries on the topics. It has also  conducted research on the accessibility of the e-governance system and  has suggested ways to make it more disabled-friendly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its anniversary celebrations, the society will hold a  four-day event in its office starting May 20 that will include an  exhibition showcasing its activities so far. Various artists like Kiran  Subbaiah, Tara Kelton, Navin Thomas and Abhishekh Hazra are expected to  participate and give live demonstrations.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts'&gt;https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-05-21T14:38:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/new-trends-in-industry-self-governance">
    <title>New Trends in Industry Self-Governance </title>
    <link>https://cis-india.org/news/new-trends-in-industry-self-governance</link>
    <description>
        &lt;b&gt;Oxford Internet Institute, University of Oxford, UK and Media Change &amp; Innovation Division, IPMZ, University of Zurich, Switzerland and Nominet, UK is organising this workshop on November 7, 2012 at the seventh annual IGF meeting to be held in Baku, Azerbaijan. This workshop will be held in Conference Room 2, from 4.30 p.m. to 6.00 p.m. Sunil Abraham is one of the panelists at this workshop. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Concise description of the proposed workshop&lt;/b&gt;:&lt;br /&gt;Informal rule setting still plays a significant role in Internet governance. Non-governmental governance can occur at two levels: by shared rules negotiated through bodies like ICANN, and via private ordering by individual firms with significant market power. This panel will explore these two levels drawing on research into ICANN and two recent cases: the Google Books [non-] settlement, and several governments’ demands that service providers such as Research In Motion and Facebook give local law enforcement agencies access to user communications. &lt;br /&gt; &lt;br /&gt; Google’s project to digitize, index, and later to sell access to large numbers of out-of-print books is a leading example of an Internet-triggered shift from public to private regulation and the declining authority of copyright law. It triggered a major international controversy encompassing three class action lawsuits, a proposed and subsequently amended settlement by the litigating parties, more than 400 filings by class-members and "friends of the court" (including the French and German governments), two court hearings, various conferences, innumerous blog entries and articles. A New York federal district court ultimately rejected a proposed settlement between Google and representatives of book authors and publishers, stating that the issues would be “more appropriately decided by Congress than through an agreement among private, self-interested parties."&lt;br /&gt; &lt;br /&gt; While almost all states allow law enforcement agencies to intercept Internet communications, the growing use of encryption has restricted access to in-transit communications and social networking data. The governments of India and several Middle Eastern nations have all pressed Research In Motion to allow police access to BlackBerry encrypted messages, threatening otherwise to shut down services. RIM has installed local servers in several countries to meet these demands. The Indian government is reportedly now looking at encrypted services provided by Google and Skype. These and other online services, often hosted in the US, receive frequent requests from foreign law enforcement agencies for user data. Such requests have no statutory force, but may be voluntarily granted under US law – raising questions about user privacy and the oversight of this access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These cases have much wider implications for other Internet services and users around the world. The proposed workshop will facilitate a multi-stakeholder exploration of these implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Four researchers will give precise, provocative five-minute opening statements on the key lessons for Internet rule setting from these cases. Each speaker will pose three specific questions on the accountability, viability and efficiency of these governance structures. These questions will kick-off roundtable discussion between the panelists from government, civil society, business and the technical community. The objective will be to draw out further lessons in how the public interest can best be protected in informal Internet governance processes, with contributions and questions from workshop and remote participants.representing official positions.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Background Paper&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Name of the organiser(s) of the workshop and their affiliation to various stakeholder groups:&lt;/b&gt;&lt;br /&gt;Ian Brown, Oxford Internet Institute, University of Oxford&lt;br /&gt; William Drake, University of Zurich Business, technical community, Civil Society, government co-sponsors in process (TBD)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Have you, or any of your co-organisers, organised an IGF workshop before?&lt;/b&gt;: Yes&lt;b&gt;&lt;br /&gt;Please provide link(s) to workshop(s) or report(s):&lt;/b&gt;&lt;a href="http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=Workshopsreports2009View&amp;amp;curr=1&amp;amp;wr=84"&gt;&lt;br /&gt;http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=Workshopsreports2009View&amp;amp;curr=1&amp;amp;wr=84&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Provide the names and affiliations of the panellists you are planning to invite:&lt;/b&gt;&lt;br /&gt;Sunil Abraham, Centre for Internet and Society, Bangalore&lt;br /&gt;Ian Brown, Oxford Internet Institute, University of Oxford (Moderator)&lt;br /&gt;William Drake, University of Zurich&lt;br /&gt;Jeanette Hoffman, Wissenschaftszentrum Berlin&lt;br /&gt;Emily Taylor, Independent Consultant, UK&lt;br /&gt;Rolf Weber, University of Zurich&lt;br /&gt;Google representative TBC&lt;br /&gt;Government representative TBC&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/new-trends-in-industry-self-governance'&gt;https://cis-india.org/news/new-trends-in-industry-self-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-10-04T11:37:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring">
    <title>New Standard Operating Procedures for Lawful Interception and Monitoring</title>
    <link>https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring</link>
    <description>
        &lt;b&gt;Government issues new guidelines to TSP’s to assist Lawful Interception and Monitoring.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Even as the Central Government prepares the Central Monitoring System for the unrestricted monitoring of all personal communication, the Department of Telecom has issued new guidelines for Telecom Service Providers to assist in responding to requests for interception and monitoring of communications from security agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These guidelines do not appear to be publicly accessible, but according to news items, under the “Standard Operating Procedures for Lawful Interception and Monitoring of Telecom Service Providers”, the TSP’s must now provide for lawful interception and monitoring requests for voice calls, Short message Service (SMS), General Packet Radio Service (GPRS) and Value Added Service (VAS) including Multi Message Service (MMS), data and voice in 3G/4G/Long Term Evolution (LTE) including video call or Voice Over Internet protocol (VoIP). This move comes just days after the Home Ministry suggested that the Department of Telecom either change the rules under their Telecom Policies such as the Unified Access Service Licence (UASL) to include VoIP monitoring, or, drastically, block all VoIP services on the internet, which would include several communication applications including Skype and GTalk. (&lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-12-30/news/45711413_1_interception-solution-voip-indian-telegraph-act"&gt;See the article published by Economic Times&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The guidelines will supposedly also provide for some basic safeguards to ensure that non-authorized interception does not take place, such as ensuring that the interception is only to be provided by the Chief Nodal Officer of a TSP and only upon the issue of an order by the Home Secretary at the Central or State Government. Furthermore, these requests must only be in written, in untampered and sealed envelopes with no overwriting, etc. and bearing the order number issued by the concerned Secretary, with the date of the order. However, in exigent circumstances the order may be provided by email, provided that the physical copy is sent within two days of the order, else the interception order must be terminated. Inquiry processes are detailed under the new SOP’s which can verify whether the request was in original and addressed to the Nodal Officer and from which designated security agency it was issued, and can also verify the issue of an acknowledgment of compliance of the order by the TSP within two days of its receipt. The new guidelines also clarify the issue of interception of roaming subscribers by the State Government where the subscriber is registered. According to the guidelines, an order by the government of the state where such a caller has registered is sufficient and does not need vetting by the Home Secretary at the centre.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notwithstanding the additional “safeguards” against unlawful or unauthorized interception, the message to take away from these guidelines is the Government’s continued efforts to expand its surveillance regime to comprehensively monitor every action and every communication at its whim. These requests for monitoring, undertaken by “security agencies” which include taxation agencies and the SEBI, are flawed not merely because of the possibility of “unauthorized” interception, rather because the legal basis of the interception is vague, broad and widely susceptible to misuse, as the recent “snoopgate” allegations against the Gujarat government have shown. (&lt;a class="external-link" href="http://www.thehindu.com/news/national/other-states/parties-lock-horns-over-gujarat-wiretap-charges/article5358806.ece?ref=relatedNews"&gt;See the article published by the Hindu&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current regime, based on a wide interpretation of Section 5(2) of the Indian Telegraph Act and the telecom policies of the Department of Telecom, do not have adequate safeguards for preventing misuse by those in power – such as the requirement of reasonable suspicion or a warrant. Without a sound legal basis for interception, which protects the privacy rights of individuals, any additional safeguards are more or less moot, since the real threat of intrusive surveillance and infringing of basic privacy exists regardless of whether it is done under the seal of the Home Secretary or not.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Resources&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951" class="external-link"&gt;http://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.thehindu.com/news/national/centre-issues-new-guidelines-for-phone-interception/article5559460.ece"&gt;http://www.thehindu.com/news/national/centre-issues-new-guidelines-for-phone-interception/article5559460.ece&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring'&gt;https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-20T05:13:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/new-rules-for-due-diligence">
    <title>New rules to ensure due diligence: IT dept</title>
    <link>https://cis-india.org/news/new-rules-for-due-diligence</link>
    <description>
        &lt;b&gt;Facing widespread criticism over new IT rules that put certain amount of liability on intermediaries like Google and Facebook for user-generated content, the government clarified that the rules are simply seeking "due diligence" on the part of websites and web hosts. This news was published in the Times of India on May 11, 2011.&lt;/b&gt;
        
&lt;p&gt;The new rules were notified on April 11. Activists and Internet companies say that the rules are archaic and loosely worded and may lead to harassment of web users and website owners. The Times of India was first to report on the issue on April 27.&lt;/p&gt;
&lt;p&gt;The ministry of information and technology said, "The terms specified in the rules are in accordance with the terms used by most of the intermediaries as part of their existing practices, policies and terms of service which they have published on their website."&lt;/p&gt;
&lt;p&gt;It also clarified the "department of telecommunication has reiterated that there is no intention of the government to acquire regulatory jurisdiction over content under these rules".&lt;/p&gt;
&lt;p&gt;The government has claimed that before it made the rules final, it had sought public comments over the draft. "None of the industry associations and other stakeholders objected to the formulation which is now being cited in some section of media," it claimed.&lt;/p&gt;
&lt;p&gt;However, sources told TOI that companies like Google had objected to loose wordings of the documents and asked government not to put any liability on intermediary for user-generated content on the web. "We too approached the government with our concerns. For our communication, we never received any acknowledgment," said Sunil Abraham, executive director at the Centre for Internet and Society (CIS).&lt;/p&gt;
&lt;p&gt;"Given the fact that final rules are more or less similar to the draft rules, I can say that nobody in the government took into account the objections raised by CIS and many other organizations," he added.&lt;/p&gt;
&lt;p&gt;Google had earlier told TOI that new rules would adversely affect businesses that depend upon online collaboration to prosper. "We believe that a free and open Internet is essential for the growth of digital economy and safeguarding freedom of expression.&lt;/p&gt;
&lt;p&gt;If Internet platforms are held liable for third party content, it would lead to self-censorship and reduce the free flow of information," a Google spokesperson said.&lt;/p&gt;
&lt;p&gt;Read the original published by the Times of India &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2011-05-11/internet/29531713_1_draft-rules-due-diligence-google-spokesperson"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/new-rules-for-due-diligence'&gt;https://cis-india.org/news/new-rules-for-due-diligence&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-05-23T06:12:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable">
    <title>New rules leave social media users vulnerable: Experts</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable</link>
    <description>
        &lt;b&gt;They analyse the implications of the government vs Twitter controversy on individual privacy&lt;/b&gt;
        &lt;p&gt;The article by Krupa Joseph was &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-with-bengaluru/new-rules-leave-social-media-users-vulnerable-experts-993460.html"&gt;published in the Deccan Herald&lt;/a&gt; on 10 June 2021. Torsha Sarkar has been quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government had notified the changes on February 25, and allowed social media companies three months to comply. Twitter and WhatsApp had then separately approached the Delhi High Court against the new regulations, fearing they could compromise user privacy.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;On Monday, the court gave Twitter three weeks to file a response to the government’s charge that it had not appointed a grievance officer as claimed.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;strong&gt;Vague rules&lt;/strong&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Karthik Srinivasan, communications consultant, who uses his blog Beast of Traal to comment on social media, says the new rules are “vague and open-ended”.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;“Coupled with the fact that we still do not have a data protection law, the rules could be severely misused both by government and private entities,” he says.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Users are particularly vulnerable in a country where anything and everything offends a lot of people, he says.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;strong&gt;Law overreach&lt;/strong&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Torsha Sarkar, researcher with the Centre for Internet and Society, says the rules introduce additional obligations for social media platforms and classify intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Intermediaries with over five million users would have obligations to introduce traceability, instal automated filtering, provide detailed grievance redressal mechanisms, and publish compliance &lt;span&gt; reports detailing action taken on takedown orders,” she says.&lt;/span&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;While some of these obligations are similar to those laid down internationally, some alterations are causing concern. The traceability requirement, for example, is highly contentious as it would erode user privacy.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;“It is also concerning that the user threshold, for a country like India, with such vast Internet usage, is set at a very low level. This means that even smaller social media platforms might becompelled to carry out economically crippling obligations,” she explains.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;The legislative overreach is seen in how the initial draft , which only covered entities like Twitter and Facebook, now seeks to cover digital news media and content curators like Netfl ixand Hulu, she says.&lt;/p&gt;
&lt;p class="Default"&gt;Stretching the scope of the legislation this way is undemocratic since it was not subject to any public consultation, she notes.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;b&gt;Case in High Court&lt;/b&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Mishi Choudhary, technology lawyer and founder of SFLC.in, a legal services organisation specialising in law, technology and policy, says the IT rules notified by the government are unconstitutional. “In the garb of addressing misinformation and regulating technology companies, the government has been exceeding the powers granted through subordinate legislation and using it for political purposes,” she says. It is on these grounds that the Free and Open Source Software community has challenged the new rules in the Kerala High Court. “Technology companies need regulation but not at the expense of user rights,” she says.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;b&gt;Congress &lt;/b&gt;&lt;span&gt;‘&lt;/span&gt;&lt;b&gt;toolkit&lt;/b&gt;&lt;span&gt;’ &lt;/span&gt;&lt;b&gt;row&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few weeks after social media platforms were asked to take down posts critical of thegovernment’s management of India’s Covid-19 crisis, Twitter once again found itself at thereceiving end. Last week, Twitter labelled a tweet by BJP leader Sambit Patra, accusing theCongress of working with a ‘toolkit, as ‘manipulated media’. Twitter says it gives the label totweets that include media (videos, audio, and images) that are “deceptively altered orfabricated”. The Delhi police then sent a notice to Twitter in connection and asked the micro-blogging site to explain the reasons for assigning the tag. The police also conducted raids onTwitter offices in India. Things escalated when Twitter said the government was intimidating it. The government hit back saying law-making was its privileges, and Twitter, being a social media platform, should not dictate legal policy framework.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;b&gt;New rules&lt;/b&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Under the new IT rules, social media companies like Facebook, WhatsApp and Twitter will be responsible for identifying the originator of a flagged message within 36 hours. They also have to appoint a chief compliance officer, a nodal contact person and a resident grievance officer. Failing to comply with these rules would cause the platforms to lose their status as intermediaries, and make them liable for whatever is posted on their platforms.&lt;/p&gt;
&lt;p class="Default"&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable'&gt;https://cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Krupa Joseph</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-06-14T11:27:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data">
    <title>New rules for govt agencies to ensure security of personal data</title>
    <link>https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data</link>
    <description>
        &lt;b&gt;The new rules put the onus on government departments and agencies to safeguard personal data or information held by them.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was &lt;a href="http://www.livemint.com/Politics/iTcwgoIUnkEnGSqOvekhUL/New-rules-for-govt-agencies-to-ensure-security-of-personal-d.html"&gt;published by Livemint&lt;/a&gt; on June 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Government departments handling personal data or information will have to ensure that end-users are made aware of the data usage and collection and their consent is taken either in writing or electronically, according to new guidelines issued by the government for security of personal data. Sensitive personal data such as passwords, financial information (bank account, credit card, debit card and other payment instrument details), medical records and history, sexual orientation, physical and mental health, and biometric information cannot be stored by agencies without encryption, say the guidelines issued by the ministry of electronics and information technology (IT) on 22 May.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules put the onus on government departments and agencies to safeguard personal data or information held by them. To be sure, the Information Technology Act 2000 and Aadhaar Act 2016 have laid down most of these rules. The new guidelines seek answers to questions being asked on data protection under the Aadhaar Act. “If agency is storing Aadhaar number or sensitive personal information in database, data must be encrypted and stored. Encryption keys must be protected securely, preferably using Hardware Security Modules (HSMs). If simple spreadsheets are used, it must be password protected and securely stored,” according to the guidelines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In April, the IT Ministry issued a notification directing all government departments to remove any personal data published on their websites or through other avenues. The guidelines require regular audits to ensure effectiveness of data protection and also call for swift action on any breach of personal data. In cases where an Aadhaar number has to be printed, it should be truncated or masked. The guidelines say only the last four digits of the 12-digit unique identity number can be displayed or printed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a research report issued by Bengaluru-based think tank Centre for Internet and Society on 1 May, four government portals could have made public around 130-135 million Aadhaar numbers and around 100 million bank account numbers.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data'&gt;https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T13:51:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre">
    <title>New regulations in place; Aadhaar Card records to be preserved for 7 yrs by Centre</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre</link>
    <description>
        &lt;b&gt;UIDAI chief executive office ABP Pandey said that the concerns regarding Aadhar card-related benefits were "exaggerated" and that the agency will keep the records in case any disputes arise in the future.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a href="http://www.financialexpress.com/economy/new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre/420633/"&gt;Financial Express&lt;/a&gt; on October 17, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;As per new regulations, the government will now keep a record for  seven years of all services and benefits that are availed using Aadhaar  number. Fearing that the database might be used for surveillance, the  Unique Identification Authority of India (UIDAI) will preserve the  records.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI chief executive office ABP Pandey said that the concerns  regarding Aadhar card-related benefits were “exaggerated” and that the  agency will keep the records in case any disputes arise in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pandey added that the information will be available online for two  years and shall be shifted to the offline archives for the next five  years. In that case, users will be able to check the records only for  two years. However, the rules won’t apply for security agencies and that  they will need a district judge’s permission to access the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;i&gt;HT&lt;/i&gt;, the rules allow designated joint  secretary-level officers at the Centre to order access to information on  the grounds of national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Talking about this Sunil Abraham, director of the Bengaluru-based  think tank, Centre for Internet and Society said that once Aadhar  becomes mandatory, it can be misused to conduct a 360-degree  surveillance on any person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every time a person fingerprints and quotes the Aadhaar number, the  agency concerned sends the data to UIDAI to crosscheck the particulars.&lt;br /&gt; The UIDAI authenticates about five million Aadhaar numbers, which are quoted to avail &lt;a href="http://www.financialexpress.com/tag/lpg-subsidy/"&gt;LPG subsidy&lt;/a&gt;, cheap ration and even passport, a day against a capacity to verify 100 million requests daily, reports &lt;i&gt;HT.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, The Unique Identification Authority of India (UIDAI) has  launched a drive to enrol any leftover population for Aadhaar in 22  states and UTs that have “statistically” hit 100 per cent coverage for  adults.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘Challenge drive’ starts from October 15 for a month, a UIDAI  statement said, adding that as of today, over 106.69 crore Aadhaar  numbers have been generated across the country.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre'&gt;https://cis-india.org/internet-governance/news/financial-express-october-17-2016-new-regulations-in-place-aadhaar-card-records-to-be-preserved-for-7-yrs-by-centre&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-17T14:46:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-">
    <title>New Recommendations to Regulate Online Hate Speech Could Pose More Problems Than Solutions</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-</link>
    <description>
        &lt;b&gt;The T.K. Viswanathan committee’s recommendations could prove to be dangerous for free speech if acted upon without resolving its flaws.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="https://thewire.in/187381/new-recommendations-regulate-online-hate-speech-problems/"&gt;Wire&lt;/a&gt; on October 14, 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a title="It was reported last week" href="https://thewire.in/184920/post-section-66a-central-panel-tells-government-to-amend-ipc-crpc-it-act-to-punish-online-hate-speech/" rel="noopener
        noreferrer" target="_blank"&gt;&lt;span&gt;It was reported last week&lt;/span&gt;&lt;/a&gt; that an expert       committee headed by T.K. Viswanathan, former secretary general of       Lok Sabha, recommended that the Indian Penal Code (IPC), the Code       of Criminal Procedure and the Information Technology Act be       amended to include stringent penal provisions regarding online       hate speech. While this report has not been made public, &lt;a title="the Indian
        Express reported" href="http://indianexpress.com/article/india/hate-speech-online-punishment-supreme-court-section-66a-information-technology-act-narendra-modi-4876648/" rel="external nofollow" target="_blank"&gt;&lt;span&gt;the&lt;em&gt; Indian Express&lt;/em&gt; reported&lt;/span&gt;&lt;/a&gt; that       the committee’s recommendations include, among other things,       insertion and expansion of penal provisions in the IPC on       ‘incitement to hatred’ (Section 153C) and ‘causing fear, alarm or       provocation of violence’ (Section 505A) to include online speech,       and creation of the offices of state cyber crime coordinator and       district cyber crime cell.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online hate speech has been among the more complex issues with       regard to the regulation of technology. The complexity of       restricting hate speech has to do with a number of factors,       including the ubiquity of strong opinions in online speech, often       offensive to certain groups, the interplay between individual and       group rights, and the tensions between the values of dignity,       liberty and equality. Siddharth Narrain has &lt;a title="pointed out" href="http://jmi.ac.in/upload/menuupload/16_ccmg_epwsedition.pdf" rel="external nofollow" target="_blank"&gt;&lt;span&gt;pointed         out&lt;/span&gt;&lt;/a&gt; in his thesis on hate speech law that the use of law to       curb offensive or hurtful speech has been done by religious       groups, caste based groups, occupation based groups with strong       caste associations, language groups and gender based groups. The       range of actions arising from such uses of the law include the       banning of books, criminal proceedings for political satire, or       even ‘liking’ political posts on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The relationship between speech acts and acts of violence is a       complicated issue with little consensus on appropriate ways to       regulate it. Scholars such as Jonathan Maynard have advocated       greater reliance on non-legal responses such as counter speech, as       the use of criminal law to tackle speech often has the effect of       chilling forms of dissent. The f&lt;span&gt;&lt;span&gt;ormulation and application of legal           tests in criminal law with respect to hate speech is also hard           as hate speech has much to do with the content of speech as it           has to do with the context, including factors such as power           structures.&lt;/span&gt; &lt;span&gt;Speech by a           figure in a position of power also has a greater likelihood to           result in a call for violence. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before looking at the specific recommendations made by the T.K.       Viswanathan committee, it would be worthwhile to also look at the       background of this committee. The committee notes with approval       the &lt;a title="Law Commission of
        India’s 267th report on the issue of hate speech" href="http://lawcommissionofindia.nic.in/reports/Report267.pdf" rel="external nofollow" target="_blank"&gt;&lt;span&gt;Law Commission         of India’s 267th report on the issue of hate speech&lt;/span&gt;&lt;/a&gt;. The Law       Commission, in turn, was acting at the behest of observations made       by the Supreme Court in &lt;a title="Pravasi Bhalai
        Sangathan v. Union of India" href="https://indiankanoon.org/docfragment/61854231/?formInput=ramesh%20union%20india%20" rel="external nofollow" target="_blank"&gt;&lt;span&gt;&lt;i&gt;Pravasi Bhalai Sangathan&lt;/i&gt; v.         &lt;i&gt;Union of India&lt;/i&gt;&lt;/span&gt;&lt;/a&gt; in 2014. In this case, the Supreme       Court exhibited judicial restraint and refused to frame guidelines       prohibiting political hate speech, and had instead requested the       Law Commission to look into it. However, the court noted with       approval international case law on the issues, particularly the       observations in the Canadian case &lt;a title="Saskatchewan v. Whatcott" href="https://scc-csc.lexum.com/scc-csc/scc-csc/en/item/12876/index.do" rel="external nofollow" target="_blank"&gt;&lt;span&gt;&lt;i&gt;Saskatchewan&lt;/i&gt; v. &lt;i&gt;Whatcott&lt;/i&gt;&lt;/span&gt;&lt;/a&gt;.       Relying on &lt;i&gt;Whatcott&lt;/i&gt;, the Supreme Court provides a       definition of hate speech that includes the following statements:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“Hate speech is an effort to marginalise individuals based on         their membership in a group. Using expression that exposes the         group to hatred, hate speech seeks to delegitimise group members         in the eyes of the majority, reducing their social standing and         acceptance within society. Hate speech, therefore, rises beyond         causing distress to individual group members..[and] lays the         groundwork for later, broad attacks on vulnerable that can range         from discrimination, to ostracism, segregation, deportation,         violence and, in the most extreme cases, to genocide. Hate         speech also impacts a protected group’s ability to respond to         the substantive ideas under debate, thereby placing a serious         barrier to their full participation in our democracy.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Thus, it is evident that the Supreme Court itself clearly states       that hate speech must be viewed through the lens of the right to       equality, and relates to speech not merely offensive or hurtful to       specific individuals, but also inciting discrimination or violence       on the basis of inclusion of individuals within certain groups. It       is important to note that it is the consequence of speech that is       the determinative factor in interpreting hate speech, more so than       even perhaps the content of the speech. This is also broadly       reflected in the Law Commission’s report that identifies the       status of the author of the speech, the status of victims of the       speech, the potential impact of the speech and whether it amounts       to incitement as key identifying criteria of hate speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in the commission’s recommendations, these principles       are not fairly represented in the suggested new Sections 153C and       505A, as per a &lt;a title="draft released" href="https://internetfreedom.in/government-committee-wants-to-bring-back-section-66a/" rel="external nofollow" target="_blank"&gt;&lt;span&gt;draft         released&lt;/span&gt;&lt;/a&gt; by the Internet Freedom Foundation. Section 505A,       for instance, refers to “highly disparaging, indecent, abusive,       inflammatory, false or grossly offensive information” and       “derogatory information.” These are extremely broad terms, not       having any guiding jurisprudence within Indian or international       law, which may be helpful in restrictively interpreting them. It       is important to note the similarities between this provision and       the repealed Section 66A of the Information Technology Act, which       sought to criminalise speech that was “grossly offensive,” having       “menacing character,” or “causing       annoyance..danger..insult..enmity, hatred or ill will.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These terms in the recommended Section 505A also run foul of the       observations of Justice Nariman in &lt;em&gt;&lt;a title="Shreya
          Singhal v. Union of India" href="https://cis-india.org/internet-governance/blog/shreya-singhal-judgment.pdf" rel="external nofollow" target="_blank"&gt;&lt;span&gt;Shreya Singhal v. Union of India&lt;/span&gt;&lt;/a&gt;,&lt;/em&gt; where       he took exception to the nature of the terms in Section 66A by       stating that, “Information that may be grossly offensive or which       causes annoyance or inconvenience are undefined terms which take       into the net a very large amount of protected and innocent       speech.” While these terms are somewhat tempered in this provision       with a requirement to show intent to “cause fear of injury or       alarm,” they remain exceedingly broad and contrary to the       requirement that restrictions on speech must be couched in the       narrowest possible terms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The T.K. Viswanathan committee, in addition, seeks to bring,       within the scope of the prospective Sections 153C and 505A,       electronic speech. As per its recommendations, ‘means of       communication’ would include “any words either spoken or written,       signs, visible representations, information, audio, video or       combination of both transmitted, retransmitted or sent through any       telecommunication service, communication device or computer       resource.” This could have the impact of bringing in a provision       that has some similar effects as that of the now defunct Section       66A of the Information Technology Act. The lack of regard for the       Supreme Court’s observations on hate speech, the need to look at       it through the lens of equality and the over-broadness of       restrictions on speech are likely to be dangerous for free speech       if the recommendations of this committee are acted upon.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-'&gt;https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Hate Speech</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-01-02T03:06:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts">
    <title>New privacy Bill more refined &amp; has wider ambit, say experts</title>
    <link>https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts</link>
    <description>
        &lt;b&gt;But creates wide exceptions for government agencies.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/new-privacy-bill-more-refined-has-wider-ambit-say-experts-114040101013_1.html"&gt;published in the Business Standard&lt;/a&gt; on April 2, 2014. CIS welcomes changes in the Bill but is cautious of the wide exceptions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government’s latest attempt to draft a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy+Bill" target="_blank"&gt;privacy Bill&lt;/a&gt; is being termed by as a refined one by experts as it expands its ambit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the Bill creates some wide exceptions for law enforcement and  intelligence agencies to collect personal information of individuals.  The government has made several attempts at drafting a privacy Bill  since 2010, with the aim of protecting individuals against data misuse  by government or private agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first draft, released in 2011, extended the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Right+To+Privacy" target="_blank"&gt;Right to Privacy&lt;/a&gt; to citizens of India. But, the 2014 version has expanded its ambit to  cover all residents of the country. The 2014 Bill also recognises the  Right to Privacy as a part of Article 21 of the Indian Constitution and  extends to the whole of India. In contrast, the 2011 Bill did not  explicitly recognise the Right to Privacy as being a part of Article 21,  and excluded Jammu and Kashmir from its purview.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both the drafts include a list of circumstances under which  authorisation for the collection and processing of sensitive personal  data is not required. The lists are broadly the same. However, the  latest version exempts insurance company and government intelligence  agencies collecting or processing data “in the interest of the  sovereignty, integrity, security or the strategic, scientific or  economic interest of India.”&lt;br /&gt; &lt;br /&gt; A Bangalore-based Internet think-tank Centre for Internet and Society  said it welcomed many changes in the Bill, but were cautious on the wide  exceptions.&lt;br /&gt; &lt;br /&gt; “The Bill carves out another exception for government agencies, allowing  disclosure of sensitive personal data without consent to government  agencies mandated under law for the purposes of verification of  identity, or for prevention, detection, investigation, including cyber  incidents, prosecution and punishment of offences,” the Centre for  Internet and Society said in a note analysing the provisions of the  Bill.&lt;br /&gt; &lt;br /&gt; The privacy Bill was originally conceptualised to ensure the data  collected by the government under various new projects such as Aadhaar  or the National Information Grid (NATGRID) are not misused in any way.  But incidents, such as the tapping of phone conversations involving  former lobbyist &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Niira+Radia" target="_blank"&gt;Niira Radia&lt;/a&gt;, prompted the government to expand the ambit of the privacy law from just being a data protection one to also cover &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Surveillance" target="_blank"&gt;surveillance&lt;/a&gt; and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Interception" target="_blank"&gt;interception&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, it was unable to reach a consensus due to inter-ministerial  conflicts as the law was superseding various provisions under several  existing legislations.&lt;br /&gt; &lt;br /&gt; The government also set up a committee under retired Delhi high court  judge Ajit P Shah under the aegis of the Planning Commission to study  international best practices on privacy and surveillance. This committee  filed a report in 2012.&lt;br /&gt; &lt;br /&gt; Some additions to the Bill include the term personal identifier, defined  by any unique alphanumeric sequence of members, letters, and symbols  that specifically identifies an individual with a database or a data  set.&lt;br /&gt; &lt;br /&gt; The Bill has also re-defined sensitive personal data to denote personal  data relating to physical and mental health, including medical history,  biometric, bodily or genetic information, criminal convictions,  password, banking credit and financial data, narco analysis or polygraph  test data and sexual orientation.&lt;br /&gt; &lt;br /&gt; Once the law comes into being, the government or a private agency will  have to adequately inform citizens before collecting data, stating the  reasons and only collecting as much information as is necessary.&lt;br /&gt; &lt;br /&gt; It will also have to clearly define the time period for which the data  will be stored and the security measures taken to protect it from  misuse. The law also lays down the penalties in case of a breach.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts'&gt;https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-03T11:06:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy">
    <title>New movies lose out due to piracy</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy</link>
    <description>
        &lt;b&gt;Piracy continues to be a huge concern among filmmakers but it can also be a marketing strategy for small-budget films.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surupasree Sarmmah was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/new-movies-lose-out-due-piracy-714536.html"&gt;Deccan Herald&lt;/a&gt; on January 23, 2019. Akriti Bopanna was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Despite a slew of measures taken by filmmakers, pirated versions of recently released films like ‘Uri: The Surgical Strike’, ‘Viswasam’, ‘KGF’ and ‘Why Cheat India’ were leaked online on websites like TamilRockers. Piracy has been a huge concern for all movie industries in India, national and regional, but experts say that not much can be done when a film is leaked online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Neville J Kattakayam, author of the book ‘The All Seeing Digital Eyes: A Guide To Privacy, Security and Literacy’, says, “The maximum one can do is to control the servers in a particular jurisdiction. But there are servers in unlikely places — like somewhere out in the sea. These places don’t fall under any jurisdiction, national or international. It becomes impossible to control the servers then.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Talking about the process of piracy, he explains that once a content is leaked, it mirages into different servers across to the world; not just online but offline too. “There are mirror sites having the same content that are immediately born. Accessibility wise, it’s all out there; there is nothing that one can completely restrict,” he says. &lt;br /&gt; &lt;br /&gt; Neville feels that it is largely in the hands of the producers to restrict access to their material until the movie is released. With people usually preferring good quality prints, theatrical replicas are not favoured much, he told Metrolife. &lt;br /&gt; &lt;br /&gt; “From what I have heard, the piracy usually happens when the copy is being sent to the censor board. Some intermediate source, who really wants to kill a movie, leaks it from there. That is the real challenge,” says Neville. &lt;br /&gt; &lt;br /&gt; Hemanth M Rao, a director, says that when a movie is leaked online, the effort, time and money put in is at stake. “You feel robbed. Most people would want to go to the theatres to watch a film but with incidents of piracy on the rise, the life span of a movie is shortened,” he says.&lt;br /&gt; &lt;br /&gt; However, he adds that the audience is beginning to understand the impact piracy has on the movie industry, especially at a time when there is intense competition between regional language industries.&lt;br /&gt; &lt;br /&gt; He has a word of praise for the Kannada Film Industry, which he feels is safeguarding interests of the artistes.&lt;br /&gt; &lt;br /&gt; “We have a close tie-up with the city police. We monitor where all a film is playing after its release. In case we come to know about any illegal activities, we intimate the police who act swiftly. This way, the access is cut down.” &lt;br /&gt; &lt;br /&gt; “Another thing that upsets me is the habit of going live on Facebook while one is at the theatre. I don’t understand what pleasure people get out of it,” he says. &lt;br /&gt; &lt;br /&gt; According to a new draft rule, being contemplated by the IT Ministry, host websites will be liable for any illegal content uploaded on their platform. Currently, a website is liable only for unlawful actions; like uploading copyrighted content without permission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Government can block access to the original host of the pirated content if needed however the traction and virality these kinds of content get make it very difficult to contain their spread. It ends up being a blanket ban on sites such as torrent sites where all the content is not illegal yet the site is blocked as a whole,” says Akriti Bopanna, Policy Officer, Centre for Internet and Society. &lt;br /&gt; &lt;br /&gt; The time taken for legal recourse doesn’t help either. Though filmmakers can approach the court for a ban on the website or server, the time taken for a legal remedy is way too long. By that time, the same link would have appeared in two or three other websites, says Akriti. “A leaked movie can be easily downloaded and sent to someone instantly.”&lt;br /&gt; &lt;br /&gt; She feels that a more effective method than banning a website or a server would be to educate people.&lt;br /&gt; &lt;br /&gt; “Not many know about copyright infringement, it is important to spread awareness from the grassroots level. Though we have messages on piracy shown at the start of every movie, these need to be more creative and fun so they will stay in the audience’s minds. Maybe the industry, as a whole, can do this as a community initiative,” she opines. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Small players don’t care much about piracy &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Small-budget movies take piracy as a marketing strategy. They feel that once people watch the movie and write reviews, the film will get an overall boost — allowing them to sell more tickets in theatres.&lt;br /&gt; &lt;br /&gt; However, major players spend crores on their movies and depend on ticket sales to get back the amount.&lt;br /&gt; &lt;br /&gt; Difficult to claim copyright from different websites&lt;br /&gt; &lt;br /&gt; Prominent production companies are targeting streaming websites who have uploaded their movies, citing copyright issues. However, floating websites like citytorrents and TamilRockers keep changing their domain name and it becomes impossible to counter them.&lt;br /&gt; &lt;br /&gt; -&lt;b&gt;Neville J Kattakayam&lt;/b&gt;&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy'&gt;https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T02:24:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/new-media-personalisation-and-the-role-of-algorithms">
    <title>New Media, personalisation and the role of algorithms</title>
    <link>https://cis-india.org/internet-governance/new-media-personalisation-and-the-role-of-algorithms</link>
    <description>
        &lt;b&gt;In his much acclaimed book, The Filter Bubble, Eli Pariser explains how personalisation of services on the web works and laments that they are creating individual bubbles for each user, which run counter to the idea of the Internet as an inherently open place. While Pariser’s book looks at the practices of various large companies providing online services, he briefly touches upon the role of new media such as search engines and social media portals in new curation. Building upon Pariser’s unexplored argument, this article looks at the impact of algorithmic decision-making and Big Data in the context of news reporting and curation.&lt;/b&gt;
        &lt;em&gt;&lt;br /&gt;&lt;/em&gt;
&lt;blockquote&gt;
&lt;div&gt;
&lt;div&gt;&lt;em&gt;Everything which bars freedom and fullness of communication sets up barriers that divide human beings into sets and cliques, into antagonistic sects and factions, and thereby undermines the democratic way of life. &lt;/em&gt;—John Dewey&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;&amp;nbsp;Eli Pariser, in his book, The Filter Bubble,[1] refers to the scholarship by Walter Lippmann and John Dewey as integral to the evolution of the understanding of the democratic and ethical duties of the Fourth Estate. Lippmann was disillusioned by the role of newspapers in propaganda for the First World War. He responded with three books in quick succession — Liberty and the News,[2] Public Opinion[3] and The Phantom Public.[4] Lippmann brought attention the fact that the process of news-reporting was conducted through privately determined and unexamined standards. The failure of the Fourth Estate to perform its democratic functions, was, in the opinion of Lippmann, one of the prime factors responsible for the public not being an informed and rational entity. John Dewey, while rejecting Lippmann’s arguments that matters of public policy can only be determined by inside experts with training and education, did acknowledge the his critique of the media.&lt;/p&gt;
&lt;p&gt;Pariser points to the creation of a wall between editorial decisionmaking and advertiser interests, as the eventual result of the Lippmann and Dewey debate. While accepting that this division between the financial and reporting sides of media houses has not been always observed, Pariser emphasises that the fact that the standard exists is important.[5] Unlike traditional media, the new media which relies on algorithmic decision-making for personalisation is not subject to the same standards which try to mitigate the influence of commercial interests on editorial decisions while performing many of the same functions as the traditional media.[6] &amp;nbsp;&lt;/p&gt;
&lt;h3&gt;How personalisation algorithms work&lt;/h3&gt;
&lt;p dir="ltr"&gt;Kevin Slavin, at his famous talk in the TEDGLobal Conference, characterised algorithms as “maths that computers use to decide stuff” and that it was infiltrating every aspect of our lives.[7] According to Slavin’s view, algorithms can be seen as control technologies and shape our world constantly through media and information systems, dynamically modifying content and function through these programmed routines. Search engines and social media platforms perpetually rank user-generated content through algorithms.[8]&lt;/p&gt;
&lt;p&gt;Personalisation technologies have various advantages. It translates into more relevant content, which for service providers means more clicks and revenue and for consumer, less time spent on finding the content.[9] However, it also leads to privacy compromise, lack of control and reduced individual capability.[10] Search engines like Google use the famous PageRank algorithm, which combined with geographical location and previous searches yields most relevant search results.[11] PageRank algorithm uses various real time variables dependent on both voluntary and involuntary user inputs. These variables include number of clicks, number of occurrences of the key terms and number of references by other credible pages etc. This data in turn determines the order of pages in search results and influences the way we perceive, understand and analyse information.[12] Maps showing real time traffic information retrieve data from laser and infrared sensors alongside the road and from information from devices of users. Once this real time data is combined with historical trends, these maps recommend rout to every user, hence influencing the traffic patterns.[13]&lt;/p&gt;
&lt;p&gt;Even though this phenomenon of personalization may appears to be new, it has been prevalent in the society for ages.[14] The history of mass media culture clearly shows personalization has always been a method to increase market, market reach and customer satisfaction.[15] Newspapers have sections dedicated to special topics, radio and TV have channels dedicated to different interest groups, age groups and consumers.[16] These personalised sections in a newspaper and personalised channels on radio and television don’t just provide greater satisfaction to the readers or listeners or consumers, they also provide targeted advertisement space for the advertisers and content developers. However, digital footprints and mass collection of data have made this phenomenon much more granular and detailed. Geographical location of an individual can tell a lot about their community, their culture and other important traits local to a community.[17] This data further assists in personalisation. Current developments in technology not only help in better collection of data about personal preferences but also help in better personalisation.&lt;/p&gt;
&lt;p&gt;Pariser mentions three ways in which the personalization technologies of this day are different from those of the past. First, for the very first time, individuals are alone in the filter bubble. While in traditional forms of personalisation, there were various individuals who shared the same frame of reference, now there is a separate sets of filters governing the dissemination of content to each individual.[18] Second, the personalisation technologies are entirely invisible now, and there is little that consumers can do to control or modify them.[19] Third, often the decision to be subject to these personalisation technologies is not an informed choice. A good example of this would be an individual’s geographical location.[20]&lt;/p&gt;
&lt;h3&gt;The neutrality of New Media?&lt;/h3&gt;
&lt;p dir="ltr"&gt;More and more, we have noticed personalisation technologies having an impact on how we consume news on the Internet. Google News, Facebook’s News Feed which tries to put together a dynamic feed for both personal and global stories, and Twitter’s trending hashtag feature, have brought forward these services are key drivers of an emerging news ecosystem. Initially, this new media was hailed as a natural consequence of the Internet which would enable greater public participation, allow journalists to find more stories and engage with the readers directly. &amp;nbsp;An illustration of the same could be seen in the way Internet based news media and social networking websites behaved in the aftermath of Israel’s attacks on a United Nations run school in Gaza strip. While much of the international Internet media covered the story, Israel’s home media did not cover the story. The only exception to this was the liberal Israeli news website Ha’aretz.[21] Network graph details of Twitter, for a few days immediately after the incident clearly show the social media manifestation of the event in the personalised cyberspace. It is clearly visible that when most of the word was re-tweeting news of this heinous act of Israel, Israeli’s hardly re-tweeted this news. In fact they were busty re-tweeting the news of rocket attacks on Israel.[22]&lt;/p&gt;
&lt;p&gt;The use of social media in newsmaking was hailed by many scholars as symptomatic of the decentralisation characteristic of the Internet. It has been seen as movement towards greater grassroots participation by negating the ‘gatekeeping’ role traditionally played by editors. &amp;nbsp;Thomas Poell and José van Dijck punch holes in theory of social media and other online technologies as mere facilitators of user participation and translators of user preferences through Big Data analytics.[23] They quote T. Gillespie’s work which talks of the narrative of these online services as platforms which are “open, neutral, egalitarian and progressive support for activity.”[24]&lt;/p&gt;
&lt;p&gt;Pedro Domingos calls the overwhelming number of choices as the defining problem of the information age, and machine learning and data analytics as the largest part of this solution.[25] The primary function of algorithmic decision making in the context of consumption of content is to narrow down the choices. Domingos is more optimistic about the impact of these technologies, and he says “last step of the decision is usually still for humans to make, but learners intelligently reduce the choices to something a human can manage.”[26] On the other hand, Pariser is more circumspect about the coercive result of machine learning algorithms. Whichever way we lean, we have to accept that a large part of personalisation algorithms is to select and prioritize content by categorising it on the basis of relevance and popularity. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Poell and van Dijck call this a new knowledge logic which in effect replaces human judgement (as, earlier exercised by editors) to some kind of proxy decisionmaking based on data. Their main thesis is that there is little evidence to suggest that the latter is more democratic than former and creates new problems of its own. They go on to compare the practices of various services including Facebook’s new graph and Twitter’s trending topic, and conclude that they prioritise breaking news stories over other kinds of content.[27] For instance, the algorithm for the trending topics depends not on the volume but the velocity of the tweets with the hashtag or term. It could be argued that given this predilection, the algorithms will rarely prefer complex content. If we go by Lippmann and Dewey’s idea that the role of the Fourth Estate is to inform public debate and accountability of those in positions of power, this aspect of Big Data algorithms does not correspond with this role.&lt;/p&gt;
&lt;h3&gt;Quantified Audience&lt;/h3&gt;
&lt;p dir="ltr"&gt;Another aspect of use of Big Data and algorithms in New Media that requires attention is that the networked infrastructure enables a quantified audience. C W Anderson who has studied newsroom practices in the US looked at role played by audience quantification and rationalization in shifting newswork practices. He concluded that more and more, journalists are less autonomous in their news decisions and increasingly reliant on audience metrics as a supplement to news &amp;nbsp;judgment.[28] Poell and van Dijck review the the practices by some leading publications such a New York Times, L.A. Times and Huffington Post, and degree to which audience metrics &amp;nbsp;dictates editorial decisions. While New York Times seems to prioritise content on their social media portals based on expectation of spike in user traffic, L.A. Times goes one step further by developing content specifically aimed towards promoting greater social participation. Neither of these practices though compare to the reliance on SEO and SMO strategies of web-born news providers like Huffington Post. They have traffic editors who trawl the Internet for trending topics and popular search terms, the feedback from them dictates the content creation.[29]&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p dir="ltr"&gt;The above factors demonstrate that the idea of New Media leading to the Fourth Estate performing its democratic functions does not take into account the actual practices. This idea is based on the erroneous assumption that technology, in general and algorithms, in particular are neutral. While the emergence of New Media might have reduced the gatekeeping role played by the editors, its strong prioritisation of content that will be popular reduce the validity of arguments that it leads to more informed public discussion. As Pariser said, the traditional media scores over the New Media inasmuch as there is an existence of a standard of division between editorial decisionmaking and advertiser interest. While this standard is flouted by media houses all the time, it exists as a metric to aspire to and measure service providers against. The New Media performs many of the same functions and maybe it is time to evolve some principles and ethical standards that take into account the need for it to perform these democratic functions.&lt;/p&gt;
&lt;h3&gt;Endnotes&amp;nbsp;&lt;/h3&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt; Eli Pariser, The Filter Bubble: What the Internet is
hiding from you (The Penguin Press, New York, 2011)&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;[2]&lt;/span&gt;&lt;/span&gt;&amp;nbsp;Walter Lippmann, Liberty and News (Harcourt, Brace
and Howe, New York 1920) available at&lt;a href="https://archive.org/details/libertyandnews01lippgoog"&gt;https://archive.org/details/libertyandnews01lippgoog&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt; Walter Lippmann, Public Opinion (Harcourt, Brace and
Howe, New York 1920) available at &lt;a href="http://xroads.virginia.edu/~Hyper2/CDFinal/Lippman/cover.html"&gt;http://xroads.virginia.edu/~Hyper2/CDFinal/Lippman/cover.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt; Walter Lippmann, The Phantom Public (Transaction
Publishers, New York, 1925)&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt; &lt;em&gt;Supra&lt;/em&gt; Note
1 at 35.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt; &lt;em&gt;Supra&lt;/em&gt; Note
1 at 36.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt; &lt;a href="https://www.ted.com/talks/kevin_slavin_how_algorithms_shape_our_world/transcript?language=en"&gt;https://www.ted.com/talks/kevin_slavin_how_algorithms_shape_our_world/transcript?language=en&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt; Fenwick McKelvey, “Algorithmic Media Need Democratic
Methods: Why Publics Matter”, available at &lt;a href="http://www.fenwickmckelvey.com/wp-content/uploads/2014/11/2746-9231-1-PB.pdf"&gt;http://www.fenwickmckelvey.com/wp-content/uploads/2014/11/2746-9231-1-PB.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt; &lt;a href="http://mashable.com/2011/06/03/filters-eli-pariser/#9tIHrpa_9Eq1"&gt;http://mashable.com/2011/06/03/filters-eli-pariser/#9tIHrpa_9Eq1&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt; Helen Ashman, Tim Brailsford, Alexandra Cristea, Quan
Z Sheng, Craig Stewart, Elaine Torns and Vincent Wade, “The ethical and social
implications of personalization technologies for e-learning” available at &lt;a href="http://www.sciencedirect.com/science/article/pii/S0378720614000524"&gt;http://www.sciencedirect.com/science/article/pii/S0378720614000524&lt;/a&gt;.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt; Sergey Brin and Lawrence Page, “The Anatomy of a
Large-Scale Hypertextual Web Search Engine” available at &lt;a href="http://infolab.stanford.edu/pub/papers/google.pdf"&gt;http://infolab.stanford.edu/pub/papers/google.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt; Ian Rogers, “The Google Pagerank Algorithm and How It
Works” available at &lt;a href="http://www.cs.princeton.edu/~chazelle/courses/BIB/pagerank.htm"&gt;http://www.cs.princeton.edu/~chazelle/courses/BIB/pagerank.htm&lt;/a&gt;.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt; Trygve Olson and Terry Nelson, “The Internet’s Impact
on Political Parties and Campaigns”, available at &lt;a href="http://www.kas.de/wf/doc/kas_19706-544-2-30.pdf?100526130942"&gt;http://www.kas.de/wf/doc/kas_19706-544-2-30.pdf?100526130942&lt;/a&gt;.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt; Ian Witten, “Bias, privacy and and personalisation on
the web”, available at &lt;a href="http://www.cs.waikato.ac.nz/~ihw/papers/07-IHW-Bias,privacyonweb.pdf"&gt;http://www.cs.waikato.ac.nz/~ihw/papers/07-IHW-Bias,privacyonweb.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt; &lt;em&gt;Supra&lt;/em&gt; Note
1 at 10.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt; &lt;a href="https://www.americanpressinstitute.org/publications/reports/survey-research/social-demographic-differences-news-habits-attitudes/"&gt;https://www.americanpressinstitute.org/publications/reports/survey-research/social-demographic-differences-news-habits-attitudes/&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt; Charles Heatwole, “Culture: A Geographical Perspective”
available at &lt;a href="http://www.p12.nysed.gov/ciai/socst/grade3/geograph.html"&gt;http://www.p12.nysed.gov/ciai/socst/grade3/geograph.html&lt;/a&gt;.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt; &lt;em&gt;Supra&lt;/em&gt; Note
1 at 10.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt; &lt;em&gt;Id&lt;/em&gt;.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt; &lt;em&gt;Supra&lt;/em&gt; Note
1 at 11.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt; Paul Mason, “Why Israel is losing the social media
war over Gaza?” available at &lt;a href="http://blogs.channel4.com/paul-mason-blog/impact-social-media-israelgaza-conflict/1182"&gt;http://blogs.channel4.com/paul-mason-blog/impact-social-media-israelgaza-conflict/1182&lt;/a&gt;.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt; Gilad Lotan, Israel, Gaza, War &amp;amp; Data: Social
Networks and the Art of Personalizing Propaganda available at &lt;a href="http://www.huffingtonpost.com/entry/israel-gaza-war-social-networks-data_b_5658557.html"&gt;www.huffingtonpost.com/entry/israel-gaza-war-social-networks-data_b_5658557.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt; Thomas Poell and José van Dijck, “Social Media and
Journalistic Independence” in Media Independence: Working with Freedom or
Working for Free?, edited by James Bennett &amp;amp; Niki Strange. (Routledge,
London, 2015)&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt; T Gillespie, “The politics of ‘platforms,” in New
Media &amp;amp; Society (Volume 12, Issue 3).&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt; Pedro Domingos, The Master Algorithm: How the quest
for the ultimate learning machine will re-make the world (Basic Books, New
York, 2015) at 38.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt; &lt;em&gt;Ibid&lt;/em&gt; at 40.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt; &lt;em&gt;Supra&lt;/em&gt; Note
23.&lt;/p&gt;
&lt;p class="normal"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt; C W Anderson, Between creative and quantified
audiences: Web metrics and changing patterns of newswork in local US newsrooms,
available at &lt;a href="https://www.academia.edu/10937194/Between_Creative_And_Quantified_Audiences_Web_Metrics_and_Changing_Patterns_of_Newswork_in_Local_U.S._Newsrooms"&gt;https://www.academia.edu/10937194/Between_Creative_And_Quantified_Audiences_Web_Metrics_and_Changing_Patterns_of_Newswork_in_Local_U.S._Newsrooms&lt;/a&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;
&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt; &lt;em&gt;Supra &lt;/em&gt;Note 23.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span id="docs-internal-guid-24b4db2a-a606-d425-16ff-1d76b980367d"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/new-media-personalisation-and-the-role-of-algorithms'&gt;https://cis-india.org/internet-governance/new-media-personalisation-and-the-role-of-algorithms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Human Rights</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Machine Learning</dc:subject>
    
    
        <dc:subject>Algorithms</dc:subject>
    
    
        <dc:subject>New Media</dc:subject>
    

   <dc:date>2017-01-16T07:20:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/outlook-march-26-2018-new-lock-for-eu-digital-mines">
    <title>New Lock For EU’s Digital Mines</title>
    <link>https://cis-india.org/internet-governance/news/outlook-march-26-2018-new-lock-for-eu-digital-mines</link>
    <description>
        &lt;b&gt;Indian companies dealing with European data wait ­anxiously as the EU pushes in new security rules&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindam Mukherjee was &lt;a class="external-link" href="https://www.outlookindia.com/magazine/story/new-lock-for-eus-digital-mines/299927"&gt;published in the Outlook&lt;/a&gt; in March 26, 2018 issue. Elonnai Hickok was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pretty soon, Indian companies, especially those associated with European companies, will have to walk that extra mile to protect personal data. Come May 25, the European Union (EU) will enact a new set of regulations, called the General Data Protection Regulation (GDPR), which will impose stringent conditions for personal data protection and privacy laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s more, any violation of or non-compliance with the new regulations will ­attract the strictest of penalties and fines. On an ­average, the new regulations call for up to 4 per cent of a company’s global revenue as penalty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the already huge and rapidly ­expanding field of big data play across companies and industries, data protection has come under the limelight and many countries are talking in terms of putting in place stringent rules for personal data protection. The EU will be the first off the block with GDPR, which comes into effect in less than three months. It is expected that following the EU’s ­example, similar regulations will start coming up in other countries as well.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;The GDPR will replace the 1995 Data Protection Directive ­currently operational ­in the EU.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The GDPR will replace the 1995 Data Protection Directive currently operational in the EU and its regulations will cover all EU member states and citizens. Accordingly, all companies operating in the EU and having customers there, or even having work outsourced from the EU which involves its citizens’ personal data, will have to fall in line and comply.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules under GDPR will be relevant for businesses collecting, processing, storing, and sharing data of EU data subjects. This would include all businesses located in India providing services ­directly or indirectly to EU data subjects, as well as Indian companies with a ­pre­sence in Europe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This has put a lot of Indian IT and ITES companies in a bind given that few Indian companies are in a position to comply with the new GDPR rules and regulations within the given deadline. GDPR neces­sitates that adequate steps have to be taken to secure EU data wherever it is stored or processed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At present, India does not have any data privacy law. However, the government has set up a committee of experts under former Supreme Court Justice B.N. Srikrishna to look into matters related to data protection and privacy in the country. The comm­ittee has so far come up with a draft ­protection bill. But it is ­unlikely that the committee will be able to come out with its final report before the GDPR deadline of May 25.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Huzefa Goawala, who heads GRC, India &amp;amp; SAARC, RSA, says the impact of GDPR will be heavy on India. “A sizeable chunk of Indian companies operate out of the EU including IT/ITeS, manufacturing, financial services and telecom companies,” he adds. “The GDPR will apply to personally identifiable information and internal facing data and external facing data, and organisations will have to protect data on all these fronts. Unfortunately, very few organisations have taken measures to become GDPR compliant at the ground level and are waiting for others to make a move. Larger, tier 1 organisations are in a consultation mode at the moment and are in a preliminary stage of compliance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Ernst &amp;amp; Young’s ­forensic data analytics survey (2018) done among Indian companies, 60 per cent of Indian respondents are still not familiar with the GDPR, while only a little over 23 per cent have heard of it but have done nothing about it. “This puts India in a precarious position, especially because it takes time for a company to prepare for GDPR compliance, which involves identifying where all the data resides and taking measures to safeguard it,” says Mukul Shrivastava, partner, Fraud Investigation and Dispute Services, Ernst &amp;amp; Young.  “Many large IT-ITeS companies have sec­ure servers in the EU or on cloud. But a lot of EU data processing is either done in India or is outsourced to India. That data needs to be protected under the GDPR.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts say that under GDPR, a company will have to report any breach of data security within 72 hours. In case it fails to do so, stiff penalties will be imposed. With GDPR, the EU wants to stress on how important personally identifiable information is and see what companies are doing to protect it. It calls for deployment of ground level technologies by companies to ensure data security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To ensure full compliance under GDPR will be a difficult task. “It is not possible to check 100 per cent compliance,” says Vijayshankar Na, cyber law and international information security expert.  “There can be multiple versions of personal data in a process. To tap this data and see where all it is flowing in the system will be the toughest part under GDPR. Companies will have to identify all this in order to protect data.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To help Indian companies, India’s IT representative body Nasscom has sought a “data secure” status for its companies from the EU. The EU has given a similar status to American companies, which ensures some concessions for them. Indian companies would be entitled to similar concessions under GDPR if they get the data secure status. But a decision on this is yet to come.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“As India has not attained data secure status, the collection, processing, storing, and sharing of EU data subjects by Indian companies will continue to be through ‘binding corporate rules’,” says Elonnai Hickok, chief operating officer, CIS (Centre For Internet and Society), Bangalore. “Though GDPR will affect any company handling EU data, the IT sector in India could potentially be impacted the most given the amount of business that it does and potentially could do with the region. For instance, a Deloitte report has estimated the outsourcing oppor­tunity of the Indian IT industry with Europe at $45 billion.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hickok says India’s legal regime around privacy, consisting primarily of section 43A of the IT Act and associated rules, has not been found to be data secure by the EU in past assessments. This means that unless practices are guided by binding corporate rules, the standard of practice in India is lower than required by the previous Data Protection Directive (1995) as well as the GDPR. Some of the potentially challenging requirements in the GDPR will include the requirement for reporting breaches, new standards for consent, ensuring the rights of data subjects including access and correction, portability, erasure and deletion, the right to objection, and, if the need arises,  the right to request human intervention in automated decisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What could also hit Indian companies is that the cost of GDPR compliance will be high—there will be costs related to human capital, periodic updates, IT infrastructure around the data (both hardware and software) and setting up cyber security and incident response programs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Europe is an important market for Indian companies,” says Vinayak Godse, senior director, Data Security Council of India (DSCI). “This heightened threshold of privacy may lead to some top line compromise for Indian IT companies. The compliance burden is also bound to increase. The small and mid-size companies looking at the EU as a market may struggle to comply with the new rules.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government is trying to bring some order vis a vis data privacy and the Justice Srikrishna panel is expected to expedite the process. “The Government of India is currently developing a national data protection framework, following the Supreme Court judgment of August 2017 recognising an individual’s privacy as a fundamental right,” says Keshav Dhakad, director &amp;amp; assistant general counsel, corporate, External &amp;amp; Legal Affairs, Microsoft India. “The coming of GDPR will help galvanise the discussion in countries outside of Europe and in India.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of now though, there is a lot of con­fusion and Indian companies, staring at a tight deadline, are under stress. If they can speed up the process and comply, they will be safe, but if they fail, they could lose business in one of India’s most promising markets.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/outlook-march-26-2018-new-lock-for-eu-digital-mines'&gt;https://cis-india.org/internet-governance/news/outlook-march-26-2018-new-lock-for-eu-digital-mines&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-17T13:10:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
